A hypothetical cache memory has 512 bytes of data storage. The physical byte address is 32...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
A hypothetical cache memory has 512 bytes of data storage. The physical byte address is 32 bits long in this machine. Assume the cache is 4-way set associative with 4 bytes per word, 4 words per cache block, and LRU eviction policy. There are 2 eviction bits, 1 valid bit, and 1 dirty bit stored with every cache block. a) (14 pts.) What is the size (in bits) of i. cache block index; ii. cache block tag, iii. total Cache size in bits including data, tag, and status fields? The following sequence of address references are observed, in the given order, while running a program with an initially empty cache: 25, 26, 34, 35, 36, 37, 6, 7, 126, 127, 128, 129, 9, 17, 19, 24, 40, 41, 42, 147, 148, 100, 261, 262, 263, 240, 241, 242, 140 b) (16 pts.) Which address(es) result(s) in a miss? Show how you arrived at your answer by sketching the cache with block slots, and indicating block entry and eviction activity. A hypothetical cache memory has 512 bytes of data storage. The physical byte address is 32 bits long in this machine. Assume the cache is 4-way set associative with 4 bytes per word, 4 words per cache block, and LRU eviction policy. There are 2 eviction bits, 1 valid bit, and 1 dirty bit stored with every cache block. a) (14 pts.) What is the size (in bits) of i. cache block index; ii. cache block tag, iii. total Cache size in bits including data, tag, and status fields? The following sequence of address references are observed, in the given order, while running a program with an initially empty cache: 25, 26, 34, 35, 36, 37, 6, 7, 126, 127, 128, 129, 9, 17, 19, 24, 40, 41, 42, 147, 148, 100, 261, 262, 263, 240, 241, 242, 140 b) (16 pts.) Which address(es) result(s) in a miss? Show how you arrived at your answer by sketching the cache with block slots, and indicating block entry and eviction activity.
Expert Answer:
Related Book For
Computer Organization and Design The Hardware Software Interface
ISBN: 978-0124077263
5th edition
Authors: David A. Patterson, John L. Hennessy
Posted Date:
Students also viewed these computer network questions
-
Silver River Paddleboards Co. had $1,500,000 in sales for the year. Their income statement showed the following subtotals and total. The illustration shows a partial income statement. The first line...
-
The following additional information is available for the Dr. Ivan and Irene Incisor family from Chapters 1-4. Ivan and Irene paid the following in 2012 (all by check or can otherwise be...
-
c++. error: array must be initialized with a brace enclosed initializer main.cpp X 10 11 ii 12 13 14 4567 15 16 17 18 19 287288285 20 21 23 24 25 26 27 28 25285922223288 30 31 33 34 36 37 40 41 42 43...
-
In the javelin throw at a track-and-field event, the javelin is launched at a speed of 29 m/s at an angle of 36 above the horizontal. As the javelin travels upward, its velocity points above the...
-
What can groups do to make group decision making more effective?
-
Two horizontal parallel conducting rods are connected such that a conducting crossbar free to slide along them has a constant current \(I\) running through it (Figure P27.34). The rods are separated...
-
Given the estimated activity times below and the network in Problem 8 above, what is the critical path probability that the project will be completed within: (a) 21 days? (b) 22 days? (c) 25days?...
-
19.A radioactive -emission. A detector records n -particles in 2s and by next 2s (accumulatively) it records 1.1 n -particle. Number of -particles recorded by detector after a long time, is (1) 11n...
-
Resistant PLC is an investment property management firm of two years standing. It is run by a managing director (Ray) and a financial director (Neville), and supported by a team of administrative...
-
Third-world and developing countries mainly exported primary products in the 1970s. How have things changed since then? Explain.
-
Describe some of the ways in which Georg Simmel's study of society differed from that of other major social theorists of his age. Identify and explain at least six (6) key concepts used by Simmel in...
-
Describe a government service or product that either the government charges money for -- or could charge money for -- and then discuss briefly whether you think the government's fee promotes...
-
Why does the quantity of Norwegian krone increase when the demand increases? The Norwegian central bank does not intervene, So how is it possible?
-
What is FDI, why has it grown so dramatically in recent decades, and what trends are evident in its distribution between states? Explain.
-
Define Zero-One Matrices and give 2 examples.
-
Explain the term "Equivalent Units". Why are they calculated in process costing? [4 Marks] [minimum 350 words]
-
Calculate 3.41796875 10 -3 (6.34765625 10 -3 1.05625 10 2 ) by hand, assuming each of the values are stored in the 16-bit half precision format described in Exercise 3.27 (and also described in...
-
Assume for a given processor the CPI of arithmetic instructions is 1, the CPI of load/store instructions is 10, and the CPI of branch instructions is 3. Assume a program has the following instruction...
-
As discussed in the text, one possible performance enhancement is to do a shift and add instead of an actual multiplication. Since 9 6, for example, can be written (2 2 2 + 1) 6, we can calculate...
-
The following table shows the interest rates on the fixed and floating borrowing choices available to three firms. Firms A and B want to be exposed to a floating interest rate while Firm C would...
-
Explain why trading derivatives on centralized exchanges rather than in over-the counter markets helps reduce systemic risk. Can you think of a way in which more trading on centralized exchanges...
-
Derivatives transfer risk from one person or firm to another. They can be used in any combination to unbundle risks and resell them.
Study smarter with the SolutionInn App