Solved

cache memory

Posted on 2000-03-15
2
207 Views
Last Modified: 2010-04-26
what is 4 way set  associative cache mapping .  
0
Comment
Question by:k_f_v
2 Comments
 
LVL 8

Accepted Solution

by:
thoffman earned 100 total points
ID: 2620311
Here are some links that might help:

http://www-scm.tees.ac.uk/users/a.clements/Cache1.htm

http://www.aceshardware.com/articles/x86/k6-3_indepth.shtml (the description is near the end, in section 3.2, though you should read 3.1 first).
0
 
LVL 7

Expert Comment

by:sorgie
ID: 2620735
The organization of cache memeory in the 486 and Pentium class is called 4 way set associative cache. Which means cache is split into four blocks. Each block is also  organized as 128 or 256 lines of 16 bytes each.
Basically its like using a bookmark in a book.
Each of the four blocks stores different lines of memory this is esppecially important in the windows environment where the processor has to operate on different areas of memory simultaneously.

0

Featured Post

Gigs: Get Your Project Delivered by an Expert

Select from freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
laptop estate analysis 5 72
RAID 1 - Problem with Data 8 80
Sony Laptop Screw 5 39
Drivers  Repository for Win 7 13 57
In this article you will get to know about pros and cons of storage drives HDD, SSD and SSHD.
Monitor input from a computer is usually nothing special.  In this instance it prevented anyone from using the computer.  This was a preconfiguration that didn't work.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now