What is the speedup of the system with l2 cache?

Assignment Help Basic Computer Science
Reference no: EM13164888

Consider the following computer: - 3 GHz, instruction buffers that essentially negate instruction load penalties, and the computer leaves writes to the cache negating write penalty. - 32Kb L1 Data cache, 90ps access (per word), 8 word blocks, 4-way associative, write-through, 1% miss ratio - connection bus (to L2): 2 words wide - 1Mb L2 cache, 5ns access, 32 word blocks, 4-way associative, write-back, 20% miss ratio 16.7% (1/6) dirty - connection bus to RAM: 4 words wide - 1Gb RAM, 55ns access, 5ns per word burst rate (repeat access from consecutive addresses) For this computer calculate the following: (a) What is the L2 read miss penalty? (b) What is the L1 read miss penalty? (c) What is the read penalty (L1 and L2 cache)? (d) Assume 33% (1/3) loads, and everything else is ideal. What is the CPI? (e) What would the CPI be if L2 cache was removed (i.e. redo the above without L2 cache, the bus from L1 to RAM is 2 words wide)? (f) What is the speedup of the system with L2 cache? 

Reference no: EM13164888

Questions Cloud

Designing a 24 cpu multiprocessor chip : designing a 24 CPU multiprocessor chip to compete with Intel PHI at a lower price point. Each core will run at 2 GHz and have a 32Kb L1 cache, 50ps access (per word), 8 word blocks, 4-way associative, write-through, 1% miss ratio There is a 6Mb L2 ca..
I had to call a webservice : I had to call a webservice (1st line of code) and then from there created a loop but keep getting an error every time on the .getBusiness - I don't know what I should be using there instead of getBusiness.
Approximate composition of seawater is required to react : A scientist wishes to prepare a 1L sample with the approximate composition of seawater for use in the laboratory: what reagents would you recommend and what mass of each
Is the reaction spontaneous : Is the reaction spontaneous?
What is the speedup of the system with l2 cache? : computer calculate the following: (a) What is the L2 read miss penalty? (b) What is the L1 read miss penalty? (c) What is the read penalty (L1 and L2 cache)? (d) Assume 33% (1/3) loads, and everything else is ideal. What is the CPI? (e) What would th..
Weakness of social contract theory : According to Rachels and Rachels, a weakness of social contract theory is that it cannot deal with the following problem: if you think you will be caught doing something harmful, then it is rational to obey the social contract.
How the regular tree walk algorithm works : We know how the regular tree walk algorithm works. If you have some values in the tree then the tree walk algorithm prints everything in order
Design the administration program for a veterinary office : this is an individual assignment. You will design the administration program for a veterinary office: This office attends to three different kinds of animals: Dogs, Birds, and Fish. You are to capture these with their respective classes. Each subclas..
What is the actual amount of magnesium oxide produced : what is the actual amount of magnesium oxide produced when excess carbon dioxide reacts with 42.8 grams of magnesium metal?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  K-map to simplify output function using don-t care

Use K-map to simplify output function of x by don't care conditions.

  Find the probability both windows are idle

The post office uses a multiple channel queue, where customers wait in a single line for the first available window.  the probability both windows are idle.

  Compare five technologies for in-home internet access

Compare and contrast at least five technologies which are readily available for in-home internet access. You must consider practical as well as technical differences in your comparison.

  What was business impact of tjx-s data loss on tjx

What was the business impact of TJX's data loss on TJX, consumers and banks and how effectively did TJX deal with these problems?

  Freedom of expression in cyberspace-information society

Write down a 3 pages summary about "Freedom of expression in Cyberspace & Information Society " after reading at least one article in each point of view.

  Determining most effective it projects

Not sure what will suit their requirements in achieving better organization between branches by updating their information systems. What will you suggest they do to find out most effective IT projects?

  Explaining stepwise refinement and refactoring

Are stepwise refinement and refactoring the equivalent thing ? If not, describe how do they vary? Term component is sometimes a difficult one to define.

  Steps internet explorer go through when we click on web page

Explain in detail all the steps Internet Explorer should go through when you click on a web page and traverse the network created in the previous exercise.

  Explain hacktivism includes cracking for higher purpose

And "hacktivism" includes cracking for "higher purpose". Is it feasible to crack systems and still be ethical? Support the position.

  Program that reads a series of whitespace

Write a program that reads a series of whitespace delimited strings from stdin and prints them back out, separated by spaces, in lexicographic order. You may assume that all strings are lower case and that no string has more than 20 characters.

  Compute mean number of rounds per contention period

Determine the probability that the contention ends on round k, and compute the mean number of rounds per contention period?

  Encryrption of some unknown

Assume (A1,B1) is an encryrption of some unknown m1. Prove that (A1,B2g^(m2) mod p) is a valid  encryption of m1 + m2 mod p. More generally, if (A2,B2) is an encryption of m2, what is (A1A2  mod p,B1B2 mod p) an encryption of?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd