Block diagram of an associative memory, Computer Engineering

Assignment Help:

Q. Block diagram of an associative memory?

The block diagram of an associative memory is displayed in Figure below. It comprises of a memory array and logic for m words with n bits per word. Argument register A and key register K both have n bits, one for every bit of a word. Match register M has m bits, one for each memory word. Every word in memory is compared in parallel with content of argument register then the words which match the bits of argument register set a corresponding bit in match register. After matching process those bits in match register which have been set denote the fact that their corresponding words have been matched. Reading is achieved by a sequential access to memory for those words whose corresponding bits in match register have been set.

Key register offers a mask for choosing a specific key or field in argument word. The complete argument is compared with every memory word if key register contains all 1s. Or else only those bits in argument which have 1s in their corresponding positions of key register are compared. So the key offers a mask or identifying information that specifies how reference to memory is made.

1072_Block diagram of an associative memory.png

Figure: Associative Memory - Block Diagram

To explain with a numerical illustration assume that argument register A and key register K have the bit configuration displayed below. Only three leftmost bits of a compared with memory words since K has 1's on these positions.

A                101 111100

K                111 000000

Word 1       100 111100      no match

Word 2       101 000001      match      

Word 2 matches unmasked argument field since the three leftmost bits of argument and word are equal.


Related Discussions:- Block diagram of an associative memory

What is the role of certifying authority, What is the Role of Certifying Au...

What is the Role of Certifying Authority? A certificate authority is a body, that is either public or private, that seeks to fill the requirement for trusted third-party servic

Explain the working of a three bit binary ripple counter, With the help of ...

With the help of clocked JK flip flops and waveforms, explain the working of a three bit binary ripple counter. Write truth table for clock transitions. Ans. Three-Bit Binary Rip

What are the five popular hashing functions, Five popular hashing functions...

Five popular hashing functions are as follows:- Division Method Midsquare Method Folding Method Multiplicative method Digit Analysis

The voltage of telephone given by telephone companies, Telephone companies ...

Telephone companies normally provide a voltage of to power telephones? Telephone companies usually give a voltage of to power telephones -48 volts DC.

Blocking and non-blocking network, Blocking and Non-Blocking network In...

Blocking and Non-Blocking network In non-blocking networks the route from any free input node to any free output node can always be offered. Crossbar is an best example of non-

Interrupt and scanning method of keypad operation, INTERRUPT METHOD - USING...

INTERRUPT METHOD - USING PORTB CHANGE INTERRUPT By using 4 by 4 matrix keypad connected to PORTA and PORTB. The rows are connected to PORTA-Low (RA1-RA4) and the columns are co

Electrical technology, voltage,current and power relation in a delta connec...

voltage,current and power relation in a delta connection

Determine the hardware for multiplication, Determine the hardware for multi...

Determine the hardware for multiplication The hardware for multiplication consists of equipment given in Figure. The multiplier is stored in register and its sign in Q . The se

Mathematical applications, The current 32 and 64 bit machines can represent...

The current 32 and 64 bit machines can represent integers of around 9 digits and 30 digits respectively, while various scientific and mathematical applications have to represent in

Comparison between risc and cisc - computer architecture, Comparison betwee...

Comparison between risc and cisc - computer architecture: CISC  Emphasis on hardware  Includes multi-clock complex instructions  Memory-to-memory

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd