Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

A dual processor SMP system includes an L1 data cache for each processor and employs the MESI protocol to maintain cache consistency.  Each cache is a 2-way set associative copy-back cache that contains a total of 8192 cache lines each of which is 256 bytes in size.  Way0 within each empty set is filled first. A write-allocate policy is used for each cache. One process, P1, runs on the first processor at the same time that another process, P2, runs on the other processor. P1 accesses a variable X with an initial value of 80 that resides in memory at address 0x400804C0. P2 accesses a variable Y with an initial value of 200 that resides in memory at address 0x400804F8.

a)  What is meant by a "write-allocate policy"?

b)  Into which set within P1's cache will the memory block containing the variable X be loaded?

c) Into which set within P2's cache will the memory block containing the variable Y be loaded?

d)  All of the lines in each processor's data cache are initially invalid. The following accesses are made in the order listed; show the MESI state of the affected cache line before and after each reference and explain your answer:

Reference

State of P1's cache line before

State of P1's cache line after

State of P2's cache line before

State of P2's cache line after

P1 reads X





P2 reads Y 





P1 increments X by 1





P2 multiplies Y by 2





P2 increments Y by 3





P1 decrements Y by 4





P2 multiplies X by 2





P1 multiplies X by 2





 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92085086
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Question 1 explain the various types of green architecture

Question: 1. Explain the various types of Green architecture within the enterprise, such as information architecture and solutions architecture. 2. Explain how a Green systems architecture evolves from a basic to a linea ...

Explain that when an unauthorized individual gains access

Explain that when an unauthorized individual gains access to the information an organization trying to protect, that act is categorized as a deliberate act of espionage or trespass.

The power of the market - 1990watch and discuss the video

The Power of the Market - 1990 Watch and discuss the video - The Power of the Market http://www.freetochoose.tv/program.php?id=ftc1990_1&series=ftc90 Links to an external site. By  discuss  I mean: Overall, what did you ...

Given the following scenarios what is the coefficient of

Given the following scenarios, what is the coefficient of variation for Acme, Inc.? Economy / Pri / Ri Strong / 0.3 / 40% Normal / 0.4 / 16% Weak / 0.3 / -20% Express your answer in decimal format.

Question suppose a computer using direct mapped cache has

Question : Suppose a computer using direct mapped cache has 2 20 words of main memory and a cache of 32 blocks, where each cache block contains 16 words. a. How many blocks of main memory are there? b. What is the format ...

Requirementsthis week you will write single page web

Requirements This week you will write single page web application that will receive incoming POST and GET requests. If it is a POST request it should say at the top of the page, in an H1 tag "POST Request Received". If a ...

Software engineeringsuppose you are writing software for a

Software Engineering: Suppose you are writing software for a radio station that manages its playlists. The program will generate candidate playlists from a record library automatically and station personnel can then chec ...

Determine the mass of the water by using the waters density

Determine the mass of the water by using the water's density (specific to the initial temperature) and the volume of the water. Remember,  density = mass/volume . You can look up the density of the water at your specific ...

What are the key channels by which fiscal policy affects

What are the key channels by which fiscal policy affects output in a closed versus open economy? Using the models studied in class, discuss what is meant by "crowding out", and how the crowding out effect works in an ope ...

You are required but not limited to turn in the following

You are required, but not limited, to turn in the following source file: Requirements to get full credits in Documentation The assignment number, your name, StudentID, Lecture number(time), and a class description need t ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As