Memory Hierarchy: Understanding the Different Types of Computer Memory (176 characters)

Memory Hierarchy: Understanding the Different Types of Computer Memory (176 characters)
paly

Memory Hierarchy, Main Memory, External Memory, Hard Disk, Access Speed

  • Uploaded on | 3 Views
  • margret margret

About Memory Hierarchy: Understanding the Different Types of Computer Memory (176 characters)

PowerPoint presentation about 'Memory Hierarchy: Understanding the Different Types of Computer Memory (176 characters)'. This presentation describes the topic on Memory Hierarchy, Main Memory, External Memory, Hard Disk, Access Speed. The key topics included in this slideshow are This article explains the different types of computer memory, including main memory and external memory. It also discusses their storage capacity, access speed, and how they are used during computer processing,. Download this presentation absolutely free.

Presentation Transcript


1. 1 Exceptions, Interrupts & Traps Operating System Hebrew University Spring 2007

2. 2 Memory Hierarchy Main Memory - located on chips inside the system unit. The program instructions and the processes data are kept in main memory during computer works. External Memory - disk. Information stored on a disk is not deleted when the computer turned off. The main memory has less storage capacity than the hard disk. The hard disk can write and read information to and from the main memory. The access speed of main memory is much faster than a hard disk. Programs are stored on the disk until they are loaded into memory, and then use the disk as both the source and destination of the information for their processing.

3. 3 Typical Memory Hierarchy

4. Control Flow inst 1 inst 2 inst 3 inst n Computers Do Only One Thing From startup to shutdown, a CPU simply reads and executes (interprets) a sequence of instructions, one at a time. This sequence is the systems physical control flow Time

5. Altering the Control Flow Up to now: two mechanisms for changing control flow: Jumps and branches - react to changes in program state Call and return using the stack discipline - react to pgm state Insufficient for a useful system Difficult for the CPU to react to other changes in system state. Data arrives from a disk or a network adapter. Instruction divides by zero User hits ctl-c at the keyboard System needs mechanisms for exceptional control flow

6. Exceptional Control Flow Mechanisms for exceptional control flow exists at all levels of a computer system. Low level Mechanism Exceptions change in control flow in response to a system event (i.e., change in system state) Combination of hardware and OS software Higher Level Mechanisms Process context switch Signals Nonlocal jumps (setjmp/longjmp) Implemented by either: OS software or C language runtime libraries.

7. 7 Definitions When the CPU is in kernel mode , it is assumed to be executing trusted software, and thus it can execute any instructions and reference any memory addresses. The kernel is the core of the operating system and it has complete control over everything that occurs in the system. The kernel is trusted software, but all other programs are considered untrusted software. A system call is a request to the kernel in a Unix-like operating system by an active process for a service performed by the kernel.

8. 8 More Definitions A process is an executing instance of a program. An active process is a process that is currently advancing in the CPU (while other processes are waiting in memory for their turns to use the CPU). Input/output (I/O) is any program, operation or device that transfers data to or from the CPU and to or from a peripheral device (such as disk drives, keyboards, mice and printers). Processes in kernel mode can be interrupted by an interrupt or an exception .

12. 12 More Definitions An interrupt is a signal to the operating system indicating that an event has occurred, and it results in changes in the sequence of instructions that is executed by the CPU. In the case of a hardware interrupt , the signal originates from a hardware device such as a keyboard (i.e., when a user presses a key), mouse or system clock (used to coordinate the computer's activities). A software interrupt is an interrupt that originates in software, usually triggered by a program in user mode. All processes initially execute in user mode, and they switch to kernel mode only when obtaining a service provided by the kernel.

13. 13 More Definitions User mode is a non-privileged mode in which it is forbidden for processes in this mode to access those portions of memory that have been allocated to the kernel or to other programs. When a user mode process wants to use a service that is provided by the kernel, it must switch temporarily into kernel mode. Process in kernel mode has root (i.e., administrative) privileges and access to key system resources. The entire kernel, which is not a process but a controller of processes, executes only in kernel mode. When the kernel has satisfied the request by a process, it returns the process to user mode.

15. 15 Interrupts - Motivation Much of the functionality embedded inside a personal computer is implemented by hardware devices other than the processor. Since each device operates at its own pace, a method is needed for synchronizing the operation of the processor with these devices. One solution is for the processor to sit in a tight loop, asking each device about its current state. When data is available in one of the devices, the processor can then read and process the incoming bytes.

16. 16 Interrupts - Motivation This method works but it has two main disadvantages: 1. Wasteful in terms of processing power - the processor is constantly busy reading the status of the attached devices instead of executing some useful code. 2. When the rate of data transfer is extremely high, the processor might lose data bytes arriving from the hardware devices.

17. 17 Hardware Interrupts Instead of polling hardware devices to wait for their response, each device is responsible for notifying the processor about its current state. When a hardware device needs the processor's attention, it simply sends an electrical signal (hardware interrupt) through a dedicated pin in the interrupt controller chip (located on the computer's motherboard).

18. 18 Software Interrupts Most of these interrupts are synchronous rather than asynchronous. They are generated by the processor itself as a result of some command.

19. 19 Signals Signals that come from outside the process are asynchronous software interrupts. A process can install handlers to take special action when a signal arrives. Signals are defined and handled entirely through software. For example: A user at a terminal typing the interrupt key to stop a program (^C). Signal causes: User press certain terminal key Exception (for example: invalid memory reference) The kill function

20. 20 Exceptions Exceptions - special type of software interrupts. They are generated by the processor itself whenever some unexpected critical event occurs. For instance, a page fault exception is triggered when the processor attempts to access memory portion, which is marked as not-present. The exception handler can then reload this memory portion (page) from disk and restart the instruction which generated the exception.

21. 21 Exceptions Cont. Three types of exceptions can be generated by the processor: Faults Traps Aborts

22. 22 Fault When a fault exception occurs, the registers point to the address of the instruction, which generated the exception. This gives the exception handler a chance to fix the condition which caused the exception to occur, before restarting the faulting instruction. The program is restarted at the address of the fault.

23. 23 Fault Example A program requests data that is not currently in real memory. An interrupt triggers the operating system to fetch the data from the disk and load it into main memory. The program gets its data without even know that an exception has occurred. The program continue with the same instruction.

24. 24 Trap The execution of an instruction that intended for user programs and transfers control to the operating system. Trap causes branch to OS code and a switch to kernel mode . When in kernel mode, a trap handler is executed to service the request. Restarted at the address following the address causing the trap. Example: any System Call.

25. 25 Abort Aborts neglect to specify the location of the faulting instruction, since they are used to indicate severe errors (such as hardware errors) which are not recoverable. Give no reliable restart address. Examples: Divide by zero Access to unallocated memory, a segmentation fault.

26. 26 Hardware Interrupts Ideally, to perform multiple tasks (e.g., run the program, service the display, service the keyboard etc.) we would employ multiple processors. Alternatively we can allow the CPU to split its time between the main tasks and handling requests as they occur. If done efficiently, then conceptually the CPU is performing all tasks simultaneously

27. 27 Dealing with Interrupts Combination of hardware & software is necessary to deal with interrupts: hardware chooses time to interrupt the program and transfer control. software in the form of the handler to deal with the interrupt.

28. 28 The Handler Determined by the cause that generated the interrupt and determines how it should be dealt with (e.g., an input device has some data ready). Must preserve the state of the previously running program. Should be fast so minimal (none?) impact on previously running program.

29. 29 The Interrupt Controller The interrupt controller serves as an intermediate between the hardware devices and the processor. Its responsibility is to alert the processor when one of the hardware devices needs its immediate attention. In this case, the processor stops its current activity and jumps to execute a function (interrupt handler) which was previously associated with the calling device.

30. 30 Hardware Interrupt Causes Caused by an external event which typically needs routine attention. For example: Disk drive has data that was requested 20 ms ago. User pressed a key on the keyboard. User sneezed, causing mouse to move. Timer (used by the OS as an alarm clock) expired.

31. 31 Example add r1, r2, r3 sub r4, r5, r6 xor r7, r8, r9 As execution reaches code above, achoooo (user sneezes) m oving mouse triggering an interrupt. Based on time of sneeze (in the middle of sub), hardware completes add and sub, but squashes xor (for now). The handler starts: The screen pointer (the little arrow) is moved The handler finishes Execution resumes with xor.

32. Exceptions An exception is a transfer of control to the OS in response to some event (i.e., change in processor state) User Process OS exception exception processing by exception handler exception return (optional) event current next

33. Interrupt Vectors Each type of event has a unique exception number k Index into jump table (a.k.a., interrupt vector) Jump table entry k points to a function (exception handler). Handler k is called each time exception k occurs. interrupt vector 0 1 2 ... n-1 code for exception handler 0 code for exception handler 0 code for exception handler 1 code for exception handler 1 code for exception handler 2 code for exception handler 2 code for exception handler n-1 code for exception handler n-1 ... Exception numbers

34. 34 The basic mechanism 1. Getting the interrupt 2. Transfer control 3. Saving current status 4. The request is serviced 5. Previous state is restored 6. Return control

35. 35 Getting the Interrupt External event interrupts the main program execution. An electronic signal is provided to the processor - indicating the need to handle an interrupt request. This signal is only recognized at the end of the instruction cycle loop (after the current instruction has been processed, but before the next instruction is "fetched" from memory).

36. 36 Transfer control Control is transferred to a different "program" the kernel Switching to kernel mode

37. 37 Saving Current Status Before an interrupt can be serviced, the processor must save its current status. Servicing an interrupt is like performing a subroutine call. One of the most critical pieces of information that must be saved is the value of the Program Counter (i.e. the location of the next instruction to be performed after servicing of the interrupt is complete). Processing an interrupt request involves performing a series of instructions for that request. This tends to modify the contents of registers, so the registers also need to be saved.

38. 38 The Request is Serviced The processor needs to check which device sent the interrupt request. The processor determine where to find the necessary instructions needed to service that specific request (typically handled using a " interrupt vector" which contains interrupt device numbers and the addresses of service subroutines for each interrupt number). The interrupt vector is stored at a predefined memory location The handler address is found using the interrupt number as an index into the interrupt vector

39. 39 Previous State is Restored As a final step in each service routine, all register values, including the Program Counter, must be restored to their original values as they were just before the interrupt occurred.

40. 40 Return control Control is returned to the interrupted program The next instruction is pointed by the program counter Back to user mode!