SlideShare a Scribd company logo
1 of 35
Download to read offline
A
***
***
&
***
O
***
C
COMPUTER ORGANIZATION AND ARCHITECTURE
▪The total memory of a computer can be visualized by hierarchy of components.
▪The memory hierarchy consists all of the storage devices available in a computer system from the slow memory to faster
memory.
▪Memory hierarchy is essential to achieving high speed, large memory and low cost.
a)Auxiliary Memory:
✓Auxiliary memory is known as the lowest-cost, highest-capacity and slowest-access storage in a computer system.
✓Auxiliary memory provides storage for programs and data that are kept for long-term storage or when not in immediate
use.
✓ The most common examples of auxiliary memories are magnetic tapes and magnetic disks.
b)Main Memory:
✓The main memory in a computer system is often referred to as Random Access Memory (RAM).
✓This memory unit communicates directly with the CPU and with auxiliary memory devices through an I/O processor.
✓The programs that are not currently required in the main memory are transferred into auxiliary memory to provide
space for currently used programs and data.
c)I/O Processor:
✓The primary function of an I/O Processor is to manage the data transfers between auxiliary memories and the main
memory.
d)Cache Memory:
✓The data or contents of the main memory that are used frequently by CPU are stored in the cache memory so that the
processor can easily access that data in a shorter time.
✓ Whenever the CPU requires accessing memory, it first checks the required data into the cache memory.
✓ If the data is found in the cache memory, it is read from the cache memory.
✓Otherwise, the CPU moves onto the main memory for the required data.
Memory Access Methods:
▪Random Access: Main memories are random access memories, in which each memory location has a unique address.
Using this unique address any memory location can be reached in the same amount of time in any order.
▪Sequential Access: This methods allows memory access in a sequence or in order.
▪Direct Access: In this mode, information is stored in tracks, with each track having a separate read/write head.
Main Memory:
▪The memory unit that communicates directly within the CPU, Auxillary memory and Cache memory, is called main
memory.
▪ It is the central storage unit of the computer system.
▪ It is a large and fast memory used to store data during computer operations.
RAM: Random Access Memory
i. DRAM: Dynamic RAM, is made of capacitors and transistors, and must be refreshed every 10~100 ms. It is slower
and cheaper than SRAM.
ii. SRAM: Static RAM, has a six transistor circuit in each cell and retains data, until powered off.
iii. NVRAM: Non-Volatile RAM, retains its data, even when turned off.
Example: Flash memory.
ROM: Read Only Memory,
▪It is non-volatile and is more like a permanent storage for information.
▪ It also stores the bootstrap loader program, to load and start the operating system when computer is turned on.
▪commonly used ROMs are:
i. PROM(Programmable ROM)
ii. EPROM(Erasable PROM)
iii. EEPROM(Electrically Erasable PROM)
Memory Addressing:
▪The table, called a memory address map, is a pictorial representation of assigned address space for each chip in the
system.
▪Assume that a computer system needs 512 bytes of RAM and 512 bytes of ROM.
▪The component column specifies whether a RAM or a ROM chip used.
▪ The hexadecimal address column assigns a range of hexadecimal equivalent addresses for each chip.
▪Although there 16 lines in the address bus, the table shows only 10 lines because the other 6 not used in this example and
assumed to be zero.
▪The small x’s under the address bus lines designate those lines that must connect to the address inputs in each chip.
▪The 4-RAM chips have 128 bytes and need seven address lines.
▪The ROM chip has 512 bytes and needs 9 address lines.
▪The x’s always assigned to the low-order bus lines: lines 1 through 7 for the RAM. And lines 1 to 9 for the ROM.
▪The distinction between a RAM and ROM address done with another bus line.
▪ Here we choose line 10 for this purpose. When line 10 is 0, the CPU selects a RAM, and when this line equal to 1, it selects
the ROM.
▪A memory unit accessed by content is called an associative memory or content addressable memory (CAM).
▪This type of memory is accessed simultaneously and in parallel on the basis of data content rather than by specific address.
▪When a word is written in an associative memory, no address is given. The memory is capable of finding an empty unused
location to store the word.
▪When a word is to be read from an associative memory, the content of the word, or part of the word, is specified. The memory
locates all words which match the specified content and marks them for reading.
▪The associative memory is uniquely suited to do parallel searches by data association.
▪An associative memory is more expensive than a random access memory because each cell must have storage capability as
well as logic circuits for matching its content with an external argument.
▪Associative memories are used in applications where the search time is very critical and must be very short.
▪The block diagram of an associative memory consists of a memory array and logic for m words with n bits per word.
▪The argument register A and key register K each have n bits, one for each bit of a word.
▪The match register M has m bits, one for each memory word.
▪Each word in memory is compared in parallel with the content of the argument register.
▪The words that match the bits of the argument register set a corresponding bit in the match register.
▪After the matching process, those bits in the match register that have been set indicate the fact that their corresponding
words have been matched.
▪The key register used for choosing a particular field or key in the word.
▪If the key register contains all 1's the entire argument is compared with each memory word
▪Otherwise, only those bits in the argument that have 1's in their corresponding position of the key register are compared.
Example:
▪ Suppose that the argument register A and the key register K have the bit configuration shown below. Only the three leftmost
bits of A are compared with memory words because K has 1's in these positions.
▪Word 2 matches the unmasked argument field because the three leftmost bits of the argument and the word are equal.
▪The relation between the memory array and external registers in an associative memory is:
▪The match logic for each word can be derived from the comparison algorithm for two binary numbers.
▪First, we neglect the key bits and compare the argument in A with the bits stored in the cells of the words.
▪ Word i is equal to the argument in A if Aj = Fij for j = 1, 2, ... , n. Two bits are equal if they are both 1 or both 0.
▪The equality of two bits can be expressed logically by the Boolean function
xj=AjFij+A′jF′ij where xj = 1 if the pair of bits in position j are equal; otherwise, xj = 0.
▪For a word i to be equal to the argument in A we must have all xj variables equal to 1.
▪This is the condition for setting the corresponding match bit Mi to 1.
▪The Boolean function for this condition is
Mi=x1x2x3...xn and constitutes the AND operation of all pairs of matched bits in a word.
▪Cache Memory is a special very high-speed memory.
▪ It is used to speed up and synchronizing with high-speed CPU.
▪Cache memory is costlier than main memory or disk memory but economical than CPU registers.
▪Cache memory is an extremely fast memory type that acts as a buffer between RAM and the CPU.
▪It holds frequently requested data and instructions so that they are immediately available to the CPU when needed.
▪Cache memory is used to reduce the average time to access data from the Main memory.
▪The performance of the cache memory is frequently measured in terms of a quantity called hit ratio.
▪When the CPU refers to memory and finds the word in cache, it is said to produce a hit.
▪If the word is not found in the cache, it is in main memory and it counts as a miss.
▪The transformation of data from main memory to cache memory is called mapping.
▪ There are 3 main types of mapping:
▪Direct Mapping
▪Associative Mapping
▪Set Associative Mapping
i.Direct Mapping:
▪In direct mapping, a particular block of main memory can map only to a particular line of the cache.
▪The line number of cache to which a particular block can map is given by:
Cache line number= ( Main Memory Block Address ) Modulo (Number of lines in Cache)
▪Consider cache memory is divided into ‘n’ number of lines.
▪Then, block ‘j’ of main memory can map to line number (j mod n) only of the cache.
i.Direct Mapping:
▪The CPU address of 15 bits is divided into 2 fields.
▪In this the 9 least significant bits constitute the index field and the remaining 6 bits constitute the tag field.
▪ The number of bits in index field is equal to the number of address bits required to access cache memory.
ii.Associative Mapping:
▪In the associative mapping , any block of main memory can probably consist of any cache block position.
▪Here, each line of cache will accommodate address and the content of the address from the main memory.
▪It allows each block of main memory to be stored in cache.
▪The address value of 15 bits is shown as a five-digit octal number and its corresponding 12-bit word is shown as a
four-digit octal number.
▪A CPU address of 15 bits is placed in the argument register and the associative memory is searched for a matching
address.
▪If the address is found, the corresponding 12-bit data is read and sent to the CPU.
▪If no match occurs, the main memory is accessed for the word.
▪This method of searching a cache appears like each line of the cache has its compare circuitry, which can quickly
analyze whether or not the block is contained at that line.
▪With all of the lines performing this comparison process in parallel, the correct line is identified quickly.
ii.Associative Mapping:
▪If the cache is full, an address-data pair must be displaced to make room for a new pair.
▪The decision as to what pair is replaced is determined from the replacement algorithm that the designer chooses for the
cache.
▪Ex: round-robin order ,FIFO
iii.Set Associative Mapping:
▪The disadvantage of direct mapping is that two words with the same index in their address but with different tag values
cannot reside in cache memory at the same time.
▪A third type of cache organization, called set-associative mapping, is an improvement over the direct mapping
organization in that each word of cache can store two or more words of memory under the same index address.
▪Each data word is stored together with its tag and the number of tag-data items in one word of cache is said to form a
set.
▪An example of a set-associative cache organization for a set size of two.
▪Each index address refers to two data words and their associated tags.
▪In general, a set-associative cache of set size k will accommodate k words of main memory in each word of cache.
iii.Set Associative Mapping:
iii.Set Associative Mapping:
▪Virtual memory is used to give programmers the illusion that they have a very large memory at their disposal, even
though the computer actually has a relatively small main memory.
▪A virtual memory system provides a mechanism for translating program-generated addresses into main memory
address. This is done dynamically, while programs are being executed in the CPU.
▪The translation or mapping is handled automatically by the hardware by means of a mapping table.
▪An address used by a programmer will be called a virtual address, and the set of such addresses the address
space.
▪An address in main memory is called a location or physical address, and the set of such locations is called the
memory space.
▪In most computers the address and memory spaces are identical.
▪Computers with virtual memory has more address space than the memory space.
▪Suppose that program-1 is currently being executed in the CPU.
Program-1 and a portion of its data are moved from auxiliary memory
into main memory.
▪Portions of programs and data need not be in contiguous locations in
memory since information is being moved in and out, and empty
spaces may be available in scattered locations in memory.
▪In our example, the address field of an instruction code will consist of
20 bits but physical memory addresses must be specified with only 15
bits.
▪Thus CPU will reference instructions and data with a 20-bit address.
▪A table is needed, to map a virtual address of 20 bits to a physical address of 15 bits.
▪ The mapping is a dynamic operation.
▪The mapping table may be stored in a separate memory or in main memory.
▪The table implementation is easy, if the information in the address space
and the memory space are each divided into groups of fixed size.
▪The main memory is broken down into groups of equal size called
blocks.
▪The address space is broken down into groups of equal size called
pages.
▪Consider a computer with an address space of 8K and a memory space
of 4K.
▪If we split each into groups of 1K words we obtain 8-pages and 4-
blocks.
▪The term "page frame" is sometimes used to denote a block.
▪At any given time, up to four pages of address space may reside in main
memory in any one of the four blocks.
▪Each virtual address is considered to be represented by two numbers:
- page number address
- line within the page
▪In a computer with 2p words per page, p bits are used to specify a line
address and the remaining high-order bits of the virtual address specify the
page number. In the example virtual address has 13 bits.
▪Since each page consists of 210 = 1024 words, the higher order three bits of a
virtual address will specify one of the eight pages and the low-order 10 bits
give the line address within the page.
▪Note that the line address in address space and memory space is the same;
the only mapping required is from a page number to a block number.
▪The organization of the memory mapping table in a paged system is:
▪The memory-page table consists of eight words, one for each page.
▪The address in the page table denotes the page number and the content of the word gives the block number
where that page is stored in main memory.
▪The table shows that pages 1, 2, 5, and 6 are now available in main memory in blocks 3, 0, 1, and 2,
respectively.
▪A presence bit in each location indicates whether the page has been transferred from auxiliary memory into
main memory.
▪A 0 in the presence bit indicates that this page is not available in main memory.
▪The CPU references a word in memory with a virtual address of 13 bits. The three high-order bits of the virtual
address specify a page number and also an address for the memory-page table.
▪If the presence bit is a 1, the block number thus read is transferred to the two high-order bits of the main memory
address register.
▪If the presence bit is 0, the content does not reside in main memory. Operating system is then fetch the required
page from auxiliary memory and place it into main memory.
▪If the main memory is full, a new page cannot be stored. Therefore, we have to remove a page from a main
memory to store the new page.
▪ The decision of removing specific pages from main memory is determined by the replacement algorithm.
▪There are two common replacement algorithms used are :
➢ First-In-First-Out (FIFO)
➢ Least Recently Used (LRU)
a)FIFO:
▪The FIFO algorithm replace the page that has been in memory for the highest time.
▪The FIFO replacement policy has the benefit of being simple to execute.
▪ It has the drawback that under specific circumstances pages are removed and loaded from memory too
frequently.
b)LRU:
▪The LRU algorithm can be executed by maintaining a counter with each page that is in the main memory.
▪When a page is accessed, its counter is set to zero.
▪After particular intervals of time, the counters related to all pages directly in memory are incremented by 1.
▪The least recently used page is the page with the largest count.
▪The counters denotes the age, that is, how long ago the page have been accessed.
H A
N
‘Q’
T

More Related Content

Similar to COA

IS 139 Lecture 7
IS 139 Lecture 7IS 139 Lecture 7
IS 139 Lecture 7wajanga
 
Organisation of cache memory
Organisation  of cache memoryOrganisation  of cache memory
Organisation of cache memoryKomalBhat6
 
cache memory and types of cache memory,
cache memory  and types of cache memory,cache memory  and types of cache memory,
cache memory and types of cache memory,ashima967262
 
Cache memoy designed by Mohd Tariq
Cache memoy designed by Mohd TariqCache memoy designed by Mohd Tariq
Cache memoy designed by Mohd TariqMohd Tariq
 
Computer architecture for HNDIT
Computer architecture for HNDITComputer architecture for HNDIT
Computer architecture for HNDITtjunicornfx
 
coa-Unit5-ppt1 (1).pptx
coa-Unit5-ppt1 (1).pptxcoa-Unit5-ppt1 (1).pptx
coa-Unit5-ppt1 (1).pptxRuhul Amin
 
Presentation2 (1).pp text book for students
Presentation2 (1).pp text book for studentsPresentation2 (1).pp text book for students
Presentation2 (1).pp text book for studentsaddokenneth58
 
Chapter5 the memory-system-jntuworld
Chapter5 the memory-system-jntuworldChapter5 the memory-system-jntuworld
Chapter5 the memory-system-jntuworldPraveen Kumar
 
901320_Main Memory.ppt
901320_Main Memory.ppt901320_Main Memory.ppt
901320_Main Memory.pptChandinialla1
 
What is Cache and how it works
What is Cache and how it worksWhat is Cache and how it works
What is Cache and how it worksTabraiz Yaseen
 
CS304PC:Computer Organization and Architecture Session 29 Memory organization...
CS304PC:Computer Organization and Architecture Session 29 Memory organization...CS304PC:Computer Organization and Architecture Session 29 Memory organization...
CS304PC:Computer Organization and Architecture Session 29 Memory organization...Asst.prof M.Gokilavani
 
CPU Caching Concepts
CPU Caching ConceptsCPU Caching Concepts
CPU Caching ConceptsAbhijit K Rao
 
Lec 1 digital electroinics - memory array, write read operations
Lec 1   digital electroinics - memory array, write read operationsLec 1   digital electroinics - memory array, write read operations
Lec 1 digital electroinics - memory array, write read operationspriyankatabhane
 
Computer organization memory
Computer organization memoryComputer organization memory
Computer organization memoryDeepak John
 
DIGITAL DESIGNS SLIDES 7 ENGINEERING 2ND YEAR
DIGITAL DESIGNS SLIDES 7 ENGINEERING  2ND YEARDIGITAL DESIGNS SLIDES 7 ENGINEERING  2ND YEAR
DIGITAL DESIGNS SLIDES 7 ENGINEERING 2ND YEARkasheen2803
 

Similar to COA (20)

IS 139 Lecture 7
IS 139 Lecture 7IS 139 Lecture 7
IS 139 Lecture 7
 
Organisation of cache memory
Organisation  of cache memoryOrganisation  of cache memory
Organisation of cache memory
 
cache memory and types of cache memory,
cache memory  and types of cache memory,cache memory  and types of cache memory,
cache memory and types of cache memory,
 
Cache memoy designed by Mohd Tariq
Cache memoy designed by Mohd TariqCache memoy designed by Mohd Tariq
Cache memoy designed by Mohd Tariq
 
Computer architecture for HNDIT
Computer architecture for HNDITComputer architecture for HNDIT
Computer architecture for HNDIT
 
coa-Unit5-ppt1 (1).pptx
coa-Unit5-ppt1 (1).pptxcoa-Unit5-ppt1 (1).pptx
coa-Unit5-ppt1 (1).pptx
 
Presentation2 (1).pp text book for students
Presentation2 (1).pp text book for studentsPresentation2 (1).pp text book for students
Presentation2 (1).pp text book for students
 
Chapter5 the memory-system-jntuworld
Chapter5 the memory-system-jntuworldChapter5 the memory-system-jntuworld
Chapter5 the memory-system-jntuworld
 
901320_Main Memory.ppt
901320_Main Memory.ppt901320_Main Memory.ppt
901320_Main Memory.ppt
 
What is Cache and how it works
What is Cache and how it worksWhat is Cache and how it works
What is Cache and how it works
 
CS304PC:Computer Organization and Architecture Session 29 Memory organization...
CS304PC:Computer Organization and Architecture Session 29 Memory organization...CS304PC:Computer Organization and Architecture Session 29 Memory organization...
CS304PC:Computer Organization and Architecture Session 29 Memory organization...
 
Cache simulator
Cache simulatorCache simulator
Cache simulator
 
Cache memory
Cache memoryCache memory
Cache memory
 
CPU Caching Concepts
CPU Caching ConceptsCPU Caching Concepts
CPU Caching Concepts
 
Cache memory ...
Cache memory ...Cache memory ...
Cache memory ...
 
MEMORY & I/O SYSTEMS
MEMORY & I/O SYSTEMS                          MEMORY & I/O SYSTEMS
MEMORY & I/O SYSTEMS
 
Lec 1 digital electroinics - memory array, write read operations
Lec 1   digital electroinics - memory array, write read operationsLec 1   digital electroinics - memory array, write read operations
Lec 1 digital electroinics - memory array, write read operations
 
Computer organization memory
Computer organization memoryComputer organization memory
Computer organization memory
 
DIGITAL DESIGNS SLIDES 7 ENGINEERING 2ND YEAR
DIGITAL DESIGNS SLIDES 7 ENGINEERING  2ND YEARDIGITAL DESIGNS SLIDES 7 ENGINEERING  2ND YEAR
DIGITAL DESIGNS SLIDES 7 ENGINEERING 2ND YEAR
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

COA

  • 2.
  • 3. ▪The total memory of a computer can be visualized by hierarchy of components. ▪The memory hierarchy consists all of the storage devices available in a computer system from the slow memory to faster memory. ▪Memory hierarchy is essential to achieving high speed, large memory and low cost.
  • 4. a)Auxiliary Memory: ✓Auxiliary memory is known as the lowest-cost, highest-capacity and slowest-access storage in a computer system. ✓Auxiliary memory provides storage for programs and data that are kept for long-term storage or when not in immediate use. ✓ The most common examples of auxiliary memories are magnetic tapes and magnetic disks. b)Main Memory: ✓The main memory in a computer system is often referred to as Random Access Memory (RAM). ✓This memory unit communicates directly with the CPU and with auxiliary memory devices through an I/O processor. ✓The programs that are not currently required in the main memory are transferred into auxiliary memory to provide space for currently used programs and data.
  • 5. c)I/O Processor: ✓The primary function of an I/O Processor is to manage the data transfers between auxiliary memories and the main memory. d)Cache Memory: ✓The data or contents of the main memory that are used frequently by CPU are stored in the cache memory so that the processor can easily access that data in a shorter time. ✓ Whenever the CPU requires accessing memory, it first checks the required data into the cache memory. ✓ If the data is found in the cache memory, it is read from the cache memory. ✓Otherwise, the CPU moves onto the main memory for the required data.
  • 6. Memory Access Methods: ▪Random Access: Main memories are random access memories, in which each memory location has a unique address. Using this unique address any memory location can be reached in the same amount of time in any order. ▪Sequential Access: This methods allows memory access in a sequence or in order. ▪Direct Access: In this mode, information is stored in tracks, with each track having a separate read/write head. Main Memory: ▪The memory unit that communicates directly within the CPU, Auxillary memory and Cache memory, is called main memory. ▪ It is the central storage unit of the computer system. ▪ It is a large and fast memory used to store data during computer operations.
  • 7. RAM: Random Access Memory i. DRAM: Dynamic RAM, is made of capacitors and transistors, and must be refreshed every 10~100 ms. It is slower and cheaper than SRAM. ii. SRAM: Static RAM, has a six transistor circuit in each cell and retains data, until powered off. iii. NVRAM: Non-Volatile RAM, retains its data, even when turned off. Example: Flash memory. ROM: Read Only Memory, ▪It is non-volatile and is more like a permanent storage for information. ▪ It also stores the bootstrap loader program, to load and start the operating system when computer is turned on. ▪commonly used ROMs are: i. PROM(Programmable ROM) ii. EPROM(Erasable PROM) iii. EEPROM(Electrically Erasable PROM)
  • 8.
  • 9. Memory Addressing: ▪The table, called a memory address map, is a pictorial representation of assigned address space for each chip in the system. ▪Assume that a computer system needs 512 bytes of RAM and 512 bytes of ROM. ▪The component column specifies whether a RAM or a ROM chip used. ▪ The hexadecimal address column assigns a range of hexadecimal equivalent addresses for each chip.
  • 10. ▪Although there 16 lines in the address bus, the table shows only 10 lines because the other 6 not used in this example and assumed to be zero. ▪The small x’s under the address bus lines designate those lines that must connect to the address inputs in each chip. ▪The 4-RAM chips have 128 bytes and need seven address lines. ▪The ROM chip has 512 bytes and needs 9 address lines. ▪The x’s always assigned to the low-order bus lines: lines 1 through 7 for the RAM. And lines 1 to 9 for the ROM. ▪The distinction between a RAM and ROM address done with another bus line. ▪ Here we choose line 10 for this purpose. When line 10 is 0, the CPU selects a RAM, and when this line equal to 1, it selects the ROM.
  • 11. ▪A memory unit accessed by content is called an associative memory or content addressable memory (CAM). ▪This type of memory is accessed simultaneously and in parallel on the basis of data content rather than by specific address. ▪When a word is written in an associative memory, no address is given. The memory is capable of finding an empty unused location to store the word. ▪When a word is to be read from an associative memory, the content of the word, or part of the word, is specified. The memory locates all words which match the specified content and marks them for reading. ▪The associative memory is uniquely suited to do parallel searches by data association. ▪An associative memory is more expensive than a random access memory because each cell must have storage capability as well as logic circuits for matching its content with an external argument. ▪Associative memories are used in applications where the search time is very critical and must be very short.
  • 12.
  • 13. ▪The block diagram of an associative memory consists of a memory array and logic for m words with n bits per word. ▪The argument register A and key register K each have n bits, one for each bit of a word. ▪The match register M has m bits, one for each memory word. ▪Each word in memory is compared in parallel with the content of the argument register. ▪The words that match the bits of the argument register set a corresponding bit in the match register. ▪After the matching process, those bits in the match register that have been set indicate the fact that their corresponding words have been matched. ▪The key register used for choosing a particular field or key in the word. ▪If the key register contains all 1's the entire argument is compared with each memory word ▪Otherwise, only those bits in the argument that have 1's in their corresponding position of the key register are compared.
  • 14. Example: ▪ Suppose that the argument register A and the key register K have the bit configuration shown below. Only the three leftmost bits of A are compared with memory words because K has 1's in these positions. ▪Word 2 matches the unmasked argument field because the three leftmost bits of the argument and the word are equal. ▪The relation between the memory array and external registers in an associative memory is:
  • 15. ▪The match logic for each word can be derived from the comparison algorithm for two binary numbers. ▪First, we neglect the key bits and compare the argument in A with the bits stored in the cells of the words. ▪ Word i is equal to the argument in A if Aj = Fij for j = 1, 2, ... , n. Two bits are equal if they are both 1 or both 0. ▪The equality of two bits can be expressed logically by the Boolean function xj=AjFij+A′jF′ij where xj = 1 if the pair of bits in position j are equal; otherwise, xj = 0. ▪For a word i to be equal to the argument in A we must have all xj variables equal to 1. ▪This is the condition for setting the corresponding match bit Mi to 1. ▪The Boolean function for this condition is Mi=x1x2x3...xn and constitutes the AND operation of all pairs of matched bits in a word.
  • 16. ▪Cache Memory is a special very high-speed memory. ▪ It is used to speed up and synchronizing with high-speed CPU. ▪Cache memory is costlier than main memory or disk memory but economical than CPU registers. ▪Cache memory is an extremely fast memory type that acts as a buffer between RAM and the CPU. ▪It holds frequently requested data and instructions so that they are immediately available to the CPU when needed. ▪Cache memory is used to reduce the average time to access data from the Main memory. ▪The performance of the cache memory is frequently measured in terms of a quantity called hit ratio. ▪When the CPU refers to memory and finds the word in cache, it is said to produce a hit. ▪If the word is not found in the cache, it is in main memory and it counts as a miss. ▪The transformation of data from main memory to cache memory is called mapping. ▪ There are 3 main types of mapping: ▪Direct Mapping ▪Associative Mapping ▪Set Associative Mapping
  • 17.
  • 18. i.Direct Mapping: ▪In direct mapping, a particular block of main memory can map only to a particular line of the cache. ▪The line number of cache to which a particular block can map is given by: Cache line number= ( Main Memory Block Address ) Modulo (Number of lines in Cache) ▪Consider cache memory is divided into ‘n’ number of lines. ▪Then, block ‘j’ of main memory can map to line number (j mod n) only of the cache.
  • 19. i.Direct Mapping: ▪The CPU address of 15 bits is divided into 2 fields. ▪In this the 9 least significant bits constitute the index field and the remaining 6 bits constitute the tag field. ▪ The number of bits in index field is equal to the number of address bits required to access cache memory.
  • 20.
  • 21. ii.Associative Mapping: ▪In the associative mapping , any block of main memory can probably consist of any cache block position. ▪Here, each line of cache will accommodate address and the content of the address from the main memory. ▪It allows each block of main memory to be stored in cache. ▪The address value of 15 bits is shown as a five-digit octal number and its corresponding 12-bit word is shown as a four-digit octal number. ▪A CPU address of 15 bits is placed in the argument register and the associative memory is searched for a matching address. ▪If the address is found, the corresponding 12-bit data is read and sent to the CPU. ▪If no match occurs, the main memory is accessed for the word. ▪This method of searching a cache appears like each line of the cache has its compare circuitry, which can quickly analyze whether or not the block is contained at that line. ▪With all of the lines performing this comparison process in parallel, the correct line is identified quickly.
  • 22. ii.Associative Mapping: ▪If the cache is full, an address-data pair must be displaced to make room for a new pair. ▪The decision as to what pair is replaced is determined from the replacement algorithm that the designer chooses for the cache. ▪Ex: round-robin order ,FIFO
  • 23. iii.Set Associative Mapping: ▪The disadvantage of direct mapping is that two words with the same index in their address but with different tag values cannot reside in cache memory at the same time. ▪A third type of cache organization, called set-associative mapping, is an improvement over the direct mapping organization in that each word of cache can store two or more words of memory under the same index address. ▪Each data word is stored together with its tag and the number of tag-data items in one word of cache is said to form a set. ▪An example of a set-associative cache organization for a set size of two. ▪Each index address refers to two data words and their associated tags. ▪In general, a set-associative cache of set size k will accommodate k words of main memory in each word of cache.
  • 26. ▪Virtual memory is used to give programmers the illusion that they have a very large memory at their disposal, even though the computer actually has a relatively small main memory. ▪A virtual memory system provides a mechanism for translating program-generated addresses into main memory address. This is done dynamically, while programs are being executed in the CPU. ▪The translation or mapping is handled automatically by the hardware by means of a mapping table. ▪An address used by a programmer will be called a virtual address, and the set of such addresses the address space. ▪An address in main memory is called a location or physical address, and the set of such locations is called the memory space. ▪In most computers the address and memory spaces are identical. ▪Computers with virtual memory has more address space than the memory space.
  • 27. ▪Suppose that program-1 is currently being executed in the CPU. Program-1 and a portion of its data are moved from auxiliary memory into main memory. ▪Portions of programs and data need not be in contiguous locations in memory since information is being moved in and out, and empty spaces may be available in scattered locations in memory. ▪In our example, the address field of an instruction code will consist of 20 bits but physical memory addresses must be specified with only 15 bits. ▪Thus CPU will reference instructions and data with a 20-bit address.
  • 28. ▪A table is needed, to map a virtual address of 20 bits to a physical address of 15 bits. ▪ The mapping is a dynamic operation. ▪The mapping table may be stored in a separate memory or in main memory.
  • 29. ▪The table implementation is easy, if the information in the address space and the memory space are each divided into groups of fixed size. ▪The main memory is broken down into groups of equal size called blocks. ▪The address space is broken down into groups of equal size called pages. ▪Consider a computer with an address space of 8K and a memory space of 4K. ▪If we split each into groups of 1K words we obtain 8-pages and 4- blocks. ▪The term "page frame" is sometimes used to denote a block. ▪At any given time, up to four pages of address space may reside in main memory in any one of the four blocks.
  • 30. ▪Each virtual address is considered to be represented by two numbers: - page number address - line within the page ▪In a computer with 2p words per page, p bits are used to specify a line address and the remaining high-order bits of the virtual address specify the page number. In the example virtual address has 13 bits. ▪Since each page consists of 210 = 1024 words, the higher order three bits of a virtual address will specify one of the eight pages and the low-order 10 bits give the line address within the page. ▪Note that the line address in address space and memory space is the same; the only mapping required is from a page number to a block number. ▪The organization of the memory mapping table in a paged system is:
  • 31.
  • 32. ▪The memory-page table consists of eight words, one for each page. ▪The address in the page table denotes the page number and the content of the word gives the block number where that page is stored in main memory. ▪The table shows that pages 1, 2, 5, and 6 are now available in main memory in blocks 3, 0, 1, and 2, respectively. ▪A presence bit in each location indicates whether the page has been transferred from auxiliary memory into main memory. ▪A 0 in the presence bit indicates that this page is not available in main memory. ▪The CPU references a word in memory with a virtual address of 13 bits. The three high-order bits of the virtual address specify a page number and also an address for the memory-page table. ▪If the presence bit is a 1, the block number thus read is transferred to the two high-order bits of the main memory address register. ▪If the presence bit is 0, the content does not reside in main memory. Operating system is then fetch the required page from auxiliary memory and place it into main memory.
  • 33. ▪If the main memory is full, a new page cannot be stored. Therefore, we have to remove a page from a main memory to store the new page. ▪ The decision of removing specific pages from main memory is determined by the replacement algorithm. ▪There are two common replacement algorithms used are : ➢ First-In-First-Out (FIFO) ➢ Least Recently Used (LRU)
  • 34. a)FIFO: ▪The FIFO algorithm replace the page that has been in memory for the highest time. ▪The FIFO replacement policy has the benefit of being simple to execute. ▪ It has the drawback that under specific circumstances pages are removed and loaded from memory too frequently. b)LRU: ▪The LRU algorithm can be executed by maintaining a counter with each page that is in the main memory. ▪When a page is accessed, its counter is set to zero. ▪After particular intervals of time, the counters related to all pages directly in memory are incremented by 1. ▪The least recently used page is the page with the largest count. ▪The counters denotes the age, that is, how long ago the page have been accessed.