Professional Documents
Culture Documents
Based on the bit pair ( a i , b i ) truth table, the carry propagatep i and carry generate gi have dominated the carry-look-
ahead formation process for more than two decades. This paper presents a new scheme in which the new carry propa-
gation is examined by including the neighboring pairs ( a i , bi; ai+,, b,+l). This scheme not only reduces the component
count in design, but also requires fewer logic levels in adder implementation. In addition, this new algorithm oflers an
astonishingly uniform loading in fan-in and fan-out nesting.
Introduction
The traditional recursive formula for carry propagation A = ao2" + al2"-' + a2Y-' + . . + a i P + .. .
has dominated the carryhandling process in the computer
industry for more than two decades. Today, adder de-
+ a,2' ;
signs based on a similar technique include Amdahl V6, B = b02" + b,2"" + b,2"-' + . . . + bi2n-i+ * * .
IBM 168, and IBM 3033.
+ bn2' .
The recursive formulation of carry is based on the bit The relation among the newcarry , i + , ) and
( H iH
pair ( a i , bi) truth table. By examining the local bit pair, the neighboring bit pairs (ai,b,; ai+l, bi+J can be ex-
carry propagate p i and carry generate gi are formed. The pressed as in Table 1 [l]; all of these are generated by
high-order carries are generated by nesting the p i and g, ai, b, or transmitted through the low-order bits, i + 1, i +
together. By considering the adjacentbitpairs (a,, bi; 2, . . ., with the transmitting-enable switch ON. This sig-
ai+l,bi+l), a new recursive formula is obtained for new nal or new carry can only be terminated when the in-
carrypropagation. The comparisonbetweenthis new hibitor is ON (ai+l + bi+, = 0). H , plays both regular
scheme and the existing scheme will be discussed in the carryand complementing signal roles in performing
following sections. The detailed implementation, circuits, binary addition.
and logic level count are also included. Surprisingly, this
method offers an astonishingly uniform loading in fan-in/ By grouping all the H i , we obtain
fan-out nesting.
H i = f ( l , 2, 3 , 5, 6, 7, 9, 10, 1 1 , 12, 13, 14, 15)
The formation of new carry and sum = aibi + Hi+l(Gi+lbi+l+ ai+,Li+, + ai+,bi+,)
This paper introduces a new approach torepresent
the new carry formation and propagation based on the
= aibi + Hi+l(ai+l+ bi+,)= ki + H,+,T,+, , (1)
concept of the complementing signal which was intro- where ki is the new complementing signal, Hi+, is the pre-
duced in 1%5 [I]. To examine the impact of this com- viouscomplementary signal, and Ti+,is the previous
plementing signal in performing binary addition and com- carry enable switch or the previous stage propagate.
plementing signal look-ahead,one should evaluate the
formation of H i and Hi+, as a function of neighbor- Equation (1) shows that new carry H i can be formed
ing bit pairs ( i , i + 1). Let us consider adding two binary locally by ki or produced remotely; H i + , can beproduced
numbers A and B together, where with the remote stage carry inhibitor not ON (ai+l+ bi+,
Copyright 1981 by International Business Machines Corporation. Copying is permitted without payment of royalty provided that (1)
each reproduction is done without alteration and (2) the Journal reference and IBM copyright notice are included on the first page.
The title and abstract may be used without further permission in computer-based and other information-servicesystems. Permission
156 to republish other excerpts should be obtained from the Editor.
+ T25T26T27T20H28 ‘ 15 Hi+,= 1 1 1 1 1
157
+ T21T22T23T24H24 ;
+ T17T18T19T20H20'
= T17T18T19T20 *
Equations (6), (7), and (8) are similar to ( l l ) , (12), and The k, and Tican beimplemented with one level of logic:
(13); however, H*16can be implemented with one level of
k, 0 0 0 0 0 0 0 0 0 1 101OOO1101OOO1OOO10001
logic, whereas G,, cannot. By expanding (7)and (12) we
158 obtain Ti 00000000011011111111111101011111
Example 2 Assuming that the contents of index, base, For SUBTRACTION, there isa HOT ONE carry inputfrom bit
and displacement registers are as shown, compute vir- the 31; thus Hz, can be written as
tual address. (To test the generality of this scheme, odd
contents are purposely chosen; in the normal mode of op- = kZO + T29kZ9 + TZ9T30k30 + T29T30T31k31
To implement the carry-save adder (CSA) requires one = [(kt + q + , T , + , ) v Til + k,H,+,Ti+,
level of logic:
= Hi+,(TiTi+,+ k,T,+,)
160
Level 3
O X
pr >
3-
x
161
-ox
i=7
Level 1 Level 2 Level 3
162
i'll
Level 1 Level 2
R;2
I 0
-
X
.. A I .,
c I
q A
X
-
Y
Tii3 2 = l " - F i
T
i = 16
- Hi0
L - 4 4
163
-
S28-
0 T28
c
2
- . T28
164
165
Received September 11,1980; revised November 26,1980 The author is located at the IBM Thomas J . Watson Re-
search Center, Yorktown Heights, New York 10598.
166