Browse Definitions :
Definition

clock gating

Contributor(s): Matthew Haughn

Clock gating is a power-saving feature in semiconductor microelectronics that enables switching off circuits. Many electronic devices use clock gating to turn off buses, controllers, bridges and parts of processors, to reduce dynamic power consumption.

Clock gating can be achieved either by software switching of power states per instructions in code or through smart hardware that detects whether there is work to be done and, if not, turns off the circuit. On some electronic devices, clock gating can also be achieved by a combination of methods.

Clock gating groups circuits in logical blocks that are shut off when there is no work to be done. With asynchronous circuits, the power consumption is naturally data-dependent. As the circuits are not operating at the same frequency, there is an inherent design consideration, in that some components will occasionally wait for data to do work.

Clock gating allows for synchronous circuits to emulate this data-dependant power usage with greater or lesser efficiency. With synchronous buses, extra logic circuits are required over asynchronous buses. However, synchronous circuits still retain greater simplicity and smaller size, enabling a lower cost of production. Clock gating efficiency only nears 100% when the granularity is very fine. This granularity of off-and-on control allows synchronous circuits to approach the data-dependent power efficiency of asynchronous circuits.

While clock gating is effective at reducing power required for dynamic workloads, it cannot reduce the power usage of static high workloads.  This near-100% utilization scenario is common in computing scenarios in server, rendering, mathematical and scientific computing workloads.

This was last updated in February 2016

Continue Reading About clock gating

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • VRAM (video RAM)

    VRAM (video RAM) is a reference to any type of random access memory (RAM) used to store image data for a computer display.

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • flash memory

    Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks.

Close