1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Len [333]
3 years ago
13

A. Suppose a CPU with a write-through, write-allocate cache achieves a CPI of 2. What are the read and write bandwidths (measure

d by bytes per cycle) between RAM and the cache?
b. For a write-back, write allocate cache, assuming 30% of replaced data cache blocks are dirty, what are the read and write bandwidths needed for a CPI of 2?

Data Reads per 1000 instructions Data Writes per 1000 instructions Instruction Cahce Miss Rate Data Cache Miss Rate Block size (Bytes)
250 100 0.30% 2% 64
Computers and Technology
1 answer:
cluponka [151]3 years ago
8 0

Answer:

Following are the solution to the given question:

Explanation:

In point 1:

I = number of program code completed.  

In such a block of the system memory, the number of iterations to read would be 64/W, while W is the length of its band.

Miss penalty (cycling):

Miss penalty is written for the data cache:

\to I \times \frac{100}{1000}\times 0.02(\frac{64}{W} + 1)

Miss penalty for the cache instruction:

\to I \times 0.003 \times (\frac{64}{W} + 1)

The CPI \leq 2,  Hit time + miss penalty Hit time:

= I + I \times [0.25 \times 0.02 + 0.1 \times 0.02 + 0.003] \times (\frac{64}{W} + 1) \leq I \times 2.

W \geq \frac{64}{99} \` \ 0.646 \frac{Byte}{cycle}.

In point 2:

Miss penalty read data cache:

\to I \times 0.25 \times 0.02 \times (1 + 0.3) \times (\frac{64}{W} + 1)

Miss penalty for the data cache:  

\to  I \times 0.1 \times 0.02  \times(1 + 0.3) \times (\frac{64}{W} + 1)

Read the penalty for miss:

\to I \times 0.003 \times (\frac{64}{W} + 1)

Total runtime = time hit + penalty mismatch

= I + I \times [0.25 \times 0.02 \times 1.3 + 0.1 \times 0.02\times 1.3 + 0.003]\times (\frac{64}{W} + 1) \leq 2I

0.0121 \times  (\frac{64}{W} + 1) \leq 1 \\\\ W \geq 0.784 \frac{Byte}[cycle}

You might be interested in
Draw a flow chart to print gratest number among two .​
bagirrra123 [75]
MYbe show a picture next time so we can see what the problem is about ?
7 0
3 years ago
Read 2 more answers
________ is malware that hijacks a user's computer and demands payment in return for giving back access.
Lera25 [3.4K]

Ransom  malware that hijacks a user's computer and demands payment in return for giving back access.

<h3>What is Ransom malware?</h3>

This is known to be a kind of  malware that hinders users from gaining in or access to their system or personal files and it is one that often demands ransom payment so as to get access.

Therefore, Ransom  malware that hijacks a user's computer and demands payment in return for giving back access.

Learn more about Ransom  malware from

brainly.com/question/27312662

#SPJ12

6 0
2 years ago
What type of malicious software tries to gather information about you without your consent?
AlekseyPX

Answer:

B-malware

Explanation:

I do tech and i help work on computars.

6 0
3 years ago
Tuple in Python code help pleaseee!!! And of course I'll make you as Branlist
GuDViN [60]

<u>Question 9:</u>

The correct answer would be either (b) or (d).

<u>Question 10:</u>

<u></u>

The correct answer would be (b).

Hope it helps. :)

7 0
3 years ago
Larry recently viewed an auction listing on a website. as a result, his computer executed code that popped up a window that aske
RUDIKE [14]
<span>Larry recently viewed an auction listing on a website. as a result, his computer executed code that popped up a window that asked for his password. The type of attack larry had likely encountered is the </span><span>Cross-site scripting (XSS).</span>
4 0
3 years ago
Other questions:
  • Which is true regarding networks?
    7·2 answers
  • Melissa is the network administrator for a small publishing company. as network administrator, she is in charge of maintaining t
    8·1 answer
  • Chat messages are most likely to be found where on a computer? firewall nic internet history ram
    7·1 answer
  • Which of the following is a rule of thumb for cell phones or smartphone etiquette ?
    12·1 answer
  • Your employer is opening a new location, and the IT director has assigned you the task of calculating the subnet numbers for the
    14·1 answer
  • A junior administrator is having issues connecting to a router's console port using a TIA/EIA 568B standard cable and a USB seri
    5·1 answer
  • In a Microsoft Office application, what is the area at the bottom of the application screen that contains information about the
    13·1 answer
  • The results of the SPEC CPU2006 bzip2 benchmark running on an AMD Barcelona has an instruction count of 2.389E12, an execution t
    6·1 answer
  • _________________________ are the countable products resulting from a program, while ________________________ are the changes in
    9·1 answer
  • READ CAREFULLY! There is a difference between moving and copying files.a. Create a directory named . For example, mine would be
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!