computer organization assembly language programming cse
play

Computer Organization & Assembly Language Programming (CSE - PowerPoint PPT Presentation

Computer Organization & Assembly Language Programming (CSE 2312) Lecture 22: More on Caches, Virtual Memory, Dependable Memory Taylor Johnson Announcements and Outline Programming assignment 2 assigned, due 11/13 by midnight


  1. Measuring Cache Performance • Components of CPU time • Program execution cycles • Includes cache hit time • Memory stall cycles • Mainly from cache misses • With simplifying assumptions: Memory stall cycles Memory accesses = × × Miss rate Miss penalty Program Instructio ns Misses = × × Miss penalty Program Instructio n 34

  2. Cache Performance Example • Given • I-cache miss rate = 2% • D-cache miss rate = 4% • Miss penalty = 100 cycles • Base CPI (ideal cache) = 2 • Load & stores are 36% of instructions • Miss cycles per instruction • I-cache: 0.02 × 100 = 2 • D-cache: 0.36 × 0.04 × 100 = 1.44 • Actual CPI = 2 + 2 + 1.44 = 5.44 • Ideal CPU is 5.44/2 =2.72 times faster 35

  3. Average Access Time • Hit time is also important for performance • Average memory access time (AMAT) • AMAT = Hit time + Miss rate × Miss penalty • Example • CPU with 1ns clock, hit time = 1 cycle, miss penalty = 20 cycles, I-cache miss rate = 5% • AMAT = 1 + 0.05 × 20 = 2ns • 2 cycles per instruction 36

  4. Performance Summary • When CPU performance increased • Miss penalty becomes more significant • Decreasing base CPI • Greater proportion of time spent on memory stalls • Increasing clock rate • Memory stalls account for more CPU cycles • Can’t neglect cache behavior when evaluating system performance 37

  5. Associative Caches • Fully associative • Allow a given block to go in any cache entry • Requires all entries to be searched at once • Comparator per entry (expensive) • n -way set associative • Each set contains n entries • Block number determines which set • (Block number) modulo (#Sets in cache) • Search all entries in a given set at once • n comparators (less expensive) 38

  6. Associative Cache Example 39

  7. Spectrum of Associativity • For a cache with 8 entries 40

  8. Associativity Example • Compare 4-block caches • Direct mapped, 2-way set associative, fully associative • Block access sequence: 0, 8, 0, 6, 8 • Direct mapped Block Cache Hit/miss Cache content after access address index 0 1 2 3 0 0 miss Mem[0] 8 0 miss Mem[8] 0 0 miss Mem[0] 6 2 miss Mem[0] Mem[6] 8 0 miss Mem[8] Mem[6] 41

  9. Associativity Example • 2-way set associative Block Cache Hit/miss Cache content after access address index Set 0 Set 1 0 0 miss Mem[0] 8 0 miss Mem[0] Mem[8] 0 0 hit Mem[8] Mem[0] 6 0 miss Mem[0] Mem[6] 8 0 miss Mem[8] Mem[6]  Fully associative Block Hit/miss Cache content after access address 0 miss Mem[0] 8 miss Mem[0] Mem[8] 0 hit Mem[0] Mem[8] 6 miss Mem[0] Mem[8] Mem[6] 8 hit Mem[0] Mem[8] Mem[6] 42

  10. How Much Associativity • Increased associativity decreases miss rate • But with diminishing returns • Simulation of a system with 64KB D-cache, 16-word blocks, SPEC2000 • 1-way: 10.3% • 2-way: 8.6% • 4-way: 8.3% • 8-way: 8.1% 43

  11. Set Associative Cache Organization 44

  12. Replacement Policy • Direct mapped: no choice • Set associative • Prefer non-valid entry, if there is one • Otherwise, choose among entries in the set • Least-recently used (LRU) • Choose the one unused for the longest time • Simple for 2-way, manageable for 4-way, too hard beyond that • Random • Gives approximately the same performance as LRU for high associativity 45

  13. Multilevel Caches • Primary cache attached to CPU • Small, but fast • Level-2 cache services misses from primary cache • Larger, slower, but still faster than main memory • Main memory services L-2 cache misses • Some high-end systems include L-3 cache 46

  14. Multilevel Cache Example • Given • CPU base CPI = 1, clock rate = 4GHz • Miss rate/instruction = 2% • Main memory access time = 100ns • With just primary cache • Miss penalty = 100ns/0.25ns = 400 cycles • Effective CPI = 1 + 0.02 × 400 = 9 47

  15. Example (cont.) • Now add L-2 cache • Access time = 5ns • Global miss rate to main memory = 0.5% • Primary miss with L-2 hit • Penalty = 5ns/0.25ns = 20 cycles • Primary miss with L-2 miss • Extra penalty = 500 cycles • CPI = 1 + 0.02 × 20 + 0.005 × 400 = 3.4 • Performance ratio = 9/3.4 = 2.6 48

  16. Multilevel Cache Considerations • Primary cache • Focus on minimal hit time • L-2 cache • Focus on low miss rate to avoid main memory access • Hit time has less overall impact • Results • L-1 cache usually smaller than a single cache • L-1 block size smaller than L-2 block size 49

  17. Interactions with Advanced CPUs • Out-of-order CPUs can execute instructions during cache miss • Pending store stays in load/store unit • Dependent instructions wait in reservation stations • Independent instructions continue • Effect of miss depends on program data flow • Much harder to analyse • Use system simulation 50

  18. Interactions with Software • Misses depend on memory access patterns • Algorithm behavior • Compiler optimization for memory access 51

  19. Virtual Memory 52

  20. Virtual Memory • Use main memory as a “cache” for secondary (disk) storage • Managed jointly by CPU hardware and the operating system (OS) • Programs share main memory • Each gets a private virtual address space holding its frequently used code and data • Protected from other programs • CPU and OS translate virtual addresses to physical addresses • VM “block” is called a page • VM translation “miss” is called a page fault 53

  21. Address Translation • Fixed-size pages (e.g., 4K) 54

  22. Page Fault Penalty • On page fault, the page must be fetched from disk • Takes millions of clock cycles • Handled by OS code • Try to minimize page fault rate • Fully associative placement • Smart replacement algorithms 55

  23. Page Tables • PTE: Page Table Entry • Stores placement information • Array of page table entries, indexed by virtual page number • Page table register in CPU points to page table in physical memory • If page is present in memory • PTE stores the physical page number • Plus other status bits (referenced, dirty, …) • If page is not present • PTE can refer to location in swap space on disk 56

  24. Translation Using a Page Table 57

  25. Mapping Pages to Storage 58

  26. Replacement and Writes • To reduce page fault rate, prefer least-recently used (LRU) replacement • Reference bit (aka use bit) in PTE set to 1 on access to page • Periodically cleared to 0 by OS • A page with reference bit = 0 has not been used recently • Disk writes take millions of cycles • Block at once, not individual locations • Write through is impractical • Use write-back • Dirty bit in PTE set when page is written 59

  27. Fast Translation Using a TLB • Address translation would appear to require extra memory references • One to access the PTE • Then the actual memory access • But access to page tables has good locality • So use a fast cache of PTEs within the CPU • Called a Translation Look-aside Buffer (TLB) • Typical: 16–512 PTEs, 0.5–1 cycle for hit, 10–100 cycles for miss, 0.01%–1% miss rate • Misses could be handled by hardware or software 60

  28. Fast Translation Using a TLB 61

  29. TLB Misses • If page is in memory • Load the PTE from memory and retry • Could be handled in hardware • Can get complex for more complicated page table structures • Or in software • Raise a special exception, with optimized handler • If page is not in memory (page fault) • OS handles fetching the page and updating the page table • Then restart the faulting instruction 62

  30. TLB Miss Handler • TLB miss indicates • Page present, but PTE not in TLB • Page not preset • Must recognize TLB miss before destination register overwritten • Raise exception • Handler copies PTE from memory to TLB • Then restarts instruction • If page not present, page fault will occur 63

  31. Page Fault Handler • Use faulting virtual address to find PTE • Locate page on disk • Choose page to replace • If dirty, write to disk first • Read page into memory and update page table • Make process runnable again • Restart from faulting instruction 64

  32. TLB and Cache Interaction • If cache tag uses physical address • Need to translate before cache lookup • Alternative: use virtual address tag • Complications due to aliasing • Different virtual addresses for shared physical address

  33. Memory Protection • Different tasks can share parts of their virtual address spaces • But need to protect against errant access • Requires OS assistance • Hardware support for OS protection • Privileged supervisor mode (aka kernel mode) • Privileged instructions • Page tables and other state information only accessible in supervisor mode • System call exception (e.g., syscall in MIPS) 66

  34. Commonalities Between Memory Hierarchies Cache = faster way to access larger main memory Virtual memory = cache for storage (e.g., faster way to access larger secondary memory / storage) 67

  35. Memory Hierarchy Big Picture • Common principles apply at all levels of the memory hierarchy • Based on notions of caching • At each level in the hierarchy • Block placement • Finding a block • Replacement on a miss • Write policy 68

  36. Block Placement • Determined by associativity • Direct mapped (1-way associative) • One choice for placement • n-way set associative • n choices within a set • Fully associative • Any location • Higher associativity reduces miss rate • Increases complexity, cost, and access time 69

  37. Finding a Block Associativity Location method Tag comparisons Direct mapped Index 1 n-way set Set index, then search n associative entries within the set Fully associative Search all entries #entries Full lookup table 0 • Hardware caches • Reduce comparisons to reduce cost • Virtual memory • Full table lookup makes full associativity feasible • Benefit in reduced miss rate 70

  38. Replacement • Choice of entry to replace on a miss • Least recently used (LRU) • Complex and costly hardware for high associativity • Random • Close to LRU, easier to implement • Virtual memory • LRU approximation with hardware support 71

  39. Write Policy • Write-through • Update both upper and lower levels • Simplifies replacement, but may require write buffer • Write-back • Update upper level only • Update lower level when block is replaced • Need to keep more state • Virtual memory • Only write-back is feasible, given disk write latency 72

  40. Sources of Misses • Compulsory misses (aka cold start misses) • First access to a block • Capacity misses • Due to finite cache size • A replaced block is later accessed again • Conflict misses (aka collision misses) • In a non-fully associative cache • Due to competition for entries in a set • Would not occur in a fully associative cache of the same total size 73

  41. Cache Design Trade-offs Design change Effect on miss rate Negative performance effect Increase cache size Decrease capacity May increase access misses time Increase associativity Decrease conflict May increase access misses time Increase block size Decrease compulsory Increases miss misses penalty. For very large block size, may increase miss rate due to pollution. 74

  42. Dependable Memory Dependability Measures, Error Correcting Codes, RAID, … 75

  43. Dependability Service accomplishment Service delivered as specified • Fault: failure of a component • May or may not lead to Restoration Failure system failure Service interruption Deviation from specified service 76

  44. Dependability Measures • Reliability: mean time to failure (MTTF) • Service interruption: mean time to repair (MTTR) • Mean time between failures • MTBF = MTTF + MTTR • Availability = MTTF / (MTTF + MTTR) • Improving Availability • Increase MTTF: fault avoidance, fault tolerance, fault forecasting • Reduce MTTR: improved tools and processes for diagnosis and repair 77

  45. The Hamming SEC Code • Hamming distance • Number of bits that are different between two bit patterns • Minimum distance = 2 provides single bit error detection • E.g. parity code • Minimum distance = 3 provides single error correction, 2 bit error detection 78

  46. Encoding SEC • To calculate Hamming code: • Number bits from 1 on the left • All bit positions that are a power 2 are parity bits • Each parity bit checks certain data bits: 79

  47. Decoding SEC • Value of parity bits indicates which bits are in error • Use numbering from encoding procedure • E.g. • Parity bits = 0000 indicates no error • Parity bits = 1010 indicates bit 10 was flipped 80

  48. SEC/DEC Code • Add an additional parity bit for the whole word (p n ) • Make Hamming distance = 4 • Decoding: • Let H = SEC parity bits • H even, p n even, no error • H odd, p n odd, correctable single bit error • H even, p n odd, error in p n bit • H odd, p n even, double error occurred • Note: ECC DRAM uses SEC/DEC with 8 bits protecting each 64 bits 81

  49. Error Detection – Error Correction • Memory data can get corrupted, due to things like: • Voltage spikes. • Cosmic rays. • The goal in error detection is to come up with ways to tell if some data has been corrupted or not. • The goal in error correction is to not only detect errors, but also be able to correct them. • Both error detection and error correction work by attaching additional bits to each memory word. • Fewer extra bits are needed for error detection, more for error correction. 82

  50. Encoding, Decoding, Codewords • Error detection and error correction work as follows: • Encoding stage: • Break up original data into m-bit words. • Each m-bit original word is converted to an n-bit codeword. • Decoding stage: • Break up encoded data into n-bit codewords. • By examining each n-bit codeword: • Deduce if an error has occurred. • Correct the error if possible. • Produce the original m-bit word. 83

  51. Parity Bit • Suppose that we have an m -bit word. • Suppose we want a way to tell if a single error has occurred (i.e., a single bit has been corrupted). • No error detection/correction can catch an unlimited number of errors. • Solution: represent each m -bit word using an ( m+1)- bit codeword. • The extra bit is called parity bit . • Every time the word changes, the parity bit is set so as to make sure that the number of 1 bits is even. • This is just a convention, enforcing an odd number of 1 bits would also work, and is also used. 84

  52. Parity Bits - Examples • Size of original word: m = 8. Original Number of Codeword (9 Word (8 bits) 1s in Original bits): Original Word Word + Parity Bit 01101101 00110000 11100001 01011110 85

  53. Parity Bits - Examples • Size of original word: m = 8. Original Number of Codeword (9 Word (8 bits) 1s in Original bits): Original Word Word + Parity Bit 01101101 5 011011011 00110000 2 001100000 11100001 4 111000010 01011110 5 010111101 86

  54. Parity Bit: Detecting A 1-Bit Error • Suppose now that indeed the memory work has been corrupted in a single bit. • How can we use the parity bit to detect that? 87

  55. Parity Bit: Detecting A 1-Bit Error • Suppose now that indeed the memory work has been corrupted in a single bit. • How can we use the parity bit to detect that? • How can a single bit be corrupted? 88

  56. Parity Bit: Detecting A 1-Bit Error • Suppose now that indeed the memory work has been corrupted in a single bit. • How can we use the parity bit to detect that? • How can a single bit be corrupted? • Either it was a 1 that turned to a 0. • Or it was a 0 that turned to a 1. • Either way, the number of 1-bits either increases by 1 or decreases by 1, and becomes odd . • The error detection code just has to check if the number of 1-bits is even. 89

  57. Error Detection Example • Size of original word: m = 8. • Suppose that the error detection algorithm gets as input one of the bit patterns on the left column. What will be the output? Input: Codeword (9 bits): Number of 1s Error? Original Word + Parity Bit 011001011 001100000 100001010 010111110 90

  58. Error Detection Example • Size of original word: m = 8. • Suppose that the error detection algorithm gets as input one of the bit patterns on the left colum. What will be the output? Input: Original Word + Number of 1s Error? Parity Bit (9 bits) 011001011 5 yes 001100000 2 no 100001010 3 yes 010111110 6 no 91

  59. Parity Bit and Multi-Bit Errors • What if two bits get corrupted? • The number of 1-bits can: • remain the same, or • increase by 2, or • decrease by 2. • In all cases, the number of 1-bits remains even. • The error detection algorithm will not catch this error. • That is to be expected, a single parity bit is only good for detecting a single-bit error. 92

  60. More General Methods • Up to the previous slide, we discussed a very simple error detection method, namely using a single parity bit. • We know move on to more general methods, that possibly detect and/or correct multiple errors. • For that, we need multiple extra bits. • Key parameters: • m : the number of bits in the original memory word. • r : the number of extra (also called redundant ) bits. • n : the total number of bits per codeword: n = m + r . • d : the number of errors we want to be able to detect or correct. 93

  61. Legal and Illegal Codewords • Each m -bit original word corresponds to only one n -bit codeword. • A codeword is called legal if an original m-bit word corresponds to that codeword. • A codeword is called illegal if no original m-bit word corresponds to that codeword. • How many possible original words are there? • How many possible codewords are there? • How many legal codewords are there? In other words, how many codewords are possible to observe if there are no errors? 94

  62. Legal and Illegal Codewords • Each m -bit original word corresponds to only one n -bit codeword. • A codeword is called legal if an original m-bit word corresponds to that codeword. • A codeword is called illegal if no original m-bit word corresponds to that codeword. • How many possible original words are there? 2 m . • How many possible codewords are there? 2 n . • How many legal codewords are there? In other words, how many codewords are possible to observe if there are no errors? 2 m . 95

  63. Legal and Illegal Codewords • How many possible original words are there? 2 m . • How many possible codewords are there? 2 n . • How many legal codewords are there? In other words, how many codewords are possible to observe if there are no errors? 2 m . • Therefore, most ( 2 n -2 m ) codewords are illegal, and only show up in the case of errors. • The set of legal codewords is called a code . 96

  64. The Hamming Distance • Suppose we have two codewords A and B . • Each codeword is an n -bit binary pattern. • We define the distance between A and B to be the number of bit positions where A and B differ. • This is called the Hamming distance . • One way to compute the Hamming distance: • Let C = EXCLUSIVE OR( A, B ). • Hamming Distance( A , B ) = number of 1-bits in C . • Given a code (i.e., the set of legal codewords), we can find the pair of codewords with the smallest distance. • We call this minimum distance the distance of the code. 97

  65. Hamming Distance: Example • What is the Hamming distance between these two patterns? 1 0 1 1 0 1 0 0 1 0 0 0 0 0 1 1 0 1 0 1 1 0 1 0 • How can we measure this distance? 98

  66. Hamming Distance: Example • What is the Hamming distance between these two patterns? 1 0 1 1 0 1 0 0 1 0 0 0 0 0 1 1 0 1 0 1 1 0 1 0 • How can we measure this distance? • Find all positions where the two bit patterns differ. • Count all those positions. • Answer: the Hamming distance in the example above is 3. 99

  67. Example: 2-Bit Error Detection • Size of original word: m = 3 . Original Word Codeword • Number of redundant bits: r = 3. 000 000000 001 001011 • Size of codeword: n = 6. 010 010101 • Construction: 011 011110 • 1 parity bit for bits 1, 2. 100 100110 • 1 parity bit for bits 1, 3. • 1 parity bit for bits 2, 3. 101 101101 110 110011 • You can manually verify that you cannot find any two codewords with Hamming 111 111000 distance 2 (just need to manually check 28 pairs). • This is a code with distance 3. • Any 2-bit error can be detected. 100

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend