SlideShare a Scribd company logo
2
Most read
3
Most read
6
Most read
A  Seminar Presentation On “Dynamic Cache Management Technique” Presented By: RAMESH  08QQ1A0530 (CSE, Final Year)
Content Introduction to cache memory How stored data is transferred to the CPU  Mapping functions Dynamic Cache Management Dynamic Techniques For L0-cache Management
Introduction to cache memory A cache, in computer terms, is a place to store information that's faster than the place where the information is usually stored Cache memory is fast memory that is used to hold the most recently accessed data  Only frequently accessed data will stay in cache, which allows the CPU to access it more quickly  it is placed in the processor chip, which allows it to 'talk' with the processor direct at a much higher speed than standard RAM.
How stored data is transferred to the CPU ??
Mapping functions  Since M>>C, how are blocks mapped to specific lines in cache. Direct mapping  Associative mapping  Set associative mapping
Dynamic Cache Management It’s resizing strategy of the cache memory Dynamic caching allows for dynamic resizing both across and within applications execution. The basic idea is that only the most frequently executed portion of the code should be stored in the L0-cache
POWER TRENDS FOR CURRENT MICROPROCESSORS
DYNAMIC TECHNIQUES FOR L0-CACHE  MANAGEMENT  1. Simple Method. 2. Static Method. 3. Dynamic Confidence Estimation Method. 4. Restrictive Dynamic Confidence Estimation Method. 5. Dynamic Distance Estimation Method.
SIMPLE METHOD  If a branch predictor is mispredicted, the machine will access the I-cache to fetch the instructions.  If a branch is predicted correctly, the machine will access the L0-cache.  In a misprediction , the machine will start fetching the instructions from the correct address by accessing the I-cache.
STATIC METHOD  If a ‘high confidence’ branch was predicted incorrectly, the I-cache is accessed for the subsequent basic blocks. If more than n low confidence branches have been decoded in a row, the I-cache is accessed. Therefore the L0-cache will be bypassed when either of the two conditions are satisfied.  In any other case the machine will access the L0-cache.
DYNAMIC CONFIDENCE ESTIMATION METHOD It is a dynamic version of the static method.  The confidence of the I-cache is accessed if  1. A high confidence branch is mispredicted.  2. More than n successive ‘low confidence’ branches are encountered. it is more accurate in characterizing a branch and, then, regulating the access of the L0-cache.
RESTRICTIVE DYNAMIC CONFIDENCE ESTIMATION METHOD  Restrictive dynamic scheme is a more selective scheme in which only the really important basic blocks would be selected for the L0-cache. The L0-cache is accessed only if a ‘high confidence’ branch is predicted correctly. The I-cache is accessed in any other case. This method selects some of the most frequently executed basic blocks, yet it misses some others.
Dynamic Distance Estimation Method All n branches after a mispredicted branch are tagged as ‘low confidence’ otherwise as ‘high confidence’. The basic blocks after a ‘low confidence’ branch are fetched from the L0-cache. The net effect is that a branch misprediction causes a series of fetches from the I-cache. A counter is used to measure the distance of a branch from the previous mispredicted branch.
Thank you Any Query ??

More Related Content

PPTX
Precision farming
PPTX
Cyber Forensics Overview
PPTX
Computer forensics
PPT
Introduction to computer forensic
PDF
Chat GPT Intoduction.pdf
PPTX
What is ChatGPT
PPTX
Computer forensics ppt
PPTX
Screenless Display PPT Presentation
Precision farming
Cyber Forensics Overview
Computer forensics
Introduction to computer forensic
Chat GPT Intoduction.pdf
What is ChatGPT
Computer forensics ppt
Screenless Display PPT Presentation

What's hot (20)

PPTX
Cloud Computing
PPTX
Introduction of Cloud computing
PPTX
Biometric Security Systems ppt
PPT
Cloud Computing
PPTX
Cloud Computing
PPTX
Cloud computing and grid computing 360 degree compared
PPTX
Cloud Computing for college presenation project.
PDF
IaaS, SaaS, PasS : Cloud Computing
PPTX
PPT on Hadoop
PPTX
Cloud computing
PPTX
Research in Cloud Computing
PPTX
Cloud sim
PPTX
Software as a service
PPTX
cloud computing, Principle and Paradigms: 1 introdution
PDF
Hadoop Ecosystem
PPT
A Study on:Green Cloud Computing
PPTX
Cloud computing presentation
PPTX
Mandatory access control for information security
PPTX
Basics of Cloud Computing
PPTX
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Cloud Computing
Introduction of Cloud computing
Biometric Security Systems ppt
Cloud Computing
Cloud Computing
Cloud computing and grid computing 360 degree compared
Cloud Computing for college presenation project.
IaaS, SaaS, PasS : Cloud Computing
PPT on Hadoop
Cloud computing
Research in Cloud Computing
Cloud sim
Software as a service
cloud computing, Principle and Paradigms: 1 introdution
Hadoop Ecosystem
A Study on:Green Cloud Computing
Cloud computing presentation
Mandatory access control for information security
Basics of Cloud Computing
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Ad

Viewers also liked (8)

PPTX
Hazelcast
PPTX
Io techniques & its types
PPT
Dynamic Cache Management
PPTX
Bluetooth Chat
PDF
A project report on chat application
DOCX
Computer science seminar topics
PPT
Flynns classification
DOCX
Best topics for seminar
Hazelcast
Io techniques & its types
Dynamic Cache Management
Bluetooth Chat
A project report on chat application
Computer science seminar topics
Flynns classification
Best topics for seminar
Ad

Similar to Dynamic cache management technique (20)

PPT
Dynamic cache management
PDF
Oversimplified CA
PPTX
Computer architecture
PDF
Cache memory
PPTX
Cache memory
PDF
Automating the Hunt for Non-Obvious Sources of Latency Spreads
DOCX
Dcim distributed cache invalidation method for maintaining cache consistency ...
DOCX
Dcim distributed cache invalidation method for maintaining cache consistency ...
PPTX
Cache Memory.pptx
PPTX
Deep Dive: AWS X-Ray London Summit 2017
DOCX
JPJ1431 top-k Query Result Completeness Verification
PDF
Advanced Threat Detection in ICS – SCADA Environments
DOCX
Dcim distributed cache invalidation method for maintaining cache consistency ...
DOCX
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
PPTX
Inerview Quesion on Data Mining and Machine Learning
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
PDF
Spring One 2 GX 2014 - CACHING WITH SPRING: ADVANCED TOPICS AND BEST PRACTICES
PPTX
CREDIT CARD FRAUD DETECTION
DOC
Privacy and integrity-preserving range queries in sensor networks
DOC
Privacy and integrity-preserving range queries in sensor networks
Dynamic cache management
Oversimplified CA
Computer architecture
Cache memory
Cache memory
Automating the Hunt for Non-Obvious Sources of Latency Spreads
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
Cache Memory.pptx
Deep Dive: AWS X-Ray London Summit 2017
JPJ1431 top-k Query Result Completeness Verification
Advanced Threat Detection in ICS – SCADA Environments
Dcim distributed cache invalidation method for maintaining cache consistency ...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
Inerview Quesion on Data Mining and Machine Learning
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
Spring One 2 GX 2014 - CACHING WITH SPRING: ADVANCED TOPICS AND BEST PRACTICES
CREDIT CARD FRAUD DETECTION
Privacy and integrity-preserving range queries in sensor networks
Privacy and integrity-preserving range queries in sensor networks

More from Upender Upr (7)

PPTX
Grid computing Seminar PPT
PPTX
Sniffer for the mobile phones
PDF
Internet access via cable tv network seminar byupender
PPTX
Internet access via cable tv network ppt
PPTX
Internet access via cable tv network ppt
PDF
Java Simple Programs
PPT
OOP Principles
Grid computing Seminar PPT
Sniffer for the mobile phones
Internet access via cable tv network seminar byupender
Internet access via cable tv network ppt
Internet access via cable tv network ppt
Java Simple Programs
OOP Principles

Recently uploaded (20)

PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Electronic commerce courselecture one. Pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Machine Learning_overview_presentation.pptx
PDF
Approach and Philosophy of On baking technology
PPTX
sap open course for s4hana steps from ECC to s4
PDF
MIND Revenue Release Quarter 2 2025 Press Release
Programs and apps: productivity, graphics, security and other tools
Electronic commerce courselecture one. Pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
MYSQL Presentation for SQL database connectivity
Spectral efficient network and resource selection model in 5G networks
Chapter 3 Spatial Domain Image Processing.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Assigned Numbers - 2025 - Bluetooth® Document
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Diabetes mellitus diagnosis method based random forest with bat algorithm
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Unlocking AI with Model Context Protocol (MCP)
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Spectroscopy.pptx food analysis technology
Machine Learning_overview_presentation.pptx
Approach and Philosophy of On baking technology
sap open course for s4hana steps from ECC to s4
MIND Revenue Release Quarter 2 2025 Press Release

Dynamic cache management technique

  • 1. A Seminar Presentation On “Dynamic Cache Management Technique” Presented By: RAMESH 08QQ1A0530 (CSE, Final Year)
  • 2. Content Introduction to cache memory How stored data is transferred to the CPU Mapping functions Dynamic Cache Management Dynamic Techniques For L0-cache Management
  • 3. Introduction to cache memory A cache, in computer terms, is a place to store information that's faster than the place where the information is usually stored Cache memory is fast memory that is used to hold the most recently accessed data Only frequently accessed data will stay in cache, which allows the CPU to access it more quickly it is placed in the processor chip, which allows it to 'talk' with the processor direct at a much higher speed than standard RAM.
  • 4. How stored data is transferred to the CPU ??
  • 5. Mapping functions Since M>>C, how are blocks mapped to specific lines in cache. Direct mapping Associative mapping Set associative mapping
  • 6. Dynamic Cache Management It’s resizing strategy of the cache memory Dynamic caching allows for dynamic resizing both across and within applications execution. The basic idea is that only the most frequently executed portion of the code should be stored in the L0-cache
  • 7. POWER TRENDS FOR CURRENT MICROPROCESSORS
  • 8. DYNAMIC TECHNIQUES FOR L0-CACHE MANAGEMENT 1. Simple Method. 2. Static Method. 3. Dynamic Confidence Estimation Method. 4. Restrictive Dynamic Confidence Estimation Method. 5. Dynamic Distance Estimation Method.
  • 9. SIMPLE METHOD If a branch predictor is mispredicted, the machine will access the I-cache to fetch the instructions. If a branch is predicted correctly, the machine will access the L0-cache. In a misprediction , the machine will start fetching the instructions from the correct address by accessing the I-cache.
  • 10. STATIC METHOD If a ‘high confidence’ branch was predicted incorrectly, the I-cache is accessed for the subsequent basic blocks. If more than n low confidence branches have been decoded in a row, the I-cache is accessed. Therefore the L0-cache will be bypassed when either of the two conditions are satisfied. In any other case the machine will access the L0-cache.
  • 11. DYNAMIC CONFIDENCE ESTIMATION METHOD It is a dynamic version of the static method. The confidence of the I-cache is accessed if 1. A high confidence branch is mispredicted. 2. More than n successive ‘low confidence’ branches are encountered. it is more accurate in characterizing a branch and, then, regulating the access of the L0-cache.
  • 12. RESTRICTIVE DYNAMIC CONFIDENCE ESTIMATION METHOD Restrictive dynamic scheme is a more selective scheme in which only the really important basic blocks would be selected for the L0-cache. The L0-cache is accessed only if a ‘high confidence’ branch is predicted correctly. The I-cache is accessed in any other case. This method selects some of the most frequently executed basic blocks, yet it misses some others.
  • 13. Dynamic Distance Estimation Method All n branches after a mispredicted branch are tagged as ‘low confidence’ otherwise as ‘high confidence’. The basic blocks after a ‘low confidence’ branch are fetched from the L0-cache. The net effect is that a branch misprediction causes a series of fetches from the I-cache. A counter is used to measure the distance of a branch from the previous mispredicted branch.
  • 14. Thank you Any Query ??