|
|
|
|
|
|
Figure 5.19
Line access strategies. |
|
|
|
|
|
|
|
|
1. Slow, mininizes cache control (access and fill): |
|
|
|
 |
|
|
|
|
Reference to a line always starts on a line boundary in memory. CPU does not resume untill entire line is placed in cache. |
|
|
|
|
|
|
|
|
2. Fast, or minimum miss time (fetch bypass): |
|
|
|
 |
|
|
|
|
First reference to memory is to the faulted (missed) word. This is forwarded directly to the CPU (and simultaneously to the cache) and processing resumes. The remainder of the line is loaded into the cache as the CPU activity allows. |
|
|
|
|
|
|
|
|
3. Various intermediate strategies are possible. |
|
|
|
|
|
|
|
|
4. Nonblocking caches wherein the processor continues execution so long as the execution does not directly depend on or use the cache data to be fetched. |
|
|
|
|
|