Memory and Disk Systems – Speed: » Registers > Cache > RAM > Hard Disk > Optical Storages
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
United States Patent (10) Patent N0.: US 7,290,102 B2 Lubbers Et A]
US007290102B2 (12) United States Patent (10) Patent N0.: US 7,290,102 B2 Lubbers et a]. (45) Date of Patent: Oct. 30, 2007 (54) POINT IN TIME STORAGE COPY 5,184,281 A 2/1993 Samarov et al. 5,513,314 A 4/1996 Kandasamy et al. (75) Inventors: Clark E. Lubbers, Colorado Springs, 5,815,371 A 9/ 1998 Jeiffies et a1~ CO (US); James M. Reiser, Colorado 5,815,649 A 9/1998 Utter et al' Springs’ CO (Us); Anuja Korgaonkars 5,822,777 A 10/1998 Les-hem et al. Colorado Springs CO Randy L 5,832,222 A 11/1998 DZladosZ et al. Roberson New £30m Richeg/ FL (US)_' 5,835,700 A 11/1998 Carbonneau et al. ’ ’ ’ 5,923,876 A 7/1999 Teague Robert G- Bean, Monument, CO (Us) 5,987,622 A 11/1999 L0 Verso et al. 5,996,089 A 11/1999 Mann et a1. (73) Assignee: Hewlett-Packard Development 6,033,639 A 3/2000 Schmidt et a1, Company, LP, Houston, TX (US) (Continued) ( * ) Notice: Subject to any disclaimer, the term of this patent is extended or adjusted under 35 OTHER PUBLICATIONS U-S-C- 154(1)) by 360 days- Smart Storage Inc., “SmartStor In?NetTM; Virtual Storage for Today’s E-economy,” Sep. 2000. (21) Appl. N0.: 11/081,061 _ (Contlnued) (22) Filed: Mar‘ 15’ 2005 Primary ExaminerAiary Portka (65) Prior Publication Data (57) ABSTRACT US 2005/0160243 A1 Jul. 21, 2005 A storage system permits Virtual storage of user data by Related US. Application Data implementing a logical disk mapping structure that provides (63) Continuation of application NO‘ 10/080 961 ?led on access to user data stored on physical storage media and Oct 22 2001 HOW Pat NO 6 915 392 Winch is a methods for generating point-in-time copies, or snapshots, con?nue’ltion_il’l_ an of 2'‘ li'cat’ion ’NO ’09/872 597 of logical disks. -
Cortex-A9 Single Core Microarchitecture
Bryant and O’Hallaron, Computer Systems: A Programmer’s Perspective, Third Edition 18-600 Foundations of Computer Systems Lecture 10: “The Memory Hierarchy” John P. Shen & Gregory Kesden October 2, 2017 ➢ Required Reading Assignment: • Chapter 6 of CS:APP (3rd edition) by Randy Bryant & Dave O’Hallaron ➢ Recommended Reference: • Sec. 1 & Sec. 3: Bruce Jacob, “The Memory System: You Can't Avoid It, You Can't Ignore It, You Can't Fake It,” Synthesis Lectures on Computer Architecture 2009. 10/02/2017 (© John Shen) 18-600 Lecture #10 1 18-600 Foundations of Computer Systems Lecture 10: “The Memory Hierarchy” A. Memory Technologies B. Main Memory Implementation a. DRAM Organization b. DRAM Operation c. Memory Controller C. Disk Storage Technologies 10/02/2017 (© John Shen) 18-600 Lecture #10 2 From Lec #9 … Bryant and O’Hallaron, Computer Systems: A Programmer’s Perspective, Third Edition Three Flow Paths of Superscalar Processors ➢ Wide Instruction Fetching ➢ Dynamic Branch Prediction I-cache Branch Instruction FETCH Flow Predictor Instruction ➢ Register Renaming Buffer ➢ Dynamic Scheduling DECODE ➢ Load Bypassing & Forwarding ➢ Speculative Memory Disamb. DISPATCH Integer Floating-point Media Memory Reservation Stations Memory Data EXECUTE Flow Reorder Buffer Register (ROB) Data COMMIT Flow Store D-cache Queue 10/02/2017 (© John Shen) 18-600 Lecture #10 3 From Lec #9 … Bryant and O’Hallaron, Computer Systems: A Programmer’s Perspective, Third Edition Integrating Map Table with the ARF 9/27/2017 (©J.P. Shen) 18-600 Lecture #9 4 From Lec #9 … Bryant and O’Hallaron, Computer Systems: A Programmer’s Perspective, Third Edition Reservation Station Implementation + info for executing instruction (opcode, ROB entry, RRF entry…) • Reservation Stations: distributed vs. -
Archiving Online Data to Optical Disk
ARCHIVING ONLINE DATA TO OPTICAL DISK By J. L. Porter, J. L. Kiesler, and D. A. Stedfast U.S. GEOLOGICAL SURVEY Open-File Report 90-575 Reston, Virginia 1990 U.S. DEPARTMENT OF THE INTERIOR MANUEL LUJAN, JR., Secretary U.S. GEOLOGICAL SURVEY Dallas L. Peck, Director For additional information Copies of this report can be write to: purchased from: Chief, Distributed Information System U.S. Geological Survey U.S. Geological Survey Books and Open-File Reports Section Mail Stop 445 Federal Center, Bldg. 810 12201 Sunrise Valley Drive Box 25425 Reston, Virginia 22092 Denver, Colorado 80225 CONTENTS Page Abstract ............................................................. 1 Introduction ......................................................... 2 Types of optical storage ............................................... 2 Storage media costs and alternative media used for data archival. ......... 3 Comparisons of storage media ......................................... 3 Magnetic compared to optical media ............................... 3 Compact disk read-only memory compared to write-once/read many media ................................... 6 Erasable compared to write-once/read many media ................. 7 Paper and microfiche compared to optical media .................... 8 Advantages of write-once/read-many optical storage ..................... 8 Archival procedure and results ........................................ 9 Summary ........................................................... 13 References .......................................................... -
Computer Files & Data Storage
STORAGE & FILE CONCEPTS, UTILITIES (Pages 6, 150-158 - Discovering Computers & Microsoft Office 2010) I. Computer files – data, information or instructions residing on secondary storage are stored in the form of a file. A. Software files are also called program files. Program files (instructions) are created by a computer programmer and generally cannot be modified by a user. It’s important that we not move or delete program files because your computer requires them to perform operations. Program files are also referred to as “executables”. 1. You can identify a program file by its extension:“.EXE”, “.COM”, “.BAT”, “.DLL”, “.SYS”, or “.INI” (there are others) or a distinct program icon. B. Data files - when you select a “save” option while using an application program, you are in essence creating a data file. Users create data files. 1. File naming conventions refer to the guidelines followed while assigning file names and will vary with the operating system and application in use (see figure 4-1). File names in Windows 7 may be up to 255 characters, you're not allowed to use reserved characters or certain reserved words. File extensions are used to identify the application that was used to create the file and format data in a manner recognized by the source application used to create it. FALL 2012 1 II. Selecting secondary storage media A. There are three type of technologies for storage devices: magnetic, optical, & solid state, there are advantages & disadvantages between them. When selecting a secondary storage device, certain factors should be considered: 1. Capacity - the capacity of computer storage is expressed in bytes. -
Design and Test of Embedded Srams Andrei S. Pavlov
Design and Test of Embedded SRAMs by Andrei S. Pavlov A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Doctor of Philosophy in Electrical and Computer Engineering Waterloo, Ontario, Canada, 2005 c Andrei S. Pavlov 2005 I hereby declare that I am the sole author of this thesis. I authorize the University of Waterloo to lend this thesis to other institutions or individuals for the purpose of scholarly research. Andrei S. Pavlov I further authorize the University of Waterloo to reproduce this thesis by photocopying or other means, in total or in part, at the request of other institutions or individuals for the purpose of scholarly research. Andrei S. Pavlov ii Abstract Embedded SRAMs can occupy the majority of the chip area in SoCs. The increased process spreads of modern scaled-down technologies and non-catastrophic defect-related sensitivity to environmental parameters can compromise the stability of SRAM cells, which is quantified by a low Static Noise Margin (SNM). A Stability Fault (SF) can present itself in a cell whose SNM is so small that it can accidentally flip in the worst-case operating conditions. In this work, we conduct a comprehensive SRAM SNM sensitivity analysis and identify the major factors causing low SNM. Based on this study, we propose a Weak Cell Fault Model, which can be used in fault simulations to mimic an SRAM cell with a compromised SNM. Furthermore, we have derived an analytical expression for the SNM of the recently proposed loadless 4T SRAM cell. Reading a 6T SRAM cell with bit lines precharged to VDD may not detect several types of defects in the pull-up path of the cell. -
Memory Hierarchy Summary
Carnegie Mellon Carnegie Mellon Today DRAM as building block for main memory The Memory Hierarchy Locality of reference Caching in the memory hierarchy Storage technologies and trends 15‐213 / 18‐213: Introduction to Computer Systems 10th Lecture, Feb 14, 2013 Instructors: Seth Copen Goldstein, Anthony Rowe, Greg Kesden 1 2 Carnegie Mellon Carnegie Mellon Byte‐Oriented Memory Organization Simple Memory Addressing Modes Normal (R) Mem[Reg[R]] • • • . Register R specifies memory address . Aha! Pointer dereferencing in C Programs refer to data by address movl (%ecx),%eax . Conceptually, envision it as a very large array of bytes . In reality, it’s not, but can think of it that way . An address is like an index into that array Displacement D(R) Mem[Reg[R]+D] . and, a pointer variable stores an address . Register R specifies start of memory region . Constant displacement D specifies offset Note: system provides private address spaces to each “process” . Think of a process as a program being executed movl 8(%ebp),%edx . So, a program can clobber its own data, but not that of others nd th From 2 lecture 3 From 5 lecture 4 Carnegie Mellon Carnegie Mellon Traditional Bus Structure Connecting Memory Read Transaction (1) CPU and Memory CPU places address A on the memory bus. A bus is a collection of parallel wires that carry address, data, and control signals. Buses are typically shared by multiple devices. Register file Load operation: movl A, %eax ALU %eax CPU chip Main memory Register file I/O bridge A 0 Bus interface ALU x A System bus Memory bus I/O Main Bus interface bridge memory 5 6 Carnegie Mellon Carnegie Mellon Memory Read Transaction (2) Memory Read Transaction (3) Main memory reads A from the memory bus, retrieves CPU read word xfrom the bus and copies it into register word x, and places it on the bus. -
Memory and Storage Systems
CHAPTER 3 MEMORY AND STORAGE SYSTEMS Chapter Outline Chapter Objectives 3.1 Introduction In this chapter, we will learn: 3.2 Memory Representation ∑ The concept of memory and its 3.3 Random Access Memory representation. 3.3.1 Static RAM ∑ How data is stored in Random Access 3.3.2 Dynamic RAM Memory (RAM) and the various types of 3.4 Read Only Memory RAM. 3.4.1 Programmable ROM ∑ How data is stored in Read Only Memory 3.4.2 Erasable PROM (ROM) and the various types of ROM. 3.4.3 Electrically Erasable PROM ∑ The concept of storage systems and the 3.4.4 Flash ROM various types of storage systems. 3.5 Storage Systems ∑ The criteria for evaluating storage 3.6 Magnetic Storage Systems systems. 3.6.1 Magnetic Tapes 3.6.2 Magnetic Disks 3.7 Optical Storage Systems 3.1 INTRODUCTION 3.7.1 Read only Optical Disks 3.7.2 Write Once, Read Many Disks Computers are used not only for processing of data 3.8 Magneto Optical Systems for immediate use, but also for storing of large 3.8.1 Principle used in Recording Data volume of data for future use. In order to meet 3.8.2 Architecture of Magneto Optical Disks these two specifi c requirements, computers use two 3.9 Solid-State Storage Devices types of storage locations—one, for storing the data 3.9.1 Structure of SSD that are being currently handled by the CPU and the 3.9.2 Advantages of SSD other, for storing the results and the data for future 3.9.3 Disadvantages of SSD use. -
Storage Media
Storage media This is a sample chapter from the forthcoming book, Files that Last, by Gary McGath. Copyright 2012 by Gary McGath, all rights reserved. Say see you later to your data And sing an ode to dead code. Any drive can make you hate her When a backup is owed. Bill Roper, “Hard Drive Calypso” Files are no more durable than the media they are stored on. What’s the best alternative if you’re concerned with longevity: tape, hard drive, flash, DVD, or something else? There isn’t a clear answer, since each one has its own strengths and weaknesses, but some are better than others, and you can get good material or cheap junk in any medium. Whatever you choose, care and storage can make a big difference to its lifespan. Sometimes you’re on the receiving end of legacy files, and you have to deal with the medium they’re on. In addition to current and upcoming media, this chapter looks at some of the older formats and their issues. Compact discs Compact discs (CDs) and their high-density relatives, digital video discs (DVDs) and Blu-Ray, are often a good choice for archiving. (These are always “discs,” not “disks.”) They’re optical storage media, written and read by lasers. They’re strictly passive objects, with no moving parts to fail, and they aren’t susceptible to magnetic fields, so they can last quite a while. They’ve been common for a long time now, so it should be fairly easy to get drives for them for the next couple of decades. -
Preservation Management of Digital Materials: the Handbook
Preservation Management of Digital Materials: The Handbook www.dpconline.org/graphics/handbook/ 5. Media and Formats 5. Outline Intended primary audience Operational managers and staff in repositories, publishers and other data creators, third party service providers. Assumed level of knowledge of digital preservation Novice to Intermediate. Purpose To outline the range of options available when creating digital materials and some of the major implications of selection.To point to more detailed sources of advice and guidance.To indicate areas where it is necessary to maintain an active technology watch. 5.1 Media It is important to have an understanding of the various media for storage because they require different software and hardware equipment for access, and have different storage conditions and preservation requirements.They also have varying suitability according to the storage capacity required, and preservation or access needed. Although it is very easy to focus on the traditional conservation of the physical artefact, it is important to recognise that most electronic media will be threatened by obsolescence of the hardware and software to access them.This often occurs long before deterioration of media (which have been subject to appropriate storage and handling) becomes a problem. However, appropriate selection, storage and handling of media is still essential to any preservation strategy (see Storage and Preservation). Obsolescence of previous storage media has occurred in rapid succession. In floppy disks alone we have seen a progression from 8 in to 5.25 in and then 3.5 in formats, with each change leading to rapid discontinuation of previous formats and difficulty in obtaining or maintaining access devices for them. -
A Study About Non-Volatile Memories
Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 29 July 2016 doi:10.20944/preprints201607.0093.v1 1 Article 2 A Study about Non‐Volatile Memories 3 Dileep Kumar* 4 Department of Information Media, The University of Suwon, Hwaseong‐Si South Korea ; [email protected] 5 * Correspondence: [email protected] ; Tel.: +82‐31‐229‐8212 6 7 8 Abstract: This paper presents an upcoming nonvolatile memories (NVM) overview. Non‐volatile 9 memory devices are electrically programmable and erasable to store charge in a location within the 10 device and to retain that charge when voltage supply from the device is disconnected. The 11 non‐volatile memory is typically a semiconductor memory comprising thousands of individual 12 transistors configured on a substrate to form a matrix of rows and columns of memory cells. 13 Non‐volatile memories are used in digital computing devices for the storage of data. In this paper 14 we have given introduction including a brief survey on upcoming NVMʹs such as FeRAM, MRAM, 15 CBRAM, PRAM, SONOS, RRAM, Racetrack memory and NRAM. In future Non‐volatile memory 16 may eliminate the need for comparatively slow forms of secondary storage systems, which include 17 hard disks. 18 Keywords: Non‐volatile Memories; NAND Flash Memories; Storage Memories 19 PACS: J0101 20 21 22 1. Introduction 23 Memory is divided into two main parts: volatile and nonvolatile. Volatile memory loses any 24 data when the system is turned off; it requires constant power to remain viable. Most kinds of 25 random access memory (RAM) fall into this category. -
Lecture 22: Mass Storage
Lecture 22: Mass Storage Fall 2019 Jason Tang Slides based upon Operating System Concept slides, http://codex.cs.yale.edu/avi/os-book/OS9/slide-dir/index.html Copyright Silberschatz, Galvin, and Gagne, 2013 "1 Topics • Mass Storage Systems! • Disk Scheduling! • Disk Management! • Boot Process "2 Mass Storage Systems • After startup, OS loads programs from secondary storage into main memory:! • ROM / EPROM / EEPROM / FPGA! • Magnetic hard disk! • Non-volatile random-access memory (NVRAM) ! • Tape drive ! • Or others: boot CD, Zip drive, punch card, … "3 EPROM • Erasable programmable read-only memory! • Manufacturer or OEM burns image into EPROM! • Use in older computing systems and in modern embedded systems "4 Magnetic Hard Disk (HDD) • Spindle motor spins a stack$ of platters coated with$ magnetic material! • Spins from 5400 to over$ 10000 RPMs! • Actuator motor moves a disk$ head over the platters, to$ sense polarity of the track$ underneath https://www.technobu%alo.com/2012/11/24/western-digital- "5 expands-high-performance-wd-black-hard-drive-line-to-4tb/ Magnetic Hard Disk (HDD) • Transfer rate: rate which data flow between drive and computer! • Positioning time (random-access time): time to move disk arm to desired cylinder (seek time) plus time for desired sector to rotate under disk head (rotational latency)! • Head crash: when disk head hits platter! • Attached to computer via a bus: SCSI, IDE, SATA, Fibre Channel, USB, Thunderbolt, others! • Host controller in computer uses bus to talk to disk controller "6 Magnetic Hard Disk -
Computer/Data Storage Technology
IS 335: Information Technology in Business Lecture Outline Computer/Data Storage Technology Objectives • Describe the distinguishing characteristics of primary and secondary storage • Describe the devices used to implement primary storage • Compare secondary storage alternatives • Describe factors that affect magnetic storage devices • Explain how to choose appropriate secondary storage technologies and devices Storage Device Characteristics • Consist of a read/write mechanism and a storage medium • Storage medium: device or substance that actually holds data – Device controller provides interface between storage device and system bus Storage Device Characteristics (continued) • Speed • Volatility • Access method • Portability • Cost and capacity Speed • Most important characteristic differentiating primary and secondary storage • Primary storage extends the limited capacity of CPU registers • Secondary storage speed influences execution speed • Access time • Blocks and sectors • Data transfer rate = 1 second/access time (in seconds) x unit of data transfer (in bytes) Volatility • Primary storage devices are generally volatile – Cannot reliably hold data for long periods • Secondary storage devices are generally nonvolatile – Holds data without loss over long periods of time Access Method • Serial access (linear) • Random access (direct access) • Parallel access (simultaneous) Portability • Typically implemented in two ways – Entire storage device (USB flash drive) – Storage medium can be removed (DVDs) • Typically results in slower access