Illustration of a memory organization, Computer Engineering

Assignment Help:

Q. Illustration of a memory organization?

Let's consider an illustration of a memory organization as displayed in Figure below in that main memory can store 32K words of 12 bits each one and cache is capable of storing 512 blocks (every block in present illustration is equal to 24 bits that is equal to two main memory words) at any instance.

634_Illustration of a memory organization.png

Figure: Cache Memory

For each word stored in cache there is a duplicate copy in main memory. The CPU communicates with both memories. It first sends a 15 bits (32K =25 × 210 = 215) address to cache. If there is a hit then CPU uses relevant 12 bits data from 24 bit cache data. If there is a miss then CPU reads block containing relevant word from main memory. So key here is that a cache should store address and data portions of main memory to determine whether the given information is available in cache or not.  But let's presume block size as 1 memory word for further discussions.


Related Discussions:- Illustration of a memory organization

Representation in prolog - logic programs, Representation in Prolog - Logic...

Representation in Prolog - Logic Programs: If we justimpose some additional constraints on first-order logic, so than we get to a representation language knowing as logic prog

Describe the basic aspects of ENIAC, Q. Describe the basic aspects of ENIAC...

Q. Describe the basic aspects of ENIAC? The main aspects of ENIAC can be summarized as: ENIAC was a general purpose-computing machine in that vacuum tube technology was

Define the identifiers of c language, Define the Identifiers of c language?...

Define the Identifiers of c language? In C the names of the functions, variables and arrays and various other user - defined items are called identifiers. The first character o

Explain e-mail gateways, Explain E-mail gateways. Email using SMTP work...

Explain E-mail gateways. Email using SMTP works better while both the sender and the receiver are on the Internet and can support TCP connections among sender and receiver. Tho

What are conversion routines, What are conversion routines? Non-standa...

What are conversion routines? Non-standard conversions from present format to sap internal format and vice-versa are executed with so known as conversion routines.

How does the xml serializer work, How does the Xml Serializer work?  What A...

How does the Xml Serializer work?  What ACL permissions does a process using it require?   Xml Serializer needs write permission to the system's TEMP directory.

Input, what is an input?

what is an input?

Develop a system to store change logs , The ?rst task in the project is to ...

The ?rst task in the project is to develop a sane system to store change logs and versions of ?les. The simplest approach is to create a "dot" directory in the location of the ?le

What does a lock object involve, What does a lock object involve? The t...

What does a lock object involve? The tables. The lock argument.

Explain the necessary conditions for deadlock to occur, Explain the necessa...

Explain the necessary conditions for deadlock to occur. Conditions for deadlock to arise are: i. Mutual exclusion: At least one resource must be held in a non-sharable mo

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd