Addressability of memory - computer architecture, Computer Engineering

Addressability:

Location-addressable

Each alone accessible unit of information in storage is chosen with its numerical memory address. In the modern computers, location-addressable storage generally restrict to primary storage that accessed internally by computer programs, because location-addressability is very efficient, but onerous for humans.

File addressable

Information is divided into files of variable length, and a particular file is chosen with human-readable file names and directory. The underlying device is yet location-addressable, but the OS of a computer system provides the file system abstraction to make the operation more clear. In modern computers tertiary, secondary and off-line storage use file systems.

Content-addressable

Individually accessible unit of information is chosen based on the basis of (part of) the contents stored there. Content-addressable storage may be implemented by using hardware (computer device), software (computer program) with hardware being faster but more expensive option. Hardware content addressable memory is frequently used in a computer's CPU cache.

 

Posted Date: 10/13/2012 6:09:47 AM | Location : United States







Related Discussions:- Addressability of memory - computer architecture, Assignment Help, Ask Question on Addressability of memory - computer architecture, Get Answer, Expert's Help, Addressability of memory - computer architecture Discussions

Write discussion on Addressability of memory - computer architecture
Your posts are moderated
Related Questions
Illustrated about the layered architecture of Electronic Data Interchange? Layered Architecture of EDI: Electronic Data Interchange is most commonly applied into th

For a non blocking crossbar configuration, taking N as the number of subscribers, there will be               number of cross points and _             number of switches for est

write alp to perform bcd addition without using procedure

Address phase timing: On the rising edge of clock 0, the initiator notes IRDY # and FRAME# both high, and GNT# low, so it drives the command, address and asserts FRAME# in tim

Size limitation does not relate to number of records in a table within a database. Forms, reports, macros, and modules also add to database size, but is rather minimal compared to

Describe the Electronic Data Exchange (EDI) architecture in brief. Electronic Data Interchange (EDI) may be generally easy to understand as the replacement of paper-based purch

Class is a user-defined data type in C++. It can be formed to solve a particular kind of problem. After creation the user require not know the specifics of the working of a class.

What are the main characteristics of a pipeline? Ans: The main characteristics of a pipeline are: a) The speedup or efficiency gain by suing a pipeline depends on the numbe

Input-Output-Processor Interconnection Network (IOPIN) This interconnection network is used for communication between I/O channels and processors. All processors commune with a

In order to support IA-32, the Itanium can switch into 32-bit mode with special jump escape instructions. The IA-32 instructions have been mapped to the Itanium's functional units.