Answer:
3.1 ns ; 1.25 ; 3.097
Explanation:
Given :
IF, 3 ns;
ID, 2.5 ns;
EX, 2 ns;
MEM, 3 ns;
WB, 1.5 ns.
Use 0.1 ns for the pipelineregisterdelay
maximum time required for MEM = 3 ns
Pipeline register delay = 0.1 ns.
Clock cycled time of the pipelined machine= maximum time required + delay
3ns+0.1 ns = 3.1 ns
2.) for stall after every 4 instruction :
CPI of new machine :
(1 + (1 /4)) = 1 + 0.25 = 1.25
3.)
The speedup of pipelined machine over the single-cycle machine is given by :
Average time per instruction of single cycle ÷ average time per instruction of pipelined
Clock time of original machine = 12ns
Ideal CP1 = 1
CPI of new machine = 1.25
Clock period = 3.1 ns
(12 * 1) / (1.25 * 3.1) = 12 / 3.875
= 3.097
D. Speed up will equal the number of stages in the machine
Answer:
Same Browser
Explanation:
If we access some password for some website in from some computer. It will be saved in the browser of the computer. Whenever we access the website from some other computer and we want to login we need the same browser.
In this process, browser is sync by using our mailing address. Whenever we want to access the pasword of different website from some other device, we need to sync that device browser with the same mailing address.
In this process all password that are saved on other device may access from any device.
Units and prefixes are created and unit definitions are modified through international agreement as the technology of measurement progresses and the precision of measurements improves.
Answer:
It is A: Packet metadata is used to route and reassemble information travelling through the internet.
Explanation:
Step 1: The Internet works by chopping data into chunks called packets. Each packet then moves through the network in a series of hops. Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee
Step 2: Entering the network
Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee.
Step 3: Taking flight
The next hop delivers the packet to a long-haul provider, one of the airlines of cyberspace that quickly carrying data across the world.
Step 4: BGP
These providers use the Border Gateway Protocol to find a route across the many individual networks that together form the Internet.
Step 5: Finding a route
This journey often takes several more hops, which are plotted out one by one as the data packet moves across the Internet.
Step 6: Bad information
For the system to work properly, the BGP information shared among routers cannot contain lies or errors that might cause a packet to go off track – or get lost altogether.
Last step: Arrival
The final hop takes a packet to the recipient, which reassembles all of the packets into a coherent message. A separate message goes back through the network confirming successful delivery.