Describe set-associative mapping, Computer Engineering

Assignment Help:

Q. Describe Set-Associative Mapping?

A third type of cache organization known as set-associative mapping is an improvement on direct mapping organization in that every word of cache can store two or more words of memory under same index address. Every data word is stored together with its tag and number of tag data items in one word of cache is said to create a set. 

Let's consider an illustration of a set-associative cache organization for a set size of two as displayed in Figure below. Every index address refers to two data words as well as their associated tags. Every tag needs six bits and every data word has 12 bits so word length of cache is 2(6+12) = 36 bits. An index address of 9 bits can accommodate 512 words. So the size of cache memory is 512 × 36. Generally a Set-Associative cache of set size K will accommodate K-words of main memory in every word of cache.

301_Describe Set-Associative Mapping.png

Figure: Two-Way Set-Associative Mapping Cache


Related Discussions:- Describe set-associative mapping

Researching strategy - artificial intelligence, Researching strategy - arti...

Researching strategy - artificial intelligence: If our search and researching strategy and swot of it is surety to find all types of hints such the solutions eventually, then

Electrical technology, voltage,current and power relation in a delta connec...

voltage,current and power relation in a delta connection

Determine the implementation of jit inventory system, Discuss in detail the...

Discuss in detail the features, benefits and implementation of JIT inventory system. JIT - Just in Time inventory systems - meaning, origin, need for JIT, benefits, Use of JIT

What is a rendezvous point?, You insert rendezvous points into Vuser script...

You insert rendezvous points into Vuser scripts to imitate heavy user load on the server. Rendezvous points instruct Vusers to wait during test implementation for multiple Vusers t

Explain the term - strong typing and weak typing, Explain the term - Strong...

Explain the term - Strong Typing and  Weak Typing Strong Typing : When any operation upon an object can be checked during compile time, when type is confirmed forcefully.

What is asynchronous transmission, What is asynchronous transmission An...

What is asynchronous transmission An asynchronous transmission technique used in many interactive terminals employ special bits. With this method each character consists of thr

Explain addressing modes in risc, Q. Explain Addressing modes in RISC? ...

Q. Explain Addressing modes in RISC? Simple addressing modes: Another benefit is the use of simple addressing modes. RISC machines employ simple register addressing having disp

Why is translation look-aside buffers important, Why is Translation Look-as...

Why is Translation Look-aside Buffers (TLBs) important? The implementation of page-table is completed in the following manner: Page table is maintained in main memory.

What is read only memory (rom) and define the use of it?, What is Read only...

What is Read only memory (ROM) and Define the Use of it? A simple kind of ROM can be constructed from a decoder, Or gates, and a number of wires. Input

The three main elements of ldb, The three main elements of LDB are:- St...

The three main elements of LDB are:- Structure Selections and Database Program.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd