Basics of caches - computer architecture, Computer Engineering

Basics of Caches:

"The caches are situated on basis of blocks, the shortest amount of data which may be copied between 2 adjacent levels at a time.

"If requested data by the processor is present in some the upper level block

 Then it is known as a hit.

"If data is not found in the upper level then this request is called a miss and the data is retrieved from the lower level in the hierarchy.

"The portion of memory accesses found in the upper level is known as a hit ratio.

"The storage, which takes profit of locality of accesses, is known as cache

 

2029_Basics of Caches.png

 

Posted Date: 10/13/2012 5:15:06 AM | Location : United States







Related Discussions:- Basics of caches - computer architecture, Assignment Help, Ask Question on Basics of caches - computer architecture, Get Answer, Expert's Help, Basics of caches - computer architecture Discussions

Write discussion on Basics of caches - computer architecture
Your posts are moderated
Related Questions
Q. Determine the complete OR gate and AND gate decoder count for an IC memory with 4096 words of 1 bit each, using the Linear select memory organization and Two dimensional Memory

Q. Using Library methods returns number of threads? #include void subdomain(float x[ ], int istart, int ipoints) { int i; for (i = 0; i x[istart+i] = 123.456;

desing mode level counter starting at 0011 using D flipflop

The demand placed on a system is explained by a lognormally distributed random variable with mean 50 and standard deviation of 10. The capacity of the system is modeled by a Weibul


Explain Sequential sharing. Sequential sharing: In this technique of sharing, a file can be shared through only one program at a time, it is file accesses by P1 and P2 are

S oftware In 1970s less than 1 percent of the public could have intelligently explained what "computer software " means. Nowadays most professionals and various member of the

Q. Analysts in Telecommunications area? Here computer networks which play a critical role in success of any business are designed, implemented and managed. Here Network analyst

Using Module-Instance Parameter: Parameter values can be overridden while a module is instantiated. New parameter values are passed at the time of module instantiation. Top-

Draw the state diagram of a process from its creation to termination, including all transitions, and briefly elaborate every state and every transition. When a process executes