IRJET- A Survey on Encode-Compare and Decode-Compare Architecture for Tag Matching in Cache Memory using Error Correcting Codes

IRJET Journal
IRJET JournalFast Track Publications

https://www.irjet.net/archives/V6/i3/IRJET-V6I3889.pdf

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7573
A SURVEY ON ENCODE-COMPARE AND DECODE-COMPARE
ARCHITECTURE FOR TAG MATCHING IN CACHE MEMORY USING ERROR
CORRECTING CODES
K.L. Deepa priya1, V. Chandrasekaran2, M. Parimala Devi3, S. Pavithra4
1. Second Year- M.E. (Applied Electronics), Velalar College of Engineering and Technology, Erode, Tamil Nadu,
India.
2. Professor and HOD, Medical Electronics department, Velalar College of Engineering and Technology, Erode,
Tamil Nadu, India.
3,4. Assistant Professor (Sl.Gr.), Department of ECE, Velalar College of Engineering and Technology, Erode, Tamil
Nadu, India.
------------------------------------------------------------------------------***---------------------------------------------------------------------------
Abstract- Modern microprocessor performance will be
improved, if the cache memories serve as accelerators. Due
to technology scaling, caches are unarmed to soft errors.
In tag matching cache, there are different types of
architectures used and they are encode-compare
architecture and decode-compare architecture based on
direct compare method. This paper compares the encode-
compare and decode-compare architecture using various
performance metrics.
Keywords:
Tag matching, Cache memory, Hamming
distance, Error correcting codes, Translation Look aside
Buffer (TLB).
1. INTRODUCTION
In cache tag matching, currently microprocessor
caches are set-associative caches. A set associative cache
has a tag directory and a data array. The tag directory
stores tag addresses which are used to indicate which
part of memory is stored in the data array. When an
access is made to the cache, the set-address portion of
the entire address is used to index into the tag directory
and a set of tags (the number of tags read depends on the
associativity) are read.
These tags are compared with the tag field of the
incoming address to see if there is a match. When the
entry is valid and a retrieved tag matches the incoming
address tag field, then there is a “cache hit”. If the
incoming address tag field does not match with any of
the stored tag, a “cache miss” happens.
Hamming code is one of the popular techniques
based on forward error correction [1]. The recent
computer employs Error-Correcting codes (ECC) to
protect data and improve reliability [2]-[5]. Error
detection is that the detection of errors caused by noise
or different impairments throughout transmission from
the transmitter to the receiver.
Error correction is that the detection of errors and
reconstruction of the initial, error-free data. Good error
management performance needs the theme to support
the characteristics of the communication.
Common channel models embrace memory-less
models wherever errors occur willy-nilly and with a
particular chance and dynamic models wherever errors
occur primarily in bursts.
Consequently, error-detecting and correcting codes
are often typically distinguished between random-error-
detecting/correcting and burst-error-
detecting/correcting. Some codes may also be
appropriate for a mix of random errors and burst errors.
When the data rate cannot be determined or it is
highly variable, an error-detection scheme may be
combined with a system for retransmission of erroneous
data. This is referred to as Automatic Repeat Request
(ARQ) and is most notably utilized in the web.
An alternate approach to error control is a Hybrid
Automatic Repeat Request (HARQ), which is a
combination of ARQ and error-correction coding.
Error-Correcting Codes area unit sometimes
distinguished between convolutional codes and block
codes:
 Convolutional codes are processed on bit-
by-bit basis. They are significantly
appropriate for implementation in
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7574
hardware and therefore the Viterbi decoder
permits best secret writing.
 Block codes are processed on block-by-
block basis. Repetition codes, hamming
codes and multi-dimensional parity-check
codes are the early examples of Block codes.
They were followed by variety of
economical codes, Reed–Solomon codes
being the most notable due to their current
widespread use. Turbo codes and Low-
Density Parity-check Codes (LDPC) area unit
comparatively new constructions that may
offer nearly best potency.
2. BASIC DEFINITIONS
2.1 Hamming distance
The Hamming distance between 2 strings of
equal length is that the range of positions at that the
corresponding symbols square measure totally different.
In a different way, it measures the minimum
range of substitutions needed to vary one string into the
opposite or the minimum range of errors that would
have reworked one string into the other.
Examples
The Hamming distance between:
 "Karolin" and "Kathrin" is 3.
 "Karolin" and "Kerstin" is 3.
 1011101 and 1001001 is 2.
 2173896 and 2233796 is 3.
2.2 Saturation adder
Saturation adder could be a version of
arithmetic during which all operations like addition and
multiplication are restricted to a set vary between a
minimum and most worth.
For example, if the valid vary of values is from -100
to one hundred, the subsequent operations manufacture
the subsequent values:
 60 + 30 = 90
 60 + 43 = 100
Figure 1 shows the (4, 2) saturation adder diagram.
Fig-1: (4,2) Saturation Adder
By logic reduction, the logic equation for this (4,
2) saturating adder is given by,
Carry=Ca +Cb+SaSb
Sum=Sa +Sb+CaSa+CbSb
2.3 Encoder
A simple encoder circuit can receive a single
active input out of 2n input lines and generate binary
code on n parallel output lines. For example, single bit 4
to 2 encoder takes in 4 bits and outputs 2 bits and it is
shown in Figure 2.
Fig-2: 4 to 2 Encoder
2.4 Decoder
It is a combinational circuit that converts the
binary information from n input lines to a maximum of
2n unique output lines and it is shown in Figure 3.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7575
Fig-3: 2 to 4 Decoder
3. ENCODE AND COMPARE
ARCHITECTURE
Decoding takes longer time than secret writing
because it encompasses a series of error detection or
syndrome calculation and error correction. To resolve
the drawbacks of the decode and compare architecture,
the decoding of a retrieved codeword is replaced with
the encoding of an incoming tag in the encode-and-
compare architecture as shown in Figure 4.
More precisely, a k-bit incoming tag is first
encoded in the corresponding n-bit codeword and
compared with the retrieved codeword as shown in
Figure 4.
Fig -4: Encode and Compare Architecture
The comparison is to look at what number bits
the 2 codewords dissent, not to check if the two
codewords are exactly equal to each other. For this, there
is a tendency to work out the overacting distance d
between the 2 codewords and classify the cases
consistent with the distance of ‘d’.
Let tmax and rmax denote the numbers of maximally
correctable and detectable errors, respectively. The
cases are summarized as follows.
 If d = 0, X matches Y exactly.
 If 0 <d ≤ tmax, X will match Y provided at most
tmax errors in Y are corrected.
 If tmax<d ≤ rmax, Y has detectable but
uncorrectable errors. In this case, the cache may
issue a system fault, so as to make the central
processing unit take a proper action.
 If rmax<d, X does not match Y
Assuming that the incoming address has no errors, 2
tags are regarded as matched if ‘d’ is in either the
primary or the second ranges. In this way, while
maintaining the error-correcting capability, the
architecture can remove the decoder from its critical
path at the cost of an encoder being newly introduced.
Note that the encoder is, in general, much simpler
than the decoder, and thus the encoding cost is
significantly less than the decoding cost.
Since the above method needs to compute the
Hamming distance, presented a circuit dedicated to the
computation.
Fig -5: SA based architecture supporting the direct
compare method
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7576
The circuit shown in Figure 5 performs XOR
operations for each try of bits in X and Y thus on
generate a vector representing the bitwise distinction of
two codewords. The following half adder (HA) is used to
count the number of 1’s in two adjacent bits in the
vector.
The numbers of 1’s is accumulated by passing
through the following SA tree [6]. In the SA tree, the
accumulated value z is saturated to rmax+ 1 if it exceeds
rmax. More precisely, given inputs x and y, z can be
expressed as follows:
{ (1)
The final accumulated value indicates the range of d.
As the compulsory saturation necessitates additional
logic circuitry, the complexity of a SA is higher than the
conventional adder.
4. DECODE AND COMPARE
ARCHITECTURE
A cache memory is considered where a k-bit tag is
stored in the form of an-bit codeword after being
encoded with a (n, k) code. In the decode-and-compare
architecture, the n-bit retrieved codeword should first be
decoded to extract the original k-bit tag. The extracted k-
bit tag is then compared to the k-bit tag field of an
incoming address to determine whether the tags are
matched or not.
Fig -6: Decode and Compare Architecture
As the retrieved codeword should go through the
decoder before being compared with the incoming tag,
the critical path is too long to be employed in a practical
cache system designed for high-speed access. Since the
decoder is one of the most complicated processing
elements, in addition, the complexity overhead is not
negligible. The decode compare architecture [8] is shown
in Figure 6.
5. DISCUSSION
Results are discussed in the table shown below.
6. CONCLUSION
Decoder is complex than encoder and the complexity
overhead is not negligible. Decoding cost is more than
encoding cost. Decoder will increase the critical path for
high speed access.
Encoder is simpler than decoder and the complexity
overhead is negligible. In Encode-compare architecture,
the decoder is removed by introducing an encoder.
Encoding cost is significantly less than decoding cost.
Comparing encoder and decoder architecture,
encoder architecture is the most efficient one and it has
less complexity and less cost.
REFERENCES
[1] Aswathi D and Keerthi Sahadevan, “An Efficient
Low Complexity Low Latency Architecture for
Matching of Data Encoded with Error Correcting
Code Using a Cache Memory”, Int. Journal of
Engineering Research and Application, Vol. 6,
Issue 10, (Part -3) October 2016, pp.82-85.
ENCODE-COMPARE
ARCHITECTURE
DECODE-COMPARE
ARCHITECTURE
Encoder is simpler than
decoder
Decoder is complex than
encoder
TheComplexity
overhead is negligible.
The Complexity
overhead is not
negligible.
In encode-compare
architecture, the
decoder is removed by
introducing an encoder.
For high speed access,
the decoder will
increase the critical
path.
Encoding cost is
significantly less.
Decoding cost is more.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7577
[2] Chang, J., Huang, M., Shoemaker, J., Benoit, J.,
Chen, S.L., Chen,W., Chiu, S., Ganesan, R., Leong,
G., Lukka, V., Rusu, S. and Srivastava, D.
(2007),''The 65-nm 16-MB shared on-die L3
cache for the dual-core Intel xeon Processor
7100 series'', IEEE J. Solid-state Circuits, Vol. 42,
No. 4, pp. 846–852.
[3] Warnock, J.D., Chan, Y. H., Carey, S.M., Wen, H.,
Meaney, P.J., Gerwig, G., Smith, H.H., Chan, Y.H.,
Davis, J., Bunce, P., Pelella, A., Rodko, D., Patel, P.,
Strach, T., Malone, D., Malgioglio, F., Neves, J.,
Rude, D.L. and Huott, W.V. (2012), ''Circuit and
physical design implementation of the
microprocessor chip for the
Enterprisesystem'',IEEE J. Solid-state Circuits,
Vol. 47, No. 1, pp. 151–163.
[4] Ando, H., Yoshida, Y., Inoue, A., Sugiyama, I.,
Asakawa, T., Morita, K., Muta, T. And
Motokurumada, T., Okada, S., Yamashita, H., and
Satsukawa, Y. (2003), '' A 1.3 GHz fifth
generation SPARC64
microprocessor'',IEEEISSCC. Dig. Tech. Papers,
pp. 246–247.
[5] Tremblay and M. Andchaudhry, S. (2008), ''A
third-generation 65nm 16-core 32-thread plus
32-Scout-thread CMT SPARC processor. ISSCC.
Dig. Tech. Papers, pp. 82–83.
[6] Wu, W., Somasekhar, D. and Lu, S.L. (2012),
''Direct compare of information coded with
error-correcting codes'', IEEE Trans. Very Large
Scale Integr. (VLSI) Syst., Vol. 20, No. 11, pp.
2147–2151.
[7] Pedro Reviriego, Salvatore Pontarelli, Juan
Antonio Maestro, and Marco Ottavi (2013), ''A
Method to Construct Low Delay Single Error
Correction Codes for Protecting Data Bits Only'',
IEEE Transactions on Computer-Aided Design of
Integrated Circuits and Systems, Vol. 32, No. 3.
[8] Mary Francy Joseph and Anith Mohan (2016),
''Improved Architecture for Tag Matching in
Cache memory Coded with Error Correcting
Codes'', Global Colloquium in Recent
Advancement and Effectual Researches in
Engineering, Science and Technology (RAEREST
2016), pp.544 – 551.

Recomendados

Implementation of error correcting methods to the asynchronous Delay Insensit... von
Implementation of error correcting methods to the asynchronous Delay Insensit...Implementation of error correcting methods to the asynchronous Delay Insensit...
Implementation of error correcting methods to the asynchronous Delay Insensit...IOSR Journals
270 views8 Folien
Performance Comparision of Coded and Un-Coded OFDM for Different Fic Code von
Performance Comparision of Coded and Un-Coded OFDM for Different Fic CodePerformance Comparision of Coded and Un-Coded OFDM for Different Fic Code
Performance Comparision of Coded and Un-Coded OFDM for Different Fic CodeIJERA Editor
258 views5 Folien
Performance analysis of new binary orthogonal codes for ds cdma communicat von
Performance analysis of new binary orthogonal codes for ds cdma communicatPerformance analysis of new binary orthogonal codes for ds cdma communicat
Performance analysis of new binary orthogonal codes for ds cdma communicatIAEME Publication
484 views7 Folien
C04922125 von
C04922125C04922125
C04922125IOSR-JEN
278 views5 Folien
Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-... von
Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...
Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...IJERA Editor
36 views5 Folien
40120140505011 von
4012014050501140120140505011
40120140505011IAEME Publication
227 views5 Folien

Más contenido relacionado

Was ist angesagt?

A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de... von
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...eSAT Journals
121 views6 Folien
Fpga implementation of linear ldpc encoder von
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encodereSAT Journals
188 views6 Folien
International Journal of Engineering Research and Development (IJERD) von
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
335 views4 Folien
Combining cryptography with channel coding to reduce complicity von
Combining cryptography with channel coding to reduce complicityCombining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicityIAEME Publication
555 views6 Folien
Fpga implementation of linear ldpc encoder von
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encodereSAT Publishing House
351 views6 Folien
IRJET- Review Paper on Study of Various Interleavers and their Significance von
IRJET- Review Paper on Study of Various Interleavers and their SignificanceIRJET- Review Paper on Study of Various Interleavers and their Significance
IRJET- Review Paper on Study of Various Interleavers and their SignificanceIRJET Journal
57 views5 Folien

Was ist angesagt?(20)

A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de... von eSAT Journals
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
eSAT Journals121 views
Fpga implementation of linear ldpc encoder von eSAT Journals
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoder
eSAT Journals188 views
International Journal of Engineering Research and Development (IJERD) von IJERD Editor
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor335 views
Combining cryptography with channel coding to reduce complicity von IAEME Publication
Combining cryptography with channel coding to reduce complicityCombining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicity
IAEME Publication555 views
IRJET- Review Paper on Study of Various Interleavers and their Significance von IRJET Journal
IRJET- Review Paper on Study of Various Interleavers and their SignificanceIRJET- Review Paper on Study of Various Interleavers and their Significance
IRJET- Review Paper on Study of Various Interleavers and their Significance
IRJET Journal57 views
Modified Golomb Code For Integer Representation von IJSRD
Modified Golomb Code For Integer RepresentationModified Golomb Code For Integer Representation
Modified Golomb Code For Integer Representation
IJSRD 277 views
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term... von IJERA Editor
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
IJERA Editor77 views
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb... von TELKOMNIKA JOURNAL
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...
Welcome to International Journal of Engineering Research and Development (IJERD) von IJERD Editor
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor358 views
Design and implementation of log domain decoder von IJECEIAES
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder
IJECEIAES31 views
IRJET- Two Layer QR Code with Picture Embedding von IRJET Journal
IRJET-  	  Two Layer QR Code with Picture EmbeddingIRJET-  	  Two Layer QR Code with Picture Embedding
IRJET- Two Layer QR Code with Picture Embedding
IRJET Journal2 views
MODIFIED GOLDEN CODES FOR IMPROVED ERROR RATES THROUGH LOW COMPLEX SPHERE DEC... von cscpconf
MODIFIED GOLDEN CODES FOR IMPROVED ERROR RATES THROUGH LOW COMPLEX SPHERE DEC...MODIFIED GOLDEN CODES FOR IMPROVED ERROR RATES THROUGH LOW COMPLEX SPHERE DEC...
MODIFIED GOLDEN CODES FOR IMPROVED ERROR RATES THROUGH LOW COMPLEX SPHERE DEC...
cscpconf41 views
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes von idescitation
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC CodesPerformance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
idescitation918 views
Iisrt jona priyaa(1 5) von IISRT
Iisrt jona priyaa(1 5)Iisrt jona priyaa(1 5)
Iisrt jona priyaa(1 5)
IISRT286 views

Similar a IRJET- A Survey on Encode-Compare and Decode-Compare Architecture for Tag Matching in Cache Memory using Error Correcting Codes

E010422834 von
E010422834E010422834
E010422834IOSR Journals
141 views7 Folien
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES von
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct_journal
46 views8 Folien
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES von
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct
14 views8 Folien
Turbo encoder and decoder chip design and FPGA device analysis for communicat... von
Turbo encoder and decoder chip design and FPGA device analysis for communicat...Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...International Journal of Reconfigurable and Embedded Systems
8 views12 Folien
Reed Solomon Coding For Error Detection and Correction von
Reed Solomon Coding For Error Detection and CorrectionReed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and Correctioninventionjournals
300 views5 Folien
New Structure of Channel Coding: Serial Concatenation of Polar Codes von
New Structure of Channel Coding: Serial Concatenation of Polar CodesNew Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar Codesijwmn
2 views11 Folien

Similar a IRJET- A Survey on Encode-Compare and Decode-Compare Architecture for Tag Matching in Cache Memory using Error Correcting Codes(20)

CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES von ijmnct_journal
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
ijmnct_journal46 views
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES von ijmnct
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
ijmnct14 views
Reed Solomon Coding For Error Detection and Correction von inventionjournals
Reed Solomon Coding For Error Detection and CorrectionReed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and Correction
inventionjournals300 views
New Structure of Channel Coding: Serial Concatenation of Polar Codes von ijwmn
New Structure of Channel Coding: Serial Concatenation of Polar CodesNew Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar Codes
ijwmn2 views
New Structure of Channel Coding: Serial Concatenation of Polar Codes von ijwmn
New Structure of Channel Coding: Serial Concatenation of Polar CodesNew Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar Codes
ijwmn5 views
Simulation of Turbo Convolutional Codes for Deep Space Mission von IJERA Editor
Simulation of Turbo Convolutional Codes for Deep Space MissionSimulation of Turbo Convolutional Codes for Deep Space Mission
Simulation of Turbo Convolutional Codes for Deep Space Mission
IJERA Editor372 views
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation von MangaiK4
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
MangaiK43 views
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation von MangaiK4
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
MangaiK42 views
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ... von IRJET Journal
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
IRJET Journal28 views
Fpga implementation of (15,7) bch encoder and decoder for text message von eSAT Journals
Fpga implementation of (15,7) bch encoder and decoder for text messageFpga implementation of (15,7) bch encoder and decoder for text message
Fpga implementation of (15,7) bch encoder and decoder for text message
eSAT Journals508 views
Design and Implementation of DMC for Memory Reliability Enhancement von IRJET Journal
Design and Implementation of DMC for Memory Reliability EnhancementDesign and Implementation of DMC for Memory Reliability Enhancement
Design and Implementation of DMC for Memory Reliability Enhancement
IRJET Journal39 views
IRJET-Error Detection and Correction using Turbo Codes von IRJET Journal
IRJET-Error Detection and Correction using Turbo CodesIRJET-Error Detection and Correction using Turbo Codes
IRJET-Error Detection and Correction using Turbo Codes
IRJET Journal26 views
International Journal of Computational Engineering Research(IJCER) von ijceronline
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline219 views
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories von IJERA Editor
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital MemoriesAn Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
IJERA Editor234 views
FPGA Implementation of Soft Output Viterbi Algorithm Using Memoryless Hybrid ... von VLSICS Design
FPGA Implementation of Soft Output Viterbi Algorithm Using Memoryless Hybrid ...FPGA Implementation of Soft Output Viterbi Algorithm Using Memoryless Hybrid ...
FPGA Implementation of Soft Output Viterbi Algorithm Using Memoryless Hybrid ...
VLSICS Design36 views

Más de IRJET Journal

SOIL STABILIZATION USING WASTE FIBER MATERIAL von
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIALIRJET Journal
27 views7 Folien
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... von
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...IRJET Journal
8 views7 Folien
Identification, Discrimination and Classification of Cotton Crop by Using Mul... von
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...IRJET Journal
8 views5 Folien
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... von
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...IRJET Journal
13 views11 Folien
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... von
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...IRJET Journal
14 views6 Folien
Performance Analysis of Aerodynamic Design for Wind Turbine Blade von
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine BladeIRJET Journal
7 views5 Folien

Más de IRJET Journal(20)

SOIL STABILIZATION USING WASTE FIBER MATERIAL von IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal27 views
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... von IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal8 views
Identification, Discrimination and Classification of Cotton Crop by Using Mul... von IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal8 views
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... von IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal13 views
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... von IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal14 views
Performance Analysis of Aerodynamic Design for Wind Turbine Blade von IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal7 views
Heart Failure Prediction using Different Machine Learning Techniques von IRJET Journal
Heart Failure Prediction using Different Machine Learning TechniquesHeart Failure Prediction using Different Machine Learning Techniques
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal7 views
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel von IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic PanelExperimental Investigation of Solar Hot Case Based on Photovoltaic Panel
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal3 views
Metro Development and Pedestrian Concerns von IRJET Journal
Metro Development and Pedestrian ConcernsMetro Development and Pedestrian Concerns
Metro Development and Pedestrian Concerns
IRJET Journal2 views
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... von IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal3 views
Data Analytics and Artificial Intelligence in Healthcare Industry von IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare IndustryData Analytics and Artificial Intelligence in Healthcare Industry
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal3 views
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... von IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal64 views
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... von IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal12 views
Development of Effective Tomato Package for Post-Harvest Preservation von IRJET Journal
Development of Effective Tomato Package for Post-Harvest PreservationDevelopment of Effective Tomato Package for Post-Harvest Preservation
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal4 views
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” von IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal5 views
Understanding the Nature of Consciousness with AI von IRJET Journal
Understanding the Nature of Consciousness with AIUnderstanding the Nature of Consciousness with AI
Understanding the Nature of Consciousness with AI
IRJET Journal12 views
Augmented Reality App for Location based Exploration at JNTUK Kakinada von IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK KakinadaAugmented Reality App for Location based Exploration at JNTUK Kakinada
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal6 views
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... von IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal18 views
Enhancing Real Time Communication and Efficiency With Websocket von IRJET Journal
Enhancing Real Time Communication and Efficiency With WebsocketEnhancing Real Time Communication and Efficiency With Websocket
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal5 views
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... von IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal4 views

Último

Basic Design Flow for Field Programmable Gate Arrays von
Basic Design Flow for Field Programmable Gate ArraysBasic Design Flow for Field Programmable Gate Arrays
Basic Design Flow for Field Programmable Gate ArraysUsha Mehta
10 views21 Folien
Renewal Projects in Seismic Construction von
Renewal Projects in Seismic ConstructionRenewal Projects in Seismic Construction
Renewal Projects in Seismic ConstructionEngineering & Seismic Construction
8 views8 Folien
Plant Design Report-Oil Refinery.pdf von
Plant Design Report-Oil Refinery.pdfPlant Design Report-Oil Refinery.pdf
Plant Design Report-Oil Refinery.pdfSafeen Yaseen Ja'far
9 views10 Folien
AWS Certified Solutions Architect Associate Exam Guide_published .pdf von
AWS Certified Solutions Architect Associate Exam Guide_published .pdfAWS Certified Solutions Architect Associate Exam Guide_published .pdf
AWS Certified Solutions Architect Associate Exam Guide_published .pdfKiran Kumar Malik
6 views121 Folien
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx von
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptxlwang78
314 views19 Folien
GPS Survery Presentation/ Slides von
GPS Survery Presentation/ SlidesGPS Survery Presentation/ Slides
GPS Survery Presentation/ SlidesOmarFarukEmon1
7 views13 Folien

Último(20)

Basic Design Flow for Field Programmable Gate Arrays von Usha Mehta
Basic Design Flow for Field Programmable Gate ArraysBasic Design Flow for Field Programmable Gate Arrays
Basic Design Flow for Field Programmable Gate Arrays
Usha Mehta10 views
AWS Certified Solutions Architect Associate Exam Guide_published .pdf von Kiran Kumar Malik
AWS Certified Solutions Architect Associate Exam Guide_published .pdfAWS Certified Solutions Architect Associate Exam Guide_published .pdf
AWS Certified Solutions Architect Associate Exam Guide_published .pdf
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx von lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang78314 views
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... von csegroupvn
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn16 views
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf von AlhamduKure
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdfASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
AlhamduKure10 views
Web Dev Session 1.pptx von VedVekhande
Web Dev Session 1.pptxWeb Dev Session 1.pptx
Web Dev Session 1.pptx
VedVekhande23 views
Integrating Sustainable Development Goals (SDGs) in School Education von SheetalTank1
Integrating Sustainable Development Goals (SDGs) in School EducationIntegrating Sustainable Development Goals (SDGs) in School Education
Integrating Sustainable Development Goals (SDGs) in School Education
SheetalTank113 views
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R... von IJCNCJournal
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
IJCNCJournal5 views
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth von Innomantra
BCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for GrowthBCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for Growth
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth
Innomantra 22 views
Créativité dans le design mécanique à l’aide de l’optimisation topologique von LIEGE CREATIVE
Créativité dans le design mécanique à l’aide de l’optimisation topologiqueCréativité dans le design mécanique à l’aide de l’optimisation topologique
Créativité dans le design mécanique à l’aide de l’optimisation topologique
LIEGE CREATIVE9 views
Programmable Logic Devices : SPLD and CPLD von Usha Mehta
Programmable Logic Devices : SPLD and CPLDProgrammable Logic Devices : SPLD and CPLD
Programmable Logic Devices : SPLD and CPLD
Usha Mehta27 views
MongoDB.pdf von ArthyR3
MongoDB.pdfMongoDB.pdf
MongoDB.pdf
ArthyR351 views
IRJET-Productivity Enhancement Using Method Study.pdf von SahilBavdhankar
IRJET-Productivity Enhancement Using Method Study.pdfIRJET-Productivity Enhancement Using Method Study.pdf
IRJET-Productivity Enhancement Using Method Study.pdf
SahilBavdhankar10 views

IRJET- A Survey on Encode-Compare and Decode-Compare Architecture for Tag Matching in Cache Memory using Error Correcting Codes

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7573 A SURVEY ON ENCODE-COMPARE AND DECODE-COMPARE ARCHITECTURE FOR TAG MATCHING IN CACHE MEMORY USING ERROR CORRECTING CODES K.L. Deepa priya1, V. Chandrasekaran2, M. Parimala Devi3, S. Pavithra4 1. Second Year- M.E. (Applied Electronics), Velalar College of Engineering and Technology, Erode, Tamil Nadu, India. 2. Professor and HOD, Medical Electronics department, Velalar College of Engineering and Technology, Erode, Tamil Nadu, India. 3,4. Assistant Professor (Sl.Gr.), Department of ECE, Velalar College of Engineering and Technology, Erode, Tamil Nadu, India. ------------------------------------------------------------------------------***--------------------------------------------------------------------------- Abstract- Modern microprocessor performance will be improved, if the cache memories serve as accelerators. Due to technology scaling, caches are unarmed to soft errors. In tag matching cache, there are different types of architectures used and they are encode-compare architecture and decode-compare architecture based on direct compare method. This paper compares the encode- compare and decode-compare architecture using various performance metrics. Keywords: Tag matching, Cache memory, Hamming distance, Error correcting codes, Translation Look aside Buffer (TLB). 1. INTRODUCTION In cache tag matching, currently microprocessor caches are set-associative caches. A set associative cache has a tag directory and a data array. The tag directory stores tag addresses which are used to indicate which part of memory is stored in the data array. When an access is made to the cache, the set-address portion of the entire address is used to index into the tag directory and a set of tags (the number of tags read depends on the associativity) are read. These tags are compared with the tag field of the incoming address to see if there is a match. When the entry is valid and a retrieved tag matches the incoming address tag field, then there is a “cache hit”. If the incoming address tag field does not match with any of the stored tag, a “cache miss” happens. Hamming code is one of the popular techniques based on forward error correction [1]. The recent computer employs Error-Correcting codes (ECC) to protect data and improve reliability [2]-[5]. Error detection is that the detection of errors caused by noise or different impairments throughout transmission from the transmitter to the receiver. Error correction is that the detection of errors and reconstruction of the initial, error-free data. Good error management performance needs the theme to support the characteristics of the communication. Common channel models embrace memory-less models wherever errors occur willy-nilly and with a particular chance and dynamic models wherever errors occur primarily in bursts. Consequently, error-detecting and correcting codes are often typically distinguished between random-error- detecting/correcting and burst-error- detecting/correcting. Some codes may also be appropriate for a mix of random errors and burst errors. When the data rate cannot be determined or it is highly variable, an error-detection scheme may be combined with a system for retransmission of erroneous data. This is referred to as Automatic Repeat Request (ARQ) and is most notably utilized in the web. An alternate approach to error control is a Hybrid Automatic Repeat Request (HARQ), which is a combination of ARQ and error-correction coding. Error-Correcting Codes area unit sometimes distinguished between convolutional codes and block codes:  Convolutional codes are processed on bit- by-bit basis. They are significantly appropriate for implementation in
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7574 hardware and therefore the Viterbi decoder permits best secret writing.  Block codes are processed on block-by- block basis. Repetition codes, hamming codes and multi-dimensional parity-check codes are the early examples of Block codes. They were followed by variety of economical codes, Reed–Solomon codes being the most notable due to their current widespread use. Turbo codes and Low- Density Parity-check Codes (LDPC) area unit comparatively new constructions that may offer nearly best potency. 2. BASIC DEFINITIONS 2.1 Hamming distance The Hamming distance between 2 strings of equal length is that the range of positions at that the corresponding symbols square measure totally different. In a different way, it measures the minimum range of substitutions needed to vary one string into the opposite or the minimum range of errors that would have reworked one string into the other. Examples The Hamming distance between:  "Karolin" and "Kathrin" is 3.  "Karolin" and "Kerstin" is 3.  1011101 and 1001001 is 2.  2173896 and 2233796 is 3. 2.2 Saturation adder Saturation adder could be a version of arithmetic during which all operations like addition and multiplication are restricted to a set vary between a minimum and most worth. For example, if the valid vary of values is from -100 to one hundred, the subsequent operations manufacture the subsequent values:  60 + 30 = 90  60 + 43 = 100 Figure 1 shows the (4, 2) saturation adder diagram. Fig-1: (4,2) Saturation Adder By logic reduction, the logic equation for this (4, 2) saturating adder is given by, Carry=Ca +Cb+SaSb Sum=Sa +Sb+CaSa+CbSb 2.3 Encoder A simple encoder circuit can receive a single active input out of 2n input lines and generate binary code on n parallel output lines. For example, single bit 4 to 2 encoder takes in 4 bits and outputs 2 bits and it is shown in Figure 2. Fig-2: 4 to 2 Encoder 2.4 Decoder It is a combinational circuit that converts the binary information from n input lines to a maximum of 2n unique output lines and it is shown in Figure 3.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7575 Fig-3: 2 to 4 Decoder 3. ENCODE AND COMPARE ARCHITECTURE Decoding takes longer time than secret writing because it encompasses a series of error detection or syndrome calculation and error correction. To resolve the drawbacks of the decode and compare architecture, the decoding of a retrieved codeword is replaced with the encoding of an incoming tag in the encode-and- compare architecture as shown in Figure 4. More precisely, a k-bit incoming tag is first encoded in the corresponding n-bit codeword and compared with the retrieved codeword as shown in Figure 4. Fig -4: Encode and Compare Architecture The comparison is to look at what number bits the 2 codewords dissent, not to check if the two codewords are exactly equal to each other. For this, there is a tendency to work out the overacting distance d between the 2 codewords and classify the cases consistent with the distance of ‘d’. Let tmax and rmax denote the numbers of maximally correctable and detectable errors, respectively. The cases are summarized as follows.  If d = 0, X matches Y exactly.  If 0 <d ≤ tmax, X will match Y provided at most tmax errors in Y are corrected.  If tmax<d ≤ rmax, Y has detectable but uncorrectable errors. In this case, the cache may issue a system fault, so as to make the central processing unit take a proper action.  If rmax<d, X does not match Y Assuming that the incoming address has no errors, 2 tags are regarded as matched if ‘d’ is in either the primary or the second ranges. In this way, while maintaining the error-correcting capability, the architecture can remove the decoder from its critical path at the cost of an encoder being newly introduced. Note that the encoder is, in general, much simpler than the decoder, and thus the encoding cost is significantly less than the decoding cost. Since the above method needs to compute the Hamming distance, presented a circuit dedicated to the computation. Fig -5: SA based architecture supporting the direct compare method
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7576 The circuit shown in Figure 5 performs XOR operations for each try of bits in X and Y thus on generate a vector representing the bitwise distinction of two codewords. The following half adder (HA) is used to count the number of 1’s in two adjacent bits in the vector. The numbers of 1’s is accumulated by passing through the following SA tree [6]. In the SA tree, the accumulated value z is saturated to rmax+ 1 if it exceeds rmax. More precisely, given inputs x and y, z can be expressed as follows: { (1) The final accumulated value indicates the range of d. As the compulsory saturation necessitates additional logic circuitry, the complexity of a SA is higher than the conventional adder. 4. DECODE AND COMPARE ARCHITECTURE A cache memory is considered where a k-bit tag is stored in the form of an-bit codeword after being encoded with a (n, k) code. In the decode-and-compare architecture, the n-bit retrieved codeword should first be decoded to extract the original k-bit tag. The extracted k- bit tag is then compared to the k-bit tag field of an incoming address to determine whether the tags are matched or not. Fig -6: Decode and Compare Architecture As the retrieved codeword should go through the decoder before being compared with the incoming tag, the critical path is too long to be employed in a practical cache system designed for high-speed access. Since the decoder is one of the most complicated processing elements, in addition, the complexity overhead is not negligible. The decode compare architecture [8] is shown in Figure 6. 5. DISCUSSION Results are discussed in the table shown below. 6. CONCLUSION Decoder is complex than encoder and the complexity overhead is not negligible. Decoding cost is more than encoding cost. Decoder will increase the critical path for high speed access. Encoder is simpler than decoder and the complexity overhead is negligible. In Encode-compare architecture, the decoder is removed by introducing an encoder. Encoding cost is significantly less than decoding cost. Comparing encoder and decoder architecture, encoder architecture is the most efficient one and it has less complexity and less cost. REFERENCES [1] Aswathi D and Keerthi Sahadevan, “An Efficient Low Complexity Low Latency Architecture for Matching of Data Encoded with Error Correcting Code Using a Cache Memory”, Int. Journal of Engineering Research and Application, Vol. 6, Issue 10, (Part -3) October 2016, pp.82-85. ENCODE-COMPARE ARCHITECTURE DECODE-COMPARE ARCHITECTURE Encoder is simpler than decoder Decoder is complex than encoder TheComplexity overhead is negligible. The Complexity overhead is not negligible. In encode-compare architecture, the decoder is removed by introducing an encoder. For high speed access, the decoder will increase the critical path. Encoding cost is significantly less. Decoding cost is more.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7577 [2] Chang, J., Huang, M., Shoemaker, J., Benoit, J., Chen, S.L., Chen,W., Chiu, S., Ganesan, R., Leong, G., Lukka, V., Rusu, S. and Srivastava, D. (2007),''The 65-nm 16-MB shared on-die L3 cache for the dual-core Intel xeon Processor 7100 series'', IEEE J. Solid-state Circuits, Vol. 42, No. 4, pp. 846–852. [3] Warnock, J.D., Chan, Y. H., Carey, S.M., Wen, H., Meaney, P.J., Gerwig, G., Smith, H.H., Chan, Y.H., Davis, J., Bunce, P., Pelella, A., Rodko, D., Patel, P., Strach, T., Malone, D., Malgioglio, F., Neves, J., Rude, D.L. and Huott, W.V. (2012), ''Circuit and physical design implementation of the microprocessor chip for the Enterprisesystem'',IEEE J. Solid-state Circuits, Vol. 47, No. 1, pp. 151–163. [4] Ando, H., Yoshida, Y., Inoue, A., Sugiyama, I., Asakawa, T., Morita, K., Muta, T. And Motokurumada, T., Okada, S., Yamashita, H., and Satsukawa, Y. (2003), '' A 1.3 GHz fifth generation SPARC64 microprocessor'',IEEEISSCC. Dig. Tech. Papers, pp. 246–247. [5] Tremblay and M. Andchaudhry, S. (2008), ''A third-generation 65nm 16-core 32-thread plus 32-Scout-thread CMT SPARC processor. ISSCC. Dig. Tech. Papers, pp. 82–83. [6] Wu, W., Somasekhar, D. and Lu, S.L. (2012), ''Direct compare of information coded with error-correcting codes'', IEEE Trans. Very Large Scale Integr. (VLSI) Syst., Vol. 20, No. 11, pp. 2147–2151. [7] Pedro Reviriego, Salvatore Pontarelli, Juan Antonio Maestro, and Marco Ottavi (2013), ''A Method to Construct Low Delay Single Error Correction Codes for Protecting Data Bits Only'', IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 32, No. 3. [8] Mary Francy Joseph and Anith Mohan (2016), ''Improved Architecture for Tag Matching in Cache memory Coded with Error Correcting Codes'', Global Colloquium in Recent Advancement and Effectual Researches in Engineering, Science and Technology (RAEREST 2016), pp.544 – 551.