4. In many ways, cache memory and virtual memory are similar. But their purposes are different....
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
4. In many ways, cache memory and virtual memory are similar. But their purposes are different. For example, cache memory is for decreasing effective access time and virtual memory is for increasing address space. For example, a 16GB physical (or main) memory of a computer can be extended to 2TB using a secondary memory SSD or hard-disk; an address of physical memory location is 34-bits, but an address of a secondary memory location is 41-bits. In this example, a computer program will use 41 bits for the address of a variable. A virtual memory system will translate the virtual memory address to a physical memory location. In a virtual memory system, secondary memory is divided into pages; identical size blocks in the physical memory are called a page-frame. For answering questions of the next two (toy) problems, assume that a computer has 128-word physical memory and 1024-word virtual memory. (a) How many bits are necessary to identify a location of the virtual memory? (b) If the size of a page is 16 words, how many pages does the virtual memory have? (c) Draw the page-offset format of a virtual address. In the diagram, show the number of bits in each field. (d) How many bits are necessary to identify a location of the physical memory? (e) Draw the page-frame and offset format of a physical memory address. In the diagram, show the number of bits in each field. 4. In many ways, cache memory and virtual memory are similar. But their purposes are different. For example, cache memory is for decreasing effective access time and virtual memory is for increasing address space. For example, a 16GB physical (or main) memory of a computer can be extended to 2TB using a secondary memory SSD or hard-disk; an address of physical memory location is 34-bits, but an address of a secondary memory location is 41-bits. In this example, a computer program will use 41 bits for the address of a variable. A virtual memory system will translate the virtual memory address to a physical memory location. In a virtual memory system, secondary memory is divided into pages; identical size blocks in the physical memory are called a page-frame. For answering questions of the next two (toy) problems, assume that a computer has 128-word physical memory and 1024-word virtual memory. (a) How many bits are necessary to identify a location of the virtual memory? (b) If the size of a page is 16 words, how many pages does the virtual memory have? (c) Draw the page-offset format of a virtual address. In the diagram, show the number of bits in each field. (d) How many bits are necessary to identify a location of the physical memory? (e) Draw the page-frame and offset format of a physical memory address. In the diagram, show the number of bits in each field.
Expert Answer:
Answer rating: 100% (QA)
a To identify a location in virtual memory we need to use 10 bits because 1024 210 so we ... View the full answer
Related Book For
Essentials Of Computer Organization And Architecture
ISBN: 9781284259438
6th Edition
Authors: Linda Null, Julia Labur
Posted Date:
Students also viewed these programming questions
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Managing Scope Changes Case Study Scope changes on a project can occur regardless of how well the project is planned or executed. Scope changes can be the result of something that was omitted during...
-
The balance sheet data for Alans Lightworks, Corp., at August 31, 2012, and September 30, 2012, follow: Requirement 1. The following are three independent assumptions about the business during...
-
Refer to the Human Factors (March 2014) study of shared leadership by the cockpit and cabin crews of a commercial airplane, Exercise 8.14. Recall that each crew was rated as working either...
-
The trial balance of Gaolee Fashion Center contained the following accounts at November 30, the end of the company's fiscal year. Adjustment data: 1. Supplies on hand totaled $2,600. 2. Depreciation...
-
Describe some of the more common criminal offenses that occur in healthcare settings.
-
The Pier Ten Company, a U.S. company, made credit sales to four customers in Asia on September 15, 2015, and received payment on October 15, 2015. Information related to these sales is as follows:...
-
Multiplication of signed operands, which generate a double-length product in the 2's-complement 100 11 MULTIPLICAND (-13) 0 10 1 1 MULTIPLIER (+11) number system. The general strategy is the...
-
1. Estimate the demand for soft drinks using a multiple regression program available on your computer. 2. Interpret the coefficients and calculate the price elasticity of soft drink demand. 3. Omit...
-
Write a program that satisfies the following for 2D arrays: 1) Prompts users with this menu: a. Create: returns an uninitialized 2D array of the size nRows, nCols b. Fill Rand: populates the array...
-
List and briefly describe four types of molecules that can bind to an ncRNA.
-
List five types of cancer in which ncRNAs can be involved.
-
What is the difference between an miRNA and an siRNA? How do these ncRNAs affect mRNAs?
-
Compare and contrast the roles of crRNA and tracrRNA in the defense against bacteriophages provided by the CRISPR-Cas system.
-
Explain how HOTAIR plays a role in the transcriptional regulation of particular genes.
-
The profitability index is the present value of the future cash flows divided by the initial investment. If you remember, the NPV function really only calculates the present value of future cash...
-
Explain the differences and similarities between fringe benefits and salary as forms of compensation.
-
A 2-way set-associative cache consists of four sets. Main memory contains 2K blocks of 8 bytes each and byte addressing is used a) Show the main memory address format that allows us to map addresses...
-
What is SETI, and how does it use the distributed computing model?
-
How is the organization of a polled network different from that of an internetwork?
-
The circuit in Figure P32.96 represents your planned design for a wall power supply that will run a radio that usually runs on a 9-V battery. The power supply uses a transformer (not shown) to...
-
Your boss has purchased a new AC power source to run a high-voltage, low-current display, but it is not working. While he is fuming, you look at the owner's manual and discover that this power source...
-
Construct a phasor diagram representing the current and potential difference in Figure 32. 10 at \(t=T / 4, T / 2\), and \(3 T / 4\). Data from Figure 32.10 Ve maximum, current zero Ve minimum,...
Study smarter with the SolutionInn App