SlideShare a Scribd company logo
1 of 19
Cache
Memory
01
Amit Kundu
161-15-7149
MD.Khairul Alam Ovy
161-15-6979
Mariea Akter
161-15-6711
MD. Shakil Mahmud
152-15-5573
Group Members
02 03 04
PART 1
Amit Kundu 161-15-7149
Introduction
What is a Cache Memory ?
Implementation and history
• Local cache
• Replicated cache
• Distributed cache
• Remote cache
• Near cache
Cache Types
Part -2
Mapping Function (Direct Mapping)
Cache of 64k Byte
Cache block of 4 bytes
16MBytes main memory
24 bit address
Each block of main memory maps to only one cache line
Address is in two parts
1.identify unique word
2. specify one memory block
The MSBs are split into a cache line field r and a tag of s-r (most
significant)
Direct Mapping
24 bit address
1. 2 bit word identifier (4 byte
block)
2. 22 bit block identifier
{8 bit tag (=22-14)
14 bit slot or line}
Direct Mapping Address Structure
1. Cache line
2. Main Memory blocks held
1. 0
2. 0, m, 2m, 3m…2s-m
1. 1
2. 1,m+1, 2m+1…2s-m+1
…
1. m-1
2. m-1, 2m-1,3m-1…2s-1
Direct Mapping from Cache to Main Memory
Simple
Inexpensive
Fixed location for given block
If a program accesses 2 blocks that map to the same line repeatedly, cache misses are very high
Summary
PART 4
161-15-6711
Mariea Akter
Writing into Cache
• When memory write operations are performed , CPU first writes into
the cache memory. These modifications made by CPU during a write
operations , on the data saved in cache , need to be written back to
main memory or to auxiliary memory.
• These two popular cache write policies are:
Write-through
Write back
Write-Through
• In a write-through cache , the main memory is updated each time
the CPU writes into cache.
• The advantage of the write through cache is that the main memory
always contains the same data as the cache contains.
• This characteristic is desirable in a system which uses direct memory
access scheme of data transfer. The I/O devices communicating
receive the most recent data.
• In a write back scheme , only the cache memory is updated during
a write operation.
• The updated locations in the cache memory are marked by a flag so
that later on , when the letter is removed from the cache it is copied
into the main memory.
• The words are removed from the cache time to time to make room
for a new block of words.
Write-Back
Unified vs Split Caches
• Unified Cache: Data and instructions are cached in the same cache
• Split Cache: Separate caches for data and instructions
• Advantages of unified cache:
-Higher hit rate
-Balances load of instruction and data fetch
-Only one cache to design & implement
• Advantages of split cache:
-Eliminates cache contention between instruction
-fetch/decode unit and execution unit
-Important in pipelining
YOU
THANK

More Related Content

What's hot

Project Presentation Final
Project Presentation FinalProject Presentation Final
Project Presentation Final
Dhritiman Halder
 

What's hot (20)

Cache memory ...
Cache memory ...Cache memory ...
Cache memory ...
 
Cache memory
Cache memoryCache memory
Cache memory
 
Cache memory
Cache memoryCache memory
Cache memory
 
Cache memory
Cache memoryCache memory
Cache memory
 
Cache memory by Foysal
Cache memory by FoysalCache memory by Foysal
Cache memory by Foysal
 
Cache memory
Cache memoryCache memory
Cache memory
 
Cache Memory
Cache MemoryCache Memory
Cache Memory
 
Cache memory ppt
Cache memory ppt  Cache memory ppt
Cache memory ppt
 
Cache memory and virtual memory
Cache memory and virtual memoryCache memory and virtual memory
Cache memory and virtual memory
 
Caches microP
Caches microPCaches microP
Caches microP
 
Cache memory
Cache memoryCache memory
Cache memory
 
Project Presentation Final
Project Presentation FinalProject Presentation Final
Project Presentation Final
 
Cache Memory
Cache MemoryCache Memory
Cache Memory
 
Cache memory and cache
Cache memory and cacheCache memory and cache
Cache memory and cache
 
Cache memory
Cache memoryCache memory
Cache memory
 
Computer architecture cache memory
Computer architecture cache memoryComputer architecture cache memory
Computer architecture cache memory
 
cache memory
cache memorycache memory
cache memory
 
04 cache memory.ppt 1
04 cache memory.ppt 104 cache memory.ppt 1
04 cache memory.ppt 1
 
Cache
CacheCache
Cache
 
04 cache memory
04 cache memory04 cache memory
04 cache memory
 

Similar to Cache Memory

Ct213 memory subsystem
Ct213 memory subsystemCt213 memory subsystem
Ct213 memory subsystem
Sandeep Kamath
 
total cache memory is here.please read this for better knowledge
total cache memory is here.please read this for better knowledgetotal cache memory is here.please read this for better knowledge
total cache memory is here.please read this for better knowledge
JoysreeNandy
 
coa-Unit5-ppt1 (1).pptx
coa-Unit5-ppt1 (1).pptxcoa-Unit5-ppt1 (1).pptx
coa-Unit5-ppt1 (1).pptx
Ruhul Amin
 

Similar to Cache Memory (20)

Cache Memory for Computer Architecture.ppt
Cache Memory for Computer Architecture.pptCache Memory for Computer Architecture.ppt
Cache Memory for Computer Architecture.ppt
 
Memory (Computer Organization)
Memory (Computer Organization)Memory (Computer Organization)
Memory (Computer Organization)
 
Ct213 memory subsystem
Ct213 memory subsystemCt213 memory subsystem
Ct213 memory subsystem
 
04 cache memory
04 cache memory04 cache memory
04 cache memory
 
cache memory
cache memorycache memory
cache memory
 
04 cache memory
04 cache memory04 cache memory
04 cache memory
 
cache memory introduction, level, function
cache memory introduction, level, functioncache memory introduction, level, function
cache memory introduction, level, function
 
cache memory.ppt
cache memory.pptcache memory.ppt
cache memory.ppt
 
cache memory.ppt
cache memory.pptcache memory.ppt
cache memory.ppt
 
Computer System Architecture Lecture Note 8.2 Cache Memory
Computer System Architecture Lecture Note 8.2 Cache MemoryComputer System Architecture Lecture Note 8.2 Cache Memory
Computer System Architecture Lecture Note 8.2 Cache Memory
 
Computer organization memory hierarchy
Computer organization memory hierarchyComputer organization memory hierarchy
Computer organization memory hierarchy
 
Cache Memory.ppt
Cache Memory.pptCache Memory.ppt
Cache Memory.ppt
 
04_Cache Memory.ppt
04_Cache Memory.ppt04_Cache Memory.ppt
04_Cache Memory.ppt
 
04_Cache Memory.ppt
04_Cache Memory.ppt04_Cache Memory.ppt
04_Cache Memory.ppt
 
total cache memory is here.please read this for better knowledge
total cache memory is here.please read this for better knowledgetotal cache memory is here.please read this for better knowledge
total cache memory is here.please read this for better knowledge
 
Memory Hierarchy PPT of Computer Organization
Memory Hierarchy PPT of Computer OrganizationMemory Hierarchy PPT of Computer Organization
Memory Hierarchy PPT of Computer Organization
 
Computer System Architecture Lecture Note 8.1 primary Memory
Computer System Architecture Lecture Note 8.1 primary MemoryComputer System Architecture Lecture Note 8.1 primary Memory
Computer System Architecture Lecture Note 8.1 primary Memory
 
CAO-Unit-III.pptx
CAO-Unit-III.pptxCAO-Unit-III.pptx
CAO-Unit-III.pptx
 
Chache memory ( chapter number 4 ) by William stalling
Chache memory ( chapter number 4 ) by William stallingChache memory ( chapter number 4 ) by William stalling
Chache memory ( chapter number 4 ) by William stalling
 
coa-Unit5-ppt1 (1).pptx
coa-Unit5-ppt1 (1).pptxcoa-Unit5-ppt1 (1).pptx
coa-Unit5-ppt1 (1).pptx
 

More from Amit Kundu

More from Amit Kundu (17)

Covid Guide Line Bangladesh
Covid Guide Line BangladeshCovid Guide Line Bangladesh
Covid Guide Line Bangladesh
 
Blockchain
BlockchainBlockchain
Blockchain
 
Smart Home Automation And security System
Smart Home Automation And security SystemSmart Home Automation And security System
Smart Home Automation And security System
 
Automated Tools For System Analysis and Design
Automated Tools For System Analysis and DesignAutomated Tools For System Analysis and Design
Automated Tools For System Analysis and Design
 
Android Operating System
Android Operating SystemAndroid Operating System
Android Operating System
 
Database project IDEA
Database project IDEADatabase project IDEA
Database project IDEA
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
 
Unguided Media
Unguided  MediaUnguided  Media
Unguided Media
 
Innovative Business Idea
Innovative Business IdeaInnovative Business Idea
Innovative Business Idea
 
Intel core i7
Intel core i7Intel core i7
Intel core i7
 
DFS algorithm
DFS algorithmDFS algorithm
DFS algorithm
 
Laplace transform
Laplace transformLaplace transform
Laplace transform
 
Presentation on Rectifier
Presentation on RectifierPresentation on Rectifier
Presentation on Rectifier
 
Presentation on Heap Sort
Presentation on Heap Sort Presentation on Heap Sort
Presentation on Heap Sort
 
Bfs algorithm & its application
Bfs algorithm & its applicationBfs algorithm & its application
Bfs algorithm & its application
 
Presentation on chikunguny
Presentation on chikungunyPresentation on chikunguny
Presentation on chikunguny
 
A presentation on social networking sites
A presentation on social networking sitesA presentation on social networking sites
A presentation on social networking sites
 

Recently uploaded

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 

Recently uploaded (20)

HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 

Cache Memory

  • 2. 01 Amit Kundu 161-15-7149 MD.Khairul Alam Ovy 161-15-6979 Mariea Akter 161-15-6711 MD. Shakil Mahmud 152-15-5573 Group Members 02 03 04
  • 3. PART 1 Amit Kundu 161-15-7149 Introduction
  • 4. What is a Cache Memory ?
  • 6. • Local cache • Replicated cache • Distributed cache • Remote cache • Near cache Cache Types
  • 7. Part -2 Mapping Function (Direct Mapping)
  • 8. Cache of 64k Byte Cache block of 4 bytes 16MBytes main memory 24 bit address
  • 9. Each block of main memory maps to only one cache line Address is in two parts 1.identify unique word 2. specify one memory block The MSBs are split into a cache line field r and a tag of s-r (most significant) Direct Mapping
  • 10. 24 bit address 1. 2 bit word identifier (4 byte block) 2. 22 bit block identifier {8 bit tag (=22-14) 14 bit slot or line} Direct Mapping Address Structure
  • 11. 1. Cache line 2. Main Memory blocks held 1. 0 2. 0, m, 2m, 3m…2s-m 1. 1 2. 1,m+1, 2m+1…2s-m+1 … 1. m-1 2. m-1, 2m-1,3m-1…2s-1
  • 12. Direct Mapping from Cache to Main Memory
  • 13. Simple Inexpensive Fixed location for given block If a program accesses 2 blocks that map to the same line repeatedly, cache misses are very high Summary
  • 15. Writing into Cache • When memory write operations are performed , CPU first writes into the cache memory. These modifications made by CPU during a write operations , on the data saved in cache , need to be written back to main memory or to auxiliary memory. • These two popular cache write policies are: Write-through Write back
  • 16. Write-Through • In a write-through cache , the main memory is updated each time the CPU writes into cache. • The advantage of the write through cache is that the main memory always contains the same data as the cache contains. • This characteristic is desirable in a system which uses direct memory access scheme of data transfer. The I/O devices communicating receive the most recent data.
  • 17. • In a write back scheme , only the cache memory is updated during a write operation. • The updated locations in the cache memory are marked by a flag so that later on , when the letter is removed from the cache it is copied into the main memory. • The words are removed from the cache time to time to make room for a new block of words. Write-Back
  • 18. Unified vs Split Caches • Unified Cache: Data and instructions are cached in the same cache • Split Cache: Separate caches for data and instructions • Advantages of unified cache: -Higher hit rate -Balances load of instruction and data fetch -Only one cache to design & implement • Advantages of split cache: -Eliminates cache contention between instruction -fetch/decode unit and execution unit -Important in pipelining