Please Log in or Register for more.

Cache Mapping Technique

243 views

3 Answers

Answer :

Cache Mapping Technique

•Cache is small, fast and expensive memory.

•This is also use for reducing access time.

•Cache is more closer to CPU than main memory.

•Cache is use to store addresses.

•There are three ways for mapping cache memory.

1.Direct mapping

2.Fully Associative mapping

3.Set-Associative mapping

•These method are use for assigning addresses to cache locations.

1.Direct mapping

•Direct mapping is the easiest.

•It is often use for instruction cache.

•In direct mapping no search is needed.

•But in this method the cache memory is not fully utilized.

•No replacement technique is required in this method of cache mapping.

•In this method only one tag compare is require per access.

•All words stored in cache must have different indices.

2. Fully Associative mapping

•In this type of mapping the tag memory is searched in parallel (Associative) hence it is called Associative mapping.

•In this method cache utilization is very high as compare to other two technique.

•In this method main memory divided into two groups lower order bits for location of a word in block and higher order bits for blocks.

•It is expensive to implement because of cache searching.

•As much comparators as number of tags is required means large number of comparators is required.

•The internal logic compare the incoming address with all the stored addresses.

3. Set-Associative mapping

•Set-Associative mapping have good performance but it is complex.

•Set-Associative mapping is the combination of both direct mapping and fully associative mapping.

•In this method the cache is divided into sets.

•So the search is performed over a cache set in parallel.

•Set-Associative mapping is use in microprocessors.

•It allows limited number of blocks with same index and different tags.

•The incoming tag is compared with all tags of selected sets with the help of comparator.

VISIT AT YOUTUBE

BUY BOOKS AT EEE STORE

Like 0 like

Answer :

Cache Mapping Technique

image

image

image

image

image

Like 0 like

Answer :

Cache Mapping Technique:-

image

image

Like 0 like

Please log in or register to answer this question.

Related Questions


What is the point-to-point drawing technique?
Last Answer : Those who have a hobby of drawing may have a question - what is the essence of such a popular point-to-point technique? A modern fashionable artist has the right to depict reality and his ... , but in different shades, a picture can be obtained with an impressive effect of volume and delicacy.

Show More

6 views 1 answer







List the energy conservation technique in induction motor. 
Last Answer : Following are the list of energy conservation techniques in electrical motors: 1) Reduction in iron losses by using low loss silicon steel core material laminated to thinner dimension. 2) Using bigger length ... at light load. 13) By rewinding in induction motor 14) By motor survey

Show More

1.1k views 1 answer








Last Answer : Energy conservation technique in induction motor by minimizing idle and redundant running of motor: 1) Loss of energy as the no load power drawn is approximately about 12% to 16% of rated ... to unnecessary line losses. 4) Reduction in overall system energy efficiency over period of time.

Show More

694 views 1 answer







Explain energy conservation technique “by improving power quality” for induction motor.
Last Answer : Energy conservation method in induction motor by improving power quality: Electrical energy can be conserved by improving the power quality. It can be achieved by avoiding voltage unbalance, maintaining ... losses can be minimized by using harmonic filter thus reducing the harmonics in the system.

Show More

3.6k views 2 answers







Explain the pulse width modulation technique for control of AC output voltage.

Show More

101 views 0 answers








Last Answer : EPROM EEPROM Flash EPROM Normalize cell size is 1. Normalize cell size is about 1 ... and floating gate, which is insulated by a dielectric material. NAND flash memory and NOR flash memory are the two types of flash memory.

Show More

150 views 1 answer







How do i delete 1997 computer files from my computer?
Last Answer : Reformat the whole drive. Start fresh.

Show More

0 views 1 answer







On what method search in cache memory used by the system. a. Cache directing b. Cache mapping c. Cache controlling d. Cache invalidation
Last Answer : b. Cache mapping

Show More

6 views 1 answer







In ............. method, the word is written to the block in both the cache and main memory, in parallel. (A) Write through (B) Write back (C) Write protected (D) Direct mapping
Last Answer : (A) Write through 

Show More

46 views 1 answer







Which one of the following methods is best suited for mapping the distribution of different crops as provided in the standard classification of crops in India? (A) Pie diagram (B) Chorochromatic technique (C) Isopleth technique (D) Dot method
Last Answer : (B) Chorochromatic technique

Show More

21 views 1 answer







Normally, the FPGA resources are used less than 70% because:  a. Routing becomes excessively complicated b. Power issues c. Clock frequency d. Simulation time increases
Last Answer : Normally, the FPGA resources are used less than 70% because: Routing becomes excessively complicated

Show More

320 views 1 answer







83 views 0 answers







77 views 0 answers







List and describe three general approaches to improve designer productivity.
Last Answer : Automation: The task of using a computer program to replace manual design effort. The program replaces manual design effort. Synthesis. Reuse: The ... correctness/completeness of each design step. Hardware/software co-simulation.

Show More

109 views 1 answer







Explain placement, routing, and sizing.
Last Answer : Placement: The task of placing and orienting every transistor somewhere on IC. Routing: The task of running wires between the transistors without inserting other wires or transistors. ... wires and transistor provide better performance but consume more power and require more silicon area.

Show More

79 views 1 answer







A single FSM can be converted to two smaller FSM. Justify.

Show More

592 views 0 answers








Last Answer : Common computation models: Sequential program model Statements, rules for composing statements, semantics for executing them Communicating process model ... Object-oriented model For breaking complex software into simpler, well-defined pieces

Show More

108 views 1 answer







Sketch internal design of 4x3 ROM.
Last Answer : The internal design of 4x3 ROM

Show More

780 views 1 answer







Explain the advantages and disadvantages of using memory I/O and standard I/O.
Last Answer : Memory mapped I/O and standard I/O are the two methods for communicating microprocessor with peripherals. Processor talks to both memory and peripheral using the same bus.Two ways to talk to a peripheral. ... of standard I/O is no loss of memory addresses to the use as I/O addresses.

Show More

171 views 1 answer







Explain parallel and wireless protocols.
Last Answer : Parallel protocols: PCI bus (Peripheral Components Interconnect): PCI stands for Peripheral Components Interconnect. PCI bus is used as a communication line to transmit signals and data ... provide the basis for wireless network products using the Wi-Fi brand.

Show More

101 views 1 answer







Explain memory hierarchy.
Last Answer : Memory hierarchy: Main memory is large, inexpensive, slow memory stores entire program and data. Cache memory is small, expensive, fast memory stores copy of likely accessed parts of large ... In memory hierarchy the smaller memory is faster and larger memory storage is slower.

Show More

187 views 1 answer







Explain memory write ability and storage permanence with suitable diagram.
Last Answer : Write ability and storage permanence of memories: Write ability is the manner and speed at which memory can be written. Storage permanence is the ability of memory to hold stored bits ... Holds bits after power is no longer supplied. High end and middle range of storage permanence.

Show More

3.5k views 1 answer







Describe different RT level computational and sequential components used to design single function processors.
Last Answer : RT-level combinational components:- To reduce the complexity in digital logic, combinational components are used, which are more powerful than logic gates.  Such combinational ... during a clock edge. An asynchronous inputs value effects the circuit independent of the clock.

Show More

245 views 1 answer







Build using minimum number of CMOS gates. Three input NAND gate. Two input NOR gate Three input NOR gate Two input AND gate Two input OR gate
Last Answer : Three input NAND gate. Two input NOR gate Three input NOR gate Two input AND gate Two input OR gate

Show More

213 views 1 answer







Explain the various steps involved in designing a custom single-purpose processor.
Last Answer : A single purpose processor is a digital circuit designed to execute exactly one program. It is also known as co-processor, accelerator or peripheral. It contains only ... for small quantities. Performance may not match general-purpose processors for same applications.

Show More

415 views 1 answer







If Moor's law continues to hold, predict the approximation number of transistor per leading edge IC in the year. 1.2030 2.2050
Last Answer : If Moor's law continues to hold, predict the approximation number of transistor per leading edge IC in the year.1.20302.2050

Show More

60 views 1 answer







Compare the annual growth rate of  1.IC capacity 2.Designer productivity.
Last Answer : Compare the annual growth rate of 1.IC capacity2.Designer productivity.

Show More

100 views 1 answer







Explain Inter-process Communication (IPC) using mailbox/queue.
Last Answer : Inter-process communication using mailbox: Mailbox is the Interprocess communication mechanism. A process puts a data message for another process in the mailbox. Mailbox is also called as message exchange. ... a message. In mailbox IPC the sender need not to know the name of the receiver.

Show More

141 views 1 answer







Explain arbitration. What is priority arbitrator?
Last Answer : Arbitration: IF multiple peripherals are connected to microprocessor or DMA controller or any resource and they request services simultaneously so which peripheral will get serviced first this is ... Peripherals make requests to arbiter and arbiter makes requests to the resource.

Show More

101 views 1 answer







Explain FSM and concurrent process with example.
Last Answer : Finite State Machine (FSM): Finite state machine is a machine which have a transition from state to state. The system have some number of states and at a time the system can ... Y seconds. In sequential execution, the processor executes single task which causes poor processor utilization.

Show More

127 views 1 answer







Compose 1k x 8 ROMS into 8k x 8 ROM.
Last Answer : 1k x 8 ROMS into 8k x 8 ROM:

Show More

1.7k views 1 answer







What is design technology? Explain top down design process.
Last Answer : Design technology: Design technology is the manner in which we convert our concept desired system into an implementation. The three main design technologies are 1. Compilation/Synthesis ... general purpose processors and A Gate-level Netlist for special-purpose processors.

Show More

170 views 1 answer







Explain data transfer mechanism in I2C protocol. Compare it with CAN and USB protocol based on bit rate and area of applications.
Last Answer : I2C (Inter-Integrated Circuit): I2C stands for Inter-Integrated Circuit. I2C is a serial protocol. It was developed by Philips Semiconductor. I2C bus have two communication lines. One is serial data ( ... Mbps this is used for lower speed devices. Using USB we can connect upto 127 devices.

Show More

183 views 1 answer







What is Mailbox? Write a note on Mailbox.
Last Answer : Mailbox is used for inter-process communication for sending small messages between tasks or between ISR and task. The Mailbox is used in some Real Time Operating system (RTOS). If the task or ... received by which task or thread is called mailbox client. Mailbox message is a kernel service.

Show More

2.3k views 1 answer








Last Answer : The volatile keyword is a part of C standard, and this warns the compiler that ISR might change the value of a variable so that the compiler will not optimize the code in a way that will ... the keyword is not supported, you can still get the similar result by turning off the compiler optimizations.

Show More

110 views 1 answer







explain how a stepper motor is controlled using driver. give relevant hardware and software details.
Last Answer : A stepper motor is an electric motor that rotates fix number of degrees whenever we apply a step signal. the stepper motor can rotate 1.8-degree full step or ... driver 2. controlling a stepper motor directly Application of stepper motor: disk driversprintersphotocopyfax machinerobotscamcorder

Show More

133 views 1 answer







Explain Keypad controller.
Last Answer : Keypad Controller: It's a device which interfaces between the computer and keyboard. That is a input device and used for transfer the data to connected device.

Show More

307 views 2 answers








Last Answer : Liquid Crystal Display:-An LCD is a low-cost, low power device capable of displaying text and images. LCD's are extremely common in embedded systems since such system often does not have video monitors ... toggles the enables bit and acts as a delay so that the command can be processed and executed.

Show More

183 views 1 answer








Last Answer : UART takes parallel data and transmits serially and UART receives serial data and converts to parallel.A simple UART may possess1.Some configuration registers and2.Two independently operating processors, one ... must write data to the transmit register and/or read data from the received register.

Show More

164 views 1 answer








Last Answer : Timers:-A timer is a peripheral device that can measure time intervals. Timers can be used to1. General events at the specific time or to determine the duration of two external events.eg. Keeping a ... the number of times the car wheel rotates in one second, in order to determine cars speed.

Show More

313 views 1 answer








Last Answer : Most microprocessors have a nonmaskable interrupt, an input pin that causes an interrupt that cannot be disabled. If an interrupt routine shares any data with the task code, then it is necessary ... by setting the priority level. 3. It allows us to enable and disable individual interrupts.

Show More

125 views 1 answer








Last Answer : Interrupt latency is the amount is the amount of time it takes a system to respond to an interrupt.The 4 factors influencing on embedded system response to an interrupt are:1. The longest period of time ... 2 is one of the reasons that it is generally a good idea to write short interrupt routines.

Show More

293 views 1 answer








Last Answer : A semaphore is called binary semaphore when its value is 0, it is assumed that it has been taken (or accepted) & when its value is 1, it is assumed that it has been released & no ... that are not themselves reentrant.3. A reentrant function may does not use the hardware in a nonatomic way.

Show More

385 views 1 answer







What are counting semaphores and resource semaphore?
Last Answer : If a task tries to take the semaphore when the integer is equal to zero, then the task will block. These semaphores are called counting semaphore. Some system offer semaphore that can be ... , but they cannot be used to communicate between two tasks. Such semaphores are called resource semaphore.

Show More

750 views 1 answer








Last Answer : Instruction execution has 5 basic stages:1. Fetch instruction:The task of reading the next instruction from memory into the instruction register.2. Decode instruction:The task of determining what operation ... into an appropriate register.5. Store results:The task of writing a register into memory.

Show More

133 views 1 answer








Last Answer : A design metric is a measure of a implementations features such as cost, size, performance and power.Commonly used design metrics are:1.NRE cost:NRE stands for non recurring engineering cost. ... to check that manufacturing was correct.11.Safety:The probability that the system will not cause harm.

Show More

140 views 1 answer








Last Answer : The main characteristics of an embedded system are:1. Single functioned2. Tightly constrained3. Reactive and real time1. Single functioned:An embedded system usually executes a specific program repeatedly.Ex. Pager ... computer user. But it doesn't result in a system failure.Ex. Digital camera chip

Show More

352 views 1 answer







Define embedded system.
Last Answer : An embedded system is nearly any computing system other than a desktop computer. Embedded systems are hard to define because they cover such a broad range of electronic devices. It has three main components: 1. Hardware 2. Main application software 3. Real time operating system

Show More

123 views 1 answer







What is watchdog timer ? Explain the implementation of time out for ATM with block diagram and program.
Last Answer : A special type of timer is a watchdog timer, which will reset the system after a predefined timeout. Watchdog timer reset timer every X time unit, else timer generates a signal ... be loaded into timereg. This is to prevent erroneous software from unintentionally resetting the watchdog timer.

Show More

3.4k views 1 answer








Last Answer : Shared memory :For sharing of data faster and communication between programs, we use shared memory. Shared memory can be used with multiprocessors and single processors. Means Program ... No resource preemption4. Circular waitIf the four conditions occur simultaneously then the deadlock occurs.

Show More

666 views 1 answer






Show More⇦ PreviousNext ⇨