Accessing a cache - computer architecture, Computer Engineering

Accessing a Cache:

 Direct mapping:

(Block address) modulo (Number of cache block in the cache)

166_Accessing a Cache.png

The valid bit indicate whether an entry contain a valid address.

Initially, all valid bits are reset ("0" - not valid)

  • Small fast memory + big slow memory
  • Look as a larger fast memory

Address Mapping in Cache:

2351_Accessing a Cache1.png

Miss = not hit,

Meaning is that the data has to be retrieved fr 

Posted Date: 10/13/2012 5:20:32 AM | Location : United States







Related Discussions:- Accessing a cache - computer architecture, Assignment Help, Ask Question on Accessing a cache - computer architecture, Get Answer, Expert's Help, Accessing a cache - computer architecture Discussions

Write discussion on Accessing a cache - computer architecture
Your posts are moderated
Related Questions
Define Process. Process: It is a program in execution; process execution should progress into sequential fashion. Process contains: program counter stack dat

Like ULINE the statement VLINE is used to insert vertical lines. No , Vline is not used to insert vertical lines.

Explain the role that XML can play when dynamically generating HTML pages from a relational database? Ans) Even if student has never participated in a project involving this typ

What is meant by common control? In several switching systems, the control subsystem may be an integral part of the switching network itself. This system is termed as direct co

What is the need of a hybrid in telephone networks? Digital exchanges need receive and transmit signals upon separate two-wire circuits. It calls for two-wire to four-wire con

Explain the access methods used in LANs. Access methods utilized in LAN: i. Switched access: this is used in LANs which are assigned around CBXs. Electronic switching

for calculating simple interest

Q. Drawback of indirect addressing? • Drawback of this scheme is that it needs two memory references to fetch actual operand. First memory reference is to fetch the actual addr

What is the system call available to change the personality? The system call personality prefers to a method to modify its implementation domain in order that Linux can emulate

Determine the term- Files File maintenance is significant. Updating of files generally involves inserting, amending and deleting data. Example: A bank would amend data