Comparing the cache blocks

Assignment Help Computer Networking
Reference no: EM1379645

1. A computer using direct mapped cache has 2^24 words of main memory and a cache of 256 blocks. Every cache block contains sixty-four words.

a) How many blocks of main memory are there?
b) What is the format of a memory address as seen by the cache? (What are the sizes of the tag, block and word fields?)
c) To which block will the memory reference 01BD36 (in hexadecimal) map?

2. A computer using fully-associative cache has 2^32 words of main memory and a cache of 1024 blocks. Each cache block contains 32 words.

a) How many blocks of main memory are there?
b) What is the format of a memory address as seen by the cache? (What are the sizes of the tag, block and word fields?)
c) To which block will the memory reference 025A13CF (in hexadecimal) map?

 

Reference no: EM1379645

Questions Cloud

Direct mapped cache- word, block, tag : Think about a byte addressable computer with twenty-four bit addresses, a cache capable of storing a total of 64KB of data, and blocks of 32 bytes.
Find the sizes of the tag, block and word fields : Assume that a computer using direct mapped cache has 2^24 words of main memory and a cache of sixty-four blocks, where each cache block contains sixteen words.
Format of a memory address : Assume that a computer using a set associative cache has 2^16 words of main memory and a cache of thirty-two blocks, where each cache block contains eight words.
Question about memory effectiveness : The following memory partitions of 100 kb, 500 kb, 200 kb, 300 kb, and 600 kb, how would each of the 1st-fit, best-fit, and worst-fit algorithms place processes of 212 kb, 417 kb, 112 kb, and 426 kb?
Comparing the cache blocks : A computer using direct mapped cache has 2^24 words of main memory and a cache of 256 blocks. Every cache block contains sixty-four words.
Question about tcp networking : A TCP entity in Host 1 receives a section from a corresponding TCP entity in Host 3. The received section has the following header field values se
Arrangement of subnet masks : An organization has a class C network 200.1.1 and wishes to form subnets for four departments, with hosts as follows:
Discussion about networking a small business : Assume you have been employed as a consultant to suggest a retailing corporation about ways in which it can use networking technology to enhance its business.
Research proposal topic : You need to  select and present their own researchable topic for the research proposal in this course .Students are not limited to the topic suggestions listed in exercise 1 on page 76.Complete exercises 1-9 on page 76 in the text to help you sel..

Reviews

Write a Review

Computer Networking Questions & Answers

  Determine the bandwidth-delay product r tprop

Assume two hosts, A and B, are separated by 20,000 kilometers and are connected by direct link of R = 1 Mbps. Determine the bandwidth-delay product, R * Tprop?

  Isps to disclose actual identities of people

It asks ISPs to disclose actual identities of these people. Should the ISPs comply with this request. Describe your reasoning

  Write three big problems with m-m-s process

Then he asks you if they require to make any modifications to their software development process. Write down name three big problems with M. & M.'s process. How would you fix those problems?

  Compute devices accommodated by t-type tdm line

Determine no. of foll. devices that could be accommodated by T1-type TDM line if 1% of line capacity is reserved for synchronization purposes.

  Explain effect of tcp flow control

Host A can send application data into link at 100Mbps but Host B can read out of its TCP receive buffer at maximum rate of 50Mbps. Explain the effect of TCP flow control.

  Document risk event-impact-probability and impact

Identify the top three risks in this situation. For each risk, document its risk event, impact, probability, impact rating/risk exposure, and mitigation strategy.

  Which protocol is used to avoid defeat

You and Luke Sky Walker are commanders in rebel army preparing to attack Darth Vader and his Death Star. Is there protocol which you and Luke can use to avoid defeat? If not, describe why not.

  What is theoretical maximum channel capacity

What is the theoretical maximum channel capacity (Kbps) of traditional telephone lines (POTS)? Will that be the actual maximum channel capacity?

  Determine the value of frame transmission time

Determine the value of the frame transmission time, i.e., time it takes to transmit frame from when device starts sending first bit of frame until it finishes sending last bit?

  Find best solution if modem port no longer works

When troubleshooting a motherboard, you find out the modem port no longer works. What is the best and least expensive solution to this problem?

  Determine maximum value in ring if there is unique initiator

Design an algorithm that, under the standard set of assumptions (bidirectional links, total reliability, connectivity), determines maximum value in the ring assuming that there is a unique initiator.

  Explain the osi model and tcp-ip protocol

Define and explain the OSI model, TCP/IP protocol, File transfer protocol, or wireless workstation giving examples of its usage and explaining its' background and history

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd