Show how the basic snooping protocol of Figure 5.6 can be changed for a write-through cache. What
Question:
Show how the basic snooping protocol of Figure 5.6 can be changed for a write-through cache. What is the major hardware functionality that is not needed with a write-through cache compared with a write-back cache?
Figure 5.6
Transcribed Image Text:
Invalid CPU write Place write miss on bus CPU read Place read miss on bus Exclusive (read/write) CPU read miss Write-back block Place read miss on bus CPU write hit CPU read hit Place invalidate on bus CPU write CPU read hit Shared (read only) CPU write miss Place write miss on bus Cache state transitions based on requests from CPU CPU write miss Write-back cache block Place write miss on bus CPU read miss Place read miss on bus Invalid Write miss for this block Write-back block; abort memory access Exclusive (read/write) Write miss for this block Invalidate for this block memory access Write-back block; abort Read miss for this block Shared (read only) CPU read miss Cache state transitions based on requests from the bus
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Answer rating: 100% (QA)
The figure youve provided appears to show the state transitions for cache lines within a cache coherence protocol for a system with multiple processors or cache controllers Cache coherence protocols like MESI Modified Exclusive Shared Invalid help maintain consistency among multiple caches so that processors dont operate on stale data When discussing writethrough and writeback caches in the context of such a protocol 1 WriteThrough Cache A writethrough cache writes data to both the cache and the backing store usually main memory simultaneously Due to this behavior other caches will see the updated value as soon as it hits the memory bus because the write operations are immediately propagated to memory which can be snooped by other cache controllers The protocol for a writethrough cache primarily eliminates the Modified state since data is always consistent with main memory When a cache line is updated written to it is directly written to memory and hence there is no need to writeback the data upon eviction or when another cache requests the data 2 WriteBack Cache A writeback cache only writes data back to the memory when it is replaced evicted or during a writemiss where another processor ...View the full answer
Answered By
Wonder Dzidzormenu
As a professional accountant and a teacher, I explain account ing concepts in a more practical way that makes students more connected to the subject.
With over 10 years of teaching accounting , I offer a well constructed , easily understood and in-depth explanations to students questions.
5.00+
1+ Reviews
10+ Question Solved
Related Book For
Computer Architecture A Quantitative Approach
ISBN: 9780128119051
6th Edition
Authors: John L. Hennessy, David A. Patterson
Question Posted:
Students also viewed these Computer science questions
-
The switched snooping protocol of Figure 4.40 assumes that memory "knows" whether a processor node is in state Modified and thus will respond with data. Real systems implement this in one of two...
-
Let A, B be sets. Define: (a) the Cartesian product (A B) (b) the set of relations R between A and B (c) the identity relation A on the set A [3 marks] Suppose S, T are relations between A and B, and...
-
can someone solve this Modern workstations typically have memory systems that incorporate two or three levels of caching. Explain why they are designed like this. [4 marks] In order to investigate...
-
A fast-food restaurant operates both a drive through facility and a walk-in facility. On a randomly selected day, let X and Y, respectively, be the proportions of the time that the drive-through and...
-
Methane is compressed adiabatically by a steady-flow compressor from 2 MPa and -10°C to 10 MPa and 110°C at a rate of 0.55 kg/s. Using the generalized charts, determine the required power...
-
Using this list of corporate values and Exhibit 3-5, describe Zappos organizational culture. In which areas would you say that Zappos culture is very high (or typical)? Explain.
-
E 16-7 Investing in existing partnership Liu and Wang are in a partnership with a profit-sharing ratio of 40 percent and 60 percent, respectively. Liu has a capital balance of $3,000,000 and Wang has...
-
Rafael transfers the following assets to Crane Corporation in exchange for all of its stock. (Assume that neither Rafael nor Crane plans to make any special tax elections at the time of...
-
From a consolidated point of view, when should profit be recognized on intercompany sales of depreciable assets? nondepreciable assets?
-
Using aggressive mail promotion with low introductory interest rates, Yeager National Bank (YNB) built a large base of credit card customers throughout the continental United States. Currently, all...
-
Please answer the following problems: a. Add a clean exclusive state to the basic snooping cache coherence protocol (Figure 5.6). Show the protocol in the finite state machine format used in the...
-
In this exercise, we examine the effect of the interconnection network topology on the CPI of programs running on a 64-processor distributed-memory multiprocessor. The processor clock rate is 2.0...
-
Provide examples of how ABC can be used in service organizations.
-
Problem 228: The derivative is dz dt = = atb where a , and b =
-
Write a Python program which will take N names from the user. Create a dictionary from the N names that will hold First_name, Middle_name and Last_name in separate keys. The inputs will take N at...
-
2 Finding Poles and Zeros from a Bode Plot Consider the magnitude portion of the Bode plot in Figure 3. Based on the linear approxi- mation in red, find the transfer function G(s). 5 0 -5 10 -10 -15...
-
Indicate whether the following statements are "TRUE" or "FALSE" 1- Financial accounting is considered to be the backbone to top management. 2- Cost accounting identifies, summarizes and interprets...
-
Refer to case 3 shown above. Assume that Beta Division is now receiving an 3% price discount from the outside supplier. a. What is Alpha Division's lowest acceptable transfer price? b. What is Beta...
-
An adiabatic gas turbine expands air at 1300 kPa and 500C to 100 kPa and 127C. Air enters the turbine through a 0.2-m2 opening with an average velocity of 40 m/s, and exhausts through a 1-m2 opening....
-
If the annual fixed costs are 54,000 dinars, the occupation expense represents 20%, the contribution margin is 25%, and the unit selling price is 40 dinars. Required: Calculate the closing point of...
-
What effect would you expect a wider bandwidth to have on the noise in a channel?
-
Discuss the trade-offs between fiber-optic and satellite communication in terms of costs, signal capacity, signaling method, interference, likelihood of failure and repair issues, multi-point...
-
Describe the advantages that repeaters have over amplifiers.
-
assume that we have only two following risk assets (stock 1&2) in the market. stock 1 - E(r) = 20%, std 20% stock 2- E(r) = 10%, std 20% the correlation coefficient between stock 1 and 2 is 0. and...
-
Flexible manufacturing places new demands on the management accounting information system and how performance is evaluated. In response, a company should a. institute practices that reduce switching...
-
Revenue and expense items and components of other comprehensive income can be reported in the statement of shareholders' equity using: U.S. GAAP. IFRS. Both U.S. GAAP and IFRS. Neither U.S. GAAP nor...
Study smarter with the SolutionInn App