1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleonysh [2.5K]
2 years ago
13

Consider a pipelined processor with just one level of cache. assume that in the absence of memory delays, the baseline cpi of th

is processor is 2. now assume that the percentage of memory instructions in a typical program executed on this cpu is 50% and the memory access latency is 150 cycles. assuming that the i-cache delays are already accounted for in the baseline cpi, consider the following two alternatives for the d-cache design:
alternative 1: a small d-cache with a hit rate of 94% and a hit access time of 1 cycle (assume that no additional cycles on top of the baseline cpi are added to the execution on a cache hit in this case).
alter tive 2: a larger d-cache with a hit rate of 98% and the hit access time of 2 cycles (assume that every memory instruction that hits into the cache adds one additional cycle on top of the baseline cpi).
a) [5%] estimate the cpi metric for both of these designs and determine which of these two designs provides better performance. explain your answers
b) [5%] repeat part (a), but now assume that the memory access latency is reduced to 50 cycles.
c) [5%] repeat part (b), but now assume that the l2 cache is also added to the system with the hit rate of 75% and access latency of 10 cycles.
Computers and Technology
1 answer:
babunello [35]2 years ago
8 0

Alternative 1:A small D-cache with a hit rate of 94% and a hit access time of 1 cycle (assume that no additional cycles on top of the baseline CPI are added to the execution on a cache hit in this case).Alternative 2: A larger D-cache with a hit rate of 98% and the hit access time of 2 cycles (assume that every memory instruction that hits into the cache adds one additional cycle on top of the baseline CPI). a)[10%] Estimate the CPI metric for both of these designs and determine which of these two designsprovides better performance. Explain your answers!CPI = # Cycles / # InsnLet X = # InsnCPI = # Cycles / XAlternative 1:# Cycles = 0.50*X*2 + 0.50*X(0.94*2 + 0.06*150)CPI= 0.50*X*2 + 0.50*X(0.94*2 + 0.06*150) / X1= X(0.50*2 + 0.50(0.94*2 + 0.06*150) ) / X= 0.50*2 + 0.50(0.94*2 + 0.06*150)= 6.44Alternative 2:# Cycles = 0.50*X*2 + 0.50*X(0.98*(2+1) + 0.02*150)CPI= 0.50*X*2 + 0.50*X(0.98*(2+1) + 0.02*150) / X2= X(0.50*2 + 0.50(0.98*(2+1) + 0.02*150)) / X= 0.50*2 + 0.50(0.98*(2+1) + 0.02*150)= 3.97Alternative 2 has a lower CPI, therefore Alternative 2 provides better performance.

You might be interested in
What key will cause the windows boot manager to appear as long as it is pressed during the windows startup process?
Zigmanuir [339]
The <span>key that will cause the windows boot manager to appear as long as it is pressed during the windows startup process is the S</span>pacebar.  T<span>he </span>spacebar<span>  or </span>space bar<span> is a long horizontal key on the lower edge of a keyboard that is always the largest and longest key on the keyboard.</span>
7 0
2 years ago
State and explain five misused of science and technology​
Nonamiya [84]

Answer:

1. Perpetration of violence

2. Breach of privacies

3. Replacement of human labor

4. National threats

5. Devotion of excessive time to technologies

Explanation:

The advent of science and technology have come with lots of benefits to man. Some of these benefits include, the invention of phones, electricity, the internet and social media, satellites, drones, etc. However, science and technology have been misused in the following ways;

1. Perpetration of violence: Weapons of war have caused the mass destruction of more people than was obtainable before. To aid these activities the fast means of communication and transportation cause seamless operations.

2. Breach of privacies: People with technical knowledge have the ability to intrude into the privacies of others. They can obtain information that was not originally meant for them.

3. Replacement of human labor: Machines and equipment have reduced the number of humans that were gainfully employed prior to the advent of these technologies.

4. National threats: Nations and governments now threaten their counterparts with the deployment of missiles. These attitudes aid international conflicts.

5. Devotion of excessive time to technologies: Teenagers most especially have developed an overdependence on technologies. A lot of time is now spent on phones, thus causing the neglect of social relationships.

5 0
2 years ago
Alison wants to add her company name at the bottom of every page in her document. Which option should she use?
beks73 [17]
Alison should use the Footer I think.
3 0
2 years ago
Read 2 more answers
We love him, because he ."
Andre45 [30]
We love him, because he “is everything I need.” I’m kinda confused on the answer lemme know if you need help
7 0
2 years ago
, = , ?<br><br>) ..(++ &lt;= );<br><br>) ..(++ &lt;= );​
m_a_m_a [10]

Answer:

:(((?????!!!! //// your answer.

3 0
3 years ago
Other questions:
  • The initial step of the five-step problem-solving model is to: A. Explore alternatives B. Clarify values. C. Develop an approach
    9·1 answer
  • This type of connection uses radio waves to connect devices on a network.
    15·2 answers
  • It is ok to sell services on Xbox in exchange for real-world money
    10·2 answers
  • Which section of a personal narritive requires the most development?
    14·1 answer
  • What functions do these WLAN applications and tools perform on WLANs: airmonng, airodump-ng, aircrack-ng, and aireplay-ng
    10·1 answer
  • "what command can be used on most linux distributions to find the directories where the man pages are kept"
    11·1 answer
  • An analog signal maintains a constant signal level for a period of time, then abruptly changes to a different constant level.
    5·2 answers
  • Before u can open and edit a file, you need to zip it, T/F
    12·1 answer
  • What are Operating Systems?
    8·1 answer
  • You discover that the lecturers will be using the laptops for online and video lecturing, and you see the need to upgrade the RA
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!