1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Len [333]
3 years ago
13

A. Suppose a CPU with a write-through, write-allocate cache achieves a CPI of 2. What are the read and write bandwidths (measure

d by bytes per cycle) between RAM and the cache?
b. For a write-back, write allocate cache, assuming 30% of replaced data cache blocks are dirty, what are the read and write bandwidths needed for a CPI of 2?

Data Reads per 1000 instructions Data Writes per 1000 instructions Instruction Cahce Miss Rate Data Cache Miss Rate Block size (Bytes)
250 100 0.30% 2% 64
Computers and Technology
1 answer:
cluponka [151]3 years ago
8 0

Answer:

Following are the solution to the given question:

Explanation:

In point 1:

I = number of program code completed.  

In such a block of the system memory, the number of iterations to read would be 64/W, while W is the length of its band.

Miss penalty (cycling):

Miss penalty is written for the data cache:

\to I \times \frac{100}{1000}\times 0.02(\frac{64}{W} + 1)

Miss penalty for the cache instruction:

\to I \times 0.003 \times (\frac{64}{W} + 1)

The CPI \leq 2,  Hit time + miss penalty Hit time:

= I + I \times [0.25 \times 0.02 + 0.1 \times 0.02 + 0.003] \times (\frac{64}{W} + 1) \leq I \times 2.

W \geq \frac{64}{99} \` \ 0.646 \frac{Byte}{cycle}.

In point 2:

Miss penalty read data cache:

\to I \times 0.25 \times 0.02 \times (1 + 0.3) \times (\frac{64}{W} + 1)

Miss penalty for the data cache:  

\to  I \times 0.1 \times 0.02  \times(1 + 0.3) \times (\frac{64}{W} + 1)

Read the penalty for miss:

\to I \times 0.003 \times (\frac{64}{W} + 1)

Total runtime = time hit + penalty mismatch

= I + I \times [0.25 \times 0.02 \times 1.3 + 0.1 \times 0.02\times 1.3 + 0.003]\times (\frac{64}{W} + 1) \leq 2I

0.0121 \times  (\frac{64}{W} + 1) \leq 1 \\\\ W \geq 0.784 \frac{Byte}[cycle}

You might be interested in
Which element would the search element be compared to first, if abinary search were used on the list above?
Natali [406]

Answer:

35

Explanation:

Binary search is more efficient than linear search,time complexity of binary is 0(logn) where as linear's 0(n).In binary search we search from the middle of the array,whereas in linear we start with index 0 until the last.

4

35

44

98

List contains 4 elements, for finding the middle element we will divide by 2 .

4/2=2 so at the index 2 -35 is present ,we will start checking from 35.  

6 0
3 years ago
IPhone + iPad + iPod + iPod touch + iMac + MacBook + iBook + Apple =???
patriot [66]

Answer:

something

Explanation:

i dont understand

7 0
3 years ago
Read 2 more answers
An administrator has been asked to update a flow that was created as part of a recent update. When the administrator opens the f
Luba_88 [7]

There are steps to take so as to update a flow that was created as part in recent update. What would cause the said action is that  the flow Is a before save flow.

<h3>What is a flow</h3><h3 />
  • A flow in this scenario is known to makes before-save updates and it is known to be quite similar to a before trigger.

The Before-save Flow is known to be a trigger that is done before a given operation.

See full question below

An administrator has been asked to update a flow that was created as part of a recent update. When the administrator opens the flow for edtting, the Flow Bunder toolbox offers only four elements: Assignment, Decision, Get Records, and Loop.

What would cause this?

A . The flow Is a before save flow.

B . The flow Is a screen flow.

C . The version of the flow is activate.

D . The version of the flow is inactive.

Learn more about Flow from

brainly.com/question/6532130

4 0
3 years ago
Open a command prompt on PC1. Issue the command to display the IPv6 settings. Based on the output, would you expect PC1 to be ab
Strike441 [17]

Answer:

yes it can communicate with all interfaces on the router.

Explanation:

PC1 has the right default gateway and is using the link-local address on R1. All connected networks are on the routing table.

Netsh may be a Windows command wont to display and modify the network configuration of a currently running local or remote computer. These activities will tell you in how manny ways we can use the netsh command to configure IPv6 settings.

To use this command :

1. Open prompt .

2. Use ipconfig to display IP address information. Observe the  output whether IPv6 is enabled, you ought to see one or more IPv6 addresses. A typical Windows 7 computer features a Link-local IPv6 Address, an ISATAP tunnel adapter with media disconnected, and a Teredo tunnel adapter. Link-local addresses begin with fe80::/10. ISATAP addresses are specific link-local addresses.  

3. Type netsh interface ipv6 show interfaces and press Enter. note the output listing the interfaces on which IPv6 is enabled. Note that each one netsh parameters could also be abbreviated, as long because the abbreviation may be a unique parameter. netsh interface ipv6 show interfaces could also be entered as netsh  ipv6 sh i.

4. Type netsh interface ipv6 show addresses  Observe the results  of the interface IPv6 addresses.

5. Type netsh interface ipv6 show destinationcache and press Enter. Observe the output of recent IPv6 destinations.

6. Type netsh interface ipv6 show dnsservers and press Enter. Observe the results listing IPv6 DNS server settings.

7. Type netsh interface ipv6 show neighbors and press Enter. Observe the results listing IPv6 neighbors. this is often almost like the IPv4 ARP cache.

8. Type netsh interface ipv6 show route and press Enter. Observe the results listing IPv6 route information.

5 0
3 years ago
In terms of data storage and sharing, in what way, if any, do dropbox services differ from archiving services?
ratelena [41]
I believe that the answer is B. 
7 0
3 years ago
Other questions:
  • Finding information on the web was made easier by _____________, which provide on-screen menus, making navigation of the web as
    12·1 answer
  • One main advantage of CD-ROMs is that..
    7·1 answer
  • "Suppose that instead of always selecting the first activity to finish, we instead select the last activity to start that is com
    14·1 answer
  • A user has been given Full Control permission to a shared folder. The user has been given Modify permission at the NTFS level to
    11·1 answer
  • A(n ____ enables a database administrator to define schema components.
    10·1 answer
  • You recently upgraded your computer and added an extra 512 MB of RAM. Consequently, you want to increase your swap space by addi
    10·1 answer
  • When discussing the data-modeling building blocks, anything (a person, a place, a thing, or an event) about which data are to be
    15·1 answer
  • What integer is represented by the following 8-bit twos complement representation: 1011 0000 ? (Enter your number in decimal, an
    6·1 answer
  • Hard and soft skills can both be transferable skills. *<br><br> True<br><br> False
    5·2 answers
  • Which similar computer network components connect multiple devices?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!