The document discusses different levels of computer memory and cache memory. It describes four levels of memory:
1) Register - Stores data accepted by the CPU.
2) Cache memory - Faster memory that temporarily stores frequently accessed data from main memory.
3) Main memory - The memory the computer currently works on but data is lost when powered off.
4) Secondary memory - External memory that stores data permanently but is slower than main memory.
It then discusses cache memory in more detail, describing it as very high-speed memory that stores copies of frequently used data from main memory to reduce average access time. It explains the concepts of cache hits, misses, and hit ratio. Finally, it
COA Computer Organisation and Architecture COA Computer Organisation and Architecture COA Computer Organisation and Architecture COA Computer Organisation and Architecture COA Computer Organisation and Architecture COA Computer Organisation and Architecture COA Computer Organisation and Architecture COA Computer Organisation and Architecture COA Computer Organisation and Architecture COA Computer Organisation and ArchitectureCOA Computer Organisation and Architecture
COA Computer Organisation and Architecture COA Computer Organisation and Architecture COA Computer Organisation and Architecture COA Computer Organisation and Architecture COA Computer Organisation and Architecture COA Computer Organisation and Architecture COA Computer Organisation and Architecture COA Computer Organisation and Architecture COA Computer Organisation and Architecture COA Computer Organisation and ArchitectureCOA Computer Organisation and Architecture
Modern processors are faster than memory
So Processors may waste time for accessing memory
Its purpose is to make the main memory appear to the processor to be much faster than it actually is
Operating System
Topic Memory Management
for Btech/Bsc (C.S)/BCA...
Memory management is the functionality of an operating system which handles or manages primary memory. Memory management keeps track of each and every memory location either it is allocated to some process or it is free. It checks how much memory is to be allocated to processes. It decides which process will get memory at what time. It tracks whenever some memory gets freed or unallocated and correspondingly it updates the status.
Computer Architecture | Computer Fundamental and OrganizationSmit Luvani
Agenda :
Structure of Instruction
Description of Processor
Interconnection Unit
Processor to memory communication
RISC and CISC
All about how the computer interacts with memory and processor. how they connected and work.which device how works.
Modern processors are faster than memory
So Processors may waste time for accessing memory
Its purpose is to make the main memory appear to the processor to be much faster than it actually is
Operating System
Topic Memory Management
for Btech/Bsc (C.S)/BCA...
Memory management is the functionality of an operating system which handles or manages primary memory. Memory management keeps track of each and every memory location either it is allocated to some process or it is free. It checks how much memory is to be allocated to processes. It decides which process will get memory at what time. It tracks whenever some memory gets freed or unallocated and correspondingly it updates the status.
Computer Architecture | Computer Fundamental and OrganizationSmit Luvani
Agenda :
Structure of Instruction
Description of Processor
Interconnection Unit
Processor to memory communication
RISC and CISC
All about how the computer interacts with memory and processor. how they connected and work.which device how works.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
Cache Memory.pptx
1. Levels of Memory
• Level 1 or Register: It is a type of memory in which
data is stored and accepted that are immediately stored
in the CPU. The most commonly used register is
Accumulator, Program counter, Address Register, etc.
• Level 2 or Cache memory: It is the fastest memory
that has faster access time where data is temporarily
stored for faster access.
• Level 3 or Main Memory: It is the memory on which
the computer works currently. It is small in size and
once power is off data no longer stays in this memory.
• Level 4 or Secondary Memory: It is external memory
that is not as fast as the main memory but data stays
permanently in this memory.
4. Cache Memory
• Cache Memory is a special very high-speed
memory.
• The cache is a smaller and faster memory
that stores copies of the data from frequently
used main memory locations.
• There are various different independent
caches in a CPU, which store instructions
and data.
• The most important use of cache memory is
that it is used to reduce the average time to
access data from the main memory.
5. Characteristics of Cache Memory
• Cache memory is an extremely fast memory type
that acts as a buffer between RAM and the CPU.
• Cache Memory holds frequently requested data
and instructions so that they are immediately
available to the CPU when needed.
• Cache memory is costlier than main memory or
disk memory but more economical than CPU
registers.
• Cache Memory is used to speed up and
synchronize with a high-speed CPU.
7. Cache Performance
• When the processor needs to read or write a location in the
main memory, it first checks for a corresponding entry in the
cache.
• If the processor finds that the memory location is in the cache,
a Cache Hit has occurred and data is read from the cache.
• If the processor does not find the memory location in the
cache, a cache miss has occurred. For a cache miss, the
cache allocates a new entry and copies in data from the main
memory, then the request is fulfilled from the contents of the
cache.
• The performance of cache memory is frequently measured in
terms of a quantity called Hit ratio.
• Hit Ratio(H) = hit / (hit + miss) = no. of hits/total accesses Miss Ratio
= miss / (hit + miss) = no. of miss/total accesses = 1 - hit ratio(H)
8. Cache Mapping
• There are three different types of mapping
used for the purpose of cache memory
which is as follows:
• Direct Mapping
• Associative Mapping
• Set-Associative Mapping
9. 1. Direct Mapping
• The direct mapping technique is simple and inexpensive to
implement.
• When the CPU wants to access data from memory, it places
a address. The index field of CPU address is used to access
address.
• The tag field of CPU address is compared with the
associated tag in the word read from the cache.
• If the tag-bits of CPU address is matched with the tag-bits
of cache, then there is a hit and the required data word is
read from cache.
• If there is no match, then there is a miss and the required
data word is stored in main memory. It is then transferred
from main memory to cache memory with the new tag.
10. 1. Direct Mapping
• Associative memories are expensive compared to random-
access memories because of the added logic associated with
each cell.
• Direct mapping uses a random-access memory for the cache.
• The CPU address of 15 bits is divided into two fields.
• The nine least significant bits constitute the index field and the
remaining six bits form the tag field.
• The number of bits in the index field is equal to the number of
address bits required to access the cache memory.
• The n-bit memory address is divided into two fields:k bits for
the index field and n-k bits for the tag field.
• The direct mapping cache organization uses the n-bit address
to access the main memory and the k-bit index to access
cache.
13. 2. Associative Mapping
● An associative mapping usesan associative
memory.
● Thismemoryisbeing accessed usingits contents.
● Each line of cache memory will accommodate
the address (main memory) and the contentsof
that addressfrom the main memory.
● That is why this memory is also called Content
Addressable Memory(CAM). It allowseachblock
of main memoryto be stored in the cache.
14. • The fastest and most flexible cache organization uses an
associative memory.
• The associative memory stores both the address and
content of the memory word.
• This permits any location in cache to store any word from
main memory.
• A CPU address of 15 bits is placed in the arguement
register and the associative memory is searched for a
matching address.
• If the address is found ,the corresponding 12 bit data is
read and sent to the CPU.
• If no match occurs, the main memory is accessed for the
word.The address-data pair is then transferred to the
associative cache memory.
• If the cache is full,an address-data pair must be displaced
to make room for a pair that is needed and not presently in
the cache.
• Different replacement algorithms like FIFO is used for
this.
16. 3. Set Associative Mapping
● That is the easy control of the direct mapping
cache and the more flexible mapping of the fully
associative cache.
● In set associative mapping, each cache location
can have more than one pair of tag + data items.
● That is more than one pair of tag and data are
residing at the same location of cache memory. If
one cache location is holding two pair of tag + data
items, that is called 2-wayset associativemapping.
17. 3. Set Associative Mapping
• Set-associative mapping is an improvement over the direct mapping
organization in that each word of cache can store two or more words
of memory under the same index address.
• Each data word is stored together with its tag and the number of tag-
data items in one word of cache is said to form a set.
• An example of a set - associative cache organization for a set size
of two is shown.
• Each index address refers to two data words and their associated
tags.
• When the CPU generates memory request,the index value of the
address is used to access the cache.
• The tag field of the CPU address is then compared with both tags in
the cache to determine if a match occurs.
• The comparison logic is done by an associative search of the tags in
the set similar to an associative memory search:thus the name "set-
associative".