Write-allocate and no-write-allocate policy in a cache, Computer Engineering

Assignment Help:

(a) How does a data cache take advantage of spatial locality? Give an suitable example.

(b) What are the basic differences between a write-allocate and no-write-allocate policy in a cache?

(c) With the help of a fully labeled diagram, distinguish between direct and related mapping in cache memory?

(d) One example of a semiconductor memory is the DRAM

(i) Describe why a 16 Mbit DRAM chip is better being organised as compared a (2048 x 2048) x 4-bit array instead of 1M of 16 bit words.

(ii) Show a typical block diagram of the array, showing the row and column buffer blocks, refresh circuitry amongst others.

(iii) Approximately how many transistors and capacitors are required to construct a 4 MB DRAM?

(e) Describe two reasons why SRAM could be better than DRAM.

(f) Briefly explain how a multiple platter hard disk works.


Related Discussions:- Write-allocate and no-write-allocate policy in a cache

Microprocessor and interfacing, Write an ALP to count positve and numbers f...

Write an ALP to count positve and numbers from array.

What do you mean by daisy chain, Q. What do you mean by Daisy chain? Th...

Q. What do you mean by Daisy chain? This scheme provides a hardware poll. With this scheme, an interrupt acknowledge line is chain by different interrupt devices. All I/O inter

Determine the gray code for decimal number, Determine the equivalent Gr...

Determine the equivalent Gray code for decimal number 6 ? Ans. The equivalent Gray code for decimal number 6 is 0101 Because the Decimal number 6 is equivalent to binary nu

Pipe and filter , How to draw the pipe and filter using data flow and it co...

How to draw the pipe and filter using data flow and it components and connectors

Fundamental issues of concerns for instruction set design, Q. Fundamental i...

Q. Fundamental issues of concerns for instruction set design? A number of fundamental issues of concerns for instruction set design are: Completeness: For an early design

Password, A phonetic password generator picks two segments randomly for eac...

A phonetic password generator picks two segments randomly for each six letter password. form is CVC. what is the total password population? 1> what is the total password population

Development of a successful system, The success of a system relies on the a...

The success of a system relies on the approach of building it. If development approach is right then system will work successfully. Figure below portrays a System Development Life

Determine the channel of common channel signalling in ss7, Common channel s...

Common channel signalling in SS7 is (A) out band control channel. (B) In band control channel. (C) Speech control channel. (D) None of the above. Ans:

When the get cursor command used in interactive lists, When the get cursor ...

When the get cursor command used in interactive lists? If the hidden information is not enough to uniquely recognize the selected line, the command GET CURSOR is used.  The GET

Define underflow and overflow, Define underflow and overflow. Underflow...

Define underflow and overflow. Underflow: If the result the arithmetic operation including n-bit numbers is too small to show by n-bits, underflow is said to occur. Overflow

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd