5114100067 dzaky zakiyal fawwaz rangkuman bab8

4

Upload: dzaky-zakiyal-fawwaz

Post on 11-Nov-2015

216 views

Category:

Documents


2 download

DESCRIPTION

wer

TRANSCRIPT

  • Dzaky ZF 511400067

    Basic Concepts

    The maximum size of the memory that can be used in any computer is determined by the addressing

    scheme

    For example, a 16-bit computer that generates 16-bit addresses is capable of addressing up

    to 216=64K memory locations.

    Similarly, machines whose instructions generate 32-bit addresses can utilize a memory that

    contains up to 232=4G memory locations

    Most modern computers are byte addressable. Form the system standpoint, we can view the

    memory unit as a block box. Data transfer between the memory and processor takes place through

    the use of two processor registers, MAR and MDR

    Virtual Memory - Address Translation

    All programs and data are composed of fixed-length units called pages, each of which consists of a

    block of words that occupy contiguous locations in the main memory. Page cannot be too small or

    too large. The virtual memory mechanism bridges the size and speed gaps between the main

    memory and secondary storage similar to cache.

    Memory Management Requirements

    Multiple programs

    System space / user space

    Protection (supervisor / user state, privileged instructions)

    Shared pages

    Hit Rate and Miss Penalty

    The success rate in accessing information at various levels of the memory hierarchy hit rate / miss

    rate. Ideally, the entire memory hierarchy would appear to the processor as a single memory unit

    that has the access time of a cache on the processor chip and the size of a magnetic disk depends

    on the hit rate (>>0.9). A miss causes extra time needed to bring the desired information into the

    cache.

    Caches on the Processor Chip

    Two separate caches for instructions and data, respectively. Single cache for both. Single cache has

    better hit rate. Parallelism, better performance are the advantage of separating caches. There are

    Level 1 and Level 2 caches. L1 cache faster and smaller. Access more than one word simultaneously

    and let the processor use them one at a time. L2 cache slower and larger. The formula to get

    average access time: tave = h1C1 + (1-h1)h2C2 + (1-h1)(1-h2)M. where h is the hit rate, C is the time to

    access information in cache, M is the time to access information in main memory.

    Other Enhancements

    Write buffer processor doesnt need to wait for the memory write to be completed

    Prefetching prefetch the data into the cache before they are needed

    Lockup-Free cache processor is able to access the cache while a miss is being serviced.

  • Dzaky ZF 511400067

    Memory Hierarchy

    Chace Memory

    Small amount of fast memory. Sits between normal main memory and CPU. May be located on CPU

    chip or module. Intended to achieve high speed at low cost

    Mapping Function

    Fewer cache line than main memory block. Need to determine which memory block currently

    occupies a cache line. Need an algorithm to map memory block to cache line. Three Mapping

    Techniques: Direct, Associative and Set associative.

    Read Only Memory

    There are volatile/non-volatile memory. PROM means programmable ROM. EPROM is erasable,

    reprogrammable ROM. EEPROM that can be programmed and erased electrically. Flash Memory

    similar to EEPROM. The difference is only possible to write an entire block of cells instead of a single

    cell. Flash Memory are Low power, Use in portable equipment. The implementation of such modules

    Flash cards and Flash drives.

  • Dzaky ZF 511400067

    Typical Memory Parameters

    Drawing1.pdf (p.1)Basic Concepts.pdf (p.2-4)