SlideShare a Scribd company logo
Memory Sub-System
Memory Subsystem
• Memory Hierarchy
• Types of memory
• Memory organization
• Memory Hierarchy Design
• Cache
Memory Hierarchy
• Registers
– In CPU
• Internal or Main memory
– May include one or more levels of cache
– “RAM”
• External memory
– Backing store
Memory Hierarchy - Diagram
Internal Memory Types
Memory Type Category Erasure Write Mechanism Volatility
Random-access
memory (RAM)
Read-write memory Electrically, byte-level Electrically Volatile
Read-only
memory (ROM)
Read-only memory Not possible
Masks
Nonvolatile
Programmable
ROM (PROM)
Electrically
Erasable PROM
(EPROM)
Read-mostly memory
UV light, chip-level
Electrically Erasable
PROM (EEPROM)
Electrically, byte-level
Flash memory Electrically, block-level
External Memory Types
• HDD
– Magnetic Disk(s)
– SDD (Solid State Disk(s))
• Optical
– CD-ROM
– CD-Recordable (CD-R)
– CD-R/W
– DVD
• Magnetic Tape
Random Access Memory (RAM)
• Misnamed as all semiconductor memory is random
access
• Read/Write
• Volatile
• Temporary storage
• Static or dynamic
Types of RAM
• Dynamic RAM (DRAM) – are like leaky capacitors;
initially data is stored in the DRAM chip, charging its
memory cells to maximum values. The charge slowly leaks
out and eventually would go to low to represent valid data;
before this happens, a refresh circuitry reads the contents of
the DRAM and rewrites the data to its original locations,
thus restoring the memory cells to their maximum charges
• Static RAM (SRAM) – is more like a register; once the data
has been written, it will stay valid, it doesn’t have to be
refreshed. Static RAM is faster than DRAM, also more
expensive. Cache memory in PCs is constructed from
SRAM memory.
Dynamic RAM
• Bits stored as charge in capacitors
– Charges leak
– Need refreshing even when powered
• Simpler construction
• Smaller per bit
– Less expensive
• Need refresh circuits
• Slower
• Used for main memory in computing systems
• Essentially analogue
– Level of charge determines value
Dynamic RAM Structure
DRAM Operation
• Address line active when bit read or written
– Transistor switch closed (current flows)
• Write
– Voltage to bit line
• High for 1 low for 0
– Then signal address line
• Transfers charge to capacitor
• Read
– Address line selected
• transistor turns on
– Charge from capacitor fed via bit line to sense amplifier
• Compares with reference value to determine 0 or 1
– Capacitor charge must be restored
DRAM Refreshing
• Refresh circuit included on chip
• Disable chip
• Count through rows
• Read & Write back
• Takes time
• Slows down apparent performance
Static RAM
• Bits stored as on/off switches
• No charges to leak
• No refreshing needed when powered
• More complex construction
• Larger per bit
– More expensive
• Does not need refresh circuits
• Faster
– Cache
• Digital
– Uses flip-flops
Stating RAM Structure
Static RAM Operation
• Transistor arrangement gives stable logic state
• State 1
– C1 high, C2 low
– T1 T4 off, T2 T3on
• State 0
– C2 high, C1 low
– T2 T3 off, T1 T4on
• Address line transistors T5 T6 is switch
• Write – apply value to B & compliment to B
• Read – value is on line B
SRAM v DRAM
• Both volatile
– Power needed to preserve data
• Dynamic cell
– Simpler to build, smaller
– More dense
– Less expensive
– Needs refresh
– Larger memory units
• Static
– Faster
– Cache
Read Only Memory (ROM)
• Permanent storage
– Nonvolatile
• Microprogramming
• Library subroutines (code) and constant data
• Systems programs (BIOS for PC or entire
application + OS for certain embedded systems)
Types of ROM
• Written during manufacture
– Very expensive for small runs
• Programmable (once)
– PROM
– Needs special equipment to program
• Read “mostly”
– Erasable Programmable (EPROM)
• Erased by UV
– Electrically Erasable (EEPROM)
• Takes much longer to write than read
– Flash memory
• Erase whole memory electrically
Internal linear organization
• 8X2 ROM chip
• As the number of
locations increases,
the size of the
address decoder
needed, becomes
very large
• Multiple dimensions
of decoding can be
used to overcome
this problem
Internal two-dimensional organization
• High order address bits (A2A1) select one of the rows
• The low order address bit selects one of the two locations in
the row
Memory Subsystems Organization (1)
• Two or more memory chips can be combined to create
memory with more bits per location (two 8X2 chips can
create a 8X4 memory)
Memory Subsystems Organization (2)
• Two or more memory chips can be combined to create more
locations (two 8X2 chips can create 16X2 memory)
Memory Hierarchy Design (1)
• Since 1987, microprocessors performance improved 55% per year and 35% until 1987
• This picture shows the CPU performance against memory access time improvements over the
years
– Clearly there is a processor-memory performance gap that computer architects must take care of
Memory Hierarchy Design (2)
• It is a tradeoff between size, speed and cost and exploits the principle
of locality.
• Register
– Fastest memory element; but small storage; very expensive
• Cache
– Fast and small compared to main memory; acts as a buffer between the CPU
and main memory: it contains the most recent used memory locations (address
and contents are recorded here)
• Main memory is the RAM of the system
• Disk storage - HDD
Memory Hierarchy Design (3)
• Comparison between different types of memory
size:
speed:
$/Mbyte:
32 - 256 B
1-2 ns
Register Cache Memory
32KB - 4MB
2-4 ns
$20/MB
1000 MB
60 ns
$0.2/MB
200 GB
8 ms
$0.001/MB
larger, slower, cheaper
HDD
Memory Hierarchy Design (4)
• Design questions about any level of the memory
hierarchy:
– Where can a block be placed in the upper level?
• BLOCK PLACEMENT
– How is a block found if it is in the upper level?
• BLOCK IDENTIFICATION
– Which block should be replaced on a miss?
• BLOCK REPLACEMENT
– What happens on a write?
• WRITE STRATEGY
Cache (1)
• Is the first level of memory hierarchy encountered
once the address leaves the CPU
– Since the principle of locality applies, and taking
advantage of locality to improve performance is so
popular, the term cache is now applied whenever
buffering is employed to reuse commonly occurring
items
• We will study caches by trying to answer the four
questions for the first level of the memory hierarchy
Cache (2)
• Every address reference goes first to the cache;
– if the desired address is not here, then we have a cache miss;
• The contents are fetched from main memory into the indicated CPU register and the
content is also saved into the cache memory
– If the desired data is in the cache, then we have a cache hit
• The desired data is brought from the cache, at very high speed (low access time)
• Most software exhibits temporal locality of access, meaning that it is
likely that same address will be used again soon, and if so, the address
will be found in the cache
• Transfers between main memory and cache occur at granularity of
cache lines or cache blocks, around 32 or 64 bytes (rather than bytes
or processor words). Burst transfers of this kind receive hardware
support and exploit spatial locality of access to the cache (future
access are often to address near to the previous one)
Cache Organization
Cache/Main Memory Structure
Where can a block be placed in Cache? (1)
• Our cache has eight block frames and the main
memory has 32 blocks
Where can a block be placed in Cache? (2)
• Direct mapped Cache
– Each block has only one place where it can appear in the cache
– (Block Address) MOD (Number of blocks in cache)
• Fully associative Cache
– A block can be placed anywhere in the cache
• Set associative Cache
– A block can be placed in a restricted set of places into the cache
– A set is a group of blocks into the cache
– (Block Address) MOD (Number of sets in the cache)
• If there are n blocks in the cache, the placement is said to be n-way set
associative
How is a Block Found in the Cache?
• Caches have an address tag on each block frame that gives the block address. The
tag is checked against the address coming from CPU
– All tags are searched in parallel since speed is critical
– Valid bit is appended to every tag to say whether this entry contains valid addresses or
not
• Address fields:
– Block address
• Tag – compared against for a hit
• Index – selects the set
– Block offset – selects the desired data from the block
• Set associative cache
– Large index means large sets with few blocks per set
– With smaller index, the associativity increases
• Full associative cache – index field is not existing
Which Block should be Replaced on a Cache Miss?
• When a miss occurs, the cache controller must select a
block to be replaced with the desired data
– Benefit of direct mapping is that the hardware decision is much
simplified
• Two primary strategies for full and set associative caches
– Random – candidate blocks are randomly selected
• Some systems generate pseudo random block numbers, to get reproducible
behavior useful for debugging
– LRU (Least Recently Used) – to reduce the chance that
information that has been recently used will be needed again, the
block replaced is the least-recently used one.
• Accesses to blocks are recorded to be able to implement LRU
What Happens on a Write?
• Two basic options when writing to the cache:
– Writhe through – the information is written to both, the block in
the cache an the block in the lower-level memory
– Write back – the information is written only to the cache
• The modified block of cache is written back into the lower-level memory
only when it is replaced
• To reduce the frequency of writing back blocks on
replacement, an implementation feature called dirty bit is
commonly used.
– This bit indicates whether a block is dirty (has been modified since
loaded) or clean (not modified). If clean, no write back is involved
Alpha Processors Cache Example
1 – the address comes from the CPU, being divided into 29
bit block address and 5 bit offset. The block address is
further divided into 21 bit tag and 8 bit index
2 – the cache index selects the tag to be tested to see if the
desired block is in the cache. The size of the index depends
on the cache size, block size and the set associativity
3 – after reading the tag from the cache, it is compared with
the tag from the address from the CPU. The valid bit must be
set, otherwise, the result of comparison is ignored.
4 – assuming the tag does match, the final step is to
signal the CPU to load the data from the cache.
Detailed Direct Mapping Example
• Cache of 64kByte
• Cache block of 4 bytes
– i.e. cache is 16k (214
) lines of 4 bytes
• 16MBytes main memory
– 24 bit address (224
=16M)
• Address is in two parts
– Least Significant w bits identify unique word
– Most Significant s bits specify one memory block
– The MSBs are split into a cache line field r and a tag of s-
r (most significant)
Direct Mapping Example - Address Structure
Tag s-r Line (Index) r Word w
8 14 2
• 24 bit address
– 2 bit word identifier (4 byte block)
– 22 bit block identifier
• 8 bit tag (=22-14)
• 14 bit slot or line
• No two blocks in the same line have the same Tag field
• Check contents of cache by finding line and checking Tag
Direct Mapping Cache Organization
Mapping function
i = j mod m
Direct
Mapping
Example
Detailed Fully Associative Mapping Example
• Cache of 64kByte
– Cache block of 4 bytes
– i.e. cache is 16k (214
) lines of 4 bytes
• 16MBytes main memory
– 24 bit address (224
=16M)
• A main memory block can load into any line of cache
• Memory address is interpreted as tag and word
– Tag uniquely identifies block of memory
– Every line’s tag is examined for a match
• Cache searching gets expensive
Tag 22 bit
Word
2 bit
Fully Associative Mapping Example - Address Structure
• 22 bit tag stored with each 32 bit block of data
• Compare tag field with tag entry in cache to check for hit
• Least significant 2 bits of address identify which word is
required from 32 bit data block
• e.g.
– Address Tag Data Cache line
– FFFFFC FFFFFC 0x24682468 3FFF
Fully Associative Cache
Organization
Associative
Mapping
Example
Detailed Set Associative Mapping Example
• Cache of 64kByte
– Cache block of 4 bytes
– i.e. cache is 16k (214
) lines of 4 bytes
• 16MBytes main memory
– 24 bit address (224
=16M)
• Cache is divided into a number of sets (v)
– Each set contains a number of lines (k)
• A given block maps to any line in a given set
– e.g. Block B can be in any line of set i
• Mapping function
– i = j mod v (where total lines in the cache m = v * k)
• J – main memory block
• I – cache set number
• e.g. 2 lines per set
– 2 way associative mapping (k = 2)
– A given block can be in one of 2 lines in only one set
Example Set Associative Mapping - Address Structure
• Use set field to determine cache set to look in
• Compare tag field to see if we have a hit
• e.g
– Address Tag Data Set
– 1FF 7FFC 1FF 12345678 1FFF
– 001 7FFC 001 11223344 1FFF
Tag 9 bit Set (Index) 13 bit
Word
2 bit
K-Way Set Associative Cache
Organization
Two Way Set Associative Mapping
Example
References
• “Computer Architecture – A Quantitative
Approach”, John L Hennessy & David A Patterson,
ISBN 1-55860-329-8
• “Computer Systems Organization & Architecture”,
John D. Carpinelli, ISBN: 0-201-61253-4
• “Computer Organization and Architecture”, William
Stallings, 8th
Edition

More Related Content

PPS
Virtual memory
PPTX
The n Queen Problem
PPTX
Input-Buffering
PPTX
Addressing sequencing
PPTX
REAL TIME OPERATING SYSTEM
PPT
Unix.system.calls
PPTX
PPTX
Finite automata-for-lexical-analysis
Virtual memory
The n Queen Problem
Input-Buffering
Addressing sequencing
REAL TIME OPERATING SYSTEM
Unix.system.calls
Finite automata-for-lexical-analysis

What's hot (20)

PPTX
Lexical analyzer generator lex
PPT
Memory management
PPTX
Operating system components
PDF
Cache replacement policies,cache miss,writingtechniques
PPT
04 cache memory.ppt 1
PDF
Linux Memory Management
PPTX
Cache memory
PPTX
Virtual memory presentation
PPT
Pipeline hazards in computer Architecture ppt
PPTX
General register organization (computer organization)
PPTX
Associative Memory in Computer architecture
PPTX
Operating system paging and segmentation
PPTX
Instruction codes
PPTX
process control block
PPT
Micro programmed control
PPT
Linux memory
PPTX
Paging and Segmentation in Operating System
PPTX
Virtual Memory
PPTX
Cache Memory
PDF
Memory management
Lexical analyzer generator lex
Memory management
Operating system components
Cache replacement policies,cache miss,writingtechniques
04 cache memory.ppt 1
Linux Memory Management
Cache memory
Virtual memory presentation
Pipeline hazards in computer Architecture ppt
General register organization (computer organization)
Associative Memory in Computer architecture
Operating system paging and segmentation
Instruction codes
process control block
Micro programmed control
Linux memory
Paging and Segmentation in Operating System
Virtual Memory
Cache Memory
Memory management
Ad

Viewers also liked (20)

PPTX
Memory Organization
PPT
RAM and ROM Memory Overview
PDF
Coal 14 input output devices in Assembly Programming
PPT
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unit
PPTX
Semiconductor Memories
PPTX
Ch05 coa9e
PPT
02 Computer Evolution And Performance
PPTX
DOCX
COMPUTER MEMORY
PPTX
Semiconductor memories
PPT
Computers7 Ch4 2
PPTX
Accessing I/O Devices
PPT
05 Internal Memory
PPTX
Memory Hierarchy Design, Basics, Cache Optimization, Address Translation
PPT
PPT
Static and Dynamic Read/Write memories
PPT
PPT
Secondary Storage
Memory Organization
RAM and ROM Memory Overview
Coal 14 input output devices in Assembly Programming
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unit
Semiconductor Memories
Ch05 coa9e
02 Computer Evolution And Performance
COMPUTER MEMORY
Semiconductor memories
Computers7 Ch4 2
Accessing I/O Devices
05 Internal Memory
Memory Hierarchy Design, Basics, Cache Optimization, Address Translation
Static and Dynamic Read/Write memories
Secondary Storage
Ad

Similar to Ct213 memory subsystem (20)

PPT
Ch 4 95
PPT
Memory Hierarchy PPT of Computer Organization
PPT
IS 139 Lecture 7
PPTX
BCSE205L_Module 4 Computer Architecture Org.pptx
PPTX
UNIT IV Computer architecture Analysis.pptx
PPT
Akanskaha_ganesh_kullarni_memory_computer.ppt
PPT
cache memory
PPT
04 Cache Memory
PPTX
Computer organizatin.Chapter Seven.pptxs
PPT
cache memory.ppt
PPT
cache memory.ppt
PPTX
CAO-Unit-III.pptx
PPT
Cache Memory from Computer Architecture.ppt
PDF
Computer architecture
PDF
Chache memory ( chapter number 4 ) by William stalling
PPT
chapter6.ppt
PPTX
Memory Organization
PDF
Memory Organization.pdf
PPT
Cache Memory for Computer Architecture.ppt
PDF
lecture-2-3_Memory.pdf,describing memory
Ch 4 95
Memory Hierarchy PPT of Computer Organization
IS 139 Lecture 7
BCSE205L_Module 4 Computer Architecture Org.pptx
UNIT IV Computer architecture Analysis.pptx
Akanskaha_ganesh_kullarni_memory_computer.ppt
cache memory
04 Cache Memory
Computer organizatin.Chapter Seven.pptxs
cache memory.ppt
cache memory.ppt
CAO-Unit-III.pptx
Cache Memory from Computer Architecture.ppt
Computer architecture
Chache memory ( chapter number 4 ) by William stalling
chapter6.ppt
Memory Organization
Memory Organization.pdf
Cache Memory for Computer Architecture.ppt
lecture-2-3_Memory.pdf,describing memory

More from Sandeep Kamath (20)

PPT
Android persentation
PPTX
Biometrics
PPT
Oracle architecture
PPT
Oracle advanced
PPT
PPTX
Technology
PPTX
Ad and da convertor
PPT
Introducttion to robotics and microcontrollers
PPTX
PPTX
Symbian os
PPTX
Microprocessor in washing machine
DOCX
File hippo
PPTX
Processor
PPTX
Microprocessor in washing machine
PPTX
Microprocessor based software developnent
PPTX
Microcessor aplication
PPTX
Magnetic tape
PPT
Introducttion to robotics and microcontrollers
PPTX
Interfacing address
PPTX
Embedded systems
Android persentation
Biometrics
Oracle architecture
Oracle advanced
Technology
Ad and da convertor
Introducttion to robotics and microcontrollers
Symbian os
Microprocessor in washing machine
File hippo
Processor
Microprocessor in washing machine
Microprocessor based software developnent
Microcessor aplication
Magnetic tape
Introducttion to robotics and microcontrollers
Interfacing address
Embedded systems

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Big Data Technologies - Introduction.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
cuic standard and advanced reporting.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Approach and Philosophy of On baking technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
Electronic commerce courselecture one. Pdf
Empathic Computing: Creating Shared Understanding
Digital-Transformation-Roadmap-for-Companies.pptx
Big Data Technologies - Introduction.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Spectral efficient network and resource selection model in 5G networks
cuic standard and advanced reporting.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Approach and Philosophy of On baking technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Understanding_Digital_Forensics_Presentation.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
MYSQL Presentation for SQL database connectivity
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Mobile App Security Testing_ A Comprehensive Guide.pdf

Ct213 memory subsystem

  • 2. Memory Subsystem • Memory Hierarchy • Types of memory • Memory organization • Memory Hierarchy Design • Cache
  • 3. Memory Hierarchy • Registers – In CPU • Internal or Main memory – May include one or more levels of cache – “RAM” • External memory – Backing store
  • 5. Internal Memory Types Memory Type Category Erasure Write Mechanism Volatility Random-access memory (RAM) Read-write memory Electrically, byte-level Electrically Volatile Read-only memory (ROM) Read-only memory Not possible Masks Nonvolatile Programmable ROM (PROM) Electrically Erasable PROM (EPROM) Read-mostly memory UV light, chip-level Electrically Erasable PROM (EEPROM) Electrically, byte-level Flash memory Electrically, block-level
  • 6. External Memory Types • HDD – Magnetic Disk(s) – SDD (Solid State Disk(s)) • Optical – CD-ROM – CD-Recordable (CD-R) – CD-R/W – DVD • Magnetic Tape
  • 7. Random Access Memory (RAM) • Misnamed as all semiconductor memory is random access • Read/Write • Volatile • Temporary storage • Static or dynamic
  • 8. Types of RAM • Dynamic RAM (DRAM) – are like leaky capacitors; initially data is stored in the DRAM chip, charging its memory cells to maximum values. The charge slowly leaks out and eventually would go to low to represent valid data; before this happens, a refresh circuitry reads the contents of the DRAM and rewrites the data to its original locations, thus restoring the memory cells to their maximum charges • Static RAM (SRAM) – is more like a register; once the data has been written, it will stay valid, it doesn’t have to be refreshed. Static RAM is faster than DRAM, also more expensive. Cache memory in PCs is constructed from SRAM memory.
  • 9. Dynamic RAM • Bits stored as charge in capacitors – Charges leak – Need refreshing even when powered • Simpler construction • Smaller per bit – Less expensive • Need refresh circuits • Slower • Used for main memory in computing systems • Essentially analogue – Level of charge determines value
  • 11. DRAM Operation • Address line active when bit read or written – Transistor switch closed (current flows) • Write – Voltage to bit line • High for 1 low for 0 – Then signal address line • Transfers charge to capacitor • Read – Address line selected • transistor turns on – Charge from capacitor fed via bit line to sense amplifier • Compares with reference value to determine 0 or 1 – Capacitor charge must be restored
  • 12. DRAM Refreshing • Refresh circuit included on chip • Disable chip • Count through rows • Read & Write back • Takes time • Slows down apparent performance
  • 13. Static RAM • Bits stored as on/off switches • No charges to leak • No refreshing needed when powered • More complex construction • Larger per bit – More expensive • Does not need refresh circuits • Faster – Cache • Digital – Uses flip-flops
  • 15. Static RAM Operation • Transistor arrangement gives stable logic state • State 1 – C1 high, C2 low – T1 T4 off, T2 T3on • State 0 – C2 high, C1 low – T2 T3 off, T1 T4on • Address line transistors T5 T6 is switch • Write – apply value to B & compliment to B • Read – value is on line B
  • 16. SRAM v DRAM • Both volatile – Power needed to preserve data • Dynamic cell – Simpler to build, smaller – More dense – Less expensive – Needs refresh – Larger memory units • Static – Faster – Cache
  • 17. Read Only Memory (ROM) • Permanent storage – Nonvolatile • Microprogramming • Library subroutines (code) and constant data • Systems programs (BIOS for PC or entire application + OS for certain embedded systems)
  • 18. Types of ROM • Written during manufacture – Very expensive for small runs • Programmable (once) – PROM – Needs special equipment to program • Read “mostly” – Erasable Programmable (EPROM) • Erased by UV – Electrically Erasable (EEPROM) • Takes much longer to write than read – Flash memory • Erase whole memory electrically
  • 19. Internal linear organization • 8X2 ROM chip • As the number of locations increases, the size of the address decoder needed, becomes very large • Multiple dimensions of decoding can be used to overcome this problem
  • 20. Internal two-dimensional organization • High order address bits (A2A1) select one of the rows • The low order address bit selects one of the two locations in the row
  • 21. Memory Subsystems Organization (1) • Two or more memory chips can be combined to create memory with more bits per location (two 8X2 chips can create a 8X4 memory)
  • 22. Memory Subsystems Organization (2) • Two or more memory chips can be combined to create more locations (two 8X2 chips can create 16X2 memory)
  • 23. Memory Hierarchy Design (1) • Since 1987, microprocessors performance improved 55% per year and 35% until 1987 • This picture shows the CPU performance against memory access time improvements over the years – Clearly there is a processor-memory performance gap that computer architects must take care of
  • 24. Memory Hierarchy Design (2) • It is a tradeoff between size, speed and cost and exploits the principle of locality. • Register – Fastest memory element; but small storage; very expensive • Cache – Fast and small compared to main memory; acts as a buffer between the CPU and main memory: it contains the most recent used memory locations (address and contents are recorded here) • Main memory is the RAM of the system • Disk storage - HDD
  • 25. Memory Hierarchy Design (3) • Comparison between different types of memory size: speed: $/Mbyte: 32 - 256 B 1-2 ns Register Cache Memory 32KB - 4MB 2-4 ns $20/MB 1000 MB 60 ns $0.2/MB 200 GB 8 ms $0.001/MB larger, slower, cheaper HDD
  • 26. Memory Hierarchy Design (4) • Design questions about any level of the memory hierarchy: – Where can a block be placed in the upper level? • BLOCK PLACEMENT – How is a block found if it is in the upper level? • BLOCK IDENTIFICATION – Which block should be replaced on a miss? • BLOCK REPLACEMENT – What happens on a write? • WRITE STRATEGY
  • 27. Cache (1) • Is the first level of memory hierarchy encountered once the address leaves the CPU – Since the principle of locality applies, and taking advantage of locality to improve performance is so popular, the term cache is now applied whenever buffering is employed to reuse commonly occurring items • We will study caches by trying to answer the four questions for the first level of the memory hierarchy
  • 28. Cache (2) • Every address reference goes first to the cache; – if the desired address is not here, then we have a cache miss; • The contents are fetched from main memory into the indicated CPU register and the content is also saved into the cache memory – If the desired data is in the cache, then we have a cache hit • The desired data is brought from the cache, at very high speed (low access time) • Most software exhibits temporal locality of access, meaning that it is likely that same address will be used again soon, and if so, the address will be found in the cache • Transfers between main memory and cache occur at granularity of cache lines or cache blocks, around 32 or 64 bytes (rather than bytes or processor words). Burst transfers of this kind receive hardware support and exploit spatial locality of access to the cache (future access are often to address near to the previous one)
  • 31. Where can a block be placed in Cache? (1) • Our cache has eight block frames and the main memory has 32 blocks
  • 32. Where can a block be placed in Cache? (2) • Direct mapped Cache – Each block has only one place where it can appear in the cache – (Block Address) MOD (Number of blocks in cache) • Fully associative Cache – A block can be placed anywhere in the cache • Set associative Cache – A block can be placed in a restricted set of places into the cache – A set is a group of blocks into the cache – (Block Address) MOD (Number of sets in the cache) • If there are n blocks in the cache, the placement is said to be n-way set associative
  • 33. How is a Block Found in the Cache? • Caches have an address tag on each block frame that gives the block address. The tag is checked against the address coming from CPU – All tags are searched in parallel since speed is critical – Valid bit is appended to every tag to say whether this entry contains valid addresses or not • Address fields: – Block address • Tag – compared against for a hit • Index – selects the set – Block offset – selects the desired data from the block • Set associative cache – Large index means large sets with few blocks per set – With smaller index, the associativity increases • Full associative cache – index field is not existing
  • 34. Which Block should be Replaced on a Cache Miss? • When a miss occurs, the cache controller must select a block to be replaced with the desired data – Benefit of direct mapping is that the hardware decision is much simplified • Two primary strategies for full and set associative caches – Random – candidate blocks are randomly selected • Some systems generate pseudo random block numbers, to get reproducible behavior useful for debugging – LRU (Least Recently Used) – to reduce the chance that information that has been recently used will be needed again, the block replaced is the least-recently used one. • Accesses to blocks are recorded to be able to implement LRU
  • 35. What Happens on a Write? • Two basic options when writing to the cache: – Writhe through – the information is written to both, the block in the cache an the block in the lower-level memory – Write back – the information is written only to the cache • The modified block of cache is written back into the lower-level memory only when it is replaced • To reduce the frequency of writing back blocks on replacement, an implementation feature called dirty bit is commonly used. – This bit indicates whether a block is dirty (has been modified since loaded) or clean (not modified). If clean, no write back is involved
  • 36. Alpha Processors Cache Example 1 – the address comes from the CPU, being divided into 29 bit block address and 5 bit offset. The block address is further divided into 21 bit tag and 8 bit index 2 – the cache index selects the tag to be tested to see if the desired block is in the cache. The size of the index depends on the cache size, block size and the set associativity 3 – after reading the tag from the cache, it is compared with the tag from the address from the CPU. The valid bit must be set, otherwise, the result of comparison is ignored. 4 – assuming the tag does match, the final step is to signal the CPU to load the data from the cache.
  • 37. Detailed Direct Mapping Example • Cache of 64kByte • Cache block of 4 bytes – i.e. cache is 16k (214 ) lines of 4 bytes • 16MBytes main memory – 24 bit address (224 =16M) • Address is in two parts – Least Significant w bits identify unique word – Most Significant s bits specify one memory block – The MSBs are split into a cache line field r and a tag of s- r (most significant)
  • 38. Direct Mapping Example - Address Structure Tag s-r Line (Index) r Word w 8 14 2 • 24 bit address – 2 bit word identifier (4 byte block) – 22 bit block identifier • 8 bit tag (=22-14) • 14 bit slot or line • No two blocks in the same line have the same Tag field • Check contents of cache by finding line and checking Tag
  • 39. Direct Mapping Cache Organization Mapping function i = j mod m
  • 41. Detailed Fully Associative Mapping Example • Cache of 64kByte – Cache block of 4 bytes – i.e. cache is 16k (214 ) lines of 4 bytes • 16MBytes main memory – 24 bit address (224 =16M) • A main memory block can load into any line of cache • Memory address is interpreted as tag and word – Tag uniquely identifies block of memory – Every line’s tag is examined for a match • Cache searching gets expensive
  • 42. Tag 22 bit Word 2 bit Fully Associative Mapping Example - Address Structure • 22 bit tag stored with each 32 bit block of data • Compare tag field with tag entry in cache to check for hit • Least significant 2 bits of address identify which word is required from 32 bit data block • e.g. – Address Tag Data Cache line – FFFFFC FFFFFC 0x24682468 3FFF
  • 45. Detailed Set Associative Mapping Example • Cache of 64kByte – Cache block of 4 bytes – i.e. cache is 16k (214 ) lines of 4 bytes • 16MBytes main memory – 24 bit address (224 =16M) • Cache is divided into a number of sets (v) – Each set contains a number of lines (k) • A given block maps to any line in a given set – e.g. Block B can be in any line of set i • Mapping function – i = j mod v (where total lines in the cache m = v * k) • J – main memory block • I – cache set number • e.g. 2 lines per set – 2 way associative mapping (k = 2) – A given block can be in one of 2 lines in only one set
  • 46. Example Set Associative Mapping - Address Structure • Use set field to determine cache set to look in • Compare tag field to see if we have a hit • e.g – Address Tag Data Set – 1FF 7FFC 1FF 12345678 1FFF – 001 7FFC 001 11223344 1FFF Tag 9 bit Set (Index) 13 bit Word 2 bit
  • 47. K-Way Set Associative Cache Organization
  • 48. Two Way Set Associative Mapping Example
  • 49. References • “Computer Architecture – A Quantitative Approach”, John L Hennessy & David A Patterson, ISBN 1-55860-329-8 • “Computer Systems Organization & Architecture”, John D. Carpinelli, ISBN: 0-201-61253-4 • “Computer Organization and Architecture”, William Stallings, 8th Edition

Editor's Notes

  • #32: Real caches contain hundreds of block frames and real memories contain millions of blocks. Those numbers are chosen for simplicity. Assume that there is nothing in the cache and the block address in question (address that is accessed by processor falls within the block address number 12 in the main memory), then we can have three types of caches (from a block placement point of view): Fully associative – where block 12 from the lower level memory can go into any of 8 block frames of the cache Direct mapped – where block 12 from the lower level memory can go only into block frame 4 (12 mod 8) Set associative – where block 12 from the lower level memory can go anywhere into set 0 (12 mod 4, if our memory has four sets). With two blocks per set, that means that the block 12 can go anywhere into block frame 0 or block frame 1 of the cache
  • #34: The comparison can be made on the full address, but there is no need because of the following: Checking the index would be redundant, since it was used to select the set to be checked. For instance, an address stored in set 0, must have 0 in the index field or it couldn’t have been stored in set 0 The offset is unnecessary in the comparison since the entire block is present or not in the cache, so all the block offsets should match.
  • #37: 8KB cache direct mapped with 32byte blocks. 1 – the address comes from the CPU, being divided into 29 bit block address and 5 bit offset. The block address is further divided into 21 bit tag and 8 bit index 2 – the cache index selects the tag to be tested to see if the desired block is in the cache. The size of the index depends on the cache size (8KB in our case), block size (32 byte blocks) and the set associativity (direct mapped = 1) 3 – after reading the tag from the cache, it is compared with the tag from the address from the CPU. The valid bit must be set, otherwise, the result of comparison is ignored. 4 – assuming the tag does match, the final step is to signal the CPU to load the data from the cache. The alpha processor is using a write through technique for writing. The first three steps are the same. If a match, then the processor will write in both places, cache and the write buffer. The write buffer is used to cache multiple writes, so the write process would be more efficient.
  • #40: I = cache line number M = Number of lines in the cache J = Main memory block number