SlideShare a Scribd company logo
1 of 5
Download to read offline
V. Padmaja et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.347-351

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Modelling Of Variation Trained Drowsy Cache
V. Padmaja*, D. Kishore **
*(Department of Electronics & Communication Engineering, SRI SAI ADITYA institute of science and
technology, Surampalem)
** (Department of Electronics & Communication Engineering, SRI SAI ADITYA institute of science and
technology, Surampalem )

ABSTRACT:
On-chip caches represent a sizable fraction of the total power consumption of microprocessors. Although large
caches can significantly improve performance, they have the potential to increase power consumption. As
feature sizes shrink, the dominant component of this power loss will be leakage. However, during a fixed period
of time the activity in a cache is only centered on a small subset of the lines. This behavior can be exploited to
cut the leakage power of large caches by putting the cold cache lines into a state preserving, low-power drowsy
mode. Moving lines into and out of drowsy state incurs a slight performance loss. In this paper we investigate
policies and circuit techniques for implementing drowsy caches. We show that with simple architectural
techniques, about 80%-90% of the cache lines can be maintained in a drowsy state without affecting
performance by more than 1%. According to our projections, in a 0.07um CMOS process, drowsy caches will be
able to reduce the total energy (static and dynamic) consumed in the caches by 50%-75%. We also argue that
the use of drowsy caches can simplify the design and control of low leakage caches, and avoid the need to
completely turn off selected cache lines and lose their state.
Index Terms— Cache, drowsy cache, static random access memory (SRAM), AXI protocol

I.

INTRODUCTION

In this paper, we propose a drowsy cache
architecture that is aware of process variability within
the structure. By using a simple and low cost
distributed supply voltage management unit (one for
each cache way) our pro-posed architecture allows a
majority of the memory cells to operate at a reduced
voltage
The gap between processor and memory
speed continues to widen, cache performance becomes
increasingly critical to the overall system
performance. Researchers have observed that different
program regions may have different access patterns
and reuse types, and it is possible to fine -tune the
cache management mechanism to exploit the reuse
behaviors and achieve a better memory performance.
cache schemes proposed previously, the cache
selection and the bypass decision are made by the
hardware.
To use cache mapping to improve program
memory performance, we must have a way to estimate
the dynamic memory access behavior of the program.
Typical applications which run on the Strong ARM
and the XScale processors perform multimedia tasks,
encryption, and compression, among others
The gap between processor and memory
speed continues to widen, cache performance becomes
increasingly critical to the overall system
performance. Researchers have observed that different
program regions may have different access patterns
and reuse types, and it is possible to fine -tune the
cache management mechanism to exploit the reuse
www.ijera.com

behaviors and achieve a better memory performance.
cache schemes proposed previously, the cache
selection and the bypass decision are made by the
hardware.
To use cache mapping to improve program
memory performance, we must have a way to estimate
the dynamic memory access behaviour of the
program. Typical applications which run on the Strong
ARM and the XScale processors perform multimedia
tasks, encryption, and compression, among others.

II.

PROPOSED ARCHITECTURE

To counter the effect of process variations,
typically designers overdrive the entire memory array.
This leads to extra power consumption as both leakage
and dynamic power increase. We are proposing to use
a modified wordline driver peripheral circuit to allow
selective wordline overdriving utilizing a small one
step charge pump. The wordline peripheral circuit will
drive the wordline in two phases. In the first phase,
using the supplied Vdd the wordline is driven to Vdd.
In the second phase the charge pump will overdrive
the wordline voltage increasing the Vgs above the
supply Vdd. Increase in Vgs improves both access and
write time to the cell as will be described in the
following sections DRV for cold lines which are
determined by cache access pattern and are managed
via the proposed architecture. Cache ways that are
supplied with this voltage are referred to as “Cold
Ways”. The remaining two voltage levels are used in
cache ways located within the Cache Window of
347 | P a g e
V. Padmaja et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.347-351

www.ijera.com

Execution (CWoE) VddLOW is supplied if cache way
Could operate correctly in that voltage, otherwise
cache way is supplied with VddHIGH.
A 6T SRAM memory, however, can be
manufactured in a standard logic process and
continues to offer high-performance at a reasonable
density and power dissipation. SRAMs will likely
remain the dominant on-die memory technology, as
SRAM cells have already been demonstrated down to
the 32nm technology node. A 6T SRAM cell uses a
pair of cross-coupled inverters as its bi-stable storage
element with two additional NMOS devices for read
and write access (Figure 1).
Figure 3. Channel architecture of writes

Fig 1. 6T SRAM cell
The cells are aggregated into cell arrays to
share the decoding and I/O logic. On a read, the
decoder raises the wordline (WL) of the desired word.
The bitlines (BL and BL b) have been precharged to a
reference voltage, and the cell drives a differential
current onto the bitlines according to the stored value.
The cell current is relatively weak for the bitline
capacitance, so to speed the read operation, a sense
amplifier in the I/O logic amplifies the bitline
differential voltage to produce a full swing logic
value.
Figure 2 & 3 shows how a read transaction
uses the read address and read data channels and how
a write transaction uses the write address, write data,
and write response channels.

A. Channel definition:
Each of the five independent channels
consists of a set of information signals and uses a twoway VALID and READY handshake mechanism.
The information source uses the VALID signal to
show when valid data or control information is
available on the channel. The destination uses the
READY signal to show when it can accept the data.
Both the read data channel and the write data channel
also include a LAST signal to indicate when the
transfer of the final data item within a transaction
takes place.
I.

Read and write address channels:
Read and write transactions each have their
own address channel. The appropriate address channel
carries all of the required address and control
information for a transaction.
The AXI protocol supports the following mechanisms:
• Variable-length bursts, from 1 to 16 data
transfers per burst
• bursts with a transfer size of 8-1024 bits
• Wrapping,
incrementing,
and
nonincrementing bursts
• Atomic operations, using exclusive or locked
accesses
• System-level caching and buffering control
• Secure and privileged access.
1.Read data channel:
The read data channel conveys both the read
data and any read response information from the slave
back to the master. The read data channel includes:
• The data bus, which can be 8, 16, 32, 64, 128,
256, 512, or 1024 bits wide
• A read response indicating the completion
status of the read transaction.

Figure 2. Channel architecture of reads

www.ijera.com

2.Write data channel:
The write data channel conveys the write data
from the master to the slave and includes:
• The data bus, which can be 8, 16, 32, 64, 128,
256, 512, or 1024 bits wide

348 | P a g e
V. Padmaja et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.347-351
•

One byte lane strobe for every eight data bits,
indicating which bytes of the data bus are
valid.
Write data channel information is always
treated as buffered, so that the master can perform
write transactions without slave acknowledgement of
previous write transactions.
B. Basic Transactions:
This section gives examples of basic AXI
protocol transactions. Each example shows the
VALID and READY handshake mechanism. Transfer
of either address information or data occurs when both
the VALID and READY signals are HIGH. The
examples are provided in:
1.

www.ijera.com

address. This enables a slave to begin processing data
for the second burst in parallel with the completion of
the first burst.
1.Write burst example:
The process starts when the master sends an
address and control information on the write address
channel. The master then sends each item of write data
over the write data channel. When the master sends
the last data item, the WLAST signal goes HIGH.
When the slave has accepted all the data items, it
drives a write response back to the master to indicate
that the write transaction is complete. As shown in fig
6.

Read burst example:

Figure 4. Read burst
Figure 4 shows a read burst of four transfers.
In this example, the master drives the address, and the
slave accepts it one cycle later.
The master also drives a set of control signals
showing the length and type of the burst, but these
signals are omitted from the figure for clarity. After
the address appears on the address bus, the data
transfer occurs on the read data channel. The slave
keeps the VALID signal LOW until the read data is
available. For the final data transfer of the burst, the
slave asserts the RLAST signal to show that the last
data item is being transferred.

Figure 6. Write burst

III.

AXI PROTOCOL

AXI is part of ARM AMBA, a family of
micro controller buses first introduced in 1996. The
first version of AXI was first included in AMBA 3.0,
released in 2003. AMBA 4.0, released in 2010,
includes the second version of AXI, AXI4.
There are three types of AXI4 interfaces:
 AXI4-for high-performance memory-mapped
requirements.
 AXI4-Lite–for
simple,
low-throughput
memory-mapped
communication
(for
example, to and from control and status
registers).
 AXI4-Stream—for high-speed streaming
data.
C. AXI4:
The AXI4 protocol is an update to AXI3
which is designed to enhance the performance and
utilization of the interconnect when used by multiple
masters.

Figure 5. Overlapping read bursts
Figure 5 shows how a master can drive
another burst address after the slave accepts the first
www.ijera.com

D. AXI4-Lite:
AXI4-Lite is a subset of the AXI4 protocol
intended for communication with simpler, smaller
control register-style interfaces in components. The
AXI4-Lite IP Interface is a part of the Xilinx family of
Advanced RISC Machine (ARM) Advanced
Microcontroller Bus Architecture (AMBA) Advanced
349 | P a g e
V. Padmaja et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.347-351
extensible Interface (AXI) control interface
compatible products. It provides a point-to-point
bidirectional interface between a user Intellectual
property (IP) core and the AXI interconnect. This
version of the AXI4-Lite IP interface has been
optimized for slave operation on the AXI. It does not
provide support for Direct Memory Access (DMA)
and IP Master Services.
Features:
 Supports 32-bit slave configuration.
 Supports read and write data transfers of 32-bit
width.
 Supports multiple address ranges.
 Read has the higher priority over write.
 Read to the holes in the address space returns
0*00000000.
 Writes to the holes in the address space after the
register map are ignored and responded with an
OKAY response.
 Both AXI and IP Interconnect are little ending.
E. AXI4-Stream Protocol:
The AXI4-Stream protocol is used for
applications that typically focus on a data-centric and
data-flow paradigm where the concept of an address is
not present or not required. Each AXI4-Stream acts as
a single unidirectional channel for a handshake data
flow. At this lower level of operation (compared to the
memory mapped AXI protocol types), the mechanism
to move data between IP is defined and efficient, but
there is no unifying address context between IP. The
AXI4-Stream IP can be better optimized for
performance in data flow applications, but also tends
to be more specialized around a given application
space. The AXI4-Stream protocol is designed for
unidirectional data transfers from master to slave with
greatly reduced signal routing.

www.ijera.com

The AXI protocol supports three different burst
types that are suitable for:
 normal memory accesses
 wrapping cache line bursts
 Streaming data to peripheral FIFO locations.
2. System cache support:
The cache-support signal of the AXI protocol
enables a master to provide to a system-level cache the
buffer able, cacheable, and allocate attributes of a
transaction.
3.

Protection unit support:
To enable both privileged and secure
accesses, the AXI protocol provides three levels of
protection unit support.

IV.

Fig 8. Cache Enable
Cache Disable:

Fig 9. Cache Disable

V.

Fig 7. AXI Protocol CIRCUIT DIAGRAM
F. Additional features:
The AXI protocol also supports the following
additional features:
1. Burst types:

www.ijera.com

RESULTS

Cache Enable:

CONCLUSION

In this paper we presented a novel
architecture for low power and high yielding memory
arrays. Proposed approach utilizes a charge pump
wordline driver and selectively overdrives the
wordlines containing weak cells. This architecture
achieves power savings of more that 50% in dynamic,
and 60% in leakage power as compared to the
traditional architecture running at nominal voltage.
Alternatively, when operated at the same voltage as
traditional memory it provides an improvement in
memory array yield. By using AXI protocol we are
sending the data in cache memory. When the data is
transferred in to the memory the enable and disable
conditions is same.

REFERENCES
[1] A. Sasan, H. Homayoun, A. Eltawil, and F. J.
Kurdahi,
“Process
variation
aware
SRAM/cache for aggressive voltage-

350 | P a g e
V. Padmaja et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.347-351

[2]

[3]

[4]

[5]

[6]

[7]

www.ijera.com

frequency scaling,” in Proc. DATE, pp. 911–
916.
A. Sasan (Mohammad AMakhzan), A.
Khajeh, A. Eltawil, and F. Kurdahi, “Limits
of voltage scaling for caches utilizing fault
tolerant techniques,” in Proc. ICCD, pp.
488–495.
M. A. Lucente, C. H. Harris, and R. M. Muir,
“Memory system reliability improvement
through associative cache redundancy,” in
Proc. IEEE Custom Integr. Circuits Conf.,
May 1990, pp. 19.6/1–19.6/4.
Z. Bo, D. Blaauw, D. Sylvester, and K.
Flautner, “The
limit of dynamic voltage
scaling and insomniac dynamic voltage
scaling,” IEEE Trans.Very Large Scale
Integr. (VLSI) Syst., vol. 13, no. 11, pp.
1239–1252,Nov. 2005.
K. Flautner, K. Nam Sung, S. Martin, D.
Blaauw, and T. Mudge, “Drowsy caches:
Simple techniques for reducing leakage
power,” in Proc. 29th Annu. Int. Symp.
Comput. Arch. , 2002, pp. 148–157.
H. Zhou, M. C. Toburen, E. Rotenberg, and
T. M. Conte, “Adaptive mode-control: A
static-power-efficient cache design,” in Proc.
Int. Conf. Parallel Arch. Compilation Techn.,
2001, pp. 61–70.
A. Agarwal, B. C. Paul, S. Mukho padhyay,
and K. Roy, “Process variation in embedded
memories: Failure analysis and variation
aware architecture,” IEEE Trans. Solid-State
Circuits, vol. 40, no. 9, pp. 1804–1814, Sep.
2005.

VELUVALI PADMAJA was born on 2ND
DECEMBER 1980 at Kakinada, India. She received
her, B.Tech in Electronics & Communication
Engineering from JNTU KAKINADA, AP, India and
Pursuing M.Tech in VLSI at SRI SAI ADITYA
institute of science and technology, Surampalem ,
Peddapuram AP, India.

D.KISHORE received his B. Tech in
Electronics & Communication Engineering from
JNTU KAKINADA IN 2004 and M. Tech degree in
COMMUNICATION AND SIGNAL PROCESSING
from
BAPATLA
ENGINEERING
COLLEGE,GUNTUR, ACHARYA NAGARJUNA
UNIVERSITY, in 2009 and also working as
ASSOCIATE PROFESSOR in SRI SAI ADITYA
institute of science and technology, Dept of
Electronics
&
Communication
Engineering,
Surampalem, Peddapuram AP, India.

www.ijera.com

351 | P a g e

More Related Content

What's hot

Design and implementation of 4 t, 3t and 3t1d dram cell design on 32 nm techn...
Design and implementation of 4 t, 3t and 3t1d dram cell design on 32 nm techn...Design and implementation of 4 t, 3t and 3t1d dram cell design on 32 nm techn...
Design and implementation of 4 t, 3t and 3t1d dram cell design on 32 nm techn...VLSICS Design
 
DESIGN AND PERFORMANCE ANALYSIS OF ZBT SRAM CONTROLLER
DESIGN AND PERFORMANCE ANALYSIS OF ZBT SRAM CONTROLLERDESIGN AND PERFORMANCE ANALYSIS OF ZBT SRAM CONTROLLER
DESIGN AND PERFORMANCE ANALYSIS OF ZBT SRAM CONTROLLERVLSICS Design
 
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...RESHAN FARAZ
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networksNarendra Singh Yadav
 
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...eSAT Journals
 
Performance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routingPerformance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routingeSAT Publishing House
 
HDLC, PPP and SLIP
HDLC, PPP and SLIPHDLC, PPP and SLIP
HDLC, PPP and SLIPNaveen Kumar
 
Power analysis of 4 t sram by stacking technique using tanner tool
Power analysis of 4 t sram by stacking technique using tanner toolPower analysis of 4 t sram by stacking technique using tanner tool
Power analysis of 4 t sram by stacking technique using tanner tooleSAT Publishing House
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Computer Science Journals
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 

What's hot (20)

I2C
I2CI2C
I2C
 
Design and implementation of 4 t, 3t and 3t1d dram cell design on 32 nm techn...
Design and implementation of 4 t, 3t and 3t1d dram cell design on 32 nm techn...Design and implementation of 4 t, 3t and 3t1d dram cell design on 32 nm techn...
Design and implementation of 4 t, 3t and 3t1d dram cell design on 32 nm techn...
 
B0540714
B0540714B0540714
B0540714
 
DESIGN AND PERFORMANCE ANALYSIS OF ZBT SRAM CONTROLLER
DESIGN AND PERFORMANCE ANALYSIS OF ZBT SRAM CONTROLLERDESIGN AND PERFORMANCE ANALYSIS OF ZBT SRAM CONTROLLER
DESIGN AND PERFORMANCE ANALYSIS OF ZBT SRAM CONTROLLER
 
Es notes unit 2
Es notes unit 2Es notes unit 2
Es notes unit 2
 
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networks
 
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
 
Performance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routingPerformance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routing
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Bus
BusBus
Bus
 
HDLC, PPP and SLIP
HDLC, PPP and SLIPHDLC, PPP and SLIP
HDLC, PPP and SLIP
 
Power analysis of 4 t sram by stacking technique using tanner tool
Power analysis of 4 t sram by stacking technique using tanner toolPower analysis of 4 t sram by stacking technique using tanner tool
Power analysis of 4 t sram by stacking technique using tanner tool
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
 
ROUTING
ROUTINGROUTING
ROUTING
 
Buses in a computer
Buses in a computerBuses in a computer
Buses in a computer
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Dqdb
DqdbDqdb
Dqdb
 
Net switching
Net switchingNet switching
Net switching
 

Viewers also liked

Viewers also liked (12)

Ac36167172
Ac36167172Ac36167172
Ac36167172
 
Af36188193
Af36188193Af36188193
Af36188193
 
Ah36200203
Ah36200203Ah36200203
Ah36200203
 
Ai36204209
Ai36204209Ai36204209
Ai36204209
 
Di36654660
Di36654660Di36654660
Di36654660
 
Z36149154
Z36149154Z36149154
Z36149154
 
Resume_for_planning_Engineer
Resume_for_planning_EngineerResume_for_planning_Engineer
Resume_for_planning_Engineer
 
TALEO
TALEOTALEO
TALEO
 
December 5, 2015: Colorado Coach Connection
December 5, 2015: Colorado Coach Connection December 5, 2015: Colorado Coach Connection
December 5, 2015: Colorado Coach Connection
 
中国生命禅院第二家园与日本木之花社区联合公告
中国生命禅院第二家园与日本木之花社区联合公告中国生命禅院第二家园与日本木之花社区联合公告
中国生命禅院第二家园与日本木之花社区联合公告
 
Norm's Reference (1)
Norm's Reference (1)Norm's Reference (1)
Norm's Reference (1)
 
vfa-care-report-final-2-14-11
vfa-care-report-final-2-14-11vfa-care-report-final-2-14-11
vfa-care-report-final-2-14-11
 

Similar to Bg36347351

A Simplied Bit-Line Technique for Memory Optimization
A Simplied Bit-Line Technique for Memory OptimizationA Simplied Bit-Line Technique for Memory Optimization
A Simplied Bit-Line Technique for Memory Optimizationijsrd.com
 
Low power flexible_rake_receivers_for_wc
Low power flexible_rake_receivers_for_wcLow power flexible_rake_receivers_for_wc
Low power flexible_rake_receivers_for_wcMd.Akm Sahansha
 
Implementation of High Reliable 6T SRAM Cell Design
Implementation of High Reliable 6T SRAM Cell DesignImplementation of High Reliable 6T SRAM Cell Design
Implementation of High Reliable 6T SRAM Cell Designiosrjce
 
IMPLEMENTATION OF LOW POWER ADIABATIC SRAM
IMPLEMENTATION OF LOW POWER ADIABATIC SRAMIMPLEMENTATION OF LOW POWER ADIABATIC SRAM
IMPLEMENTATION OF LOW POWER ADIABATIC SRAMVLSICS Design
 
IMPLEMENTATION OF LOW POWER ADIABATIC SRAM
IMPLEMENTATION OF LOW POWER ADIABATIC SRAMIMPLEMENTATION OF LOW POWER ADIABATIC SRAM
IMPLEMENTATION OF LOW POWER ADIABATIC SRAMVLSICS Design
 
IMPLEMENTATION OF LOW POWER ADIABATIC SRAM
IMPLEMENTATION OF LOW POWER ADIABATIC SRAMIMPLEMENTATION OF LOW POWER ADIABATIC SRAM
IMPLEMENTATION OF LOW POWER ADIABATIC SRAMVLSICS Design
 
Different Approaches in Energy Efficient Cache Memory
Different Approaches in Energy Efficient Cache MemoryDifferent Approaches in Energy Efficient Cache Memory
Different Approaches in Energy Efficient Cache MemoryDhritiman Halder
 
IRJET- Deisgn of Low Power 16x16 Sram with Adiabatic Logic
IRJET- Deisgn of Low Power 16x16 Sram with Adiabatic LogicIRJET- Deisgn of Low Power 16x16 Sram with Adiabatic Logic
IRJET- Deisgn of Low Power 16x16 Sram with Adiabatic LogicIRJET Journal
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Design & Implementation of Subthreshold Memory Cell design based on the prima...
Design & Implementation of Subthreshold Memory Cell design based on the prima...Design & Implementation of Subthreshold Memory Cell design based on the prima...
Design & Implementation of Subthreshold Memory Cell design based on the prima...IOSRJVSP
 
SRAM BASED IN-MEMORY MATRIX VECTOR MULTIPLIER
SRAM BASED IN-MEMORY MATRIX VECTOR MULTIPLIERSRAM BASED IN-MEMORY MATRIX VECTOR MULTIPLIER
SRAM BASED IN-MEMORY MATRIX VECTOR MULTIPLIERIRJET Journal
 
Implementation of Area Effective Carry Select Adders
Implementation of Area Effective Carry Select AddersImplementation of Area Effective Carry Select Adders
Implementation of Area Effective Carry Select AddersKumar Goud
 
Design And Verification of AMBA APB Protocol
Design And Verification of AMBA APB ProtocolDesign And Verification of AMBA APB Protocol
Design And Verification of AMBA APB ProtocolIJERA Editor
 
Using CMOS Sub-Micron Technology VLSI Implementation of Low Power, High Speed...
Using CMOS Sub-Micron Technology VLSI Implementation of Low Power, High Speed...Using CMOS Sub-Micron Technology VLSI Implementation of Low Power, High Speed...
Using CMOS Sub-Micron Technology VLSI Implementation of Low Power, High Speed...VLSICS Design
 
Using CMOS Sub-Micron Technology VLSI Implementation of Low Power, High Spee...
 Using CMOS Sub-Micron Technology VLSI Implementation of Low Power, High Spee... Using CMOS Sub-Micron Technology VLSI Implementation of Low Power, High Spee...
Using CMOS Sub-Micron Technology VLSI Implementation of Low Power, High Spee...VLSICS Design
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase thePvrtechnologies Nellore
 

Similar to Bg36347351 (20)

A Simplied Bit-Line Technique for Memory Optimization
A Simplied Bit-Line Technique for Memory OptimizationA Simplied Bit-Line Technique for Memory Optimization
A Simplied Bit-Line Technique for Memory Optimization
 
Low power flexible_rake_receivers_for_wc
Low power flexible_rake_receivers_for_wcLow power flexible_rake_receivers_for_wc
Low power flexible_rake_receivers_for_wc
 
Implementation of High Reliable 6T SRAM Cell Design
Implementation of High Reliable 6T SRAM Cell DesignImplementation of High Reliable 6T SRAM Cell Design
Implementation of High Reliable 6T SRAM Cell Design
 
IMPLEMENTATION OF LOW POWER ADIABATIC SRAM
IMPLEMENTATION OF LOW POWER ADIABATIC SRAMIMPLEMENTATION OF LOW POWER ADIABATIC SRAM
IMPLEMENTATION OF LOW POWER ADIABATIC SRAM
 
IMPLEMENTATION OF LOW POWER ADIABATIC SRAM
IMPLEMENTATION OF LOW POWER ADIABATIC SRAMIMPLEMENTATION OF LOW POWER ADIABATIC SRAM
IMPLEMENTATION OF LOW POWER ADIABATIC SRAM
 
IMPLEMENTATION OF LOW POWER ADIABATIC SRAM
IMPLEMENTATION OF LOW POWER ADIABATIC SRAMIMPLEMENTATION OF LOW POWER ADIABATIC SRAM
IMPLEMENTATION OF LOW POWER ADIABATIC SRAM
 
Different Approaches in Energy Efficient Cache Memory
Different Approaches in Energy Efficient Cache MemoryDifferent Approaches in Energy Efficient Cache Memory
Different Approaches in Energy Efficient Cache Memory
 
IRJET- Deisgn of Low Power 16x16 Sram with Adiabatic Logic
IRJET- Deisgn of Low Power 16x16 Sram with Adiabatic LogicIRJET- Deisgn of Low Power 16x16 Sram with Adiabatic Logic
IRJET- Deisgn of Low Power 16x16 Sram with Adiabatic Logic
 
Kj2417641769
Kj2417641769Kj2417641769
Kj2417641769
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Isa bus nptel
Isa bus nptelIsa bus nptel
Isa bus nptel
 
Sram pdf
Sram pdfSram pdf
Sram pdf
 
64 bit sram memory: design paper
64 bit sram memory: design paper64 bit sram memory: design paper
64 bit sram memory: design paper
 
Design & Implementation of Subthreshold Memory Cell design based on the prima...
Design & Implementation of Subthreshold Memory Cell design based on the prima...Design & Implementation of Subthreshold Memory Cell design based on the prima...
Design & Implementation of Subthreshold Memory Cell design based on the prima...
 
SRAM BASED IN-MEMORY MATRIX VECTOR MULTIPLIER
SRAM BASED IN-MEMORY MATRIX VECTOR MULTIPLIERSRAM BASED IN-MEMORY MATRIX VECTOR MULTIPLIER
SRAM BASED IN-MEMORY MATRIX VECTOR MULTIPLIER
 
Implementation of Area Effective Carry Select Adders
Implementation of Area Effective Carry Select AddersImplementation of Area Effective Carry Select Adders
Implementation of Area Effective Carry Select Adders
 
Design And Verification of AMBA APB Protocol
Design And Verification of AMBA APB ProtocolDesign And Verification of AMBA APB Protocol
Design And Verification of AMBA APB Protocol
 
Using CMOS Sub-Micron Technology VLSI Implementation of Low Power, High Speed...
Using CMOS Sub-Micron Technology VLSI Implementation of Low Power, High Speed...Using CMOS Sub-Micron Technology VLSI Implementation of Low Power, High Speed...
Using CMOS Sub-Micron Technology VLSI Implementation of Low Power, High Speed...
 
Using CMOS Sub-Micron Technology VLSI Implementation of Low Power, High Spee...
 Using CMOS Sub-Micron Technology VLSI Implementation of Low Power, High Spee... Using CMOS Sub-Micron Technology VLSI Implementation of Low Power, High Spee...
Using CMOS Sub-Micron Technology VLSI Implementation of Low Power, High Spee...
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase the
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Bg36347351

  • 1. V. Padmaja et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.347-351 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Modelling Of Variation Trained Drowsy Cache V. Padmaja*, D. Kishore ** *(Department of Electronics & Communication Engineering, SRI SAI ADITYA institute of science and technology, Surampalem) ** (Department of Electronics & Communication Engineering, SRI SAI ADITYA institute of science and technology, Surampalem ) ABSTRACT: On-chip caches represent a sizable fraction of the total power consumption of microprocessors. Although large caches can significantly improve performance, they have the potential to increase power consumption. As feature sizes shrink, the dominant component of this power loss will be leakage. However, during a fixed period of time the activity in a cache is only centered on a small subset of the lines. This behavior can be exploited to cut the leakage power of large caches by putting the cold cache lines into a state preserving, low-power drowsy mode. Moving lines into and out of drowsy state incurs a slight performance loss. In this paper we investigate policies and circuit techniques for implementing drowsy caches. We show that with simple architectural techniques, about 80%-90% of the cache lines can be maintained in a drowsy state without affecting performance by more than 1%. According to our projections, in a 0.07um CMOS process, drowsy caches will be able to reduce the total energy (static and dynamic) consumed in the caches by 50%-75%. We also argue that the use of drowsy caches can simplify the design and control of low leakage caches, and avoid the need to completely turn off selected cache lines and lose their state. Index Terms— Cache, drowsy cache, static random access memory (SRAM), AXI protocol I. INTRODUCTION In this paper, we propose a drowsy cache architecture that is aware of process variability within the structure. By using a simple and low cost distributed supply voltage management unit (one for each cache way) our pro-posed architecture allows a majority of the memory cells to operate at a reduced voltage The gap between processor and memory speed continues to widen, cache performance becomes increasingly critical to the overall system performance. Researchers have observed that different program regions may have different access patterns and reuse types, and it is possible to fine -tune the cache management mechanism to exploit the reuse behaviors and achieve a better memory performance. cache schemes proposed previously, the cache selection and the bypass decision are made by the hardware. To use cache mapping to improve program memory performance, we must have a way to estimate the dynamic memory access behavior of the program. Typical applications which run on the Strong ARM and the XScale processors perform multimedia tasks, encryption, and compression, among others The gap between processor and memory speed continues to widen, cache performance becomes increasingly critical to the overall system performance. Researchers have observed that different program regions may have different access patterns and reuse types, and it is possible to fine -tune the cache management mechanism to exploit the reuse www.ijera.com behaviors and achieve a better memory performance. cache schemes proposed previously, the cache selection and the bypass decision are made by the hardware. To use cache mapping to improve program memory performance, we must have a way to estimate the dynamic memory access behaviour of the program. Typical applications which run on the Strong ARM and the XScale processors perform multimedia tasks, encryption, and compression, among others. II. PROPOSED ARCHITECTURE To counter the effect of process variations, typically designers overdrive the entire memory array. This leads to extra power consumption as both leakage and dynamic power increase. We are proposing to use a modified wordline driver peripheral circuit to allow selective wordline overdriving utilizing a small one step charge pump. The wordline peripheral circuit will drive the wordline in two phases. In the first phase, using the supplied Vdd the wordline is driven to Vdd. In the second phase the charge pump will overdrive the wordline voltage increasing the Vgs above the supply Vdd. Increase in Vgs improves both access and write time to the cell as will be described in the following sections DRV for cold lines which are determined by cache access pattern and are managed via the proposed architecture. Cache ways that are supplied with this voltage are referred to as “Cold Ways”. The remaining two voltage levels are used in cache ways located within the Cache Window of 347 | P a g e
  • 2. V. Padmaja et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.347-351 www.ijera.com Execution (CWoE) VddLOW is supplied if cache way Could operate correctly in that voltage, otherwise cache way is supplied with VddHIGH. A 6T SRAM memory, however, can be manufactured in a standard logic process and continues to offer high-performance at a reasonable density and power dissipation. SRAMs will likely remain the dominant on-die memory technology, as SRAM cells have already been demonstrated down to the 32nm technology node. A 6T SRAM cell uses a pair of cross-coupled inverters as its bi-stable storage element with two additional NMOS devices for read and write access (Figure 1). Figure 3. Channel architecture of writes Fig 1. 6T SRAM cell The cells are aggregated into cell arrays to share the decoding and I/O logic. On a read, the decoder raises the wordline (WL) of the desired word. The bitlines (BL and BL b) have been precharged to a reference voltage, and the cell drives a differential current onto the bitlines according to the stored value. The cell current is relatively weak for the bitline capacitance, so to speed the read operation, a sense amplifier in the I/O logic amplifies the bitline differential voltage to produce a full swing logic value. Figure 2 & 3 shows how a read transaction uses the read address and read data channels and how a write transaction uses the write address, write data, and write response channels. A. Channel definition: Each of the five independent channels consists of a set of information signals and uses a twoway VALID and READY handshake mechanism. The information source uses the VALID signal to show when valid data or control information is available on the channel. The destination uses the READY signal to show when it can accept the data. Both the read data channel and the write data channel also include a LAST signal to indicate when the transfer of the final data item within a transaction takes place. I. Read and write address channels: Read and write transactions each have their own address channel. The appropriate address channel carries all of the required address and control information for a transaction. The AXI protocol supports the following mechanisms: • Variable-length bursts, from 1 to 16 data transfers per burst • bursts with a transfer size of 8-1024 bits • Wrapping, incrementing, and nonincrementing bursts • Atomic operations, using exclusive or locked accesses • System-level caching and buffering control • Secure and privileged access. 1.Read data channel: The read data channel conveys both the read data and any read response information from the slave back to the master. The read data channel includes: • The data bus, which can be 8, 16, 32, 64, 128, 256, 512, or 1024 bits wide • A read response indicating the completion status of the read transaction. Figure 2. Channel architecture of reads www.ijera.com 2.Write data channel: The write data channel conveys the write data from the master to the slave and includes: • The data bus, which can be 8, 16, 32, 64, 128, 256, 512, or 1024 bits wide 348 | P a g e
  • 3. V. Padmaja et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.347-351 • One byte lane strobe for every eight data bits, indicating which bytes of the data bus are valid. Write data channel information is always treated as buffered, so that the master can perform write transactions without slave acknowledgement of previous write transactions. B. Basic Transactions: This section gives examples of basic AXI protocol transactions. Each example shows the VALID and READY handshake mechanism. Transfer of either address information or data occurs when both the VALID and READY signals are HIGH. The examples are provided in: 1. www.ijera.com address. This enables a slave to begin processing data for the second burst in parallel with the completion of the first burst. 1.Write burst example: The process starts when the master sends an address and control information on the write address channel. The master then sends each item of write data over the write data channel. When the master sends the last data item, the WLAST signal goes HIGH. When the slave has accepted all the data items, it drives a write response back to the master to indicate that the write transaction is complete. As shown in fig 6. Read burst example: Figure 4. Read burst Figure 4 shows a read burst of four transfers. In this example, the master drives the address, and the slave accepts it one cycle later. The master also drives a set of control signals showing the length and type of the burst, but these signals are omitted from the figure for clarity. After the address appears on the address bus, the data transfer occurs on the read data channel. The slave keeps the VALID signal LOW until the read data is available. For the final data transfer of the burst, the slave asserts the RLAST signal to show that the last data item is being transferred. Figure 6. Write burst III. AXI PROTOCOL AXI is part of ARM AMBA, a family of micro controller buses first introduced in 1996. The first version of AXI was first included in AMBA 3.0, released in 2003. AMBA 4.0, released in 2010, includes the second version of AXI, AXI4. There are three types of AXI4 interfaces:  AXI4-for high-performance memory-mapped requirements.  AXI4-Lite–for simple, low-throughput memory-mapped communication (for example, to and from control and status registers).  AXI4-Stream—for high-speed streaming data. C. AXI4: The AXI4 protocol is an update to AXI3 which is designed to enhance the performance and utilization of the interconnect when used by multiple masters. Figure 5. Overlapping read bursts Figure 5 shows how a master can drive another burst address after the slave accepts the first www.ijera.com D. AXI4-Lite: AXI4-Lite is a subset of the AXI4 protocol intended for communication with simpler, smaller control register-style interfaces in components. The AXI4-Lite IP Interface is a part of the Xilinx family of Advanced RISC Machine (ARM) Advanced Microcontroller Bus Architecture (AMBA) Advanced 349 | P a g e
  • 4. V. Padmaja et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.347-351 extensible Interface (AXI) control interface compatible products. It provides a point-to-point bidirectional interface between a user Intellectual property (IP) core and the AXI interconnect. This version of the AXI4-Lite IP interface has been optimized for slave operation on the AXI. It does not provide support for Direct Memory Access (DMA) and IP Master Services. Features:  Supports 32-bit slave configuration.  Supports read and write data transfers of 32-bit width.  Supports multiple address ranges.  Read has the higher priority over write.  Read to the holes in the address space returns 0*00000000.  Writes to the holes in the address space after the register map are ignored and responded with an OKAY response.  Both AXI and IP Interconnect are little ending. E. AXI4-Stream Protocol: The AXI4-Stream protocol is used for applications that typically focus on a data-centric and data-flow paradigm where the concept of an address is not present or not required. Each AXI4-Stream acts as a single unidirectional channel for a handshake data flow. At this lower level of operation (compared to the memory mapped AXI protocol types), the mechanism to move data between IP is defined and efficient, but there is no unifying address context between IP. The AXI4-Stream IP can be better optimized for performance in data flow applications, but also tends to be more specialized around a given application space. The AXI4-Stream protocol is designed for unidirectional data transfers from master to slave with greatly reduced signal routing. www.ijera.com The AXI protocol supports three different burst types that are suitable for:  normal memory accesses  wrapping cache line bursts  Streaming data to peripheral FIFO locations. 2. System cache support: The cache-support signal of the AXI protocol enables a master to provide to a system-level cache the buffer able, cacheable, and allocate attributes of a transaction. 3. Protection unit support: To enable both privileged and secure accesses, the AXI protocol provides three levels of protection unit support. IV. Fig 8. Cache Enable Cache Disable: Fig 9. Cache Disable V. Fig 7. AXI Protocol CIRCUIT DIAGRAM F. Additional features: The AXI protocol also supports the following additional features: 1. Burst types: www.ijera.com RESULTS Cache Enable: CONCLUSION In this paper we presented a novel architecture for low power and high yielding memory arrays. Proposed approach utilizes a charge pump wordline driver and selectively overdrives the wordlines containing weak cells. This architecture achieves power savings of more that 50% in dynamic, and 60% in leakage power as compared to the traditional architecture running at nominal voltage. Alternatively, when operated at the same voltage as traditional memory it provides an improvement in memory array yield. By using AXI protocol we are sending the data in cache memory. When the data is transferred in to the memory the enable and disable conditions is same. REFERENCES [1] A. Sasan, H. Homayoun, A. Eltawil, and F. J. Kurdahi, “Process variation aware SRAM/cache for aggressive voltage- 350 | P a g e
  • 5. V. Padmaja et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.347-351 [2] [3] [4] [5] [6] [7] www.ijera.com frequency scaling,” in Proc. DATE, pp. 911– 916. A. Sasan (Mohammad AMakhzan), A. Khajeh, A. Eltawil, and F. Kurdahi, “Limits of voltage scaling for caches utilizing fault tolerant techniques,” in Proc. ICCD, pp. 488–495. M. A. Lucente, C. H. Harris, and R. M. Muir, “Memory system reliability improvement through associative cache redundancy,” in Proc. IEEE Custom Integr. Circuits Conf., May 1990, pp. 19.6/1–19.6/4. Z. Bo, D. Blaauw, D. Sylvester, and K. Flautner, “The limit of dynamic voltage scaling and insomniac dynamic voltage scaling,” IEEE Trans.Very Large Scale Integr. (VLSI) Syst., vol. 13, no. 11, pp. 1239–1252,Nov. 2005. K. Flautner, K. Nam Sung, S. Martin, D. Blaauw, and T. Mudge, “Drowsy caches: Simple techniques for reducing leakage power,” in Proc. 29th Annu. Int. Symp. Comput. Arch. , 2002, pp. 148–157. H. Zhou, M. C. Toburen, E. Rotenberg, and T. M. Conte, “Adaptive mode-control: A static-power-efficient cache design,” in Proc. Int. Conf. Parallel Arch. Compilation Techn., 2001, pp. 61–70. A. Agarwal, B. C. Paul, S. Mukho padhyay, and K. Roy, “Process variation in embedded memories: Failure analysis and variation aware architecture,” IEEE Trans. Solid-State Circuits, vol. 40, no. 9, pp. 1804–1814, Sep. 2005. VELUVALI PADMAJA was born on 2ND DECEMBER 1980 at Kakinada, India. She received her, B.Tech in Electronics & Communication Engineering from JNTU KAKINADA, AP, India and Pursuing M.Tech in VLSI at SRI SAI ADITYA institute of science and technology, Surampalem , Peddapuram AP, India. D.KISHORE received his B. Tech in Electronics & Communication Engineering from JNTU KAKINADA IN 2004 and M. Tech degree in COMMUNICATION AND SIGNAL PROCESSING from BAPATLA ENGINEERING COLLEGE,GUNTUR, ACHARYA NAGARJUNA UNIVERSITY, in 2009 and also working as ASSOCIATE PROFESSOR in SRI SAI ADITYA institute of science and technology, Dept of Electronics & Communication Engineering, Surampalem, Peddapuram AP, India. www.ijera.com 351 | P a g e