How many blocks of main memory are there

Assignment Help Management Information Sys
Reference no: EM131702253

Assignment  : Fundamentals of Information Technology

Neatly write or type your answers to the following problems on a separate sheet of paper and submit a hard copy at the start of lecture on the due date. For any problems involving mathematical calculations you must show all work to receive full credit.

1. Suppose a computer using direct mapped cache has 232 bytes of byte-addressable main memory, and a cache of 1024 blocks, where each cache block contains 32 bytes.

a. How many blocks of main memory are there?

b. What is the format of a memory address as seen by the cache, i.e., what are the sizes of the tag, block, and offset ?elds?

c. To which cache block will the memory address 0x000063FA map?

2. Suppose a computer using fully associative cache has 224 bytes of byte-addressable main memory and a cache of 128 blocks, where each cache block contains 64 bytes.

a. How many blocks of main memory are there?

b. What is the format of a memory address as seen by the cache, i.e., what are the sizes of the tag and offset ?elds?

c. To which cache block will the memory address 0x01D872 map?

3. Consider a byte-addressable computer with 24-bit addresses, a cache capable of storing a total of 64K bytes of data and blocks of 32 bytes. Show the format of a 24-bit memory address for:

a. direct mapped cache

b. associative cache

4. Assume a direct-mapped cache that holds 4096 bytes, where each block is 16 bytes.

a. Assuming an address is 32 bits and that cache is initially empty, complete the table below. (Use hexadecimal numbers for all answers.)

Address

TAG

Cache location (block)

Offset within block

OxOFFOFABA

 

 

 

Ox00000011

 

 

 

OxOFFFFFFE

 

 

 

Ox23456719

 

 

 

OxCAFEBABE

 

 

 

b. [1 pt] Which, if any of the addresses will cause a collision (forcing the block that was just brought in to be overwritten) if they are accessed one right after the other?

5. Suppose you have a byte-addressable virtual address memory system with 8 virtual pages of 64 bytes each, and 4 page frames. Assuming the following page table, answer the questions below.

Frame #

Valid Bit

1

1

3

0

-

0

0

1

2

1

-

0

 

0

-

0

a. How many bits are in a virtual address?

b. How many bits are in a physical address?

c. What physical address corresponds to the following virtual addresses (if the address causes a page fault, simply indicate this is the case)? Give your answers in hexadecimal.
i. 0x00
ii. 0x44
iii. 0xC2
iv. 0x80

6. Suppose we have 210 bytes of virtual memory and 28 bytes of physical main memory. Suppose the page size is bytes.

a. How many pages are there in virtual memory?

b. How many page frames are there in main memory?

c. How many entries are in the page table for a process that uses all of virtual memory?

7. Consider a system with a main memory access time of 100ns supported by a cache having a 8ns access time and a hit rate of 98%. What is the effective access time (EAT) in nanoseconds if:

a. access to cache and main memory occur concurrently? Give your answer to two decimal places to the right of the decimal point.

b. access to cache and main memory occur sequentially? Give your answer to two decimal places to the right of the decimal point.

8. [4 pts] Suppose a main memory access takes 300 ns, the page fault rate is 1%, and it takes 20 ms to load a page from disk. What is the expected access time in nanoseconds assuming we ignore the in?uence of cache memory? Give your answer to two decimal places to the right of the decimal point.

9. Suppose a program makes a sequence of memory references that cause the following memory blocks to be read, in this order: A, B, D, E, A, C, E, A, C, B, E, A. The CPU's cache has 4 blocks and uses LRU as the replacement policy. Show the state of the cache after each memory block access, indicating the age of a block by giving the sequence number of when the block was last referenced. Begin the sequence numbers at 1 for the ?rst memory reference.

10. Suppose a program makes a sequence of memory references that cause the following memory blocks to be read, in this order: A, B, D, E, A, C, E, A, C, B, E, A. The CPU's cache has 4 blocks and uses FIFO as the replacement policy. Show the state of the cache after each memory block access. Assume the left-hand side of the queue is the head of the queue. Use an arrow to mark the oldest block in the queue.

Reference no: EM131702253

Questions Cloud

Elaborate interpersonal service : The parking lot, the neon signs, the building exterior and the restrooms are all part of a services cape for a nightclub
Needed in the program planning process : What are the different types of objectives that are needed in the program planning process?
Write a paper about national environmental policy act : Write a paper about National Environmental Policy Act. Your two-page report should include but not be limited to covering the key points: Current Status.
Participate in e-commerce : Why would a company choose not to participate in e-commerce? What IT-based issues might prevent an organization from adopting e-commerce?
How many blocks of main memory are there : What is the format of a memory address as seen by the cache, i.e., what are the sizes of the tag, block, and offset ?elds?
Create a component of an information security plan : Starting with this module, and for the next few modules, you will create a component of an information security plan each week.
Discuss organizations in the transformation process : A strategy of embracing the past will probably become increasingly ineffective over the next few decades. Better for most of us to start learning now
Protect assets and prevent unauthorized access : Strong passwords are necessary to protect assets and prevent unauthorized access. In your own words, describe the 4 components of enforcing password strength.
Promotional and sales activities for the new station : A popular disc jockey signed a three-year contract with a radio station under which she agreed that if she quit her job at the station.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss the importance of strategic case analysis

Discuss the two primary methods to use conflict to improve decision making and give an example of when you would have used one of these techniques in your own work. Use your own words and do not copy definitions from the text.

  Suggest an alternative approach for an organization

Discussion: Employee Monitoring- Suggest an alternative approach for an organization to control security without monitoring employee actions.

  Define and explain about the data mining

Define and Explain about the Data Mining.What comes after coding all of the text data? Now you have to deal with missing values. Sometimes 0 was filled in when the information wasn't known. I can promise that square foot and taxes are not 0!Wha..

  Develop a plan to create the database and establish a design

develop a plan to create this database and establish a design that aligns with the product sales initiatives of the organization.

  Write a policy recommendation about threats

You are working for a newly started healthcare company. Write a policy recommendation about threats and vulnerabilities. Basically, what you think the IT policy should state

  Identify and describe any potential ethical issues

Create a graphical representation of your recommended architecture. Identify and describe any potential ethical issues that could arise in connection with the new architecture

  The ethical issues related to rfid technology

Make sure in the paper write at least one-page synopsis of the RFID technology ethical issue topic. You should also mention that why you feel this is important and describe any supporting resources you found supporting your choice.

  How three information system above will benefit your company

Distinguishing how the three information systems above will benefit your company, proceed by providing the details and examples of applications and solutions offered by retail vendors

  What is the lowest education level

What is the lowest education level an individual can have and still obtain an average yearly income ($50,000)

  Identify the website the sender and perceived receiver

Identify the Website, the sender, and perceived receiver. Analyze the integrated business communication. Assess the media richness of the section.

  Explain what data protection would entail

explain what data protection would entail, and how it benefits the business.

  List and briefly describe the four parts of typical e-mails

List and briefly describe the four parts of typical e-mails. Suggest at least ten pointers that you could give to a first-time e-mail user.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd