1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Len [333]
3 years ago
13

A. Suppose a CPU with a write-through, write-allocate cache achieves a CPI of 2. What are the read and write bandwidths (measure

d by bytes per cycle) between RAM and the cache?
b. For a write-back, write allocate cache, assuming 30% of replaced data cache blocks are dirty, what are the read and write bandwidths needed for a CPI of 2?

Data Reads per 1000 instructions Data Writes per 1000 instructions Instruction Cahce Miss Rate Data Cache Miss Rate Block size (Bytes)
250 100 0.30% 2% 64
Computers and Technology
1 answer:
cluponka [151]3 years ago
8 0

Answer:

Following are the solution to the given question:

Explanation:

In point 1:

I = number of program code completed.  

In such a block of the system memory, the number of iterations to read would be 64/W, while W is the length of its band.

Miss penalty (cycling):

Miss penalty is written for the data cache:

\to I \times \frac{100}{1000}\times 0.02(\frac{64}{W} + 1)

Miss penalty for the cache instruction:

\to I \times 0.003 \times (\frac{64}{W} + 1)

The CPI \leq 2,  Hit time + miss penalty Hit time:

= I + I \times [0.25 \times 0.02 + 0.1 \times 0.02 + 0.003] \times (\frac{64}{W} + 1) \leq I \times 2.

W \geq \frac{64}{99} \` \ 0.646 \frac{Byte}{cycle}.

In point 2:

Miss penalty read data cache:

\to I \times 0.25 \times 0.02 \times (1 + 0.3) \times (\frac{64}{W} + 1)

Miss penalty for the data cache:  

\to  I \times 0.1 \times 0.02  \times(1 + 0.3) \times (\frac{64}{W} + 1)

Read the penalty for miss:

\to I \times 0.003 \times (\frac{64}{W} + 1)

Total runtime = time hit + penalty mismatch

= I + I \times [0.25 \times 0.02 \times 1.3 + 0.1 \times 0.02\times 1.3 + 0.003]\times (\frac{64}{W} + 1) \leq 2I

0.0121 \times  (\frac{64}{W} + 1) \leq 1 \\\\ W \geq 0.784 \frac{Byte}[cycle}

You might be interested in
If you can log nto a website to add, edit, or delete content that has been added by you or another user , you are most likley us
STatiana [176]
Open source. Linux or early andriod are both open source. Meaning users can change programs and applications at their whim. If they know what they are doing of course

5 0
3 years ago
List 5 anti-virus products currently in use
Angelina_Jolie [31]
Norton Antivirus
BIT DEFENDER
F-secure
Avira
McAfee
6 0
3 years ago
Xavier buys a new laptop for $540. He makes a down payment $75 and pays the rest in 6 equal monthly payments, p. What equation r
mylen [45]

Explanation:

so you want to subtract 540-75=465

so 465 is what he has to pay total so now we break it up into equal parts

465/6=77.5

so he would pay $77

3 0
2 years ago
Desirable workplace habits and skills include:
levacccp [35]
Being extroverted
Problem-Solving
6 0
3 years ago
before Katie turns in the paper she typed she wants a peer to review it and give her feedback Katie uses her all in one printer
masha68 [24]

It is an input and an output. The scanner scans the paper which is the input ,and the output is when the printer prints the paper.

3 0
3 years ago
Other questions:
  • This type of connection uses radio waves to connect devices on a network.
    9·2 answers
  • ___________is a security strategy that applies multiple layers of defense because there is an assumption that any single protect
    12·1 answer
  • How to change screen resolution in windows 10?
    5·1 answer
  • You have just finished upgrading the 250 w power supply in your desktop computer to a 450 w power supply. now the bios doesn't r
    7·1 answer
  • discuss the benefits of normalization, and do you think we should normalize our designs to higher levels than 3NF? Why or why no
    9·1 answer
  • Deleting anitem from a linked list is best when performed using two pointersso that the deleted item is freed from memory.
    7·1 answer
  • Which of the following is true of horror films like Insidious and The Conjuring?
    15·2 answers
  • IN WHICH COUNTRY DO THEY LET YOU PLAY MINECRAFT IN SCHOOL?
    8·2 answers
  • What is the name for the size and style of text?
    8·2 answers
  • What is an advantage of using a fully integrated cloud based data analytics platform
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!