Find the sizes of the tag, block and word fields

Assignment Help Operating System
Reference no: EM1379648

Assume that a computer using direct mapped cache has 2^24 words of main memory and a cache of sixty-four blocks, where each cache block contains sixteen words.

A. How many blocks of main memory are there?

B. What is the format of a memory address as seen by the cache? That is, what are the sizes of the tag, block and word fields?

C. To which cache block will the memory reference (20DB63)base 16 map?

 

Reference no: EM1379648

Questions Cloud

Evaluate a dbms in terms of lock granularity : Suppose you are asked to evaluate a DBMS in terms of lock granularity and the different locking levels. Create a simple database environment in which these features would be important.
Creating a c++ program : A text document with machine code for little man's computer following instruction set. Instructions are in different lines.
Define cache and its purpose : Describe what a cache is and what its purpose is. Also explain what data gets placed into the cache, and when it is put there.
Direct mapped cache- word, block, tag : Think about a byte addressable computer with twenty-four bit addresses, a cache capable of storing a total of 64KB of data, and blocks of 32 bytes.
Find the sizes of the tag, block and word fields : Assume that a computer using direct mapped cache has 2^24 words of main memory and a cache of sixty-four blocks, where each cache block contains sixteen words.
Format of a memory address : Assume that a computer using a set associative cache has 2^16 words of main memory and a cache of thirty-two blocks, where each cache block contains eight words.
Question about memory effectiveness : The following memory partitions of 100 kb, 500 kb, 200 kb, 300 kb, and 600 kb, how would each of the 1st-fit, best-fit, and worst-fit algorithms place processes of 212 kb, 417 kb, 112 kb, and 426 kb?
Comparing the cache blocks : A computer using direct mapped cache has 2^24 words of main memory and a cache of 256 blocks. Every cache block contains sixty-four words.
Question about tcp networking : A TCP entity in Host 1 receives a section from a corresponding TCP entity in Host 3. The received section has the following header field values se

Reviews

Write a Review

Operating System Questions & Answers

  Virtual machines

Virtual machines supported by a host operating system

  Productivity across an organization

Explain how does an company weigh the require to share data to the maximum extent to fully utilize this resource for productivity across an organization.

  Power management settings in bios

Every day at 2PM a client's computer at work reboots itself. You have made sure the power management settings in the BIOS and in the Windows Control Panel are not responsible.

  Value in managing security and risk

Explain ISO 27001's value in managing security and risk. What are the drawbacks and benefits for obtaining ISO 27001 certification?

  Solving networking question

Your corporation has a network that contains many NetWare 4.11 servers and uses IPX as the routing protocol. Each of network sections has at least one NetWare server on it.

  Implement a basic shell that restricts runtime of processes

Implement a basic shell that restricts the runtime of processes executed from within it. Your shell will read input from the users and execute it as a new process, but if that program runs longer than it should, your shell will kill the process an..

  Advantages and disadvantages of major operating system

Consider the advantages and disadvantages of each major operating system that Amy might use on the Web server. In a one-page memorandum to Amy.

  What is cpu utilization for round-robin scheduler

when a process requests for I/O operations, it will suspend and another process will need to be selected for execution. What is the CPU utilization for a round-robin scheduler.

  Define the term context switch

Define the term context switch. Explain how context switching takes place. (use a diagram, with two processes)

  Computer privacy related question

One of the main concerns with the expanding influence of information technology is issue of personal privacy. As more and more individuals and businesses are using computers to transact business and store data the protection of individual privacy is ..

  Mobile email and text messaging in the work place

What is a firm's fully qualified domain name and what is the significance of the. Discuss the benefits and drawbacks of mobile email and text messaging in the work place.

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd