1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Len [333]
3 years ago
13

A. Suppose a CPU with a write-through, write-allocate cache achieves a CPI of 2. What are the read and write bandwidths (measure

d by bytes per cycle) between RAM and the cache?
b. For a write-back, write allocate cache, assuming 30% of replaced data cache blocks are dirty, what are the read and write bandwidths needed for a CPI of 2?

Data Reads per 1000 instructions Data Writes per 1000 instructions Instruction Cahce Miss Rate Data Cache Miss Rate Block size (Bytes)
250 100 0.30% 2% 64
Computers and Technology
1 answer:
cluponka [151]3 years ago
8 0

Answer:

Following are the solution to the given question:

Explanation:

In point 1:

I = number of program code completed.  

In such a block of the system memory, the number of iterations to read would be 64/W, while W is the length of its band.

Miss penalty (cycling):

Miss penalty is written for the data cache:

\to I \times \frac{100}{1000}\times 0.02(\frac{64}{W} + 1)

Miss penalty for the cache instruction:

\to I \times 0.003 \times (\frac{64}{W} + 1)

The CPI \leq 2,  Hit time + miss penalty Hit time:

= I + I \times [0.25 \times 0.02 + 0.1 \times 0.02 + 0.003] \times (\frac{64}{W} + 1) \leq I \times 2.

W \geq \frac{64}{99} \` \ 0.646 \frac{Byte}{cycle}.

In point 2:

Miss penalty read data cache:

\to I \times 0.25 \times 0.02 \times (1 + 0.3) \times (\frac{64}{W} + 1)

Miss penalty for the data cache:  

\to  I \times 0.1 \times 0.02  \times(1 + 0.3) \times (\frac{64}{W} + 1)

Read the penalty for miss:

\to I \times 0.003 \times (\frac{64}{W} + 1)

Total runtime = time hit + penalty mismatch

= I + I \times [0.25 \times 0.02 \times 1.3 + 0.1 \times 0.02\times 1.3 + 0.003]\times (\frac{64}{W} + 1) \leq 2I

0.0121 \times  (\frac{64}{W} + 1) \leq 1 \\\\ W \geq 0.784 \frac{Byte}[cycle}

You might be interested in
48
Irina-Kira [14]

The statement that best explains the benefit that higher page placement provides those who use search engine optimization well is option A. People are more likely to click the first results than those further down the page.

<h3>What advantages do search engine results pages offer?</h3>

Search engine results pages (SERPs) typically feature paid search and pay-per-click (PPC) advertisements in addition to organic search results. Since consumers are more inclined to click on results at the top of the page, ranking position on a SERP can be very competitive thanks to search engine optimization (SEO).

Therefore, Search engine optimization, or SEO, is the act of enhancing your website to raise its natural prominence for particular search queries. Through onsite adjustments, SEO seeks to increase both the quality and volume of traffic to your website.

Learn more about search engine optimization from

brainly.com/question/14097391
#SPJ1

3 0
1 year ago
What is one of the disadvantages of a server-based network compared to a peer-to-peer network?
padilas [110]

One of the disadvantages of a server-based network compared to a peer-to-peer network is: 1) Additional costs.

<h3>What is a server?</h3>

A server can be defined as a dedicated computer system that is designed and developed to provide specific services to other computer devices or programs, which are commonly referred to as the clients.

<h3>Types of server.</h3>

In Computer technology, there are different types of server and these include the following:

  • Web server
  • Email server
  • File server
  • Database server
  • Proxy server

<h3>What is a Peer to Peer (P2P) Network?</h3>

In Computer networking, a Peer to Peer (P2P) network can be defined as a type of network that are designed and developed to connect similar computers that share data and software with each other at lesser cost in comparison with other network service.

In this context, we can infer and logically deduce that one of the disadvantages of a server-based network compared to a peer-to-peer network is additional costs.

Read more on Peer to Peer Networks here: brainly.com/question/1932654

#SPJ1

Complete Question:

What is one of the disadvantages of a server-based network compared to a peer-to-peer network?

1) Additional costs

2) none of these choices

3) Decentralized data access

4) Less secure

5) Difficult to expand

6 0
2 years ago
Is there SUM in Small basic? ​
babunello [35]

Answer:

no

Explanation:

3 0
3 years ago
Who should get the copyright credit for a piece of computer art: the CPU, the software, or the programmer? Explain your reasonin
yulyashka [42]

Answer:

The programmer.

Explanation:

The CPU (central processing unit or simply the processor) is the brain of the computer system, it processes data at a very fast rate depending on it's processing speed. But it only relates to speed of data processing and a link between components of the system.

A software is a program code at executes a task in the system. It a logical and follows an algorithm to solve a given task. Computer systems do not generate  lines of code by itself, but instead, A programmer writes the code to create the software used by the system.

6 0
3 years ago
Machine language library routines are installed on computers Select one: a. because they can come as part of the operating syste
Licemer1 [7]

Answer:

c. all of these choices

Explanation:

all of them are correct. i took a quiz on this like 2 days ago and that was the answer.

<em>hope this helpsssssssss!!!!!!!!!!! :):):)</em>

6 0
4 years ago
Other questions:
  • For this assignment, you will create flowchart using Flow gorithm and Pseudocode for the following program example: Hunter Cell
    12·1 answer
  • Identifying the problem is crucial when trying to solve a problem. There are several techniques that you can use to aide you in
    5·1 answer
  • You have no control over who view your post
    10·1 answer
  • To provide both encryption and integrity protection, wpa2 uses aes encryption with:
    12·1 answer
  • What affect does the corona virus have the United States economy
    7·1 answer
  • How to can you avoid becoming a victim of identity theft?
    10·1 answer
  • The one who will defeat me in this typing race I will mark the one brainliest:
    5·2 answers
  • Ummm, I hate to interrupt your day, but does anyone know where Mitch72 is????? Because he hasn't talked in a week, and he hasn't
    7·1 answer
  • Print ___________ command is used for adding numbers.​
    14·1 answer
  • Complete the code to finish this program to analyze the inventory for a store that sells purses and backpacks. Each record is co
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!