PRET DRAM Controller: Bank Privatization for Predictability and Temporal Isolation
|
|
- Edith Gibson
- 7 years ago
- Views:
Transcription
1 PRET DRM Controller: Bank Privatization for Predictability and Temporal Isolation ungjun Kim Columbia University Edward. Lee UC Berkeley Isaac Liu UC Berkeley Hiren D. Patel University of Waterloo Jan Reineke UC Berkeley <speaker> CODE+I as part of EWEEK 2011 Taipei, Taiwan, October 10th, 2011
2 Predictability and Temporal Isolation Many embedded systems are real-time systems Memory hierarchy has a strong influence on their performance: Need for Predictability Trend towards integrated architectures: Need for Temporal Isolation ide airbag in car, Reaction in <10 mec Crankshaft-synchronous tasks, Reaction in <45 µec udio + video playback with latency and bandwidth constraints Reineke et al., Berkeley 2
3 Outline Introduction DRM Basics Related Work: Predator and MC PRET DRM Controller: Main Ideas Evaluation Integration into Precision-Timed RM Reineke et al., Berkeley 3
4 Outline Introduction DRM Basics Related Work: Predator and MC PRET DRM Controller: Main Ideas Evaluation Integration into Precision-Timed RM Reineke et al., Berkeley 4
5 Memory Hierarchy: Dynamic RM vs tatic RM RM Fast Low Latency Low Capacity DRM low High Latency High Capacity from Hennessy and Patterson, Computer rchitecture: Quantitative pproach, Reineke et al., Berkeley 5
6 Dynamic RM Organization Overview DRM Cell Leaks charge Needs to be refreshed (every 64ms for DDR2/DDR3) therefore dynamic DRM et of DRM banks + Control logic I/O gating ccesses to banks can be pipelined, however I/O + control logic are shared addr+cmd DIMM Bit line Word line Transistor Capacitor Bank Row ddress Row Decoder DRM rray ense mplifiers and Row Buffer Column Decoder/ Multiplexer command chip select address Control Logic Mode Register ddress Register DRM Row ddress Mux Refresh Counter Bank Bank Bank Bank I/O Gating I/O Registers + Data I/O data 16 data 64 data 16 data 16 data 16 data 16 chip select 0 chip select 1 DRM Bank = rray of DRM Cells + ense mplifiers and Row Buffer haring of sense amplifiers and row buffer DRM Module Collection of DRM s Rank = groups of devices that operate in unison Ranks share data/address/ command bus Rank 0 Rank 1 Reineke et al., Berkeley 6
7 DRM Memory Controller Translates sequences of memory accesses by Clients (CPUs and I/O) into legal sequences of DRM commands Needs to obey all timing constraints Needs to insert refresh commands sufficiently often Needs to translate physical memory addresses into row/column/ bank tuples CPU1... CPU1 Interconnect + rbitration Memory Controller DRM Module I/O Reineke et al., Berkeley 7
8 Dynamic RM Timing Constraints DRM Memory Controllers have to conform to different timing constraints that define minimal distances between consecutive DRM commands. lmost all of these constraints are due to the sharing of resources at different levels of the hierarchy: addr+cmd DIMM Bit line Word line Transistor Capacitor Bank Row ddress Row Decoder DRM rray ense mplifiers and Row Buffer Column Decoder/ Multiplexer command chip select address Control Logic Mode Register ddress Register DRM Row ddress Mux Refresh Counter Bank Bank Bank Bank I/O Gating I/O Registers + Data I/O data 16 data 64 data 16 data 16 data 16 data 16 chip select 0 chip select 1 Needs to insert refresh commands sufficiently often Rows within a bank share sense amplifiers Banks within a DRM device share I/O gating and control logic Rank 0 Rank 1 Different ranks share data/address/ command busses Reineke et al., Berkeley 8
9 General-Purpose DRM Controllers chedule DRM commands dynamically Timing hard to predict even for single client: Timing of request depends on past requests: Request to same/different bank? Request to open/closed row within bank? Controller might reorder requests to minimize latency Controllers dynamically schedule refreshes Non-composable timing. Timing depends on behavior of other clients: They influence sequence of past requests rbitration may or may not provide guarantees Reineke et al., Berkeley 9
10 General-Purpose DRM Controllers B1.R3.C2 B1.R4.C3 B1.R3.C5 Memory Controller R B1.R3 C B1.C2 R B1.R4 C B1.C3 R B1.R3 C B1.C5? R B1.R3 C B1.C2 C B1.C5 R B1.R4 C B1.C3 Reineke et al., Berkeley 10
11 General-Purpose DRM Controllers Thread 1 Thread 2 B1.R3.C2 B2.R4.C3 tore B4.R3.C5 B3.R3.C2 B3.R5.C3 tore B2.R3.C5 rbitration B1.R3.C2 B3.R3.C2 B3.R3.C2 B1.R3.C2 B2.R4.C3 tore B4.R3.C5 B3.R5.C3 tore B3.R5.C3 B4.R3.C5 tore B2.R3.C5? Memory Controller Reineke et al., Berkeley 11
12 Outline Introduction DRM Basics Related Work: Predator and MC PRET DRM Controller: Main Ideas Evaluation Integration into Precision-Timed RM Reineke et al., Berkeley 12
13 Predictable DRM Controllers: Predator (Eindhoven) and MC (Barcelona) CPU1 Closed-page policy: timing independent of previously accessed row pread each request over all banks, pipeline accesses to banks. tatically precomputed sequences for writes, reads, write->read, read->write, refresh.... CPU1 Interconnect + rbitration Memory Controller DRM Module I/O Predictable and/or composable arbitration: Predator: CCP MC: TDM Reineke et al., Berkeley 13
14 Predictable DRM Controllers: Predator (Eindhoven) B1.R3.C2 B1.R4.C3 tore B1.R3.C5 Predictable Memory Controller: Predator Read Pattern Read Pattern R/W Pattern Write Pattern Closed-page policy: timing independent of previously accessed row pread each request over all banks, pipeline accesses to banks. increases access granularity tatically precomputed sequences for writes, reads, write->read, read->write, refresh. Reineke et al., Berkeley 14
15 Predictable DRM Controllers: Predator (Eindhoven) and MC (Barcelona) Thread 1 Thread 2 B1.R3.C2 B3.R3.C2 B3.R5.C3 tore B2.R3.C5 Predictable and/or Composable rbitration (e.g. time-division multiple access) B1.R3.C2 B3.R3.C2 B3.R5.C3 tore B2.R3.C5? Memory Controller Reineke et al., Berkeley 15
16 Outline Introduction DRM Basics Related Work: Predator and MC PRET DRM Controller: Main Ideas Evaluation Integration into Precision-Timed RM Reineke et al., Berkeley 16
17 PRET DRM Controller: Three Innovations Expose internal structure of DRM devices: Expose individual banks within DRM device as multiple independent resources CPU1... CPU1 Interconnect + rbitration PRET DRM Controller DRM Bank DRM Module DRM Module DRM Module I/O Defer refreshes to the end of transactions llows to hide refresh latency Perform refreshes manually : Replace standard refresh command with multiple reads Reineke et al., Berkeley 17
18 PRET DRM Controller: Exploiting Internal tructure of DRM Module Consists of 4-8 banks in 1-2 ranks hare only command and data bus, otherwise independent Partition into four groups of banks in alternating ranks Cycle through groups in a time-triggered fashion Rank 0: Bank 0 Bank 1 Bank 2 Bank 3 uccessive accesses to same group obey timing constraints Reads/writes to different groups do not interfere Rank 1: Bank 0 Bank 1 Bank 2 Bank 3 Provides four independent and predictable resources Reineke et al., Berkeley 18
19 PRET DRM Controller: Exploiting Internal tructure of DRM Module B1.R3.C2 B1.R4.C3 tore B1.R3.C5 PRET DRM Controller Read Pattern Read Pattern Write Pattern Reineke et al., Berkeley 19
20 Pipelined Bank ccess cheme Cycles Resource/Rank 0/0 1/1 2/0 3/1 0/0 1/1 Command Bus R C N O P R C N O P R C RED WRITE RED N O P N O P N O P N O P N O P R C N O P R C N O P... Rank 0 Resource 0+2 R Posted- C with tl=2 C Posted- C R Posted- C P R E C R Posted- C P R E C... uto-precharge uto-precharge Rank 1 Resource 1+3 R C uto-precharge P R E R... Data Bus Burst from Rank 0 Burst to Rank 1 Burst from Rank 0... trcd tcl trcd twl trp twr tfw Figure 2: The periodic and pipelined access scheme employe Reineke et al., Berkeley 20
21 PRET DRM Controller: Manual Refreshes Every row needs to be refreshed every 64ms Dedicated refresh commands refresh one row in each bank at once We replace these with manual refreshes through reads Improves worst-case latency of short requests Dedicated refresh commands vs refreshes through reads. time (refresh latencies not to scale) time Reineke et al., Berkeley 21
22 PRET DRM Controller: Defer Refreshes Refreshes do not have to happen periodically Refresh every row at least every 64 ms chedule refreshes slightly more often than necessary Enables to defer refreshes <= = ms time DM <= 64 ms time Reineke et al., Berkeley 22
23 General-Purpose DRM Controller vs PRET DRM Controller General-Purpose Controller bstracts DRM as a single shared resource chedules refreshes dynamically chedules commands dynamically Open page policy speculates on locality PRET DRM Controller bstracts DRM as multiple independent resources Refreshes as reads: shorter interruptions Defer refreshes: improves perceived latency Follows periodic, timetriggered schedule Closed page policy: access-history independence Reineke et al., Berkeley 23
24 Outline Introduction DRM Basics Related Work: Predator and MC PRET DRM Controller: Main Ideas Evaluation Integration into Precision-Timed RM Reineke et al., Berkeley 24
25 Conventional DRM Controller (DRMim2) vs PRET DRM Controller: Latency Evaluation Varying Interference: Varying Transfer ize: latency [cycles] 3,000 2,000 1, Interference [# of other threads occupied] 4096B transfers, conventional controller 4096B transfers, PRET controller 1024B transfers, conventional controller 1024B transfers, PRET controller Figure 9: Latencies of conventional and PRET memory con- average latency [cycles] 3,000 2,000 1,000 0 Conventional controller PRET controller 0 1,000 2,000 3,000 4,000 transfer size [bytes] Figure 10: Latencies of conventional and PRET memory con- Reineke et al., Berkeley 25
26 PRET DRM Controller vs Predator: nalytical Evaluation latency [cycles] Manual refreshes Private resources in backend Hiding refreshes size of transfer [bytes] hared Predator BL =4w/ refreshes DL r 4,4(x): hared PRET BL =4w/ refreshes DL r (x): PRET BL =4w/ refreshes DL r (x): PRET BL =4w/o refreshes Predator: abstracts DRM as single resource uses standard refresh mechanism PRET controller improves worst-case access latency of small transfers Figure 7: Latencies for small request sizes up to 256 bytes un Reineke et al., Berkeley 26
27 PRET DRM Controller vs Predator: nalytical Evaluation latency [cycles] 800 Benefit of burst length 8 over burst length ,024 1,280 1,536 1,792 2,048 size of transfer [bytes] hared Predator, BL =4, accounting for all refreshes DL r (x): PRET, BL =4, accounting for all refreshes hared Predator, BL =8, accounting for all refreshes DL r (x): PRET, BL =8, accounting for all refreshes Figure 8: Latencies of Predator and PRET for request sizes up Less of a difference for larger transfers Predator provides slightly higher bandwidth due to more efficient refresh mechanism Reineke et al., Berkeley 27
28 Outline Introduction DRM Basics Related Work: Predator and MC PRET DRM Controller: Main Ideas Evaluation Integration into Precision-Timed RM Reineke et al., Berkeley 28
29 Precision-Timed RM (PTRM) rchitecture Overview Hardware Hardware Hardware thread Hardware thread thread thread registers scratc h pad memory memory memory memory I/O devices Interleaved pipeline with one set of registers per thread RM scratchpad shared among threads DRM main memory, separate banks per thread Thread-Interleaved Pipeline for predictable timing without sacrificing high throughput One private DRM Resource + DM Unit per Hardware Thread hared cratchpad Instruction and Data Memories for low latency access Reineke et al., Berkeley 29
30 Conclusions and Future Work Temporal isolation and improved worst-case latency by bank privatization How to program the inverted memory hierarchy? Raffaello anzio da Urbino The thens chool Lee, Berkeley 30
31 References Related Work on Memory Controllers: M. Paolieri, E. Quiñones, F. Cazorla, and M. Valero, n analyzable memory controller for hard realtime CMPs, IEEE Embedded ystems Letters, vol. 1, no. 4, pp , B. kesson, K. Goossens, and M. Ringhofer, Predator: a predictable DRM memory controller, in CODE+I. CM, 2007, pp Work within the PRET project: [CODE 11] Jan Reineke, Isaac Liu, Hiren D. Patel, ungjun Kim, Edward. Lee, PRET DRM Controller: Bank Privatization for Predictability and Temporal Isolation, International Conference on Hardware/oftware Codesign and ystem ynthesis (CODE+I), October, [DC 11] Dai Nguyen Bui, Edward. Lee, Isaac Liu, Hiren D. Patel, Jan Reineke, Temporal Isolation on Multiprocessing rchitectures, Design utomation Conference (DC), June, [silomar 10] Isaac Liu, Jan Reineke, and Edward. Lee, PRET rchitecture upporting Concurrent Programs with Composable Timing Properties, in ignals, ystems, and Computers (ILOMR), Conference Record of the Forty Fourth silomar Conference, November 2010, Pacific Grove, California. [CE 08] Ben Lickly, Isaac Liu, ungjun Kim, Hiren D. Patel, tephen. Edwards and Edward. Lee, " Predictable Programming on a Precision Timed rchitecture," in Proceedings of International Conference on Compilers, rchitecture, and ynthesis for Embedded ystems (CE), Piscataway, NJ, pp , IEEE Press, October, Reineke et al., Berkeley 31
1. Memory technology & Hierarchy
1. Memory technology & Hierarchy RAM types Advances in Computer Architecture Andy D. Pimentel Memory wall Memory wall = divergence between CPU and RAM speed We can increase bandwidth by introducing concurrency
More informationA Dual-Layer Bus Arbiter for Mixed-Criticality Systems with Hypervisors
A Dual-Layer Bus Arbiter for Mixed-Criticality Systems with Hypervisors Bekim Cilku, Bernhard Frömel, Peter Puschner Institute of Computer Engineering Vienna University of Technology A1040 Wien, Austria
More informationComputer Architecture
Computer Architecture Random Access Memory Technologies 2015. április 2. Budapest Gábor Horváth associate professor BUTE Dept. Of Networked Systems and Services ghorvath@hit.bme.hu 2 Storing data Possible
More informationMemory Systems. Static Random Access Memory (SRAM) Cell
Memory Systems This chapter begins the discussion of memory systems from the implementation of a single bit. The architecture of memory chips is then constructed using arrays of bit implementations coupled
More informationDesigning Predictable Multicore Architectures for Avionics and Automotive Systems extended abstract
Designing Predictable Multicore Architectures for Avionics and Automotive Systems extended abstract Reinhard Wilhelm, Christian Ferdinand, Christoph Cullmann, Daniel Grund, Jan Reineke, Benôit Triquet
More informationByte Ordering of Multibyte Data Items
Byte Ordering of Multibyte Data Items Most Significant Byte (MSB) Least Significant Byte (LSB) Big Endian Byte Addresses +0 +1 +2 +3 +4 +5 +6 +7 VALUE (8-byte) Least Significant Byte (LSB) Most Significant
More informationA Mixed Time-Criticality SDRAM Controller
NEST COBRA CA4 A Mixed Time-Criticality SDRAM Controller MeAOW 3-9-23 Sven Goossens, Benny Akesson, Kees Goossens Mixed Time-Criticality 2/5 Embedded multi-core systems are getting more complex: Integrating
More informationRandom-Access Memory (RAM) The Memory Hierarchy. SRAM vs DRAM Summary. Conventional DRAM Organization. Page 1
Random-ccess Memor (RM) The Memor Hierarch Topics Storage technologies and trends Localit of reference Caching in the hierarch Ke features RM is packaged as a chip. Basic storage unit is a cell (one bit
More informationUser s Manual HOW TO USE DDR SDRAM
User s Manual HOW TO USE DDR SDRAM Document No. E0234E30 (Ver.3.0) Date Published April 2002 (K) Japan URL: http://www.elpida.com Elpida Memory, Inc. 2002 INTRODUCTION This manual is intended for users
More informationComputer Architecture
Computer Architecture Slide Sets WS 2013/2014 Prof. Dr. Uwe Brinkschulte M.Sc. Benjamin Betting Part 11 Memory Management Computer Architecture Part 11 page 1 of 44 Prof. Dr. Uwe Brinkschulte, M.Sc. Benjamin
More informationPentium vs. Power PC Computer Architecture and PCI Bus Interface
Pentium vs. Power PC Computer Architecture and PCI Bus Interface CSE 3322 1 Pentium vs. Power PC Computer Architecture and PCI Bus Interface Nowadays, there are two major types of microprocessors in the
More informationTable 1: Address Table
DDR SDRAM DIMM D32PB12C 512MB D32PB1GJ 1GB For the latest data sheet, please visit the Super Talent Electronics web site: www.supertalentmemory.com Features 184-pin, dual in-line memory module (DIMM) Fast
More informationSwitch Fabric Implementation Using Shared Memory
Order this document by /D Switch Fabric Implementation Using Shared Memory Prepared by: Lakshmi Mandyam and B. Kinney INTRODUCTION Whether it be for the World Wide Web or for an intra office network, today
More informationMemory Basics. SRAM/DRAM Basics
Memory Basics RAM: Random Access Memory historically defined as memory array with individual bit access refers to memory with both Read and Write capabilities ROM: Read Only Memory no capabilities for
More informationA N. O N Output/Input-output connection
Memory Types Two basic types: ROM: Read-only memory RAM: Read-Write memory Four commonly used memories: ROM Flash, EEPROM Static RAM (SRAM) Dynamic RAM (DRAM), SDRAM, RAMBUS, DDR RAM Generic pin configuration:
More informationOpenSPARC T1 Processor
OpenSPARC T1 Processor The OpenSPARC T1 processor is the first chip multiprocessor that fully implements the Sun Throughput Computing Initiative. Each of the eight SPARC processor cores has full hardware
More informationVirtualisation in NOCs for enhanced MPSOC robustness and performance verification. overview 1
Virtualisation in NOCs for enhanced POC robustness and performance verification Electronic ystems Group Electrical Engineering Faculty overview 1 context
More informationCOMPUTER HARDWARE. Input- Output and Communication Memory Systems
COMPUTER HARDWARE Input- Output and Communication Memory Systems Computer I/O I/O devices commonly found in Computer systems Keyboards Displays Printers Magnetic Drives Compact disk read only memory (CD-ROM)
More informationLizy Kurian John Electrical and Computer Engineering Department, The University of Texas as Austin
BUS ARCHITECTURES Lizy Kurian John Electrical and Computer Engineering Department, The University of Texas as Austin Keywords: Bus standards, PCI bus, ISA bus, Bus protocols, Serial Buses, USB, IEEE 1394
More informationObjectives. Units of Memory Capacity. CMPE328 Microprocessors (Spring 2007-08) Memory and I/O address Decoders. By Dr.
CMPE328 Microprocessors (Spring 27-8) Memory and I/O address ecoders By r. Mehmet Bodur You will be able to: Objectives efine the capacity, organization and types of the semiconductor memory devices Calculate
More informationFeatures. DDR SODIMM Product Datasheet. Rev. 1.0 Oct. 2011
Features 200pin, unbuffered small outline dual in-line memory module (SODIMM) Fast data transfer rates: PC-2100, PC-2700, PC3-3200 Single or Dual rank 256MB(32Megx64), 512MB (64Meg x 64), 1GB(128 Meg x
More informationMotivation: Smartphone Market
Motivation: Smartphone Market Smartphone Systems External Display Device Display Smartphone Systems Smartphone-like system Main Camera Front-facing Camera Central Processing Unit Device Display Graphics
More informationCHAPTER 16 MEMORY CIRCUITS
CHPTER 6 MEMORY CIRCUITS Chapter Outline 6. atches and Flip-Flops 6. Semiconductor Memories: Types and rchitectures 6.3 Random-ccess Memory RM Cells 6.4 Sense-mplifier and ddress Decoders 6.5 Read-Only
More informationRAM & ROM Based Digital Design. ECE 152A Winter 2012
RAM & ROM Based Digital Design ECE 152A Winter 212 Reading Assignment Brown and Vranesic 1 Digital System Design 1.1 Building Block Circuits 1.1.3 Static Random Access Memory (SRAM) 1.1.4 SRAM Blocks in
More informationComputer Systems Structure Main Memory Organization
Computer Systems Structure Main Memory Organization Peripherals Computer Central Processing Unit Main Memory Computer Systems Interconnection Communication lines Input Output Ward 1 Ward 2 Storage/Memory
More informationMemory unit. 2 k words. n bits per word
9- k address lines Read n data input lines Memory unit 2 k words n bits per word n data output lines 24 Pearson Education, Inc M Morris Mano & Charles R Kime 9-2 Memory address Binary Decimal Memory contents
More informationCS250 VLSI Systems Design Lecture 8: Memory
CS250 VLSI Systems esign Lecture 8: Memory John Wawrzynek, Krste Asanovic, with John Lazzaro and Yunsup Lee (TA) UC Berkeley Fall 2010 CMOS Bistable 1 0 Flip State 0 1 Cross-coupled inverters used to hold
More informationModule 2. Embedded Processors and Memory. Version 2 EE IIT, Kharagpur 1
Module 2 Embedded Processors and Memory Version 2 EE IIT, Kharagpur 1 Lesson 5 Memory-I Version 2 EE IIT, Kharagpur 2 Instructional Objectives After going through this lesson the student would Pre-Requisite
More informationFPGA. AT6000 FPGAs. Application Note AT6000 FPGAs. 3x3 Convolver with Run-Time Reconfigurable Vector Multiplier in Atmel AT6000 FPGAs.
3x3 Convolver with Run-Time Reconfigurable Vector Multiplier in Atmel AT6000 s Introduction Convolution is one of the basic and most common operations in both analog and digital domain signal processing.
More informationComputer Organization & Architecture Lecture #19
Computer Organization & Architecture Lecture #19 Input/Output The computer system s I/O architecture is its interface to the outside world. This architecture is designed to provide a systematic means of
More informationRead-only memory Implementing logic with ROM Programmable logic devices Implementing logic with PLDs Static hazards
Points ddressed in this Lecture Lecture 8: ROM Programmable Logic Devices Professor Peter Cheung Department of EEE, Imperial College London Read-only memory Implementing logic with ROM Programmable logic
More informationA 10,000 Frames/s 0.18 µm CMOS Digital Pixel Sensor with Pixel-Level Memory
Presented at the 2001 International Solid State Circuits Conference February 5, 2001 A 10,000 Frames/s 0.1 µm CMOS Digital Pixel Sensor with Pixel-Level Memory Stuart Kleinfelder, SukHwan Lim, Xinqiao
More informationChapter 1 Computer System Overview
Operating Systems: Internals and Design Principles Chapter 1 Computer System Overview Eighth Edition By William Stallings Operating System Exploits the hardware resources of one or more processors Provides
More informationOverview. CISC Developments. RISC Designs. CISC Designs. VAX: Addressing Modes. Digital VAX
Overview CISC Developments Over Twenty Years Classic CISC design: Digital VAX VAXÕs RISC successor: PRISM/Alpha IntelÕs ubiquitous 80x86 architecture Ð 8086 through the Pentium Pro (P6) RJS 2/3/97 Philosophy
More informationComputer Organization and Components
Computer Organization and Components IS5, fall 25 Lecture : Pipelined Processors ssociate Professor, KTH Royal Institute of Technology ssistant Research ngineer, University of California, Berkeley Slides
More informationComputer Systems Structure Input/Output
Computer Systems Structure Input/Output Peripherals Computer Central Processing Unit Main Memory Computer Systems Interconnection Communication lines Input Output Ward 1 Ward 2 Examples of I/O Devices
More informationArchitectural Support for Cyber-Physical Systems
Architectural Support for Cyber-Physical Systems Special Thanks to:! David Broman! Isaac Liu! Hiren Patel! Jan Reineke! Michael Zimmer Edward A. Lee Robert S. Pepper Distinguished Professor UC Berkeley
More informationPage 1 of 5. IS 335: Information Technology in Business Lecture Outline Operating Systems
Lecture Outline Operating Systems Objectives Describe the functions and layers of an operating system List the resources allocated by the operating system and describe the allocation process Explain how
More informationWith respect to the way of data access we can classify memories as:
Memory Classification With respect to the way of data access we can classify memories as: - random access memories (RAM), - sequentially accessible memory (SAM), - direct access memory (DAM), - contents
More informationThe Classical Architecture. Storage 1 / 36
1 / 36 The Problem Application Data? Filesystem Logical Drive Physical Drive 2 / 36 Requirements There are different classes of requirements: Data Independence application is shielded from physical storage
More informationRead this before starting!
Points missed: Student's Name: Total score: /100 points East Tennessee State University Department of Computer and Information Sciences CSCI 4717 Computer Architecture TEST 2 for Fall Semester, 2006 Section
More informationEE482: Advanced Computer Organization Lecture #11 Processor Architecture Stanford University Wednesday, 31 May 2000. ILP Execution
EE482: Advanced Computer Organization Lecture #11 Processor Architecture Stanford University Wednesday, 31 May 2000 Lecture #11: Wednesday, 3 May 2000 Lecturer: Ben Serebrin Scribe: Dean Liu ILP Execution
More informationStrategies. Addressing and Routing
Strategies Circuit switching: carry bit streams original telephone network Packet switching: store-and-forward messages Internet Spring 2007 CSE 30264 14 Addressing and Routing Address: byte-string that
More informationPrice/performance Modern Memory Hierarchy
Lecture 21: Storage Administration Take QUIZ 15 over P&H 6.1-4, 6.8-9 before 11:59pm today Project: Cache Simulator, Due April 29, 2010 NEW OFFICE HOUR TIME: Tuesday 1-2, McKinley Last Time Exam discussion
More informationMemory Testing. Memory testing.1
Memory Testing Introduction Memory Architecture & Fault Models Test Algorithms DC / AC / Dynamic Tests Built-in Self Testing Schemes Built-in Self Repair Schemes Memory testing.1 Memory Market Share in
More informationMemory ICS 233. Computer Architecture and Assembly Language Prof. Muhamed Mudawar
Memory ICS 233 Computer Architecture and Assembly Language Prof. Muhamed Mudawar College of Computer Sciences and Engineering King Fahd University of Petroleum and Minerals Presentation Outline Random
More informationCOMPUTER SCIENCE AND ENGINEERING - Microprocessor Systems - Mitchell Aaron Thornton
MICROPROCESSOR SYSTEMS Mitchell Aaron Thornton, Department of Electrical and Computer Engineering, Mississippi State University, PO Box 9571, Mississippi State, MS, 39762-9571, United States. Keywords:
More informationEfficient Flash Memory Read Request Handling Based on Split Transactions
Efficient Memory Handling Based on Split Transactions Bryan Kim, Eyee Hyun Nam, Yoon Jae Seong, Hang Jun Min, and Sang Lyul Min School of Computer Science and Engineering, Seoul National University, Seoul,
More informationNaveen Muralimanohar Rajeev Balasubramonian Norman P Jouppi
Optimizing NUCA Organizations and Wiring Alternatives for Large Caches with CACTI 6.0 Naveen Muralimanohar Rajeev Balasubramonian Norman P Jouppi University of Utah & HP Labs 1 Large Caches Cache hierarchies
More informationStoring Data: Disks and Files
Storing Data: Disks and Files (From Chapter 9 of textbook) Storing and Retrieving Data Database Management Systems need to: Store large volumes of data Store data reliably (so that data is not lost!) Retrieve
More informationIn-Memory Databases Algorithms and Data Structures on Modern Hardware. Martin Faust David Schwalb Jens Krüger Jürgen Müller
In-Memory Databases Algorithms and Data Structures on Modern Hardware Martin Faust David Schwalb Jens Krüger Jürgen Müller The Free Lunch Is Over 2 Number of transistors per CPU increases Clock frequency
More informationVHDL DESIGN OF EDUCATIONAL, MODERN AND OPEN- ARCHITECTURE CPU
VHDL DESIGN OF EDUCATIONAL, MODERN AND OPEN- ARCHITECTURE CPU Martin Straka Doctoral Degree Programme (1), FIT BUT E-mail: strakam@fit.vutbr.cz Supervised by: Zdeněk Kotásek E-mail: kotasek@fit.vutbr.cz
More informationMobile SDRAM. MT48H16M16LF 4 Meg x 16 x 4 banks MT48H8M32LF 2 Meg x 32 x 4 banks
Features Mobile SDRAM MT48H6M6LF 4 Meg x 6 x 4 banks MT48H8M32LF 2 Meg x 32 x 4 banks Features Fully synchronous; all signals registered on positive edge of system clock V DD /V D =.7.95V Internal, pipelined
More informationOC By Arsene Fansi T. POLIMI 2008 1
IBM POWER 6 MICROPROCESSOR OC By Arsene Fansi T. POLIMI 2008 1 WHAT S IBM POWER 6 MICROPOCESSOR The IBM POWER6 microprocessor powers the new IBM i-series* and p-series* systems. It s based on IBM POWER5
More informationLecture 11: Multi-Core and GPU. Multithreading. Integration of multiple processor cores on a single chip.
Lecture 11: Multi-Core and GPU Multi-core computers Multithreading GPUs General Purpose GPUs Zebo Peng, IDA, LiTH 1 Multi-Core System Integration of multiple processor cores on a single chip. To provide
More informationDesign-space exploration of flash augmented architectures
Design-space exploration of flash augmented architectures Thanumalayan S 1, Vijay Chidambaram V 1, Ranjani Parthasarathi 2 College of Engineering, Guindy, Anna University Abstract Flash technologies are
More informationA Generic Network Interface Architecture for a Networked Processor Array (NePA)
A Generic Network Interface Architecture for a Networked Processor Array (NePA) Seung Eun Lee, Jun Ho Bahn, Yoon Seok Yang, and Nader Bagherzadeh EECS @ University of California, Irvine Outline Introduction
More informationHighlights of the High- Bandwidth Memory (HBM) Standard
Highlights of the High- Bandwidth Memory (HBM) Standard Mike O Connor Sr. Research Scientist What is High-Bandwidth Memory (HBM)? Memory standard designed for needs of future GPU and HPC systems: Exploit
More informationCISC, RISC, and DSP Microprocessors
CISC, RISC, and DSP Microprocessors Douglas L. Jones ECE 497 Spring 2000 4/6/00 CISC, RISC, and DSP D.L. Jones 1 Outline Microprocessors circa 1984 RISC vs. CISC Microprocessors circa 1999 Perspective:
More informationWhat is a bus? A Bus is: Advantages of Buses. Disadvantage of Buses. Master versus Slave. The General Organization of a Bus
Datorteknik F1 bild 1 What is a bus? Slow vehicle that many people ride together well, true... A bunch of wires... A is: a shared communication link a single set of wires used to connect multiple subsystems
More informationMICROPROCESSOR. Exclusive for IACE Students www.iace.co.in iacehyd.blogspot.in Ph: 9700077455/422 Page 1
MICROPROCESSOR A microprocessor incorporates the functions of a computer s central processing unit (CPU) on a single Integrated (IC), or at most a few integrated circuit. It is a multipurpose, programmable
More informationExploiting Remote Memory Operations to Design Efficient Reconfiguration for Shared Data-Centers over InfiniBand
Exploiting Remote Memory Operations to Design Efficient Reconfiguration for Shared Data-Centers over InfiniBand P. Balaji, K. Vaidyanathan, S. Narravula, K. Savitha, H. W. Jin D. K. Panda Network Based
More informationChapter 2 Logic Gates and Introduction to Computer Architecture
Chapter 2 Logic Gates and Introduction to Computer Architecture 2.1 Introduction The basic components of an Integrated Circuit (IC) is logic gates which made of transistors, in digital system there are
More informationChapter 2 Basic Structure of Computers. Jin-Fu Li Department of Electrical Engineering National Central University Jungli, Taiwan
Chapter 2 Basic Structure of Computers Jin-Fu Li Department of Electrical Engineering National Central University Jungli, Taiwan Outline Functional Units Basic Operational Concepts Bus Structures Software
More informationCSE2102 Digital Design II - Topics CSE2102 - Digital Design II
CSE2102 Digital Design II - Topics CSE2102 - Digital Design II 6 - Microprocessor Interfacing - Memory and Peripheral Dr. Tim Ferguson, Monash University. AUSTRALIA. Tel: +61-3-99053227 FAX: +61-3-99053574
More informationCentral Processing Unit (CPU)
Central Processing Unit (CPU) CPU is the heart and brain It interprets and executes machine level instructions Controls data transfer from/to Main Memory (MM) and CPU Detects any errors In the following
More informationOperating Systems Overview
Operating Systems Overview No single definition, but many perspectives: Role in an overall system: Intermediary between computer hardware and everything else User view: Provides an environment, preferably
More informationTable 1 SDR to DDR Quick Reference
TECHNICAL NOTE TN-6-05 GENERAL DDR SDRAM FUNCTIONALITY INTRODUCTION The migration from single rate synchronous DRAM (SDR) to double rate synchronous DRAM (DDR) memory is upon us. Although there are many
More informationSecondary Storage. Any modern computer system will incorporate (at least) two levels of storage: magnetic disk/optical devices/tape systems
1 Any modern computer system will incorporate (at least) two levels of storage: primary storage: typical capacity cost per MB $3. typical access time burst transfer rate?? secondary storage: typical capacity
More informationEnhancing High-Speed Telecommunications Networks with FEC
White Paper Enhancing High-Speed Telecommunications Networks with FEC As the demand for high-bandwidth telecommunications channels increases, service providers and equipment manufacturers must deliver
More informationMLPPP Deployment Using the PA-MC-T3-EC and PA-MC-2T3-EC
MLPPP Deployment Using the PA-MC-T3-EC and PA-MC-2T3-EC Overview Summary The new enhanced-capability port adapters are targeted to replace the following Cisco port adapters: 1-port T3 Serial Port Adapter
More informationDisk Storage & Dependability
Disk Storage & Dependability Computer Organization Architectures for Embedded Computing Wednesday 19 November 14 Many slides adapted from: Computer Organization and Design, Patterson & Hennessy 4th Edition,
More informationArchitectures and Platforms
Hardware/Software Codesign Arch&Platf. - 1 Architectures and Platforms 1. Architecture Selection: The Basic Trade-Offs 2. General Purpose vs. Application-Specific Processors 3. Processor Specialisation
More informationOperating Systems 4 th Class
Operating Systems 4 th Class Lecture 1 Operating Systems Operating systems are essential part of any computer system. Therefore, a course in operating systems is an essential part of any computer science
More informationWhat is a System on a Chip?
What is a System on a Chip? Integration of a complete system, that until recently consisted of multiple ICs, onto a single IC. CPU PCI DSP SRAM ROM MPEG SoC DRAM System Chips Why? Characteristics: Complex
More informationMaking Multicore Work and Measuring its Benefits. Markus Levy, president EEMBC and Multicore Association
Making Multicore Work and Measuring its Benefits Markus Levy, president EEMBC and Multicore Association Agenda Why Multicore? Standards and issues in the multicore community What is Multicore Association?
More informationParallel AES Encryption with Modified Mix-columns For Many Core Processor Arrays M.S.Arun, V.Saminathan
Parallel AES Encryption with Modified Mix-columns For Many Core Processor Arrays M.S.Arun, V.Saminathan Abstract AES is an encryption algorithm which can be easily implemented on fine grain many core systems.
More informationI/O. Input/Output. Types of devices. Interface. Computer hardware
I/O Input/Output One of the functions of the OS, controlling the I/O devices Wide range in type and speed The OS is concerned with how the interface between the hardware and the user is made The goal in
More informationCOMPUTERS ORGANIZATION 2ND YEAR COMPUTE SCIENCE MANAGEMENT ENGINEERING UNIT 5 INPUT/OUTPUT UNIT JOSÉ GARCÍA RODRÍGUEZ JOSÉ ANTONIO SERRA PÉREZ
COMPUTERS ORGANIZATION 2ND YEAR COMPUTE SCIENCE MANAGEMENT ENGINEERING UNIT 5 INPUT/OUTPUT UNIT JOSÉ GARCÍA RODRÍGUEZ JOSÉ ANTONIO SERRA PÉREZ Tema 5. Unidad de E/S 1 I/O Unit Index Introduction. I/O Problem
More informationProcessor Architectures
ECPE 170 Jeff Shafer University of the Pacific Processor Architectures 2 Schedule Exam 3 Tuesday, December 6 th Caches Virtual Memory Input / Output OperaKng Systems Compilers & Assemblers Processor Architecture
More informationPOSIX. RTOSes Part I. POSIX Versions. POSIX Versions (2)
RTOSes Part I Christopher Kenna September 24, 2010 POSIX Portable Operating System for UnIX Application portability at source-code level POSIX Family formally known as IEEE 1003 Originally 17 separate
More informationImplementing a Digital Answering Machine with a High-Speed 8-Bit Microcontroller
Implementing a Digital Answering Machine with a High-Speed 8-Bit Microcontroller Zafar Ullah Senior Application Engineer Scenix Semiconductor Inc. Leo Petropoulos Application Manager Invox TEchnology 1.0
More informationCHAPTER 7: The CPU and Memory
CHAPTER 7: The CPU and Memory The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint slides
More informationThe Leader in Memory Technology
DDR SDRAM s 2 ; Basic DDR SDRAM operations 1. DDR SDRAM application notes available from Samsung - App. note 1 : Key features and points for memory controller designers ; Explains key features of DDR SDRAM
More informationIn-Block Level Redundancy Management for Flash Storage System
, pp.309-318 http://dx.doi.org/10.14257/ijmue.2015.10.9.32 In-Block Level Redundancy Management for Flash Storage System Seung-Ho Lim Division of Computer and Electronic Systems Engineering Hankuk University
More informationContents. System Development Models and Methods. Design Abstraction and Views. Synthesis. Control/Data-Flow Models. System Synthesis Models
System Development Models and Methods Dipl.-Inf. Mirko Caspar Version: 10.02.L.r-1.0-100929 Contents HW/SW Codesign Process Design Abstraction and Views Synthesis Control/Data-Flow Models System Synthesis
More informationIntroduction to Virtual Machines
Introduction to Virtual Machines Introduction Abstraction and interfaces Virtualization Computer system architecture Process virtual machines System virtual machines 1 Abstraction Mechanism to manage complexity
More informationOutline. Lecture 3. Basics. Logical vs. physical memory. 8086 physical memory. x86 byte ordering
Outline Lecture 3 bout Memory ddressing memory Data types MOV instruction ddressing modes Instruction format Dr. Dimitrios S. Nikolopoulos SL/UIU Basics Logical vs. physical memory Memory in the x processors
More informationTIME PREDICTABLE CPU AND DMA SHARED MEMORY ACCESS
TIME PREDICTABLE CPU AND DMA SHARED MEMORY ACCESS Christof Pitter Institute of Computer Engineering Vienna University of Technology, Austria cpitter@mail.tuwien.ac.at Martin Schoeberl Institute of Computer
More information361 Computer Architecture Lecture 14: Cache Memory
1 361 Computer Architecture Lecture 14 Memory cache.1 The Motivation for s Memory System Processor DRAM Motivation Large memories (DRAM) are slow Small memories (SRAM) are fast Make the average access
More information{The Non-Volatile Memory Technology Database (NVMDB)}, UCSD-CSE Techreport CS2015-1011
The Non-Volatile Memory Technology Database (NVMDB) UCSD-CSE Techreport CS2015-1011 Kosuke Suzuki Fujitsu Laboratories Ltd. kosuzuki@jp.fujitsu.com Steven Swanson UC San Diego swanson@cs.ucsd.edu Flash,
More informationReal-time Java Processor for Monitoring and Test
Real-time Java Processor for Monitoring and Test Martin Zabel, Thomas B. Preußer, Rainer G. Spallek Technische Universität Dresden {zabel,preusser,rgs}@ite.inf.tu-dresden.de Abstract This paper introduces
More informationE6895 Advanced Big Data Analytics Lecture 14:! NVIDIA GPU Examples and GPU on ios devices
E6895 Advanced Big Data Analytics Lecture 14: NVIDIA GPU Examples and GPU on ios devices Ching-Yung Lin, Ph.D. Adjunct Professor, Dept. of Electrical Engineering and Computer Science IBM Chief Scientist,
More informationF1: A Distributed SQL Database That Scales. Presentation by: Alex Degtiar (adegtiar@cmu.edu) 15-799 10/21/2013
F1: A Distributed SQL Database That Scales Presentation by: Alex Degtiar (adegtiar@cmu.edu) 15-799 10/21/2013 What is F1? Distributed relational database Built to replace sharded MySQL back-end of AdWords
More informationChapter 7 Memory and Programmable Logic
NCNU_2013_DD_7_1 Chapter 7 Memory and Programmable Logic 71I 7.1 Introduction ti 7.2 Random Access Memory 7.3 Memory Decoding 7.5 Read Only Memory 7.6 Programmable Logic Array 77P 7.7 Programmable Array
More informationSoC-Based Microcontroller Bus Design In High Bandwidth Embedded Applications
SoC-Based Microcontroller Bus Design In High Bandwidth Embedded Applications White Paper Abstract 32-bit embedded designs increasingly require real-time control of highbandwidth data streams over a network.
More informationThe I2C Bus. NXP Semiconductors: UM10204 I2C-bus specification and user manual. 14.10.2010 HAW - Arduino 1
The I2C Bus Introduction The I2C-bus is a de facto world standard that is now implemented in over 1000 different ICs manufactured by more than 50 companies. Additionally, the versatile I2C-bus is used
More informationHow To Improve Performance On A Single Chip Computer
: Redundant Arrays of Inexpensive Disks this discussion is based on the paper:» A Case for Redundant Arrays of Inexpensive Disks (),» David A Patterson, Garth Gibson, and Randy H Katz,» In Proceedings
More informationChapter 1: Introduction. What is an Operating System?
Chapter 1: Introduction What is an Operating System? Mainframe Systems Desktop Systems Multiprocessor Systems Distributed Systems Clustered System Real -Time Systems Handheld Systems Computing Environments
More informationCOMPUTER ARCHITECTURE. Input/Output
HUMBOLDT-UNIVERSITÄT ZU BERLIN INSTITUT FÜR INFORMATIK COMPUTER ARCHITECTURE Lecture 17 Input/Output Sommersemester 2002 Leitung: Prof. Dr. Miroslaw Malek www.informatik.hu-berlin.de/rok/ca CA - XVII -
More information