CACHE POWER CONSUMPTION Mahdi Nazm Bojnordi Assistant Professor - - PowerPoint PPT Presentation

cache power consumption
SMART_READER_LITE
LIVE PREVIEW

CACHE POWER CONSUMPTION Mahdi Nazm Bojnordi Assistant Professor - - PowerPoint PPT Presentation

CACHE POWER CONSUMPTION Mahdi Nazm Bojnordi Assistant Professor School of Computing University of Utah CS/ECE 7810: Advanced Computer Architecture Overview Upcoming deadline Feb. 3 rd : project group formation This lecture Cache


slide-1
SLIDE 1

CACHE POWER CONSUMPTION

CS/ECE 7810: Advanced Computer Architecture

Mahdi Nazm Bojnordi

Assistant Professor School of Computing University of Utah

slide-2
SLIDE 2

Overview

¨ Upcoming deadline

¤ Feb. 3rd: project group formation

¨ This lecture

¤ Cache power consumption ¤ Cache banking ¤ Way prediction ¤ Resizable caches ¤ Gated Vdd/ cache decay, drowsy caches

slide-3
SLIDE 3

Main Consumers of CPU Resources?

¨ A significant portion of the processor die is

  • ccupied by on-chip caches

¨ Main problems in caches

¤ Power consumption

n Power on many transistors

¤ Reliability

n Increased defect rate and errors

[source: AMD]

Example: FX Processors

slide-4
SLIDE 4

Recall: CPU Power Consumption

¨ Major power consumption issues

Peak Power/Power Density Average Power q Heat

  • Packaging, cooling,

component spacing

q Switching noise

  • Decoupling capacitors

q Battery life

  • Bulkier battery

q Utility costs

  • Probability, cannot run

your business! Caches generate little heat (low activity factor) Caches consume high average power (~1/3)

slide-5
SLIDE 5

Cache Power Management

¨ Circuit techniques

¤ Transistor sizing, multi-Vt, low-swing bit-lines, etc.

¨ Microarchitecture techniques

¤ Static techniques

n banking, phased tag/data access, way prediction

¤ Dynamic techniques

n gated-Vdd, cache decay, drowsy caches ¨ Compiler techniques

¤ Data partitioning to enable sleep mode

slide-6
SLIDE 6

Recall: Cache Lookup

¨ Byte offset: to select

the requested byte

¨ Tag: to maintain the

address

¨ Valid flag (v):

whether content is meaningful

¨ Data and tag are

always accessed

hit data v

1

2

1021 1022 1023

tag index byte

=

slide-7
SLIDE 7

Cache Architecture

¨ Physical cache structure

[CACTI 1.0]

slide-8
SLIDE 8

Cache Banking

¨ Divide cache into multiple identical arrays

¤ Static power: unused arrays may be turned off ¤ Dynamic power: only the target arrays is accessed [Source: CACTI]

slide-9
SLIDE 9

Basic Set Associative Cache

tag set

  • ffset

Mux 4:1 =? To CPU

tag0 data0 tag1 data1 tag2 data2 tag3 data3

Power per access: 4T + 4D

slide-10
SLIDE 10

Phased N-way Cache

tag set

  • ffset

Mux 4:1 =? To CPU

tag0 data0 tag1 data1 tag2 data2 tag3 data3

Power per access: 4T + 1D But access time increases

slide-11
SLIDE 11

Way-prediction N-way Cache

tag set

  • ffset

Mux 4:1 To CPU

tag0 data0 tag1 data1 tag2 data2 tag3 data3

Way-prediction =? To CPU

Correct prediction: 1T + 1D Predict instead of sequential tag access [Powell02]

slide-12
SLIDE 12

Way Prediction Summary

¨ To improve hit time, predict the way to pre-set Mux ¤ Mis-prediction gives longer hit time ¤ Prediction accuracy

n > 90% for two-way n > 80% for four-way n I-cache has better accuracy than D-cache

¤ First used on MIPS R10000 in mid-90s ¤ Used on ARM Cortex-A8 ¨ Extend to predict block as well ¤ “Way selection” ¤ Increases mis-prediction penalty

slide-13
SLIDE 13

Cache Size

¨ Energy dissipation of on-chip cache and off-chip

memory

[Zhang04]

0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 RELATIVE ENERGY CACHE SIZE Cache Memory Total

core Cache Memory

Can we dynamically resize cache? Ways, sets, or blocks?

slide-14
SLIDE 14

Resizable Caches

¨ Resizable caches turn off portions of the cache that

are not heavily used by the running program

[Albonesi99]

slide-15
SLIDE 15

Leakage Power

¨ dominant source for power consumption as

technology scales down

0% 20% 40% 60% 80% 100% 1999 2001 2003 2005 2007 2009 Year Leakage Power/Total Power

[source of data: ITRS]

!"#$%$&# = (×*+#$%$&#

slide-16
SLIDE 16

Dynamic Techniques for Leakage

¨ Three example microarchitectural approaches

¤ Gated-Vdd

n Gate the supply-to-ground path

¤ Cache decay

n Same gating mechanism but different control policy

¤ Drowsy caches

n Reduce the Vdd in order to retain cell state