SlideShare a Scribd company logo
A
    Seminar Presentation On


“Dynamic Cache Management
        Technique”

                    Presented By:
                    Ajay Singh Lamba
                      (IT , Final Year)
Content
 Introduction to cache memory
 How stored data is transferred to the CPU
 Mapping functions
 Dynamic Cache Management
 Dynamic Techniques For L0-cache
 Management
Introduction to cache memory

 A cache, in computer terms, is a place to store
  information that's faster than the place where the
  information is usually stored
 Cache memory is fast memory that is used to hold the
  most recently accessed data
 Only frequently accessed data will stay in cache, which
  allows the CPU to access it more quickly
 it is placed in the processor chip, which allows it to 'talk'
  with the processor direct at a much higher speed than
  standard RAM.
How stored data is transferred to the
             CPU ??
Mapping functions

    Since M>>C, how are blocks mapped to specific lines
    in cache.

1. Direct mapping
2. Associative mapping
3. Set associative mapping
Dynamic Cache Management

 It’s resizing strategy of the cache memory

 Dynamic caching allows for dynamic resizing both
  across and within applications execution.

 The basic idea is that only the most frequently executed
  portion of the code should be stored in the L0-cache
POWER TRENDS FOR CURRENT
   MICROPROCESSORS
DYNAMIC TECHNIQUES FOR L0-CACHE
          MANAGEMENT

1. Simple Method.

2. Static Method.

3. Dynamic Confidence Estimation Method.

4. Restrictive Dynamic Confidence Estimation Method.

5. Dynamic Distance Estimation Method.
SIMPLE METHOD

 If a branch predictor is mispredicted, the machine will
  access the I-cache to fetch the instructions.

 If a branch is predicted correctly, the machine will access
  the L0-cache.

 In a misprediction , the machine will start fetching the
  instructions from the correct address by accessing the I-
  cache.
STATIC METHOD

    If a ‘high confidence’ branch was predicted incorrectly,
    the I-cache is accessed for the subsequent basic blocks.

 If more than n low confidence branches have been
    decoded in a row, the I-cache is accessed. Therefore the
    L0-cache will be bypassed when either of the two
    conditions are satisfied.

 In any other case the machine will access the L0-cache.
DYNAMIC CONFIDENCE ESTIMATION
               METHOD
   It is a dynamic version of the static method.
   The confidence of the I-cache is accessed if

    1. A high confidence branch is mispredicted.
    2. More than n successive ‘low confidence’ branches
     are encountered.

   it is more accurate in characterizing a branch and,
    then, regulating the access of the L0-cache.
RESTRICTIVE DYNAMIC CONFIDENCE
          ESTIMATION METHOD
    Restrictive dynamic scheme is a more selective scheme
    in which only the really important basic blocks would be
    selected for the L0-cache.

 The L0-cache is accessed only if a ‘high confidence’
    branch is predicted correctly. The I-cache is accessed in
    any other case.

 This method selects some of the most frequently
    executed basic blocks, yet it misses some others.
Dynamic Distance Estimation Method

 All n branches after a mispredicted branch are tagged as
  ‘low confidence’ otherwise as ‘high confidence’.
 The basic blocks after a ‘low confidence’ branch are
  fetched from the L0-cache.
 The net effect is that a branch misprediction causes a
  series of fetches from the I-cache.

 A counter is used to measure the distance of a branch
  from the previous mispredicted branch.
Thank you

Any Query ??

More Related Content

PPT
Dynamic Cache Management
PPTX
20141023
PDF
Creative APP-titude: iPad Multimedia Tools for Creativity
PPTX
HCI presentation
PPT
Multimedia communication
PPTX
Slideshare ppt
PPT
Dynamic cache management technique
PDF
Oversimplified CA
Dynamic Cache Management
20141023
Creative APP-titude: iPad Multimedia Tools for Creativity
HCI presentation
Multimedia communication
Slideshare ppt
Dynamic cache management technique
Oversimplified CA

Similar to Dynamic cache management (20)

PPTX
Computer architecture
PDF
Cache memory
PPT
Cache memory and cache
PDF
Computer architecture
PPTX
Cache Memory.pptx
DOCX
Dcim distributed cache invalidation method for maintaining cache consistency ...
DOCX
Dcim distributed cache invalidation method for maintaining cache consistency ...
PPTX
Big data cloud architecture
PPT
Cache memory presentation
PPTX
Cache Memory- JMD.pptx
PDF
Automating the Hunt for Non-Obvious Sources of Latency Spreads
PPTX
Cache memory
PPTX
[Hanoi-August 13] Tech Talk on Caching Solutions
DOCX
Dcim distributed cache invalidation method for maintaining cache consistency ...
DOCX
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
DOCX
JPJ1431 top-k Query Result Completeness Verification
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOC
Privacy and integrity-preserving range queries in sensor networks
DOC
Privacy and integrity-preserving range queries in sensor networks
PPTX
Modern processors
Computer architecture
Cache memory
Cache memory and cache
Computer architecture
Cache Memory.pptx
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
Big data cloud architecture
Cache memory presentation
Cache Memory- JMD.pptx
Automating the Hunt for Non-Obvious Sources of Latency Spreads
Cache memory
[Hanoi-August 13] Tech Talk on Caching Solutions
Dcim distributed cache invalidation method for maintaining cache consistency ...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
JPJ1431 top-k Query Result Completeness Verification
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
Privacy and integrity-preserving range queries in sensor networks
Privacy and integrity-preserving range queries in sensor networks
Modern processors
Ad

Recently uploaded (20)

PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Presentation on HIE in infants and its manifestations
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
RMMM.pdf make it easy to upload and study
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Classroom Observation Tools for Teachers
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Final Presentation General Medicine 03-08-2024.pptx
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Microbial disease of the cardiovascular and lymphatic systems
2.FourierTransform-ShortQuestionswithAnswers.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Presentation on HIE in infants and its manifestations
01-Introduction-to-Information-Management.pdf
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Anesthesia in Laparoscopic Surgery in India
RMMM.pdf make it easy to upload and study
Complications of Minimal Access Surgery at WLH
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Classroom Observation Tools for Teachers
A systematic review of self-coping strategies used by university students to ...
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Module 4: Burden of Disease Tutorial Slides S2 2025
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Ad

Dynamic cache management

  • 1. A Seminar Presentation On “Dynamic Cache Management Technique” Presented By: Ajay Singh Lamba (IT , Final Year)
  • 2. Content  Introduction to cache memory  How stored data is transferred to the CPU  Mapping functions  Dynamic Cache Management  Dynamic Techniques For L0-cache Management
  • 3. Introduction to cache memory  A cache, in computer terms, is a place to store information that's faster than the place where the information is usually stored  Cache memory is fast memory that is used to hold the most recently accessed data  Only frequently accessed data will stay in cache, which allows the CPU to access it more quickly  it is placed in the processor chip, which allows it to 'talk' with the processor direct at a much higher speed than standard RAM.
  • 4. How stored data is transferred to the CPU ??
  • 5. Mapping functions  Since M>>C, how are blocks mapped to specific lines in cache. 1. Direct mapping 2. Associative mapping 3. Set associative mapping
  • 6. Dynamic Cache Management  It’s resizing strategy of the cache memory  Dynamic caching allows for dynamic resizing both across and within applications execution.  The basic idea is that only the most frequently executed portion of the code should be stored in the L0-cache
  • 7. POWER TRENDS FOR CURRENT MICROPROCESSORS
  • 8. DYNAMIC TECHNIQUES FOR L0-CACHE MANAGEMENT 1. Simple Method. 2. Static Method. 3. Dynamic Confidence Estimation Method. 4. Restrictive Dynamic Confidence Estimation Method. 5. Dynamic Distance Estimation Method.
  • 9. SIMPLE METHOD  If a branch predictor is mispredicted, the machine will access the I-cache to fetch the instructions.  If a branch is predicted correctly, the machine will access the L0-cache.  In a misprediction , the machine will start fetching the instructions from the correct address by accessing the I- cache.
  • 10. STATIC METHOD  If a ‘high confidence’ branch was predicted incorrectly, the I-cache is accessed for the subsequent basic blocks.  If more than n low confidence branches have been decoded in a row, the I-cache is accessed. Therefore the L0-cache will be bypassed when either of the two conditions are satisfied.  In any other case the machine will access the L0-cache.
  • 11. DYNAMIC CONFIDENCE ESTIMATION METHOD  It is a dynamic version of the static method.  The confidence of the I-cache is accessed if 1. A high confidence branch is mispredicted. 2. More than n successive ‘low confidence’ branches are encountered.  it is more accurate in characterizing a branch and, then, regulating the access of the L0-cache.
  • 12. RESTRICTIVE DYNAMIC CONFIDENCE ESTIMATION METHOD  Restrictive dynamic scheme is a more selective scheme in which only the really important basic blocks would be selected for the L0-cache.  The L0-cache is accessed only if a ‘high confidence’ branch is predicted correctly. The I-cache is accessed in any other case.  This method selects some of the most frequently executed basic blocks, yet it misses some others.
  • 13. Dynamic Distance Estimation Method  All n branches after a mispredicted branch are tagged as ‘low confidence’ otherwise as ‘high confidence’.  The basic blocks after a ‘low confidence’ branch are fetched from the L0-cache.  The net effect is that a branch misprediction causes a series of fetches from the I-cache.  A counter is used to measure the distance of a branch from the previous mispredicted branch.