What percentage of the computer s cpu capacity is used

Assignment Help Computer Engineering
Reference no: EM131828347

Assignment

You have a PC with a 2 GHz processor, a system bus clocked at 400 MHz, and a 3 Mbps internal cable modem attached to the system bus. No parity or other error-checking mechanisms are used. The modem has a 64-byte buffer. After it receives 64 bytes, it stops accepting data from the network and sends a data ready interrupt to the CPU. When this interrupt is received, the CPU and OS perform the following actions:

a. The supervisor is called.

b. The supervisor calls the modem's data ready interrupt handler.

c. The interrupt handler sends a command to the modem, instructing it to copy its buffer content to main memory.

d. The modem interrupt handler immediately returns control to the supervisor, without waiting for the copy operation to be completed.

e. The supervisor returns control to the process that was originally interrupted.

When the modem finishes the data transfer, it sends a transfer completed interrupt to the CPU and resumes accepting data from the network. In response to the interrupt, the CPU and OS perform the following actions:

a. The supervisor is called.

b. The supervisor calls the transfer completed interrupt handler.

c. The interrupt handler determines whether a complete packet is present in memory. If so, it copies the packet to a memory region of the corresponding application program.

d. The modem interrupt handler returns control to the supervisor.

e. The supervisor returns control to the process that was originally interrupted.

Sending an interrupt requires one bus cycle. A push or pop operation consumes 30 CPU cycles. Incrementing the stack pointer and executing an unconditional BRANCH instruction require one CPU cycle each. The supervisor consumes eight CPU cycles searching the interrupt table before calling an interrupt handler. The data ready interrupt handler consumes 50 CPU cycles before returning to the supervisor. Incoming packets range in size from 64 bytes to 4096 bytes. The transfer complete interrupt handler consumes 30 CPU cycles before returning to the supervisor if it doesn't detect a complete packet in memory. If it does, it consumes 30 CPU cycles plus one cycle for each 8 bytes of the packet.

Question 1. How long does it take to move a 64-byte packet from its arrival at the modem until its receipt in the memory area of the target application program or service? State your answer in elapsed time (seconds or fractions of seconds).

Question 2. The computer is running a program that s downloading a large file by using the modem, and all packets are 1024 bytes. What percentage of the computer s CPU capacity is used to manage data transfer from the modem to the program? What percentage of available bus capacity is used to move incoming data from the modem to the program? Assume the bus uses a simple request/response protocol without command acknowledgment.

Question 3. Recalculate your answers to Questions 1 and 2, assuming a modem buffer size of 1024 bytes and all incoming packets being 1024 bytes.

Reference no: EM131828347

Questions Cloud

How you prioritize it projects : What significance do IT project have within an organization? How you prioritize IT projects?
What content would you analyze : Create an original social science research question that could use content analysis to help answer that research question.
Quality of data used when analyzing risks : Chapter 11 of the PMBOK® Guide discusses examining the quality of data used when analyzing risks. How is it accomplished, and why is it so important to good ris
Discuss the case of Jolson Company : Jolson Company has the following internal control procedures over cash receipts. Identify the internal control principle that is applicable to each procedure.
What percentage of the computer s cpu capacity is used : What percentage of the computer s CPU capacity is used to manage data transfer from the modem to the program?
Important in most organizations in industry : Of these drivers, which one is the most important in most organizations in your industry? Why?
Explore the gender gap and gender inequality : Using these statistics, compare each country to one another in terms of gender inequality by discussing the similarities and differences.
Prepare required journal entry based upon cash count sheet : While examining cash receipts information, the accounting department determined the following information: opening cash balance $150, cash on hand $1,125.74.
Analysis and sweat analysis : Can SWOT analysis and SWEAT analysis be used on the same project?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Design alternatives have to be thoroughly considered

Design alternatives have to be thoroughly considered. There must be a process to fairly evaluate the pros and cons of each option. Let's look at how the alternative matrix can help facilitate the design decision through creation of our own alterna..

  Write a subroutine called addabc

Write a subroutine called, ADDABC, that performs the operation c : A + B. The three variables A, B, and C are all word (i.e., 16-bit) values.

  Write the program with at least two functions to solve

Write the program with at least two functions to solve the following problem.

  Explain the merits of each access method in doing

different access methods such as ofdma sdma tdma cdma and fdma rely on cross-layer optimization to different degrees.

  Assume the user enters 4 and 5 in the initial form

while the user clicks a button, display the appropriate results on the second form. For example, suppose the user enters 4 and 5 in the initial form and clicks the "Compute Area" button.

  How much dough mix and topping mix are leftover

Bryant's Pizza, Inc. is a producer of frozen pizza products. The company makes a net income of $1.00 for each regular pizza and $1.50 for each deluxe pizza produced. How much dough mix and topping mix are leftover

  Application for verifying pin number

The National Commerce Bank has hired you to generate an application which verifies a customer personal identification number (PIN).

  How many bits should immediate field of i-type instruction

By how many bits should the immediate field of an I-type instruction be reduced to match the length on an R-type instruction for the follow modifications to the MIPS architecture?

  Examine how using terminal services will help meet up many

imagine you are the leader of the it team at the national headquarters for a company supplying western wear to an

  What would be one use for an sqc instruction

What would be the mask word bit status if the mask was set at FFFF?

  Generating an array for a particular structure

You should generate a structure student_t in order to store the student name and three exam scores. You will generate an array of this structure in the main function.

  Draw a domain class diagram for the system

Develop a system sequence diagram based on each fully detailed use case description - Develop a first-cut design class diagram for the system and Based on the first-cut sequence diagram, develop a communication diagram for each use case

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd