Illustrate direct mapping and address bits for tag field

Assignment Help Computer Networking
Reference no: EM1350742

Q1) The main memory of a computer is organized as 128 blocks, with a block size of 16 words. The cache has eight block frames. In part (a) through (c), show the mappings from the numbered blocks in main memory to the block frames in the cache. Draw all lines showing the mappings as clearly as possible.

a) Show the direct mapping and the address bits that identify the tag field, the block number, and the word number.

b) Show the fully associative mapping and the address bits that identify the tag field, and the word number.

c) Show the two-way set-associative mapping and the address bits that identify the tag field, the set number, and the word number.

d) Consider the memory organization in (c), what is the hit ratio for a program that loops 3 times from locations 8 to 51 in main memory? You may leave the hit ratio in terms of a fraction.

Reference no: EM1350742

Questions Cloud

Compute the multifactor productivity for each center : Compute the multifactor productivity for each center and Considering the number of pieces processed per hour as its output
Limitations of the internal controls : What are some limitations of the internal controls of the business cycles at your organization? How would you address these limitations?
What is the magnitude of total displacement during walk : Two stationary positive point charges, charge 1 of magnitude 3.55 and charge 2 of magnitude 2.00 , are separated by a distance of 30. An electron is released from rest at the point midway between the two charges, and it moves along the line connec..
Show performance technology in action : Should HPT be part of the solution, rather than being perceived as part of the problem or something to be ignored?
Illustrate direct mapping and address bits for tag field : The main memory of a computer is organized as 128 blocks, with a block size of 16 words. The cache has eight block frames. Illustrate direct mapping and address bits that recognize the tag field, the block number, and the word number.
Evaluation of internal control procedures : Assignment: Read the following case and explain one internal control procedure that would be helpful in this scenario.
Socio economic-environmental and biological factors : There has been significant data linking intelligence with socio-economic, environmental, and biological factors, suggesting that nature and nurture are intertwined, meaning that our personalities are shaped by both.
Explain the quantity of bulbs philips sells : Explain the quantity of bulbs Philips sells is related to how many flashlights Rayovac manufactures
Mutual funds compare and individual stock ownership : How do packaged products like mutual funds compare to individual stock ownership? Do people become less attached to a mutual fund compared to a stock or stock certificate?

Reviews

Write a Review

Computer Networking Questions & Answers

  Tools and processes for scanning vulnerabilities

Write down the tools and processes for scanning and removing possible vulnerabilities?

  Receiving uart transfering incoming character to buffer

How long [in micro-seconds (µs)] does receiving UART have to transfer an incoming character to buffer or to the main computer before next character arrives?

  Explain client-server architecture

Explain client/server architecture, including fat and thin clients, middleware and client/server tiers. Make use of Visio to prepare architecture diagrams that enhance your explanation.

  Role of project managers and telecommunications managers

Describe in scholarly detail "technical jargon" and describe the role of project managers and telecommunications managers.

  Explaining how networks can be safe from hacking

Explain/propose a new/possible idea on how these networks can be kept safe from hacking.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Explaining social networking in knowledge management

Social Networking is one of the hottest topics in knowledge management. Is it knowledge management?

  Handling the project

The issues is pharmaceutical(drugs), explain how you would deal with one of the situations listed below which has brought you project to an abrupt stand still, the employer is supposing No responsibility, and wishes you to work it out.

  Intercepting the message in conversation

Provided that Alice and Bob both suppose that they have the correct public keys for the other party, and supposing that Eve may intercept any messages passed between Alice and Bob, Describe the steps Alice could take in order to ensure that the pub..

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

  Mpls over ip solution or form of long-haul ethernet

What occurs if office in Baton Rouge, Louisiana, also should be connected to both Memphis and Laramie at a rate of 512 kbps? Which solution is cheaper now?

  Adding four servers to network to share file

Manager would like to add four servers to network so employees can share files. Manager would also like to permit VPN access for her employees so they can work remotely.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd