UCB CS61C : Machine Structures

Similar documents
Recursive Mergesort. CSE 589 Applied Algorithms Spring Merging Pattern of Recursive Mergesort. Mergesort Call Tree. Reorder the Merging Steps

Intel x86 Jump Instructions. Part 5. JMP address. Operations: Program Flow Control. Operations: Program Flow Control.

Intel x86 Jump Instructions. Part 6. JMP address. Operations: Program Flow Control. Operations: Program Flow Control.

Excel Lesson 3 page 1 April 15

Dusko Pavlovic. University of Twente. November Logics of Authentication, Lieing and Obscurity. Dusko Pavlovic. Question.

Overview of the ATLAS Fast Tracker (FTK) (daughter of the very successful CDF SVT) July 24, 2008 M. Shochet 1

Test Item File. Full file at

Bigdata High Availability Quorum Design

1. Introduction Formal deductive logic Overview

Today s Lecture 1/28/10

Artificial Intelligence: Valid Arguments and Proof Systems. Prof. Deepak Khemani. Department of Computer Science and Engineering

Quorums. Christian Plattner, Gustavo Alonso Exercises for Verteilte Systeme WS05/06 Swiss Federal Institute of Technology (ETH), Zürich

LDS Records Exercise

Logic and Thought Experiments. 9th September Carnegie Mellon University. Introduction to Philosophy. Evaluating Arguments. Thought Experiments

PROSPECTIVE TEACHERS UNDERSTANDING OF PROOF: WHAT IF THE TRUTH SET OF AN OPEN SENTENCE IS BROADER THAN THAT COVERED BY THE PROOF?

Kant Lecture 4 Review Synthetic a priori knowledge

P2P Content Distribution BitTorrent and Spotify

Subjective Logic: Logic as Rational Belief Dynamics. Richard Johns Department of Philosophy, UBC

Digital Logic Lecture 5 Boolean Algebra and Logic Gates Part I

Revista Economică 66:3 (2014) THE USE OF INDUCTIVE, DEDUCTIVE OR ABDUCTIVE RESONING IN ECONOMICS

Module 5. Knowledge Representation and Logic (Propositional Logic) Version 2 CSE IIT, Kharagpur

INTERMEDIATE LOGIC Glossary of key terms

Lazy Functional Programming for a survey

MiNRS Discussion Questions & Responding to Quotes / Passages

Name: ELA 12: Summer Reading Project. The Curious Incident of the Dog in the Nighttime by Mark Haddon

Beyond Symbolic Logic

Artificial Intelligence Prof. Deepak Khemani Department of Computer Science and Engineering Indian Institute of Technology, Madras

Lecture 4: Deductive Validity

Can a Machine Think? Christopher Evans (1979) Intro to Philosophy Professor Douglas Olena

Module Who am I? Who are you? Lesson 5 Tutorial - Beliefs

24.09 Minds and Machines Fall 11 HASS-D CI

Initiative. Leadership. Organisation. Communication. Resilience. PiXL Edge Evaluation Tips. Attribute. Buzzwords

DNA, Information, and the Signature in the Cell

Continuum for Opinion/Argument Writing Sixth Grade Updated 10/4/12 Grade 5 (2 points)

Radiomics for Disease Characterization: An Outcome Prediction in Cancer Patients

! Introduction to the Class! Some Introductory Concepts. Today s Lecture 1/19/10

A Detailed Review of the Liturgical Rites and Norms Pertaining to Catechumens and Candidates in RCIA

A. Problem set #3 it has been posted and is due Tuesday, 15 November

KEEP THIS COPY FOR REPRODUCTION Pý:RPCS.15i )OCUMENTATION PAGE 0 ''.1-AC7..<Z C. in;2re PORT DATE JPOTTYPE AND DATES COVERID

Big Data: Pig Latin. P.J. McBrien. Imperial College London. P.J. McBrien (Imperial College London) Big Data: Pig Latin 1 / 44

Artificial Intelligence Prof. P. Dasgupta Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur

God Called Jeremiah. 1 st 4 th Grade Teacher Guide

ABB STOTZ-KONTAKT GmbH ABB i-bus KNX DGN/S DALI Gateway for emergency lighting

OPENRULES. Tutorial. Determine Patient Therapy. Decision Model. Open Source Business Decision Management System. Release 6.0

1.2. What is said: propositions

Over My Head. I. Introduction.

CSC290 Communication Skills for Computer Scientists

Cultural Relativism 1

PHLA10 Reason and Truth Exercise 1

Focus on the underlined parts of the transcript which highlight the key words and phrases needed to answer the questions correctly.

Question Answering. CS486 / 686 University of Waterloo Lecture 23: April 1 st, CS486/686 Slides (c) 2014 P. Poupart 1

Functionalism and the Chinese Room. Minds as Programs

SUMMARY COMPARISON of 6 th grade Math texts approved for 2007 local Texas adoption

Truth-Functional Propositional Logic

Smith Waterman Algorithm - Performance Analysis

Laura Snyder: The Philosophical Breakfast Club

Logic & Proofs. Chapter 3 Content. Sentential Logic Semantics. Contents: Studying this chapter will enable you to:

Haibin Shu Founder and Principal Consultant. April 19, 2017

Northern Seminary OT 301B THE PENTATEUCH (ONLINE) Winter 2016 Jason Gile, Ph.D. Affiliate Professor of Old Testament

Portofolio Transcript

Lecture 3. I argued in the previous lecture for a relationist solution to Frege's puzzle, one which

COACHING THE BASICS: WHAT IS AN ARGUMENT?

Teacher BIBLE STUDY. Older Kids Bible Study Leader Guide Unit 1 Session LifeWay Christian Resources

The Cross August 26, 2018

Worksheet Exercise 1.1. Logic Questions

correlated to the North Carolina Social Studies Standard Course of Study for Africa, Asia and Australia and Skills Competency Goals

Commentary on Sample Test (May 2005)

PASTORAL GUIDELINES. Chapter Five: Office of Sanctification. Appendix PASTORAL IMPLEMENTATION OF SACRAMENTS OF INITIATION

6.080 / Great Ideas in Theoretical Computer Science Spring 2008

Russell s Problems of Philosophy

Topological Distance Between Nonplanar Transportation Networks

Ambassador College and Recent Calendar History

THE BASIC GUIDE TO STUDY BIBLES

A Judgmental Formulation of Modal Logic

Toward An Epistemology of Peace

Sentiment Flow! A General Model of Web Review Argumentation

An earlier action or state has relevance at a later reference point, or point of orientation.

New FamilySearch in the Trenches: Thoughts About Best practices Laurie Castillo Aug 2011

Macmillan/McGraw-Hill SCIENCE: A CLOSER LOOK 2011, Grade 3 Correlated with Common Core State Standards, Grade 3

APRIL 2017 KNX DALI-Gateways DG/S x BU EPBP GPG Building Automation. Thorsten Reibel, Training & Qualification

The activity It is important to set ground rules to provide a safe environment where students are respected as they explore their own viewpoints.

Philosophy 148 Announcements & Such. Inverse Probability and Bayes s Theorem II. Inverse Probability and Bayes s Theorem III

Introduction to Statistical Hypothesis Testing Prof. Arun K Tangirala Department of Chemical Engineering Indian Institute of Technology, Madras

Module 02 Lecture - 10 Inferential Statistics Single Sample Tests

Grids: Why, How, and What Next

Logic, reasoning and fallacies. Example 0: valid reasoning. Decide how to make a random choice. Valid reasoning. Random choice of X, Y, Z, n

Building Your Framework everydaydebate.blogspot.com by James M. Kellams

When Faith And Science Collide: A Biblical Approach To Evaluating Evolution, Creationism, Intelligent Design, And The Age Of The Earth PDF

Basic Concepts and Skills!

Incarnation: How Would Christians Advertise Christmas To Show What Christmas Means Today?

Heidegger's Glasses: A Novel By Thaisa Frank

A priori Smith fair extra practice

Tower of Babel. CONCEPT God s plans are always for our good.

McDougal Littell High School Math Program. correlated to. Oregon Mathematics Grade-Level Standards

Introduction to Logic. Instructor: Jason Sheley

Sounds of Love Series. Human Intellect and Intuition

PHILOSOPHY OF LOGIC AND LANGUAGE OVERVIEW LOGICAL CONSTANTS WEEK 5: MODEL-THEORETIC CONSEQUENCE JONNY MCINTOSH

The Incredibles: Identity Problem Acts 9: 1-19

Aquinas Cosmological argument in everyday language

Johns Hopkins Center for Talented Youth Introduction to Philosophy

Transcription:

inst.eecs.berkeley.edu/~csc UCB CSC : Machine Structures Guest Lecturer Alan Christopher Lecture Caches II -- MEMRISTOR MEMORY ON ITS WAY (HOPEFULLY) HP has begun testing research prototypes of a novel non-volatile memory element, the memristor. They have double the storage density of flash, and has x more read-write cycles than flash ( vs ). Memristors are (in principle) also capable of being memory and logic, how cool is that? Originally slated to be ready by, HP later pushed that date to some time. www.technologyreview.com/computing/8 http://www.technologyreview.com/view//can-hp-save-itself/

Review: New-School Machine Structures Instruction Unit(s) Parallel Requests Assigned to computer e.g., Search Katz Parallel Threads Assigned to core e.g., Lookup, Ads Parallel Instructions > instruction @ one time e.g., pipelined instructions Parallel Data > data item @ one time e.g., Add of pairs of words Hardware descriptions All gates @ one time Programming Languages Core Memory Input/Output Cache Memory (Cache) Core Functional Unit(s)

Review: Direct-Mapped Cache All fields are read as unsigned integers. Index Tag Offset specifies the cache index (or row /block) distinguishes betw the addresses that map to the same location specifies which byte within the block we want tttttttttttttttttt iiiiiiiiii oooo tag index byte to check to offset if have select within correct block block block CSC L Caches II ()

TIO Dan s great cache mnemonic AREA (cache size, B) = HEIGHT (# of blocks) * WIDTH (size of one block, B/block) Tag Index Offset (H+W) = H * W WIDTH (size of one block, B/block) Addr size (often bits) HEIGHT (# of blocks) AREA (cache size, B) CSC L Caches II ()

Memory Access without Cache Load word instruction: lw $t, ($t) $t contains ten, Memory[] = 99. Processor issues address ten to Memory. Memory reads word at address ten (99). Memory sends 99 to Processor. Processor loads 99 into register $t CSC L Caches II ()

Memory Access with Cache Load word instruction: lw $t, ($t) $t contains ten, Memory[] = 99 With cache (similar to a hash). Processor issues address ten to Cache. Cache checks to see if has copy of data at address ten a. If finds a match (Hit): cache reads 99, sends to processor b. No match (Miss): cache sends address to Memory I. Memory reads 99 at address ten II. Memory sends 99 to Cache III. Cache replaces word with new 99 IV. Cache sends 99 to processor. Processor loads 99 into register $t CSC L Caches II ()

Caching Terminology When reading memory, things can happen: cache hit: cache block is valid and contains proper address, so read desired word cache miss: nothing in cache in appropriate block, so fetch from memory cache miss, block replacement: wrong data is in cache at appropriate block, so discard it and fetch desired data from memory (cache always copy) CSC L Caches II ()

Cache Terms Hit rate: fraction of access that hit in the cache Miss rate: Hit rate Miss penalty: time to replace a block from lower level in memory hierarchy to cache Hit time: time to access cache memory (including tag comparison) Abbreviation: $ = cache (A Berkeley innovation!) CSC L Caches II (8)

Accessing data in a direct mapped cache Ex.: KB of data, direct-mapped, word blocks Can you work out height, width, area? Read addresses. x. xc. x. x8 Memory vals here: CSC L Caches II (9) Memory Address (hex) Value of Word 8 C 8 C 8 8 88 8C

Accessing data in a direct mapped cache Addresses: x, xc, x, x8 Addresses divided (for convenience) into Tag, Index, Byte Offset fields Tag Index Offset CSC L Caches II ()

KB Direct Mapped Cache, B blocks Valid bit: determines whether anything is stored in that row (when computer initially turned on, all entries invalid) xc-f x8-b x- x- CSC L Caches II ()

. Read x xc-f x8-b x- x- CSC L Caches II ()

So we read block () xc-f x8-b x- x- CSC L Caches II ()

No valid data xc-f x8-b x- x- CSC L Caches II ()

So load that data into cache, setting tag, valid xc-f x8-b x- x- CSC L Caches II ()

Read from cache at offset, return word b xc-f x8-b x- x- CSC L Caches II ()

. Read xc =.. xc-f x8-b x- x- CSC L Caches II ()

Index is Valid xc-f x8-b x- x- CSC L Caches II (8)

Index valid, Tag Matches xc-f x8-b x- x- CSC L Caches II (9)

Index Valid, Tag Matches, return d xc-f x8-b x- x- CSC L Caches II ()

. Read x =.. xc-f x8-b x- x- CSC L Caches II ()

So read block xc-f x8-b x- x- CSC L Caches II ()

No valid data xc-f x8-b x- x- CSC L Caches II ()

Load that cache block, return word f xc-f x8-b x- x- CSC L Caches II ()

. Read x8 =.. xc-f x8-b x- x- CSC L Caches II ()

So read Cache Block, Data is Valid xc-f x8-b x- x- CSC L Caches II ()

Cache Block Tag does not match (!= ) xc-f x8-b x- x- CSC L Caches II ()

Miss, so replace block with new data & tag xc-f x8-b x- x- CSC L Caches II (8)

And return word J xc-f x8-b x- x- CSC L Caches II (9)

Do an example yourself. What happens? Chose from: Cache: Hit, Miss, Miss w. replace Values returned: a,b, c, d, e,..., k, l Read address x? Read address xc? xc-f x8-b x- x- CSC L Caches II ()

Answers x a hit Index =, Tag matches, Offset =, value = e xc a miss Index =, Tag mismatch, so replace from memory, Offset = xc, value = d Since reads, values must = memory values whether or not cached: x = e xc = d Memory Address (hex) Value of Word 8 C 8 C 8 8 88 8C CSC L Caches II ()

Administrivia Proj - due Sunday CSC L Caches II ()

Multiword-Block Direct-Mapped Cache Four words/block, cache size = K words

Peer Instruction ) Mem hierarchies were invented before 9. (UNIVAC I wasn t delivered til 9) ) All caches take advantage of spatial locality. ) All caches take advantage of temporal locality. CSC L Caches II () a) FFF a) FFT b) FTF b) FTT c) TFF d) TFT e) TTF e) TTT

And in Conclusion Mechanism for transparent movement of data among levels of a storage hierarchy set of address/value bindings address index to set of candidates compare desired address with tag service hit or miss load new block and binding on miss address: tag index offset xc-f x8-b x- x- CSC L Caches II ()