1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvasek [131]
4 years ago
7

You are asked to optimize a cache design for the given references. Th ere are three direct-mapped cache designs possible, all wi

th a total of 8 words of data: C1 has 1-word blocks, C2 has 2-word blocks, and C3 has 4-word blocks. In terms of miss rate, which cache design is the best? If the miss stall time is 25 cycles, and C1 has an access time of 2 cycles, C2 takes 3 cycles, and C3 takes 5 cycles, which is the best cache design?
Computers and Technology
1 answer:
Alja [10]4 years ago
8 0

Answer:

Explanation:

From the given data, Direct-Mapped cache with 8words of data means 2^3 of data.

There are three caches C1, C2 and C3.

C1 has 1 word blocks

C2 has 2 word blocks

C3 has 4 word blocks

also, Miss stall = 25 cycles.

We have,

Miss rate = 3% for current block size

Thus, for cache C1, miss rate = 3%

cache C2, miss rate = 2%

cache C3, miss rate = 1.2%

So, the cache C3 design is the best. In terms of miss rate. The cache performance increases with decrease in miss penalty.

That means if miss penalty is less, then the performance of cache increases. And for cache C3, the miss penalty is less.

From given data

C1 acess time is 2 Cycles.

C2 acess time is 3 Cycles.

C3 acess time is 5 Cycles.

Then

C1 stall time is 25*11+ 2*12 = 299.

C2 stall time is 25*9+ 3*12 = 261.

C3 stall time is 25*10+ 5*12 = 310.

In this case, C2 is the best cache design.

And

C1 stall time is 25*11+ 2*12 = 299.

C2 stall time is 25*8+ 3*12 = 236.

C3 stall time is 25*8+ 5*12 = 260.

In this case also, C2 is the best cache design.

You might be interested in
Password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate us
Vlada [557]

Answer:

Rule based Attack.

Explanation:

                    As password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate user. The attacker can use Rule Based Attack to find the password and to intrude or compromise the network and systems.

                    This is like a programming language to generate the password. This involves functions to modify, cut, edit and extend the generally used terms by the user.

5 0
3 years ago
In addition to compiling the list of user access requirements, applications, and systems, the BIA also includes processes that a
laila [671]

Answer:

automated

Explanation:

Basically a Business Impact Analysis (BIA) estimates and determines the effects of a business activity and process disturbances. These disruptions can be natural or electronic disasters. It also collects information which is used to establish recovery plan. It identifies the business vulnerabilities and works on the strategies in order to reduce such potential hazards. The BIA involves both manual and automated processes. BIA involves automated processes which include the automated software tools that enables the protection of the confidential information of the users and also generates automated reports about the critical business processes.

5 0
4 years ago
Which type of packet is sent by a dhcp server after receiving a dhcp discover message?
emmasim [6.3K]
A<span> DHCPOffer packet is sent to the client.</span>
5 0
3 years ago
_____ consists of computer programs that govern the operation of a computer.
telo118 [61]
Hello <span>Siyujiang8092</span>

Answer: Software<span> consists of computer programs that govern the operation of a computer.

Hope that helps
-Chris</span>
6 0
4 years ago
Laura is in the middle of making a presentation. On one slide, she includes a heading, three subheadings, and three bullet point
Nat2105 [25]

The first one us d....


6 0
3 years ago
Read 2 more answers
Other questions:
  • In the world of computers, the term ____ refers to the computerâs physical components, such as the monitor, keyboard, motherboar
    14·1 answer
  • A group of accountants encrypt the emails they send to your company because they contain highly sensitive financial information.
    11·1 answer
  • Face book requires you to change your password regularly<br> a. TRUE<br> b. FALSE
    14·1 answer
  • Which output will be displayed by the following program?
    5·2 answers
  • For each of these statements find a domain for which the statement is true and a domain for which the statement is false. a) Eve
    13·1 answer
  • An email message containing a warning related to a non-existent computer security threat, asking a user to delete system files f
    6·1 answer
  • Why is it NOT a good practice to save everything on the desktop?
    6·2 answers
  • Radio waves can be used to transmit energy. What is an advantage of this method in computer technology
    7·2 answers
  • I need help solving this problem on Picoctf. The question is What happens if you have a small exponent? There is a twist though,
    7·1 answer
  • Which structural semantic will this HTML code snippet form?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!