edited by
3,752 views

3 Answers

3 votes
3 votes

Write through protocol updates (or invalidates) the shared data, as and when needed. It asks to update/invalidate via broadcasting (hence, not efficient, as it creates traffic)

Buffered write is an added functionality to write through cache. (Hence, not efficient, again)


Write back protocol is based on ownership of a block. (Read page 454 of Hamacher, 6th Ed). It also uses broadcast and creates traffic, hence, not efficient.
Though, the traffic generated is less than Write through.


Snooping:

the abilities of cache controllers to observe the activity on the bus and take appropriate actions  are called snoopy-cache techniques.

For performance reasons, it is important that the snooping function not interfere with the normal operation of a processor and its cache.

Hence, efficient.

 

Option A
0 votes
0 votes
option A) Snoopy Write – The abilities of cache controller to observe the activity on the bus and take appropriate actions .
Answer:

Related questions

7 votes
7 votes
5 answers
1
Satbir asked Jan 13, 2020
6,150 views
How many total bits are required for a direct-mapped cache with $128$ KB of data and $1$ word block size, assuming a $32$-bit address and $1$ word size of $4$ bytes?$2$ M...
6 votes
6 votes
5 answers
2
Satbir asked Jan 13, 2020
4,584 views
A computer which issues instructions in order, has only $2$ registers and $3$ opcodes $\text{ADD, SUB}$ and $\text{MOV}$. Consider $2$ different implementations of the fo...
4 votes
4 votes
5 answers
3
Satbir asked Jan 13, 2020
4,371 views
A stack organized computer is characterised by instructions withindirect addressingdirect addressingzero addressingindex addressing
9 votes
9 votes
1 answer
4