Computing the access time

Assignment Help Operating System
Reference no: EM1379655

A single level cache has following specifications.

Access time = 2.5 ns
Line size = 64 bytes
Hit ratio = 0.95

Main memory uses a block transfer capability & has 1st word (four bytes) access time of fifty ns and access time for following words as 5 ns.

Compute the access time when there is a cache miss? Assume that the cache waits until the line has been fetched from main memory and then re-executes for a hit.

Will increasing the line size to 128 bytes, and a resulting increase in H (hit ratio) to .97, reduce the average memory access time?

 

Reference no: EM1379655

Questions Cloud

Importance of having enough ram : Determine the importance of having enough RAM? Discuss how does it relate to how fast a computer can process data from a big database residing on ones hard drive?
Find total memory bytes stored in the cache : Following, a byte addressable main memory of 2^16 bytes and block size of eight bytes, using direct mapped cache consisting of thirty-two lines.
Research article analysis : Using the criteria for "Judging a Research Study" on pages 258 and 259of your textbook, evaluate at least five or more research articles.
Compute the cost of 1 mbyte of main memory : Describe the meaning of Tc, Cc, Tm and Cm and compute the cost of 1 MByte of main memory using the above parameters.
Computing the access time : Main memory uses a block transfer capability & has 1st word (four bytes) access time of fifty ns and access time for following words as 5 ns.
Determine the format of main memory address : Given that a system has two way set associative cache of size eight KBytes, with sixteen bytes cache lines, and a byte-addressable main memory of size 64 MBytes.
Creating programs to compute : Compare zero-, one-, two-, and three-address machines through writing programs to compute X = (A+B X C)/D - E X F)
Evaluate a dbms in terms of lock granularity : Suppose you are asked to evaluate a DBMS in terms of lock granularity and the different locking levels. Create a simple database environment in which these features would be important.
Creating a c++ program : A text document with machine code for little man's computer following instruction set. Instructions are in different lines.

Reviews

Write a Review

Operating System Questions & Answers

  Question about big oh relationship

Provide witnesses n0 and c that can be used to prove the relationship. Select your witnesses to be minimal, in the sense that n0-1 and c are not witnesses, and if d

  Define critical path and cpm

Define Critical Path and CPM. Define Networks & Network scheduling

  Automatic diagnostic system

Sommerville recommended that objects manipulated through users should be drawn from their own domain rather that an computer domain.

  Regulating the networking field

Describe whether there are too many standards organizations attempting to regulate networking field. Take into consideration whether consultation is necessary to manage standards.

  Stateful inspection packet filtering routers

Name two benefits of Stateful Inspection Packet Filtering Routers. Name two benefits that firewalls add to a network

  Creating hipo charts and decision tables

Now that you have a program design and a selected programming language for your assignment, you can start looking at the logical flow of the processes within your program and the data that is input,

  Requirements model for aims project

Need help in finalizing the requirements model for Airlines Information Management System (AIMS) project. The requirements model require to include use case diagrams for the entire AIM system.

  Why thread belonging to same process affected by page fault

Other user user threads belonging to the same process also be affected by the page fault (i.e., would they also have to wait for the faulting page to be brought into memory?) Explain.

  Analyse the different methods for collecting data

Analyse the different methods for collecting data Explain by taking examples 3 types of Sampling techniques.

  Explain basic network security concepts

Explain an example of the Public Key Infrastructure that would describe the differing usages of symmetric and asymmetric encryption and how these encryption technique might use either a substitution or a transposition cipher.

  Question about about telecommunications

Think about a simple telephone network consisting of two end offices and one intermediate switch with a 1-MHz full-duplex trunk in each end office and the intermediate switch.

  Explain the role of antennas in transmission

Explain the role of antennas in transmission of radio waves. Determine what type of antenna is typically used in a wireless LAN?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd