Coa Unit 4 Digital Notes
Coa Unit 4 Digital Notes
2
Please read this disclaimer before proceeding:
This document is confidential and intended solely for the educational purpose of RMK
Group of Educational Institutions. If you have received this document through email in
error, please notify the system manager. This document contains proprietary
intended. If you are not the addressee you should not disseminate, distribute or copy
through e-mail. Please notify the sender immediately by e-mail if you have received
this document by mistake and delete this document from your system. If you are not
the intended recipient you are notified that disclosing, copying, distributing or taking
Created By,
Dr.S.MUTHUSUNDARI, Associate Professor, CSE, R.M.D.E.C
Mrs.A.TAMIZHARASI, Assistant Professor, CSE,R.M.D.E.C
Mrs.J.GEETHAPRIYA, Assistant Professor, CSE,R.M.D.E.C
Date: 21.08.2023
Table of Contents
Sl. No. Contents Page No.
1 Contents 5
2 Course Objectives 6
6 CO-PO/PSO Mapping 14
Lecture Plan (S.No., Topic, No. of Periods, Proposed
7 date, Actual Lecture Date, pertaining CO, Taxonomy 16
level, Mode of Delivery)
8 Activity based learning 18
Lecture Notes ( with Links to Videos, e-book reference,
9 20
PPTs, Quiz and any other learning materials )
Assignments ( For higher level learning and Evaluation
10 124
- Examples: Case study, Comprehensive design, etc.,)
11 Part A Q & A (with K level and CO) 127
6
COURSE OBJECTIVES
To describe the basic principles and operations of digital computers.
To design arithmetic and logic unit for various fixed and floating point
operations
To construct pipeline architectures for RISC processors.
To explain various memory systems & I/O interfacings
To discuss parallel processor and multi-processor architectures
PRE REQUISITES
PRE REQUISITES
K6 Evaluation
K5 Synthesis
K4 Analysis
K3 Application
K2 Comprehension
K1 Knowledge
CO – PO/PSO Mapping
CO – PO /PSO Mapping Matrix
CO PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO PS0
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 2 1 1 3
2 3 3 2 2 3
3 3 3 1 1 3
4 3 3 1 1 3
5 3 3 1 1 3
6 2 2 1 1 3
Lecture Plan
16
Lecture Plan – Unit 4– I/O AND MEMORY
Sl. Topic Numb Proposed Actual CO Taxo Mode
No er of Date Lectur nomy of
. Perio e Date Level Deliver
ds y
Input/Output
Organization: Bus PPT /
1 Structure - Bus 1 CO4 K2 Chalk &
Operation, Talk
Arbitration
PPT /
2 Interface Circuits 1 CO4 K2 Chalk &
Talk
Interconnection PPT /
3 Standards - USB, 1 CO4 K2 Chalk &
SATA Talk
The Memory
System: Basic PPT /
4 Concepts - 1 CO4 K2 Chalk &
Semiconductor Talk
RAM Memories
PPT /
Read-only
5 1 CO4 K4 Chalk &
Memories Talk
Direct Memory PPT /
6 Access - Memory 1 CO4 K4 Chalk &
Hierarchy Talk
Cache Memories - PPT /
7. Performance 1 CO4 K3 Chalk &
Considerations - Talk
Virtual
Memory - PPT /
8. Memory 1 CO4 K3 Chalk &
Management Talk
Requirements
Secondary PPT /
Storage.
9. 1 CO4 K3 Chalk &
Talk
Activity Based
Learning
18
CROSS WORD PUZZLE – MEMORY AND I/O
Down: Across:
1. Time that elapsed between the initiation of an 3. correspondence between the main memory
operation and the completion of that operation. blocks and those in the cache is specified
(e.g.) the time between Read and the MFC 6. Main memory block can be placed in any cache
signal. 2. is used to send or receive data block position
having group of 8 bits or 16 bits 8. A single large file is stored in several separate
simultaneously disk units by breaking the file up into a number
4. transfer of large blocks of data at high speed, of smaller pieces and storing these pieces on
without continuous intervention by processor different disks.
5. Processor originates most memory access 10. Indicates whether the block has been
cycles, so the DMA controller can be said to modified
‘steal memory cycles’ from the processor 11. when the cache is full and a memory word
7. cache and main memory location updated that is not in the cache is reference, the cache
simultaneously control h/w decides which block to be removed
9. Standard I/O Interface 12. recently executed instructions is likely to be
13. arbitration process performed by executed again very soon
14. instructions in close proximity to a recently
executed inst. are likely to be executed soon
15. feature enhances the connection of new
device at any time, while the system is
operation
Lecture Notes
20
1. BUS STRUCTURE
o Bus connects processor and I/O devices.
o The three types of busses are: address bus, data bus and control
bus.
P ro c e s s o r M e m o ry
B us
I / O d ev ic e 1 I / O d ev ic e n
F ig u r e 4 . 1 . A s in g le - b u s s tr u c tu r e .
Addddress
r ess C
Coo nt
ntrol
ro l Da ta a nd I/O
deco
d eco dder
er cir cui ts sta tus r eg iste rs interface
In pu t ddevi
evice
ce
Figure 4.4 A program that reads one line from the keyboard stores it in memory buffer, and echoes it back to the display.
Consider a task that reads in character input from a keyboard and
produces character output on a display screen. A simple way of performing
such I/O tasks is to use a method known as program- controlledI/O. The
rate of data transfer from the keyboard to a computer is limited by the
typing speed of the user, which is unlikely to exceed a few characters per
second. The rate of output transfers from the computer to the display is
much higher. It is determined by the rate at which characters can be
transmitted over the link between the computer and the display device,
typically several thousand characters per second. However, this is still much
slower than the speed of a processor that can execute many millions of
instructions per second. The difference in speed between the processor
and I/O devices creates the need for mechanisms to synchronize the
transfer of data between them.
D AT A IN
D A TA O U T
S TA T U S D IRQ K I RQ SOUT S IN
C O N T RO L DEN KEN
7 6 5 4 3 2 1 0
F ig u r e 4 . 3 . R eg is te r s in k e y b o a r d a n d d is p la y in te r fa c e s .
MoveByte DATAIN,R1
Similarly, the contents of register R1 can be transferred to DATAOUT by
the instruction
MoveByte R1,DATAOUT
The status flags SIN and SOUT are automatically cleared when the buffer
registers DATAIN and DATAOUT are referenced, respectively.
4. Interrupts
o I/O device sends a special signal (interrupt) over the bus
whenever it is ready for a data transfer operation.
2. BUS ARBITRATION
There are occasions when two or more entities contend for the use of a
single resource in a computer system. For example, two devices may need
to access a given slave at the same time. In such cases, it is necessary to
decide which device will access the slave first. The decision is usually
made in an arbitration process performed by an arbiter circuit. The
arbitration process starts by each device sending a request to use the
shared resource. The arbiter associates priorities with individual requests.
If it receives two requests at the same time, it grants the use of the slave
to the device having the higher priority first.
The device that initiates data transfer requests on the bus is the bus
master - the processor. It is possible that several devices in a computer
system need to be bus masters to transfer data. Since the bus is a single
shared facility, it is essential to provide orderly access to it by the bus
masters.
• A device that wishes to use the bus sends a request to the arbiter.
• When multiple requests arrive at the same time, the arbiter selects
one request and grants the bus to the corresponding device.
• For some devices, a delay in gaining access to the bus may lead to
an error. Such devices must be given high priority.
• If there is no particular urgency among requests, the arbiter may
grant the bus using a simple round-robin scheme.
• Bus arbitration:
o The device that is allowed to initiate data transfers on the
bus at any given time is called the bus master.
o When the current master relinquishes control of the bus,
another device can acquire this status.
o Bus arbitration is the process by which the next device to
become the bus master is selected and bus mastership is
transferred to it.
o Two approaches:
▪ Centralized arbitration
▪ Distributed arbitration
o Centralized arbitration:
There are two Bus-request lines, BR1 and BR2, and two Bus-grant lines,
BG1 and BG2, connecting the arbiter to the masters. A master requests
use of the bus by activating its Bus-request line. If a single Bus-request is
activated, the arbiter activates the corresponding Bus-grant. This indicates
to the selected master that it may now use the bus for transferring data.
When the transfer is completed, that master deactivates its Bus-request,
and the arbiter deactivates its Bus-grant.
Figure 7.9 illustrates a possible sequence of events for the case of three
masters.
• Assume that master 1 has the highest priority, followed by
the others in increasing numerical order.
o Distributed arbitration:
o All devices waiting to use the bus have equal responsibility in
carrying out the arbitration process., without using a central
arbiter.
V cc
A RB 3
A RB 2
A RB 1
A RB 0
Start-Arbitration
O.C.
0 1 0 1 0 1 1 1
Interface circuit
for device A
3. BUS OPERATIONS
o The processor , main memory, and I/O devices can be
interconnected by means of a common bus whose primary function
is to provide a communications path for the transfer of data.
o A bus protocol, is the set of rules that govern the behavior of
various devices connected to the bus as to when to place
information on the bus, assert control signals, and so on.
o The bus lines used for transferring data are of three types: data ,
address and control.
1. Synchronous bus:
o All devices derive timing information from a common clock line.
Equal spaced intervals constitute a bus cycle during which one data
transfer can take place.
Bu s clock
Ad dre ss an d
comm and
Data
t0 t1 t2
Bu s cycle
o Solution:
o Control signals are introduced that represent a response from the
device. These signals inform the master that the slave has
recognized its address & that it is ready to participate in a data-
transfer operation.
T im e
1 2 3 4
C lo c k
A d d re s s
C om m and
D a ta
S la v e - r e a d y
F ig u re 4 . 2 5 . A n in p u t tr a n s f e r u s in g m u lt ip le c lo c k c y c le s
2. Asynchronous bus:
o An alternate scheme for controlling data transfers on the bus is
based on the use of handshake between the master and slave. The
common clock is replaced by two timing control lines, Master-Ready
and Slave-Ready.
Handshake protocol:
o The master places the address and command information on the
bus.
o Then it indicates to all devices that it has done so by activating the
Master-ready line.
o This causes all devices on the bus to decode the address.
o The selected slave performs the required operation and informs the
processor by activating the Slave-Ready line.
o The master waits for Slave-Ready to become asserted before it
removes its signals from the bus.
Sequence of events for input data transfer:
Time
Address
andcommand
Master-ready
Slave-ready
Data
t0 t1 t2 t3 t4 t5
Bus cycle
Figure 4.26. Handshake co ntr ol o f data transfer during an inpu t ope ration.
T1 → the master sets the Master-Ready line to 1. This informs the I/O
devices that the address and command information is ready. The delay
t1 – t0 is needed for skew that may occur on the bus. T1 – t0 should
be larger than the maximum possible bus skew.
When the address information arrives at any device, it is decoded by
the interface circuitry. Time should be allowed to decode the address.
T3 → the slave signal arrives at the master, indicating that the input
data are available on the bus. The master should allow for bus skew.
It must also allow for the setup time needed by its input buffer. After a
delay equivalent to the maximum bus skew and the minimum setup
time, the master strobes the data into its input buffer. At the same
time it drops the Master-Ready signal , indicating that it has received
the data.
Time
Address
and command
Data
Master-ready
Slave-ready
t0 t1 t2 t3 t4 t5
Bus cycle
4. INTERFACE CIRCUITS
An input/output interface consists of the circuitry required to connect an
input/Output device to a computer bus. On one side of the interface we
have the bus signals for address, data and control and on the other side,
a data path with its associated controls to transfer data between the
interface and the input/output device. This side is called port. The port
can be classified as serial port or parallel port.
Figure 4.29 shows a suitable circuit for an input interface. The output lines
of the DATAIN register are connected to the data lines of the bus, which
are turned on when the processor issues a read instruction with the
address that selects this register. The SIN signal generated by a status
flag circuit is sent to the bus to the bit D0, which means it will appear as
bit 0 of the status register. An address decoder is used to select the input
interface when the high-order 31 bits of an address correspond to any of
the addresses assigned to this interface. Address bit A0 determines
whether the status or the data registers is to be read when the Master-
ready signal is active. The control handshake is accomplished by activating
the Slave-ready signal when either Read-status or Read-data is equal to 1.
Figure 4.30 shows the possible implementation of the status flag circuit.
Figure 4.31 shows an output interface that can be used to connect an
output device, such as a printer, to a processor. The printer operates
under the control of the handshake signals Valid and Idle in a manner
similar to the handshake used on the bus with the Master-ready and
slave-ready signals.
When it is ready to accept a character, the printer asserts its Idle
signal. The interface circuit can then place a new character on the data
lines and activate the Valid signal. In response, the printer starts
printing the new character and negates the Idle signal, which in turn
causes the interface to deactivate the Valid signal. The interface
contains a data register, DATAOUT, and a status flag, SOUT. The SOUT
flag is set to 1 when the printer is ready to accept another character,
and it is cleared to 0 when a new character is loaded into DATAOUT by
the processor.
Figure 4.34 shows a general purpose parallel interface circuit that can be
configured in a variety of ways. Data lines P7 through P0 can be used for
either input or output purposes. The DATAOUT register is connected to
these lines via three-state drivers that are controlled by a data direction
register, DDR. The processor can write any 8-bit pattern into DDR. For a
given bit, if the DDR value is 1, the corresponding data line acts as an
output line; otherwise, it acts as an input line.
Two lines, C1 and C2 are provided to control the interaction between the
interface circuit and the I/O device it serves. These lines are also
programmable. Line C2 is bidirectional to provide several different modes
of signaling, including the handshake. The ready and accept lines are the
hand-shake control lines on the processor bus side, and hence would be
connected to Master-ready and Slave-ready. The input signal My-address
should be connected to the output of an address decoder that recognizes
the address assigned to the interface. There are three register select lines,
allowing upto eight registers for various modes of operation. An interrupt
request output, is also provided.
Asynchronous Transmission
This approach uses a technique called start-stop transmission. Data are
organized in small groups of 6 to 8 bits, with a well-defined beginning and
end. In a typical arrangement, alphanumeric characters encoded in 8 bits
are transmitted as shown in Figure 7.16. The line connecting the
transmitter and the receiver is in the 1 state when idle. A character is
transmitted as a 0 bit, referred to as the Start bit, followed by 8 data bits
and 1 or 2 Stop bits. The Stop bits have a logic value of 1. The 1-to-0
transition at the beginning of the Start bit alerts the receiver that data
transmission is about to begin. Using its own clock, the receiver
determines the position of the next 8 bits, which it loads into its input
register. The Stop bits following the transmitted character, which are equal
to 1, ensure that the Start bit of the next character will be recognized.
When transmission stops, the line remains in the 1 state until another
character is transmitted.
Synchronous Transmission
In the start-stop scheme described above, the position of the 1-to-0
transition at the beginning of the start bit in Figure 7.16 is the key to
obtaining correct timing information. This scheme is useful only where the
speed of transmission is sufficiently low and the conditions on the
transmission link are such that the square waveforms shown in the figure
maintain their shape. For higher speed a more reliable method is needed
for the receiver to recover the timing information. In synchronous
transmission, the receiver generates a clock that is synchronized to that of
the transmitter by observing successive 1-to-0 and 0-to-1 transitions in
the received signal. It adjusts the position of the active edge of the clock
to be in the center of the bit position. A variety of encoding schemes are
used to ensure that enough signal transitions occur to enable the receiver
to generate a synchronized clock and to maintain synchronization. Once
synchronization is achieved, data transmission can continue indefinitely.
Encoded data are usually transmitted in large blocks consisting of several
hundreds or several thousands of bits. The beginning and end of each
block are marked by appropriate codes, and data within a block are
organized according to an agreed upon set of rules. Synchronous
transmission enables very high data transfer rates.
5. Standard I/O Interfaces (USB)
A standard I/O Interface is required to fit the I/O device with an Interface
circuit. The processor bus is the bus defined by the signals on the
processor chip itself. The devices that require a very high speed
connection to the processor such as the main memory, may be connected
directly to this bus. The bridge connects two buses, which translates the
signals and protocols of one bus into another. The bridge circuit
introduces a small delay in data transfer between processor and the
devices.
Port Limitation:-
✓ Normally the system has a few limited ports.
✓ To add new ports, the user must open the computer box to gain
access to the internal expansion bus & install a new interface
card.
✓ The user may also need to know to configure the device & the
s/w.
Merits of USB:-
✓ USB helps to add many devices to a computer system at any
time without opening the computer box.
Device Characteristics:-
✓ The kinds of devices that may be connected to a computer
cover a wide range of functionality.
✓ The speed, volume & timing constrains associated with data
transfer to & from devices varies significantly.
Eg:1 Keyboard
✓ Since the event of pressing a key is not synchronized to any
other event in a computer system, the data generated by
keyboard are called asynchronous.
✓ The data generated from keyboard depends upon the speed of
the human operator which is about 100bytes/sec.
Requirements for sampled Voice:-
✓ It is important to maintain precise time (delay) in the sampling
& replay process.
✓ A high degree of jitter (Variability in sampling time) is
unacceptable.
Addressing :
• Each device on the USB, whether it is a hub or an I/O device, is
assigned a 7-bit address.
• This address is local to the USB tree and is not related in any way
to the addresses used on the processor bus.
• When a device is first connected to a hub, or when it is powered on,
it has the address 0.
• The hardware of the hub to which this device is connected is
capable of detecting that the device has been connected and it
records this fact as part of its own status information. Periodically,
the host polls each hub to collect status information and learn
about new devices that may have been added or disconnected.
When the host is informed that a new device has been connected,
it uses a sequence of commands to send a reset signal on the
corresponding hub port, read information from the device about its
capabilities, send configuration information to the device, and
assign the device a unique USB address. Once this sequence is
completed the device begins normal operation and responds only
to the new address.
• This is a key feature that gives the USB its plug-and-play capability.
• When a device is powered off, a similar procedure is followed. The
corresponding hub reports this fact to the USB system software,
which in turn updates its table. The USB software must maintain a
complete picture of the bus topology and the connected devices at
all times.
USB Protocols:
• All information transferred over the USB is organized in packets,
where a pack consists of one or more bytes of information.
• The information transferred on the USB can be divided into two
broad categories: control & data.
• Control packets perform such tasks as addressing a device to
initiate data transfer, acknowledging that data have been received
correctly, or indicating error.
• Data packets carry information that is delivered to a device. For
example, input and output data are transferred inside data packets.
• A packet consists of one or more fields containing different kinds of
information. The first field of any packet is called the packet
identifier, PID, which identifies the type of that packet.
• Control packets used for controlling data transfer operations are
called token packets.
• A token packet starts with the PID field, using one of two PID
values to distinguish between an IN packet and an OUT packet,
which control input and output transfers, respectively. The PID field
is followed by the 7-bit address of a device and the 4-bit endpoint
number within that device. The packet ends with 5 bits for error
checking, using a method called cyclic redundancy check (CRC).
The CRC bits are computed based on the contents of the address
and endpoint fields. By performing an inverse computation, the
receiving device can determine whether the packet has been
received correctly.
Electrical Characteristics
USB connections consist of four wires,
two carry power, +5 V and Ground, &
two carry data.
No separate power supply needed for simple devices.
Separate power supply for simple devices
Two methods are used to send data over a USB cable.
single-ended transmission
differential signaling
Single-ended transmission
When sending data at low speed, a high voltage relative to
Ground is transmitted on one of the two data wires to
represent a 0 and on the other to represent a 1. The
Ground wire carries the return current in both cases.
highly susceptible to noise. The voltage on the ground wire
is common to all the devices connected to the computer.
Differential signaling
The data signal is injected between two data wires twisted
together.
Memory
5.6 Basic concepts
Ideal memory – fast, large and inexpensive.
16 bit computer generates 16 bit addresses 216 =210 2 6 memory.
location =2 6 k=64k memory. Loc.
32bit addresses =2 32 =2 30 2 2 =2 2 G memory locations = 4Giga memory
locations
40bit adds -- 2 40
=1 Tera loca
210 - Kilo 2 20 - Mega
2 30
- Giga 2 40 - Tera
P r o c e s s or M e m o ry
k - b it
a dd re ss b u s
M AA R
M R
n-bit
d a t a b us
U p t o 2k a d d r e s s a b l e l o
M DD R
M R catio n s
W ord le ng th = n bit s
C o ntroll in e s
( R / W , M F C , e t c .)
• Data transfer between the memory and the processor takes place
through the use of two processor registers, usually called MAR
(Memory Address Register) and MDR (Memory Data Register).
• If MAR is k bits long and MDR is n bits long, then the memory unit
may contain upto 2k addressable locations. During a memory cycle, n
bits of data are transferred between the memory and the processor.
This transfer takes place over the processor bus, which has k address
lines and n data lines.
• The bus also includes the control lines Read/Write (R/W) and Memory
Function Completed (MFC) for coordinating data transfers.
• The processor reads data from the memory by loading the address of
the required memory location into the MAR register and setting the
R/W line to 1. The memory responds by placing the data from the
addressed location onto the data lines, and confirms this action by
asserting the MFC signal. Upon receipt of the MFC signal, the
processor loads the data lines into the MDR register.
• The processor writes data into a memory location by loading the
address of this location into MAR and loading the data into MDR. It
indicates that a write operation is involved by setting the R/W line to 0.
• If a read or write operation involve consecutive address locations in
the main memory, then a “block transfer” operation can be performed
in which the only address sent to the memory is the one that identifies
the first location.
• Memory access may be synchronized using a clock, or they may be
controlled using special signals that control transfers on the bus.
RAM: Any location can be accessed for a Read or Write operation in some
fixed amount of time that is independent of the location’s address.
17 + 2 external connected + 2
b 7 b 7 b 1 b 1 b 0 b 0
W 0
•
•
•
FF FF
A 0 W 1
•
•
•
A 1
Address • • • • • • Memory
decode r • • • • • • c e l ls
A 2
• • • • • •
A 3
W 15
•
•
•
S ens e /W r i te c i S ens e/W ri te c i S ens e /W r i te c i R /W
r c u it r c u it r c u it
C S
D a t a i n p u /t o u t p u t l i n e s : b 7 b 1 b 0
13 +2
4M bit chip = 2 2 2 20
bits = 219 2 3 bits
19 address lines
8 data lines
27
+2 control signals
29 +2
5-b it ro w
a dd ress W0
W1
32 32
5 -b it
deco der m e m o ry cell
arra y
W3 1
S ens e/W rite
circu itry
10 - b it
address
32 -to -1
outp ut m ultip lexer R /W
and
input de m ultip le xer CS
5-b it colum n
address
D ata
input/ou tpu t
F ig ur e 5 .3 . O r gan iz ati on o f a 1 K 1 m em or y c hi p.
2. Static Memories :
Memories that consist of circuits capable of retaining their state as long as
power is applied are known as static memories.
Read Operation:
• The word line is activated to close switches T1 & T2
•
If the cell is in state 1, the signal on bit line b is high and the signal
on bit line b’ is low. The opposite is true is the cell is in state 0.
•
Sense / Write circuits at the end of the bit lines monitor the state of
b and b’ and set the output accordingly.
Write Operation:
• The state of the cell is set by placing the appropriate value on bit
line b and its complement b’ and then activating the word line.
This forces the cell into the corresponding state. The required
signals are generated by the Sense/Write circuit.
b b
T1 T2
X Y
W o r d l in e
B i t l i ne s
F i g u r e 5 . 4 . A s t a t i c R A M c e l l.
Disadvantages:
• volatile memory
• 6 transistors are needed for each cell, hence the size is large.
• High cost because of the number of transistors.
Advantages:
• Low power consumption because current flows in the cell only
when the cell is being accessed.
• Access times are very less and are used in applications where
speed is of critical concern.
b V s u p p ly b
T3 T4
T1 T2
X Y
T5 T6
W o r d l in e
B i t l in e s
F ig u r e 5 . 5 . A n e x a m p le o f a C M O S m e m o r y c e l l .
Asynchronous DRAM:
Dynamic RAM -- Less expensive because simpler cells are used.
-- These cells do not retain their state indefinitely.
Dynamic RAM:
•Information is stored in a dynamic memory cell in the form of a
charge on a capacitor, and this charge can be maintained for only
tens of milliseconds.
•Since the cell is required to store information for a much longer
time, its contents must be periodically refreshed by restoring the
capacitor charge to its full value.
Bit line
Word line
T
C
To store:
• The transistor T turned on and appropriate voltage is applied to
bit
line. This causes a known amount of charge to be stored in the
capacitor.
• After the transistor is turned off, capacitor begins to discharge.
This is caused by the capacitors own leakage resistance and by
the fact that the transistor continues to conduct a tiny amount of
current,
Row
address Row 4096 (512 8)
latch decoder cell array
Column
address Column
latch decoder
CAS D7 D0
Column Addr. Strobe
To Read:
• The transistor on the selected cell is turned on.
• A sense amplifier connected to the bit line detects whether the
charge stored on the capacitor is above the threshold value.
Refresh circuit :
- each row of cell is accessed periodically automatically.
- Many chips incorporate this refresh facility within the
chips.
- The dynamic nature of these memory chips is invisible
to the user.
Memory device timing controlled asynchronously.
➢ Row Address Strobe (RAS), Column Address Strobe (CAS) signals
govern the timing.
➢ The processor must take into account the delay in the response
of the memory.
➢ Such memories are referred to as asynchronous DRAM’s.
Fast page mode: bulk transfer.
Row selection address A20-9 ---- placed
Column selection - bytes selection A8-0 - placed
−8
Row
address Row
decoder Cell array
latch
Row/Column
address
Column Column
address Read/Write
counter decoder circuits & latches
Clock
RA S
Mode register
CA S and Data input Data output
register register
R/ W timing control
CS
C lock
R/W R
AS C
A S
A dd r es s Row Col
D a ta D 0 D 1 D 2 D3
F i g u r e 5 .9 . B u r s tr e a d o f l e n g t h 4 i n a n S D RA M .
• Block transfers.
DDR SDRAM
o Transfers data on both edges of the clock.
o Bandwidth is doubled for long burst transfers.
o Cells are organized in two banks.
o each bank can be accessed separately.
o Consecutive words of a given block are stored in different
banks.
o Such interleaving of words allows simultaneous access to two
words that are transferred on successive edges of the clock.
o Block transfers
A 19
A 20
2-bit
decoder
512 K ´ 8
memory chip
D 31-24 D 23-16 D 15-8 D 7-0
Chip select
Figure 5.10. Organization of a 2M 32 memory module using 512K 8 static memory chips.
Address bits
2bits 19 bits
Used to select the chip ↑ ↑
row0 →00 used to access the specific byte location inside
row 1→01 each
chip of the selected row.
row 2 →10
row 3 → 11
Advantage:
- occupy smaller amount of space on motherboard.
- allows easy expansion by using larger modules in the same
socket.
R o w /C o l u m n
Addres s a d d r e ss
RAS
R/ W
CAS
M e m ory
Reques t c o n tro lle r R/ W
P r o ce ss o r CS M em o ry
C l o ck
C lo ck
D a ta
0 ← Vref. → 1
-0.3 ← 2v → +0.3
This type of signaling is known as differential signaling.
Advantages:
- small voltage swings make it possible to have short transition
times.
- allows high speed of transmission.
Disadvantage:
-special techniques needed for width design.
- needs special circuit interfaces.
-needs specially designed memory chips.
Memory chips:
-cell arrays.
-multiple banks of cell arrays are needed to access more than one
word at a time.
- circuitry needed to interfere to the Rambus channel is included on
the chip.
data lines, which means that several clock cycles are needed to
transmit the entire packet. Using a narrow communication link is
compensated by the very high rate of transmission.
5.8.1 ROM
[fig. 5.12]
-logic value 0 is stored if the transistor is connected to the ground at
point P, otherwise a1 is stored
Word line
T
Not connected to sto re a 1
P Connected to sto re a 0
5.8.2 PROM
-allow data to be loaded by user.
-programmable ROM.
-before programming, all memory locations contain 0.
- A fuse is inserted at point P in fig. 5.12
- burning the fuse makes it 1.
- irreversible process.
PROM ROM
-flexible and convenient - cheap.
-faster and less expensive -cheap when prepared in large no’s.
approach to write - expensive write operation.
5.8.3 EPROM
-allows stored data to be erased and new data to be loaded.
- Erasable Programmable ROM.
-similar to ROM fig. 5.12
-but uses a special transistor.
[ As a normal transistor or as a disable transistor. (ie) always turned
off ]
-contents can be erased by dissipating the charges trapped in the
transistors of memory cells, this is done by exposing the chip to UV light.
5.8.4 EEPROM
Disadvantage of EPROM
-chip must be physically removed from the circuit for
reprogramming and entire contents are erased by UV light.
EEPROM
Advantage :
-programmed and erased electrically.
-do not have to be removed for erasure.
-selective erasure possible.
Disadvantage of EEPROM
-different voltages needed for erasing, writing and reading the stored data.
5. Flash memory
- a flash cell is based on a single transistor controlled by trapped charge
like EEPROM.
Solution:
o DMA – transfer of large blocks of data at high speed
o DMA – without continuous intervention by processor
DMA Controller:
o DMA transfers are performed by a control circuit that is part of the
I/O device interface called the DMA Controller.
o This performs the functions that would normally be carried out by
the processor when accessing the main memory.
Steps:
(i) To initiate the transfer of a block of words, the processor sends
the
o Starting address
o The number of words in the block and
o The direction of the transfer (R/W)
(ii) On receiving this information , the DMA Controller performs the
requested operation.
31 30 1 0
IRQ Done
IE R/ W
Starting address
Word count
Bus Access:
o Memory access by the processor and the DMA Controllers are
interwoven.
o Requests by DMA devices for using the bus are always given higher
priority than processor requests.
Ma in
P ro ce sso r
cessor m e mo ry
S yste m ubs
D isk /D M A DM A
con troller co ntr ol le r
ntroller P rinter
ri nte r K eyb o
oaard
rd
Dis
D iskk Dis
D iskk Network
Interfa ce
o Conflicts:
o A conflict may arise if both the processor & DMA controller or
two DMA controllers try to use the bus at the same time to
access the main memory. To resolve these conflicts, an
arbitration procedure is implemented on the bus to coordinate
the activities of all devices that requested memory transfer.
o Bus arbitration:
o The device that is allowed to initiate data transfers on the bus
at any given time is called the bus master.
o When the current master relinquishes control of the bus,
another device can acquire this status.
o Bus arbitration is the process by which the next device to
become the bus master is selected and bus mastership is
transferred to it.
5.10 Cache Memories
-makes the main memory appear to the processor to be faster than it
really is.
Locality of reference:
-most of the execution time is spent on routines in which many
instructions are executed repeatedly.
R eg is te r s
In cr ea si ng In c re a s i ng In cr e a si ng
si ze sp e e d co st p e r b it
P ri m a ry L 1
ca ch e
S eco
e con nd
d a ry
a Lry2
chee L 2
ca ch
M a in
m em o ry
M a g n e tic d isk
se co n d a ry
m e m o ry F ig u r e 5 .1 3 . M e m o r y h ie r a r ch y.
Main
Processor Cache memory
Write Hit
- Write operation:
1. Write –through:
- cache and main memory location updated simultaneously.
2. Write – back or copy-back
- uses Dirty or Modified bit per block
- update only the cache location and mark
- it as updated with an associated flag bit.
-main memory is updated only when this block is removed
from cache to make room for a new block.
Write Hit :
Write through
➢ Simpler
➢ Result in unnecessary write operations, when a given cache is
updated several times
Write Back
➢ Results in unnecessary write when only a few words are updated
but writes the entire block
Road Operation:
When a read miss occurs ,
Method 1:
➢ A block of words that contains the requested word is copied from
the main memory into the cache
➢ After the entire block is loaded into the cache, the requested word
is forwarded to the processor
Method 2: ( Load through or early restart )
➢ The requested word is first forwarded to the processor as soon as it
is read form the main memory
Write Miss:
1.Write through
➢ Written directly into the main memory
2. Write Back
➢ Block containing the addressed word is 1st brought into the cache
and then the desired word in the cache in overwritten with the new
information.
1. MAPPING FUNCTIONS :
➢ Correspondence between the main memory blocks and those in the
cache is specified by a mapping formula
1. Direct Mapping:
➢ Simplest method: not flexible ( fixed mapping )
➢ Block ‘ j ‘ of the main memory is mapped onto block j mod
128 of the cache
e.g., Main memory block ----- Mapped to ---- Cache Block
NO
0,128,256 →0
1,129, 257 →1
➢ Block j of main memory maps onto block j modulo 128 of
the cache
Contention Problems
➢ More than one block mapped onto the same cache block
position
➢ Same cache block may be replaced even when other blocks
are empty
e.g ., branch from block 1 to block 129
M ain
m e m ory
Blo ck 0
Blo ck 1
C ache Blo ck 12
12 77
ta g
Blo ck 00 Blo ck 12
12 88
ta g
Blo ck 11 Blo ck 12
12 99
ta g
Blo ck 12 7 Blo ck 25
25 55
Blo ck 25
25 66
Blo ck 25
25 77
Fi gure 5.15 . Di rect-m apped c ache.
Blo ck 44 09
09 55
Ta g Blo ck W ord
5 7 4 M ain m e mo ry a dd ress
⚫ Tag: 11101
⚫ Block: 1111111=127, in the 127th block of the cache
Word:1100=12, the 12th word of the 127th block in the cache
➢ Position of a block in cache is determined by its address
Memory Address => 16 bits
➢ Stored as tag bits determines the exact block no.within the
cache block
(0 or 128 or 256 .. )
➢ Identify which of the 32 blocks that are mapped into this
cache position are currently resident in the cache.
Memory Access:
(i) 7 bit cache block field of the address finds the cache
block number
If they match ,
➢ The desired word is in that block
➢Block read by using low order 4 bits
Else,
2. Associative Mapping:
Advantages :
➢ More flexible method
➢ Main memory block can be placed in any cache block
position
➢ Space in cache used more effectively
➢ Word field - 4: one of 16 words. (each block has 16=24
words)
➢ Tag field - 12: 12 tag bits Identify which of the 4096 blocks
that are resident in the cache 4096=212.
M a in
m e m o ry
B lo c k 00
B lo c k 11
C ache
ta g
B lo c k 00
ta g
B lo c k 11
B lo c k i
ta g
B lo c k 1 2 7
T ag W o rd
B lo cc kk 44 009955
12 4
M a in m e m o r y a d d r e s s
F i g u r e 5 . 1 6 . A s s o c i a t iv e - m a p p e d c a c h e .
⚫ Tag: 111011111111
⚫ Word:1100=12, the 12th word of a block in the cache
Disadvantages :
➢ If the cache is full, and if a new block has to be brought into
the cache, an existing block has to be replaced by the
replacement algorithm
➢ Cost of associative mapping is higher than the cost of direct
mapping, because all 128 tags must be searched to
determine whether the given block is in the cache or not.
This search is called ASSOCIATIVE SEARCH.
Bl
Bl ock 0
ock 0
Bl ock 1
C a ch e
ta g
Bl ock 00
Se t 0 Bl ock
ock 63
ta g
Bl ock 11
Bl ock
ock 64
ta g
Bl ock 22
Se t 1
Bl ock
ock 65
ta g
Bl ock 33
Bl ock 1 27
ta g
Bl ock 1 26
Se t 63
Bl ock 1 28
ta g
Bl ock 1 27
Bl ock 1 29
Ta g Set W o rd
6 6 4 M ain m e mo ry a dd re ss
Bl ock 4 09 5
Fi gure 5.17. Set-as soc ia ti ve -mapp ed cac he with two bl ock s per set.
Ta g S e t W o rd
6 6 4 Mainmemoryaddres s
1 1 1 0 1 1 ,1 1 1 1 1 1 ,1 1 0 0
⚫ Tag: 111011
⚫ Set: 111111=63, in the 63th set of the cache
⚫ Word:1100=12, the 12th word of the 63th set in the cache
e.g., 2 blocks per set
Extreme Conditions:
➢ 128 blocks per set requires no set bits. => fully associative
technique( 12 tag bits )
CONTROL BITS:
Valid Bit:
➢ Every block has a valid bit
➢ Indicates whether the block contains valid data
Dirty Bit:
➢ Indicates whether the block has been modified
Valid Bit:
➢ Initialized with 0, when power is initially applied
➢ Set to 1, when the block in cache is loaded from main memory
➢ When main memory block is updated directly bypassing the cache
memory, then a check is made to determine whether the block is in
cache, if it is found valid bit is cleared to 0 ( ensures stale data will
not exist in the cache )
➢ Solution :
o Flush the cache by forcing the dirty data to be written back
to the memory before the DMA transfer takes place.
2. Replacement Algorithm
Direct Mapped Cache → position of each block is predetermined, so no
need of replacement strategy
Objective:-
To keep the blocks in the cache that are likely to be referenced in the
near future. (property of locality of reference)
2. Farthest:
•Replace the block that is farthest from the current block.
Problem:
• Does not take into account the recent pattern of access to blocks in
the cache.
3.Random:
•Choose a random block for replacement
Advantage:
5.11.1 INTERLEAVING :
-Main memory is a collection of physically separate modules, with its own
Adds. Buffer register ( ABR ) & Data Buffer Register ( DBR )
-Memory operations may proceed in more than one module at the same
time
Method 1
Method 2
- refer fig 5.25 (b)
-Consecutive addresses are located in successive modules.
Disadvantages :
-Bulk transfer keeps several modules busy at any one time
Advantages :
Given:
Cache = 8 word / blocks
Hardware properties:
Problem :
1. Given
Main memory access = 10 clock cycles
Cache size = 8 words block
Time to load a block from main memory to cache = 17 cycles –
30% of inst. in the program perform a read or write
Hit rates in cache for Inst = 0.95 for Data =0.9
Solution :
Total memory access = 100 inst + 30 data = 130 memory access for
every 100 inst.
spacial locality
Adv. - Parallel access to blocks in an interleaved memory - many
words can be
accessed in parallel
Disadv. – If the block is very large, some items may not be
referenced before the
block is replaced. This increases miss penalty
3.Miss penalty can be reduced if the load through approach is used
when loading new
blocks into the Cache.
4. Cache on Processor chip and on a separate chip
Same Chip - Speed – Space on the processor is limited which limits
the size of the
Cache
Separate Chip – Delay
➢ Complex circuitry
7. Two levels of cache
L1 – small , faster cache
L2 – slower , larger hit rate
H1 → hit rate of L1 cache
H2 → hit rate of L2 cache
C1 → time to access L1 cache
C2 → time to access L2 cache
M → time to access main memory
Average access time for the processor t avg = h1 * c1 + (1-h1)*h2*c2
+ (1-h1)*(1-h2) * M
Enhancements to reduce the miss rate / penalty:
1. Using Write buffer:
➢ In write through protocol, processor writes to cache memory &
main memory, but instead of writing into the main memory
processor writes into the ‘Buffer’. Processor does not wait for
main memory write to complete.
➢ Read requests should be serviced immediately. Read is given
priority over write.
➢ Read request may be to a data found in Buffer, so read request
checks buffer if not in cache.
➢ During Read Miss, if cache memory is full & if it replaces a block
with dirty bit, cache memory block should be written to main
memory, then new block from main memory is brought to cache
memory.
➢ When dirty blocks are to be written to main memory, instead of
writing it into main memory, it is written to the buffer, read
request is processed and then latter written to the main
memory.
storage device.
• A program need not be aware of the limitations imposed by the
available main memory.
P ro c e s s o r
V ir tu a l a d d re s s
M e m o ry
D ata MMU M anagem ent
U nit
P h y sic a l a d d re s s
C a ch e
D a ta P h ys ic a l a d d re ss
M a in m e m ory
D M A tra n s fe r
D is k s to ra g e
F ig u r e 5 . 2 6 . V i rt u a l m e m o r y o r g a n iz a ti o n .
Address Translation:
• Programs & data are composed of fixed length units called pages.
• Pages consists of a block of words that occupy contiguous locations
in main memory.
• Pages are the basic unit that is moved between main memory &
disk.
o Implemented in hardware
o Blocks → set of words
• Virtual / Logical address:
• Information about the main memory location of each page is kept
in a page table.
• Page table consists of main memory address & logical address &
current status of the page.
• An area in main memory that can hold one page is called a page
frame.
• Starting address of the page table is kept in a page table base
register
• Page table address = page no. in virtual address + [ page table
base register]
• The calculated address gives the starting address of the page in
main memory.
• There is an entry in the page table for every page in the program.
• It also includes some control bits – status of the page in main
memory.
V ir tu a l a d d re s s fro m p ro c e s s o r
P a g e ta b le b a s e re g is te r
P a g e ta b le a d d re s s V ir tu a l p a g e n u m b e r O ffs e t
+
P A G E T A B LE
C o n tro l P a g e fra m e
b it s in m e m o ry P a g e f ra m e O f fs e t
F ig u r e 5 .2 7 . V ir tu a l- m e m o r y a d d r e s s tr a n s la tio n . P h y s ic a l a d d re s s in m a in m e m o r y
Translation process:
• Processor gives virtual address to MMU.
• MMU looks into the TLB for the virtual address entry.
• If found (hit) then the physical address i.e. physical page no. in
main memory is got, and main memory or cache memory is
accessed for data, which is then forwarded to the processor.
• If not found (miss) then the MMU gets the page table from main
memory, updates the TLB and then accesses the main memory.
Page Fault:
• When the requested page is not found in the main memory , a
page fault is said to have occurred.
• A whole page must be brought from the disk into the main memory
• MMU asks the OS to raise an interrupt.
o Processing of the active task is interrupted
o Control is transferred to the OS
o OS copies the requested page from disk to main memory
o And returns control to the interrupted task.
Replacement Algorithm:
• If a new page is brought from the disk when the main memory is
full, it replaces one of the resident pages.
TLB
No
=?
Yes
Miss
Hit
Disadvantages
o Poor bit-storage density (ie) space required to represent each bit
must be large enough to accommodate two changes in
magnetization
o Read / Write heads must be maintained at a very small distance
from the moving disk surface
To activate high bit densities &
Reliable read/write operation
o Air pressure builds between the disk surface and the head forces
the head away from the surface
Storage :
o Data bits are stored serially on each track
o Data is preceded by a sector header that contains addressing
information used to find the desired sector on the selected track
o Following the data, there are additional bits that constitute an
error-correction code ( ECC ) used to detect and correct errors
o To distinguish between two consecutive sectors, there is a small
inter-sector gap
Formatting :
o Physically divides the disk into tracks and sectors
Disk Controller :
o Keeps track of defective sectors
o Formatting information – sector header, ECC bits & inter-sector
gaps.
ACCESS TIME:
1. Seek time : - Time required to move the Read / Write head to the
proper track –
It depends on initial position of the head relative to
the track specified in the address.
o Disk → Buffer → MM
Slow Fast
Rotational speed Speed of bus
of the disk
o Functions of D.C
1. Seek
2. Read -- serially read from disk assembled
into words and placed into the data buffer
3. Write
4. Error Checking – used while reading, if
error found informs OS
S/W & OS Implications :
o All data transfers involving disk are initiated by OS
o Booting – OS is loaded into the MM
-- ROM stores a small monitor program that can read &
write MM
locations and read one block of data stored on the disk at
address O . This
block is referred to as the Boot Block contains a loader
program.
-- After the boot block is loaded into MM it loads the main
parts of the OS
raising an interrupt
-- OS can schedule overlapped I/O activities
DMA transfer on one disk
Advantages:
➢ All disks can deliver their data in parallel, when the file is read
➢ Total transfer time =
Transfer time required in a single –disk system
No. of disks used in the array
RAID 1
➢ Better reliability by storing identical copies of data on two disks
rather than just one the two disks are said to be mirrors of each
other
Advantages :
➢If one disk fails all R/W operations are directed to its mirror
Disadvantages :
➢ Costly way to improve the reliability because all disks are
duplicated
RAID 2, RAID 3 & RAID 4 :
➢ Achieves increased reliability thorough various parity checking
schemes without requiring a full duplication of disks
➢ All of the parity information is kept on one disk
RAID 5 :
➢ Makes use of a parity – based error recovery scheme
➢ Parity information is distributed among all disks, rather than being
stored on one disk
RAID 10:
➢ Combines features of RAID & RAID1
RAID has been redefined by the industry to refer to “independent “ disks.
➢ Low price
➢ Separate controller is needed for each drive if two drives are to be
used concurrently to improve performance
SCSI disks :
➢ Has interface designed for connection to a standard SCSI bus
➢ More expensive, better performance
➢ Concurrent access can be made to multiple disk drives because the
drives interface are actively connected to the SCSI bys only when
the drive is ready for data transfer
Advantages :
➢ When large number of requests of a small file.
RAID disks :
➢ Excellent Performance
➢ Large & Reliable Storage
II OPTICAL DISKS
COMPACT DISCS ( C.Ds )
1. C.D Technology
o Laser light source
o A laser beam is directed onto the surface of the spinning
disk
o Physical indentations in the surface are arranged along
the tracks of the disk
o They reflect the focused beam towards photo-detector,
which detects the storage binary patterns
o Laser emits a light beam that is sharply focused on the
surface of the disk
o If a light beam is combined with another light beam of
the same kind a bright spot is placed
o If two light beams which are out of phase, they cancel
each other and a dark spot is placed.
Aluminium – reflects light
Acrylic -- Protective cover
o Laser source and the photo-detector are positioned below
the polycarbonate plastic
travels through reflects off travels back
to
Storage:
o Pits are arranged along tracks on the surface of the disk
o There is just one physical track, spiraling from the middle of
the disk towards the outer edge
(a) Cross-secti on
Pit Land
Reflection Reflection
No refle ction
2. CD-ROM :
Disadvantages of CDs
o Biggest problem is to ensure integrity of stored data
o Because the pits are very small, it is difficult to implement all the
pits perfectly. This leads to errors during reading
Solution:
o Provide additional bits to provide error checking and correction
o C.Ds with such capability is called C.D ROM
Data Storage
Mode 1 Format :
16 byte 2048 bytes ---- ---- ---- -- 288 byts of error
header of data - correction scheme
--
Total 2352 bytes / sector – no. of sectors is more on the
longer outer tracks
Rotational Speeds:
o 1X → 75 sectors per second
o Provides a data rate of 153,600 bytes/ sec – uses mode / format
o Speed affects only data transfer rate but not the storage capacity
Disadvantages :
o Lower transfer rates than magnetic hard disks
o Longer seek time
o Advantage
o Small size
o Low cost
o Larger capacity
o Ease of handling as remarkable and transportable mass-storage
medium
5. C.D Recordable(CD-R) :
CD ROM’s creation
o Master disk produced with high –power laser to burn holes that
correspond to pits
4. CD-REWRITABLE
o Can be written multiple times by the user .
o Instead of an organic dye in the recording layer ,an alloy of
silver ,indium ,antimony& tellurium is used .
o If it is heated above its melting point ( 500C ) & then cooled down ,
it goes into an amorphous state in which it absorbs light .
o If it is heated to about 200C,& this temperature is maintained for
an extended period , a process known as annealing takes place ,
which leaves the alloy in a crystalline state , that allows the light to
pass through .
5 DVD TECNOLOGY
o DVD- Digital Versatile Disk technology.
o Great storage capability.
o A red light laser with a wave length of 635nm is used instead of the
infra red light laser used in CDs, with a wave length of 780nm.
o The shorter wavelength makes it possible to focus the light to a
smaller spot.
6 DVD_RAM:
Advantages:
o Rewritable version of DVD.
o Large storage capacity
Disadvantages:
o Higher price
o Slow writing speed
o Write verification is performed
o Reads the stored data
o Checks them against the original data
File File
mark File
mark
• •
• • 7 or 9
• •
• •
bits
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Assignments
1) One difference between a write-through cache and a write-back
cache can be in the time it takes to write. During the first cycle, we detect
whether a hit will occur, and during the second (assuming a hit) we actually write
the data. Let’s assume that 50% of the blocks are dirty for a write-back cache.
For this question, assume that the write buffer for the write through will never
stall the CPU (no penalty). Assume a cache read hit takes 1 clock cycle, the cache
miss penalty is 50 clock cycles, and a block write from the cache to main memory
takes 50 clock cycles. Finally, assume the instruction cache miss rate is 0.5% and
the data cache miss rate is 1%. Assuming that on average 26% and 9% of
instructions in the workload are loads and stores, respectively, estimate the
performance of a write-through cache with a two-cycle write versus a write-back
cache with a two-cycle write. [CO4, K3]
2) A block-set associative cache memory consists of 128 blocks divided into four
block sets . The main memory consists of 16,384 blocks and each block contains
256 eight bit words. [CO4, K3]
a. How many bits are required for addressing the main memory?
b. How many bits are needed to represent the TAG, SET and WORD
fields?
3) A 4-way set associative cache memory unit with a capacity of 16 KB is built using
a block size of 8 words. The word length is 32 bits. The size of the physical
address space is 4 GB. The number of bits for the TAG field is . [CO4, K3]
4) Consider a direct mapped cache with 8 cache blocks (0-7). If the memory block
requests are in the order- [CO4, K3]
3, 5, 2, 8, 0, 6, 3, 9, 16, 20, 17, 25, 18, 30, 24, 2, 63, 5, 82, 17, 24
Which of the following memory blocks will not be in the cache at
the end of the sequence?
1. 3
2. 18
3. 20
4. 30
Also, calculate the hit ratio and miss ratio.
5) Consider a fully associative cache with 8 cache blocks (0-7). The
memory block requests are in the order- [CO4, K3]
6) Two of the design choices in a cache are the row size (number of
bytes per row or line) and whether each row is organized as a single
block of data (direct mapped cache) or as more than one block (2-way
or 4-way set associative). The goal of a cache is to reduce overall
memory access time. Suppose that we are designing a cache and we
have a choice between a direct-mapped cache where each row has a
single 64-byte block of data, or a 2-way set associative cache where
each row has two 32-byte blocks of data. Which one would you
choose and why? Give a brief technical justification for your answer. If
the choice would make no difference in performance then explain why
not. [CO4, K3]
Part A – Questions &
Answers
1. What is temporal locality? [K2, CO4]
Temporal locality is a principle stating that if a data location is
referenced then it will tend to be referenced again soon which is
also called as locality in time.
Analogy: If you recently brought a book to your desk to look at,
you will probably need to look at it again soon.
block is replaced.
21.Explain split cache scheme. [K2, CO4]
A scheme in which a level of the memory hierarchy is composed of
two independent caches that operate in parallel with each other,
with one handling instructions and one handling data.
Refer answer of Q 45
Method 1
- refer fig -5.25 (a)
mbits k bits
k bits mbits Add ress in mo dule Module MM add ress
Mo dule Add ress in mo dule MM add ress
Bus arbitration:
• The device that is allowed to initiate data transfers on the
bus at any given time is called the bus master.
• When the current master relinquishes control of the bus,
another device can acquire this status.
• Bus arbitration is the process by which the next device to
become the bus master is selected and bus mastership is
transferred to it.
o Block transfers
148
Supportive Online Certification Courses
https://www.coursera.org/lecture/comparch/pipeline-basics-
omMiS
https://nptel.ac.in/courses/106/105/106105163/
https://www.udemy.com/topic/computer_x0002_architecture/
149
Real time
applications in day
to day life and to
Industry
150
Real time applications in day to day life and to Industry
Internet of Things
Cloud Storage
Data Centers
151
Content beyond
syllabus
152
Blu-ray Disc
The Blu-ray Disc (BD), often known simply as Blu-ray, is
a digital optical disc storage format. It is designed to
supersede the DVD format, and capable of storing several
hours of high-definition video (HDTV 720p and 1080p). The
main application of Blu-ray is as a medium for video material
such as feature films and for the physical distribution of video
games for the PlayStation 3, PlayStation 4, PlayStation 5,
Xbox One, and Xbox Series X.
The name "Blu-ray" refers to the blue laser (which is
actually a violet laser) used to read the disc, which allows
information to be stored at a greater density than is possible
with the longer_x0002_wavelength red laser used for DVDs.
The plastic disc is 120 millimetres (4.7 in) in diameter and 1.2
millimetres (0.047 in) thick, the same size as DVDs and CDs.
Conventional or pre-BD-XL Blu_x0002_ray Discs contain 25
GB per layer, with dual-layer discs (50 GB) being the industry
standard for feature-length video discs. Triple-layer discs (100
GB) and quadruple layer discs (128 GB) are available for BD-
XL re-writer drives.
High-definition (HD) video may be stored on Blu-ray Discs
with up to 1920×1080 pixel resolution, at 24 progressive or
50/60 interlaced frames per second. DVD_x0002_Video discs
were limited to a maximum resolution of 480i (NTSC,
720×480 pixels) or 576i (PAL, 720×576 pixels). Besides these
hardware specifications, Blu-ray is associated with a set of
multimedia formats
153
Assessment
Schedule
154
Assessment Schedule
(Proposed Date & Actual Date)
156
Text Book and Reference Book
Text Books:
1. David A. Patterson and John L. Hennessy, Computer Organization and Design: The
Hardware/Software Interface, Fifth Edition, Morgan Kaufmann / Elsevier, 2014.
2. Carl Hamacher, Zvonko Vranesic, Safwat Zaky and Naraig Manjikian, Computer
Organization and Embedded Systems, Sixth Edition, Tata McGraw Hill, 2012.
Reference Books:
1. William Stallings, Computer Organization and Architecture – Designing for Performance,
Eighth Edition, Pearson Education, 2010.
2. John P. Hayes, Computer Architecture and Organization, Third Edition, Tata McGraw Hill,
2012.
3. John L. Hennessey and David A. Patterson, Computer Architecture – A Quantitative
Approach, Morgan Kaufmann / Elsevier Publishers, Fifth Edition, 2012.
EBOOK LINKS:
https://drive.google.com/file/d/1ZxZ7d5dVERbiCwb5Md5L137fWoMwOFBh/view?usp
=sharing
157
Mini Projects
Suggestion
158
Mini Project Suggestions
Reference:
1) https://ieeexplore.ieee.org/document/9431291
2) https://dl.acm.org/doi/abs/10.1145/3376920
3) https://ieeexplore.ieee.org/abstract/document/7019786
4) https://ieeexplore.ieee.org/document/839642
Thank you
Disclaimer:
This document is confidential and intended solely for the educational purpose of RMK Group of
Educational Institutions. If you have received this document through email in error, please notify the
system manager. This document contains proprietary information and is intended only to the
respective group / learning community as intended. If you are not the addressee you should not
disseminate, distribute or copy through e-mail. Please notify the sender immediately by e-mail if you
have received this document by mistake and delete this document from your system. If you are not
the intended recipient you are notified that disclosing, copying, distributing or taking any action in
reliance on the contents of this information is strictly prohibited.
160