Find the sizes of the tag, block and word fields

Assignment Help Operating System
Reference no: EM1379648

Assume that a computer using direct mapped cache has 2^24 words of main memory and a cache of sixty-four blocks, where each cache block contains sixteen words.

A. How many blocks of main memory are there?

B. What is the format of a memory address as seen by the cache? That is, what are the sizes of the tag, block and word fields?

C. To which cache block will the memory reference (20DB63)base 16 map?

 

Reference no: EM1379648

Questions Cloud

Evaluate a dbms in terms of lock granularity : Suppose you are asked to evaluate a DBMS in terms of lock granularity and the different locking levels. Create a simple database environment in which these features would be important.
Creating a c++ program : A text document with machine code for little man's computer following instruction set. Instructions are in different lines.
Define cache and its purpose : Describe what a cache is and what its purpose is. Also explain what data gets placed into the cache, and when it is put there.
Direct mapped cache- word, block, tag : Think about a byte addressable computer with twenty-four bit addresses, a cache capable of storing a total of 64KB of data, and blocks of 32 bytes.
Find the sizes of the tag, block and word fields : Assume that a computer using direct mapped cache has 2^24 words of main memory and a cache of sixty-four blocks, where each cache block contains sixteen words.
Format of a memory address : Assume that a computer using a set associative cache has 2^16 words of main memory and a cache of thirty-two blocks, where each cache block contains eight words.
Question about memory effectiveness : The following memory partitions of 100 kb, 500 kb, 200 kb, 300 kb, and 600 kb, how would each of the 1st-fit, best-fit, and worst-fit algorithms place processes of 212 kb, 417 kb, 112 kb, and 426 kb?
Comparing the cache blocks : A computer using direct mapped cache has 2^24 words of main memory and a cache of 256 blocks. Every cache block contains sixty-four words.
Question about tcp networking : A TCP entity in Host 1 receives a section from a corresponding TCP entity in Host 3. The received section has the following header field values se

Reviews

Write a Review

Operating System Questions & Answers

  Minimizing average response time

Estimate the runtime order of the jobs such that it minimizes average response time.

  Solving passwords problems

As we all know about problems with people and passwords and how technology can mitigate some of them. What types of problems do you assume implementing these technologies for people might cause?

  Illustrate how many entries are there in logical address

Consider a computer system with 48-bit logical address and 4-KB page size. System supports up to 1 GB of physical memory. Illustrate how many entries are there in each of the following?

  Implement the parser in two iterations

Implement the parser in a separate file. Implement the main parser function in a separate file main.c

  Focuses on software development process and life cycle model

Discuss how would you address this certification issue with your hypothetical firm for your system that you are trying to certify at the top secret level?

  Question about lan operating systems

Assume you are network administrator for a new corporation that has ten users and plans to add five more users within a year. The files require to be accessed by all ten users and each user must have different security rights.

  Standards in the field of wireless networking

Do you consider that standards are beneficial in the field of wireless networking or do you feel they limit new technologies?

  Explain what can be done to prevent race condition

Suppose shared bank account exists between husband and wife and concurrently husband calls withdraw() function and wife calls deposit(). Explain how race condition is possible and what might be done to prevent race condition from occuring.

  Question about affiliate programs

Many companies are using affiliate programs to drive traffic to their Web sites. explain what an affiliate program is and how it works.

  Differences between logical and physical security

With the help of analogy to explain the differences between logical and physical security to a nontechnical person.

  Construct resource allocation graph with processers

Construct a resource allocation graph with the following processers and resources, the system consists of four processers P1, P2, P3, and P4 and five resources R1, R2, R3, R4, and R5.

  Multicast service model in the internet

Those applications that do not need a high level of reliability for operations can use the Minimalist Internet Multicast service model, like streaming of continues information in the forms of audio or video

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd