What is meant by a write-allocate policy

Assignment Help Basic Computer Science
Reference no: EM131330501

A dual processor SMP system includes an L1 data cache for each processor and employs the MESI protocol to maintain cache consistency.  Each cache is a 2-way set associative copy-back cache that contains a total of 8192 cache lines each of which is 256 bytes in size.  Way0 within each empty set is filled first. A write-allocate policy is used for each cache. One process, P1, runs on the first processor at the same time that another process, P2, runs on the other processor. P1 accesses a variable X with an initial value of 80 that resides in memory at address 0x400804C0. P2 accesses a variable Y with an initial value of 200 that resides in memory at address 0x400804F8.

a)  What is meant by a "write-allocate policy"?

b)  Into which set within P1's cache will the memory block containing the variable X be loaded?

c) Into which set within P2's cache will the memory block containing the variable Y be loaded?

d)  All of the lines in each processor's data cache are initially invalid. The following accesses are made in the order listed; show the MESI state of the affected cache line before and after each reference and explain your answer:

Reference

State of P1's cache line before

State of P1's cache line after

State of P2's cache line before

State of P2's cache line after

P1 reads X





P2 reads Y 





P1 increments X by 1





P2 multiplies Y by 2





P2 increments Y by 3





P1 decrements Y by 4





P2 multiplies X by 2





P1 multiplies X by 2





 

Reference no: EM131330501

Questions Cloud

Create a button to launch this procedure : Write a procedure to get a color to spread from patch to patch. (There are many ways to do this. Pick one you like.) Create a button to launch this procedure.
Provide a comprehensive overview including background : Provide a comprehensive overview including background and analysis (one page) of each of the two case studies. Then answer all of the questions given at the end of each of the two case studies. Your answers must incorporate concepts and theory fro..
What is the block number of the memory block : A read hit occurs in way2 of set 17 within an 8-way set associative cache that uses a line size of 128 bytes. The total number of lines in the cache is 32768. The system employs 32-bit addresses and the tag for way2 within set 17 has a decimal va..
Does there appear to be any external event that causes them : Does there appear to be any external event that causes them? Inspect the cars. Is there any property of these cars that describes a traffic jam? If one car moves slowly, is that enough to cause traffic jams?
What is meant by a write-allocate policy : a)  What is meant by a "write-allocate policy"? b)  Into which set within P1's cache will the memory block containing the variable X be loaded? c) Into which set within P2's cache will the memory block containing the variable Y be loaded?
Large an integer value : If T1 is the execution time for this program running on a single processor, what is the upper limit on the speedup provided for this program? Assume that you can use as large an integer value as you choose for N (i.e. for the number of processor..
Remote memory access penalty : The percentage of program instructions that access remote memory is 0.2%. What speedup would be achieved for the program if the remote memory access penalty could somehow be reduced to 10 ns per access?
Compute the cumulative sum of the elements : A Quad-core system is used the compute the cumulative sum of the elements in an 18-element vector. Assume that the time required on any core to perform a single addition is 2 nano-seconds.
Memory conflicts or other dependencies : What speedup is provided for the same program if 499 identical processors are included so that the system has a total of 500 processors and no memory conflicts or other dependencies occur?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Candidate classes you list from the description provided

Sketch out a class diagram (UML) for the candidate classes you list from the description provided. You should have AT LEAST ONE generalization relationship and AT LEAST ONE composition relationship:

  Define the following events: arrive sign in

When people walk in the door, they must wait in a line to sign in.

  What is involved in sdn (software defined networks) approach

In your explanation provide a description of the benefits of the process, b

  What is the target audience of the app

What is the target audience of the APP. What stands out about the design of the APP. What stands out about the content of the APP

  Case study-data breaches and regulatory requirements

The National Institute of Standards and Technology (NIST) provides an extensive amount of information, resources, and guidance on IT and information security topics.

  Theurl of the article

Find 1 article related to  security and the cloud. and to turn in the following: (1) TheURL of the article, (2) A brief summary of the article

  Write structured english for clyde-s narrative policies

Lasting more than one day, we permit hotel, taxi, and airfare, also meal allowances. Same times apply for meal expenses." Write down structured English for Clyde's narrative of reimbursement policies.

  How do dataflow variables show up

First show that any execution in the declarative model corresponds to an execution in a version of the λ calculus. How do dataflow variables show up? Then show that adding concurrency and laziness do not change this result.

  Data integration-a case study

Companies integrated their data to gain business insights and eliminate risks. While individual databases can answer specific questions and show the state of a business unit, this is sometimes insufficient to make an enterprise-wide decision. The ..

  What is the purpose of the sql select command

How does the SQL SELECT command relate to the relational Select, Project, and Join concepts?

  Why is this convention critical to the effective use of tree

Why is this convention critical to the effective use of the binary search tree?

  Responsibility of an information assurance

One responsibility of an information assurance professional is to work with the organization's security team to explain risk assessment and report findings to executives. The report is likely to involve sensitive information that shows value and r..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd