Compute the cost of 1 mbyte of main memory

Assignment Help Operating System
Reference no: EM1379656

Describe the meaning of Tc, Cc, Tm and Cm in the given memory system specification.

Tc = 100 ns
Cc = 10^(-4) $/bit
Tm = 1200 ns
Cm = 10^(-4) $/bit

a. Compute the cost of 1 MByte of main memory using the above parameters.
b. Determine the cost of 1 MByte of cache memory?
c. If the effective access time is 10% greater than the cache access time, what would be the hit ratio (H)?

 

Reference no: EM1379656

Questions Cloud

Time slot interchange switch : In a time slot interchange switch, eight input lines are scanned in sequence to build up an input frame with eight slots.
Importance of having enough ram : Determine the importance of having enough RAM? Discuss how does it relate to how fast a computer can process data from a big database residing on ones hard drive?
Find total memory bytes stored in the cache : Following, a byte addressable main memory of 2^16 bytes and block size of eight bytes, using direct mapped cache consisting of thirty-two lines.
Research article analysis : Using the criteria for "Judging a Research Study" on pages 258 and 259of your textbook, evaluate at least five or more research articles.
Compute the cost of 1 mbyte of main memory : Describe the meaning of Tc, Cc, Tm and Cm and compute the cost of 1 MByte of main memory using the above parameters.
Computing the access time : Main memory uses a block transfer capability & has 1st word (four bytes) access time of fifty ns and access time for following words as 5 ns.
Determine the format of main memory address : Given that a system has two way set associative cache of size eight KBytes, with sixteen bytes cache lines, and a byte-addressable main memory of size 64 MBytes.
Creating programs to compute : Compare zero-, one-, two-, and three-address machines through writing programs to compute X = (A+B X C)/D - E X F)
Evaluate a dbms in terms of lock granularity : Suppose you are asked to evaluate a DBMS in terms of lock granularity and the different locking levels. Create a simple database environment in which these features would be important.

Reviews

Write a Review

Operating System Questions & Answers

  Web security threats

Think about the given threats to Web security and explain how each is countered by a particular feature of SSL.

  Catching exception

Create a program that shows how various exceptions are caught with catch Exception

  Construct resource allocation graph with processers

Construct a resource allocation graph with the following processers and resources, the system consists of four processers P1, P2, P3, and P4 and five resources R1, R2, R3, R4, and R5.

  Security of information and data in an organization

The final security measure my company implements well is monitoring internet usage through limiting the access for most workers to search websites that are not related to the company.

  Assessing security risks

In your new position at XYZ Company, you have been asked to lead a risk assessment group. As part of your assignment to assess security risks for the computing infrastructure.

  Operating system maps user-level threads to kernel

Suppose an operating system maps user-level threads to the kernel using the many-to-many model and the mapping is done through LWPs.

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

  Identifying communication techniques

Explain the techniques that will be used to monitor implementation of the electronic medical record.

  Differences in windows, mac os, unix, and linux os

Discuss the fundamental differences in Windows, Mac OS, UNIX, and Linux operating systems for personal computers? Determine the unique characteristics do mainframe operating systems have?

  How operating system is clearly superior for any application

Consider the advantages and disadvantages of each major operating system that Amy might use on the Web server. If you don't think that one operating system is clearly superior for this application, describe why.

  Data abstraction for health it applications

Choose one database design model and discuss the benefits that model would bring to health information technology applications.

  Compute the bandwidth requirements for a live event

Compute the bandwidth requirements for a live event that is streamed over the Internet based on the information given below.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd