CISC 360. The Memory Hierarchy Nov 13, 2008

Similar documents
Giving credit where credit is due

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 26, SPRING 2013

Random-Access Memory (RAM) Lecture 13 The Memory Hierarchy. Conventional DRAM Organization. SRAM vs DRAM Summary. Topics. d x w DRAM: Key features

Key features. ! RAM is packaged as a chip.! Basic storage unit is a cell (one bit per cell).! Multiple RAM chips form a memory.

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 26, FALL 2012

The Memory Hierarchy Sept 29, 2006

Random Access Memory (RAM)

CS 201 The Memory Hierarchy. Gerson Robboy Portland State University

CS429: Computer Organization and Architecture

CS429: Computer Organization and Architecture

Computer Systems. Memory Hierarchy. Han, Hwansoo

NEXT SET OF SLIDES FROM DENNIS FREY S FALL 2011 CMSC313.

CS 33. Memory Hierarchy I. CS33 Intro to Computer Systems XVI 1 Copyright 2016 Thomas W. Doeppner. All rights reserved.

Random-Access Memory (RAM) CISC 360. The Memory Hierarchy Nov 24, Conventional DRAM Organization. SRAM vs DRAM Summary.

Computer Organization: A Programmer's Perspective

Foundations of Computer Systems

The Memory Hierarchy /18-213/15-513: Introduction to Computer Systems 11 th Lecture, October 3, Today s Instructor: Phil Gibbons

Storage Technologies and the Memory Hierarchy

The Memory Hierarchy / : Introduction to Computer Systems 10 th Lecture, Feb 12, 2015

Random-Access Memory (RAM) CS429: Computer Organization and Architecture. SRAM and DRAM. Flash / RAM Summary. Storage Technologies

Today. The Memory Hierarchy. Byte Oriented Memory Organization. Simple Memory Addressing Modes

Today. The Memory Hierarchy. Random-Access Memory (RAM) Nonvolatile Memories. Traditional Bus Structure Connecting CPU and Memory

Announcements. Outline

Giving credit where credit is due

+ Random-Access Memory (RAM)

Read-only memory (ROM): programmed during production Programmable ROM (PROM): can be programmed once SRAM (Static RAM)

CSE 153 Design of Operating Systems

Locality. CS429: Computer Organization and Architecture. Locality Example 2. Locality Example

Computer Organization: A Programmer's Perspective

A Computer. Computer organization - Recap. The Memory Hierarchy... Brief Overview of Memory Design. CPU has two components: Memory

Carnegie Mellon. Carnegie Mellon

Large and Fast: Exploiting Memory Hierarchy

The. Memory Hierarchy. Chapter 6

CSE 153 Design of Operating Systems Fall 2018

The Memory Hierarchy. Computer Organization 2/12/2015. CSC252 - Spring Memory. Conventional DRAM Organization. Reading DRAM Supercell (2,1)

211: Computer Architecture Summer 2016

Memory Hierarchy. Instructor: Adam C. Champion, Ph.D. CSE 2431: Introduction to Operating Systems Reading: Chap. 6, [CSAPP]

CS 33. Architecture and Optimization (3) CS33 Intro to Computer Systems XVI 1 Copyright 2018 Thomas W. Doeppner. All rights reserved.

Random-Access Memory (RAM) Systemprogrammering 2007 Föreläsning 4 Virtual Memory. Locality. The CPU-Memory Gap. Topics

Random-Access Memory (RAM) Systemprogrammering 2009 Föreläsning 4 Virtual Memory. Locality. The CPU-Memory Gap. Topics! The memory hierarchy

CS3350B Computer Architecture

Computer Architecture and System Software Lecture 08: Assembly Language Programming + Memory Hierarchy

CS 261 Fall Mike Lam, Professor. Memory

Lecture 15: Caches and Optimization Computer Architecture and Systems Programming ( )

CS 2461: Computer Architecture 1 The Memory Hierarchy and impact on program performance

Problem: Processor- Memory Bo<leneck

CS 153 Design of Operating Systems

CS 261 Fall Mike Lam, Professor. Memory

Denison University. Cache Memories. CS-281: Introduction to Computer Systems. Instructor: Thomas C. Bressoud

Contents. Memory System Overview Cache Memory. Internal Memory. Virtual Memory. Memory Hierarchy. Registers In CPU Internal or Main memory

The Memory Hierarchy 10/25/16

Review: Assembly Programmer s View. The Memory Hierarchy. Random- Access Memory (RAM) Today. NonvolaHle Memories. SRAM vs DRAM Summary

F28HS Hardware-Software Interface: Systems Programming

Computer Architecture and System Software Lecture 09: Memory Hierarchy. Instructor: Rob Bergen Applied Computer Science University of Winnipeg

Systems Programming and Computer Architecture ( ) Timothy Roscoe

CS 240 Stage 3 Abstractions for Practical Systems

Where Have We Been? Ch. 6 Memory Technology

General Cache Mechanics. Memory Hierarchy: Cache. Cache Hit. Cache Miss CPU. Cache. Memory CPU CPU. Cache. Cache. Memory. Memory

CSCI-UA.0201 Computer Systems Organization Memory Hierarchy

CS24: INTRODUCTION TO COMPUTING SYSTEMS. Spring 2017 Lecture 13

CS356: Discussion #9 Memory Hierarchy and Caches. Marco Paolieri Illustrations from CS:APP3e textbook

CS 31: Intro to Systems Storage and Memory. Kevin Webb Swarthmore College March 17, 2015

Module 1: Basics and Background Lecture 4: Memory and Disk Accesses. The Lecture Contains: Memory organisation. Memory hierarchy. Disks.

Roadmap. Java: Assembly language: OS: Machine code: Computer system:

Memory Hierarchy. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University

Memory hierarchy Outline

Lecture 18: Memory Systems. Spring 2018 Jason Tang

Problem: Processor Memory BoJleneck

CS241 Computer Organization Spring Principle of Locality

Memory Management! Goals of this Lecture!

CENG3420 Lecture 08: Memory Organization

UNIT-V MEMORY ORGANIZATION

Semiconductor Memory Types Microprocessor Design & Organisation HCA2102

CHAPTER 6 Memory. CMPS375 Class Notes Page 1/ 16 by Kuo-pao Yang

Memory Management. Goals of this Lecture. Motivation for Memory Hierarchy

UNIT 2 Data Center Environment

211: Computer Architecture Summer 2016

Adapted from instructor s supplementary material from Computer. Patterson & Hennessy, 2008, MK]

Chapter 5. Large and Fast: Exploiting Memory Hierarchy

Memory Management! How the hardware and OS give application pgms:" The illusion of a large contiguous address space" Protection against each other"

Memory classification:- Topics covered:- types,organization and working

CHAPTER 6 Memory. CMPS375 Class Notes (Chap06) Page 1 / 20 Dr. Kuo-pao Yang

Chapter 6 Caches. Computer System. Alpha Chip Photo. Topics. Memory Hierarchy Locality of Reference SRAM Caches Direct Mapped Associative

Microcontroller Systems. ELET 3232 Topic 11: General Memory Interfacing

k -bit address bus n-bit data bus Control lines ( R W, MFC, etc.)

ECE 341. Lecture # 16

William Stallings Computer Organization and Architecture 6th Edition. Chapter 5 Internal Memory

Organization. 5.1 Semiconductor Main Memory. William Stallings Computer Organization and Architecture 6th Edition

Chapter 5 Internal Memory

Advanced Parallel Architecture Lesson 4 bis. Annalisa Massini /2015

Internal Memory. Computer Architecture. Outline. Memory Hierarchy. Semiconductor Memory Types. Copyright 2000 N. AYDIN. All rights reserved.

Memory. Objectives. Introduction. 6.2 Types of Memory

Computer Organization and Assembly Language (CS-506)

CMPSC 311- Introduction to Systems Programming Module: Caching

Computer Memory. Textbook: Chapter 1

CS24: INTRODUCTION TO COMPUTING SYSTEMS. Spring 2014 Lecture 14

Memory and Disk Systems

Computer Organization. 8th Edition. Chapter 5 Internal Memory

CENG4480 Lecture 09: Memory 1

ECSE-2610 Computer Components & Operations (COCO)

Transcription:

CISC 360 The Memory Hierarchy Nov 13, 2008 Topics Storage technologies and trends Locality of reference Caching in the memory hierarchy class12.ppt Random-Access Memory (RAM) Key features RAM is packaged as a chip. Basic storage unit is a cell (one bit per cell). Multiple RAM chips form a memory. Static RAM (SRAM( SRAM) Each cell stores bit with a six-transistor circuit. Retains value indefinitely, as long as it is kept powered. Relatively insensitive to disturbances such as electrical noise. Faster and more expensive than DRAM. Dynamic RAM (DRAM( DRAM) Each cell stores bit with a capacitor and transistor. Value must be refreshed every 10-100 ms. Sensitive to disturbances. Slower and cheaper than SRAM. 2 CISC 360 Fa08

SRAM vs DRAM Summary Tran. Access per bit time Persist? Sensitive? Cost Applications SRAM 6 1X Yes No 100x cache memories DRAM 1 10X No Yes 1X Main memories, frame buffers 3 CISC 360 Fa08 Conventional DRAM Organization d x w DRAM: dw total bits organized as d supercells of size w bits 16 x 8 DRAM chip cols 0 1 2 3 (to CPU) memory 2 bits / addr 8 bits / data 0 1 rows 2 3 supercell (2,1) 4 internal row buffer CISC 360 Fa08

Reading DRAM Supercell (2,1) Step 1(a): Row access strobe (RAS( RAS) ) selects row 2. Step 1(b): Row 2 copied from DRAM array to row buffer. 16 x 8 DRAM chip memory RAS = 2 2 / addr 0 1 rows 2 cols 0 1 2 3 8 / data 3 5 internal row buffer CISC 360 Fa08 Reading DRAM Supercell (2,1) Step 2(a): Column access strobe (CAS( CAS) ) selects column 1. Step 2(b): Supercell (2,1) copied from buffer to data lines, and eventually back to the CPU. To CPU supercell (2,1) memory CAS = 1 2 / addr 8 / data 16 x 8 DRAM chip 0 1 rows 2 3 cols 0 1 2 3 supercell 6 internal row buffer (2,1) CISC 360 Fa08

Memory Modules addr (row = i, col = j) DRAM 7 DRAM 0 : supercell (i,j) 64 MB memory module consisting of eight 8Mx8 DRAMs bits 56-63 bits 48-55 bits 40-47 bits 32-39 bits 24-31 bits 16-23 bits 8-15 bits 0-7 63 56 55 48 47 40 39 32 31 24 23 16 15 8 7 0 64-bit doubleword at main memory address A Memory 64-bit doubleword 7 CISC 360 Fa08 Enhanced DRAMs All enhanced DRAMs are built around the conventional DRAM core. Fast page mode DRAM (FPM DRAM) Access contents of row with [RAS, CAS, CAS, CAS, CAS] instead of [(RAS,CAS), (RAS,CAS), (RAS,CAS), (RAS,CAS)]. Extended data out DRAM (EDO DRAM) Enhanced FPM DRAM with more closely spaced CAS signals. Synchronous DRAM (SDRAM) Driven with rising clock edge instead of asynchronous control signals. Double data-rate synchronous DRAM (DDR SDRAM) Enhancement of SDRAM that uses both clock edges as control signals. Video RAM (VRAM) Like FPM DRAM, but output is produced by shifting row buffer Dual ported (allows concurrent reads and writes) 8 CISC 360 Fa08

Nonvolatile Memories DRAM and SRAM are volatile memories Lose information if powered off. Nonvolatile memories retain value even if powered off. Generic name is read-only memory (ROM). Misleading because some ROMs can be read and modified. Types of ROMs Programmable ROM (PROM) Eraseable programmable ROM (EPROM) Electrically eraseable PROM (EEPROM) Flash memory Firmware Program stored in a ROM Boot time code, BIOS (basic input/ouput system) graphics cards, disk s. 9 CISC 360 Fa08 Typical Bus Structure Connecting CPU and Memory A bus is a collection of parallel wires that carry address, data, and control signals. Buses are typically shared by multiple devices. CPU chip register file ALU system bus memory bus bus interface I/O bridge main memory 10 CISC 360 Fa08

Memory Read Transaction (1) CPU places address A on the memory bus. register file Load operation: movl A, %eax %eax ALU bus interface I/O bridge A main memory 0 x A 11 CISC 360 Fa08 Memory Read Transaction (2) Main memory reads A from the memory bus, retreives word x, and places it on the bus. register file Load operation: movl A, %eax %eax ALU bus interface I/O bridge main memory x 0 x A 12 CISC 360 Fa08

Memory Read Transaction (3) CPU read word x from the bus and copies it into register %eax% eax. register file Load operation: movl A, %eax %eax x ALU I/O bridge main memory 0 bus interface x A 13 CISC 360 Fa08 Memory Write Transaction (1) CPU places address A on bus. Main memory reads it and waits for the corresponding data word to arrive. register file Store operation: movl %eax, A %eax y ALU bus interface I/O bridge A main memory 0 A 14 CISC 360 Fa08

Memory Write Transaction (2) CPU places data word y on the bus. register file Store operation: movl %eax, A %eax y ALU bus interface I/O bridge y main memory 0 A 15 CISC 360 Fa08 Memory Write Transaction (3) Main memory read data word y from the bus and stores it at address A. register file Store operation: movl %eax, A %eax y ALU I/O bridge main memory 0 bus interface y A 16 CISC 360 Fa08

Disk Geometry Disks consist of platters,, each with two surfaces. Each surface consists of concentric rings called tracks. Each track consists of sectors separated by gaps. tracks surface track k gaps spindle sectors 17 CISC 360 Fa08 Disk Geometry (Muliple-Platter View) Aligned tracks form a cylinder. cylinder k surface 0 surface 1 surface 2 surface 3 surface 4 surface 5 platter 0 platter 1 platter 2 spindle 18 CISC 360 Fa08

Disk Capacity Capacity: maximum number of bits that can be stored. Vendors express capacity in units of gigabytes (GB), where 1 GB = 10^9. Capacity is determined by these technology factors: Recording density (bits/in): number of bits that can be squeezed into a 1 inch segment of a track. Track density (tracks/in): number of tracks that can be squeezed into a 1 inch radial segment. Areal density (bits/in2): product of recording and track density. Modern disks partition tracks into disjoint subsets called recording zones Each track in a zone has the same number of sectors, determined by the circumference of innermost track. Each zone has a different number of sectors/track 19 CISC 360 Fa08 Computing Disk Capacity Capacity = (# bytes/sector) x (avg( avg.. # sectors/track) x Example: 512 bytes/sector (# tracks/surface) x (# surfaces/platter) x (# platters/disk) 300 sectors/track (on average) 20,000 tracks/surface 2 surfaces/platter 5 platters/disk Capacity = 512 x 300 x 20000 x 2 x 5 = 30,720,000,000 = 30.72 GB 20 CISC 360 Fa08

Disk Operation (Single-Platter View) The disk surface spins at a fixed rotational rate The read/write head is attached to the end of the arm and flies over the disk surface on a thin cushion of air. spindle spindle spindle spindle By moving radially, the arm can position the read/write head over any track. 21 CISC 360 Fa08 Disk Operation (Multi-Platter View) read/write heads move in unison from cylinder to cylinder arm spindle 22 CISC 360 Fa08

Disk Access Time Average time to access some target sector approximated by : Taccess = Tavg seek + Tavg rotation + Tavg transfer Seek time (Tavg seek) Time to position heads over cylinder containing target sector. Typical Tavg seek = 9 ms Rotational latency (Tavg rotation) Time waiting for first bit of target sector to pass under r/w head. Tavg rotation = 1/2 x 1/RPMs x 60 sec/1 min Transfer time (Tavg transfer) Time to read the bits in the target sector. Tavg transfer = 1/RPM x 1/(avg # sectors/track) x 60 secs/1 min. 23 CISC 360 Fa08 Disk Access Time Example Given: Rotational rate = 7,200 RPM Average seek time = 9 ms. Avg # sectors/track = 400. Derived: Tavg rotation = 1/2 x (60 secs/7200 RPM) x 1000 ms/sec = 4 ms. Tavg transfer = 60/7200 RPM x 1/400 secs/track x 1000 ms/sec = 0.02 ms Taccess = 9 ms + 4 ms + 0.02 ms Important points: Access time dominated by seek time and rotational latency. First bit in a sector is the most expensive, the rest are free. SRAM access time is about 4 ns/doubleword, DRAM about 60 ns Disk is about 40,000 times slower than SRAM, 2,500 times slower then DRAM. 24 CISC 360 Fa08

Logical Disk Blocks Modern disks present a simpler abstract view of the complex sector geometry: The set of available sectors is modeled as a sequence of b- sized logical blocks (0, 1, 2,...) Mapping between logical blocks and actual (physical) sectors Maintained by hardware/firmware device called disk. Converts requests for logical blocks into (surface,track,sector) triples. Allows to set aside spare cylinders for each zone. Accounts for the difference in formatted capacity and maximum capacity. 25 CISC 360 Fa08 I/O Bus CPU chip register file ALU system bus memory bus bus interface I/O bridge main memory USB graphics adapter I/O bus disk Expansion slots for other devices such as network adapters. mouse keyboard monitor disk 26 CISC 360 Fa08

Reading a Disk Sector (1) CPU chip register file ALU CPU initiates a disk read by writing a command, logical block number, and destination memory address to a port (address) associated with disk. bus interface main memory I/O bus USB graphics adapter disk mousekeyboard monitor disk 27 CISC 360 Fa08 Reading a Disk Sector (2) CPU chip register file ALU Disk reads the sector and performs a direct memory access (DMA) transfer into main memory. bus interface main memory I/O bus USB graphics adapter disk mousekeyboard monitor disk 28 CISC 360 Fa08

Reading a Disk Sector (3) CPU chip register file ALU When the DMA transfer completes, the disk notifies the CPU with an interrupt (i.e., asserts a special interrupt pin on the CPU) bus interface main memory I/O bus USB graphics adapter disk mousekeyboard monitor disk 29 CISC 360 Fa08 Storage Trends SRAM metric 1980 1985 1990 1995 2000 2000:1980 $/MB 19,200 2,900 320 256 100 190 access (ns) 300 150 35 15 2 100 metric 1980 1985 1990 1995 2000 2000:1980 DRAM $/MB 8,000 880 100 30 1 8,000 access (ns) 375 200 100 70 60 6 typical size(mb) 0.064 0.256 4 16 64 1,000 metric 1980 1985 1990 1995 2000 2000:1980 Disk $/MB 500 100 8 0.30 0.05 10,000 access (ms) 87 75 28 10 8 11 typical size(mb) 1 10 160 1,000 9,000 9,000 (Culled from back issues of Byte and PC Magazine) 30 CISC 360 Fa08

CPU Clock Rates 1980 1985 1990 1995 2000 2000:1980 processor 8080 286 386 Pent P-III clock rate(mhz) 1 6 20 150 750 750 cycle time(ns) 1,000 166 50 6 1.6 750 31 CISC 360 Fa08 The CPU-Memory Gap The increasing gap between DRAM, disk, and CPU speeds. ns 100,000,000 10,000,000 1,000,000 100,000 10,000 1,000 100 10 1 1980 1985 1990 1995 2000 year Disk seek time DRAM access time SRAM access time CPU cycle time 32 CISC 360 Fa08

Locality Principle of Locality: Programs tend to reuse data and instructions near those they have used recently, or that were recently referenced themselves. Temporal locality: Recently referenced items are likely to be referenced in the near future. Spatial locality: Items with nearby addresses tend to be referenced close together in time. Locality Example: Data Reference array elements in succession (stride-1 reference pattern): Spatial locality Reference sum each iteration: Temporal locality Instructions Reference instructions in sequence: Spatial locality Cycle through loop repeatedly: Temporal locality sum = 0; for (i = 0; i < n; i++) sum += a[i]; return sum; 33 CISC 360 Fa08 Locality Example Claim: Being able to look at code and get a qualitative sense of its locality is a key skill for a professional programmer. Question: Does this function have good locality? int sumarrayrows(int a[m][n]) { int i, j, sum = 0; } for (i = 0; i < M; i++) for (j = 0; j < N; j++) sum += a[i][j]; return sum 34 CISC 360 Fa08

Locality Example Question: Does this function have good locality? int sumarraycols(int a[m][n]) { int i, j, sum = 0; } for (j = 0; j < N; j++) for (i = 0; i < M; i++) sum += a[i][j]; return sum 35 CISC 360 Fa08 Locality Example Question: Can you permute the loops so that the function scans the 3-d array a[] with a stride-1 reference pattern (and thus has good spatial locality)? int sumarray3d(int a[m][n][n]) { int i, j, k, sum = 0; } for (i = 0; i < M; i++) for (j = 0; j < N; j++) for (k = 0; k < N; k++) sum += a[k][i][j]; return sum 36 CISC 360 Fa08

Memory Hierarchies Some fundamental and enduring properties of hardware and software: Fast storage technologies cost more per byte and have less capacity. The gap between CPU and main memory speed is widening. Well-written programs tend to exhibit good locality. These fundamental properties complement each other beautifully. They suggest an approach for organizing memory and storage systems known as a memory hierarchy. 37 CISC 360 Fa08 An Example Memory Hierarchy Smaller, faster, and costlier (per byte) storage devices Larger, slower, and cheaper (per byte) storage devices L5: L4: L3: L2: L0: registers L1: on-chip L1 cache (SRAM) off-chip L2 cache (SRAM) main memory (DRAM) local secondary storage (local disks) remote secondary storage (distributed file systems, Web servers) CPU registers hold words retrieved from L1 cache. L1 cache holds cache lines retrieved from the L2 cache memory. L2 cache holds cache lines retrieved from main memory. Main memory holds disk blocks retrieved from local disks. Local disks hold files retrieved from disks on remote network servers. 38 CISC 360 Fa08

Caches Cache: A smaller, faster storage device that acts as a staging area for a subset of the data in a larger, slower device. Fundamental idea of a memory hierarchy: For each k, the faster, smaller device at level k serves as a cache for the larger, slower device at level k+1. Why do memory hierarchies work? Programs tend to access the data at level k more often than they access the data at level k+1. Thus, the storage at level k+1 can be slower, and thus larger and cheaper per bit. Net effect: A large pool of memory that costs as much as the cheap storage near the bottom, but that serves data to programs at the rate of the fast storage near the top. 39 CISC 360 Fa08 Caching in a Memory Hierarchy Level k: 48 9 14 10 3 Smaller, faster, more expensive device at level k caches a subset of the blocks from level k+1 10 4 Data is copied between levels in block-sized transfer units Level k+1: 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Larger, slower, cheaper storage device at level k+1 is partitioned into blocks. 40 CISC 360 Fa08

General Caching Concepts Level k: Level k+1: 14 12 Request 14 12 0 1 2 3 12 4* 9 14 3 12 4* Request 12 0 1 2 3 4* 4 5 6 7 8 9 10 11 12 13 14 15 Program needs object d, which is stored in some block b. Cache hit Program finds b in the cache at level k. E.g., block 14. Cache miss b is not at level k, so level k cache must fetch it from level k+1. E.g., block 12. If level k cache is full, then some current block must be replaced (evicted). Which one is the victim? Placement policy: where can the new block go? E.g., b mod 4 Replacement policy: which block should be evicted? E.g., LRU 41 CISC 360 Fa08 General Caching Concepts Types of cache misses: Cold (compulsary) miss Cold misses occur because the cache is empty. Conflict miss Most caches limit blocks at level k+1 to a small subset (sometimes a singleton) of the block positions at level k. E.g. Block i at level k+1 must be placed in block (i mod 4) at level k+1. Conflict misses occur when the level k cache is large enough, but multiple data objects all map to the same level k block. E.g. Referencing blocks 0, 8, 0, 8, 0, 8,... would miss every time. Capacity miss Occurs when the set of active cache blocks (working set) is larger than the cache. 42 CISC 360 Fa08

Examples of Caching in the Hierarchy Cache Type Registers TLB L1 cache L2 cache Virtual Memory Buffer cache Network buffer cache Browser cache Web cache What Cached 4-byte word Address translations 32-byte block 32-byte block 4-KB page Parts of files Parts of files Web pages Web pages Where Cached CPU registers On-Chip TLB On-Chip L1 Off-Chip L2 Main memory Main memory Local disk Local disk Remote server disks Latency (cycles) 0 0 1 10 100 100 10,000,000 10,000,000 1,000,000,000 Managed By Compiler Hardware Hardware Hardware Hardware+ OS OS AFS/NFS client Web browser Web proxy server 43 CISC 360 Fa08 Deadlines 10 Nov 4 No class 10 Nov 6 Lec16 Program Optimization I 5 4 Lab 3 11 Nov 11 Lec17 Program Optimization I 11 Nov 13 Lec18 The Memory Hierarchy 6 5 12 Nov 18 No class 12 Nov 20 No class 13 Nov 25 Lec19 Cache Memories 13 Nov 27 Thanksgiving Holiday 14 Dec 2 Lec20 Virtual Memory 6 Lab 4 14 Dec 4 Lec22 Dynamic Memory Allocation I 10 14 (*) Dec 5 Exercises in class in preparation to exam 15 Dec 9 Lec23 Dynamic Memory Allocation II 44 CISC 360 Fa08