Memory Hierarchy

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Consider a system employing a three-level cache hierarchy (L1, L2, L3) with inclusive properties. If the global miss rate observed at the L3 cache is 5%, and given that the local miss rates for L1 and L2 caches are 40% and 20% respectively, what is the closest approximate global miss rate for the L2 cache?

  • 5%
  • 8% (correct)
  • 10%
  • 2%

A cache system uses a 16-way set-associative mapping with a cache size of 64KB and a block size of 64 bytes. If the physical address space is 32 bits, what are the sizes of the tag, set index, and block offset fields, respectively?

  • 17 bits, 7 bits, 6 bits (correct)
  • 15 bits, 9 bits, 8 bits
  • 18 bits, 6 bits, 8 bits
  • 16 bits, 8 bits, 8 bits

Consider a memory system employing a write-back cache policy. Which of the following scenarios would necessitate a write-back operation to main memory?

  • A cache block in the 'dirty' state is selected for replacement due to a cache miss. (correct)
  • A cache miss occurs, and the replacement policy evicts a 'clean' block to make space for the newly fetched block.
  • A cache hit occurs on a 'dirty' block, and the CPU modifies the data within the block.
  • A cache block is invalidated due to an external snoop request while it is in the 'clean' state.

In the context of cache coherence protocols for multi-processor systems, which of the following describes the purpose of 'snooping'?

<p>Monitoring the system's address bus to detect cache-related transactions performed by other processors. (D)</p> Signup and view all the answers

Given a DRAM chip organized as 4K x 8 bits, how many such chips are required to construct a 128KB memory?

<p>32 (D)</p> Signup and view all the answers

In the context of memory technology, what distinguishes Spin-Transfer Torque RAM (STT-RAM) from other non-volatile memory types?

<p>It uses magnetic tunnel junctions where electron spin aligns to store data. (C)</p> Signup and view all the answers

Consider a system that uses a virtually addressed cache with a write-through policy. What is the primary challenge that must be addressed to maintain cache coherence in this architecture?

<p>Handling synonyms (different virtual addresses mapping to the same physical address) to prevent incoherence. (C)</p> Signup and view all the answers

A processor has a two-level cache hierarchy with the following characteristics: L1 cache access time is 1 ns, L2 cache access time is 10 ns, L1 cache hit rate is 95%, and the global hit rate (including both L1 and L2) is 99%. What is the effective memory access time?

<p>1.45 ns (B)</p> Signup and view all the answers

In the context of cache design, what is 'cache pollution,' and which strategy is most effective in mitigating it?

<p>The introduction of useless data into the cache that displaces useful data; employing adaptive cache replacement policies sensitive to data reuse patterns. (C)</p> Signup and view all the answers

Consider a system using ReRAM (Resistive Random-Access Memory). What fundamental physical phenomenon underlies ReRAM's ability to store data?

<p>Formation and dissolution of conductive filaments within a dielectric material. (A)</p> Signup and view all the answers

A memory system uses a two-level page table scheme with a 4KB page size and 4-byte page table entries. If the virtual address space is 48 bits, what is the size of each page table (in bytes)?

<p>4MB (A)</p> Signup and view all the answers

In a system with a write-invalidate cache coherence protocol, what is the principal consequence of a processor writing to a shared cache line?

<p>All other cached copies of that line in other processors are marked as invalid. (D)</p> Signup and view all the answers

What is the fundamental difference between EPROM and EEPROM concerning how their memory cells are erased?

<p>EEPROM uses electrical signals for erasure, allowing individual bytes to be erased and rewritten, while EPROM requires ultraviolet light for erasure of the entire chip. (C)</p> Signup and view all the answers

Consider a processor implementing a non-blocking cache. What architectural feature is essential to prevent the processor from stalling during a cache miss?

<p>Miss Status Holding Registers (MSHRs) to track outstanding cache misses and allow subsequent requests to be processed. (B)</p> Signup and view all the answers

Given a fully associative cache with 128 blocks and a block size of 32 bytes, what is the principal advantage of using a Least Recently Used (LRU) replacement policy compared to a First-In-First-Out (FIFO) policy?

<p>LRU generally achieves a lower miss rate than FIFO by better exploiting temporal locality. (A)</p> Signup and view all the answers

In the context of memory address mapping techniques, what is the primary disadvantage of direct mapping compared to set-associative mapping?

<p>Greater susceptibility to conflict misses when multiple memory blocks compete for the same cache line. (C)</p> Signup and view all the answers

Consider a cache system employing a write-back, write-allocate policy. If a cache miss occurs during a write operation, what sequence of actions is initiated?

<p>A new cache line is allocated, the data is written to the cache, and the cache line is marked as 'dirty'. Main memory is updated only when the dirty line is evicted. (A)</p> Signup and view all the answers

How does increasing the associativity of a cache typically impact its power consumption, and what is the underlying reason for this change?

<p>Increases power consumption due to the need to compare multiple tags in parallel during cache lookups. (D)</p> Signup and view all the answers

Which of the following coherence protocol states typically indicates that a cache line contains the most up-to-date copy of the data and no other cache has a copy of this line?

<p>Modified (A)</p> Signup and view all the answers

Flashcards

Cache Memory

Fast, expensive memory that CPU accesses directly; Level 1, Level 2, and Level 3.

Principle of Locality

The principle stating that memory accesses tend to cluster in specific areas.

Cache Mapping Techniques

Direct, Associative, and Set-Associative Methods to decide where to keep copies of data in cache.

Cache Hit Rate

Frequency of data found in the cache versus total accesses.

Signup and view all the flashcards

Miss Penalty

The time/penalty to retrieve data from main memory when it's not in the cache.

Signup and view all the flashcards

Cache Coherence

Keeping data consistent between cache and main memory.

Signup and view all the flashcards

Cache Write Policy

Write-through and Write-back strategies. The method decides when or how data is written back to main memory from cache.

Signup and view all the flashcards

Associative Memory

Memory that can be accessed by content rather than address.

Signup and view all the flashcards

Volatile Memory

Main memory type that loses its data when power is turned off.

Signup and view all the flashcards

RAM

Semiconductor memory where data can be both read and written

Signup and view all the flashcards

Dynamic RAM (DRAM)

RAM that requires constant refreshing to maintain data.

Signup and view all the flashcards

Static RAM (SRAM)

RAM that retains data as long as power is supplied.

Signup and view all the flashcards

ROM

Non-volatile memory where data is electrically written.

Signup and view all the flashcards

EPROM

ROM that can be erased by UV light and reprogrammed.

Signup and view all the flashcards

EEPROM

ROM that can be erased electrically.

Signup and view all the flashcards

Secondary Memory

Non-volatile memory used for persistent data storage.

Signup and view all the flashcards

ReRAM, PCM, STTRAM

Emerging non-volatile memory technologies.

Signup and view all the flashcards

Study Notes

  • Memory hierarchy involves different types of memory organized by speed and cost.

Primary Memory

  • Primary memory includes RAM (Static and Dynamic) and ROM (EPROM, EEPROM).
  • It also includes Cache memory at levels 1, 2, and 3.

Secondary/Auxiliary Memory

  • Secondary memory includes Magnetic Disks.

Emerging Memory Technologies

  • ReRAM, PCM, and STTRAM are examples of emerging in-situ memory technologies.

Main Memory

  • Main memory consists of RAM and ROM chips.
  • Memory Address Map is crucial for locating data.
  • Memory connects to the CPU for data transfer.

Associative Memory

  • Associative memory allows content-based retrieval.

Cache Memory

  • Principle of Locality is fundamental to cache memory, where frequently accessed data is stored for faster retrieval.
  • Cache mapping techniques determine how memory blocks are mapped in the cache.
  • Hit Rate and Miss Penalty are key performance considerations.
  • Cache coherence ensures data consistency across multiple caches.
  • Cache read and write policies manage how data is read from and written to the cache.
  • Caches are integrated on the Processor Chip to reduce access time.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Cache Memory Speed
1 questions

Cache Memory Speed

SociableMalachite avatar
SociableMalachite
Memory Hierarchy: Cost vs Access Time
39 questions
Use Quizgecko on...
Browser
Browser