subject

You are given designs of 3 caches for a 16-­? bit address machine:

d1:

direct-­? mapped cache.

each cache line is 1 byte.

10-­? bit index, 6-­? bit tag.

1 cycle hit time.

d2:

2-­? way set associative cache.

each cache line is 1 word (4 bytes).

7-­? bit index, 7-­? bit tag.

2 cycle hit time.

d3:

fully associative cache with 256 cache lines.

each cache line is 1 word.

14-­? bit tag.

5 cycle hit time.

answer the following set of questions:

a) what is the size of each cache?

b) how much space does each cache need to store tags?

c) which cache design has the most conflict misses? which has the least?

d) the following information is given to you: hit rate for the 3 caches is 50%, 70% and 90% but did not tell you which hit rate corresponds to which cache, which cache would you guess corresponded to which hit rate? why?

e) assuming the miss time for each is 20 cycles, what is the average service time for each? (service time = (hit rate)*(hit time) + (miss rate)*(miss

expert answer

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 11:00
Lisa’s company, abc ltd., lost its biggest client and is now facing a financial crunch. most of her colleagues have resigned, but lisa decides to stay with the company and assist the management in overcoming the financial situation. which quality is lisa demonstrating? a. self-management b. cooperativeness c. responsibility d. loyalty
Answers: 2
question
Computers and Technology, 22.06.2019 11:00
The isometric projection camera technique provides an illusion of perspective by using things like parallax scrolling to create the illusion of 3d in a 2d game
Answers: 3
question
Computers and Technology, 23.06.2019 15:00
1. which of the following statements are true about routers and routing on the internet. choose two answers. a. protocols ensure that a single path between two computers is established before sending packets over it. b. routers are hierarchical and the "root" router is responsible for communicating to sub-routers the best paths for them to route internet traffic. c. a packet traveling between two computers on the internet may be rerouted many times along the way or even lost or "dropped". d. routers act independently and route packets as they see fit.
Answers: 2
question
Computers and Technology, 24.06.2019 15:20
Local area networks use many of the same network technologies and the internet, only on a smaller scale. devices that access lans are equipped with a network interface that contains circuitry for wireless or wired connections. devices also have a physical address, in addition to the ip addresses acquired from a dhcp server. the most popular wired technology is . the most popular wireless technology is , which can be configured as a(n) or star topology. setting up a lan and configuring its router is fairly easy. the first step is to change the standard to one that is secure. next, create a(n) that uniquely identifies the network by name. it is also important to activate wireless to prevent wireless signals from being intercepted during transmission. a limited-access network can be created for visitors to use. by activating , the router will be able to assign ip addresses to each device that joins the network. to connect to a secure lan that is protected by encryption, an encryption , or password, is required. lans can be used to access data collected by iot devices and the networks that tie these devices together. technologies such as rfid, nfc, bluetooth smart, zigbee, and z-wave offer -power links, essential for battery-powered devices that can’t expend excess amounts of energy transmitting data.
Answers: 1
You know the right answer?
You are given designs of 3 caches for a 16-­? bit address machine:

d1:

dir...
Questions
question
Mathematics, 18.09.2019 07:50
question
Biology, 18.09.2019 07:50