B.18) Consider the following sequence of events in a two-processor shared memory system. Assume that the...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
B.18) Consider the following sequence of events in a two-processor shared memory system. Assume that the cache blocks in each cache are all initially empty except that P1 initially has a block containing the word at byte address 100d and that P2 initially has a block containing the word at byte address 104d. Step Processor Activity Word at byte address 100d 104d 100d 104d 1 2 3 4 P1 P2 P1 P2 write write read read In the action blocks, use phrases like: Hit/ Resulting action on the Caches, and the Miss Bus transactions initiated by each processor. hit hit Pn modifies its copy of address_____ in its cache Pn invalidates its cache block containing addresses Pn gets a new copy of addresses from memory Pn indicates write miss on the bus Pn indicates read miss on the bus Pn sends invalidate on the tag and index for address Pn acquires the bus and writes back its cache block containing addresses Pn updates its copy of address_____ in the cache block that contains addresses Pn writes through of the word at address Pn reads address from its cache as appropriate to the cache coherency policy being used (and in the appropriate order). a) Complete the two right hand columns of the above table assuming that the processors use write-back caches with a write invalidate cache coherency policy (in which read or write misses in one processor's cache require that another cache that has a modified copy of the data be required to write it back to memory before the first cache can then read it from memory) and a block size of one word. b) What is the range of addresses of the data that falls in the same cache block as the word at 100d and the word at 104d if the cache block size is 4.(4-byte) words? (Note that the addresses given are byte addresses, and both the word at 100 and the word at 104 will fall in the same four word block.) c) Complete the right hand entries of the above table assuming that the processors use write-back caches with a write-invalidate cache coherency policy, and a block size of 4 (4-byte) words. d) Repeat part c above, but assume write-through caches and a write-update coherency_policy. (In a write-through cache, no invalidate signal is required. Other caches would simply see the write on the bus through their snoop units. Also, a write update policy would simply have caches, that also have a copy of the addressed location, copy the new data off the bus, updating their own copies, as it is written back to main memory.) B.18) Consider the following sequence of events in a two-processor shared memory system. Assume that the cache blocks in each cache are all initially empty except that P1 initially has a block containing the word at byte address 100d and that P2 initially has a block containing the word at byte address 104d. Step Processor Activity Word at byte address 100d 104d 100d 104d 1 2 3 4 P1 P2 P1 P2 write write read read In the action blocks, use phrases like: Hit/ Resulting action on the Caches, and the Miss Bus transactions initiated by each processor. hit hit Pn modifies its copy of address_____ in its cache Pn invalidates its cache block containing addresses Pn gets a new copy of addresses from memory Pn indicates write miss on the bus Pn indicates read miss on the bus Pn sends invalidate on the tag and index for address Pn acquires the bus and writes back its cache block containing addresses Pn updates its copy of address_____ in the cache block that contains addresses Pn writes through of the word at address Pn reads address from its cache as appropriate to the cache coherency policy being used (and in the appropriate order). a) Complete the two right hand columns of the above table assuming that the processors use write-back caches with a write invalidate cache coherency policy (in which read or write misses in one processor's cache require that another cache that has a modified copy of the data be required to write it back to memory before the first cache can then read it from memory) and a block size of one word. b) What is the range of addresses of the data that falls in the same cache block as the word at 100d and the word at 104d if the cache block size is 4.(4-byte) words? (Note that the addresses given are byte addresses, and both the word at 100 and the word at 104 will fall in the same four word block.) c) Complete the right hand entries of the above table assuming that the processors use write-back caches with a write-invalidate cache coherency policy, and a block size of 4 (4-byte) words. d) Repeat part c above, but assume write-through caches and a write-update coherency_policy. (In a write-through cache, no invalidate signal is required. Other caches would simply see the write on the bus through their snoop units. Also, a write update policy would simply have caches, that also have a copy of the addressed location, copy the new data off the bus, updating their own copies, as it is written back to main memory.)
Expert Answer:
Answer rating: 100% (QA)
a Assuming writeback caches with a write invalidate cache coherency policy and a block size of one word the completed table would look as follows Step ... View the full answer
Related Book For
Vector Mechanics for Engineers Statics and Dynamics
ISBN: 978-0073212227
8th Edition
Authors: Ferdinand Beer, E. Russell Johnston, Jr., Elliot Eisenberg, William Clausen, David Mazurek, Phillip Cornwell
Posted Date:
Students also viewed these business communication questions
-
In order to reduce the bending moment in the cantilever beam AB, a cable and counterweight are permanently attached at end B. Determine the magnitude of the counterweight for which the maximum...
-
How do MNEs use integrative techniques in order to reduce their political risk? Describe an example.
-
How do MNEs use protective/defensive techniques in order to reduce their political risk? Describe an example.
-
Blaine is a practicing dentist. He operates his business from the basement of his house, with a separate entrance and facilities. Blaine uses the simplified method every year to calculate his...
-
What lessons does Diggs failure have for entrepreneurs who are studying entering the social media industry?
-
To avoid a ________________ confrontation, she sent an e-mail. (a) face to face, (b) face-to-face Choose the correct option.
-
1. What is the total if \(25 \%\) of the total is 30 ? 2. What is the total if \(45 \%\) of the total is 360 ?
-
The Verbrugge's Publishing Company's 2004 balance sheet and income statement are as follows (in millions of dollars). Verbrugge's and its creditors have agreed upon a voluntary reorganization plan....
-
only answers pls Joe is an active 26-year-old male who lifts weights six days a week. He is looking to minimize the cost of consuming his favorite foods. Joe is trying to gain weight, or at least...
-
Bill rides the subway at a cost of 75 cents per trip, but would switch if the price were any higher. His only alternative is a bus that takes five minutes longer, but costs only 50 cents. He makes 10...
-
WordPress allows the use of various plugins. Briefly explain what is a plug-in and give an example. Briefly explain what is the purpose of the Gutenberg plug-in. What kind of plug-in is Sucuri ? a)...
-
Critically reflect - How have the IoT and Big Data changed the way you do business? How has it changed the way your organization does business? consider it Saudia Airlines company supported with...
-
On January 1, 2018, Bark Manufacturing Company Ltd. purchased a machine for $27,500, and expects to use the machine a total of 32,000 hours over the next four years. Bark set the residual value on...
-
On 1 January 2022, Shakira Ltd purchased a building that had an estimated useful life of eight years with no disposal value at $200,000. Shakira Ltd used the revaluation model to subsequently measure...
-
In this assignment, students must select a publicly listed entity, perform fundamental analysis and provide investment recommendations. The selected company can be one of the companies in your...
-
In order to value a company, you would need to forecast its future (a key word here) free cash flows. How would you approach this task? Using downloaded real data, try to make the forecast and see,...
-
Gringo Limited is a South African based manufacturer of anaward-winning generator. The company is currently investigating twoinvestment projects. The information is given below:Project S.AInvolve 1...
-
United Business Forms capital structure is as follows: Debt ............................................ 35% Preferred stock ........................... 15 Common equity .......................... 50...
-
A hydrometer is used to measure the specific gravity of liquids. For a certain liquid a hydrometer reading indicates a specific gravity of 1.15. What is the liquids density and specific weight?...
-
For the tree of Prob. 2.73, knowing that the tension in cable AC is 980 lb and that the resultant of the forces exerted at A by cables AB and AC lies in the yz plane, determine (a) The tension in AB,...
-
The cups and the arms of an anemometer are fabricated from a material of density ρ. Knowing that the mass moment of inertia of a thin, hemispherical shell of mass m and thickness t with respect...
-
\(\frac{9}{\sqrt{35}}\) Rationalize the denominators of the fractions, and then simplify.
-
Determine the conjugate of \(5 \sqrt{15}+8 \sqrt{13}\).
-
Determine the conjugate of \(4+3 \sqrt{5}\).
Study smarter with the SolutionInn App