Customer Service Chat
Get quote & make Payment
Address translation - computer architecture, Computer Engineering
: If it is known in advance that a program will reside at a particular location of primary memory, and then the compiler can be told to make the object code with complete addresses right away. For instance, the boot sect in a bootable disk can be compiled with the starting point of code set to 007C:0000.
: It is very rare that we already know the location a program will be assigned ahead of its execution. In mostly cases, the compiler has to generate reloadable code with logical addresses. Therefore the address translation can be performed on the code at the load time. Above figure shows that a program is loaded at location x. If the complete program resides on a monolithic block, then every memory reference can be translated to be physical by added to x.
An Example of fixed partitioning of a 64-Megabyte memory
Posted Date: 10/13/2012 5:41:55 AM | Location : United States
Ask an Expert
Address translation - computer architecture, Assignment Help, Ask Question on Address translation - computer architecture, Get Answer, Expert's Help, Address translation - computer architecture Discussions
Write discussion on Address translation - computer architecture
Your posts are moderated
Write your message here..
What is the main function of the memory-management unit, What is the main f...
What is the main function of the memory-management unit? The runtime mapping from virtual to physical addresses is done by a hardware device known as a memory management unit
What are the main aspects available in all word processors, What are the Ma...
What are the Main aspects available in all word processors - Ability to set page size and page orientation - Ability to change font size and font style (for example Arial,
Explain about transmission media, Q. Explain about Transmission Media? ...
Q. Explain about Transmission Media? These, also known as physical channels, can be either bounded or unbounded. Bounded media, in which signals representing data are confined
SIP Visyalizer security aspects, What are the security aspects of SIP Visu...
What are the security aspects of SIP Visualizer
Explain dns, DNS is The horizontal naming system.
DNS is The horizontal naming system.
Public key infrastructure solutions, Public Key Infrastructure solutions ...
Public Key Infrastructure solutions The use of public-key based security systems requires great attention and due care in design and management of security features. The secur
Dialog-task updates, Dialog-task updates are Synchronous updates.
Dialog-task updates are Synchronous updates.
What is link destruction, What is link destruction? Link destruction is...
What is link destruction? Link destruction is inverse of link creation. When a link is destroyed makes sure the associated objects accessible by other handles or intentionally
Explain the significance ipv6 over ipv4, Explain the significance IPV6 over...
Explain the significance IPV6 over IPV4. The maximum size of an Ipv6 datagram is 65575 bytes, with the 0 bytes Ipv6 header. Ipv6 also describe a minimum reassembly buffer size:
Discrete mathematics , real world applications
real world applications
Accounting Assignment Help
Economics Assignment Help
Finance Assignment Help
Statistics Assignment Help
Physics Assignment Help
Chemistry Assignment Help
Math Assignment Help
Biology Assignment Help
English Assignment Help
Management Assignment Help
Engineering Assignment Help
Programming Assignment Help
Computer Science Assignment Help
Why Us ?
~24x7 hrs Support
~Quality of Work
~Time on Delivery
~Privacy of Work
Human Resource Management
Literature Review Writing Help
Follow Us |
T & C
Copyright by ExpertsMind IT Educational Pvt. Ltd.