Presentation is loading. Please wait.

Presentation is loading. Please wait.

CHAPTER 5 INTERNAL MEMORY

Similar presentations


Presentation on theme: "CHAPTER 5 INTERNAL MEMORY"— Presentation transcript:

1 CHAPTER 5 INTERNAL MEMORY
CSNB123 coMPUTER oRGANIZATION

2 Expected Course Outcome
# Course Outcome Coverage 1 Explain the concepts that underlie modern computer architecture, its evolution, functions and organization. 2 Identify the best organization of a computer for achieving the best performance when asked to make a selection from the current market. 3 Demonstrate the flow of an instruction cycle. 4 Differentiate types of memory components in terms of its technology and usage. 5 Convert integer and floating point numbers to its internal data representation. 6 Construct a series of computer instructions to perform low-level processor operations. 7 Explain the RISC and CISC computers, and single core and multi-core computers May2014 Systems and Networking

3 Systems and Networking
Objectives To study the types of semiconductor main memory subsystems RAM DRAM SRAM ROM Error correction May 2014 Systems and Networking

4 Recall: Chapter 4 – Common Memory Parameters
Memory Type Technology Size Access Time Cache Semiconductor RAM KB 10 ns Main Memory Semiconductor RAM 4-128 MB 50 ns Magnetic Disk Hard Disk Gigabyte 10 ms,10 MB/sec Optical Disk CD-ROM 300 ms, 600 KB/sec Tape 100s MB Sec-min.,10MB/min May 2014 Systems and Networking

5 Semiconductor Main Memory
Basic element of semiconductor main memory (smm) – memory cell Cell properties; 2 stable states – 0 and 1  binary Capable of being written to set the state Capable of being read to sense the state May 2014 Systems and Networking

6 Systems and Networking
Memory Cell Operation Write Read Functional Terminal - Capable of carrying an electrical signal Control Control Select Cell Data in Select Cell Sense May 2014 Systems and Networking

7 Three Functional Terminals
Select terminal – select memory cell for read or write operation Control terminal – indicates read or write Write – other terminal provides an electrical signal  sets the state of the cell to 1 or 0 Read – that terminal is used for output of the cell’s state May 2014 Systems and Networking

8 All memory types in this chapter are random access
Individual words of memory are directly accessed through wired-in addressing logic May 2014 Systems and Networking

9 Semiconductor Memory Types
Category Erasure Write Mechanism Volatility Random-access memory (RAM) Read-write memory Electrically, byte-level Electrically Volatile Read-only memory (ROM) Read-only memory Not possible Masks Nonvolatile Programmable ROM (PROM) Erasable PROM (EPROM) Read-mostly memory UV light, chip-level Electrically Erasable PROM (EEPROM) Flash memory Electrically, block-level May 2014 Systems and Networking

10 Systems and Networking
Semiconductor Memory All semiconductor memory is random access DRAM SRAM May 2014 Systems and Networking

11 Random Access Memory (RAM)
Characteristic Read/Write – read data from the memory and to write new data into the memory Use electrical signals Volatile – must have constant power supply else data lost. Temporary storage 2 traditional forms of RAM DRAM SRAM May 2014 Systems and Networking

12 Systems and Networking
Dynamic RAM (DRAM) Made with cells that store data as charge on capacitors The presence or absence of charge in a capacitor is interpreted as a binary 1 or 0 Capacitors have tendency of discharging - needs to periodically charge to maintain data storage The term dynamic refers to this tendency of the stored charge to leak away May 2014 Systems and Networking

13 Systems and Networking
DRAM Structure Figure 5.2 show a typical DRAM structure for an individual cell that stores 1 bit The address line is activated when the bit value from this cell is to be read or written The transistor acts as a switch that is closed (allowing the current to flow) if a voltage is applied to the address line If no current flows, the switch is open means no voltage is present on the address line. May 2014 Systems and Networking

14 Systems and Networking
DRAM Operation Write Read A voltage signal is applied to the bit line A high voltage represent 1, a low voltage represent 0 A signal is then applied to the address line allowing a charge to be transferred to the capacitor Select address line. The transistor turns on and the charge stored on the capacitor is fed out onto a bit line and to a sense amplifier The sense amplifier compares the capacitor voltage to a reference value and determines if the cell contains a logic 1 or logic 0 The readout from the cell discharges the capacitor which must be restored to complete the operation May 2014 Systems and Networking

15 Systems and Networking
DRAM (Cont.) Analog device Capacitor stores any charge value within a range Threshold value – determine whether the charge is interpreted as 0 or1 May 2014 Systems and Networking

16 Systems and Networking
Static RAM (SRAM) A digital device Use the same logic elements as in the processor The binary values are stored using traditional flip-flop logic gate configuration Data remains as long as power is supplied to it May 2014 Systems and Networking

17 Systems and Networking
SRAM Structure SRAM structure for an individual cell Four transistors (T1,T2,T3,T4) are cross connected in an arrangement that produces a stable logic state Logic state 1: C1 is high , C2 is low T1 ,T4 are off, T2,T3 are open Logic state 0: C1 is low, C2 is high T1,T4 are open, T2,T3 are off The SRAM address line is used to open/close a switch Controls two transistors (T5,T6) Apply signal to this line, T5,T6 are switched on, allowing read/write operation May 2014 Systems and Networking

18 Systems and Networking
SRAM Operation Read The bit value is read from line B Write The desired bit value is applied to line B Its complement is applied at line B May 2014 Systems and Networking

19 Systems and Networking
DRAM versus SRAM Volatile – need power to preserve data DRAM SRAM Simpler to build, smaller More dense Less expensive Needs refresh Larger memory units Use as main memory Faster Use as cache memory May 2014 Systems and Networking

20 Systems and Networking
Read Only Memory (ROM) Permanent storage Nonvolatile Use in Microprogramming Library subroutines Systems programs (BIOS) Function tables May 2014 Systems and Networking

21 Systems and Networking
Types of ROM ROM PROM EPROM EEPROM Flash memory May 2014 Systems and Networking

22 Systems and Networking
ROM Data is written during manufacture May 2014 Systems and Networking

23 PROM – Programmable ROM
Nonvolatile Written once Electrically – supplier or user Perform after fabrication Need special equipment to program May 2014 Systems and Networking

24 Systems and Networking
EPROM – Erasable PROM Read/write electrically Before a write operation, empty the cells by ultraviolet radiation The erase procedure can be performed repeatedly Expensive than PROM May 2014 Systems and Networking

25 Systems and Networking
Flash Memory Intermediate between EPROM and EEPROM; cost and functionality Use an electrical erasing tech; much faster than EEPROM Possible to erase just blocks of memory May 2014 Systems and Networking

26 EEPROM – Electrical EPROM
Can be written into at any time without erasing prior contents - updates bytes address Write operation is longer than read operation Nonvolatile and flexible in update using ordinary bus control May 2014 Systems and Networking

27 Systems and Networking
Chip Logic Each chip contains an array of memory cells The array is organized into W words of B bits each. Example : a 16 –Mbit chip could be organized as 1 M 16 words. ( word- is a fixed sized group of bits that are handled as a unit by the instruction set and/or hardware of the processor) May 2014 Systems and Networking

28 Systems and Networking
Chip Packaging An IC is mounted on a package There are pins used to connect to the outside word May 2014 Systems and Networking

29 Systems and Networking
Chip Packaging (Cont.) 8 –Mbit chip organization (1M x 8) The organization is treated as a one –word-per chip package. (word -16 bits=2 bytes) There are 32 pins , one of standard chip package May 2014 Systems and Networking

30 Systems and Networking
Chip Packaging - Pins Support the following signal lines Address of word being accessed For 1M words, a total of 1M (220) pins are needed , address A0-A19 The data to be read out-have 8 lines (D0-D7) The power supply to the chip (Vcc) A ground pin (Vss) A chip enable (CE) pin - indicate whether or not the address is valid for this chip A program voltage (Vpp) - supplied during programming (write op) May 2014 Systems and Networking

31 Systems and Networking
Interleaved Memory Advance technique used by high-end motherboards/chipsets to improve memory performance Increase bandwidth by allowing simultaneous access to more than one bank of memory Improves performance since CPU/processor can transfer more information to/from memory in the same amount of time, and helps ease the CPU-memory bottleneck May 2014 Systems and Networking

32 Systems and Networking
Error Correction May 2014 Systems and Networking

33 Systems and Networking
Errors A semiconductor memory is subject to errors. Categories; Hard failures Soft errors Example : power supply problem May 2014 Systems and Networking

34 Systems and Networking
Errors – Categories Hard Failures Soft Error A permanent physical defect so that the memory cells affected cannot reliably store data but become stuck at 0 or 1 A random, nondestructive event that alters the contents of one or more memory cells without damaging the memory May 2014 Systems and Networking

35 Process of Detecting and Correcting Errors
When data are to be read into memory, a calculation, function f is performed on the data to produce a code Both the code and the data are stored If M –bit word of data is to be stored and the code is of length K bits, then the actual size of the stored word is M + K bits May 2014 Systems and Networking

36 Process of Detecting and Correcting Errors (Cont.)
When the previous stored word is read out, the code is used to detect and possibly correct errors A new set of K code bits is generated from the M data bits and compared with the fetched code bits May 2014 Systems and Networking

37 Process of Detecting and Correcting Errors (Cont.)
Three results of the comparisons; No errors-the fetched data bits are sent out An error is detected-possible to correct, the data bits +error correction bits are fed out into a corrector, which produces a corrected set of M bits to be sent out An error is detected and connect be corrected, this condition is reported May 2014 Systems and Networking

38 Process of Detecting and Correcting Errors (Cont.)
The codes are referred as error-correcting codes A code is characterized by the number of bit errors in a word that it can correct and detect The simplest error-correcting codes is the Hamming code May 2014 Systems and Networking

39 Systems and Networking
Hamming Code Use to detect and correct one-bit change in an encoded code word Consider the table which has 15 positions. Data is represented (stored) in every position except 1, 2, 4 and 8. These positions are used to store parity (error correction) bits May 2014 Systems and Networking

40 Systems and Networking
Hamming Code (Cont.) Using the four parity (error correction bits) positions we can represent 15 values (1- 15) May 2014 Systems and Networking

41 Systems and Networking
Hamming Code (Cont.) Data is represented by the 11 non-parity bit Example: May 2014 Systems and Networking

42 Systems and Networking
Hamming Code (Cont.) After placing the data in the table, it is in positions 3, 6, 9, 10, 12, 14 and 15 we have a ‘1’ Using the previous conversion table we obtain the binary representation for each of these values May 2014 Systems and Networking

43 Systems and Networking
Hamming Code (Cont.) We then exclusive OR the resulting values (essentially setting the parity bit to 1 if an odd # of 1’s else setting it to 0 May 2014 Systems and Networking

44 Systems and Networking
Hamming Code (Cont.) The parity bits are then put in the proper locations in the table providing the following end result: This is the encoded code word that would be sent. The receiving side would re-compute the parity bits and compare them to the ones received. If they were the same no error occurred if they were different the location of the flipped bit is determined. May 2014 Systems and Networking

45 Systems and Networking
Hamming Code (Cont.) Assumed now bit at location 14 is flipped, 1 to 0, the calculation for parity is as below: May 2014 Systems and Networking

46 Systems and Networking
Hamming Code (Cont.) The re-calculated parity information is then compared to the parity information sent/received If they are both the same the result (again using an XOR – even parity) will be all 0’s May 2014 Systems and Networking

47 Systems and Networking
Hamming Code (Cont.) If a single bit was flipped the resulting number will the position of the errant bit (check back into table). For example: May 2014 Systems and Networking

48 Systems and Networking
Additional Reference William Stallings, Computer Organization and Architecture: Designing for Performance, 8th. Edition, Prentice-Hall Inc., 2010 May2014 Systems and Networking

49 This teaching material is belongs to Systems and Networking Department
College of Information Technology Universiti Tenaga Nasional (UNITEN) Malaysia 2014 May2014 Systems and Networking


Download ppt "CHAPTER 5 INTERNAL MEMORY"

Similar presentations


Ads by Google