How many cycles are lost for instruction accessing memory, Computer Networking

1.  A computer system has a two-level memory cache hierarchy. The L1 cache has a zero hit penalty, a miss penalty of 5 ns and a hit rate of 95 percent. The L2 cache has a miss penalty of 100 ns and a hit rate of 90 percent.

a)  How many cycles are lost for each instruction accessing the memory if the CPU clock rate is 2 GHz?

b)  We can either increase the hit rate of the topmost cache to 98 percent or increase the hit rate of the second cache to 95 percent.  Which improvement would have more impact?

Posted Date: 3/22/2013 3:32:23 AM | Location : United States







Related Discussions:- How many cycles are lost for instruction accessing memory, Assignment Help, Ask Question on How many cycles are lost for instruction accessing memory, Get Answer, Expert's Help, How many cycles are lost for instruction accessing memory Discussions

Write discussion on How many cycles are lost for instruction accessing memory
Your posts are moderated
Related Questions
Deadlock Avoidance To avoid deadlocks two types of strategies are used: 1) Static prevention: It uses V and P operators and Semaphores to allocate and deallocate shared res

CSE4344 Computer Network Organization Project 1 Simple Web Server & Client Instructor: Sajib Datta Spring 2017 "What I cannot create, I do not understand." Richard P Feynman Object

QUESTION (a) Define what is a software agent? (b) An intelligent agent is known to exhibit several characteristics or properties that distinguish it from another piece of so

SQL is a powerful set-oriented language which was developed by IBM research for the databases that adhere to the relational model. It having of a short list of powerful, yet highly

What is the juncture at which the CPE ends and the local loop portion of the service starts?  Ans) The demarcation or demarc is the juncture at which the CPE ends and the local

Advantages of VPNs Advantages discussed in the following  section include those related to security. Consolidation transparency cost. And administration. a. Improved secur

IEEE 8021.d Spanning Tree Protocol (STP) was developed to stop routing loops in a network. If a router, switch, or hub has more than one path to the similar destination, a routing

Prepare the Network  Step 1: Disable all ports by using the shutdown command. Ensure that the initial switch port states are inactive with the shutdown command. Use the inter