SlideShare a Scribd company logo
CS304PC:Computer Organization
and Architecture (R18 II(I sem))
Department of computer science and engineering (AI/ML)
Session 27
by
Asst.Prof.M.Gokilavani
VITS
3/21/2023 Department of CSE (AI/ML) 1
TEXTBOOK:
• 1. Computer System Architecture – M. Moris Mano,
Third Edition, Pearson/PHI.
REFERENCES:
• Computer Organization – Car Hamacher, Zvonks
Vranesic, Safea Zaky, Vth Edition, McGraw Hill.
• Computer Organization and Architecture – William
Stallings Sixth Edition, Pearson/PHI.
• Structured Computer Organization – Andrew S.
Tanenbaum, 4th Edition, PHI/Pearson.
3/21/2023 Department of CSE (AI/ML) 2
Unit IV
Input-Output Organization: Input-Output
Interface, Asynchronous data transfer, Modes of
transfer, Priority Interrupt Direct memory
Access.
Memory Organization: Memory Hierarchy,
Main memory, Auxiliary memory, Associate
memory, cache memory.
3/21/2023 Department of CSE (AI/ML) 3
Topics covered in session 29
3/21/2023 Department of CSE (AI/ML) 4
Memory Organization
Memory Hierarchy
Main memory
Auxiliary memory
Associate memory
cache memory.
Memory Organization
• Memory unit is an essential component in any digital computer
since it is needed for storing programs and data.
• The memory unit that communicates directly with the CPU is
called the main memory. Devices that provide backup storage
are called auxiliary memory.
• Only programs and data currently needed by the processor
reside in main memory. All other information is stored in
auxiliary memory and transferred to main memory when
needed.
• The memory hierarchy consists of all storage devices
employed in a computer system from the slow but high-
capacity auxiliary memory to a relatively faster main memory,
to an even smaller and faster cache memory accessible to the
high-speed processing logic.
3/21/2023 5
Department of CSE (AI/ML)
Memory Organization
• The main memory occupies a central position by being able to
communicate directly with the CPU and with auxiliary
memory devices through an I/O processor.
• Access time of CPU and main memory are different. So, to co-
ordinate the speed between these, a fast memory is needed
called as cache memory.
• While the I/O processor manages data transfer between
auxiliary memory and main memory, the cache organization is
concerned with the transfer of information between main
memory and CPU.
• As the storage capacity of the memory increases, the cost per
bit for storing binary information decreases and the access
time of the memory becomes longer.
• The auxiliary memory has a large storage capacity, is
relatively inexpensive, but has low access speed compared to
main memory.
3/21/2023 6
Department of CSE (AI/ML)
Memory Organization
• The cache memory is very small, relatively very small, relatively
expensive, and has very high access speed.
• CPU has direct access to both cache and main memory but not to
auxiliary memory. The transfer from auxiliary to main memory is
usually done by means of direct memory access of large blocks of
data.
• Many OS are designed to enable the CPU to process a number of
independent programs concurrently.
3/21/2023 7
Department of CSE (AI/ML)
Memory Organization
• This concept, called multiprogramming, refers to
the existence of two or more programs in different
parts of memory hierarchy at the same time.
• In this way, it is possible to keep all parts of the
computer busy by working with several programs
in sequence.
• The part of the computer system that supervises
the flow of information between auxiliary
memory and main memory is called memory
management system.
3/21/2023 8
Department of CSE (AI/ML)
3/21/2023 Department of CSE (AI/ML) 9
Main Memory
• The main memory is the central storage unit in a computer
system.
• It is a relatively large and fast memory used to store programs
and data during the computer operation.
• Integrated circuit RAM chips are available in two possible
modes:
• static
• dynamic
• The static RAM consists essentially of internal flip-flops.
• The stored information remains valid as long as power is
applied to the unit.
3/21/2023 10
Department of CSE (AI/ML)
Dynamic Main Memory
• The dynamic RAM stores the binary information in the
form of electric charges that are applied to capacitors.
• The capacitors are provided inside the chip by MOS
transistors.
• The stored charge on the capacitor tends to discharge
with time and the capacitors must be periodically
recharged by refreshing the dynamic memory.
• The dynamic RAM offers reduced power consumption
and larger storage capacity in a single memory chip.
3/21/2023 11
Department of CSE (AI/ML)
Main Memory
• Most of the main memory in a general-purpose computer is made
up of RAM integrated circuit chips, but a portion of the memory
may be constructed with ROM chips.
• RAM is used for storing the bulk of the programs and data that
are subject to change.
• ROM is used for storing programs that are permanently resident
in the computer and for tables of constants that do not change in
the value once the production of the computer is completed.
• Among other things, the ROM portion of main memory is needed
for storing an initial program called as bootstrap loader.
• The bootstrap loader is a program whose function is to start the
computer software operating when power is turned on.
3/21/2023 12
Department of CSE (AI/ML)
Main Memory
• RAM and ROM chips
– RAM and ROM chips are available in a variety of sizes.
If we need larger memory for the system, it is necessary
to combine a number of chips to form the required
memory size.
• RAM Chips
• A RAM chip is better suited to communicate with
CPU if it has one or more control inputs that select
the chip only when needed. The block diagram of a
RAM chip is shown below:
3/21/2023 13
Department of CSE (AI/ML)
3/21/2023 Department of CSE (AI/ML) 14
3/21/2023 Department of CSE (AI/ML) 15
Memory Address Map
• The addressing of memory can be established by
means of a table that specifies the memory address
assigned to each RAM or ROM chip.
• This table is called memory address map and is a
pictorial representation of assigned address space for
particular chip.
• Example: Suppose computer system needs 512 bytes
of RAM and 512 bytes of ROM.
3/21/2023 16
Department of CSE (AI/ML)
3/21/2023 Department of CSE (AI/ML) 17
•We use four 128 words RAM to make 512 byte size.
• Hexadecimal address column assigns a range of addresses for each
chip.
•10 lines in address bus column: lines 1 through 7 for RAM and 1
through 9 for ROM.
•Distinction between RAM and ROM chip is made by line 10.
•When line 10 is 1, it selects ROM and when it is 0, CPU selects
RAM.
•X’s represents a binary number ranging from all-0’s to all-1’s.
Associative Memory
• Also called as Content-addressable memory
(CAM), associative storage, or associative
array .
• Content-addressed or associative memory
refers to a memory organization in which the
memory is accessed by its content (as opposed
to an explicit address).
• It is a special type of computer memory used
in certain very high speed searching
applications.
3/21/2023 18
Department of CSE (AI/ML)
Associative Memory
• If the data word is found, the CAM returns a list of one or
more storage addresses where the word was found.
• CAM is designed to search its entire memory in a single
operation.
• It is much faster than RAM in virtually all search applications.
• An associative memory is more expensive than RAM, as each
cell must have storage capability as well as logic circuits for
matching its content with an external argument.
• Associative memories are used in applications where the
search time is very critical and short.
• Associative memories are expensive compared to RAMs
because of the add logic associated with each cell.
3/21/2023 19
Department of CSE (AI/ML)
Associative Memory
3/21/2023 Department of CSE (AI/ML) 20
3/21/2023 Department of CSE (AI/ML) 21
Cache Memory
• Cache (pronounced cash) memory is extremely fast
memory that is built into a computer’s central processing
unit (CPU), or located next to it on a separate chip.
• The CPU uses cache memory to store instructions that
are repeatedly required to run programs, improving
overall system speed.
• The advantage of cache memory is that the CPU does not
have to use the motherboard’s system bus for data
transfer.
3/21/2023 Department of CSE (AI/ML) 22
cache mapping techniques
• A cache is a small amount of very fast associative
memory.
• It sits between normal main memory and CPU.
• When CPU needs to access contents of memory
location, then cache is examined for this data.
• If present, get from cache (fast).
• If not present, read required block from main memory
to cache, then deliver from cache to CPU.
• The performance of cache memory is frequently
measured in terms of a quantity called hit ratio.
3/21/2023 Department of CSE (AI/ML) 23
Cache mapping techniques
3/21/2023 Department of CSE (AI/ML) 24
Cache mapping techniques
• The process of transferring the data from main memory to
cache is known as mapping process.
• There are three types of cache mapping techniques:
• Associative mapping
• Direct mapping
• Set-associative mapping
3/21/2023 Department of CSE (AI/ML) 25
Example
• The main memory can store 32K words of 12 bits each.
• The cache is capable of storing 512 of these words at
any given time.
• For every word stored in cache, there is a duplicate
copy in main memory.
• The CPU communicates with both memories.
• It first sends a 15-bit address to cache.
• If there is a hit, the CPU accepts the 12-bit data from
cache.
• If there is a miss, the CPU reads the word from main
memory and the word is then transferred to cache.
3/21/2023 Department of CSE (AI/ML) 26
Associative mapping
• Associative memory Stores both address and data
content in memory word.
3/21/2023 Department of CSE (AI/ML) 27
Direct Mapping
• The CPU address of 15 bits is divided into two fields. The
nine least significant bits constitute the index field and the
remaining six bits form the tag field.
3/21/2023 Department of CSE (AI/ML) 28
Direct Mapping
• The n bit memory address is divided into two fields:
• k bits for the index field
• n-k bits for the tag field.
• The direct mapping cache organization uses the n bit address
to access the main memory and the k bit index to access the
cache.
• The number of bits in the index field is equal to the number
of address bits required to access the cache memory.
3/21/2023 Department of CSE (AI/ML) 29
3/21/2023 Department of CSE (AI/ML) 30
Direct Mapping
• The tag field of the CPU address is compared
with the tag in the word read from the cache.
• If the two tags match, there is a hit and the desired
data word is in cache.
• If there is no match, there is a miss and the
required word is read from main memory.
• It is then stored in the cache together with the new
tag, replacing the previous value.
• The disadvantage of direct mapping is that two
words with the same index in their address but
with different tag values cannot reside in cache
memory at the same time.
3/21/2023 Department of CSE (AI/ML) 31
Set-Associative Mapping
• It is an improvement over the direct mapping
organization in that each word of cache can
store two or more words of memory under the
same index address.
• The most common replacement algorithms
used are: random replacement, first in first out
(FIFO), and least recently used (LRU)
3/21/2023 Department of CSE (AI/ML) 32
Set-Associative Mapping
• The words stored at
addresses 01000 and 02000
of main memory are stored
in cache memory at index
address 000. Similarly, the
words at addresses 02777
and 00777 are stored in
cache at index address 777.
• When a miss occurs in a set
associative cache and the set
is full, it is necessary to
replace one of the tag data
items with a new value.
3/21/2023 Department of CSE (AI/ML) 33
Virtual memory
• A virtual memory system attempts to optimize the use
of the main memory (the higher speed portion) with
the hard disk (the lower speed portion).
• Virtual memory gives programmers the illusion that
they have a very large memory and provides
mechanism for dynamically translating program-
generated addresses into correct main memory
locations.
• The translation or mapping is handled automatically
by the hardware by means of a mapping table.
3/21/2023 Department of CSE (AI/ML) 34
Topics to be covered in next session 30
• RISC
3/21/2023 Department of CSE (AI/ML) 35
Thank you!!!

More Related Content

Similar to CS304PC:Computer Organization and Architecture Session 29 Memory organization.pptx

Computer System Architecture
Computer System ArchitectureComputer System Architecture
Computer System Architecture
Brenda Debra
 
Cache Memory.pptx
Cache Memory.pptxCache Memory.pptx
Cache Memory.pptx
AshokRachapalli1
 
Cache Memory.pptx
Cache Memory.pptxCache Memory.pptx
Cache Memory.pptx
ssusere16bd9
 
Auxiliary, Cache and Virtual memory.pptx
Auxiliary, Cache and Virtual memory.pptxAuxiliary, Cache and Virtual memory.pptx
Auxiliary, Cache and Virtual memory.pptx
Ramakrishna Reddy Bijjam
 
unit4 and unit5.pptx
unit4 and unit5.pptxunit4 and unit5.pptx
unit4 and unit5.pptx
bobbyk11
 
COA notes
COA notesCOA notes
COA notes
ShrutiKushwaha29
 
lecture-2-3_Memory.pdf,describing memory
lecture-2-3_Memory.pdf,describing memorylecture-2-3_Memory.pdf,describing memory
lecture-2-3_Memory.pdf,describing memory
floraaluoch3
 
Computer System Architecture Lecture Note 8.2 Cache Memory
Computer System Architecture Lecture Note 8.2 Cache MemoryComputer System Architecture Lecture Note 8.2 Cache Memory
Computer System Architecture Lecture Note 8.2 Cache Memory
Budditha Hettige
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
Perfectly Perfect
 
Virtual Memory vs Cache Memory
Virtual Memory vs Cache MemoryVirtual Memory vs Cache Memory
Virtual Memory vs Cache Memory
Ashik Iqbal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Cache memory
Cache memoryCache memory
Cache memory
Abir Rahman
 
Advanced computer architechture -Memory Hierarchies and its Properties and Type
Advanced computer architechture -Memory Hierarchies and its Properties and TypeAdvanced computer architechture -Memory Hierarchies and its Properties and Type
Advanced computer architechture -Memory Hierarchies and its Properties and Type
LalfakawmaKh
 
Memory organization
Memory organizationMemory organization
Memory organization
ishapadhy
 
Computer Memory Finder
Computer Memory FinderComputer Memory Finder
Computer Memory Finder
steve predle
 
Memory Hierarchy
Memory HierarchyMemory Hierarchy
Memory Hierarchy
SURBHI SAROHA
 
Computer architecture cache memory
Computer architecture cache memoryComputer architecture cache memory
Computer architecture cache memory
Mazin Alwaaly
 
computerarchitecturecachememory-170927134432.pdf
computerarchitecturecachememory-170927134432.pdfcomputerarchitecturecachememory-170927134432.pdf
computerarchitecturecachememory-170927134432.pdf
ssuserf86fba
 
CS304PC:Computer Organization and Architecture Session 14 data transfer and ...
CS304PC:Computer Organization and Architecture  Session 14 data transfer and ...CS304PC:Computer Organization and Architecture  Session 14 data transfer and ...
CS304PC:Computer Organization and Architecture Session 14 data transfer and ...
Asst.prof M.Gokilavani
 
Computer Organisation and Architecture (COA)
Computer Organisation and Architecture (COA)Computer Organisation and Architecture (COA)
Computer Organisation and Architecture (COA)
SwapnitaSrivastava1
 

Similar to CS304PC:Computer Organization and Architecture Session 29 Memory organization.pptx (20)

Computer System Architecture
Computer System ArchitectureComputer System Architecture
Computer System Architecture
 
Cache Memory.pptx
Cache Memory.pptxCache Memory.pptx
Cache Memory.pptx
 
Cache Memory.pptx
Cache Memory.pptxCache Memory.pptx
Cache Memory.pptx
 
Auxiliary, Cache and Virtual memory.pptx
Auxiliary, Cache and Virtual memory.pptxAuxiliary, Cache and Virtual memory.pptx
Auxiliary, Cache and Virtual memory.pptx
 
unit4 and unit5.pptx
unit4 and unit5.pptxunit4 and unit5.pptx
unit4 and unit5.pptx
 
COA notes
COA notesCOA notes
COA notes
 
lecture-2-3_Memory.pdf,describing memory
lecture-2-3_Memory.pdf,describing memorylecture-2-3_Memory.pdf,describing memory
lecture-2-3_Memory.pdf,describing memory
 
Computer System Architecture Lecture Note 8.2 Cache Memory
Computer System Architecture Lecture Note 8.2 Cache MemoryComputer System Architecture Lecture Note 8.2 Cache Memory
Computer System Architecture Lecture Note 8.2 Cache Memory
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
Virtual Memory vs Cache Memory
Virtual Memory vs Cache MemoryVirtual Memory vs Cache Memory
Virtual Memory vs Cache Memory
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Cache memory
Cache memoryCache memory
Cache memory
 
Advanced computer architechture -Memory Hierarchies and its Properties and Type
Advanced computer architechture -Memory Hierarchies and its Properties and TypeAdvanced computer architechture -Memory Hierarchies and its Properties and Type
Advanced computer architechture -Memory Hierarchies and its Properties and Type
 
Memory organization
Memory organizationMemory organization
Memory organization
 
Computer Memory Finder
Computer Memory FinderComputer Memory Finder
Computer Memory Finder
 
Memory Hierarchy
Memory HierarchyMemory Hierarchy
Memory Hierarchy
 
Computer architecture cache memory
Computer architecture cache memoryComputer architecture cache memory
Computer architecture cache memory
 
computerarchitecturecachememory-170927134432.pdf
computerarchitecturecachememory-170927134432.pdfcomputerarchitecturecachememory-170927134432.pdf
computerarchitecturecachememory-170927134432.pdf
 
CS304PC:Computer Organization and Architecture Session 14 data transfer and ...
CS304PC:Computer Organization and Architecture  Session 14 data transfer and ...CS304PC:Computer Organization and Architecture  Session 14 data transfer and ...
CS304PC:Computer Organization and Architecture Session 14 data transfer and ...
 
Computer Organisation and Architecture (COA)
Computer Organisation and Architecture (COA)Computer Organisation and Architecture (COA)
Computer Organisation and Architecture (COA)
 

More from Asst.prof M.Gokilavani

CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
Asst.prof M.Gokilavani
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Asst.prof M.Gokilavani
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdf
Asst.prof M.Gokilavani
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
Asst.prof M.Gokilavani
 
GE3151 PSPP UNIT IV QUESTION BANK.docx.pdf
GE3151 PSPP UNIT IV QUESTION BANK.docx.pdfGE3151 PSPP UNIT IV QUESTION BANK.docx.pdf
GE3151 PSPP UNIT IV QUESTION BANK.docx.pdf
Asst.prof M.Gokilavani
 
GE3151 PSPP UNIT III QUESTION BANK.docx.pdf
GE3151 PSPP UNIT III QUESTION BANK.docx.pdfGE3151 PSPP UNIT III QUESTION BANK.docx.pdf
GE3151 PSPP UNIT III QUESTION BANK.docx.pdf
Asst.prof M.Gokilavani
 
GE3151 UNIT II Study material .pdf
GE3151 UNIT II Study material .pdfGE3151 UNIT II Study material .pdf
GE3151 UNIT II Study material .pdf
Asst.prof M.Gokilavani
 
GE3151 PSPP All unit question bank.pdf
GE3151 PSPP All unit question bank.pdfGE3151 PSPP All unit question bank.pdf
GE3151 PSPP All unit question bank.pdf
Asst.prof M.Gokilavani
 
GE3151_PSPP_All unit _Notes
GE3151_PSPP_All unit _NotesGE3151_PSPP_All unit _Notes
GE3151_PSPP_All unit _Notes
Asst.prof M.Gokilavani
 
GE3151_PSPP_UNIT_5_Notes
GE3151_PSPP_UNIT_5_NotesGE3151_PSPP_UNIT_5_Notes
GE3151_PSPP_UNIT_5_Notes
Asst.prof M.Gokilavani
 
GE3151_PSPP_UNIT_4_Notes
GE3151_PSPP_UNIT_4_NotesGE3151_PSPP_UNIT_4_Notes
GE3151_PSPP_UNIT_4_Notes
Asst.prof M.Gokilavani
 
GE3151_PSPP_UNIT_3_Notes
GE3151_PSPP_UNIT_3_NotesGE3151_PSPP_UNIT_3_Notes
GE3151_PSPP_UNIT_3_Notes
Asst.prof M.Gokilavani
 
GE3151_PSPP_UNIT_2_Notes
GE3151_PSPP_UNIT_2_NotesGE3151_PSPP_UNIT_2_Notes
GE3151_PSPP_UNIT_2_Notes
Asst.prof M.Gokilavani
 
AI3391 Artificial intelligence Unit IV Notes _ merged.pdf
AI3391 Artificial intelligence Unit IV Notes _ merged.pdfAI3391 Artificial intelligence Unit IV Notes _ merged.pdf
AI3391 Artificial intelligence Unit IV Notes _ merged.pdf
Asst.prof M.Gokilavani
 
AI3391 Artificial intelligence Session 29 Forward and backward chaining.pdf
AI3391 Artificial intelligence Session 29 Forward and backward chaining.pdfAI3391 Artificial intelligence Session 29 Forward and backward chaining.pdf
AI3391 Artificial intelligence Session 29 Forward and backward chaining.pdf
Asst.prof M.Gokilavani
 
AI3391 Artificial intelligence Session 28 Resolution.pptx
AI3391 Artificial intelligence Session 28 Resolution.pptxAI3391 Artificial intelligence Session 28 Resolution.pptx
AI3391 Artificial intelligence Session 28 Resolution.pptx
Asst.prof M.Gokilavani
 
AI3391 Artificial intelligence session 27 inference and unification.pptx
AI3391 Artificial intelligence session 27 inference and unification.pptxAI3391 Artificial intelligence session 27 inference and unification.pptx
AI3391 Artificial intelligence session 27 inference and unification.pptx
Asst.prof M.Gokilavani
 
AI3391 Artificial Intelligence Session 26 First order logic.pptx
AI3391 Artificial Intelligence Session 26 First order logic.pptxAI3391 Artificial Intelligence Session 26 First order logic.pptx
AI3391 Artificial Intelligence Session 26 First order logic.pptx
Asst.prof M.Gokilavani
 

More from Asst.prof M.Gokilavani (20)

CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdf
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
 
GE3151 PSPP UNIT IV QUESTION BANK.docx.pdf
GE3151 PSPP UNIT IV QUESTION BANK.docx.pdfGE3151 PSPP UNIT IV QUESTION BANK.docx.pdf
GE3151 PSPP UNIT IV QUESTION BANK.docx.pdf
 
GE3151 PSPP UNIT III QUESTION BANK.docx.pdf
GE3151 PSPP UNIT III QUESTION BANK.docx.pdfGE3151 PSPP UNIT III QUESTION BANK.docx.pdf
GE3151 PSPP UNIT III QUESTION BANK.docx.pdf
 
GE3151 UNIT II Study material .pdf
GE3151 UNIT II Study material .pdfGE3151 UNIT II Study material .pdf
GE3151 UNIT II Study material .pdf
 
GE3151 PSPP All unit question bank.pdf
GE3151 PSPP All unit question bank.pdfGE3151 PSPP All unit question bank.pdf
GE3151 PSPP All unit question bank.pdf
 
GE3151_PSPP_All unit _Notes
GE3151_PSPP_All unit _NotesGE3151_PSPP_All unit _Notes
GE3151_PSPP_All unit _Notes
 
GE3151_PSPP_UNIT_5_Notes
GE3151_PSPP_UNIT_5_NotesGE3151_PSPP_UNIT_5_Notes
GE3151_PSPP_UNIT_5_Notes
 
GE3151_PSPP_UNIT_4_Notes
GE3151_PSPP_UNIT_4_NotesGE3151_PSPP_UNIT_4_Notes
GE3151_PSPP_UNIT_4_Notes
 
GE3151_PSPP_UNIT_3_Notes
GE3151_PSPP_UNIT_3_NotesGE3151_PSPP_UNIT_3_Notes
GE3151_PSPP_UNIT_3_Notes
 
GE3151_PSPP_UNIT_2_Notes
GE3151_PSPP_UNIT_2_NotesGE3151_PSPP_UNIT_2_Notes
GE3151_PSPP_UNIT_2_Notes
 
AI3391 Artificial intelligence Unit IV Notes _ merged.pdf
AI3391 Artificial intelligence Unit IV Notes _ merged.pdfAI3391 Artificial intelligence Unit IV Notes _ merged.pdf
AI3391 Artificial intelligence Unit IV Notes _ merged.pdf
 
AI3391 Artificial intelligence Session 29 Forward and backward chaining.pdf
AI3391 Artificial intelligence Session 29 Forward and backward chaining.pdfAI3391 Artificial intelligence Session 29 Forward and backward chaining.pdf
AI3391 Artificial intelligence Session 29 Forward and backward chaining.pdf
 
AI3391 Artificial intelligence Session 28 Resolution.pptx
AI3391 Artificial intelligence Session 28 Resolution.pptxAI3391 Artificial intelligence Session 28 Resolution.pptx
AI3391 Artificial intelligence Session 28 Resolution.pptx
 
AI3391 Artificial intelligence session 27 inference and unification.pptx
AI3391 Artificial intelligence session 27 inference and unification.pptxAI3391 Artificial intelligence session 27 inference and unification.pptx
AI3391 Artificial intelligence session 27 inference and unification.pptx
 
AI3391 Artificial Intelligence Session 26 First order logic.pptx
AI3391 Artificial Intelligence Session 26 First order logic.pptxAI3391 Artificial Intelligence Session 26 First order logic.pptx
AI3391 Artificial Intelligence Session 26 First order logic.pptx
 

Recently uploaded

CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
PuktoonEngr
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 

Recently uploaded (20)

CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 

CS304PC:Computer Organization and Architecture Session 29 Memory organization.pptx

  • 1. CS304PC:Computer Organization and Architecture (R18 II(I sem)) Department of computer science and engineering (AI/ML) Session 27 by Asst.Prof.M.Gokilavani VITS 3/21/2023 Department of CSE (AI/ML) 1
  • 2. TEXTBOOK: • 1. Computer System Architecture – M. Moris Mano, Third Edition, Pearson/PHI. REFERENCES: • Computer Organization – Car Hamacher, Zvonks Vranesic, Safea Zaky, Vth Edition, McGraw Hill. • Computer Organization and Architecture – William Stallings Sixth Edition, Pearson/PHI. • Structured Computer Organization – Andrew S. Tanenbaum, 4th Edition, PHI/Pearson. 3/21/2023 Department of CSE (AI/ML) 2
  • 3. Unit IV Input-Output Organization: Input-Output Interface, Asynchronous data transfer, Modes of transfer, Priority Interrupt Direct memory Access. Memory Organization: Memory Hierarchy, Main memory, Auxiliary memory, Associate memory, cache memory. 3/21/2023 Department of CSE (AI/ML) 3
  • 4. Topics covered in session 29 3/21/2023 Department of CSE (AI/ML) 4 Memory Organization Memory Hierarchy Main memory Auxiliary memory Associate memory cache memory.
  • 5. Memory Organization • Memory unit is an essential component in any digital computer since it is needed for storing programs and data. • The memory unit that communicates directly with the CPU is called the main memory. Devices that provide backup storage are called auxiliary memory. • Only programs and data currently needed by the processor reside in main memory. All other information is stored in auxiliary memory and transferred to main memory when needed. • The memory hierarchy consists of all storage devices employed in a computer system from the slow but high- capacity auxiliary memory to a relatively faster main memory, to an even smaller and faster cache memory accessible to the high-speed processing logic. 3/21/2023 5 Department of CSE (AI/ML)
  • 6. Memory Organization • The main memory occupies a central position by being able to communicate directly with the CPU and with auxiliary memory devices through an I/O processor. • Access time of CPU and main memory are different. So, to co- ordinate the speed between these, a fast memory is needed called as cache memory. • While the I/O processor manages data transfer between auxiliary memory and main memory, the cache organization is concerned with the transfer of information between main memory and CPU. • As the storage capacity of the memory increases, the cost per bit for storing binary information decreases and the access time of the memory becomes longer. • The auxiliary memory has a large storage capacity, is relatively inexpensive, but has low access speed compared to main memory. 3/21/2023 6 Department of CSE (AI/ML)
  • 7. Memory Organization • The cache memory is very small, relatively very small, relatively expensive, and has very high access speed. • CPU has direct access to both cache and main memory but not to auxiliary memory. The transfer from auxiliary to main memory is usually done by means of direct memory access of large blocks of data. • Many OS are designed to enable the CPU to process a number of independent programs concurrently. 3/21/2023 7 Department of CSE (AI/ML)
  • 8. Memory Organization • This concept, called multiprogramming, refers to the existence of two or more programs in different parts of memory hierarchy at the same time. • In this way, it is possible to keep all parts of the computer busy by working with several programs in sequence. • The part of the computer system that supervises the flow of information between auxiliary memory and main memory is called memory management system. 3/21/2023 8 Department of CSE (AI/ML)
  • 9. 3/21/2023 Department of CSE (AI/ML) 9
  • 10. Main Memory • The main memory is the central storage unit in a computer system. • It is a relatively large and fast memory used to store programs and data during the computer operation. • Integrated circuit RAM chips are available in two possible modes: • static • dynamic • The static RAM consists essentially of internal flip-flops. • The stored information remains valid as long as power is applied to the unit. 3/21/2023 10 Department of CSE (AI/ML)
  • 11. Dynamic Main Memory • The dynamic RAM stores the binary information in the form of electric charges that are applied to capacitors. • The capacitors are provided inside the chip by MOS transistors. • The stored charge on the capacitor tends to discharge with time and the capacitors must be periodically recharged by refreshing the dynamic memory. • The dynamic RAM offers reduced power consumption and larger storage capacity in a single memory chip. 3/21/2023 11 Department of CSE (AI/ML)
  • 12. Main Memory • Most of the main memory in a general-purpose computer is made up of RAM integrated circuit chips, but a portion of the memory may be constructed with ROM chips. • RAM is used for storing the bulk of the programs and data that are subject to change. • ROM is used for storing programs that are permanently resident in the computer and for tables of constants that do not change in the value once the production of the computer is completed. • Among other things, the ROM portion of main memory is needed for storing an initial program called as bootstrap loader. • The bootstrap loader is a program whose function is to start the computer software operating when power is turned on. 3/21/2023 12 Department of CSE (AI/ML)
  • 13. Main Memory • RAM and ROM chips – RAM and ROM chips are available in a variety of sizes. If we need larger memory for the system, it is necessary to combine a number of chips to form the required memory size. • RAM Chips • A RAM chip is better suited to communicate with CPU if it has one or more control inputs that select the chip only when needed. The block diagram of a RAM chip is shown below: 3/21/2023 13 Department of CSE (AI/ML)
  • 14. 3/21/2023 Department of CSE (AI/ML) 14
  • 15. 3/21/2023 Department of CSE (AI/ML) 15
  • 16. Memory Address Map • The addressing of memory can be established by means of a table that specifies the memory address assigned to each RAM or ROM chip. • This table is called memory address map and is a pictorial representation of assigned address space for particular chip. • Example: Suppose computer system needs 512 bytes of RAM and 512 bytes of ROM. 3/21/2023 16 Department of CSE (AI/ML)
  • 17. 3/21/2023 Department of CSE (AI/ML) 17 •We use four 128 words RAM to make 512 byte size. • Hexadecimal address column assigns a range of addresses for each chip. •10 lines in address bus column: lines 1 through 7 for RAM and 1 through 9 for ROM. •Distinction between RAM and ROM chip is made by line 10. •When line 10 is 1, it selects ROM and when it is 0, CPU selects RAM. •X’s represents a binary number ranging from all-0’s to all-1’s.
  • 18. Associative Memory • Also called as Content-addressable memory (CAM), associative storage, or associative array . • Content-addressed or associative memory refers to a memory organization in which the memory is accessed by its content (as opposed to an explicit address). • It is a special type of computer memory used in certain very high speed searching applications. 3/21/2023 18 Department of CSE (AI/ML)
  • 19. Associative Memory • If the data word is found, the CAM returns a list of one or more storage addresses where the word was found. • CAM is designed to search its entire memory in a single operation. • It is much faster than RAM in virtually all search applications. • An associative memory is more expensive than RAM, as each cell must have storage capability as well as logic circuits for matching its content with an external argument. • Associative memories are used in applications where the search time is very critical and short. • Associative memories are expensive compared to RAMs because of the add logic associated with each cell. 3/21/2023 19 Department of CSE (AI/ML)
  • 21. 3/21/2023 Department of CSE (AI/ML) 21
  • 22. Cache Memory • Cache (pronounced cash) memory is extremely fast memory that is built into a computer’s central processing unit (CPU), or located next to it on a separate chip. • The CPU uses cache memory to store instructions that are repeatedly required to run programs, improving overall system speed. • The advantage of cache memory is that the CPU does not have to use the motherboard’s system bus for data transfer. 3/21/2023 Department of CSE (AI/ML) 22
  • 23. cache mapping techniques • A cache is a small amount of very fast associative memory. • It sits between normal main memory and CPU. • When CPU needs to access contents of memory location, then cache is examined for this data. • If present, get from cache (fast). • If not present, read required block from main memory to cache, then deliver from cache to CPU. • The performance of cache memory is frequently measured in terms of a quantity called hit ratio. 3/21/2023 Department of CSE (AI/ML) 23
  • 24. Cache mapping techniques 3/21/2023 Department of CSE (AI/ML) 24
  • 25. Cache mapping techniques • The process of transferring the data from main memory to cache is known as mapping process. • There are three types of cache mapping techniques: • Associative mapping • Direct mapping • Set-associative mapping 3/21/2023 Department of CSE (AI/ML) 25
  • 26. Example • The main memory can store 32K words of 12 bits each. • The cache is capable of storing 512 of these words at any given time. • For every word stored in cache, there is a duplicate copy in main memory. • The CPU communicates with both memories. • It first sends a 15-bit address to cache. • If there is a hit, the CPU accepts the 12-bit data from cache. • If there is a miss, the CPU reads the word from main memory and the word is then transferred to cache. 3/21/2023 Department of CSE (AI/ML) 26
  • 27. Associative mapping • Associative memory Stores both address and data content in memory word. 3/21/2023 Department of CSE (AI/ML) 27
  • 28. Direct Mapping • The CPU address of 15 bits is divided into two fields. The nine least significant bits constitute the index field and the remaining six bits form the tag field. 3/21/2023 Department of CSE (AI/ML) 28
  • 29. Direct Mapping • The n bit memory address is divided into two fields: • k bits for the index field • n-k bits for the tag field. • The direct mapping cache organization uses the n bit address to access the main memory and the k bit index to access the cache. • The number of bits in the index field is equal to the number of address bits required to access the cache memory. 3/21/2023 Department of CSE (AI/ML) 29
  • 30. 3/21/2023 Department of CSE (AI/ML) 30
  • 31. Direct Mapping • The tag field of the CPU address is compared with the tag in the word read from the cache. • If the two tags match, there is a hit and the desired data word is in cache. • If there is no match, there is a miss and the required word is read from main memory. • It is then stored in the cache together with the new tag, replacing the previous value. • The disadvantage of direct mapping is that two words with the same index in their address but with different tag values cannot reside in cache memory at the same time. 3/21/2023 Department of CSE (AI/ML) 31
  • 32. Set-Associative Mapping • It is an improvement over the direct mapping organization in that each word of cache can store two or more words of memory under the same index address. • The most common replacement algorithms used are: random replacement, first in first out (FIFO), and least recently used (LRU) 3/21/2023 Department of CSE (AI/ML) 32
  • 33. Set-Associative Mapping • The words stored at addresses 01000 and 02000 of main memory are stored in cache memory at index address 000. Similarly, the words at addresses 02777 and 00777 are stored in cache at index address 777. • When a miss occurs in a set associative cache and the set is full, it is necessary to replace one of the tag data items with a new value. 3/21/2023 Department of CSE (AI/ML) 33
  • 34. Virtual memory • A virtual memory system attempts to optimize the use of the main memory (the higher speed portion) with the hard disk (the lower speed portion). • Virtual memory gives programmers the illusion that they have a very large memory and provides mechanism for dynamically translating program- generated addresses into correct main memory locations. • The translation or mapping is handled automatically by the hardware by means of a mapping table. 3/21/2023 Department of CSE (AI/ML) 34
  • 35. Topics to be covered in next session 30 • RISC 3/21/2023 Department of CSE (AI/ML) 35 Thank you!!!