The fact that there are high cache miss rates for programs with binary executables of 100s of MB and the binary (machine code) instructions compete with the data stream (data is the value of the operands upon which the instructions are to act) implies what for the concepts of locality that justify many cache designs?
ans)
First we should know about What is cache memory, It is a special very high-speed memory. It is used to speedup and synchronising with high-speed CPU. Cache memory is costlier than main memory or disk memory but economical than CPU registers. It is an extremely fast memory type that acts as a buffer between RAM and the CPU. It holds frequently requested data and instructions so that they are immediately available to the CPU when needed. Let me attached the block diagram of cache memory that is
now, when we talked about the cache miss rates which is caused If the processor does not find the memory location in the cache then cache miss occurs. For a cache miss, the cache allocates a new entry and copies in data from main memory, then the request is fulfilled from the contents of the cache.
The performance of cache memory is frequently measured in terms of a quantity called Hit ratio.
Hit ratio = hit / (hit + miss) = no. of hits/total accesses
We can improve Cache performance using higher cache block size, higher associativity, reduce miss rate, reduce miss penalty, and reduce Reduce the time to hit in the cache.
Cache Mapping:
There are three different types of mapping used for the purpose of
cache memory are as follow: Direct mapping, Associative mapping,
and Set-Associative mapping. These are explained as following
below.
For purposes of cache access, each main memory address can be viewed as consisting of three fields.The least significant w bits identify a unique word or byte within a block of main memory. In most contemporary machines,the address is at the byte level.The remaining s bits specify one of the 2s blocks of main memory.The cache logic interprets these s bits as a tag of s-r bits (most significant portion) and a line field of r bits.
Associative Mapping –
In this type of mapping the associative memory is used to store
content and addresses both of the memory word. Any block can go
into any line of the cache. This means that the word id bits are
used to identify which word in the block is needed, but the tag
becomes all of the remaining bits. This enables the placement of
the any word at any place in the cache memory. It is considered to
be the fastest and the most flexible mapping form.
Set-associative Mapping –
This form of mapping is a enhanced form of the direct mapping where
the drawbacks of direct mapping is removed. Set associative
addresses the problem of possible thrashing in the direct mapping
method. It does this by saying that instead of having exactly one
line that a block can map to in the cache, we will group a few
lines together creating a set. Then a
block in memory can map to any one of the lines of a specific
set..Set-associative mapping allows that each word that is present
in the cache can have two or more words in the main memory for the
same index address. Set associative cache mapping combines the best
of direct and associative cache mapping techniques.
when we talked about the locality of cache memory, here are some overview of it.
Locality of reference –
Since size of cache memory is less as compared to main memory. So
to check which part of main memory should be given priority and
loaded in cache is decided based on locality of reference.
Types of Locality of reference
So, now you will be able to understand the locality concept and cache concept with ease.
--------------------------------------------
Hope You Got The Answer.
If You Like It Then Please Review It and Do Comment Below.
Thank You Very Much :-)
--------------------------------------------
The fact that there are high cache miss rates for programs with binary executables of 100s...
1 Overview The goal of this assignment is to help you understand caches better. You are required to write a cache simulator using the C programming language. The programs have to run on iLab machines. We are providing real program memory traces as input to your cache simulator. The format and structure of the memory traces are described below. We will not give you improperly formatted files. You can assume all your input files will be in proper format as...
Hello, If anyone can help me I will grestly appreciate it! I will also give a thumbs up! Autotech Manufacturing is engaged in the production of replacement parts for automobiles. One plant specializes in the production of two parts: Part 127 and Part 234. Part 127 produces the highest volume of activity, and for many years it was the only part produced by the plant. Five years ago, Part 234 was added. Part 234 was more difficult to manufacture and...
Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...
10. Write a one-page summary of the attached paper? INTRODUCTION Many problems can develop in activated sludge operation that adversely affect effluent quality with origins in the engineering, hydraulic and microbiological components of the process. The real "heart" of the activated sludge system is the development and maintenance of a mixed microbial culture (activated sludge) that treats wastewater and which can be managed. One definition of a wastewater treatment plant operator is a "bug farmer", one who controls the aeration...
How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...