Format of a memory address

Assignment Help Operating System
Reference no: EM1379647

Assume that a computer using a set associative cache has 2^16 words of main memory and a cache of thirty-two blocks, where each cache block contains eight words.

A. If this cache is a 2-way set-associative, what is the format of a memory address as seen by the cache? That is, what are the sizes of the tag, set and word fields?

B. If this cache is a 4-way set-associative, what is the format of a memory address as seen by the cache?

 

Reference no: EM1379647

Questions Cloud

Creating a c++ program : A text document with machine code for little man's computer following instruction set. Instructions are in different lines.
Define cache and its purpose : Describe what a cache is and what its purpose is. Also explain what data gets placed into the cache, and when it is put there.
Direct mapped cache- word, block, tag : Think about a byte addressable computer with twenty-four bit addresses, a cache capable of storing a total of 64KB of data, and blocks of 32 bytes.
Find the sizes of the tag, block and word fields : Assume that a computer using direct mapped cache has 2^24 words of main memory and a cache of sixty-four blocks, where each cache block contains sixteen words.
Format of a memory address : Assume that a computer using a set associative cache has 2^16 words of main memory and a cache of thirty-two blocks, where each cache block contains eight words.
Question about memory effectiveness : The following memory partitions of 100 kb, 500 kb, 200 kb, 300 kb, and 600 kb, how would each of the 1st-fit, best-fit, and worst-fit algorithms place processes of 212 kb, 417 kb, 112 kb, and 426 kb?
Comparing the cache blocks : A computer using direct mapped cache has 2^24 words of main memory and a cache of 256 blocks. Every cache block contains sixty-four words.
Question about tcp networking : A TCP entity in Host 1 receives a section from a corresponding TCP entity in Host 3. The received section has the following header field values se
Arrangement of subnet masks : An organization has a class C network 200.1.1 and wishes to form subnets for four departments, with hosts as follows:

Reviews

Write a Review

Operating System Questions & Answers

  Mobile computing technology

Discuss similarities and differences of patient vital signs using mobile computing technology to in-patient visits to the doctor's office or hospital.

  Ddos attack on router

Recently had a DDoS attack on border router. Discuss how would you estimate where the attack came from and what would you put in place to save it from happening again?

  Write list of three known vulnerabilities for sql server

Using the internet as a source, compile a list of three known vulnerabilities for SQL Server on Windows operating systems and three vulnerabilities for Oracle on Unix.

  Question about affiliate programs

Many companies are using affiliate programs to drive traffic to their Web sites. explain what an affiliate program is and how it works.

  Explain what can be done to prevent race condition

Suppose shared bank account exists between husband and wife and concurrently husband calls withdraw() function and wife calls deposit(). Explain how race condition is possible and what might be done to prevent race condition from occuring.

  Intermediate level tasks

Intermediate Level Tasks :  Below is a simple program. It creates 2 threads. The first thread keeps printing out X on the screen, and the second thread keeps printing out O on the screen.

  Mobile users and enterprise security

The Baypoint Group requires your help with a presentation for Academic Computing Services, a nationwide company that assists colleges and universities with technology issues.

  Focuses on software development process and life cycle model

Discuss how would you address this certification issue with your hypothetical firm for your system that you are trying to certify at the top secret level?

  Give three advantages of virtual machine

In different communications models, communication may take place using either "message passing" or "shared memory". Distinguish between "message passing" and "shared memory", illustrating your answer with a diagram Give three advantages of virt..

  Program of law of total probability

Think about a system that generates ten million audit records every day. Also suppose that there are on average 10 attacks per day on this system and that each such attack is reflected in twenty records.

  Explain how to implement barriers using semaphores

Show how to implement barriers using semaphores. Your solution should avoid busy-waiting. Be explicit about any initializations that you need to assume.

  Requirement for routers to support ipv4 and 6 protocol stack

The answer describes the requirement for routers to support both IPv4 and IPv6 protocol stacks and describes the several types of connections a dual stack router can support, and why such connections are necessary.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd