What percentage of the computer s cpu capacity is used

Assignment Help Computer Engineering
Reference no: EM131828347

Assignment

You have a PC with a 2 GHz processor, a system bus clocked at 400 MHz, and a 3 Mbps internal cable modem attached to the system bus. No parity or other error-checking mechanisms are used. The modem has a 64-byte buffer. After it receives 64 bytes, it stops accepting data from the network and sends a data ready interrupt to the CPU. When this interrupt is received, the CPU and OS perform the following actions:

a. The supervisor is called.

b. The supervisor calls the modem's data ready interrupt handler.

c. The interrupt handler sends a command to the modem, instructing it to copy its buffer content to main memory.

d. The modem interrupt handler immediately returns control to the supervisor, without waiting for the copy operation to be completed.

e. The supervisor returns control to the process that was originally interrupted.

When the modem finishes the data transfer, it sends a transfer completed interrupt to the CPU and resumes accepting data from the network. In response to the interrupt, the CPU and OS perform the following actions:

a. The supervisor is called.

b. The supervisor calls the transfer completed interrupt handler.

c. The interrupt handler determines whether a complete packet is present in memory. If so, it copies the packet to a memory region of the corresponding application program.

d. The modem interrupt handler returns control to the supervisor.

e. The supervisor returns control to the process that was originally interrupted.

Sending an interrupt requires one bus cycle. A push or pop operation consumes 30 CPU cycles. Incrementing the stack pointer and executing an unconditional BRANCH instruction require one CPU cycle each. The supervisor consumes eight CPU cycles searching the interrupt table before calling an interrupt handler. The data ready interrupt handler consumes 50 CPU cycles before returning to the supervisor. Incoming packets range in size from 64 bytes to 4096 bytes. The transfer complete interrupt handler consumes 30 CPU cycles before returning to the supervisor if it doesn't detect a complete packet in memory. If it does, it consumes 30 CPU cycles plus one cycle for each 8 bytes of the packet.

Question 1. How long does it take to move a 64-byte packet from its arrival at the modem until its receipt in the memory area of the target application program or service? State your answer in elapsed time (seconds or fractions of seconds).

Question 2. The computer is running a program that s downloading a large file by using the modem, and all packets are 1024 bytes. What percentage of the computer s CPU capacity is used to manage data transfer from the modem to the program? What percentage of available bus capacity is used to move incoming data from the modem to the program? Assume the bus uses a simple request/response protocol without command acknowledgment.

Question 3. Recalculate your answers to Questions 1 and 2, assuming a modem buffer size of 1024 bytes and all incoming packets being 1024 bytes.

Reference no: EM131828347

Questions Cloud

How you prioritize it projects : What significance do IT project have within an organization? How you prioritize IT projects?
What content would you analyze : Create an original social science research question that could use content analysis to help answer that research question.
Quality of data used when analyzing risks : Chapter 11 of the PMBOK® Guide discusses examining the quality of data used when analyzing risks. How is it accomplished, and why is it so important to good ris
Discuss the case of Jolson Company : Jolson Company has the following internal control procedures over cash receipts. Identify the internal control principle that is applicable to each procedure.
What percentage of the computer s cpu capacity is used : What percentage of the computer s CPU capacity is used to manage data transfer from the modem to the program?
Important in most organizations in industry : Of these drivers, which one is the most important in most organizations in your industry? Why?
Explore the gender gap and gender inequality : Using these statistics, compare each country to one another in terms of gender inequality by discussing the similarities and differences.
Prepare required journal entry based upon cash count sheet : While examining cash receipts information, the accounting department determined the following information: opening cash balance $150, cash on hand $1,125.74.
Analysis and sweat analysis : Can SWOT analysis and SWEAT analysis be used on the same project?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd