
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
I need the answer as soon as possible

Transcribed Image Text:A computer has a cache, main memory; and a
disk used for virtual memory. If a referenced
word is in the cache, 10 ns are required to access
it. If it is main memory but not in the cache, total
200 ns are needed to load it into cache, and
then the reference is started again. If the word
is not in main memory, total 500 ms are required
to fetch the word from the disk, followed by 200
ns to copy it to the cache, and then the reference
is started again. The cache hit ratio is 99%, and
the main memory hit ratio is 90%. What is the
average time in ns to access a referenced word
on this system? Ignore the time it takes to
determine whether or not a reference may be
found in cache or main memory. The hit ratio is
the percent of the time a reference is found in
the given level of the memory hierarchy.
Expert Solution

This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution
Trending nowThis is a popular solution!
Step by stepSolved in 2 steps with 2 images

Knowledge Booster
Similar questions
- Do you know what you're trying to accomplish with this process? Decide on which types of authentication have which pros and drawbacks.arrow_forwardWhen it comes to cryptography, what is the difference between symmetric and asymmetric?arrow_forwardWhat is it about authentication that causes so much worry in the modern world?arrow_forward
- In the world of cryptography, what would you say are the three most essential procedures?arrow_forwardWhat am I doing wrong if I want to acquire my access code for this book? I was wondering if there was any way that you could either help me discover it or give me information on how to find it on my Yuzu account.arrow_forwardHow many keys are required for two people to communicate via a cipher?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY

Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON

Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science

Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning

Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning

Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education

Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY