
a)
Given:
TLB hit=5ns
Cache hit =12ns
Main memory=25ns (Memory reference)
Hard drive=200ms (Disk reference)
Hit ratio TLB=90%
Hit ratio cache=98%
Rate of Page fault=0.001%
a)

Explanation of Solution
TLB (Translation Look aside Buffer) hit and cache Hit:
- Translation Look aside buffer is special type of cache that is used to store the contents of the page table.
- The content of the TLB cache includes pairs of virtual page number, physical frame numbers.
- The page number that is required can be looked up inside the TLB.
- If the requested page number is found it is considered to be a hit and it indicates that the page number is being mapped with the frame number that is present in the main memory.
- The contents of the cache will also be accessed to find whether the data is present in the cache as well and if the same contents are present it is meant to be a hit.
Therefore, this type of access is possible and the total access time is calculated as shown below:
Therefore, the total access time is 17ns.
b)
Given:
TLB hit=5ns
Cache hit =12ns
Main memory=25ns (Memory reference)
Hard drive=200ms (Disk reference)
Hit ratio TLB=90%
Hit ratio cache=98%
Rate of Page fault=0.001%
b)

Explanation of Solution
TLB (Translation Look aside Buffer) miss, page table hit and cache Hit:
- Translation Look aside buffer is special type of cache that is used to store the contents of the page table.
- The content of the TLB cache includes pairs of virtual page number, physical frame numbers.
- The page number that is required can be looked up inside the TLB.
- If the requested page number is found it is considered to be a miss, then the page number that is required is searched in the main memory’s page table.
- If the page entry is found in the page table, the address of the virtual memory is mapped with the main memory.
- The contents of the cache will also be accessed to find whether the data is present in the cache as well and if the same contents are present it is meant to be a hit.
Therefore, this type of access is possible and the total access time is calculated as shown below:
Therefore, the total access time is 42ns.
c)
Given:
TLB hit=5ns
Cache hit =12ns
Main memory=25ns (Memory reference)
Hard drive=200ms (Disk reference)
Hit ratio TLB=90%
Hit ratio cache=98%
Rate of Page fault=0.001%
c)

Explanation of Solution
TLB (Translation Look aside Buffer) miss, page table hit and cache Miss:
- Translation Look aside buffer is special type of cache that is used to store the contents of the page table.
- The content of the TLB cache includes pairs of virtual page number, physical frame numbers.
- The page number that is required can be looked up inside the TLB.
- If the requested page number is found it is considered to be a miss, then the page number that is required is searched in the main memory’s page table.
- If the page entry is found in the page table, the address of the virtual memory is mapped with the main memory.
- The contents of the cache will also be accessed to find whether the data is present in the cache as well and if the same contents are not present it is meant to be a miss, then the access is being transferred to main memory and the block that is required is transferred again to the cache.
Therefore, this type of access is possible and the total access time is calculated as shown below:
Therefore, the total access time is 67ns.
d)
Given:
TLB hit=5ns
Cache hit =12ns
Main memory=25ns (Memory reference)
Hard drive=200ms (Disk reference)
Hit ratio TLB=90%
Hit ratio cache=98%
Rate of Page fault=0.001%
d)

Explanation of Solution
TLB (Translation Look aside Buffer) miss, page table miss and cache hit:
- Translation Look aside buffer is special type of cache that is used to store the contents of the page table.
- The content of the TLB cache includes pairs of virtual page number, physical frame numbers.
- The page number that is required can be looked up inside the TLB.
- If the requested page number is found it is considered to be a miss, then the page number that is required is searched in the main memory’s page table.
- If the page entry is not found in the page table, there occurs a page fault .
- The access is made with the hard drive to bring the required data into the main memory.
- There is no possibility of the cache being hit in this scenario because the address is not present in the main memory itself
Therefore, this type of access is not possible.
e)
Given:
TLB hit=5ns
Cache hit =12ns
Main memory=25ns (Memory reference)
Hard drive=200ms (Disk reference)
Hit ratio TLB=90%
Hit ratio cache=98%
Rate of Page fault=0.001%
e)

Explanation of Solution
TLB miss and page table miss:
- Translation Look aside buffer is special type of cache that is used to store the contents of the page table.
- The content of the TLB cache includes pairs of virtual page number, physical frame numbers.
- The page number that is required can be looked up inside the TLB.
- If the requested page number is found it is considered to be a miss, then the page number that is required is searched in the main memory’s page table.
- If the page entry is not found in the page table, there occurs a page fault.
- The access is made with the hard drive to bring the required data into the main memory.
- The access will be getting restarted at this stage.
- The page number that is required can be looked up inside the TLB.
- If the requested page number is found it is considered to be a miss, then the page number that is required is searched in the main memory’s page table.
- Now the request page number is found at the page table of the main memory.
- There occurs a page hit.
- The value that is requested and found in the main memory may not be reflected at the cache.
- There occurs a cache miss.
- Then the main memory is accessed to bring the block to the cache.
Therefore, this type of access is possible and the total access time is calculated as shown below:
Therefore, the total access time is
Effective Access time (EAT):
- EAT is a measure of Hierarchal memory performance.
- A weighted average that utilizes the hit ratio and the relative access time of the levels present in successful order of the memory hierarchy is called as effective access time.
- The actual time of the access is based on the technology that is utilized to access the contents present at each level of the hierarchy.
Formula for the effective access time:
The formula for effective access time where the memory contains two levels that includes a main memory and the cache memory is obtained as shown below:
In the above formula,
Any access that is made is being split up into following ways:
- Virtual access
- Main memory access
If the contents are present in the TLB then it is called as hit, and if the element is not present in the TLB then the element is accessed at the page table.
If the element is present at the page table then it is a hit, if the contents are not present then the access is made at the main memory to bring the elements to the cache.
Now again the contents are searched at the cache now the data found is considered as a hit.
Want to see more full solutions like this?
Chapter 6 Solutions
Essentials of Computer Organization and Architecture
- Answer the Java OOP question below: Explain the relationship between a superclass and a subclass. How do the principles of encapsulation and abstraction play a role in this relationship? In your experience, how do you decide what should be included in a superclass versus a subclass? Share an example where a well-defined superclass-subclass hierarchy improved your code.arrow_forward1.) Consider the problem of determining whether a DFA and a regular expression are equivalent. Express this problem as a language and show that it is decidable. ii) Let ALLDFA = {(A)| A is a DFA and L(A) = "}. Show that ALLDFA is decidable. iii) Let AECFG = {(G)| G is a CFG that generates &}. Show that AECFG is decidable. iv) Let ETM {(M)| M is a TM and L(M) = 0}. Show that ETM, the complement of Erm, is Turing-recognizable. Let X be the set {1, 2, 3, 4, 5} and Y be the set {6, 7, 8, 9, 10). We describe the functions f: XY and g: XY in the following tables. Answer each part and give a reason for each negative answer. n f(n) n g(n) 1 6 1 10 2 7 2 9 3 6 3 8 4 7 4 7 5 6 5 6 Aa. Is f one-to-one? b. Is fonto? c. Is fa correspondence? Ad. Is g one-to-one? e. Is g onto? f. Is g a correspondence? vi) Let B be the set of all infinite sequences over {0,1}. Show that B is uncountable using a proof by diagonalization.arrow_forwardCan you find the least amount of different numbers to pick from positive numbers (integers) that are at most 100 to confirm two numbers that add up to 101 when each number can be picked at most two times?arrow_forward
- Can you find the formula for an that satisfies the provided recursive definition? Please show all steps and justificationarrow_forwardWhat is the number of injective functions f from set {1,2,....,2n} to set {1,2,....,2n} so that f(x) >= x for all the 1<= x <= n?arrow_forwardIdeal MOSFET Current–Voltage Characteristics—NMOS Device and draw the circuitarrow_forward
- 1. Create a Person.java file. Implement the public Person and Student classes in Person.java, including all the variables and methods in the UMLS. Person -name: String -street: String -city: String +Person(String name, String, street, String, city) +getName(): String +setName(String name): void +getStreet(): String +setStreet(String street): void +getCity(): String +setCity(String City): void +toString(): String Student -Id: int +Person(String name, String, street, String, city, int Id) +getId(): int +setId(int Id): void +toString(): String 2. Create a StudentTest.java file. Implement a public StudentTest class with a main method. In the main method, create one student object and print the object using System.out.println(). Your printing result must follow the example output: name: Mike, street: Morris Ave, city: Union, Id: 1000 Hint: You need to modify the toString methods in the Student class and Person class!arrow_forward1) Apply the Paint Blue algorithm discussed in class to the following Finite Automata. a a a b b a COIS-3050H-R-W01-2025WI-COMB Formal Languages & Automata a b Show the status of the Finite Automata at the conclusion of the Paint Blue Algorithm (mark the visited states with an X and only include edges that have not been followed). 2) Use the pumping lemma to prove the following language is nonregular: L= {ab} = {abbb, aabbbbbb, aaabbbbbbbbb, ...}arrow_forward3) Find CFGs that for these regular languages over the alphabet Σ= {a, b}. Draw a Finite Automata e CFG. 1 COIS-3050H-R-W01-2025WI-COMB Formal anguages & Automata Is that contain the substring aba. (b) The language of all words that have an odd number letters and contains the string bb. (c) The language of all words that begin with the substring ba and contains an odd number of letters. 4) Convert the following FA into a PDA. a a S± b a a Ν Ꮓarrow_forward
- COIS-3050H-R-W01-2025WI-COMB Formal ministic PDA. Are the following words accepted by this Languages & Automata UI MIUSɩ that aTU I ed, indicate which state the PDA is in when the crash occurs. (a) aabbaa (b) aaabab (c) bababa Start (d) aaaabb A Accept Read₁ Push a (e) aaaaaa a b Read, Popi a a,b A Read₂ Accept A Pop₂arrow_forward5) Eliminate the A-productions from the following CFG: Abc COIS-3050H-R-W01-2025WI-COMB Formal Languages & Automata BAabC C CaA | Bc | A 6) Convert the following CFG into CNF. S→ XYZ XaXbS | a |A YSbS | X | bb Z→ barrow_forwardNeed help answering these questions!1. Design a While loop that lets the user enter a number. The number should be multiplied by 10, and the result stored in a variable named product. The loop should iterate as long as the product contains a value less than 100. 2. Design a For loop that displays the following set of numbers: 0, 10, 20, 30, 40, 50 . . . 1000 3. Convert the While loop in the following code to a Do-While loop: Declare Integer x = 1 While x > 0 Display "Enter a number." Input x End Whilearrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education





