SlideShare a Scribd company logo
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
129
NVRAM APPLICATIONS IN THE ARCHITECTURAL
REVOLUTIONS OF MAIN MEMORY IMPLEMENTATION
– A MEMRISTOR WALKTHROUGH
Hitha Paulson1
, Dr. Rajesh R2
1
Research Scholar, Bharathiar University, Coimbatore
1
Assistant Professor, Dept of Computer Science, Little Flower College, Guruvayoor, Kerala
2
Professor, Dept. of Computer Applications ,Sree Narayana Gurukulam College of Engineering, Kadayiruppu P.O,
Kolenchery, Ernakulam dist., Kerala
ABSTRACT
A machine of storage, a machine to compute, a machine to envisage, a magical machine of job parallelization
all these describing expressions are not enough to picturise the inevitability of a valuable machine – The Computer. The
feature of save and retrieve contributed much to the expert working of the system. The volatile and non-volatile levels of
storage have been years long-standing foundation of most computer systems and have influenced the design of system
concepts. The volatility and the random accessibility feature of the main memory have many pros and corns. The
complex concepts of booting, demand paging and virtual memory happened due to the above features. The discovery of
Memristor components contributed to the capability of maintaining non volatility in random accesses mode. This paper
inspects the issues why RAM is volatile?, possibilities of persistent main memory, software enhancements, Memristor
applications and alternatives in the area of memory architecture.
Keywords: DRAM, Memristor, Non-Volatile Memory, Persistent Main Memory, PRAM.
1. INTRODUCTION
It is a decades long belief that the fast memory is volatile and persistent storage is slow. The boom to remember
and retrieve, initiated research in the computer field to contribute various storage systems. The earlier forms of memory,
magnetic tape and disk laid the basic foundation of storage.
The limitation of the Microprocessor and Operating System in the wide range of memory accessibility aroused a
need of small primary memory and large secondary memory. Since the primary memory demanded with a fast access it
was implemented with RAM modal. This Random Access Memory stores the information about programs which are
currently running. RAM is a solid state memory unit. It is faster than writing and reading information from the hard drive
because it has no physical components that need to move, just electrical signals. In secondary storage we have to wait for
the platters to rotate and the header to move. Only sequential bits can be read without additional operations in between.
The volatility and the random accessibility feature of the main memory have many pros and corns. The complex
concepts of booting, demand paging and virtual memory happened due to the above features. Today we watch the
appearance of many new memory technologies that pledge a noteworthy change in the long way existence of present
memory systems. Memristors (Memory Resistors) offers a capable alternative to conventional volatile memory systems.
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 5, Issue 12, December (2014), pp. 129-133
© IAEME: www.iaeme.com/IJCET.asp
Journal Impact Factor (2014): 8.5328 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
130
According to the International Technology Road-Map for Semiconductors (ITRS), current memory technologies (DRAM,
SRAM and NAND Flash) will soon be facing design challenges related to their continued scaling down [1]
The following sections discuses the concepts and the pros and corns of volatile and nonvolatile memory
implementations, the classical role of Memristor technology and the proposed architectural alterations.
2. HOW AND WHY OF RAM VOLATILITY
The need of Random Accessibility suggested a technique of having a temporary storage with the size permitted
by the supporting system elements and has a simple architecture where the data needs constant refreshment for storage.
The access time in RAM is independent of the storage location ie the access is independent of the address of the word.
The symmetry in the speed of read and write cycles is the major advantage noticed. Because of the volatility data stored
in a RAM is lost when the power is switched off. Hence a backup (UPS) is often used with computers.
2.1 Static Random Accesses Memory
Here the contents are retained as long as the power remains, how ever the contents are lost when power gets
down. It makes use of transistor matrixes (around 4 to 6 for each memory cell) for the storage of data and not to be
refreshed on a regular basis. Because of the inner architecture it has long data life time, is faster, less chance of
information loss but, expensive, less dense and has high power consumption.
2.2 Dynamic Random Accesses Memory
Unlike SRAM, this is made up of memory cells composed of one capacitor and one transistor which must be
continually refreshed (with in 15 nano seconds) in order for it to maintain the data. The architecture contributes to less
power consumption, less expensive, highly dense but, short data life time and slower than SRAM.
Because of the features listed above DRAMs stands as the implementing units of system RAM and SRAM is
used to implement cache memories.
2.3 Advantages of Volatility
Because of the inner architecture volatile cells doesn’t wearout, ie.. the cells support unlimited read write cycles.
Volatility can protect sensitive information, which becomes unavailable on power-down. Volatile RAMs are vulnerable
to malicious access only while powered.
3. LIMITATIONS OF EXISTING MEMORY TECHNOLOGY
Being a most influential factor in system performance, memory system becomes a major designing issue in
computer system development. The major level of classiness gained by the modern memory technology is mainly
attained from the process predicted by Gordon Moore in 1965.The Moore’s Law states that the number of devices that
can be integrated on a chip of fixed area would double every 12 months (later amended to doubling every 18 – 24
months). This made the prediction of near future dependable. But as the number of components increased the heat energy
dissipation increased at a higher rate and become a major hindrance to memory technology design.
A major issue of the coming future is the DRAM approaches physical limits that might restrict its growth in the
coming decades [2].DRAMS are not only placing charge in a storage capacitor, but also alleviate sub-threshold charge
leakage through the access device[2].Thus capacitors and transistors must be large enough to cope with the situation. In
this context predictions state that DRAM will face scaling limitations as the attribute size continuous decreasing [3].
DRAMS are also responsible for the major energy consumption in a computer system.
Because of these limitations, a major research is going on in the area of memory alternatives and has suggested
some successful alternatives even though some of them are not commercially available.
4. PROMISING NON VOLATILE MEMORY TECHNOLOGIES
There are many challenging non volatile memories reported, which aims at fulfilling the dream of a non-volatile,
byte addressable memory , which will almost as fast to access as a DRAM. Here we would like to mention the admirable
role of three of them – Phase Change Memory, Memristor and Spin Torque Transfer RAM.
Phase Change RAM also known as PRAM or PCM is based on some materials called Phase Change Materials
that exist in two different phases with distinct properties: an amorphous state, characterized by high electrical sensitivity
and a crystalline phase, characterized by low electrical sensitivity. The phases can be repeatedly and rapidly cycled by
applying heat (by injecting current) to the material [4].PRAM reported almost the same read latency as that of a DRAM,
but the write latency is around 3 times as that of a DRAM, it consumes an average of 45.5 % less energy than DRAM
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
131
[2].The current write endurance varies around 108
and is a reasonable limit when compared to the features reported.
PCMs storage density is better than that of DRAM.
The Memristor, which was described by Chua in 1971, is generally thought of as the fourth of the two terminal
basic passive elements, along with resistor, capacitor and inductor [1]. The first reported passive implementation of the
Memristor was the TiO2 based devised introduced by HP in 2008 [1]. Compared with PRAM, Memristors reported better
performance. The fabrication and features will be discussed in detail in the coming sections.
Spin Torque Transfer RAM use magnetic properties of certain materials and electric charges to enable states of
different states in memory cells [5]. Based on the Giant Magneto Resistance (GMR) phenomenon STTRAM stands out
as one among the right candidate to computer memory. Magnetization orientations manipulated through an external
magnetic field determines spin polarized electron transport, leading to low and high resistance states in GMR devices. It
is the spin-based explanation for GMR that has led to a practical structure “spin valve” used in various GMR devices [6].
The spin-transfer effect of the GMR occurs for electron current flowing through two ferromagnetic layers separated by a
thin nonmagnetic spacer layer. This lowers the current needed to write the cell.
The main advantage of this is the potential for unlimited write cycles. But they lack, a reliable shrinked cell size.
These competing technologies promise a major revolution in the memory design. PCM has been experimentally
used in many applications but the other two are farther from production.
5. PROS AND CORNS OF NONVOLATALITY
The accessibility without reloading in main memory level is something that has never been possible before.
Certain dedicated systems can make use of this feature very effectively. The recurrently accessed executables can avoid
the load time which proportionally affects the execution time.
The main advantage of NVRAMS is its nonvolatality itself. It avoids the complex refreshing circuits and the
refreshing time. Certain Non volatile architectures can even contribute to avoidance of complex concepts like booting,
paging and swapping. Another advantage is the latency for reading/writing NVM cells which tends to be much higher
than DRAM [2]. Normally Non volatile memories have higher dynamic power consumption than DRAM , but
insignificant static power consumption. Some studies estimated that they can increase overall memory energy efficiency
even up to 65% [7]. Since energy and heat are interrelated Thermal competence can also be achieved. Certain NVRAMs
even reported to be denser than DRAMs.
Even though the new memory suggestions are revolutionary there are certain features need to be addressed
seriously. The limitations for read/write cycles because of the wear out nature of NVRAMs are an issue to be addressed.
Since certain architectures keep only one copy of the data under execution erroneous writes can cause permanent data
loss. Issues related with security are also to be considered. Nonvolatility can’t protect sensitive information, which
becomes available on power-down. NonVolatile RAMs are vulnerable to malicious access even while unpowered.
Another major issue is regarding the portability. Now a days drives can be physically removed and mounted to another
computer, since the file system formats are independent of the computer configuration. NVRAM based systems may
loose this property because they may contain non portable architecture related with memory [10].
6. ROLE OF MEMRISTORS
As mentioned earlier, Memristors are generally consists of a thin film of oxide sandwiched between two metal
contacts. Recent works demonstrated the ability for titanium dioxide based memristors to be deposited from solution at
room temperature by using a sol gel technique on a flexible polymer substrate [8].
The integration of memristors with traditional flexible devices(such as thin film organic, zinc oxide or
amorphous-Si transistors) may enable the realization of a new paradigm in computing technology through light weight ,
inexpensive , flexible electronics[8].
Memristors are fabricated as a high density cross bar architecture. Memristor devices are located at each
intersection between two bars. In this two terminal device the resistance depends on the magnitude and polarity of the
voltage applied to it and the length of time that voltage has been applied. When the voltage is turned off, the memristor
remembers its most recent resistance until the next time it is turned on[9]. The Memristor memory is 4x as dense as the
harddisk drive and 23x as dense as DRAM [1]. The current reading and writing speeds are slower than DRAM and
SRAM, but are very fast compared to flash memories. HP Labs offer a major research in this area.
The main advantage reported by Memristor is its symmetry in read write latency time, which makes it a right
candidate than PCRAM for the replacement of current memory techniques. PCRAM reported much variation in read
write latency which is intolerable.
As per the news paper reports , at its HP Discover conference in Las Vegas , during June 2014, HP announced
an ambitious plan to use memristors to build a system, called simply "The Machine," shipping as soon as the end of the
decade. By 2016, the company plans to have memristor-based DIMMs, which will combine the high storage densities of
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
132
hard disks with the high performance of traditional DRAM. Bloomberg Business week reports that work on The Machine
started two years ago and they were in need of about 75 percent of HP Labs' staff to be working on the project.
7. ARCHITECTURE ALTERATIONS
We will now look into some possible architectural alternations that can be made by NVRAM technology.
A simple alternative is illustrated in figure 1. The model proposes a method where the volatile memory is
replaced by any of the non volatile memory suggestions. Certain dedicated systems will get more advantage from the
model. Programs which are used very frequently will always be there when the system is up. Time of booting and
loading can be avoided. Virtual memory, demand paging and relocation remains the same.
Figure 1: Replacing DRAM
Another simple alternative is to replace the disk with any of the non volatile memory alterations, by keeping the
volatile RAM as it is. The model is illustrated in figure 2. In this model the advantages of the new nonvolatile techniques
helps in system improvement. The external memory works with the same speed as that of the volatile RAM, which adds
much to the system performance. The presence of DRAM helps in supporting the system from errorous writes and
security attacks.
Figure 2: Replacing Disk
Systems are unlikely to abandon DRAM.: Because of the wear out and slow –write limitations of NVRAM we
assume that at least for write intensive workloads, systems will instead use a combination of DRAM and NVRAM,
implementing the best properties of each [5]. In the third model, illustrated in figure 3, the NVRAM is moved to the
same address space as that of a DRAM. So the CPU can address a volatile and a non volatile memory at the same time.
Figure 3: Shared Memory
An implementation of a system with no volatile memory, but will work with the speed of a DRAM is a dream to
come true. Even though more research is needed in this area, the present realizations imply a fast implementation of this.
Figure 4 shows the single memory implementation. This also points to a possibility of implementing a higher addressable
RAM, than that is supported by the underlying technologies. Rather than keeping a constant area as main memory, a
dynamic implementation of main memory is anticipated.
Figure 4: Single Memory Implementation
8. SOFTWARE SUPPORT
Since software being an unavoidable part of hardware implementation, much care is needed in the design of
operating systems for non volatile memory implementations. Research is going on in this area with the support of Linux
open source code. Certain points have to be remembered while designing such a supporting software layer.
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
133
• In certain architectures discussed earlier the OS should take care of paging used to map both volatile and non
volatile memory.
• Even though the memory is designed as nonvolatile, many supporting volatile structures are still there: the cache,
TLBs, Registers, Page tables etc..they need to be addressed seriously by an OS.
• To restore persistent application state, a process must be able to map the same non-volatile memory pages
across machine reboots. Therefore, operating systems must provide a way to identify groups of pages under a
persistent namespace [5].
• Since the nonvolatile memories have the nature of wearing out, OS should take nececcery actions to avoid
unnecessary memory writes.
• System architecture which uses both volatile and nonvolatile implementations in a RAM should take care of
which pages should migrate to NVRAM and which to DRAM.
• There should be proper synchronization mechanisms to cope up with the speed of these varying technologies in
a same RAM environment.
• In single memory implementation model, much care is needed in designing OS, since Rather than keeping a
constant area as main memory, a dynamic implementation of main memory is anticipated.
• Special security modules are needed to be implemented in OS design since the data is vulnerable to attacks
even when the power is off.
• File systems for non volatile memory architecture is a recent topic of research. BPFS: Basic Parallel File System
file system designed for byte-addressable, persistent memory technologies is still predicted on a computer with
two levels of physical storage: it does not consider how storage should be organized on a system with only
nonvolatile memory [10]. This area needs more attention.
9. CONCLUSION
This paper discussed the advantages and the disadvantages of the present system memory implementations and
reviewed the possibilities of non volatile RAMs. Even though the possibilities in NVRAM technologies are revolutionary
many serious issues are there to be addressed. The paper discussed the role of the major upcoming NVRAM technology,
Memristor. The architectural alterations possible, points to a ground-breaking era in system implementation.
REFERENCES
[1] Mohammed Affan Zidan, Hossam Aly Hassan Fahmy, Muhammad Mustafa Hussain, Khaled Nabil Salama ,
Memristor-based memory: The sneak paths problem and Solutions” Microelectronics Journal, Volume 44,
Issue 2, February 2013, Pages 176-183.
[2] Taciano Perez, Ney Laert Vilar Calazans, and César A. F. De Rose, “A preliminary study on system-level
impact of persistent main memory”, 13th International Symposium on Quality Electronic Design (ISQED),
IEEE, March 2012, page 84-90.
[3] B.C. Lee, E. Ipek, O. Mutlu, and D. Burger, Architecting phase change memory as a scalable dram alternative,”
ACM SIGARCH Computer Architecture news, vol. 37, no. 3, pp. 2–13, 2009.
[4] S. Raoux, GW Burr, MJ Breitwisch, CT Rettner, Y.C. Chen, RM Shelby, M. Salinga, D. Krebs, S.H. Chen, H.L.
Lung, et al., “Phase-change random access memory: A scalable technology,” IBM Journal of Research and
Development, vol. 52, no. 4.5, pp. 465–479, 2010.
[5] J. Moraru, D. Andersen, M. Kmainsky, N. Binkert, N. Tolia, R. Munz, and P. Ranganathan. “Persistent,
protected and cached: Building blocks for main memory data stores”. In CMU Parallel Data Lab Trechnical
Report, CMU-PDL-11-114, Dec. 2011.
[6] Y. Huai, "Spin-Transfer Torque MRAM (STT-MRAM): Challenges and Prospects," AAPPS Bulletin, Vol 18,
No:6, Page 33 , December 2008.
[7] T. Perez and C.A.F. De Rose, “Non-Volatile Memory: Emerging Technologies and Their Impacts on Memory
Systems (TR- 060),” Tech. Rep., Faculdade de Inform´atica, Pontifıcia Universidade Cat´olica do Rio Grande
do Sul (PUCRS), 2010.
[8] Gergel-Hackett, Nadine; Tedesco, Joseph L.; Richter, C.A, "Memristors With Flexible Electronic Applications,"
Proceedings of the IEEE , vol.100, no.6, pp.1971,1978, June 2012.
[9] R.S. Williams, “How we found the missing memristor,” IEEE spectrum, vol. 45, no. 12, pp. 28–35, 2008.
[10] Katelin Bailey , Luis Ceze , Steven D. Gribble, Henry M. Levy, “Operating system implications of fast, cheap,
non-volatile memory”, Proceedings of the 13th USENIX conference on Hot topics in operating systems,
May 09-11, 2011, Napa, California.
[11] El Khadiri Mohamed, El Fazziki Abdelaziz, “Extended Corporate Memory and Workflow Systems”,
International Journal of Information Technology and Management Information Systems (IJITMIS), Volume 3,
Issue 1, 2012, pp. 15 - 25, ISSN Print: 0976 – 6405, ISSN Online: 0976 – 6413.

More Related Content

What's hot

Challenges of emerging memory memristor.
Challenges of emerging memory memristor.Challenges of emerging memory memristor.
Challenges of emerging memory memristor.
Remy Lumin
 
Chapter 2 pc
Chapter 2 pcChapter 2 pc
Chapter 2 pc
Hanif Durad
 
151 A SURVEY OF DIFFERENT APPROACHES FOR OVERCOMING THE PROCESSOR-MEMORY BOTT...
151 A SURVEY OF DIFFERENT APPROACHES FOR OVERCOMING THE PROCESSOR-MEMORY BOTT...151 A SURVEY OF DIFFERENT APPROACHES FOR OVERCOMING THE PROCESSOR-MEMORY BOTT...
151 A SURVEY OF DIFFERENT APPROACHES FOR OVERCOMING THE PROCESSOR-MEMORY BOTT...
ijcsit
 
Robust Fault Tolerance in Content Addressable Memory Interface
Robust Fault Tolerance in Content Addressable Memory InterfaceRobust Fault Tolerance in Content Addressable Memory Interface
Robust Fault Tolerance in Content Addressable Memory Interface
IOSRJVSP
 
Distributed system lectures
Distributed system lecturesDistributed system lectures
Distributed system lectures
marwaeng
 
High performance operating system controlled memory compression
High performance operating system controlled memory compressionHigh performance operating system controlled memory compression
High performance operating system controlled memory compressionMr. Chanuwan
 
os mod1 notes
 os mod1 notes os mod1 notes
os mod1 notes
SRINIVASUNIVERSITYEN
 
Sucet os module_5_notes
Sucet os module_5_notesSucet os module_5_notes
Sucet os module_5_notes
SRINIVASUNIVERSITYEN
 
Parallel & Distributed processing
Parallel & Distributed processingParallel & Distributed processing
Parallel & Distributed processing
Syed Zaid Irshad
 
Assignment#1 lograbo, s.f. (cs3112-os)
Assignment#1 lograbo, s.f. (cs3112-os)Assignment#1 lograbo, s.f. (cs3112-os)
Assignment#1 lograbo, s.f. (cs3112-os)myanddy
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
Cliff Ombachi
 
Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Net...
Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Net...Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Net...
Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Net...
CSCJournals
 
multiprocessors and multicomputers
 multiprocessors and multicomputers multiprocessors and multicomputers
multiprocessors and multicomputers
Pankaj Kumar Jain
 
Reduce course notes class xi
Reduce course notes class xiReduce course notes class xi
Reduce course notes class xi
Syed Zaid Irshad
 

What's hot (18)

Improving DRAM performance
Improving DRAM performanceImproving DRAM performance
Improving DRAM performance
 
Challenges of emerging memory memristor.
Challenges of emerging memory memristor.Challenges of emerging memory memristor.
Challenges of emerging memory memristor.
 
Adaptive bank management[1]
Adaptive bank management[1]Adaptive bank management[1]
Adaptive bank management[1]
 
Chapter 2 pc
Chapter 2 pcChapter 2 pc
Chapter 2 pc
 
151 A SURVEY OF DIFFERENT APPROACHES FOR OVERCOMING THE PROCESSOR-MEMORY BOTT...
151 A SURVEY OF DIFFERENT APPROACHES FOR OVERCOMING THE PROCESSOR-MEMORY BOTT...151 A SURVEY OF DIFFERENT APPROACHES FOR OVERCOMING THE PROCESSOR-MEMORY BOTT...
151 A SURVEY OF DIFFERENT APPROACHES FOR OVERCOMING THE PROCESSOR-MEMORY BOTT...
 
Parallel processing Concepts
Parallel processing ConceptsParallel processing Concepts
Parallel processing Concepts
 
Robust Fault Tolerance in Content Addressable Memory Interface
Robust Fault Tolerance in Content Addressable Memory InterfaceRobust Fault Tolerance in Content Addressable Memory Interface
Robust Fault Tolerance in Content Addressable Memory Interface
 
Distributed system lectures
Distributed system lecturesDistributed system lectures
Distributed system lectures
 
High performance operating system controlled memory compression
High performance operating system controlled memory compressionHigh performance operating system controlled memory compression
High performance operating system controlled memory compression
 
os mod1 notes
 os mod1 notes os mod1 notes
os mod1 notes
 
Sucet os module_5_notes
Sucet os module_5_notesSucet os module_5_notes
Sucet os module_5_notes
 
13. multiprocessing
13. multiprocessing13. multiprocessing
13. multiprocessing
 
Parallel & Distributed processing
Parallel & Distributed processingParallel & Distributed processing
Parallel & Distributed processing
 
Assignment#1 lograbo, s.f. (cs3112-os)
Assignment#1 lograbo, s.f. (cs3112-os)Assignment#1 lograbo, s.f. (cs3112-os)
Assignment#1 lograbo, s.f. (cs3112-os)
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
 
Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Net...
Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Net...Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Net...
Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Net...
 
multiprocessors and multicomputers
 multiprocessors and multicomputers multiprocessors and multicomputers
multiprocessors and multicomputers
 
Reduce course notes class xi
Reduce course notes class xiReduce course notes class xi
Reduce course notes class xi
 

Similar to Nvram applications in the architectural revolutions of main memory implementation a memristor walkthrough

emerging memory technologies Document
emerging memory technologies Documentemerging memory technologies Document
emerging memory technologies DocumentVidya Baddam
 
SRAM BASED IN-MEMORY MATRIX VECTOR MULTIPLIER
SRAM BASED IN-MEMORY MATRIX VECTOR MULTIPLIERSRAM BASED IN-MEMORY MATRIX VECTOR MULTIPLIER
SRAM BASED IN-MEMORY MATRIX VECTOR MULTIPLIER
IRJET Journal
 
301378156 design-of-sram-in-verilog
301378156 design-of-sram-in-verilog301378156 design-of-sram-in-verilog
301378156 design-of-sram-in-verilog
Srinivas Naidu
 
Computer ram coursework
Computer ram courseworkComputer ram coursework
Computer ram coursework
EssaysREasy
 
Emerging Memory Technologies
Emerging Memory TechnologiesEmerging Memory Technologies
Emerging Memory Technologies
theijes
 
Time and Low Power Operation Using Embedded Dram to Gain Cell Data Retention
Time and Low Power Operation Using Embedded Dram to Gain Cell Data RetentionTime and Low Power Operation Using Embedded Dram to Gain Cell Data Retention
Time and Low Power Operation Using Embedded Dram to Gain Cell Data Retention
IJMTST Journal
 
IRJET- Design And VLSI Verification of DDR SDRAM Controller Using VHDL
IRJET- Design And VLSI Verification of DDR SDRAM Controller Using VHDLIRJET- Design And VLSI Verification of DDR SDRAM Controller Using VHDL
IRJET- Design And VLSI Verification of DDR SDRAM Controller Using VHDL
IRJET Journal
 
RANDOM ACCEES MEMORY
RANDOM ACCEES MEMORYRANDOM ACCEES MEMORY
RANDOM ACCEES MEMORYMaya Singh
 
Study and Analysis of Low Power SRAM Memory Array at nano-scaled Technology
Study and Analysis of Low Power SRAM Memory Array at nano-scaled TechnologyStudy and Analysis of Low Power SRAM Memory Array at nano-scaled Technology
Study and Analysis of Low Power SRAM Memory Array at nano-scaled Technology
IRJET Journal
 
Design and Performance Evaluation of a 64-bit SRAM Memory Array Utilizing Mod...
Design and Performance Evaluation of a 64-bit SRAM Memory Array Utilizing Mod...Design and Performance Evaluation of a 64-bit SRAM Memory Array Utilizing Mod...
Design and Performance Evaluation of a 64-bit SRAM Memory Array Utilizing Mod...
IRJET Journal
 
Magnetic ram
Magnetic ramMagnetic ram
Magnetic ramvinod509
 
Using CMOS Sub-Micron Technology VLSI Implementation of Low Power, High Spee...
 Using CMOS Sub-Micron Technology VLSI Implementation of Low Power, High Spee... Using CMOS Sub-Micron Technology VLSI Implementation of Low Power, High Spee...
Using CMOS Sub-Micron Technology VLSI Implementation of Low Power, High Spee...
VLSICS Design
 
30_Design.pdf
30_Design.pdf30_Design.pdf
30_Design.pdf
Sunil Kumar
 
CA assignment group.pptx
CA assignment group.pptxCA assignment group.pptx
CA assignment group.pptx
HAIDERALICH3
 
Racetrack
RacetrackRacetrack
Racetrack
Divya Prakash
 
Basicarchitecturememory
BasicarchitecturememoryBasicarchitecturememory
BasicarchitecturememoryAditya Narang
 
DESIGN AND IMPLEMENTATION OF 4T, 3T AND 3T1D DRAM CELL DESIGN ON 32 NM TECHNO...
DESIGN AND IMPLEMENTATION OF 4T, 3T AND 3T1D DRAM CELL DESIGN ON 32 NM TECHNO...DESIGN AND IMPLEMENTATION OF 4T, 3T AND 3T1D DRAM CELL DESIGN ON 32 NM TECHNO...
DESIGN AND IMPLEMENTATION OF 4T, 3T AND 3T1D DRAM CELL DESIGN ON 32 NM TECHNO...
VLSICS Design
 
onur-comparch-fall2018-lecture3b-memoryhierarchyandcaches-afterlecture.pptx
onur-comparch-fall2018-lecture3b-memoryhierarchyandcaches-afterlecture.pptxonur-comparch-fall2018-lecture3b-memoryhierarchyandcaches-afterlecture.pptx
onur-comparch-fall2018-lecture3b-memoryhierarchyandcaches-afterlecture.pptx
sivasubramanianManic2
 

Similar to Nvram applications in the architectural revolutions of main memory implementation a memristor walkthrough (20)

emerging memory technologies Document
emerging memory technologies Documentemerging memory technologies Document
emerging memory technologies Document
 
SRAM BASED IN-MEMORY MATRIX VECTOR MULTIPLIER
SRAM BASED IN-MEMORY MATRIX VECTOR MULTIPLIERSRAM BASED IN-MEMORY MATRIX VECTOR MULTIPLIER
SRAM BASED IN-MEMORY MATRIX VECTOR MULTIPLIER
 
301378156 design-of-sram-in-verilog
301378156 design-of-sram-in-verilog301378156 design-of-sram-in-verilog
301378156 design-of-sram-in-verilog
 
Computer ram coursework
Computer ram courseworkComputer ram coursework
Computer ram coursework
 
Memristor Technology
Memristor TechnologyMemristor Technology
Memristor Technology
 
Emerging Memory Technologies
Emerging Memory TechnologiesEmerging Memory Technologies
Emerging Memory Technologies
 
Sram pdf
Sram pdfSram pdf
Sram pdf
 
Time and Low Power Operation Using Embedded Dram to Gain Cell Data Retention
Time and Low Power Operation Using Embedded Dram to Gain Cell Data RetentionTime and Low Power Operation Using Embedded Dram to Gain Cell Data Retention
Time and Low Power Operation Using Embedded Dram to Gain Cell Data Retention
 
IRJET- Design And VLSI Verification of DDR SDRAM Controller Using VHDL
IRJET- Design And VLSI Verification of DDR SDRAM Controller Using VHDLIRJET- Design And VLSI Verification of DDR SDRAM Controller Using VHDL
IRJET- Design And VLSI Verification of DDR SDRAM Controller Using VHDL
 
RANDOM ACCEES MEMORY
RANDOM ACCEES MEMORYRANDOM ACCEES MEMORY
RANDOM ACCEES MEMORY
 
Study and Analysis of Low Power SRAM Memory Array at nano-scaled Technology
Study and Analysis of Low Power SRAM Memory Array at nano-scaled TechnologyStudy and Analysis of Low Power SRAM Memory Array at nano-scaled Technology
Study and Analysis of Low Power SRAM Memory Array at nano-scaled Technology
 
Design and Performance Evaluation of a 64-bit SRAM Memory Array Utilizing Mod...
Design and Performance Evaluation of a 64-bit SRAM Memory Array Utilizing Mod...Design and Performance Evaluation of a 64-bit SRAM Memory Array Utilizing Mod...
Design and Performance Evaluation of a 64-bit SRAM Memory Array Utilizing Mod...
 
Magnetic ram
Magnetic ramMagnetic ram
Magnetic ram
 
Using CMOS Sub-Micron Technology VLSI Implementation of Low Power, High Spee...
 Using CMOS Sub-Micron Technology VLSI Implementation of Low Power, High Spee... Using CMOS Sub-Micron Technology VLSI Implementation of Low Power, High Spee...
Using CMOS Sub-Micron Technology VLSI Implementation of Low Power, High Spee...
 
30_Design.pdf
30_Design.pdf30_Design.pdf
30_Design.pdf
 
CA assignment group.pptx
CA assignment group.pptxCA assignment group.pptx
CA assignment group.pptx
 
Racetrack
RacetrackRacetrack
Racetrack
 
Basicarchitecturememory
BasicarchitecturememoryBasicarchitecturememory
Basicarchitecturememory
 
DESIGN AND IMPLEMENTATION OF 4T, 3T AND 3T1D DRAM CELL DESIGN ON 32 NM TECHNO...
DESIGN AND IMPLEMENTATION OF 4T, 3T AND 3T1D DRAM CELL DESIGN ON 32 NM TECHNO...DESIGN AND IMPLEMENTATION OF 4T, 3T AND 3T1D DRAM CELL DESIGN ON 32 NM TECHNO...
DESIGN AND IMPLEMENTATION OF 4T, 3T AND 3T1D DRAM CELL DESIGN ON 32 NM TECHNO...
 
onur-comparch-fall2018-lecture3b-memoryhierarchyandcaches-afterlecture.pptx
onur-comparch-fall2018-lecture3b-memoryhierarchyandcaches-afterlecture.pptxonur-comparch-fall2018-lecture3b-memoryhierarchyandcaches-afterlecture.pptx
onur-comparch-fall2018-lecture3b-memoryhierarchyandcaches-afterlecture.pptx
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

Nvram applications in the architectural revolutions of main memory implementation a memristor walkthrough

  • 1. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 129 NVRAM APPLICATIONS IN THE ARCHITECTURAL REVOLUTIONS OF MAIN MEMORY IMPLEMENTATION – A MEMRISTOR WALKTHROUGH Hitha Paulson1 , Dr. Rajesh R2 1 Research Scholar, Bharathiar University, Coimbatore 1 Assistant Professor, Dept of Computer Science, Little Flower College, Guruvayoor, Kerala 2 Professor, Dept. of Computer Applications ,Sree Narayana Gurukulam College of Engineering, Kadayiruppu P.O, Kolenchery, Ernakulam dist., Kerala ABSTRACT A machine of storage, a machine to compute, a machine to envisage, a magical machine of job parallelization all these describing expressions are not enough to picturise the inevitability of a valuable machine – The Computer. The feature of save and retrieve contributed much to the expert working of the system. The volatile and non-volatile levels of storage have been years long-standing foundation of most computer systems and have influenced the design of system concepts. The volatility and the random accessibility feature of the main memory have many pros and corns. The complex concepts of booting, demand paging and virtual memory happened due to the above features. The discovery of Memristor components contributed to the capability of maintaining non volatility in random accesses mode. This paper inspects the issues why RAM is volatile?, possibilities of persistent main memory, software enhancements, Memristor applications and alternatives in the area of memory architecture. Keywords: DRAM, Memristor, Non-Volatile Memory, Persistent Main Memory, PRAM. 1. INTRODUCTION It is a decades long belief that the fast memory is volatile and persistent storage is slow. The boom to remember and retrieve, initiated research in the computer field to contribute various storage systems. The earlier forms of memory, magnetic tape and disk laid the basic foundation of storage. The limitation of the Microprocessor and Operating System in the wide range of memory accessibility aroused a need of small primary memory and large secondary memory. Since the primary memory demanded with a fast access it was implemented with RAM modal. This Random Access Memory stores the information about programs which are currently running. RAM is a solid state memory unit. It is faster than writing and reading information from the hard drive because it has no physical components that need to move, just electrical signals. In secondary storage we have to wait for the platters to rotate and the header to move. Only sequential bits can be read without additional operations in between. The volatility and the random accessibility feature of the main memory have many pros and corns. The complex concepts of booting, demand paging and virtual memory happened due to the above features. Today we watch the appearance of many new memory technologies that pledge a noteworthy change in the long way existence of present memory systems. Memristors (Memory Resistors) offers a capable alternative to conventional volatile memory systems. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 12, December (2014), pp. 129-133 © IAEME: www.iaeme.com/IJCET.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 130 According to the International Technology Road-Map for Semiconductors (ITRS), current memory technologies (DRAM, SRAM and NAND Flash) will soon be facing design challenges related to their continued scaling down [1] The following sections discuses the concepts and the pros and corns of volatile and nonvolatile memory implementations, the classical role of Memristor technology and the proposed architectural alterations. 2. HOW AND WHY OF RAM VOLATILITY The need of Random Accessibility suggested a technique of having a temporary storage with the size permitted by the supporting system elements and has a simple architecture where the data needs constant refreshment for storage. The access time in RAM is independent of the storage location ie the access is independent of the address of the word. The symmetry in the speed of read and write cycles is the major advantage noticed. Because of the volatility data stored in a RAM is lost when the power is switched off. Hence a backup (UPS) is often used with computers. 2.1 Static Random Accesses Memory Here the contents are retained as long as the power remains, how ever the contents are lost when power gets down. It makes use of transistor matrixes (around 4 to 6 for each memory cell) for the storage of data and not to be refreshed on a regular basis. Because of the inner architecture it has long data life time, is faster, less chance of information loss but, expensive, less dense and has high power consumption. 2.2 Dynamic Random Accesses Memory Unlike SRAM, this is made up of memory cells composed of one capacitor and one transistor which must be continually refreshed (with in 15 nano seconds) in order for it to maintain the data. The architecture contributes to less power consumption, less expensive, highly dense but, short data life time and slower than SRAM. Because of the features listed above DRAMs stands as the implementing units of system RAM and SRAM is used to implement cache memories. 2.3 Advantages of Volatility Because of the inner architecture volatile cells doesn’t wearout, ie.. the cells support unlimited read write cycles. Volatility can protect sensitive information, which becomes unavailable on power-down. Volatile RAMs are vulnerable to malicious access only while powered. 3. LIMITATIONS OF EXISTING MEMORY TECHNOLOGY Being a most influential factor in system performance, memory system becomes a major designing issue in computer system development. The major level of classiness gained by the modern memory technology is mainly attained from the process predicted by Gordon Moore in 1965.The Moore’s Law states that the number of devices that can be integrated on a chip of fixed area would double every 12 months (later amended to doubling every 18 – 24 months). This made the prediction of near future dependable. But as the number of components increased the heat energy dissipation increased at a higher rate and become a major hindrance to memory technology design. A major issue of the coming future is the DRAM approaches physical limits that might restrict its growth in the coming decades [2].DRAMS are not only placing charge in a storage capacitor, but also alleviate sub-threshold charge leakage through the access device[2].Thus capacitors and transistors must be large enough to cope with the situation. In this context predictions state that DRAM will face scaling limitations as the attribute size continuous decreasing [3]. DRAMS are also responsible for the major energy consumption in a computer system. Because of these limitations, a major research is going on in the area of memory alternatives and has suggested some successful alternatives even though some of them are not commercially available. 4. PROMISING NON VOLATILE MEMORY TECHNOLOGIES There are many challenging non volatile memories reported, which aims at fulfilling the dream of a non-volatile, byte addressable memory , which will almost as fast to access as a DRAM. Here we would like to mention the admirable role of three of them – Phase Change Memory, Memristor and Spin Torque Transfer RAM. Phase Change RAM also known as PRAM or PCM is based on some materials called Phase Change Materials that exist in two different phases with distinct properties: an amorphous state, characterized by high electrical sensitivity and a crystalline phase, characterized by low electrical sensitivity. The phases can be repeatedly and rapidly cycled by applying heat (by injecting current) to the material [4].PRAM reported almost the same read latency as that of a DRAM, but the write latency is around 3 times as that of a DRAM, it consumes an average of 45.5 % less energy than DRAM
  • 3. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 131 [2].The current write endurance varies around 108 and is a reasonable limit when compared to the features reported. PCMs storage density is better than that of DRAM. The Memristor, which was described by Chua in 1971, is generally thought of as the fourth of the two terminal basic passive elements, along with resistor, capacitor and inductor [1]. The first reported passive implementation of the Memristor was the TiO2 based devised introduced by HP in 2008 [1]. Compared with PRAM, Memristors reported better performance. The fabrication and features will be discussed in detail in the coming sections. Spin Torque Transfer RAM use magnetic properties of certain materials and electric charges to enable states of different states in memory cells [5]. Based on the Giant Magneto Resistance (GMR) phenomenon STTRAM stands out as one among the right candidate to computer memory. Magnetization orientations manipulated through an external magnetic field determines spin polarized electron transport, leading to low and high resistance states in GMR devices. It is the spin-based explanation for GMR that has led to a practical structure “spin valve” used in various GMR devices [6]. The spin-transfer effect of the GMR occurs for electron current flowing through two ferromagnetic layers separated by a thin nonmagnetic spacer layer. This lowers the current needed to write the cell. The main advantage of this is the potential for unlimited write cycles. But they lack, a reliable shrinked cell size. These competing technologies promise a major revolution in the memory design. PCM has been experimentally used in many applications but the other two are farther from production. 5. PROS AND CORNS OF NONVOLATALITY The accessibility without reloading in main memory level is something that has never been possible before. Certain dedicated systems can make use of this feature very effectively. The recurrently accessed executables can avoid the load time which proportionally affects the execution time. The main advantage of NVRAMS is its nonvolatality itself. It avoids the complex refreshing circuits and the refreshing time. Certain Non volatile architectures can even contribute to avoidance of complex concepts like booting, paging and swapping. Another advantage is the latency for reading/writing NVM cells which tends to be much higher than DRAM [2]. Normally Non volatile memories have higher dynamic power consumption than DRAM , but insignificant static power consumption. Some studies estimated that they can increase overall memory energy efficiency even up to 65% [7]. Since energy and heat are interrelated Thermal competence can also be achieved. Certain NVRAMs even reported to be denser than DRAMs. Even though the new memory suggestions are revolutionary there are certain features need to be addressed seriously. The limitations for read/write cycles because of the wear out nature of NVRAMs are an issue to be addressed. Since certain architectures keep only one copy of the data under execution erroneous writes can cause permanent data loss. Issues related with security are also to be considered. Nonvolatility can’t protect sensitive information, which becomes available on power-down. NonVolatile RAMs are vulnerable to malicious access even while unpowered. Another major issue is regarding the portability. Now a days drives can be physically removed and mounted to another computer, since the file system formats are independent of the computer configuration. NVRAM based systems may loose this property because they may contain non portable architecture related with memory [10]. 6. ROLE OF MEMRISTORS As mentioned earlier, Memristors are generally consists of a thin film of oxide sandwiched between two metal contacts. Recent works demonstrated the ability for titanium dioxide based memristors to be deposited from solution at room temperature by using a sol gel technique on a flexible polymer substrate [8]. The integration of memristors with traditional flexible devices(such as thin film organic, zinc oxide or amorphous-Si transistors) may enable the realization of a new paradigm in computing technology through light weight , inexpensive , flexible electronics[8]. Memristors are fabricated as a high density cross bar architecture. Memristor devices are located at each intersection between two bars. In this two terminal device the resistance depends on the magnitude and polarity of the voltage applied to it and the length of time that voltage has been applied. When the voltage is turned off, the memristor remembers its most recent resistance until the next time it is turned on[9]. The Memristor memory is 4x as dense as the harddisk drive and 23x as dense as DRAM [1]. The current reading and writing speeds are slower than DRAM and SRAM, but are very fast compared to flash memories. HP Labs offer a major research in this area. The main advantage reported by Memristor is its symmetry in read write latency time, which makes it a right candidate than PCRAM for the replacement of current memory techniques. PCRAM reported much variation in read write latency which is intolerable. As per the news paper reports , at its HP Discover conference in Las Vegas , during June 2014, HP announced an ambitious plan to use memristors to build a system, called simply "The Machine," shipping as soon as the end of the decade. By 2016, the company plans to have memristor-based DIMMs, which will combine the high storage densities of
  • 4. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 132 hard disks with the high performance of traditional DRAM. Bloomberg Business week reports that work on The Machine started two years ago and they were in need of about 75 percent of HP Labs' staff to be working on the project. 7. ARCHITECTURE ALTERATIONS We will now look into some possible architectural alternations that can be made by NVRAM technology. A simple alternative is illustrated in figure 1. The model proposes a method where the volatile memory is replaced by any of the non volatile memory suggestions. Certain dedicated systems will get more advantage from the model. Programs which are used very frequently will always be there when the system is up. Time of booting and loading can be avoided. Virtual memory, demand paging and relocation remains the same. Figure 1: Replacing DRAM Another simple alternative is to replace the disk with any of the non volatile memory alterations, by keeping the volatile RAM as it is. The model is illustrated in figure 2. In this model the advantages of the new nonvolatile techniques helps in system improvement. The external memory works with the same speed as that of the volatile RAM, which adds much to the system performance. The presence of DRAM helps in supporting the system from errorous writes and security attacks. Figure 2: Replacing Disk Systems are unlikely to abandon DRAM.: Because of the wear out and slow –write limitations of NVRAM we assume that at least for write intensive workloads, systems will instead use a combination of DRAM and NVRAM, implementing the best properties of each [5]. In the third model, illustrated in figure 3, the NVRAM is moved to the same address space as that of a DRAM. So the CPU can address a volatile and a non volatile memory at the same time. Figure 3: Shared Memory An implementation of a system with no volatile memory, but will work with the speed of a DRAM is a dream to come true. Even though more research is needed in this area, the present realizations imply a fast implementation of this. Figure 4 shows the single memory implementation. This also points to a possibility of implementing a higher addressable RAM, than that is supported by the underlying technologies. Rather than keeping a constant area as main memory, a dynamic implementation of main memory is anticipated. Figure 4: Single Memory Implementation 8. SOFTWARE SUPPORT Since software being an unavoidable part of hardware implementation, much care is needed in the design of operating systems for non volatile memory implementations. Research is going on in this area with the support of Linux open source code. Certain points have to be remembered while designing such a supporting software layer.
  • 5. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 133 • In certain architectures discussed earlier the OS should take care of paging used to map both volatile and non volatile memory. • Even though the memory is designed as nonvolatile, many supporting volatile structures are still there: the cache, TLBs, Registers, Page tables etc..they need to be addressed seriously by an OS. • To restore persistent application state, a process must be able to map the same non-volatile memory pages across machine reboots. Therefore, operating systems must provide a way to identify groups of pages under a persistent namespace [5]. • Since the nonvolatile memories have the nature of wearing out, OS should take nececcery actions to avoid unnecessary memory writes. • System architecture which uses both volatile and nonvolatile implementations in a RAM should take care of which pages should migrate to NVRAM and which to DRAM. • There should be proper synchronization mechanisms to cope up with the speed of these varying technologies in a same RAM environment. • In single memory implementation model, much care is needed in designing OS, since Rather than keeping a constant area as main memory, a dynamic implementation of main memory is anticipated. • Special security modules are needed to be implemented in OS design since the data is vulnerable to attacks even when the power is off. • File systems for non volatile memory architecture is a recent topic of research. BPFS: Basic Parallel File System file system designed for byte-addressable, persistent memory technologies is still predicted on a computer with two levels of physical storage: it does not consider how storage should be organized on a system with only nonvolatile memory [10]. This area needs more attention. 9. CONCLUSION This paper discussed the advantages and the disadvantages of the present system memory implementations and reviewed the possibilities of non volatile RAMs. Even though the possibilities in NVRAM technologies are revolutionary many serious issues are there to be addressed. The paper discussed the role of the major upcoming NVRAM technology, Memristor. The architectural alterations possible, points to a ground-breaking era in system implementation. REFERENCES [1] Mohammed Affan Zidan, Hossam Aly Hassan Fahmy, Muhammad Mustafa Hussain, Khaled Nabil Salama , Memristor-based memory: The sneak paths problem and Solutions” Microelectronics Journal, Volume 44, Issue 2, February 2013, Pages 176-183. [2] Taciano Perez, Ney Laert Vilar Calazans, and César A. F. De Rose, “A preliminary study on system-level impact of persistent main memory”, 13th International Symposium on Quality Electronic Design (ISQED), IEEE, March 2012, page 84-90. [3] B.C. Lee, E. Ipek, O. Mutlu, and D. Burger, Architecting phase change memory as a scalable dram alternative,” ACM SIGARCH Computer Architecture news, vol. 37, no. 3, pp. 2–13, 2009. [4] S. Raoux, GW Burr, MJ Breitwisch, CT Rettner, Y.C. Chen, RM Shelby, M. Salinga, D. Krebs, S.H. Chen, H.L. Lung, et al., “Phase-change random access memory: A scalable technology,” IBM Journal of Research and Development, vol. 52, no. 4.5, pp. 465–479, 2010. [5] J. Moraru, D. Andersen, M. Kmainsky, N. Binkert, N. Tolia, R. Munz, and P. Ranganathan. “Persistent, protected and cached: Building blocks for main memory data stores”. In CMU Parallel Data Lab Trechnical Report, CMU-PDL-11-114, Dec. 2011. [6] Y. Huai, "Spin-Transfer Torque MRAM (STT-MRAM): Challenges and Prospects," AAPPS Bulletin, Vol 18, No:6, Page 33 , December 2008. [7] T. Perez and C.A.F. De Rose, “Non-Volatile Memory: Emerging Technologies and Their Impacts on Memory Systems (TR- 060),” Tech. Rep., Faculdade de Inform´atica, Pontifıcia Universidade Cat´olica do Rio Grande do Sul (PUCRS), 2010. [8] Gergel-Hackett, Nadine; Tedesco, Joseph L.; Richter, C.A, "Memristors With Flexible Electronic Applications," Proceedings of the IEEE , vol.100, no.6, pp.1971,1978, June 2012. [9] R.S. Williams, “How we found the missing memristor,” IEEE spectrum, vol. 45, no. 12, pp. 28–35, 2008. [10] Katelin Bailey , Luis Ceze , Steven D. Gribble, Henry M. Levy, “Operating system implications of fast, cheap, non-volatile memory”, Proceedings of the 13th USENIX conference on Hot topics in operating systems, May 09-11, 2011, Napa, California. [11] El Khadiri Mohamed, El Fazziki Abdelaziz, “Extended Corporate Memory and Workflow Systems”, International Journal of Information Technology and Management Information Systems (IJITMIS), Volume 3, Issue 1, 2012, pp. 15 - 25, ISSN Print: 0976 – 6405, ISSN Online: 0976 – 6413.