Microsoft powerpoint - chapter06

Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini – The memory hierarchy can be characterized by a number of • access type, • capacity, • cycle time, • latency, • bandwidth, and • cost. Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini – The effectiveness of a memory hierarchy depends on the principle of moving information into the fast memory infrequently and accessing it many times before replacing it with new information. – This principle is possible due to a phenomenon called locality of reference, i.e. within a given period of time, programs tend to reference relatively a confined area of memory repeatedly.
Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini – Spatial locality refers to the phenomenon that when a given address has been referenced, it is most likely that addresses near it will be referenced within a short period of time, e.g., consecutive instructions in a straight line program. – Temporal locality, on the other hand, refers to the phenomenon that once a particular memory item has been referenced, it is most likely that it will be referenced next, e.g., an instruction in a program loop. Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini – The sequence of events that takes place when the processor makes a request for an item is as follows: • First, the item is sought in the first memory level of the memory – The probability of finding the requested item in the first level is called – The probability of not finding (missing) the requested item in the first level of the memory hierarchy is called the miss ratio, (1- h1).
• When the requested item causes a “miss”, it is sought in the next – The probability of finding the requested item in the second memory level, the hit ratio of the second level, is h2 – The miss ratio of the second memory level is (1- h2) • The process is repeated until the item is found. Upon finding the requested item, it is brought and sent to the processor. Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini – In this case, it is assumed that instructions in program loops, which are executed many times, e.g. n times, once loaded into the cache, are used more than once before they are replaced by new instructions. The average access time, t , is given by: – The above expression reveals that as the number of repeated access, n, increases, the average access time decreases, a desirable feature of the memory hierarchy. Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini – In this case, it is assumed that the size of the block transferred from the main memory to the cache, upon a cache miss, is melements. It is also assumed that due to spatial locality, all m elements were requested, one at a time, by the processor. Based on these assumptions, the average access time, t , is – The above expression reveals that as the number of elements in a block, m, increases, the average access time decreases, a desirable feature of the memory hierarchy. Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini • Impact of Combined Temporal and Spatial Locality – In this case, it is assumed that the element requested by the processor created a cache miss leading to the transfer of a block, consisting of m elements, to the cache (that take t ).
– Due to spatial locality, all m elements constituting a block were requested, one at a time, by the processor (requiring mt ). – Following that, the originally requested element was accessed (n-1) times (temporal locality), i.e., a total of n times access to that element. – The average access time, t , is given by the following: Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini – Cache-mapping function is presented taking into consideration the interface between two successive levels in the memory hierarchy: – If the focus is on the interface between the cache and main memory, then the cache represents the primary level, while the main memory represents the secondary level.
Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini – A request for accessing a memory element is made by the processor through issuing the address of the requested element.
– The address issued by the processor may correspond to that of an element that exits currently in the cache (cache hit); otherwise, it may correspond to an element that is currently residing in the main memory. – Therefore, address translation has to be made in order to determine the whereabouts of the requested element. – This is one of the functions performed by the Memory Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini – There is basically three main different organization techniques • Direct mapping• Fully associative mapping• Set-associative mapping – These techniques differ in two main aspects: • The criterion used to place, in the cache, an incoming block from • The criterion used to replace a cache block by an incoming block Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini • Cache Memory Organization - Direct mapping – This is the simplest among the three techniques. – Its simplicity stems from the fact that it places an incoming main memory block into a specific fixed cache block location. – The placement is done based on a fixed relation between the incoming block number, i, the cache block number, j, and the number of cache blocks, N, as follows j = i Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini • Cache Memory Organization - Direct mapping – The main advantage of the direct-mapping technique is its simplicity in determining the whereabouts to place an incoming main memory block in the cache. – Its main disadvantage is the inefficient use of the cache. • This is because according to this technique, a number of main memory blocks may compete for a given cache block even if there exists other empty cache block(s). This disadvantage should lead to achieving low cache hit ratio. Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini • Cache Memory Organization - Direct mapping – According to the direct-mapping technique, the memory management unit (MMU) interprets the address issued by the processor by dividing the address into three fields : – The length, in bits, of each of the above fields is given below: B is the size of block in words.
• (4) The number of bits in the main memory address = log ( B × M ) Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini • Cache Memory Organization - Direct mapping Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini • Cache Memory Organization – Fully Associative – An incoming main memory block can be placed in any available – Therefore, the address issued by the processor need only to • The Tag: uniquely identifies the block while residing in the cache. • The Word: identifies the element within the block that is requested Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini • Cache Memory Organization – Fully Associative – The memory management unit (MMU) interprets the address issued by the processor by dividing it into two fields.
– The length, in bits, of each of the fields is given below: B is the size of the block in words.
M is the size of the main memory in • (3) The number of bits in the main memory address = log ( B × M ) Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini • Cache Memory Organization – Fully Associative Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini • Cache Memory Organization – Set-Associative Mapping – The cache is divided into a number of sets. – Each set consists of a number of blocks. – A given main memory block maps to a specific cache set based on the equation s = i mod S, where S is the number of sets in the cache, i is the main memory block number, and s is the specific – However, an incoming block maps to any block in the assigned – Therefore, the address issued by the processor is divided into • Tag: uniquely identifies the targeted block within the determined set.
Set: used to uniquely identify the specific cache set that ideally • The Word: identifies the element (word) within the block that is Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini • Cache Memory Organization – Set-Associative Mapping Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini • Qualitative comparison among cache mapping techniques Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini – Random Selection: includes a randomly selected block.
– First-in-First-out, FIFO: the block that has been in the cache the – Least Recently Used, LRU: the block that has been used the Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini – Coherence between a cache word and its copy in the main memory should be maintained at all times, if at all possible. – A number of policies (techniques) are used in performing write operations to the main memory blocks while residing in the cache.
– These policies determine the degree of coherence that can be maintained between cache words and their counterparts in the main memory. Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini • Cache Write Policies Upon a Cache Hit – There are basically two possible write policies upon a cache hit: – every write operation to the cache is repeated to the main memory at – The write-through policy maintains coherence between the cache blocks and their counterparts in the main memory at the expense of the extra time needed to write to the main memory. This leads to an – all writes are made to the cache. – A write to the main memory is postponed until a replacement is – Every cache block is assigned a bit, called the dirty bit, to indicate that at least one write operation has been made to the block while residing – At replacement time, the dirty bit is checked, if it is set, then the block is written back to the main memory; otherwise, it is simply overwritten by – Coherence is only guaranteed at the time of replacement.
Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini • Write-allocate whereby the main memory block is brought to the • Write-no-allocate whereby the missed main memory block is updated, while in the main memory and not brought to the cache.
– In general, write-through caches use write-no-allocate policy while write-back caches use write-allocate policy.
Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini – Two possible strategies can be used. • In the first one, the main memory missed block is brought to the cache while the required word is forwarded immediately to the CPU • In the second strategy, the missed main memory block is entirely stored in the cache and the required word is then forwarded to the Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini • The average access time for a memory system is given by: • t is the time required to transfer a block to the cache.
• (t –t ) is the additional time incurred due to the write operations.
w is the fraction of write operations. • The average access time for a memory system is given by: Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini • Real-Life Cache Organization Analysis Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini • Real-Life Cache Organization Analysis • The PowerPC cache is divided into data and instruction caches, • Both the instruction and the data caches are organized as 16-Kbyte Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini • Real-Life Cache Organization Analysis – PMC-Sierra RM7000A 64-bit MIPS RISC Processor • The RM7000 uses a different cache organization compared to the Intel's and the PowerPC. In this case, three separate caches are – Primary Instruction cache: A 16 Kbytes, 4-way set associative cache with 32-byte block size (eight instructions).
– Primary Data cache: A 16 Kbytes, 4-way set associative cache with 32 – Secondary Cache: A 256 Kbytes, 4-way set associative cache for both – In addition to the three on-chip caches, the RM7000 provides a dedicated tertiary cache interface, which supports tertiary cache sizes of 512 Kbytes, 2 Mbytes, and 8 Mbytes. This tertiary cache is only accessed after a secondary cache miss.
Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini • In this chapter, the design and analysis of the first level of a memory hierarchy, i.e. the cache memory was • In this context, the locality issues were discussed and their effect on the average access time was explained.
• Three cache mapping techniques were analyzed and their performance measures were compared: – direct– associative, and – set-associative mappings • Three replacement techniques were also introduced: – Random, – FIFO, and – LRU replacement.
Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini • The impact of the three techniques on the cache hit ratio • Cache writing policies were also introduced and • The discussion on cache ended up with a presentation of the cache memory organization and characteristics of – Pentium-IV, – PowerPc, and – PMC-Sierra-RM-7000, processors. Fundamentals of Computer Organization and Architecture Mostafa Abd-El-Barr & Hesham El-Rewini

Source: http://www.it.nrru.ac.th/krit/410502/ComSysArc-06.pdf

Http://www.pasco.com/resource.0dissociation%20constants.pdf

1 6 D E T E R M I N I N G D I S S O C I A T I O N C O N S T A N T S — L A B A C T I V I T Y 16 Determining Dissociation Constants Background Dissociation is the term used to describe the breakdown of a molecule into simpler parts. This often (almost always in basic chemistry) occurs in water. The equilibrium constant for such a reaction is called a dissociation constant. The dissociation

Anwendungsbereich

– Urinteststreifen 10 für den semi-quantitativen und qualitativen Nachweis von Glucose, Bilirubin, Ketone, Spezifisches Gewicht (Dichte), Blut, pH-Wert, Protein, Urobilinogen, Nitrit und Leukozyten im Urin Art.-Nr. wi-urs 10 VERWENDUNGSZWECK positive Fälle reichen von so niedrigen Werten wie 40% bei Fällen mit geringer Verweildauer des Die Reagenzstreifen zur Urinanal

Copyright © 2010-2014 Medical Pdf Finder