What is the block number of the memory block

Assignment Help Basic Computer Science
Reference no: EM131330503

A read hit occurs in way2 of set 17 within an 8-way set associative cache that uses a line size of 128 bytes. The total number of lines in the cache is 32768. The system employs 32-bit addresses and the tag for way2 within set 17 has a decimal value of 898.

a) What is the block number of the memory block contained in way2 of set 17?

b) To which set within the cache would memory block 7033 map? The memory blocks are numbered starting from 0. Give your answer in decimal.

c) What is the total number of bits required for the entire cache to implement a pseudo-LRU replacement scheme?

Reference no: EM131330503

Questions Cloud

Perspective of the internal data management consultant : You may write in the first person for this assignment, taking the perspective of the internal data management consultant. Your paper should meet the following requirements:
Internal data management consultant : You are an internal data management consultant. Your organization wishes to "know its customer" much better in order to improve customer satisfaction and identify up-sell and cross-sell opportunities. Leadership has asked for your advice on a road..
Create a button to launch this procedure : Write a procedure to get a color to spread from patch to patch. (There are many ways to do this. Pick one you like.) Create a button to launch this procedure.
Provide a comprehensive overview including background : Provide a comprehensive overview including background and analysis (one page) of each of the two case studies. Then answer all of the questions given at the end of each of the two case studies. Your answers must incorporate concepts and theory fro..
What is the block number of the memory block : A read hit occurs in way2 of set 17 within an 8-way set associative cache that uses a line size of 128 bytes. The total number of lines in the cache is 32768. The system employs 32-bit addresses and the tag for way2 within set 17 has a decimal va..
Does there appear to be any external event that causes them : Does there appear to be any external event that causes them? Inspect the cars. Is there any property of these cars that describes a traffic jam? If one car moves slowly, is that enough to cause traffic jams?
What is meant by a write-allocate policy : a)  What is meant by a "write-allocate policy"? b)  Into which set within P1's cache will the memory block containing the variable X be loaded? c) Into which set within P2's cache will the memory block containing the variable Y be loaded?
Large an integer value : If T1 is the execution time for this program running on a single processor, what is the upper limit on the speedup provided for this program? Assume that you can use as large an integer value as you choose for N (i.e. for the number of processor..
Remote memory access penalty : The percentage of program instructions that access remote memory is 0.2%. What speedup would be achieved for the program if the remote memory access penalty could somehow be reduced to 10 ns per access?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Privacy laws are in a near constant state of flux

1) Privacy laws are in a near constant state of flux. Conduct research to identify the current state of privacy law. Has any major legislation recently been proposed or approved? What are the implications for firms operating in effected industries? W..

  Create a class named commission

Create a class named Commission that includes two numeric variables: a sales figure and a commission rate. Also create two overloaded methods name computeCommission().

  Determine the importance of understanding the transmission

1)  Determine the importance of understanding the Transmission Control Protocol / Internet Protocol (TCP / IP) and Open Systems Interconnection (OSI) Reference models from the perspective of an ethical hacker. Determine the potential repercussions of..

  Determine how task management is achieved in that context

Task management for OO systems can be quite complex. Do some research of OOD methods for real-time systems (e.g., [BIH92] or [DOU99]) and determine how task management is achieved in that context.

  Compare and contrast the various cognitive models

Compare and contrast the various cognitive models.

  What questions should a control system answer

What questions should a control system answer?

  The flyandstay ltd system case study

Your software house decided to design and build the system using the object-oriented methodology, to allow for more flexible design/build iterations and re-use of design and code. You have therefore now been asked to produce the analysis and desig..

  Find the value for portb

Find the value for PORTB after the execution of the following code:PORTB = ~0xAA; PORTB = 0x0A

  Determine the coefficient of static friction at a

The 50-kg uniform pole is on the verge of slipping at A when θ= 45 °

  Elements needed to create a solid compensation

What are all of the elements needed to create a solid compensation, benefits package, and total rewards plan? For a Business Class assignment?

  It managing organizational risk

No longer than a decade ago, IT security professionals had to work hard to persuade organizational leaders about the importance of developing effective risk management plans.

  What are some uses for wrapper classes

Wrapper classes are classes that surround primitive types with additional functionality. What are some uses for wrapper classes? Show some examples of how they could be used.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd