601229 (F21): Task 3: Cache simulator (2023)

  • CSF@JHU
  • Dom
  • study plan
  • Diagram
  • Occupied
  • Sources

601229 (F21): Task 3: Cache simulator

Lang:

  • Milestone 1: Tuesday, October 12 until 23:00 (no late hours)

  • Milestone 2:Thursday 21 OctoberTuesday, October 26 to 23:00 (maximum 48 hours late)

  • Milestone 3:Thursday 28 OctoberTuesday, November 2 until 11 p.m. (up to 48 late hours; more by permission only)

Type of work:Par, you can work with one partner

Use in the late days: Up to 2 days delay (48 hours) without having to apply for a special authorization (both partners must have late days to take advantage). If you expect to use more than 48 hours late, send a private message (to instructors and counselors) to Campuswire asking for permission.

Update 10/11: explain your expectations forreporting invalid cache parameterscompiler options fix

Recognition: This job was originally created byPeter HappyDoits CSF version.

This problem focuses on simulation and estimationcaches. We'll give you sometraces of memoryfrom real comparison programs. You are implementing a programsimulatehow different caches work on these paths. Then use programs and default prompts to figure it outbest overall cache configuration.

Lecture part 1

1 year:Tuesday, October 12 to 23:00 (5 points)

This entry requires you to start working on the code and submit at least one entry to the fileAssessment scope.

It would be a good idea to verify that parsing command line options and reading traces are working properly. It would also be a good idea to set up some basic data structures and functions to perform a real cache simulation, even if they are not fully implemented yet.

Application part 2

Year 2:Thursday, October 21 to 23:00 (15 points)

This entry requires you to implement LRU cache simulation.

Lecture part 3

Year 3:Thursday, October 28 to 23:00 (80 points)

All functions must be written and follow the full command specification.

Evaluation criteria

Milestone results are defined as a combination of effort and cross-functionality. Your final grade is determined as follows:

  • Smooth handling of invalid parameters: 1.5%
  • Accurate load counter: 9%
  • Exact number of stores: 9%
  • Charge accuracy hits: 12.5%
  • Correct loading errors: 12.5%
  • Correct store visit: 12.5%
  • Exact trade deficiencies: 12.5%
  • Accurate total cycles: 5.5%
  • Best cache ratio: 10%
  • Design, coding style and contribution: 10%
  • Effort shown in Milestone 1: 5%

For numeric resultsTotal number of cyclesthe result should be within ±10% while other results should be accurate.

Be sure to followstyle guidelines.

Your program should run without errors or memory leaks. Memory errors such as incorrect read or write, or use of uninitialized memory will result in a maximum of 10 points deduction. A memory leak will result in a maximum of 5 points deduction.

Programming languages

You can use C or C++ for this command. You can usestandardlibrary of the selected language as much as you like, but that's itthis iscan use any additional (custom) library.

One benefit of choosing C++ is that you can use built-in container data structures likecapable of,vectoretc. (Note, however, that it is entirely possible to create a simple and robust implementation of this program using dynamically allocated arrays.) Whatever language you use, we strongly recommend modular, well-designed coding and developing data types and functions to deal with program complexity. Strive for simplicity.

You must have oneCreate a fileCorrect

  • cleanremoves all object files and executables and
  • to dozmake a simcompiles and links your program to create an executable namedas soon as possible

Your code should compile nicely with gcc 7.x- Wall - Wextra - meticuloustranslator flags.Important: yourCreate a file moralityuse these options. if yoursCreate a fileworkthis isIf you compile your code with these options, you will lose all points for design and coding style.

Deel(a): Cache simulator

You design and implement acache simulatorwhich can be used to study and compare the performance of different cache configurations. Your simulator will readmemory access pathsimulate, based on standard input, what the cache would do based on some parameters in response to these memory access patterns, and finally generate some summary statistics on standard output. Let's start with the memory access trace file format:

s 0x1ffffff50 1l 0x1fffff58 1l 0x1fffff88 6l 0x1fffff90 2l 0x1fffff98 2l 0x200000e0 2l 0x200000e8 2l 0x200000f0 2l 0x200000f8 2l 0x3 0 031f10 3s 0x3004d960 0s 0x3004d968 1s 0x3004caa0 1s 0x3004d970 1s 0x3004d980 6l 0x30000008 1l 0x1fffff58 4l 0x3004d978 4l 0 x 1ff fff68 4l 0x1fffff68 2s 0x3004d980 9l 0x30000008 1

As you can see, each memory access performed by the program is logged on a separate line. There are three "boxes" separated by a white space. The first field is eitherlzSdepending on whether the processor is "loading" or "writing" memory. The second field is a 32-bit memory address, shown in hexadecimal; the0xat the beginning means "next hexadecimal" and is not part of the address itself. You canignorethird field for this task.

Note that it must be assumed that each payload or storage in the trace can access no more than 4 bytes of data, and that no payload or storage can access data that spans multiple cache blocks (called "lines").

Your cache simulator is configured with the following cache design parameters given as command line arguments (see below):

  • number of sets in cache (positive power-2)
  • number of blocks in each set (positive power of 2)
  • number of bytes in each block (positive power of 2, minimum 4)
  • write-assignzno write allocation
  • prescribezwrite back
  • lu(least used) orfifoevictions

Note that certain combinations of these design parameters consider directly mapped, assembly-associated, and fully associated caches:

  • a cache with n sets of 1 block each is directly mapped
  • a cache containing n sets of m blocks each being m-set-associated
  • a cache with 1 set of n blocks is fully associative

The smallest cache you should be able to simulate has 1 pool with 1 block of 4 bytes; this cache can only remember one 4 byte memory reference and nothing else; therefore, it can only be useful if successive memory references in the trace go to exactly the same address.You should probably use this small cache for basic health checks.

A few reminders about the other three parameters: Thewrite-assignThe parameter specifies what will happen to acache skippedwhilestore:

  • Dowrite-assignwe cache the appropriate memory blockpastthe trade continues
  • Dono write allocationNo cache when trading spellsthis ischange cache

Please note that this parameter works with the following. TheprescribeThe parameter specifies whether the transactionincessantsaves to memoryimmediatelyor not:

  • Doprescribestore writes to both cache and memory
  • Dowrite backthe store writes to the cacheJustand indicates a blockcompetes; if the block is deleted later, it must be put back into memory before overwriting

Linking doesn't make senseno write allocationSwrite backbecause we couldn't actually cache the store!

The last parameter only applies to associative caches: indirectly allocated caches have no choice of which block to delete!

  • Dolu(least used) remove a block that wasn'tapproachedthe longest
  • Dofifo(first in, first out) we clear the block that was thereto the cachethe longest

Your cache simulator should assume it loads/writes from/to the cacheSomeCPU cycle; loads/saves from/to memory100CPU cyclesCanadian deerAmount to be transferred of 4 bytes. There are many cache items in the processors you usethis isfor example, they must simulate write buffers or clever ways to fill cache blocks; Getting all of the above options right is a bit tricky to implement, so we'll stop there.

We expect to be able to simulate as follows:

./csim 256 4 16 write-assign writeback lru < some trace file

This would simulate a cache of 256 sets of 4 blocks each (also a 4-way associative cache), with each block containing 16 bytes of memory; the cache allocates writes but not writes (so it rewrites instead) and discards the last used block if necessary. (As a side note, this cache has a total size of 16,384 bytes (16KB) if we ignore the space required for tags and other meta information.)

When the simulation is complete, the cache simulator is expected to print the following summary informationExactlythe format given below:

Total loads:graafTotal stores:graafFull of hits:graafCharging errors:graafShop hits:graafThe shop is missing:graafTotal number of cycles:graaf

Zgraafthe value is simply the number of occurrences. As a concrete example, here is an example of a program call on one of the trace examples,gcc.trag:

./csim 256 4 16 write-allocation writeback fifo < gcc.trace

This call should produce the following result:

Total Loads: 318197 Total Writes: 197486 Load Hits: 314171 Load Misses: 4026 Loads Saved: 188047 Write Misses: 9439 Total Cycles: 9845283

Please note that due to slight variations in a reasonable interpretation of the simulator specifications, yourTotal number of cyclesthe value may be a bit on the low side, but should be pretty close. For all other calculations, the simulator output must exactly match the above results.

Mistrongencourage you to use Campuswire to post routes and simulator scores so you can compare your scores with those of other students.

Report invalid cache parameters

Before starting the simulation, the simulator should check that the simulation parameters are reasonable. Examples of invalid configuration parameters include, but are not limited to:

  • block size is not a power of 2
  • the number of series is not a power of 2
  • block size is less than 4
  • write backIno write allocationboth are listed

If the configuration parameters are incorrect, the program should be

  1. Print an error messagestderrzstd::cerr, I
  2. Exit with a non-zero exit code

Sample hints

Here are some tips you can use for testing and empirical evaluation:

  • gcc.trag
  • lees01.track
  • lees02.trag
  • lees03.trag
  • swimming. path
  • write01.path
  • write 02.track

gcc.tragIswimming. pathare traces of real programs, so you should consider using them in your empirical evaluation.

Tips

Your simulation only handles hits and misses, you don't need it at any pointTruecached data; therefore, the trace files do not contain this information at all.

Don't try to implement all the options at once, but start writing a simulator that can only run directly mapped caches with write and non-write maps. Once that works, extend it step by step to make the rest of the design parameters work. Also regularly check out the sound simulator with simple handcrafted tracks from which you can still manually deduce what the behavior should be.

Please note that the correct number of cycles is only 6% of the total number of orders. Before you worry too much about counting cycles, make sure your loads and inventory are modeled correctly with the exact number of hits.

Part (b): Best Cache, Contribution

In part (b), you use both memory traces and a simulator to determine what cache configuration it hasbest overall performance. There are several properties to consider: hit rate, miss penalties, total cache size (including overhead), etc.LEESMIJ.txt, describe in detail what experiments you did (and why!), what results you got (and how!), and what you think is the best cache configuration of all.

Finally, write a short summary of how you divided the work between partners and what each person contributed. This part is not necessary if you are working alone.

Profits

The memory traces above are from a similar programming task conducted by Steven Swanson at the University of California, San Diego. Thank you Steven!

coercion

For each milestone entry, create a ZIP file containing your entryCreate a file, source and header files, andLEESMIJ.txtfile. All files must be in the top-level folder of the zip file. For example, if the zip file is nameddodijeliti3.zip, Positionunzip -l toewijzing3.zipcan generate the following output:

Archive: permission3.zip Length Date Time Name------------ ---------- ----- ---- 15225 2020-02-25 12:27 main .c 149 2020-02-25 12:27 Makefile 12075 2020-02-25 12:28 README.txt------------ ------- 27449 3 files

The exact output will almost certainly vary depending on the structure of the cache simulator.

Upload your zip file toAssessment scopeIfTask 3 MS1,Task 3 MS2, zTask 3 MS3if necessary (depending on the milestone).

References

Top Articles
Latest Posts
Article information

Author: Clemencia Bogisich Ret

Last Updated: 08/29/2023

Views: 6065

Rating: 5 / 5 (60 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Clemencia Bogisich Ret

Birthday: 2001-07-17

Address: Suite 794 53887 Geri Spring, West Cristentown, KY 54855

Phone: +5934435460663

Job: Central Hospitality Director

Hobby: Yoga, Electronics, Rafting, Lockpicking, Inline skating, Puzzles, scrapbook

Introduction: My name is Clemencia Bogisich Ret, I am a super, outstanding, graceful, friendly, vast, comfortable, agreeable person who loves writing and wants to share my knowledge and understanding with you.