1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WARRIOR [948]
4 years ago
12

A computer has a cache and main memory. 20 ns are required to reference a word that is in the cache. If the word is in main memo

ry but not in the cache, 60 ns are needed to load it into the cache (this includes the time to originally check the cache), and then the reference is started again. If the word is not in main memory, 10 ms are required to fetch the word from disk, followed by 60 ns to copy it to the cache, and then the reference is started again. The cache hit ratio is 0.9 and the main memory hit ratio is 0.99. What is the average time in ns required to access a referenced word on this system?
Computers and Technology
1 answer:
Alecsey [184]4 years ago
5 0

Answer:

T_{average} =12026ns

Explanation:

Given Information:

T_{cache}=20 ns

T_{main}=60ns

T_{disk} =12ms=12,000,000ns

hit_{cache} =0.9

miss_{cache} =1-0.9=0.10

hit_{main} =0.99

miss_{main} =1-0.99=0.01

There are 3 possible cases

1. Location of reference word is in cache

T_{cache}*hit_{cache} =20*0.9=18ns

2. Location of reference word is not in cache but in main memory

(T_{cache}+T_{main})*(miss_{cache}*hit_{main}) =(20+60)*(0.10*0.99)=7.92ns

3. Location of reference word is neither in cache nor in main memory

(T_{cache}+T_{main}+T_{disk})*(miss_{cache}*miss_{main})

(20+60+12,000,000)*(0.10*0.01)=12000.08 ns

The average time required to access a referenced word on this system is simply the sum of above 3 cases

T_{average} =18+7.92+12000.08=12026ns

You might be interested in
What is focus of developers interested in the internet of things?
Delicious77 [7]
Investigates the current state of the Internet of things
Explore the opportunities arising for developers
Analyze the quantity and quality of support for developers in this space
Uncover best practices of which developers should have an immediate working knowledge
8 0
3 years ago
_____ changes all occurrences of misspelled words in a document.
guajiro [1.7K]

Answer:

My answer is C.

4 0
3 years ago
One way to increase savings is to _____ cash inflows
Arlecino [84]

I beleive anything to do with manage

4 0
3 years ago
Ten(10) examples of wearables or wearable technologies?​
Semmy [17]

Answer:read

Explanation:

airpods

headphones

earbuds

AirPods  pro

watch

fitbit (type of watch that counts your miles) &you can say workout watch&

VR set

technology bracelet

smart glasses

Smart ring

7 0
3 years ago
You are asked to check your company’s configurations to determine if any filters should be built to stop certain ICMPv6 traffic.
DedPeter [7]

ICMPv6 is used by IPv6 nodes to report errors encountered in processing packets, and to perform other internet-layer functions, such as diagnostics.  An Internet Control Message Protocol (ICMP) flood attack, also known as a Ping flood attack, is a common Denial-of-Service (DoS) attack in which an attacker attempts to overwhelm a targeted device with ICMP echo-requests.

Explanation:

Issues that are of concern which could be a problem include :

Denial-of-Service Attacks  

  • ICMPv6 can be used to cause a denial of service (DoS) in a number of  ways, including simply sending excessive numbers of ICMPv6 packets to destinations in the site and sending error messages that disrupt  established communications by causing sessions to be dropped.

Probing

  • A major security consideration is preventing attackers from probing  the site to determine the topology and identify hosts that might be vulnerable to attack.  Carefully crafted but, often, malformed  messages can be used to provoke ICMPv6 responses from hosts thereby  informing attackers of potential targets for future attacks.  However, the very large address space of IPv6 makes probing a less effective weapon as compared with IPv4 . Redirection Attacks

Redirection Attacks

  • A redirection attack could be used by a malicious sender to perform  man-in-the-middle attacks or divert packets either to a malicious  monitor or to cause DoS by blackholing the packets.  These attacks would normally have to be carried out locally on a link using the Redirect message.  Administrators need to decide if the improvement  in efficiency from using Redirect messages is worth the risk of  malicious use.  Factors to consider include the physical security of   the link and the complexity of addressing on the link

Renumbering Attacks

  • Spurious Renumbering messages can lead to the disruption of a site.  Although Renumbering messages are required to be authenticated with  IPsec, so that it is difficult to carry out such attacks in practice,  they should not be allowed through a site boundary firewall.  On the  other hand, a site may employ multiple "layers" of firewalls.

Problems Resulting from ICMPv6 Transparency

  • Because some ICMPv6 error packets need to be passed through a  firewall in both directions, malicious users can potentially use  these messages to communicate between inside and outside, bypassing  administrative inspection.

Packet types or specific circumstances in which ICMPv6 traffic could compromise network security :

Ping sweep — A type of attack that uses ICMP echo request messages to enumerate live hosts on a network.

Ping flood — Utilized to launch a denial of service attack (DoS), where the attacker sends ICMP requests in a rapid succession without waiting for the targeted system to respond.

ICMP tunneling — A method used to establish a covert communication channel between remote systems, most times between a client and a proxy. All communications are sent via ICMP requests and replies

Forged ICMP redirects —  The attacker would send a ICMP redirect message, which informs a host of a direct path to a destination, to the victim that contains the IP addresses of the attacker’s system. This allows an attacker to compromise network traffic via a man-in-the-middle attack or cause a DoS.

8 0
3 years ago
Other questions:
  • What are the advantages and disadvantages of using thermoset plastics
    14·1 answer
  • When you close a file, what happens to the undo history list for that file?
    5·1 answer
  • Why do some people put salt on sidewalks when it snows?
    14·1 answer
  • What do rocket scientists mean when they say, "forces come in pairs?"
    7·1 answer
  • How do you check how much space is left in current drive?
    9·1 answer
  • Write a python function average_sample_median(n,P), that return the average of 1000 samples of size n sampled from the distribut
    10·1 answer
  • The "c" key and the "e" key are struck by
    12·2 answers
  • You want to use a computer to make a painting of your backyard to go along with a story you wrote. Which software would be appro
    8·1 answer
  • How do spear phishing attacks differ from standard phishing attacks?
    5·1 answer
  • A hacker is trying to gain remote access to a company computer by trying brute force password attacks using a few common passwor
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!