Question: Assume that the write - back invalidating snooping protocol is adopted to a multi - core computer architecture. In this architecture, a processor can address

Assume that the write-back invalidating snooping protocol is adopted to a
multi-core computer architecture. In this architecture, a processor can address
64KB main memory and have a 2-way set-associative write-back cache with
32 sets and 16 bytes per line. The settings for this architecture is listed as
follows:
A LRU replacement pplicy is implemented on the cache.
Two caches for two processors are empty at the beginning, and the
memory is accessed by the following sequence.
Please show the information of the tag, set, line number, directory-based
state, data for non-empty cache lines, and the contents of memory by
using Tables 1 and 2 format after each step of data accesses.
(32 pts,4 pts for each step)
Processor 0 reads from location OD3C
Processor 1 writes 0110 to location OD34
Processor 0 reads from location OD38
Processor 1 writes 1111 to location 1D34
Processor 0 writes 0001 to location 1D3C
Processor 0 reads from location OD3C
Processor 1 writes 1110 to location 2D30
Processor 0 reads from location 2D3C
Table 1. The information in caches
Table 2. Initial state of memory
 Assume that the write-back invalidating snooping protocol is adopted to a

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!