SlideShare a Scribd company logo
1 of 14
A
    Seminar Presentation On


“Dynamic Cache Management
        Technique”

                    Presented By:
                    Ajay Singh Lamba
                      (IT , Final Year)
Content
 Introduction to cache memory
 How stored data is transferred to the CPU
 Mapping functions
 Dynamic Cache Management
 Dynamic Techniques For L0-cache
 Management
Introduction to cache memory

 A cache, in computer terms, is a place to store
  information that's faster than the place where the
  information is usually stored
 Cache memory is fast memory that is used to hold the
  most recently accessed data
 Only frequently accessed data will stay in cache, which
  allows the CPU to access it more quickly
 it is placed in the processor chip, which allows it to 'talk'
  with the processor direct at a much higher speed than
  standard RAM.
How stored data is transferred to the
             CPU ??
Mapping functions

    Since M>>C, how are blocks mapped to specific lines
    in cache.

1. Direct mapping
2. Associative mapping
3. Set associative mapping
Dynamic Cache Management

 It’s resizing strategy of the cache memory

 Dynamic caching allows for dynamic resizing both
  across and within applications execution.

 The basic idea is that only the most frequently executed
  portion of the code should be stored in the L0-cache
POWER TRENDS FOR CURRENT
   MICROPROCESSORS
DYNAMIC TECHNIQUES FOR L0-CACHE
          MANAGEMENT

1. Simple Method.

2. Static Method.

3. Dynamic Confidence Estimation Method.

4. Restrictive Dynamic Confidence Estimation Method.

5. Dynamic Distance Estimation Method.
SIMPLE METHOD

 If a branch predictor is mispredicted, the machine will
  access the I-cache to fetch the instructions.

 If a branch is predicted correctly, the machine will access
  the L0-cache.

 In a misprediction , the machine will start fetching the
  instructions from the correct address by accessing the I-
  cache.
STATIC METHOD

    If a ‘high confidence’ branch was predicted incorrectly,
    the I-cache is accessed for the subsequent basic blocks.

 If more than n low confidence branches have been
    decoded in a row, the I-cache is accessed. Therefore the
    L0-cache will be bypassed when either of the two
    conditions are satisfied.

 In any other case the machine will access the L0-cache.
DYNAMIC CONFIDENCE ESTIMATION
               METHOD
   It is a dynamic version of the static method.
   The confidence of the I-cache is accessed if

    1. A high confidence branch is mispredicted.
    2. More than n successive ‘low confidence’ branches
     are encountered.

   it is more accurate in characterizing a branch and,
    then, regulating the access of the L0-cache.
RESTRICTIVE DYNAMIC CONFIDENCE
          ESTIMATION METHOD
    Restrictive dynamic scheme is a more selective scheme
    in which only the really important basic blocks would be
    selected for the L0-cache.

 The L0-cache is accessed only if a ‘high confidence’
    branch is predicted correctly. The I-cache is accessed in
    any other case.

 This method selects some of the most frequently
    executed basic blocks, yet it misses some others.
Dynamic Distance Estimation Method

 All n branches after a mispredicted branch are tagged as
  ‘low confidence’ otherwise as ‘high confidence’.
 The basic blocks after a ‘low confidence’ branch are
  fetched from the L0-cache.
 The net effect is that a branch misprediction causes a
  series of fetches from the I-cache.

 A counter is used to measure the distance of a branch
  from the previous mispredicted branch.
Thank you

Any Query ??

More Related Content

Similar to Dynamic cache management

Similar to Dynamic cache management (20)

Oversimplified CA
Oversimplified CAOversimplified CA
Oversimplified CA
 
Cache memory
Cache memoryCache memory
Cache memory
 
Cache memory and cache
Cache memory and cacheCache memory and cache
Cache memory and cache
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
Cache Memory.pptx
Cache Memory.pptxCache Memory.pptx
Cache Memory.pptx
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
 
Big data cloud architecture
Big data cloud architectureBig data cloud architecture
Big data cloud architecture
 
Cache memory presentation
Cache memory presentationCache memory presentation
Cache memory presentation
 
Cache Memory- JMD.pptx
Cache Memory- JMD.pptxCache Memory- JMD.pptx
Cache Memory- JMD.pptx
 
Automating the Hunt for Non-Obvious Sources of Latency Spreads
Automating the Hunt for Non-Obvious Sources of Latency SpreadsAutomating the Hunt for Non-Obvious Sources of Latency Spreads
Automating the Hunt for Non-Obvious Sources of Latency Spreads
 
Cache memory
Cache memoryCache memory
Cache memory
 
[Hanoi-August 13] Tech Talk on Caching Solutions
[Hanoi-August 13] Tech Talk on Caching Solutions[Hanoi-August 13] Tech Talk on Caching Solutions
[Hanoi-August 13] Tech Talk on Caching Solutions
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
 
JPJ1431 top-k Query Result Completeness Verification
JPJ1431   top-k Query Result Completeness VerificationJPJ1431   top-k Query Result Completeness Verification
JPJ1431 top-k Query Result Completeness Verification
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
 
Privacy and integrity-preserving range queries in sensor networks
Privacy  and integrity-preserving range queries in sensor networksPrivacy  and integrity-preserving range queries in sensor networks
Privacy and integrity-preserving range queries in sensor networks
 
Privacy and integrity-preserving range queries in sensor networks
Privacy  and integrity-preserving range queries in sensor networksPrivacy  and integrity-preserving range queries in sensor networks
Privacy and integrity-preserving range queries in sensor networks
 
Modern processors
Modern processorsModern processors
Modern processors
 

Recently uploaded

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

Dynamic cache management

  • 1. A Seminar Presentation On “Dynamic Cache Management Technique” Presented By: Ajay Singh Lamba (IT , Final Year)
  • 2. Content  Introduction to cache memory  How stored data is transferred to the CPU  Mapping functions  Dynamic Cache Management  Dynamic Techniques For L0-cache Management
  • 3. Introduction to cache memory  A cache, in computer terms, is a place to store information that's faster than the place where the information is usually stored  Cache memory is fast memory that is used to hold the most recently accessed data  Only frequently accessed data will stay in cache, which allows the CPU to access it more quickly  it is placed in the processor chip, which allows it to 'talk' with the processor direct at a much higher speed than standard RAM.
  • 4. How stored data is transferred to the CPU ??
  • 5. Mapping functions  Since M>>C, how are blocks mapped to specific lines in cache. 1. Direct mapping 2. Associative mapping 3. Set associative mapping
  • 6. Dynamic Cache Management  It’s resizing strategy of the cache memory  Dynamic caching allows for dynamic resizing both across and within applications execution.  The basic idea is that only the most frequently executed portion of the code should be stored in the L0-cache
  • 7. POWER TRENDS FOR CURRENT MICROPROCESSORS
  • 8. DYNAMIC TECHNIQUES FOR L0-CACHE MANAGEMENT 1. Simple Method. 2. Static Method. 3. Dynamic Confidence Estimation Method. 4. Restrictive Dynamic Confidence Estimation Method. 5. Dynamic Distance Estimation Method.
  • 9. SIMPLE METHOD  If a branch predictor is mispredicted, the machine will access the I-cache to fetch the instructions.  If a branch is predicted correctly, the machine will access the L0-cache.  In a misprediction , the machine will start fetching the instructions from the correct address by accessing the I- cache.
  • 10. STATIC METHOD  If a ‘high confidence’ branch was predicted incorrectly, the I-cache is accessed for the subsequent basic blocks.  If more than n low confidence branches have been decoded in a row, the I-cache is accessed. Therefore the L0-cache will be bypassed when either of the two conditions are satisfied.  In any other case the machine will access the L0-cache.
  • 11. DYNAMIC CONFIDENCE ESTIMATION METHOD  It is a dynamic version of the static method.  The confidence of the I-cache is accessed if 1. A high confidence branch is mispredicted. 2. More than n successive ‘low confidence’ branches are encountered.  it is more accurate in characterizing a branch and, then, regulating the access of the L0-cache.
  • 12. RESTRICTIVE DYNAMIC CONFIDENCE ESTIMATION METHOD  Restrictive dynamic scheme is a more selective scheme in which only the really important basic blocks would be selected for the L0-cache.  The L0-cache is accessed only if a ‘high confidence’ branch is predicted correctly. The I-cache is accessed in any other case.  This method selects some of the most frequently executed basic blocks, yet it misses some others.
  • 13. Dynamic Distance Estimation Method  All n branches after a mispredicted branch are tagged as ‘low confidence’ otherwise as ‘high confidence’.  The basic blocks after a ‘low confidence’ branch are fetched from the L0-cache.  The net effect is that a branch misprediction causes a series of fetches from the I-cache.  A counter is used to measure the distance of a branch from the previous mispredicted branch.