Free Essay

A Look Into Computer Memory

In:

Submitted By jaffo537
Words 1554
Pages 7
A Look into
Computer Memory Table of Contents
Abstract 3
A Look into Computer Memory 4
Memory Hierarchy 4
Allocation Policies 5
Relocation Policies 6
Hit and Hit Ratio 6
Modern Computer Applications 7
Conclusion 7
References 8

Abstract
The memory of a computer is a key component of the overall architecture of a computer. Several types of memory exist with the architecture of the computer which collectively is known as the memory hierarchy. The use of the memory hierarchy, placing and moving information, is effected by the allocation and relocation policies. How well these policies allow the processor to find the information it is looking for, known as a hit, is determined by the hit ratio. The modern processor available today relies on memory hierarchy to maintain their high performance. The paper will take a look at how these various pieces and policies work together within the architecture of a computer.

A Look into
Computer Memory
Memory plays a key role in the modern processor. The memory hierarchy is the foundation for which the allocation and relocation policies function upon. These policies work to provide the needed information in the proper memory location to attempt to maintain a high hit ratio to avoid processor delay. Regardless of the speed of a modern processor, a low hit ratio adds delay to the high performance processor.
Memory Hierarchy
Memory in a computer varies in size, speed with regards to access time and, just as importantly, cost. To allow for high speed processing, access to memory must be able to occur in 1 nanosecond or less (Parhami, 2005, p. 329). High speed memory with an access time of 1 nanosecond or less comes at a very high cost. Due to this high cost, millions of dollars per gigabyte, there is a very small amount of this type of memory, typically in the hundreds of bytes. To provide an affordable cost of a processor and in turn a computer, memories of various speeds and costs are used. The memory hierarchy is made up of these various levels of memory. A typical hierarchy, including size and cost, can be seen in Figure 1 with the smallest, fastest, and most expensive at the top of the pyramid. The register memory is available directly to the processor and is labeled Level 0. This memory is used explicitly for load/store instructions. In Figure 1, Level 1 memory is called the Cache 1 memory with Level 2 memory called the Cache 2 and so forth. Level 1 and Level 2 memories are typically part of the processor chip in order to allow direct access to the memory locations by the processor. Level 3 memory is the RAM installed on the motherboard of the computer and has an access time of hundreds of nanoseconds. The next level of memory, Level 4, which is considered the directly connected disks of the system, which have a significant amount of access time which is in the tens of milliseconds. Level 5 memory can be network storage or tape drives which may take minutes to access the appropriate data. It is worth noting the right hand column in Figure 1 showing the reduction in cost per GB as the size increases and the access speed decreases. To obtain high speed at an affordable cost, large amounts of information (programs and large data sets) is stored in the slower memory locations and moved into the faster memory locations, preferably before it is needed by the processor (Parhami, 2005, pp. 329-331).
Allocation Policies
Allocation policies determine where data will be placed within the memory hierarchy. The allocation policy is executed by the memory manager. The memory manager play an intricate part in maintaining the performance of the processor by keeping the immediately needed data in the optimal location for processor access to prevent delay in retrieving the information from slower access locations. There are three primary strategies that can be used for memory placement. They are Best Fit, First Fit and Worst Fir. When using the Best Fit policy, the memory manager looks for the closest fitting empty location where the data will fit without as little wasted space as possible. It is worth noting that the best fit location may not be the first available location where the data would fit. For placing the data in the first location where it will fit, the First Fit policy is used. This policy puts the data into the first location it fits with no regard for the amount of remain space after the data. Finally in Worst Fit, the memory manager looks for the largest location available to place the data with the end goal of having the maximum amount of space left available to place additional data into the remaining location (Virginia Polytechnic Institute and State University, 2013).
Relocation Policies
Relocation occurs when the OS loads a solid block of memory for a process. The first physical location of the process is known as the relocation address or base address. There are two types of relocation, static and dynamic. Static relocation is very basic in that a location is assigned to the process when it is first put into memory. From that point on, until the process is complete, the process remains in that particular location and cannot be moved. The downside to static relocation is once the process is started, the memory location and the amount of memory cannot be changed until the process is stopped. Dynamic relocation, however, can be an ever changing process. With dynamic relocation, the OS can move the process to a better location during execution to maintain efficiency. This enables the area for the process to increase as the needs of the process increases. One downside is that an add function on every memory reference causing a delay for the processor to process the add function. Other disadvantages of dynamic relocation is that the memory allocated cannot be shared among processes and the process itself is still limited to the physical size of the memory (The University of Utah, 2009).
Hit and Hit Ratio
When a processor accesses a memory location in the register, L1 or L2 Cache and finds the information it requires, this is known as a Hit. The Hit Ratio is the number of Hits the processor makes divided by the total number of times the processor accessed the memory for data. The higher the Hit Ratio, the better performance of the processor. When the information the processor needs is not in one of the higher levels of memory, it must go to the other memory locations for the information. As shown in the Memory Hierarchy, as the need to access the lower levels of memory occurs, the time it takes to obtain the information from these lower levels significantly increases the time it takes to complete a particular process. A branch predictor can be implemented to predict what information will be needed by the processer prior to the information being needed. This information can then be placed into a special buffer so it is available when the processor needs it avoiding the need for the processor to wait while information is retrieved from the slower memory locations (Hennessy & Patterson, 2007, p. 82).
Modern Computer Applications
The modern Intel i7 CPU uses four processing cores which utilize the Memory Hierarchy mentioned above with one additional level added to the pyramid. All four cores use a register, L1 and L2 Caches for executing instructions. Intel has added a third memory cache between the L2 Cache and the main memory of the computer. This L3 Cache as they call it is shared by the four processing cores as shown in Figure 2. This enables the cores to access information from one of the other cores without interrupting the other core due to the ability to access the common cache instead of the core specific register, L1 or L2 Cache. If the core specific register, L1 or L2 cache would need to provide information to another core, the specific core would have to pause it’s current process and hand off the information to the other core. The L3 Cache avoids this delay. The remaining memory beyond the cache level functions the same as previously indicated above (National Instruments, 2011).
Conclusion
The Memory Hierarchy along with the allocation policy, reallocation policy, memory manager and branch predictor all play key role in the functioning of the modern processor. Having the proper size and speed memory being utilized in the most efficient manner allows for maximum utilization of a processor’s computational ability.
References
Hennessy, J. L., & Patterson, D. A. (2007). Computer Architecture A Quantative Approach (4th ed.). San Francisco: Morgan Kaufmann.
National Instruments. (2011, March 10). Top Eight Features of the Intel Core i7 Processors for Test, Measurement, and Control. Retrieved from National Instruments: http://www.ni.com/white-paper/11266/en/
Parhami, B. (2005). Computer Architecture From Microprocessors to Supercomputers. Santa Barbara: Oxford University Press.
The University of Utah. (2009, December 2). Memory Managemetn. Retrieved from The University of Utah: http://www.cs.utah.edu/~mflatt/past-courses/cs5460/lecture8.pdf
Virginia Polytechnic Institute and State University. (2013, 11 10). Operating Systems - Memory Allocation. Retrieved from Virginia Polytechnic Institute and State University: http://courses.cs.vt.edu/~csonline/OS/Lessons/MemoryAllocation/index.html

Similar Documents

Free Essay

Ram Function and Form

...How RAM Works 0  Page   1   2   3   4   Computer Hardware Image Gallery MORE ON RAM * RAM Quiz * Does adding RAM make your computer faster? * How to Add RAM to Your Desktop * How to Add RAM to Your Laptop Random access memory (RAM) is the best known form of computer memory. RAM is considered "random access" because you can access any memory cell directly if you know the row and column that intersect at that cell. The opposite of RAM is serial access memory (SAM). SAM stores data as a series of memory cells that can only be accessed sequentially (like a cassette tape). If the data is not in the current location, each memory cell is checked until the needed data is found. SAM works very well for memory buffers, where the data is normally stored in the order in which it will be used (a good example is the texture buffer memory on a video card). RAM data, on the other hand, can be accessed in any order. Similar to a microprocessor, a memory chip is an integrated circuit(IC) made of millions of transistors and capacitors. In the most common form of computer memory, dynamic random access memory (DRAM), a transistor and a capacitor are paired to create amemory cell, which represents a single bit of data. The capacitor holds the bit of information -- a 0 or a 1 (see How Bits and Bytes Work for information on bits). The transistor acts as a switch that lets the control circuitry on the memory chip read the capacitor or change its state. A capacitor is like a...

Words: 3957 - Pages: 16

Premium Essay

Fun Fact

...1. This is an example of what a laptop looks like. Dell makes the model shown above. Figure 2. This is an example of what a desktop computer looks like. Dell makes the model shown above. Figure 3. This is Apple's family of tablets. From left to right, the big one is the iPad Pro 12.9-inch, the medium one is the iPad Pro 9.7-inch, and the little one is the iPad mini 4. These are just some of the many tablet computers available today. Figure 4a. This is another example of an all-in-one computer. Dell makes the model shown...

Words: 1010 - Pages: 5

Free Essay

It 190 Unit6

...whenever you look up information, you need to cite your sources! Please copy and paste the full URL of any website you use in researching your answers to the following questions. If you use your book, please place the page number from your book in parentheses next to the answer. Requirements: 1. You notice that your computer is running a bit sluggishly and you want to determine if there is a way to increase your performance without purchasing additional hardware or software. Learn more about your computer’s performance by using Windows Task Manager and the MSConfig Utility. Immediately after booting your computer, run Windows Task Manager, then answer the following questions. a. Click the Applications tab and list all applications. Are any of the applications listed as Not Responding? No. b. Click the Processes tab. Identify how many processes are running, the CPU usage, and physical memory usage. 58 processes cpu usage between 0 and 14 % phy mem usage 42% c. While the Processes tab is still selected, click View on the Menu bar and click Select Columns. List four additional columns that could be displayed. PID, session id, cpu time, page faults d. Sort the CPU times in descending order. Which process is using the most CPU resources and what percentage is it using? rundll32.exe 2% e. Sort the memory usage in descending order. Which process is using the most memory and what percentage...

Words: 1911 - Pages: 8

Premium Essay

Nt1310 Unit 6 Lab 1-6

...processors, memory, and I/O devices, and how they are interconnected; • Understanding the functions of operating systems and BIOS Lab Unit 1 1. What is 62 in binary? 2 into 62= 31 remainder 0 2 into 31= 15 remainder 1 2 into 15= 7 remainder 1 2 into 7= 3 remainder 1 2 into 3= 1 remainder 1 Answer= Binary 11110 2. What is 63 in Hexadecimal? 63/16=...

Words: 1346 - Pages: 6

Premium Essay

Exploring Buses

...PS/2 Mouse Port- which is a 6-pin Mini-DIN socket. PS/2 Keyboard Port- connector is a 6-pin mini-DIN connector used for connecting some keyboards and mice to a PC compatible computer system. Serial (COM) Ports- Most serial ports on personal computers conform to the RS-232C or RS-422 standards. A serial port is a general-purpose interface that can be used for almost any type of device, including modems, mice, and printers, although most printers are connected to a parallel port. Universal Serial Bus (USB) Ports- connectors and communications protocols used in a bus for connection, communication, and power supply between computers and electronic devices. 10/100 Ethernet Port- Ethernet is the most common type of connection computers use in a local area network (LAN). An Ethernet port looks much like a regular phone jack, but it is slightly wider. This port can be used to connect your computer to another computer, a local network, or an external DSL or cable modem. VGA Video Port- Video Graphics Array connector is a three-row 15-pin DE-15 connector. The 15-pinVGA connector is found on many video cards, computer monitors, and high definition television sets. On laptop computers or other small devices, a mini-VGA port is sometimes used in place of the full-sized VGA connection. IEEE-1394 Port- is an interface standard for a serial bus for high-speed communications and isochronous real-time data transfer. It was developed in the late 1980s and early 1990s by Apple, who called it FireWire...

Words: 420 - Pages: 2

Free Essay

Computer Organization Architectuer

...INSTRUCTION SET The instruction set, also called instruction set architecture (ISA), is a part of the computer that pertains to programming, which is basically machine language. The collection of different instructions that the CPU can execute is referred to as the CPU’s instruction set. A machine instruction should contain the following elements: * Operation code: Specifies the operation to be performed. * Source operand reference: The reference to the operand should be there in the instruction. * Result operand reference: The address of the memory where output should be stored must be mentioned. * Next instruction reference: This tells CPU where to find the next instruction to be executed. All the machine instructions can be categorized in to the following types: * Data processing: This classification contains arithmetic instructions which provide computational capabilities for processing numeric data and logical instructions which operate on the bits of a word as bits. * Data storage: This classification contains instruction to store data in memory and the registers. * Data movement: This classification contains instructions to move data between memory and the registers. These instructions are also known as I/O instructions. * Control: This classification contains test instructions that are used to test the value of a data word or the status of a computation and branch instructions that are used to branch to a different set of instructions...

Words: 1303 - Pages: 6

Premium Essay

Von Neumann Architecture

...purpose of computer programs. We can then fathom the magnitude of this architecture. The von Neumann architecture allows instructions and data to be mixed and stored in the same memory module and the contents of this memory are addressed by location only. This all takes place in a sequential order. The Von Neumann machine had five basic parts comprised of memory, ALU, the program control unit, input equipment & output equipment. The programs uses a language that to the naked eye can in most cases resemble spoken language. Upper-level languages such as C and Java are designed with this in mind. However, computers understand natural language without significant human effort. The physical hardware cannot truly understand language, but instead processes electrical signals. Computer programs are a list of and data, and are represented as binary strings. We can produce a list of high level requirements that a Central Processing Unit (CPU) could execute. This then leads us to a list of functional units that implement the high-level functionality. Neumann m/c are called control flow computer because instruction are executed sequentially as controlled by a program counter. To increase the speed, parallel processing of computer have been developed in which serial CPU’s are connected in parallel to solve a problem. Even in parallel computers, the basic building blocks are Neumann processors. The von Neumann architecture is a design model for a stored-program digital computer that uses...

Words: 2408 - Pages: 10

Free Essay

Cmos Reseach Paper

...are the lowest level of software in a computer providing a set of small programs or software routines that allow the hardware of a computer to interact with the operating system by a set of standard calls. The Boot Process To get to the operating system, a computer must first boot from the BIOS. The BIOS performs a number of tasks when a computer is started. From initializing the microprocessor to initializing and testing hardware to starting the operating system. Starting a computer is not a simple task. It's a methodical process that is performed every time power is applied to computer. Here is a detailed description of the boot process. This process will vary with different computers and different BIOS', but the overall goal is the same. When you first turn on a computer the very first operation performed by the CPU is to read the address space at FFFF: 0000h. This address space it reads from is only 16 bytes, which is not nearly enough space to house the BIOS found on a motherboard. Instead, this location contains a special instruction called a jump command (JMP) that tells the processor where to go to find and read the actual BIOS into memory. The process of the processor reading the jump instruction and redirection to the actual BIOS is called the bootstrap or boot. So, when you apply power, it's not the operating system that's working. It's the BIOS. Here is a basic rundown of what is happening: 1. Power is applied to the computer When power is...

Words: 805 - Pages: 4

Free Essay

Operating Systems

...systems I am choosing Windows XP for the basic low end computer because the system requirements are fairly low and it will work on just about any personal computer that is being used today. The operating system I am choosing for the high end computer is Windows 7. Its requirements are tailor-made more for the newer and higher end computers. Some of the computers that are out there will not be able to run windows 7. Windows XP system requirements are a Pentium 233 megahertz processor, at least 64 megabytes of system memory, at least 1.5 gigabytes of hard disk space, CD-ROM or DVD drive, video adaptor, and a monitor with a screen resolution of 800x600 or higher. Windows XP doesn’t have a very memory intensive graphical user interface either. If you are upgrading from Windows 2000 you probably won’t notice too much of a difference as far as the general look and feel of the operating system. You will have to activate it soon after you install the program to keep it from deactivating. Windows XP also has better security and protection than previous versions. Windows 7 system requirements are 1 gigahertz or faster processor, 1 gigabyte of system memory for 32 bit systems and 2 gigabytes of system memory for 64 bit systems, 16 gigabytes of hard disk space for 32 bit systems and 20 gigabytes of hard disk space for 64 bit systems, support for DirectX 9 with windows display driver model 1.0 and 128 megabytes of memory for the Aero theme desktop, a monitor with at least 1024x768...

Words: 534 - Pages: 3

Premium Essay

A Paper

...they often tend to think of superior power and advance technology. Nothing could be farther from the truth. In reality most military computers are generations behind the technology curve. When the military chooses hardware, it typically looks for several unique characteristics. What to Look for According to EHow.com there are three main things to look for when planning on buying a computer. The Random Access Memory (RAM) allows move programs to run at a time. Hard Drive space allows the user to save information to the computer to be accessed later. Finally the other thing EHow.com recommends is to get a reliable brand name so you won't have to troubleshoot in the future ( EHow.com, 2011). When the military prepares to buy computers, it does in bulk. Not only does the military buy many computers, but they search for different characteristics. Out of the three common things that average consumers look for, only one really matters when it comes to military computers. Random Access Memory (RAM) is not as important on most military computers because each computer is not designed to handle that much graphics or to many programs at once. Military Hardware There a many specialized computers designed for weapon systems that are specifically designed to meet the demands of their specific weapon system. On those systems Random Access Memory may be more important. Things such as Hard Drive space are not as important because the military uses servers to hold most of their information...

Words: 737 - Pages: 3

Free Essay

Leadership and Change Management

...as ________ and the other is _____________. IV. Hardware means _______________________. V. Computer monitor looks like a ________________. VI. Computer has _____________ kinds of memory. VII. Printer is an ________________ device. VIII. The buttons on the keyboard are called _______________. IX. CPU stands for __________________. X. The keys of the keyboard are divided into ______________ groups. XI. The alphabetic keys are part of _____________ in a key board. XII. The numeric keypad of keyboard has _____________ keys. XIII. Keyboard is used to give _________ to the computer. XIV. The cursor on the screen moves in any direction with the help of _____________. XV. _____________ works in computer like our brain. Question no.2: True/ False. I. Laptop looks like a notebook. II. Taskbar shows the names of programs we are not using currently. III. Backside of monitor is called Desktop. IV. Keyboard is an output device. V. CPU is also called Microprocessor. VI. Cursor control keys are used to move the cursor. VII. Numeric keypad has twenty keys. VIII. Numerical keys are called typewriter area. IX. Function keys are used for special functions. X. Mouse is a pointing device. XI. Software means computer parts. XII. Hardware means information saved in a computer. XIII. When the computer is ready to work, we will see a screen on the monitor. XIV....

Words: 918 - Pages: 4

Premium Essay

Documentation

...SECTION A A) The importance of computers in education Computer education improves students’ research skills by encouraging them to look for information on the internet. It enables them to research various topics by seeking relevant books that could be digitally available online. The internet also contains search options, which expose students to diverse ways of obtaining information. Incorporating computer education in schools can inspire students to: * Undertake carriers in technology and enhance their understanding of how computer technology impacts people’s daily lives. * Increases their interest in computer-related fields during their college education. B The importance of computers in education Computer education improves students’ research skills by encouraging them to look for information on the internet. It enables them to research various topics by seeking relevant books that could be digitally available online. The internet also contains search options, which expose students to diverse ways of obtaining information. Incorporating computer education in schools can inspire students to: 1. Undertake carriers in technology and enhance their understanding of how computer technology impacts people’s daily lives. 2. Increases their interest in computer-related fields during their college education. C) ORGANOGRAM Managing...

Words: 526 - Pages: 3

Free Essay

Mac Osx

...Mac OS X Operating System MEMORY 01/05/15 Mac OS X Operating System MEMORY At start up, the MAC OSX it divides the Random Access Memory into two broad sections. The system partition is a saved portion which always begins at the lowest addressable byte of memory and then extends upward. The other portion is available for use by software components and applications. When launching an application, the system OS only allows for a specific portion of memory to be utilized in what is called an application partition. The system Heap is the main part of the system partition which exclusively reserves itself for the operating system and software components. The Heap loads system code, resources and data structures, including the system buffering and queues. The Heap starts at the low memory end and only expands when needed to the high memory area. In multitasking situations, each application is limited in its memory partition. It is only allotted in total what is assigned as its maximum intended usage to not over access memory usage. If the application requires the use of more memory, the RAM grants the application Temporary memory from the Heap to allow for smoother function ability. The operating environment is controlled by the system global variables which is the elapsed time of each open applications...

Words: 1686 - Pages: 7

Premium Essay

Nt1310 Unit 1

...1. What is hardware and software? Give an example of each. Ans. Hardware refers to the physical components of a computer or other devices like the hard disk drive, random access memory (RAM), and the central processing unit (CPU). An example of hardware is a printer. Software is the set of instructions that allows a particular program to complete a task. An example of software is Windows which is an operating system. 2. What is RAM? Ans. RAM stands for Random Access Memory. It is the non-permanent or volatile memory of a computer. RAM is used in computers to speed up the process of its software and other processes. When the computer is shut down, the information of RAM that was used while operating programs in the computer before, will be...

Words: 627 - Pages: 3

Premium Essay

The Benefits and Uses of Virtual Memory

...The Benefits and Uses of Virtual Memory Marcia Amnay POS/355 Steven Kernan April 22nd, 2013 The Benefits and Uses of Virtual Memory This paper will discuss the benefits and uses of virtual memory. Programs require memory to start and run on computers. When several jobs are being processed at the same time, the operating system must keep track of how the computer’s memory and make sure there is enough. Computers come with a limited amount of random access memory which is known as RAM. RAM is the main memory on a computer. If a user is running multiple applications at the same time, the RAM on it will not be enough to execute the processes. This is when virtual memory comes in and balances the process. Virtual memory is a memory management technique. Virtual memory is secondary memory that can act as if it were part of the main memory. When the RAM is used up, virtual memory places data by using the hard disk or another disk of some kind for space. The hard disk is much slower then RAM so the more virtual memory used, the slower your computer will run. The computer will look for areas on the RAM that are not in use and copy it to the hard disk to free up space on the RAM. Virtual memory keeps ‘active’ process in the RAM and keeps the ‘inactive’ processes on the address space on the disk. When an ‘inactive’ process is needed, it will bring that process back to the RAM from the disk. This process is running in the background without the user being aware...

Words: 788 - Pages: 4