Evaluating performance improvement options

Assignment Help Operating System
Reference no: EM1379714

Question: Processor X has a clock speed of 2Ghz and takes one cycle for integer operations, two cycles for memory operations, and four cycles for floating point operations. Empirical data shows that programs run on Processor X are typically composed of 35% floating point operations, 30% memory operations, and 35% integer operations.

You are designing Processor Y, and improvement on Processor X which will run the same programs and you have 2 options to improve the performance:
-Increase the clock speed to 2.4Ghz, but memory operations take 3 cycles.
-Decrease the clock speed to 1.8 ghz, but floating point operations only take 3 cycles.

Calculate the speedup for options and decide the option Processor Y should take.

 

Reference no: EM1379714

Questions Cloud

Define control flow in programming : Use internet to define and study control flow in programming. Discuss how would you use control flow in computer programming to solve problems?
Why is it so important to businesses operating in china : Explain concept of gaunxi. Why is it so important to businesses operating in china. How did McDonald's lack of gaunxi raise its cost of doing business in china.
Identify some factors that have affected womens flexibility : Identify some factors that have affected women's flexibility in workplace throughout history. Evaluate factors that have affected women's pay in workforce, Hypothesize what may change for women in workplace within next 10 years.
What would be earlie exposure to liability : Also in such a scenario, due to sale of defective products, Singapore operations rack up a liability of 2million dollars. What would be Earlie's exposure to liability.
Evaluating performance improvement options : Processor X has a clock speed of 2Ghz and takes one cycle for integer operations, two cycles for memory operations, and four cycles for floating point operations.
Estimate you will exhaust account in six months : Beginning next year, mortgage interest rate will increase also monthly expenses will exceed monthly revenue. You estimate you will exhaust account in six months.
Question about it planning : Some companies think that IT planning is a waste of time because the competitive environment and technologies change too rapidly.
Explore the role of the epigenome : Explore the role of the epigenome and/or other gene expression regulatory mechanisms in the development of cancer.  Discuss in detail one possible epigenetic/post-transcriptional/post-translational target for cancer treatment, and identify the succes..
State your rationale with your answer : Share deceptive tactic you investigated from e-Activity. On a scale of 1 to 5 with 5 being highly deceptive, rate tactic you found also state why you gave it that rating.

Reviews

Write a Review

Operating System Questions & Answers

  Define critical path and cpm

Define Critical Path and CPM. Define Networks & Network scheduling

  Mobile users and enterprise security

The Baypoint Group requires your help with a presentation for Academic Computing Services, a nationwide company that assists colleges and universities with technology issues.

  Finding the length of cable in the lan

Suppose that the smallest possible message is sixty-four bytes. If we use 10BaseT, how long is a sixty-four byte message?

  Question about computer memory cells

Discuss how many cells can be in a computer's main memory if each cell's address can be represented by two hexadecimal digits?

  Procedure to manually remove the existing power supply

Explain the procedure necessary to properly install or replace the computer power supply in a computer.

  Solving networking question

Your corporation has a network that contains many NetWare 4.11 servers and uses IPX as the routing protocol. Each of network sections has at least one NetWare server on it.

  Program to compute the signature

Assume Fred sees your RSA signaure on m1 and m2, (i.e., he sees (md1 mod n) and (md2 mod n).

  Difference between an exclusive lock and a shared lock

Describe the difference between an exclusive lock and a shared lock. Define deadlock and how can it be avoided? How can it be resolved once it occurs?

  Scientific principles behind a computer technology

Explain the scientific principles behind a computer technology and discuss how social, political, economic or ethical impact of computers on our cultural structures and beliefs.

  Understanding networking concepts

Determine some of the issues facing AT&T as they try to integrate multiple services to deliver to the consumer? What impact does competition play?

  Header fields in the ipv4 and ipv6 protocols

Compare the header fields in the IPv4 and IPv6 protocols. Explain strategies for converting IPv4 packets to IPv6 packets in a hybrid IP network.

  Applications for the programs

Applications are the programs that make our computers powerful. Not counting Microsoft Office, what are some of the new applications that you see making a big difference to computer users in next some years?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd