Computing the access time

Assignment Help Operating System
Reference no: EM1379655

A single level cache has following specifications.

Access time = 2.5 ns
Line size = 64 bytes
Hit ratio = 0.95

Main memory uses a block transfer capability & has 1st word (four bytes) access time of fifty ns and access time for following words as 5 ns.

Compute the access time when there is a cache miss? Assume that the cache waits until the line has been fetched from main memory and then re-executes for a hit.

Will increasing the line size to 128 bytes, and a resulting increase in H (hit ratio) to .97, reduce the average memory access time?

 

Reference no: EM1379655

Questions Cloud

Importance of having enough ram : Determine the importance of having enough RAM? Discuss how does it relate to how fast a computer can process data from a big database residing on ones hard drive?
Find total memory bytes stored in the cache : Following, a byte addressable main memory of 2^16 bytes and block size of eight bytes, using direct mapped cache consisting of thirty-two lines.
Research article analysis : Using the criteria for "Judging a Research Study" on pages 258 and 259of your textbook, evaluate at least five or more research articles.
Compute the cost of 1 mbyte of main memory : Describe the meaning of Tc, Cc, Tm and Cm and compute the cost of 1 MByte of main memory using the above parameters.
Computing the access time : Main memory uses a block transfer capability & has 1st word (four bytes) access time of fifty ns and access time for following words as 5 ns.
Determine the format of main memory address : Given that a system has two way set associative cache of size eight KBytes, with sixteen bytes cache lines, and a byte-addressable main memory of size 64 MBytes.
Creating programs to compute : Compare zero-, one-, two-, and three-address machines through writing programs to compute X = (A+B X C)/D - E X F)
Evaluate a dbms in terms of lock granularity : Suppose you are asked to evaluate a DBMS in terms of lock granularity and the different locking levels. Create a simple database environment in which these features would be important.
Creating a c++ program : A text document with machine code for little man's computer following instruction set. Instructions are in different lines.

Reviews

Write a Review

Operating System Questions & Answers

  Benefits of the just in time inventory management system

Determine what does just in time inventory management have to do with the Carle Heart Center in Urbana, Illinois?

  Regulation of the telecommunications industry

Discuss how has the telephone service changed over the past sixty years also explain how regulation of the telecommunications industry changed and what ar some of the outcomes of that change?

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Management information systems

Analyze and apply the content from a minimum of 3-recent articles about a topic of interest covered in the module.

  What is the main advantage of multiprogramming

What is the main advantage of multiprogramming How does the distinction between the monitor mode and user mode function as a rudimentary form of protection (security) system What is the difference between a trap and an interrupt? What is the u..

  Advantages of home networking

Discuss the advantages of home networking? Do you find that most of the documents are actually stored on a single computer.

  Point to point and end to end security models

Argue differences in point to point and end to end security models and security problems they address. Are they redundant?

  Requirement for routers to support ipv4 and 6 protocol stack

The answer describes the requirement for routers to support both IPv4 and IPv6 protocol stacks and describes the several types of connections a dual stack router can support, and why such connections are necessary.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Ethernet or token ring protocol

Saguaro Federal has mainframes for all of its banks and businesses. Should the corporations use the Ethernet or Token Ring protocol? Describe your choice. Discuss why is this choice appropriate?

  Write list of three known vulnerabilities for sql server

Using the internet as a source, compile a list of three known vulnerabilities for SQL Server on Windows operating systems and three vulnerabilities for Oracle on Unix.

  Change current operating system of plant

The software house has been contacted by a Governmental Nuclear Reactor Agency that wants to change the current Operating System of their plant.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd