What is the expected access time

Assignment Help Computer Engineering
Reference no: EM1328554

1. Answer the following questions related to reference addresses:

a. Given a 64-byte cache block, a 4 KB direct-mapped cache (assume byte-addressable), and a 32 bit address reference, which bits would be used for tag, index, and offset?

b. Given a 64-byte cache block, a 32 KB direct-mapped cache (assume byte-addressable) and a 32 bit address reference, which bits would be used for tag, index, and offset?

c. Given a 64-byte cache block, a 512 KB fully associative cache (assume byte-addressable), and a 32 bit address reference, which bits would be used for tag, index, and offset?

d. Given a 128-byte cache block a 2 MB 8-way set associative cache (assume byte-addressable, and a 64 bit address reference, which bits would be used for tag, index, and offset (note that `way' denotes the number of blocks)?

2. Answer the following questions:

a. What is the expected access time for the following cache configuration: Primary Cache: access time, 1 cycle; hit ratio, 80% Secondary Cache: access time, 10 cycles; hit ratio, 96% Memory: access time, 100 cycles.

b. Additional Primary or Secondary cache could be added at same cost. If additional primary cache results in a 92% hit rate and additional secondary cache results in 97% hit rate, which would be the better addition?

Reference no: EM1328554

Questions Cloud

How many bits are needed to address : How various bits are required to address a 1M × 8 main memory if Main memory is byte-addressable.
Explaining leadership as a sacred trust : What do you understand when we say leadership is a sacred trust? What does this have to do with developing talent, if anything?
Explaining the administrative rulemaking : List the regulations and the respective administrative agencies the hospital is subject to. Differentiate between relevant administrative adjudication and administrative rulemaking as they pertain to the administrative agencies you have identified.
Strategic alliances and joint ventures : Strategic alliances and joint ventures are often preferred strategies to enter foreign markets and to avoid classic mistakes such as the cookie example.
What is the expected access time : Given a 64-byte cache block, a 512 KB fully associative cache (assume byte-addressable), and a 32 bit address reference, which bits could be used for tag, index, and offset.
Explain and identify a current business trend : Explain and Identify a current business trend and predict it's impact in 10 years and how would the results of this trend impact building a multi-national media firm
Why has world vision been so successful : Why has World Vision been so successful? How did it grow so fast and so effectively?
Purchasing and supply management processes : Supply Chain Management - Private vs. Public Sector - how do these differences affect the establishment or maintenance of buyer-supplier relationships and the implementation of Purchasing and Supply Management processes?
Factors be minimized in collaborative leadership culture : What detracts from organizational members' willingness to collaborate? How can these detracting factors be minimized in a collaborative leadership culture?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discuss the effectiveness of these security features

Secure Web sites often include 'enhanced security questions' or 'security images' in an attempt to assure that only authorized users could access the sites. Research and discuss effectiveness of these security features.

  Write down a statement to create a view

Write down a satement to add a check constraint to the above defined table that guarantees that values entered in the inspection small date field are not older than today, meaning from now on. According to new requirements from your business analys..

  Problems on relation and functional dependencies

Problems on  relation and functional dependencies

  How to create a set in third normal

How to create a set in third normal RESERVATION(reservation id, date of reservation, start date, end date, (( customer id, customer name, customer address, customer type, customer type description, ((customer preferences)), customer credit card n..

  Transcripting the case

The CTO of organization that has requested your services would like for your forensics team prepare a transcript of what you could state to CTO.

  Explain difference between change control & version control

describe why it is important to document quality procedures at the beginning of a project rather than later on.

  Why are most photographic images stored in a lossy format

Why are most photographic images stored in a lossy format

  Preparing a copy of hard drive

After we have the target media prepared and assembled along with all our tools assembled for investigation we should now make a copy of hard drive.

  Program to calculate area and perimeter of rectangle

Write down a program which asks for length L and the width W of a rectangle, then the computer perimeter and area of rectangle.

  Writing into file utilizing fileinputstream

Write down an application utilizing the FileInputStream which opens a file which consists of the name of user's favourite book and then show it to the user.

  Detecting problem behind slow system booting

Suppose you have observed that your system is performing slower than the usual. Which system resources are likely to be at the root of the problem?

  Use a database in this fashion ebay

however there is great risk in implementing a database in this fashion Ebay gained an extreme performance boost because the database didn't have to work as hard to ensure that the data "conformed."

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd