SlideShare a Scribd company logo
1 of 14
A
    Seminar Presentation On


“Dynamic Cache Management
        Technique”

                    Presented By:
                    Ajay Singh Lamba
                      (IT , Final Year)
Content
 Introduction to cache memory
 How stored data is transferred to the CPU
 Mapping functions
 Dynamic Cache Management
 Dynamic Techniques For L0-cache
 Management
Introduction to cache memory

 A cache, in computer terms, is a place to store
  information that's faster than the place where the
  information is usually stored
 Cache memory is fast memory that is used to hold the
  most recently accessed data
 Only frequently accessed data will stay in cache, which
  allows the CPU to access it more quickly
 it is placed in the processor chip, which allows it to 'talk'
  with the processor direct at a much higher speed than
  standard RAM.
How stored data is transferred to the
             CPU ??
Mapping functions

    Since M>>C, how are blocks mapped to specific lines
    in cache.

1. Direct mapping
2. Associative mapping
3. Set associative mapping
Dynamic Cache Management

 It’s resizing strategy of the cache memory

 Dynamic caching allows for dynamic resizing both
  across and within applications execution.

 The basic idea is that only the most frequently executed
  portion of the code should be stored in the L0-cache
POWER TRENDS FOR CURRENT
   MICROPROCESSORS
DYNAMIC TECHNIQUES FOR L0-CACHE
          MANAGEMENT

1. Simple Method.

2. Static Method.

3. Dynamic Confidence Estimation Method.

4. Restrictive Dynamic Confidence Estimation Method.

5. Dynamic Distance Estimation Method.
SIMPLE METHOD

 If a branch predictor is mispredicted, the machine will
  access the I-cache to fetch the instructions.

 If a branch is predicted correctly, the machine will access
  the L0-cache.

 In a misprediction , the machine will start fetching the
  instructions from the correct address by accessing the I-
  cache.
STATIC METHOD

    If a ‘high confidence’ branch was predicted incorrectly,
    the I-cache is accessed for the subsequent basic blocks.

 If more than n low confidence branches have been
    decoded in a row, the I-cache is accessed. Therefore the
    L0-cache will be bypassed when either of the two
    conditions are satisfied.

 In any other case the machine will access the L0-cache.
DYNAMIC CONFIDENCE ESTIMATION
               METHOD
   It is a dynamic version of the static method.
   The confidence of the I-cache is accessed if

    1. A high confidence branch is mispredicted.
    2. More than n successive ‘low confidence’ branches
     are encountered.

   it is more accurate in characterizing a branch and,
    then, regulating the access of the L0-cache.
RESTRICTIVE DYNAMIC CONFIDENCE
          ESTIMATION METHOD
    Restrictive dynamic scheme is a more selective scheme
    in which only the really important basic blocks would be
    selected for the L0-cache.

 The L0-cache is accessed only if a ‘high confidence’
    branch is predicted correctly. The I-cache is accessed in
    any other case.

 This method selects some of the most frequently
    executed basic blocks, yet it misses some others.
Dynamic Distance Estimation Method

 All n branches after a mispredicted branch are tagged as
  ‘low confidence’ otherwise as ‘high confidence’.
 The basic blocks after a ‘low confidence’ branch are
  fetched from the L0-cache.
 The net effect is that a branch misprediction causes a
  series of fetches from the I-cache.

 A counter is used to measure the distance of a branch
  from the previous mispredicted branch.
Thank you

Any Query ??

More Related Content

Similar to Dynamic Cache Management Technique Seminar

Cache memory and cache
Cache memory and cacheCache memory and cache
Cache memory and cacheVISHAL DONGA
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...JPINFOTECH JAYAPRAKASH
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...JPINFOTECH JAYAPRAKASH
 
Automating the Hunt for Non-Obvious Sources of Latency Spreads
Automating the Hunt for Non-Obvious Sources of Latency SpreadsAutomating the Hunt for Non-Obvious Sources of Latency Spreads
Automating the Hunt for Non-Obvious Sources of Latency SpreadsScyllaDB
 
[Hanoi-August 13] Tech Talk on Caching Solutions
[Hanoi-August 13] Tech Talk on Caching Solutions[Hanoi-August 13] Tech Talk on Caching Solutions
[Hanoi-August 13] Tech Talk on Caching SolutionsITviec
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...IEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...IEEEGLOBALSOFTTECHNOLOGIES
 
JPJ1431 top-k Query Result Completeness Verification
JPJ1431   top-k Query Result Completeness VerificationJPJ1431   top-k Query Result Completeness Verification
JPJ1431 top-k Query Result Completeness Verificationchennaijp
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...IEEEGLOBALSOFTTECHNOLOGIES
 
Privacy and integrity-preserving range queries in sensor networks
Privacy  and integrity-preserving range queries in sensor networksPrivacy  and integrity-preserving range queries in sensor networks
Privacy and integrity-preserving range queries in sensor networksIMPULSE_TECHNOLOGY
 
Privacy and integrity-preserving range queries in sensor networks
Privacy  and integrity-preserving range queries in sensor networksPrivacy  and integrity-preserving range queries in sensor networks
Privacy and integrity-preserving range queries in sensor networksIMPULSE_TECHNOLOGY
 

Similar to Dynamic Cache Management Technique Seminar (20)

Oversimplified CA
Oversimplified CAOversimplified CA
Oversimplified CA
 
Cache memory
Cache memoryCache memory
Cache memory
 
Cache memory and cache
Cache memory and cacheCache memory and cache
Cache memory and cache
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
Cache Memory.pptx
Cache Memory.pptxCache Memory.pptx
Cache Memory.pptx
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
 
Big data cloud architecture
Big data cloud architectureBig data cloud architecture
Big data cloud architecture
 
Cache memory presentation
Cache memory presentationCache memory presentation
Cache memory presentation
 
Cache Memory- JMD.pptx
Cache Memory- JMD.pptxCache Memory- JMD.pptx
Cache Memory- JMD.pptx
 
Automating the Hunt for Non-Obvious Sources of Latency Spreads
Automating the Hunt for Non-Obvious Sources of Latency SpreadsAutomating the Hunt for Non-Obvious Sources of Latency Spreads
Automating the Hunt for Non-Obvious Sources of Latency Spreads
 
Cache memory
Cache memoryCache memory
Cache memory
 
[Hanoi-August 13] Tech Talk on Caching Solutions
[Hanoi-August 13] Tech Talk on Caching Solutions[Hanoi-August 13] Tech Talk on Caching Solutions
[Hanoi-August 13] Tech Talk on Caching Solutions
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
 
JPJ1431 top-k Query Result Completeness Verification
JPJ1431   top-k Query Result Completeness VerificationJPJ1431   top-k Query Result Completeness Verification
JPJ1431 top-k Query Result Completeness Verification
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
 
Privacy and integrity-preserving range queries in sensor networks
Privacy  and integrity-preserving range queries in sensor networksPrivacy  and integrity-preserving range queries in sensor networks
Privacy and integrity-preserving range queries in sensor networks
 
Privacy and integrity-preserving range queries in sensor networks
Privacy  and integrity-preserving range queries in sensor networksPrivacy  and integrity-preserving range queries in sensor networks
Privacy and integrity-preserving range queries in sensor networks
 
Modern processors
Modern processorsModern processors
Modern processors
 

Recently uploaded

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Dynamic Cache Management Technique Seminar

  • 1. A Seminar Presentation On “Dynamic Cache Management Technique” Presented By: Ajay Singh Lamba (IT , Final Year)
  • 2. Content  Introduction to cache memory  How stored data is transferred to the CPU  Mapping functions  Dynamic Cache Management  Dynamic Techniques For L0-cache Management
  • 3. Introduction to cache memory  A cache, in computer terms, is a place to store information that's faster than the place where the information is usually stored  Cache memory is fast memory that is used to hold the most recently accessed data  Only frequently accessed data will stay in cache, which allows the CPU to access it more quickly  it is placed in the processor chip, which allows it to 'talk' with the processor direct at a much higher speed than standard RAM.
  • 4. How stored data is transferred to the CPU ??
  • 5. Mapping functions  Since M>>C, how are blocks mapped to specific lines in cache. 1. Direct mapping 2. Associative mapping 3. Set associative mapping
  • 6. Dynamic Cache Management  It’s resizing strategy of the cache memory  Dynamic caching allows for dynamic resizing both across and within applications execution.  The basic idea is that only the most frequently executed portion of the code should be stored in the L0-cache
  • 7. POWER TRENDS FOR CURRENT MICROPROCESSORS
  • 8. DYNAMIC TECHNIQUES FOR L0-CACHE MANAGEMENT 1. Simple Method. 2. Static Method. 3. Dynamic Confidence Estimation Method. 4. Restrictive Dynamic Confidence Estimation Method. 5. Dynamic Distance Estimation Method.
  • 9. SIMPLE METHOD  If a branch predictor is mispredicted, the machine will access the I-cache to fetch the instructions.  If a branch is predicted correctly, the machine will access the L0-cache.  In a misprediction , the machine will start fetching the instructions from the correct address by accessing the I- cache.
  • 10. STATIC METHOD  If a ‘high confidence’ branch was predicted incorrectly, the I-cache is accessed for the subsequent basic blocks.  If more than n low confidence branches have been decoded in a row, the I-cache is accessed. Therefore the L0-cache will be bypassed when either of the two conditions are satisfied.  In any other case the machine will access the L0-cache.
  • 11. DYNAMIC CONFIDENCE ESTIMATION METHOD  It is a dynamic version of the static method.  The confidence of the I-cache is accessed if 1. A high confidence branch is mispredicted. 2. More than n successive ‘low confidence’ branches are encountered.  it is more accurate in characterizing a branch and, then, regulating the access of the L0-cache.
  • 12. RESTRICTIVE DYNAMIC CONFIDENCE ESTIMATION METHOD  Restrictive dynamic scheme is a more selective scheme in which only the really important basic blocks would be selected for the L0-cache.  The L0-cache is accessed only if a ‘high confidence’ branch is predicted correctly. The I-cache is accessed in any other case.  This method selects some of the most frequently executed basic blocks, yet it misses some others.
  • 13. Dynamic Distance Estimation Method  All n branches after a mispredicted branch are tagged as ‘low confidence’ otherwise as ‘high confidence’.  The basic blocks after a ‘low confidence’ branch are fetched from the L0-cache.  The net effect is that a branch misprediction causes a series of fetches from the I-cache.  A counter is used to measure the distance of a branch from the previous mispredicted branch.