The document discusses memory organization and hierarchy. It describes how main memory directly communicates with the CPU while auxiliary memory provides backup storage. It discusses cache memory which stores frequently used data to improve performance. The three types of cache mapping are associative, direct, and set-associative mapping. Virtual memory allows programs to access memory addresses as if a larger memory was available by translating virtual to physical addresses.
Digital Logic & Computer Design (2th Ed.)
By Morris Mano
Contents Ch 7 - Ch 12
Published By: Muhammad Hassan Riaz Yousufi
for video Lectures :
http://sh.st/Qsql9
Digital Logic & Computer Design (2th Ed.)
By Morris Mano
Contents Ch 7 - Ch 12
Published By: Muhammad Hassan Riaz Yousufi
for video Lectures :
http://sh.st/Qsql9
This slide provide the introduction to the computer , instruction formats and their execution, Common Bus System , Instruction Cycle, Hardwired Control Unit and I/O operation and handling of interrupt
This slide contain the description about the various technique related to parallel Processing(vector Processing and array processor), Arithmetic pipeline, Instruction Pipeline, SIMD processor, Attached array processor
This slide provide the introduction to the computer , instruction formats and their execution, Common Bus System , Instruction Cycle, Hardwired Control Unit and I/O operation and handling of interrupt
This slide contain the description about the various technique related to parallel Processing(vector Processing and array processor), Arithmetic pipeline, Instruction Pipeline, SIMD processor, Attached array processor
Abhaycavirtual memory and the pagehit.pptxwemoji5816
in this ppt we are learning about the concept of the virtual memory incomputer science with the help of which we run large program in less primary memory
Unit III
STORAGE MANAGEMENT
Main Memory-Contiguous Memory Allocation, Segmentation, Paging, 32 and 64 bit architecture Examples; Virtual Memory- Demand Paging, Page Replacement, Allocation, Thrashing; Allocating Kernel Memory, OS Examples.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Memory organization
1. Unit 4 - Memory Organization
Abhineet Anand
Computer Science and Engg. Department
University of Petroleum and Energy Studies, Dehradun
November 30, 2012
Abhineet Anand (UPES, Dehradun)
Unit 4 - Memory Organization
November 30, 2012
1 / 19
2. Outline
1
Introduction
Memory
Memory Hierarchy
Memory Management System
2
Main Memory
3
Auxiliary Memory
4
Associative Memory
5
Cache Memory
Characteristic of Cache Memory
Associative Mapping
Direct Mapping
Set- Associative Mapping
6
Virtual Memory
Abhineet Anand (UPES, Dehradun)
Unit 4 - Memory Organization
November 30, 2012
2 / 19
3. Memory
The memory that communicates directly with CPU is called main
memory.
Devices that provides backup storage are called auxiliary memory.
Only program and data currently needed by the processor resides in
main memory.
All other information is stored in auxiliary memory and transferred to
main memory when needed.
Abhineet Anand (UPES, Dehradun)
Unit 4 - Memory Organization
November 30, 2012
3 / 19
5. CPU Register - also known as Internal Processor Memory. The data
or instruction which has to be executed are kept in these registers.
The Cache Memory is employed in computer system to compensate
for the speed differential between main memory access time and
processor logic.
The cache is used for storing segments of programs currently being
executed in the CPU and temporary data frequently needed in the
present calculations.
By making program and data available at a rapid rate, it is possible to
increase the performance rate of the computer.
Abhineet Anand (UPES, Dehradun)
Unit 4 - Memory Organization
November 30, 2012
5 / 19
6. Memory Management System
Many operating system are designed to enable the CPU to process a
number of independent programs concurrently - known as
multiprogramming.
Sometimes a program are too long to be accommodated in total
space available in main memory. A program with its data normally
resides in auxiliary memory.
When the program or a segment of program is to be executed, it is
transfered to main memory to be executed by the CPU.
The part of the computer system that supervise the flow of
information between auxiliary memory and main memory is called the
memory management system.
Abhineet Anand (UPES, Dehradun)
Unit 4 - Memory Organization
November 30, 2012
6 / 19
7. Main Memory
The principal technology used for main memory is based on
semiconductor integrated circuit.
The Integrated circuit chips are available in two possible operating
modes:
Static
Dynamic
The Static RAM consists essentially of internal flip-flop that store the
binary information.
The dynamic RAM stores the binary information in form of electronic
charges that are applied to capacitors.
The stored charge on the capacitor tend to discharge with time and
the capacitors must be periodically recharged by refreshing the
dynamic memory.
The static RAM is easier to use and has shorter read and write cycles
and used in cache.
The dynamic RAMs are used for implementing the main memory.
Abhineet Anand (UPES, Dehradun)
Unit 4 - Memory Organization
November 30, 2012
7 / 19
8. Auxiliary Memory
The Most common auxiliary memory devices used in computer
system are magnetic disk and tapes.
Other components used, but not as frequently, are magnetic drums,
magnetic bubble memory, and optical disks.
The average time required to reach a storage location in memory and
obtain its contents is called the access time.
In electromechanical devices with moving parts such as disks an
tapes, the access time consists of seek time required to position the
read-write head to a location and a transfer time required to transfer
data to or from the devices.
Abhineet Anand (UPES, Dehradun)
Unit 4 - Memory Organization
November 30, 2012
8 / 19
9. Associative Memory
An assembler program searches the symbol address table in order to
extract the symbol’s binary equivalent.
The number of accesses to memory depends on the location of the
item and the efficiency of search algorithm.
Many search algorithm have been developed to minimize the number
of access while searching for an item in a random or sequential
access memory.
The time required to find an item stored in memory can be reduced
considerably if stored data can be identified by the content of the data
itself rather than an address.
A memory unit accessed by content is called an associative memory
or content addressable memory(CAM).
Abhineet Anand (UPES, Dehradun)
Unit 4 - Memory Organization
November 30, 2012
9 / 19
10. Associative Memory
This type of memory is accessed simultaneously and in parallel on
the basis of data content rather then by specific address or location.
When a word is written in an associative memory, no address is
given. The memory is capable of finding an empty unused location to
store the word.
When a word is to be read from an associative memory, the content
of the word, or part of the word, is specified. The memory locates all
words which match the specified content and marks them for reading.
An associative memory is more expensive than a random access
memory, so are used in application where the search time is very
critical and must be very short.
Abhineet Anand (UPES, Dehradun)
Unit 4 - Memory Organization
November 30, 2012
10 / 19
11. Cache Memory
A typical computer program flows in a straight-line fashion with
program loops and subroutine calls encountered frequently.
Analysis of a large number of typical programs has been shown that
the reference to memory at any given interval of time tend to be
confined within a few localized areas in memory. This phenomenon is
known as the property of locality of reference.
If the active portions of the program and data are placed in a fast
small memory, the average memory access time can be reduced,
thus reducing the total execution time of program. Such memory is
known as Cache memory.
Abhineet Anand (UPES, Dehradun)
Unit 4 - Memory Organization
November 30, 2012
11 / 19
12. Cache Memory
The Performance of cache memory is frequently measured in terms
of a quantity called hit ratio.
When the CPU refers to memory and finds the word in cache, it is
said to produce a hit.
If the word is not found in cache, it is in main memory and it counts as
a miss.
Abhineet Anand (UPES, Dehradun)
Unit 4 - Memory Organization
November 30, 2012
12 / 19
13. Characteristic of Cache Memory
The basic characteristic of cache memory is its fast access time.
The transformation of data from main memory to cache memory is
referred to as a mapping process.
Three types of mapping procedures are:
Associative Mapping
Direct Mapping
Set-associative Mapping
Abhineet Anand (UPES, Dehradun)
Unit 4 - Memory Organization
November 30, 2012
13 / 19
14. Associative Mapping
The fastest and most flexible cache organization uses an associative
memory.
The associative memory stores both the address and content (data)
of the memory word.
If the address is found corresponding data is read otherwise main
memory is accessed for the word.
It is expensive compared to random-access memories because of the
added logic associated with each cell.
Abhineet Anand (UPES, Dehradun)
Unit 4 - Memory Organization
November 30, 2012
14 / 19
16. Direct Mapping
The n-bit memory address is divided into two Fields: k-bits for the
index field and n-k bits for the tag field.
The direct mapping cache organization uses the n-bit address to
access the main memory and the k-bit index to access the cache.
Each word in cache consists of the data word and its associated tag.
When a new word is first brought into the cache, the tag bits are
stored alongside the data bits.
When the CPU generates a memory request, the index field is used
for the address to access the cache.
The tag field of the CPU address is compared with the tag in the word
read from cache.
If the two tags match, there is a hit and the required word is read from
cache otherwise it is read from main memory.
Abhineet Anand (UPES, Dehradun)
Unit 4 - Memory Organization
November 30, 2012
16 / 19
17. Set- Associative Mapping
In Direct mapping, every time a miss occurs, an entire block of words
must be transfered from main memory to cache memory.
Another disadvantage of direct mapping is that two words with the
same index in their address but with different tag values cannot reside
in cache memory at same time.
A third type of cache organization, called set-associative mapping, in
which each word of cache can store two or more words of memory
under the same index address.
Each data word is stored together with its tag and the number of
tag-data items in one word of cache is said to from a set.
Abhineet Anand (UPES, Dehradun)
Unit 4 - Memory Organization
November 30, 2012
17 / 19
18. Virtual Memory
In a memory hierarchy system, program and data are first stored in
auxiliary memory.
Portion of a program or data are brought into main memory as they
are needed by the CPU.
Virtual Memory is a concept used in some large computer systems
that permit the user to construct programs as though a large memory
space were available, equal to the totality of auxiliary memory.
A virtual memory system provides a mechanism for translating
program-generated addresses into correct main memory locations.
An address used by a programmer will be called a virtual address,
and set of such addresses the address space.
An address in main memory is called a location or physical address
and the set of such addresses is called memory space.
Abhineet Anand (UPES, Dehradun)
Unit 4 - Memory Organization
November 30, 2012
18 / 19
19. THANK YOU
Abhineet Anand (UPES, Dehradun)
Unit 4 - Memory Organization
November 30, 2012
19 / 19