Highest performance expressed in instructions

Assignment Help Basic Computer Science
Reference no: EM131369555

Consider three different processors P1, P2, and P3 executing the same instruction set. P1 has a 4GHz clock rate and a CPI of 2. P2 has a 2.5GHz clock rate and a CPI of 1.0, P3 has a 3GHz and a CPI of 1.2.

Which processor has the highest performance expressed in instructions per second?

If the processors each execute a program in 10 seconds, find the number of cycles and the number of instructions.

We are trying to reduce the execution time by 20% but this leads to an increase of 15% in the CPI. What clock rate should we have to get this time reduction?

Solution:

P1: 4 GHz, CPI = 2.0 → 4GHz/ 2.0 = 2 x 109 instructions/sec

P2: 2.5 GHz, CPI = 1.0 → 2.5GHZ/1.0 = 2.5 x 109 instructions/sec

P3: 3 GHz, CPI = 1.2 → 3GHz/1.2 = 2.5 x 109 instructions/sec

P2 has the highest performance at 2.5 GHz, CPI = 1.0 → 2.5GHZ/1.0 = 2.5 x 109 instructions/sec.

P1: 40 x 109 cycles

20 x 109 instructions

P2: 25 x 109 cycles

20 x 109 instructions

P3: 30 x 109 cycles

25 x 109 instructions

Execution time is reduced by 20% à t=? s

CPI is increased by 15%

Reference no: EM131369555

Questions Cloud

What should you learn about countrie you are considering : When selling a project to another countrie in this case i am talking about singapore. What should you learn about the countrie you are considering? Would you make contact or outsource this part of the project to another country?
What is probability that the device will work when needed : The reliabilities of the components are 0.96, 0.91, and 0.80. What is the probability that the device will work when needed?
Overall performance of a computer by improving : A pitfall cited in section 1.10 of the text book is expecting improve the overall performance of a computer by improving only one aspect of the computer. Consider a computer running a program that requires 200s, with 50s spent executing FP instruc..
Effectively engage various types of trainees and adapt : A successful trainer needs to effectively engage various types of trainees and adapt quickly in the learning environment to meet their needs. Chapter 8 of the Blanchard and Thacker (2013) text lists and offers tips on dealing with different participa..
Highest performance expressed in instructions : Consider three different processors P1, P2, and P3 executing the same instruction set. P1 has a 4GHz clock rate and a CPI of 2. P2 has a 2.5GHz clock rate and a CPI of 1.0, P3 has a 3GHz and a CPI of 1.2. Which processor has the highest performanc..
What is my probability of dying in a car crash : The population of France is 59,625,919. If I am going to live in France for five years, what is my probability of dying in a car crash?
What is the probability that at least one driver drives : If they set out to drive home after drinking at a party, what is the probability that at least one driver drives home safely?
Relationship between independent data marts : 1. Describe in detail the relationship between independent data marts and a federated enterprise data warehouse architecture. 2. What is meant by data aggregation within a data warehouse? Why was data aggregation commonly done in early­generation d..
Give the answer of muliple choice question : This author made an important distinction between personal religious experience and institutional religion:The sociologist who emphasized that individual religions arise from and express the values of their societies was:

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Number of sources to obtain the relevant information

You will need to research a number of sources to obtain the relevant information. At least four of these sources should be used for your report and your presentation. The resources must be credible, current (no earlier than 2010) and available in ..

  Guest lecturer at a local university for an ethical hacking

Imagine you've been sought out as a guest lecturer at a local university for an ethical hacking course. You have been asked to prepare a paper for the students, as well as a PowerPoint presentation, regarding the use of cryptography in corporations t..

  How much time elapses when the client clicks on the link

How much time elapses from when the client clicks on the link until the client receives both the Web page and the two images?

  How would this ip address be expressed

How many possible hosts would there be on the above network if all usable addresses were assigned (show your work)? d. How would this IP address be expressed using CIDR notation (show your work)? e. What is the range of the block of addresses this..

  . assume the node is in the usual info-link form with info

Show what is produced by the following C++ code. Assume the node is in the usual info-link form with the info of the type int. (list, trail, and current are pointers of type nodeType.)

  How many two-level factors can be included

Starting with a 16-run 24 design, show how two threelevel factors can be incorporated in this experiment. How many two-level factors can be included if we want some information on two-factor interactions?

  Differences between accuracy efficiency and robustness

Explain briefly why accumulation of round off errors is inevitable when arithmetic operations are performed in a floating point system. Under which circumstances is it tolerable in numerical computations?

  What is the reaction of the tcp server to this event

If the server has no data to send at this moment and has not acknowledged the previous segment, what is the reaction of the TCP server to this event? Can you justify the reaction?

  Why is cross-border cybercrime expanding rapidly

What types of user authentication are used at your university and/or place of work? Do these measures seem to be effective? What if a higher level of authentication were implemented? Would it be worth it, or would it decrease productivity?

  Project management process always be used for it projects

1. Should Project Management Process always be used for IT projects? Are there cases where it should not be used? List and discuss the advantages, disadvantages, and potential impacts of using PM processes.

  How is hardware different from software

what is a Web application? What are some features of a Web 2.0 site and how is hardware different from software?

  What are some safe ways to accomplish this

What are some considerations that need to be taken into account when running SQL statements against a production database?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd