subject

Suppose that we have 10,000 lines in our program. Suppose that our computer has four pipelinestages. Suppose that the program has the followingcharacteristics:2% of instructions are branch instructions. 20% ofbranch instructions require theinsertion of 1 NOP each (for the other 80% of branchinstructions, instructionreordering is used.)5% of instructions are memory reads, and the cachehit rate is 80%. All memoryaccesses that miss the cache can be found in mainmemory. Reading from mainmemory takes 10 clock cycles. We use a write backand write-allocate policy. Writingto main memory takes 10 clock cycles. Reading fromand writing to main memorycannot take place simultaneously. Assume that whena cache entry needs to bereplaced, 20% of the time the dirty bit is 1.5% of instructions are memory writes, and the cachehit rate is 90%. We use a writeback and write-allocate policy. Writing to main memorytakes 10 clock cycles. Reading from and writing to main memory cannot takeplace simultaneously. Assumethat when a cache entry needs to be replaced, 20%of the time the dirty bit is 1. The clock period is 10ns.

Required:
a. How many cycles would it take to run the entire program if there were no stalls?
b. How many additional cycles would be caused by branch instructions?
c. How many additional cycles would be caused by memory read instructions?
d. How many additional cycles would be caused by memory write instructions?

ansver
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 21.06.2019 22:00, savannahckatz
Business professionals of america, and future business leaders of america – phi beta lambda are both open to business students at which levels? check all that apply. elementary school middle school high school college
Answers: 1
image
Computers and Technology, 22.06.2019 06:20, Masielovebug
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network availability confidentiality integrity identity automated attack software? those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year? single most expensive malicious attack hipaa what are script kiddies? advanced persistent threat security manager security engineer what level of security access should a computer user have to do their job what process describes using technology as a basis for controlling the access and usage of sensitive data? cybercriminal
Answers: 1
image
Computers and Technology, 23.06.2019 05:00, sharkboy578
Acompany is inviting design for its new corporate logo from its users. this is an example of ? a. crowdfunding b. crowdvoting c. crowdsourced design d. crowdtracking
Answers: 3
image
Computers and Technology, 24.06.2019 12:50, opgbadwolf5
When is it most apprpriate for a development team to change the definition of done
Answers: 1
You know the right answer?
Suppose that we have 10,000 lines in our program. Suppose that our computer has four pipelinestages....

Questions in other subjects:

Konu
Chemistry, 04.12.2019 05:31
Konu
Social Studies, 04.12.2019 05:31
Konu
Mathematics, 04.12.2019 05:31