COMPUTER ORGANIZATION
By
Ch.B.A.Raju
Associate Professor
Dept of Electrical and Electronics Engineering
School of Engineering
Aditya University
Surampalem.
ADITYA ENGINEERING COLLEGE(A)
Unit – IV Memory Organization: Memory
Hierarchy, Main Memory, Auxiliary
Memory, Associative Memory, Cache
Memory, Virtual Memory.
Input-Output Organization: Peripheral
Devices, Input-Output Interface,
Asynchronous data transfer, Modes of
Transfer, Priority Interrupts, Direct
Memory Access. Thursday, November 28, 2024
Aditya Engineering College (A)
Memory Hierarchy Design and its Characteristics:
In the Computer System Design, Memory Hierarchy is an
enhancement to organize the memory such that it can
minimize the access time. The Memory Hierarchy was
developed based on a program behavior known as locality of
references. The figure below clearly demonstrates the different
levels of the memory hierarchy.
•Why Memory Hierarchy is Required in the System?
•Memory Hierarchy is one of the most required things in Computer Memory
as it helps in optimizing the memory available in the computer. There are
multiple levels present in the memory, each one having a different size,
different cost, etc. Some types of memory like cache, and main memory are
faster as compared to other types of memory but they are having a little less
size and are also costly whereas some memory has a little higher storage
value, but they are a little slower. Accessing of data is not similar in all
types of memory, some have faster access whereas some have slower access.
COMPUTER ORGANIZATION
Ch.B.A.Raju , Associate Professor
Types of Memory Hierarchy
•This Memory Hierarchy Design is divided into 2 main types:
•External Memory or Secondary Memory: Comprising of Magnetic Disk, Optical
Disk, and Magnetic Tape i.e. peripheral storage devices which are accessible by
the processor via an I/O Module.
•Internal Memory or Primary Memory: Comprising of Main Memory, Cache
Memory & CPU registers. This is directly accessible by the processor.
COMPUTER ORGANIZATION
Ch.B.A.Raju , Associate Professor
Memory Hierarchy Design
•1. Registers
Registers are small, high-speed memory units located in the CPU. They
are used to store the most frequently used data and instructions. Registers
have the fastest access time and the smallest storage capacity, typically
ranging from 16 to 64 bits.
2. Cache Memory
•Cache memory is a small, fast memory unit located close to the CPU. It
stores frequently used data and instructions that have been recently
accessed from the main memory. Cache memory is designed to minimize
the time it takes to access data by providing the CPU with quick access to
frequently used data.
COMPUTER ORGANIZATION
Ch.B.A.Raju , Associate Professor
3. Main Memory
•Main memory, also known as RAM (Random Access Memory),
is the primary memory of a computer system. It has a larger
storage capacity than cache memory, but it is slower. Main
memory is used to store data and instructions that are currently
in use by the CPU.
•Types of Main Memory
•Static RAM: Static RAM stores the binary information in flip
flops and information remains valid until power is supplied. It
has a faster access time and is used in implementing cache
memory.
•Dynamic RAM: It stores the binary information as a charge on
the capacitor. It requires refreshing circuitry to maintain the
charge on the capacitors after a few milliseconds. It contains
more memory cells per unit area as compared to SRAM.
COMPUTER ORGANIZATION
Ch.B.A.Raju , Associate Professor
• 4. Secondary Storage
Secondary storage, such as
hard disk drives (HDD) and solid-state drives (SSD), is a non-volatile
memory unit that has a larger storage capacity than main memory. It
is used to store data and instructions that are not currently in use by
the CPU. Secondary storage has the slowest access time and is
typically the least expensive type of memory in the memory hierarchy.
• 5. Magnetic Disk
Magnetic Disks are simply circular plates that are fabricated with either a
metal or a plastic or a magnetized material. The Magnetic disks work
at a high speed inside the computer and these are frequently used.
• 6. Magnetic Tape
Magnetic Tape is simply a magnetic recording device that is covered with
a plastic film. It is generally used for the backup of data. In the case of
a magnetic tape, the access time for a computer is a little slower and
therefore, it requires some amount of time for accessing the strip.
COMPUTER ORGANIZATION
Ch.B.A.Raju , Associate Professor
• Characteristics of Memory Hierarchy
• Capacity: It is the global volume of information the memory can store.
As we move from top to bottom in the Hierarchy, the capacity increases.
• Access Time: It is the time interval between the read/write request and
the availability of the data. As we move from top to bottom in the
Hierarchy, the access time increases.
• Performance: Earlier when the computer system was designed without a
Memory Hierarchy design, the speed gap increased between the CPU
registers and Main Memory due to a large difference in access time. This
results in lower performance of the system and thus, enhancement was
required. This enhancement was made in the form of Memory
Hierarchy Design because of which the performance of the system
increases. One of the most significant ways to increase system
performance is minimizing how far down the memory hierarchy one has
to go to manipulate data.
• Cost Per Bit: As we move from bottom to top in the Hierarchy, the cost
per bit increases i.e. Internal Memory is costlier than External Memory.
COMPUTER ORGANIZATION
Ch.B.A.Raju , Associate Professor
• Main Memory
• The main memory acts as the central storage unit in a computer
system. It is a relatively large and fast memory which is used to store
programs and data during the run time operations.
• The primary technology used for the main memory is based on
semiconductor integrated circuits. The integrated circuits for the main
memory are classified into two major units.
1. RAM (Random Access Memory) integrated circuit chips
2. ROM (Read Only Memory) integrated circuit chips
COMPUTER ORGANIZATION
Ch.B.A.Raju , Associate Professor
• RAM integrated circuit chips
• The RAM integrated circuit chips are further classified into
two possible operating modes, static and dynamic.
• The primary compositions of a static RAM are flip-flops that
store the binary information. The nature of the stored
information is volatile, i.e. it remains valid as long as power
is applied to the system. The static RAM is easy to use and
takes less time performing read and write operations as
compared to dynamic RAM.
• The dynamic RAM exhibits the binary information in the
form of electric charges that are applied to capacitors. The
capacitors are integrated inside the chip by MOS transistors.
The dynamic RAM consumes less power and provides large
storage capacity in a single memory chip.
• RAM chips are available in a variety of sizes and are used as
per the system requirement. The following block diagram
demonstrates the chip interconnection in a 128 * 8 RAM chip.
COMPUTER ORGANIZATION
Ch.B.A.Raju , Associate Professor
COMPUTER ORGANIZATION
Ch.B.A.Raju , Associate Professor
•A 128 * 8 RAM chip has a memory capacity of 128 words of eight bits (one byte)
per word. This requires a 7-bit address and an 8-bit bidirectional data bus.
•The 8-bit bidirectional data bus allows the transfer of data either from memory
to CPU during a read operation or from CPU to memory during
a write operation.
•The read and write inputs specify the memory operation, and the two chip select
(CS) control inputs are for enabling the chip only when the microprocessor selects
it.
•The bidirectional data bus is constructed using three-state buffers.
•The output generated by three-state buffers can be placed in one of the three
possible states which include a signal equivalent to logic 1, a signal equal to logic
0, or a high-impedance state.
• ROM integrated circuit
• The primary component of the main memory is RAM
integrated circuit chips, but a portion of memory may be
constructed with ROM chips.
• A ROM memory is used for keeping programs and data
that are permanently resident in the computer.
• Apart from the permanent storage of data, the ROM
portion of main memory is needed for storing an initial
program called a bootstrap loader. The primary function of
the bootstrap loader program is to start the computer
software operating when power is turned on.
• ROM chips are also available in a variety of sizes and are
also used as per the system requirement. The following
block diagram demonstrates the chip interconnection in a
512 * 8 ROM chip.
COMPUTER ORGANIZATION
Ch.B.A.Raju , Associate Professor
COMPUTER ORGANIZATION
Ch.B.A.Raju , Associate Professor
•A ROM chip has a similar organization as a RAM chip.
However, a ROM can only perform read operation; the data
bus can only operate in an output mode.
•The 9-bit address lines in the ROM chip specify any one of
the 512 bytes stored in it.
•The value for chip select 1 and chip select 2 must be 1 and 0
for the unit to operate. Otherwise, the data bus is said to be in
a high-impedance state.
 Auxiliary Memory
Devices that provide backup storage are called auxiliary memory. Only
programs and data currently needed by the processor reside in main
memory. All other information is stored in auxiliary memory and
transferred to main memory when needed.
Cache Memory
• The data or contents of the main memory that are used frequently by CPU
are stored in the cache memory so that the processor can easily access that
data in a shorter time. Whenever the CPU needs to access memory, it first
checks the cache memory. If the data is not found in cache memory, then
the CPU moves into the main memory.
• Cache memory is placed between the CPU and the main memory. The
block diagram for a cache memory can be represented as:
• The cache is the fastest component in the memory hierarchy and
approaches the speed of CPU components.
• Cache memory is organised as distinct set of blocks where each set
contains a small fixed number of blocks.
COMPUTER ORGANIZATION
Ch.B.A.Raju , Associate Professor
COMPUTER ORGANIZATION
Ch.B.A.Raju , Associate Professor
The basic operation of a cache memory is as follows:
•When the CPU needs to access memory, the cache is examined. If the word is found in the
cache, it is read from the fast memory.
•If the word addressed by the CPU is not found in the cache, the main memory is accessed
to read the word.
•A block of words one just accessed is then transferred from main memory to cache
memory. The block size may vary from one word (the one just accessed) to about 16 words
adjacent to the one just accessed.
• The performance of the cache memory is frequently measured in terms of a
quantity called hit ratio.
• When the CPU refers to memory and finds the word in cache, it is said to
produce a hit.
• If the word is not found in the cache, it is in main memory and it counts as
a miss.
• The ratio of the number of hits divided by the total CPU references to
memory (hits plus misses) is the hit ratio.
COMPUTER ORGANIZATION
Ch.B.A.Raju , Associate Professor
Cache Mapping:
•There are three different types of mapping used for the purpose of cache
memory which are as follows:
•Direct mapping,
•Associative mapping
•Set-Associative mapping
•Direct Mapping :
•In direct mapping, the cache consists of normal high-speed random-access
memory. Each location in the cache holds the data, at a specific address in the
cache. This address is given by the lower significant bits of the main memory
address. This enables the block to be selected directly from the lower
significant bit of the memory address. The remaining higher significant bits of
the address are stored in the cache with the data to complete the identification
of the cached data.
COMPUTER ORGANIZATION
Ch.B.A.Raju , Associate Professor
COMPUTER ORGANIZATION
Ch.B.A.Raju , Associate Professor
• The tag consists of the higher significant bits of the address and these bits
are stored with the data in cache. The index consists of the lower
significant bits of the address. Whenever the memory is referenced, the
following sequence of events occurs
1. The index is first used to access a word in the cache.
2. The tag stored in the accessed word is read.
3. This tag is then compared with the tag in the address.
4. If two tags are same this indicates cache hit and required data is read from
the cache word.
5. If the two tags are not same, this indicates a cache miss. Then the reference
is made to the main memory to find it.
COMPUTER ORGANIZATION
Ch.B.A.Raju , Associate Professor
• Set Associative Mapping -
 In fully associative type of cache memory, each location in cache stores
both memory address as well as data.
• Whenever a data is requested, the incoming memory address a
simultaneously compared with all stored addresses using the internal logic
the associative memory.
• If a match is found, the corresponding is read out. Otherwise, the main
memory is accessed if address is not found in cache.
• This method is known as fully associative mapping approach because
cached data is related to the main memory by storing both memory address
and data in the cache. In all organisations, data can be more than one word
as shown in the following figure.
COMPUTER ORGANIZATION
Ch.B.A.Raju , Associate Professor
COMPUTER ORGANIZATION
Ch.B.A.Raju , Associate Professor
 Virtual memory
 It is a technique that allows a computer to use more memory than it
physically has. It creates a virtual address space that is mapped to the
physical memory . This technique is critical for running large applications
that require more memory than is available on the system.
 In computer architecture, virtual memory is implemented by mapping the
virtual address space to the physical address space using a hardware device
called Memory Management Unit (MMU) . The MMU performs this
mapping during runtime by taking help of a memory map table maintained
by the operating system .
 Virtual memory helps in efficient utilization of main memory by dividing
larger size programs into blocks and partially loading each block into main
memory as per need. This makes simultaneous execution of multiple
programs possible . Virtual memory also helps to improve overall
throughput .
 There are two techniques to configure virtual memory: Paging technique
and Segmentation technique
COMPUTER ORGANIZATION
Ch.B.A.Raju , Associate Professor
COMPUTER ORGANIZATION
Ch.B.A.Raju , Associate Professor
 Peripheral devices
 In addition to the processor and a set of memory modules, the third key
element of a computer system is a set of input-output subsystem referred to
as I/O, provides an efficient mode of communication between the central
system and the outside environment.
 Programs and data must be entered into computer memory for processing
and results obtained from computations must be recorded or displayed for
the user.
 Devices that are under the direct control of the computer are said to be
connected online. These devices are designed to read information into or out
of the memory unit upon command from CPU.
 Input or output devices attached to the computer are also called peripherals.
 Among the most common peripherals are keyboards, display units, and
printers.
 Perhaps those provide auxiliary storage for the systems are magnetic disks
and tapes.
 Peripherals are electromechanical and electromagnetic devices of some
complexity.
COMPUTER ORGANIZATION
Ch.B.A.Raju , Associate Professor
 We can broadly classify peripheral devices into three categories:
 Human Readable: Communicating with the computer users, e.g. video display
terminal, printers etc.
 Machine Readable: Communicating with equipments, e.g. magnetic disk,
magnetic tape, sensor, actuators used in robotics etc.
 Communication: Communicating with remote devices means exchanging data
with that, e.g. modem, NIC (network interface Card) etc.
COMPUTER ORGANIZATION
Ch.B.A.Raju , Associate Professor
 Control signals determine the function that the device will perform such as send
data to I/O module, accept data from I/O module.
 Status signals indicate the state of the device i.e. device is ready or not.
 Data bits are actual data transformation
COMPUTER ORGANIZATION
Ch.B.A.Raju , Associate Professor

Computer organisation basic presentation

  • 1.
    COMPUTER ORGANIZATION By Ch.B.A.Raju Associate Professor Deptof Electrical and Electronics Engineering School of Engineering Aditya University Surampalem. ADITYA ENGINEERING COLLEGE(A)
  • 2.
    Unit – IVMemory Organization: Memory Hierarchy, Main Memory, Auxiliary Memory, Associative Memory, Cache Memory, Virtual Memory. Input-Output Organization: Peripheral Devices, Input-Output Interface, Asynchronous data transfer, Modes of Transfer, Priority Interrupts, Direct Memory Access. Thursday, November 28, 2024 Aditya Engineering College (A)
  • 3.
    Memory Hierarchy Designand its Characteristics: In the Computer System Design, Memory Hierarchy is an enhancement to organize the memory such that it can minimize the access time. The Memory Hierarchy was developed based on a program behavior known as locality of references. The figure below clearly demonstrates the different levels of the memory hierarchy. •Why Memory Hierarchy is Required in the System? •Memory Hierarchy is one of the most required things in Computer Memory as it helps in optimizing the memory available in the computer. There are multiple levels present in the memory, each one having a different size, different cost, etc. Some types of memory like cache, and main memory are faster as compared to other types of memory but they are having a little less size and are also costly whereas some memory has a little higher storage value, but they are a little slower. Accessing of data is not similar in all types of memory, some have faster access whereas some have slower access. COMPUTER ORGANIZATION Ch.B.A.Raju , Associate Professor
  • 4.
    Types of MemoryHierarchy •This Memory Hierarchy Design is divided into 2 main types: •External Memory or Secondary Memory: Comprising of Magnetic Disk, Optical Disk, and Magnetic Tape i.e. peripheral storage devices which are accessible by the processor via an I/O Module. •Internal Memory or Primary Memory: Comprising of Main Memory, Cache Memory & CPU registers. This is directly accessible by the processor. COMPUTER ORGANIZATION Ch.B.A.Raju , Associate Professor
  • 5.
    Memory Hierarchy Design •1.Registers Registers are small, high-speed memory units located in the CPU. They are used to store the most frequently used data and instructions. Registers have the fastest access time and the smallest storage capacity, typically ranging from 16 to 64 bits. 2. Cache Memory •Cache memory is a small, fast memory unit located close to the CPU. It stores frequently used data and instructions that have been recently accessed from the main memory. Cache memory is designed to minimize the time it takes to access data by providing the CPU with quick access to frequently used data. COMPUTER ORGANIZATION Ch.B.A.Raju , Associate Professor
  • 6.
    3. Main Memory •Mainmemory, also known as RAM (Random Access Memory), is the primary memory of a computer system. It has a larger storage capacity than cache memory, but it is slower. Main memory is used to store data and instructions that are currently in use by the CPU. •Types of Main Memory •Static RAM: Static RAM stores the binary information in flip flops and information remains valid until power is supplied. It has a faster access time and is used in implementing cache memory. •Dynamic RAM: It stores the binary information as a charge on the capacitor. It requires refreshing circuitry to maintain the charge on the capacitors after a few milliseconds. It contains more memory cells per unit area as compared to SRAM. COMPUTER ORGANIZATION Ch.B.A.Raju , Associate Professor
  • 7.
    • 4. SecondaryStorage Secondary storage, such as hard disk drives (HDD) and solid-state drives (SSD), is a non-volatile memory unit that has a larger storage capacity than main memory. It is used to store data and instructions that are not currently in use by the CPU. Secondary storage has the slowest access time and is typically the least expensive type of memory in the memory hierarchy. • 5. Magnetic Disk Magnetic Disks are simply circular plates that are fabricated with either a metal or a plastic or a magnetized material. The Magnetic disks work at a high speed inside the computer and these are frequently used. • 6. Magnetic Tape Magnetic Tape is simply a magnetic recording device that is covered with a plastic film. It is generally used for the backup of data. In the case of a magnetic tape, the access time for a computer is a little slower and therefore, it requires some amount of time for accessing the strip. COMPUTER ORGANIZATION Ch.B.A.Raju , Associate Professor
  • 8.
    • Characteristics ofMemory Hierarchy • Capacity: It is the global volume of information the memory can store. As we move from top to bottom in the Hierarchy, the capacity increases. • Access Time: It is the time interval between the read/write request and the availability of the data. As we move from top to bottom in the Hierarchy, the access time increases. • Performance: Earlier when the computer system was designed without a Memory Hierarchy design, the speed gap increased between the CPU registers and Main Memory due to a large difference in access time. This results in lower performance of the system and thus, enhancement was required. This enhancement was made in the form of Memory Hierarchy Design because of which the performance of the system increases. One of the most significant ways to increase system performance is minimizing how far down the memory hierarchy one has to go to manipulate data. • Cost Per Bit: As we move from bottom to top in the Hierarchy, the cost per bit increases i.e. Internal Memory is costlier than External Memory. COMPUTER ORGANIZATION Ch.B.A.Raju , Associate Professor
  • 9.
    • Main Memory •The main memory acts as the central storage unit in a computer system. It is a relatively large and fast memory which is used to store programs and data during the run time operations. • The primary technology used for the main memory is based on semiconductor integrated circuits. The integrated circuits for the main memory are classified into two major units. 1. RAM (Random Access Memory) integrated circuit chips 2. ROM (Read Only Memory) integrated circuit chips COMPUTER ORGANIZATION Ch.B.A.Raju , Associate Professor
  • 10.
    • RAM integratedcircuit chips • The RAM integrated circuit chips are further classified into two possible operating modes, static and dynamic. • The primary compositions of a static RAM are flip-flops that store the binary information. The nature of the stored information is volatile, i.e. it remains valid as long as power is applied to the system. The static RAM is easy to use and takes less time performing read and write operations as compared to dynamic RAM. • The dynamic RAM exhibits the binary information in the form of electric charges that are applied to capacitors. The capacitors are integrated inside the chip by MOS transistors. The dynamic RAM consumes less power and provides large storage capacity in a single memory chip. • RAM chips are available in a variety of sizes and are used as per the system requirement. The following block diagram demonstrates the chip interconnection in a 128 * 8 RAM chip. COMPUTER ORGANIZATION Ch.B.A.Raju , Associate Professor
  • 11.
    COMPUTER ORGANIZATION Ch.B.A.Raju ,Associate Professor •A 128 * 8 RAM chip has a memory capacity of 128 words of eight bits (one byte) per word. This requires a 7-bit address and an 8-bit bidirectional data bus. •The 8-bit bidirectional data bus allows the transfer of data either from memory to CPU during a read operation or from CPU to memory during a write operation. •The read and write inputs specify the memory operation, and the two chip select (CS) control inputs are for enabling the chip only when the microprocessor selects it. •The bidirectional data bus is constructed using three-state buffers. •The output generated by three-state buffers can be placed in one of the three possible states which include a signal equivalent to logic 1, a signal equal to logic 0, or a high-impedance state.
  • 12.
    • ROM integratedcircuit • The primary component of the main memory is RAM integrated circuit chips, but a portion of memory may be constructed with ROM chips. • A ROM memory is used for keeping programs and data that are permanently resident in the computer. • Apart from the permanent storage of data, the ROM portion of main memory is needed for storing an initial program called a bootstrap loader. The primary function of the bootstrap loader program is to start the computer software operating when power is turned on. • ROM chips are also available in a variety of sizes and are also used as per the system requirement. The following block diagram demonstrates the chip interconnection in a 512 * 8 ROM chip. COMPUTER ORGANIZATION Ch.B.A.Raju , Associate Professor
  • 13.
    COMPUTER ORGANIZATION Ch.B.A.Raju ,Associate Professor •A ROM chip has a similar organization as a RAM chip. However, a ROM can only perform read operation; the data bus can only operate in an output mode. •The 9-bit address lines in the ROM chip specify any one of the 512 bytes stored in it. •The value for chip select 1 and chip select 2 must be 1 and 0 for the unit to operate. Otherwise, the data bus is said to be in a high-impedance state.
  • 14.
     Auxiliary Memory Devicesthat provide backup storage are called auxiliary memory. Only programs and data currently needed by the processor reside in main memory. All other information is stored in auxiliary memory and transferred to main memory when needed. Cache Memory • The data or contents of the main memory that are used frequently by CPU are stored in the cache memory so that the processor can easily access that data in a shorter time. Whenever the CPU needs to access memory, it first checks the cache memory. If the data is not found in cache memory, then the CPU moves into the main memory. • Cache memory is placed between the CPU and the main memory. The block diagram for a cache memory can be represented as: • The cache is the fastest component in the memory hierarchy and approaches the speed of CPU components. • Cache memory is organised as distinct set of blocks where each set contains a small fixed number of blocks. COMPUTER ORGANIZATION Ch.B.A.Raju , Associate Professor
  • 15.
    COMPUTER ORGANIZATION Ch.B.A.Raju ,Associate Professor The basic operation of a cache memory is as follows: •When the CPU needs to access memory, the cache is examined. If the word is found in the cache, it is read from the fast memory. •If the word addressed by the CPU is not found in the cache, the main memory is accessed to read the word. •A block of words one just accessed is then transferred from main memory to cache memory. The block size may vary from one word (the one just accessed) to about 16 words adjacent to the one just accessed.
  • 16.
    • The performanceof the cache memory is frequently measured in terms of a quantity called hit ratio. • When the CPU refers to memory and finds the word in cache, it is said to produce a hit. • If the word is not found in the cache, it is in main memory and it counts as a miss. • The ratio of the number of hits divided by the total CPU references to memory (hits plus misses) is the hit ratio. COMPUTER ORGANIZATION Ch.B.A.Raju , Associate Professor
  • 17.
    Cache Mapping: •There arethree different types of mapping used for the purpose of cache memory which are as follows: •Direct mapping, •Associative mapping •Set-Associative mapping •Direct Mapping : •In direct mapping, the cache consists of normal high-speed random-access memory. Each location in the cache holds the data, at a specific address in the cache. This address is given by the lower significant bits of the main memory address. This enables the block to be selected directly from the lower significant bit of the memory address. The remaining higher significant bits of the address are stored in the cache with the data to complete the identification of the cached data. COMPUTER ORGANIZATION Ch.B.A.Raju , Associate Professor
  • 18.
  • 19.
    • The tagconsists of the higher significant bits of the address and these bits are stored with the data in cache. The index consists of the lower significant bits of the address. Whenever the memory is referenced, the following sequence of events occurs 1. The index is first used to access a word in the cache. 2. The tag stored in the accessed word is read. 3. This tag is then compared with the tag in the address. 4. If two tags are same this indicates cache hit and required data is read from the cache word. 5. If the two tags are not same, this indicates a cache miss. Then the reference is made to the main memory to find it. COMPUTER ORGANIZATION Ch.B.A.Raju , Associate Professor
  • 20.
    • Set AssociativeMapping -  In fully associative type of cache memory, each location in cache stores both memory address as well as data. • Whenever a data is requested, the incoming memory address a simultaneously compared with all stored addresses using the internal logic the associative memory. • If a match is found, the corresponding is read out. Otherwise, the main memory is accessed if address is not found in cache. • This method is known as fully associative mapping approach because cached data is related to the main memory by storing both memory address and data in the cache. In all organisations, data can be more than one word as shown in the following figure. COMPUTER ORGANIZATION Ch.B.A.Raju , Associate Professor
  • 21.
  • 22.
     Virtual memory It is a technique that allows a computer to use more memory than it physically has. It creates a virtual address space that is mapped to the physical memory . This technique is critical for running large applications that require more memory than is available on the system.  In computer architecture, virtual memory is implemented by mapping the virtual address space to the physical address space using a hardware device called Memory Management Unit (MMU) . The MMU performs this mapping during runtime by taking help of a memory map table maintained by the operating system .  Virtual memory helps in efficient utilization of main memory by dividing larger size programs into blocks and partially loading each block into main memory as per need. This makes simultaneous execution of multiple programs possible . Virtual memory also helps to improve overall throughput .  There are two techniques to configure virtual memory: Paging technique and Segmentation technique COMPUTER ORGANIZATION Ch.B.A.Raju , Associate Professor
  • 23.
  • 24.
     Peripheral devices In addition to the processor and a set of memory modules, the third key element of a computer system is a set of input-output subsystem referred to as I/O, provides an efficient mode of communication between the central system and the outside environment.  Programs and data must be entered into computer memory for processing and results obtained from computations must be recorded or displayed for the user.  Devices that are under the direct control of the computer are said to be connected online. These devices are designed to read information into or out of the memory unit upon command from CPU.  Input or output devices attached to the computer are also called peripherals.  Among the most common peripherals are keyboards, display units, and printers.  Perhaps those provide auxiliary storage for the systems are magnetic disks and tapes.  Peripherals are electromechanical and electromagnetic devices of some complexity. COMPUTER ORGANIZATION Ch.B.A.Raju , Associate Professor
  • 25.
     We canbroadly classify peripheral devices into three categories:  Human Readable: Communicating with the computer users, e.g. video display terminal, printers etc.  Machine Readable: Communicating with equipments, e.g. magnetic disk, magnetic tape, sensor, actuators used in robotics etc.  Communication: Communicating with remote devices means exchanging data with that, e.g. modem, NIC (network interface Card) etc. COMPUTER ORGANIZATION Ch.B.A.Raju , Associate Professor
  • 26.
     Control signalsdetermine the function that the device will perform such as send data to I/O module, accept data from I/O module.  Status signals indicate the state of the device i.e. device is ready or not.  Data bits are actual data transformation COMPUTER ORGANIZATION Ch.B.A.Raju , Associate Professor