How many bits of the address is the block offset

Assignment Help Computer Engineering
Reference no: EM133553558

Computer Architecture

Question 1

Consider a 64-byte size virtually indexed cache with 8 byte blocks, an associativity of 2, write-back policy, and LRU replacement. Virtual addresses are 16 bits. The physical memory is 16 KiB.

(a) How many bits of the address is the block offset?

(b) How many bits of the address is the index?

(c) How many bits of the address is the tag?

(d) How many bits are needed in hardware to implement the cache?

(e) A problem with virtually-indexed caches are synonyms, or aliases, which occur when multiple virtual addresses map to the same physical address. This is a problem because the cache may store data for the same physical address at different locations (sets) in the cache. In order to avoid this problem, the page size must be big enough that the virtual index is part of the physical address (i.e., part of the page offset). For this cache, what is the minimum page size (in bytes) in order to avoid this problem?

(f) Suppose that each page table entry (PTE) requires 4 additional reserved bitsother than required by the hardware translation algorithm to determine the physical page (frame) number, and PTEs must be an integral number of bytes. If the page table is one level (flat/array), how large (in bytes) is the page table?

Question 2

(g) Assume 1 KiB page size and a 4-entry fully associative TLB with pseudo-LRU replacement. If a physical page must be allocated (i.e., the virtual page is on disk), assume the new page number is the current largest page number plus one. The initial TLB, cache, and page table states are given in the following three tables.

Initial TLB:

LRU1

LRU2

Valid

Tag (Virtual Page Number)

Physical Page Number

1

1

1

11

12

1

3

6

1

1

5

11

0

4

9

Page table: (Invalid mappings omitted)

      Virtual Page Number

Valid

Physical Page Number or In Disk

0

1

5

3

1

6

4

1

9

5

1

11

7

1

4

10

1

3

11

1

12

Cache (first row has set index 0, last row has set index 3):

LRU

Valid

Tag (Base 10)

0

0

1490

1

22

1

1

27

1

105

1

1

398

0

1984

0

0

442

0

311

Complete the following table, showing for each access whether it is a hit in the TLB (answer with hit or miss), a hit in the cache or the kind of miss (hit, compulsory, capacity, or conflict), a page fault (yes or no), and the state of the TLB and Cache after the access completes. The first one has been done for you. Show the final state of the page table after all the accesses.

A sequence of accessed virtual addresses (in decimalbyte address) is: 6900, 11730, 3369, 13672, 6896, 50797, 3372

Attachment:- Computer Architecture.rar

Reference no: EM133553558

Questions Cloud

Analyze the rhetorical elements of a piece of communication : Identify and analyze the rhetorical elements of piece of communication. Assess effectiveness of a speaker's choices, in relation to rhetorical situation.
Define experience expectant : Define experience expectant, experience dependent and plasticity. Please give an example of each.
Why must children immunisation status : Why must children's immunisation status be monitored and what does this involve?
What problems do you anticipate you would have to deal with : What problems do you anticipate you would have to deal with in implementing your group program? Can you think of ways to work within the system and avoid
How many bits of the address is the block offset : CS 5200 Computer Architecture, University of Colorado Colorado Springs - How many bits of the address is the block offset and How many bits are needed
What is autism spectrum disorder : What is Autism Spectrum Disorder (ASD)? Indicators and warning signs of ASD? Early intervention and referrals?
Discuss which profession you would be most interested : Now that you have a better understanding of the various Allied Health Professions, if you had to choose one, discuss which Profession you would be most
How early childhood educators are required to act : Mandate describing what early childhood educators must or must not do. They describe how early childhood educators are required to act.
What movements are considered essential for success : What movements are considered essential for success and what motions are most common in the game of football? Which planes interact with each joint in football?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Create a gui application for a pizzeria

Extra Large ($14) The user may also choose any number of toppings at a cost of $1.00 per topping.

  How you could improve implementation process of ebp project

Technology is integral to successful implementation in many projects, through either support or integration or both. Name at least one technology.

  Write a program that will display your name

Write a program that will display your name, then when the user presses sw1 (d8) your favorite hobby or interest will be displayed. Then if they push sw1

  Function in the latest version of android studio

In translating this chapter specifically for the responsive app Bikes and Barges I can not get the webview to work nor can I get the program to run

  Develop and comment on an it planning process

Develop and comment on an IT planning process for ModMeters to accomplish the demands as set out in the ModMeters case study.

  Select two organizations in which you are interested and

select two organizations in which you are interested and use the internet and strayer library to research the

  Write a client that removes all negative numbers from stack

Write a client that removes all negative numbers from a stack of int objects. If the original stack contained the integers 30, -15, 20, -25 (top of stack).

  How realistic is it for a company

Is it really essential for every software company to be CMM compliant or certified.

  Discuss ways to recover from a lost password

discuss ways to recover from a lost password. Assume that you have just received a call from a friend who cannot remember his/her password for a Windows 10

  Design a mailing list database

design a mailing list database. Your boss said, "All we need is just keep listing our 10 million+ clients' names and addresses. We use it to create mailing

  How do we assure that these items are addressed

The different categories of errors are: buffer overflows (most common); code injections; privilege errors; and cryptographic failures.

  Develop a heap data structure using a linked structure

You have been provided a Python file, heap.py, which constructs a heap structure with a list. Using that code as a guide: Develop a heap data structure using.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd