Performance of caches - computer architecture, Computer Engineering

Performance of caches:

      Amdahl's Law regarding overall speed up:

 

354_Performance of caches1.png

 

             Alternatively, CPU stall can be considered:                                                                  

CPU execution time =( CPU clock cycle + Memory stall cycle)*clock cycle

The number of memory stall cycle depends:

Memory stall cycle=IC * Memory reference per instruction *Miss rate *Miss penalty

Table: Direct mapped cache,32-byte block ,SPEC92,DEC station 5000

 

1340_Performance of caches.png

 

Posted Date: 10/13/2012 5:17:46 AM | Location : United States







Related Discussions:- Performance of caches - computer architecture, Assignment Help, Ask Question on Performance of caches - computer architecture, Get Answer, Expert's Help, Performance of caches - computer architecture Discussions

Write discussion on Performance of caches - computer architecture
Your posts are moderated
Related Questions
Write a decision table that specifies the rules for the game of checkers

compare 2g , 3g , and 4g also with advantage of 3g and 4g.

Q. How many instructions in a Computer? A computer can have a vast number of instructions and addressing modes. Older computers with the growth of Integrated circuit technolog

What is the  disadvantage of strobe  method. The drawbacks of strobe method are that the source unit that show the transfer has no way of knowing whether the destination unit h

What is Dynamic Modelling  As you know that computer systems are built from the objects which respond to events. External events arrive at boundary of system; you understan

Purpose: Front line client service. Make bookings for vehicle servicing, accesses client database, prints invoices for clients etc. The mechanics complete worksheets for the variou

whitch goods did the new england colonies exportto england and what did they get in return

Solve the following cryptarithmetic problem using Prolog: P I N G P O N G + F U N --------- I G N I P Each of the 7 different letters stands for a different digit. The

Hashed strings can often be deciphered by 'brute forcing'. Bad news, eh? Yes, and particularly if your encrypted passwords/usernames are floating around in an unprotected file some

Which translator perform macro expansion, is called? Ans. Macro pre-processor perform macro expansion.