1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Len [333]
3 years ago
13

A. Suppose a CPU with a write-through, write-allocate cache achieves a CPI of 2. What are the read and write bandwidths (measure

d by bytes per cycle) between RAM and the cache?
b. For a write-back, write allocate cache, assuming 30% of replaced data cache blocks are dirty, what are the read and write bandwidths needed for a CPI of 2?

Data Reads per 1000 instructions Data Writes per 1000 instructions Instruction Cahce Miss Rate Data Cache Miss Rate Block size (Bytes)
250 100 0.30% 2% 64
Computers and Technology
1 answer:
cluponka [151]3 years ago
8 0

Answer:

Following are the solution to the given question:

Explanation:

In point 1:

I = number of program code completed.  

In such a block of the system memory, the number of iterations to read would be 64/W, while W is the length of its band.

Miss penalty (cycling):

Miss penalty is written for the data cache:

\to I \times \frac{100}{1000}\times 0.02(\frac{64}{W} + 1)

Miss penalty for the cache instruction:

\to I \times 0.003 \times (\frac{64}{W} + 1)

The CPI \leq 2,  Hit time + miss penalty Hit time:

= I + I \times [0.25 \times 0.02 + 0.1 \times 0.02 + 0.003] \times (\frac{64}{W} + 1) \leq I \times 2.

W \geq \frac{64}{99} \` \ 0.646 \frac{Byte}{cycle}.

In point 2:

Miss penalty read data cache:

\to I \times 0.25 \times 0.02 \times (1 + 0.3) \times (\frac{64}{W} + 1)

Miss penalty for the data cache:  

\to  I \times 0.1 \times 0.02  \times(1 + 0.3) \times (\frac{64}{W} + 1)

Read the penalty for miss:

\to I \times 0.003 \times (\frac{64}{W} + 1)

Total runtime = time hit + penalty mismatch

= I + I \times [0.25 \times 0.02 \times 1.3 + 0.1 \times 0.02\times 1.3 + 0.003]\times (\frac{64}{W} + 1) \leq 2I

0.0121 \times  (\frac{64}{W} + 1) \leq 1 \\\\ W \geq 0.784 \frac{Byte}[cycle}

You might be interested in
When you use the mvc pattern for a java web application, you often add ________________________ to the request object before you
aivan3 [116]
Hi,

JVM - Java Virtual Machine

Hope this helps.
r3t40
6 0
3 years ago
when a stock or bond certificate is delivered, it must be in good transferable form. if the certificate is badly mutilated, it m
Elena-2011 [213]

Authentication can be done by the issuer of the security.

What do you mean by authentication?

Authentication is the act of proving an assertion, such as a computer system user's identification. Authentication is the process of verifying a person's or thing's identity, as opposed to identification, which is the act of indicating that identity. It could entail validating personal identification documents, verifying the authenticity of a website with a digital certificate, carbon dating an artefact, or guaranteeing that a product or document is not counterfeit.

Only a party with access to particular company documents may authenticate a mutilated certificate. It is most likely the issuer, but it could also be the transfer agent or registrar.

To learn more about authentication
brainly.com/question/28240257

#SPJ4

6 0
1 year ago
When’s The release date for Mobile legends project next phase 3 going To come
Gennadij [26K]

Answer: This Project will involve Hero Revamps, Hero Adjustments, Hero Remodels, and much more. Project NEXT is divided into 2 phases: the first phase was released on September 22, 2020, the second phase was released on June 15, 2021 and the third phase is to be released on "September 2021".

4 0
3 years ago
In three to five sentences, explain the function of the computer's operating system.
Sati [7]

Answer:

An Operating System (OS) is an interface between a computer user and computer hardware. An operating system is a software which performs all the basic tasks like file management, memory management, process management, handling input and output, and controlling peripheral devices such as disk drives and printers.

Explanation:

3 0
3 years ago
Identify an internal user who uses product lifecycle management (plm) software and its data.
Andrej [43]

<u> Quality assurance manager</u> is an internal user who uses product lifecycle management (plm) software and its data.

<h3>What is quality assurance manager?</h3>

The quality assurance manager is accountable for delivering optimum quality of a company's benefits or goods. In addition to maintaining constant quality, they help to ensure keeping with laws, regulations, and environmental standards, recommending improvements where required.

<h3>What is the qualification of a Quality Assurance Manager?</h3>

Quality Assurance Manager Requirements:

Bachelor's degree or associate's with knowledge in the field. Technical proficiency must be able to use computers and generate reports. Capacity to analyze data and create and review processes. Excellent communication skills.

To learn more about quality assurance manager, refer

brainly.com/question/15855298

#SPJ4

Complete question is,

a. Packaging supplier

b. Contract manufacturer

c. Manufacturer's design partner

d. Quality assurance manager

3 0
1 year ago
Other questions:
  • Which of the following is NOT a group on the Slide Master tab?
    6·1 answer
  • Ideally, how often should you back up the data on your computer? once an hour, once a day, once a month, once a year. Please hur
    5·2 answers
  • Which of these jobs would be most appropriate for someone who majors in computer engineering? ANSWER FAST PLEASE
    15·2 answers
  • What does %d, , %c, %s mean and what's their difference?
    12·1 answer
  • When an expression containing a ____ is part of an if statement, the assignment is illegal.
    14·2 answers
  • 1)Write the command that moves the file data1 into the directory testdata:
    9·1 answer
  • What would be the total width of the div in the code below?
    11·2 answers
  • Abby has always dreamed of having her own ice cream shop. Now as a young entrepreneur she has decided to pursue her dream, but s
    13·1 answer
  • The create_python_script function creates a new python script in the current working directory, adds the line of comments to it
    6·1 answer
  • Which of the following statements should be avoided when developing a mission statement?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!