Appendix B. Memory Hierarchy CSCI/ EENG – 641 - W01 Computer Architecture 1 Dr. Babak Beheshti Slides based on the PowerPoint Presentations created by.

Slides:



Advertisements
Similar presentations
Memory Hierarchy Design Adapted from CS 252 Spring 2006 UC Berkeley Copyright (C) 2006 UCB.
Advertisements

1 Lecture 13: Cache and Virtual Memroy Review Cache optimization approaches, cache miss classification, Adapted from UCB CS252 S01.
55:035 Computer Architecture and Organization Lecture 7 155:035 Computer Architecture and Organization.
Virtual Memory. Hierarchy Cache Memory : Provide invisible speedup to main memory.
Appendix C: Review of Memory Hierarchy David Patterson Electrical Engineering and Computer Sciences University of California, Berkeley
CPE 731 Advance Computer Architecture Memory Hierarchy Review Dr. Gheith Abandah Adapted from the slides of Prof. David Patterson, University of California,
CMSC 611: Advanced Computer Architecture Memory & Virtual Memory Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material.
Virtual Memory Hardware Support
1 Memory Systems Virtual Memory Lecture 25 Digital Design and Computer Architecture Harris & Harris Morgan Kaufmann / Elsevier, 2007.
Virtual Memory Adapted from lecture notes of Dr. Patterson and Dr. Kubiatowicz of UC Berkeley and Rabi Mahapatra & Hank Walker.
Technical University of Lodz Department of Microelectronics and Computer Science Elements of high performance microprocessor architecture Virtual memory.
CIS °The Five Classic Components of a Computer °Today’s Topics: Memory Hierarchy Cache Basics Cache Exercise (Many of this topic’s slides were.
Review of Memory Hierarchy (Appendix C)
©UCB CS 162 Ch 7: Virtual Memory LECTURE 13 Instructor: L.N. Bhuyan
03/22/2004CSCI 315 Operating Systems Design1 Virtual Memory Notice: The slides for this lecture have been largely based on those accompanying the textbook.
Virtual Memory BY JEMINI ISLAM. What is Virtual Memory Virtual memory is a memory management system that gives a computer the appearance of having more.
©UCB CS 161 Ch 7: Memory Hierarchy LECTURE 24 Instructor: L.N. Bhuyan
CMP 301A Computer Architecture 1 Lecture 4. Outline zVirtual memory y Terminology y Page Table y Translation Lookaside Buffer (TLB)
Seoul National University
Memory/Storage Architecture Lab 1 Virtualization History of Computing = History of Virtualization  e.g., process abstraction, virtual memory, cache memory,
Silberschatz, Galvin and Gagne  2002 Modified for CSCI 399, Royden, Operating System Concepts Operating Systems Lecture 34 Paging Implementation.
Memory Hierarchy Review. 2 Review from last lecture Quantify and summarize performance –Ratios, Geometric Mean, Multiplicative Standard Deviation F&P:
Memory Hierarchy. Since 1980, CPU has outpaced DRAM... CPU 60% per yr 2X in 1.5 yrs DRAM 9% per yr 2X in 10 yrs 10 DRAM CPU Performance (1/latency) 100.
IT253: Computer Organization
Lecture 5 Review of Memory Hierarchy (Appendix C in textbook)
CS 312 Computer Architecture Memory Basics Department of Computer Science Southern Illinois University Edwardsville Summer, 2015 Dr. Hiroshi Fujinoki
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wananga o te Upoko o te Ika a Maui COMP 203 / NWEN 201 Computer Organisation / Computer Architectures Virtual.
CSE 820 Advanced Computer Architecture Lec 4 – Memory Hierarchy Review Based on slides by David Patterson.
Ch7d- 2 EE/CS/CPE Computer Organization  Seattle Pacific University Individual Space Every process wants its own space Ideally, it would like.
EEL5708/Bölöni Lec 4.1 Fall 2004 September 10, 2004 Lotzi Bölöni EEL 5708 High Performance Computer Architecture Review: Memory Hierarchy.
Chapter 91 Logical Address in Paging  Page size always chosen as a power of 2.  Example: if 16 bit addresses are used and page size = 1K, we need 10.
4.3 Virtual Memory. Virtual memory  Want to run programs (code+stack+data) larger than available memory.  Overlays programmer divides program into pieces.
Multilevel Caches Microprocessors are getting faster and including a small high speed cache on the same chip.
Lecture 0. Course Introduction Prof. Taeweon Suh Computer Science Education Korea University COM515 Advanced Computer Architecture.
Summary of caches: The Principle of Locality: –Program likely to access a relatively small portion of the address space at any instant of time. Temporal.
COMPUTER SYSTEMS ARCHITECTURE A NETWORKING APPROACH CHAPTER 12 INTRODUCTION THE MEMORY HIERARCHY CS 147 Nathaniel Gilbert 1.
3/1/2002CSE Virtual Memory Virtual Memory CPU On-chip cache Off-chip cache DRAM memory Disk memory Note: Some of the material in this lecture are.
CS 5513 Computer Architecture Lecture 4 – Memory Hierarchy Review.
Memory Management memory hierarchy programs exhibit locality of reference - non-uniform reference patterns temporal locality - a program that references.
Silberschatz, Galvin and Gagne  2002 Modified for CSCI 399, Royden, Operating System Concepts Operating Systems Lecture 33 Paging Read Ch. 9.4.
Memory Management & Virtual Memory. Hierarchy Cache Memory : Provide invisible speedup to main memory.
COMP 3500 Introduction to Operating Systems Paging: Basic Method Dr. Xiao Qin Auburn University Slides.
CMSC 611: Advanced Computer Architecture Memory & Virtual Memory Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material.
CMSC 611: Advanced Computer Architecture
Vivek Seshadri 15740/18740 Computer Architecture
Virtual Memory Chapter 7.4.
Memory COMPUTER ARCHITECTURE
Since 1980, CPU has outpaced DRAM ...
Lecture Topics: 11/19 Paging Page tables Memory protection, validation
Memory Hierarchy Virtual Memory, Address Translation
Lec 3 – Memory Hierarchy Review
CS 286: Memory Paging and Virtual Memory
Sandeep K. S. Gupta Dept. CSE, ASU
Part V Memory System Design
CPSC 614 Computer Architecture Lec 6 – Memory Hierarchy Review
CMSC 611: Advanced Computer Architecture
CS 5513 Computer Architecture Lecture 4 – Memory Hierarchy Review
FIGURE 12-1 Memory Hierarchy
Chapter 6 Memory Linda Null, Julia Lobur.
Memory Systems CH008.
Memory Organization.
Horizontally Partitioned Hybrid Main Memory with PCM
TLB Performance Seung Ki Lee.
Computer System Design Lecture 11
Electrical and Computer Engineering
ECE 463/563 Fall `18 Memory Hierarchies, Cache Memories H&P: Appendix B and Chapter 2 Prof. Eric Rotenberg Fall 2018 ECE 463/563, Microprocessor Architecture,
Translation Lookaside Buffers
4.3 Virtual Memory.
Memory Management & Virtual Memory
Presentation transcript:

Appendix B. Memory Hierarchy CSCI/ EENG – W01 Computer Architecture 1 Dr. Babak Beheshti Slides based on the PowerPoint Presentations created by David Patterson as part of the Instructor Resources for the textbook by Hennessy & Patterson

2 Outline Memory hierarchy Locality Cache design Virtual address spaces Page table layout TLB (Translation Lookaside Buffers) design options

Since 1980, CPU has outpaced DRAM... CPU 60% per yr 2X in 1.5 yrs DRAM 9% per yr 2X in 10 yrs 10 DRAM CPU Performance (1/latency) Year Gap grew 50% per year Q. How do architects address this gap? A. Put smaller, faster “cache” memories between CPU and DRAM. Create a “memory hierarchy”.

1977: DRAM faster than microprocessors Apple ][ (1977) Steve Wozniak Steve Jobs CPU: 1000 ns DRAM: 400 ns

5 Levels of the Memory Hierarchy CPU Registers 100s Bytes <10s ns Cache K Bytes ns cents/bit Main Memory M Bytes 200ns- 500ns $ cents /bit Disk G Bytes, 10 ms (10,000,000 ns) cents/bit Capacity Access Time Cost Tape infinite sec-min Registers Cache Memory Disk Tape Instr. Operands Blocks Pages Files Staging Xfer Unit prog./compiler 1-8 bytes cache cntl bytes OS 512-4K bytes user/operator Mbytes Upper Level Lower Level faster Larger

Memory Hierarchy: Apple iMac G5 iMac G5 1.6 GHz 07 RegL1 InstL1 DataL2DRAMDisk Size 1K64K32K512K256M80G Latency Cycles, Time 1, 0.6 ns 3, 1.9 ns 3, 1.9 ns 11, 6.9 ns 88, 55 ns 10 7, 12 ms Let programs address a memory space that scales to the disk size, at a speed that is usually as fast as register access Managed by compiler Managed by hardware Managed by OS, hardware, application Goal: Illusion of large, fast, cheap memory

iMac’s PowerPC 970: All caches on-chip (1K) R eg ist er s 512K L2 L1 (64K Instruction) L1 (32K Data)

8 Outline Memory hierarchy Locality Cache design Virtual address spaces Page table layout TLB (Translation Lookaside Buffers) design options

9 The Principle of Locality The Principle of Locality: – Program access a relatively small portion of the address space at any instant of time. Two Different Types of Locality: – Temporal Locality (Locality in Time): If an item is referenced, it will tend to be referenced again soon (e.g., loops, reuse) – Spatial Locality (Locality in Space): If an item is referenced, items whose addresses are close by tend to be referenced soon (e.g., straightline code, array access) Last 15 years, HW relied on locality for speed It is a property of programs which is exploited in machine design.

Programs with locality cache well... Donald J. Hatfield, Jeanette Gerald: Program Restructuring for Virtual Memory. IBM Systems Journal 10(3): (1971) Time Memory Address (one dot per access) Spatial Locality Temporal Locality Bad locality behavior

11 Outline Memory hierarchy Locality Cache design Virtual address spaces Page table layout TLB (Translation Lookaside Buffers) design options

12 Memory Hierarchy: Terminology Hit: data appears in some block in the upper level (example: Block X) – Hit Rate: the fraction of memory access found in the upper level – Hit Time: Time to access the upper level which consists of RAM access time + Time to determine hit/miss Miss: data needs to be retrieve from a block in the lower level (Block Y) – Miss Rate = 1 - (Hit Rate) – Miss Penalty: Time to replace a block in the upper level + Time to deliver the block the processor Hit Time << Miss Penalty (500 instructions on 21264!) Lower Level Memory Upper Level Memory To Processor From Processor Blk X Blk Y

13 Cache Measures Hit rate: fraction found in that level – So high that usually talk about Miss rate – Miss rate fallacy: as MIPS to CPU performance, miss rate to average memory access time in memory Average memory-access time = Hit time + Miss rate x Miss penalty (ns or clocks) Miss penalty: time to replace a block from lower level, including time to replace in CPU – access time : time to lower level = f(latency to lower level) – transfer time : time to transfer block =f(BW between upper & lower levels)

Cache Performance Review (1/3) Memory Stall Cycles: the number of cycles during which the processor is stalled waiting for a memory access. Rewriting the CPU performance time The number of memory stall cycles depends on both the number of misses and the cost per miss, which is called the miss penalty: † The advantage of the last form is the component can be easily measured.

Cache Performance Review (2/3) Miss penalty depends on – Prior memory requests or memory refresh; – Different clocks of the processor, bus, and memory; – Thus, using miss penalty be a constant is a simplification. Miss rate: the fraction of cache access that result in a miss (i.e., number of accesses that miss divided by number of accesses). Extract formula for R/W † Simplify the complete formula by combining the R/W.

Example (1) Assume we have a computer where the clocks per instruction (CPI) is 1.0 when all memory accesses hit in the cache. The only data accesses are loads and stores, and these total 50% of the instructions. If the miss penalty is 25 clock cycles and the miss rate is 2%, how much faster would the computer be if all instructions were cache hits? Ans: First computer the performance for the computer that always hits: Now for the computer with the real cache, first we compute memory stall cycles: The total performance is thus The performance ratio is the inverse of the execution times:

Cache Performance Review (3/3) Usually, measuring miss rate as misses per instruction rather than misses per memory reference. For example, in the previous example into misses per instruction: † The latter formula is useful when you know the average number of memory accesses per instruction.

Example (2) To show equivalency between the two miss rate equations, let’s redo the example above, this time assuming a miss rate per 1000 instructions of 30. What is memory stall time in terms of instruction count? Answer Recomputing the memory stall cycles:

19 4 Questions for Memory Hierarchy Q1: Where can a block be placed in the upper level? (Block placement) Q2: How is a block found if it is in the upper level? (Block identification) Q3: Which block should be replaced on a miss? (Block replacement) Q4: What happens on a write? (Write strategy)

Q1: Where Can a Block be Placed in The Upper Level? Block Placement – Direct Mapped, Fully Associative, Set Associative Direct mapped: (Block number) mod (Number of blocks in cache) Set associative: (Block number) mod (Number of sets in cache) – # of set  # of blocks – n-way: n blocks in a set – 1-way = direct mapped Fully associative: # of set = 1 Block-frame address Block no Direct mapped: block 12 can go only into block 4 (12 mod 8) Block no. Set associative: block 12 can go anywhere in set 0 (12 mod 4) Set0 Block no. Set1 Set2 Set3 Fully associative: block 12 can go anywhere Block no

21 Q1: Where can a block be placed in the upper level? Block 12 placed in 8 block cache: – Fully associative, direct mapped, 2-way set associative – S.A. Mapping = Block Number Modulo Number Sets Cache Memory Full Mapped (Associative) Direct Mapped (12 mod 8) = 4 2-Way Assoc (12 mod 4) = 0

1 KB Direct Mapped Cache, 32B blocks For a 2 N byte cache – The uppermost (32 - N) bits are always the Cache Tag – The lowest M bits are the Byte Select (Block Size = 2 M ) Cache Index : Cache Data Byte : Cache TagExample: 0x50 Ex: 0x01 0x50 Stored as part of the cache “state” Valid Bit : 31 Byte 1Byte 31 : Byte 32Byte 33Byte 63 : Byte 992Byte 1023 : Cache Tag Byte Select Ex: 0x

Set Associative Cache N-way set associative: N entries for each Cache Index – N direct mapped caches operates in parallel Example: Two-way set associative cache – Cache Index selects a “set” from the cache; – The two tags in the set are compared to the input in parallel; – Data is selected based on the tag result.

Disadvantage of Set Associative Cache N-way Set Associative Cache versus Direct Mapped Cache: – N comparators vs. 1 – Extra MUX delay for the data – Data comes AFTER Hit/Miss decision and set selection In a direct mapped cache, Cache Block is available BEFORE Hit/Miss: – Possible to assume a hit and continue. Recover later if miss.

Q2: Block Identification Tag on each block – No need to check index or block offset Increasing associativity shrinks index, expands tag Block Offset Block Address IndexTag Cache size = Associativity × 2 index_size × 2 offest_size Set SelectData Select Fully Assoc. Direct Mapped

Example Cache Block SetWayMem Blocks that can reside in cache block 000M0, M1, M2, … M

Example

Q3: Which block should be replaced on a miss? Easy for Direct Mapped Set Associative or Fully Associative – Random – LRU (Least Recently Used) – First in, first out (FIFO) Associativity 2-way4-way8-way SizeLRURan.FIFOLRURan.FIFOLRURan.FIFO 16KB KB KB Data Cache misses per 1000 instructions

Q3: After a cache read miss, if there are no empty cache blocks, which block should be removed from the cache? A randomly chosen block? Easy to implement, how well does it work? The Least Recently Used (LRU) block? Appealing, but hard to implement for high associativity Miss Rate for 2-way Set Associative Cache Also, try other LRU approx. SizeRandomLRU 16 KB 5.7%5.2% 64 KB 2.0%1.9% 256 KB 1.17%1.15% 31

Q4: What happens on a write? Write-ThroughWrite-Back Policy Data written to cache block also written to lower- level memory Write data only to the cache Update lower level when a block falls out of the cache DebugEasyHard Do read misses produce writes? NoYes Do repeated writes make it to lower level? YesNo Additional option -- let writes to an un-cached address allocate a new cache line (“write-allocate”). 32

Write Buffers for Write-Through Caches Q. Why a write buffer ? Processor Cache Write Buffer Lower Level Memory Holds data awaiting write-through to lower level memory A. So CPU doesn’t stall Q. Why a buffer, why not just one register ? A. Bursts of writes are common. Q. Are Read After Write (RAW) hazards an issue for write buffer? A. Yes! Drain buffer before next read, or send read 1 st after check write buffers.

Write Miss Policy Another factor distinguishing caches is its write policy. There are two basic options when writing to the cache: write- through and write-back. When the information is written to both the block in the cache as well as the block in the lower-level memory, then the cache is said to be write-through. If the information is written only to the block in the cache, the cache is said to be write-back. – Block stay out of the cache in no-write allocate until the program tries to read the blocks, but with write allocate, even blocks that are only written will still be in the cache. – The modified cache block is written to main memory only when it is replaced. To reduce the frequency of writing back blocks on replacement, “dirty bit”s are used. It indicates whether the block in cache has been modified or not. If it is clean then there is no need to write it back to the next lower level memory.

Write-Miss Policy Example Example: Assume a fully associative write-back cache with many cache entries that starts empty. Below is sequence of five memory operations (The address is in square brackets): Write Mem[100]; Read Mem[200]; Write Mem[200]; Write Mem[100]. What are the number of hits and misses (inclusive reads and writes) when using no- write allocate versus write allocate? Answer No-write Allocate: Write allocate: Write Mem[100]; 1 write miss Write Mem[100]; 1 write miss Write Mem[100]; 1 write miss Write Mem[100]; 1 write hit Read Mem[200]; 1 read miss Read Mem[200]; 1 read miss Write Mem[200]; 1 write hit Write Mem[200]; 1 write hit Write Mem[100]. 1 write miss Write Mem[100]; 1 write hit 4 misses; 1 hit 2 misses; 3 hits

36 5 Basic Cache Optimizations Reducing Miss Rate 1.Larger Block size (compulsory misses) 2.Larger Cache size (capacity misses) 3.Higher Associativity (conflict misses) Reducing Miss Penalty 4.Multilevel Caches Reducing hit time 5.Giving Reads Priority over Writes E.g., Read complete before earlier writes in write buffer

37 Outline Memory hierarchy Locality Cache design Virtual address spaces Page table layout TLB (Translation Lookaside Buffers) design options

The Limits of Physical Addressing CPU Memory A0-A31 D0-D31 “Physical addresses” of memory locations Data All programs share one address space: The physical address space No way to prevent a program from accessing any machine resource Machine language programs must be aware of the machine organization 38

Solution: Add a Layer of Indirection CPU Memory A0-A31 D0-D31 Data User programs run in an standardized virtual address space Address Translation hardware managed by the operating system (OS) maps virtual address to physical memory “Physical Addresses” Address Translation VirtualPhysical “Virtual Addresses” Hardware supports “modern” OS features: Protection, Translation, Sharing 39

40 Three Advantages of Virtual Memory Translation: – Program can be given consistent view of memory, even though physical memory is scrambled – Makes multithreading reasonable (now used a lot!) – Only the most important part of program (“Working Set”) must be in physical memory. – Contiguous structures (like stacks) use only as much physical memory as necessary yet still grow later. Protection: – Different threads (or processes) protected from each other. – Different pages can be given special behavior (Read Only, Invisible to user programs, etc). – Kernel data protected from User programs – Very important for protection from malicious programs Sharing: – Can map same physical page to multiple users (“Shared memory”)

Page tables encode virtual address spaces A machine usually supports pages of a few sizes (MIPS R4000): A valid page table entry codes physical memory “frame” address for the page A virtual address space is divided into blocks of memory called pages Physical Address Space Virtual Address Space frame 41

Page tables encode virtual address spaces A machine usually supports pages of a few sizes (MIPS R4000): Physical Memory Space A valid page table entry codes physical memory “frame” address for the page A virtual address space is divided into blocks of memory called pages frame A page table is indexed by a virtual address Page Table OS manages the page table for each ASID

43 Outline Memory hierarchy Locality Cache design Virtual address spaces Page table layout TLB (Translation Lookaside Buffers) design options

44 Physical Memory Space Page table maps virtual page numbers to physical frames ( “PTE” = Page Table Entry) Virtual memory => treat memory  cache for disk Details of Page Table Virtual Address Page Table index into page table Page Table Base Reg V Access Rights PA V page no.offset 12 table located in physical memory P page no.offset 12 Physical Address frame virtual address Page Table

Page tables may not fit in memory! A table for 4KB pages for a 32-bit address space has 1M entries Each process needs its own address space! P1 indexP2 indexPage Offset bit virtual address Top-level table wired in main memory Subset of 1024 second-level tables in main memory; rest are on disk or unallocated Two-level Page Tables

VM and Disk: Page replacement policy... Page Table 1 0 useddirty Set of all pages in Memory Tail pointer: Clear the used bit in the page table Head pointer Place pages on free list if used bit is still clear. Schedule pages with dirty bit set to be written to disk. Freelist Free Pages Dirty bit: page written. Used bit: set to 1 on any reference Architect’s role: support setting dirty and used bits

47 Outline Memory hierarchy Locality Cache design Virtual address spaces Page table layout TLB (Translation Lookaside Buffers) design options

MIPS Address Translation: How does it work? “Physical Addresses” CPU Memory A0-A31 D0-D31 Data TLB also contains protection bits for virtual address Virtual Physical “Virtual Addresses” Translation Look-Aside Buffer (TLB) Translation Look-Aside Buffer (TLB) A small fully-associative cache of mappings from virtual to physical addresses Fast common case: Virtual address is in TLB, process has permission to read/write it. What is the table of mappings that it caches?

V=0 pages either reside on disk or have not yet been allocated. OS handles V=0 “Page fault” Physical and virtual pages must be the same size! The TLB caches page table entries TLB Page Table virtual address page off 2 framepage 2 50 physical address page off TLB caches page table entries. MIPS handles TLB misses in software (random replacement). Other machines use hardware. for ASID Physical frame address

Can TLB and caching be overlapped? Index Byte Select ValidCache TagsCache Data Data out Virtual Page NumberPage Offset Translation Look-Aside Buffer (TLB) Virtual Physical = Hit Cache Tag This works, but... Q. What is the downside? A. Inflexibility. Size of cache limited by page size. Cache Block

51 Problems With Overlapped TLB Access Overlapped access only works as long as the address bits used to index into the cache do not change as the result of VA translation This usually limits things to small caches, large page sizes, or high n-way set associative caches if you want a large cache Example: suppose everything the same except that the cache is increased to 8 K bytes instead of 4 K: virt page #disp cache index This bit is changed by VA translation, but is needed for cache lookup Solutions: go to 8K byte page sizes; go to 2 way set associative cache; or SW guarantee VA[13]=PA[13] 1K way set assoc cache

Use virtual addresses for cache? “Physical Addresses” CPU Main Memory A0-A31 D0-D31 Only use TLB on a cache miss ! Translation Look-Aside Buffer (TLB) Virtual Physical “Virtual Addresses” A. Synonym problem. If two address spaces share a physical frame, data may be in cache twice. Maintaining consistency is a nightmare. Cache Virtual D0-D31 Downside: a subtle, fatal problem. What is it?

53 Outline Memory hierarchy Locality Cache design Virtual address spaces Page table layout TLB (Translation Lookaside Buffers) design options

54 Summary #1/3: The Cache Design Space Several interacting dimensions – cache size – block size – associativity – replacement policy – write-through vs write-back – write allocation The optimal choice is a compromise – depends on access characteristics workload use (I-cache, D-cache, TLB) – depends on technology / cost Simplicity often wins Associativity Cache Size Block Size Bad Good LessMore Factor AFactor B

55 Summary #2/3: Caches The Principle of Locality: – Program access a relatively small portion of the address space at any instant of time. Temporal Locality: Locality in Time Spatial Locality: Locality in Space Three Major Categories of Cache Misses: – Compulsory Misses: sad facts of life. Example: cold start misses. – Capacity Misses: increase cache size – Conflict Misses: increase cache size and/or associativity. Nightmare Scenario: ping pong effect! Write Policy: Write Through vs. Write Back Today CPU time is a function of (ops, cache misses) vs. just f(ops): affects Compilers, Data structures, and Algorithms

56 Summary #3/3: TLB, Virtual Memory Page tables map virtual address to physical address TLBs are important for fast translation TLB misses are significant in processor performance – funny times, as most systems can’t access all of 2nd level cache without TLB misses! Caches, TLBs, Virtual Memory all understood by examining how they deal with 4 questions: 1) Where can block be placed? 2) How is block found? 3) What block is replaced on miss? 4) How are writes handled? Today VM allows many processes to share single memory without having to swap all processes to disk; today VM protection is more important than memory hierarchy benefits, but computers insecure Prepare for debate + quiz on Wednesday