Find total memory bytes stored in the cache

Assignment Help Operating System
Reference no: EM1379658

Following, a byte addressable main memory of 2^16 bytes and block size of eight bytes, using direct mapped cache consisting of thirty-two lines.

a. How many total memory bytes can be stored in the cache?
b. How is a 16 bit memory address divided into tag, line number and byte number?
c. Into what line would byte with the following address be stored?
0001 0001 0001 1011

 

Reference no: EM1379658

Questions Cloud

Explain the sequence of events : Assume three values (x, y, and z) are stored in a equipments memory. Explain the sequence of events that lead to the computation of x+y+z.
Question about computer memory cells : Discuss how many cells can be in a computer's main memory if each cell's address can be represented by two hexadecimal digits?
Time slot interchange switch : In a time slot interchange switch, eight input lines are scanned in sequence to build up an input frame with eight slots.
Importance of having enough ram : Determine the importance of having enough RAM? Discuss how does it relate to how fast a computer can process data from a big database residing on ones hard drive?
Find total memory bytes stored in the cache : Following, a byte addressable main memory of 2^16 bytes and block size of eight bytes, using direct mapped cache consisting of thirty-two lines.
Research article analysis : Using the criteria for "Judging a Research Study" on pages 258 and 259of your textbook, evaluate at least five or more research articles.
Compute the cost of 1 mbyte of main memory : Describe the meaning of Tc, Cc, Tm and Cm and compute the cost of 1 MByte of main memory using the above parameters.
Computing the access time : Main memory uses a block transfer capability & has 1st word (four bytes) access time of fifty ns and access time for following words as 5 ns.
Determine the format of main memory address : Given that a system has two way set associative cache of size eight KBytes, with sixteen bytes cache lines, and a byte-addressable main memory of size 64 MBytes.

Reviews

Write a Review

Operating System Questions & Answers

  Television clips in a powerpoint presentation

Computers and television would work is when you tape television demonstrate that can be used to give flavor to PowerPoint Presentations.

  Discuss and provide examples of mutual exclusion

Discuss and provide examples of the following concurrency issues associated with an OS: 1. Mutual exclusion 2. Deadlock 3. Starvation

  Handling the situation as a system administrator team leader

While working with the System Administration group, they tell you that a huge part of the administrator's duties focus on troubleshooting troubles within the network.

  Write the start-up steps in windows nt

Write the start-up steps in Windows NT. Provide estimate for the capital investment needed in computer forensics for a 2,000,000 population.

  Efficiency and effectiveness of project communications

Determine what types of data are shared through documents and what types are shared through meetings? Discuss how has social networking affected the efficiency and effectiveness of project communications?

  Steps add to the check list

According to your personal experience, what steps would you add to the check list and determine what steps would you leave out?

  Finding netbios information for a remote machine

Discuss the steps that you use to trouble your DNS issue in the client side and also find NetBIOS information for a remote machine.

  Interactions with the systems

Think about a typical day in your life and discuss all the instances when your activities get recorded

  Applications for the programs

Applications are the programs that make our computers powerful. Not counting Microsoft Office, what are some of the new applications that you see making a big difference to computer users in next some years?

  Security monitoring activities in it

Discuss and explain the security monitoring activities that should be conducted in an company with both internal IT and e commerce applications.

  Solving hipaa privacy issues

Suppose if we learned anything from Katrina and Joplin, paper records are susceptible to loss en masse. Can you assume having 50,000 paper records blown for miles across Joplin and trying to recreate those records later

  Wireless encryption standards

Compare the several wireless encryption standards. Determine the purpose of implementing wireless encryption and discuss the benefits of each standard?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd