Top Banner

of 21

CS6303_QB

Feb 28, 2018

Download

Documents

muthu7629
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 7/25/2019 CS6303_QB

    1/21

    http://francisXavier.ac.in Page 1

    UNIT I OVERVIEW & INSTRUCTIONS

    1. Define Moores Law

    The one constant for computer designers is rapid change, which is driven largely by MooresLaw. It states that integrated circuit resources double every 1824 months.

    2. Define Transistor, VLSITransistor: An on/off switch controlled by an electric signal.Very large-scale integrated (VLSI) circuit: A device containing hundreds of thousands to

    millions of transistors.

    3. Define the term Silicon crystal ingot, Wafer.A rod composed of a silicon crystal that is between 8 and 12 inches in diameter and about 12to 24 inches long is called Silicon crystal ingot.

    Wafer: A slice from a silicon ingot no more than 0.1 inches thick, used to create chips.

    4. What is meant by response time?It is also called execution time. The total time required for the computer to complete a task,including disk accesses, memory accesses, I/O activities, operating system overhead, CPU

    execution time, and so on.

    5. What is meant by throughput?It is also called bandwidth. It is the measure of performance; it is the number of taskscompleted per unit time.

    6. What is CPU Time? What are the two types?CPU execution time also called CPU time. The actual time the CPU spends computing for aspecific task.User CPU time : The CPU time spent in a program itself.

    System CPU time: The CPU time spent in the operating system performing tasks on behalf ofthe program.

    7. Explain the term clock cycles per instruction (CPI).CPI means average number of clock cycles per instruction for a program or program

    fragment.

    8. Define the term instruction mix.A measure of the dynamic frequency of instructions across one or many programs

    9. Define the term wordThe natural unit of access in a computer, usually a group of 32 bits; corresponds to the size of

    a register in the MIPS architecture.

    10. What is address, data transfer instruction?

    Address means a value used to delineate the location of a specific data element within amemory array.

    A command that moves data between memory and registers is called data transfer instruction.

    http://francis/http://francis/http://francis/
  • 7/25/2019 CS6303_QB

    2/21

    http://francisXavier.ac.in Page 2

    11. List the MIPS Fields op: Basic operation of the instruction, traditionally called the opcode.

    rs: Th e fi rst register source operand. rt: Th e second register source operand.

    rd: Th e register destination operand. It gets the result of the operation.

    shamt: Shift amount.it will not be used until then, and hence the field contains zero funct: Function. Th is fi eld, oft en called the function code, selects the specific

    variant of the operation in the op fi eld.

    12. Define AND , ORAND : A logical bitby- b it operation with two operands that calculates a 1 only if there is a 1in both operands.

    OR : A logical bit-bybit operation with two operands that calculates a 1 if there is a 1 ineither operand.

    13. Define NOT,NOR

    NOT: A logical b it-bybit operation with one operand that inverts the b its; that is, it replacesevery 1 with a 0, and every 0 with a 1.

    NOR: A logical bit-bybit operation with two operands that calculates the NOT of the OR of

    the two operands. That is, it calculates a 1 only if there is a 0 in both operands.

    14. What is the use of control unit operation?

    The control unit of a processor performs two tasks:(1) It causes the processor to step through a series of micro-operations in the proper sequence,

    based on the program being executed, and (2) it generates the control signals that cause eachmicro-operation to be executed.

    15. What are the four registers in Fetch cycle?1. Memory address registers (MAR)

    2. Memory buffer register (MBR)3. Program counters (PC)

    16. List the most common addressing techniques:

    Immediate

    Direct Indirect Register

    Register indirect Displacement

    Stack

    17. Define Stack.

    A stack is a linear array of locations. It is sometimes referred to as a pushdown list or last-in-first-out queue. The stack is a reserved block of locations. Items are appended to the top of

    the stack so that, at any given time, the block is partially filled. Associated with the stack is apointer whose value is the address of the top of the stack.

    http://francis/http://francis/http://francis/
  • 7/25/2019 CS6303_QB

    3/21

    http://francisXavier.ac.in Page 3

    UNIT II ARITHMETIC OPERATIONS

    1. How addition & subtraction carried out?Digits are added bit by bit from right to left, with carries passed to the next digit to the left,

    just do by hand. Subtraction uses addition: the appropriate operand is simply negated beforebeing added.

    2. When can overflow occur in addition?When adding operands with different signs, overflow cannot occur. The reason is the sum

    must be no larger than o ne of the operands. For example, _10 _ 4 _ _6. Since the operands fitin 32 bits and the sum is no larger than an operand, the sum must fi t in 32 bits as well.

    Therefore, no overflow can occur when adding positive and negative operands.

    3. When can overflow occur in subtraction?When we subtract a negative number from a positive number and get a negative result, orwhen we subtract a positive number from a negative number and get a positive result. Such a

    ridiculous result means a borrow occurred from the sign bit.

    4. What are the two kinds of MIPS arithmetic instructions?

    Add (add), add immediate (addi), and subtract (sub) cause exceptions on overflow. Add unsigned (addu), add immediate unsigned (addiu), and subtract unsigned (subu) do notcause exceptions on overflow.

    5. Define Arithmetic Logic Unit (ALU)

    ALU is a Hardware that performs addition, subtraction, and usually logical operations suchas AND and OR.

    6. Define ExceptionIt is also called interrupt on many computers. An unscheduled event that disrupts program

    execution. It is used to detect overflow. An exception or interrupt is essentially anunscheduled procedure call. The address of the instruction that overflowed is saved in aregister, and the computer jumps to a predefined address to invoke the appropriate routine for

    that exception.

    7. What is EPC?MIPS include a register called the exception program counter (EPC) to contain the address ofthe instruction that caused the exception. The instruction move from system control (mfc0) is

    used to copy EPC into a general-purpose register so that MIPS soft ware has the option ofreturning to the off ending instruction via a jump register instruction.

    8. What are the steps in multiplication?1. Just place a copy of the multiplicand (1 _ multiplicand) in the proper place if the multiplier

    digit is a 1, or2. Place 0 (0 _ multiplicand) in the proper place if the digit is 0.

    9. Define Faster Multiplication.

    http://francis/http://francis/http://francis/
  • 7/25/2019 CS6303_QB

    4/21

    http://francisXavier.ac.in Page 4

    Faster multiplications are possible by essentially providing one 32-bit adder for each bit ofthe multiplier: one input is the multiplicand ANDed with a multiplier bit, and the other is the

    output of a prior adder.10. How Multiply in MIPS is carried out?

    MIPS provide a separate pair of 32-bit registers to contain the 64-bit product, called Hi and

    Lo. To produce a properly signed or unsigned product, MIPS has two instructions: multiply(mult) and multiply unsigned (multu). To fetch the integer 32-bit product, the programme

    uses move from lo (mflo)

    11. Define division in binary operationDivides two operands, called the dividend and divisor, and the result, called the quotient, areaccompanied by a second result, called the remainder. Here is another way to express the

    relationship between the components:

    12. Define the term Dividend, Divisor, Quotient, Remainder.Dividend: A number being divided.

    Divisor : A number that the dividend is divided by.Quotient : The primary result of a division;Remainder: The secondary result of a division;

    13. Define Scientific Notation, Normalized number.

    A notation that renders numbers with a single digit to the left of the decimal point.Normalized a number in floating-point notation that has no lead ing 0s.

    14. Define floating point.Computer arithmetic that represents numbers in which the binary point is not fixed is called

    as a floating point.

    15. Define Fraction, Exponent.

    Fraction mean the value, generally between 0 and 1, placed in the fraction field. The fractionis also called the mantissa.

    Exponent means the numerical representation system of fl oating-point arithmetic, the valuethat is placed in the exponent field.

    16. Define Overflow, UnderflowOverflow (fl oatingpoint) : A situation in which a positive exponent becomes too large to fit

    in the exponent field.underfl ow (floatingpoint): A situation in which a negative exponent becomes too large to fitin the exponent field.

    17. Define single precision, double precision

    Double precision: An fl oating-point value represented in two 32-bit words.Single precision: An fl oating-point value represented in a single 32- bit word.

    18. What is guard bit?

    Guard bit means the first of two extra bits kept on the right during intermediate calculationsof floating point numbers; used to improve rounding accuracy.

    Dividend _ Quotient _ Divisor _ Remainder

    http://francis/http://francis/http://francis/
  • 7/25/2019 CS6303_QB

    5/21

    http://francisXavier.ac.in Page 5

    19. What is the use of round method?

    Round Method to make the intermediate floating-point result fit the floating-point format;The goal is typically to find the nearest number that can be represented in the format.

    20. Define sub word parallelism.

    Parallelism occurs within a wide word, the extensions are classified as subword parallelism.It is also classified under the more general name of data level parallelism. They have been

    also called vector or SIMD, for single instruction, multiple data.

    UNIT III PROCESSOR AND CONTROL UNIT

    1. List the instruction set:

    The memory-reference instructions load word (lw) and store word (sw) The arithmetic-logical instructions add, sub, AND, OR, and slt The instructions branch equal (beq) and jump (j),

    2. What are the two steps for every instruction?

    1. Send the program counter (PC) to the memory that contains the code and fetch theinstruction from that memory.2. Read one or two registers, using fi elds of the instruction to select the registers

    to read. For the load word instruction, we need to read only one register, butmost other instructions require reading two registers.

    3. Define Clocking methodology.The approach used to determine when data is valid and stable relative to the clock. Edge-

    triggered clocking is a clocking scheme in which all state changes occur on a clock edge.

    4. Define control signalA signal used for multiplexor selection or for directing the operation of a functional unit;contrasts with a data signal, which contains information that is operated on by a functional

    unit.

    5. Define Asserted, Deasserted. Asserted : The signal is logically high or true.Deasserted : The signal is logically low or false.

    6. Define data path element.A unit used to operate on or hold data within a processor. In the MIPS implementation, thedata path elements include the instruction and data memories, the register file, the ALU, andadders.

    7.Define Program counter (PC)

    The register containing the address of the instruction in the program being executed.

    8. Define Register file.

    A register file is a collection of registers in which any register can be read or written byspecifying the number of the register in the fi le. The register file contains the register state of

    the computer. In addition, we will need an ALU to operate on the values read from theregisters.

    http://francis/http://francis/http://francis/
  • 7/25/2019 CS6303_QB

    6/21

    http://francisXavier.ac.in Page 6

    9.Definebranch target addressThe address specified in a branch, which becomes the new program counter (PC) if the

    branch is taken. In the MIPS architecture the branch target is given by the sum of the offsetfield of the instruction and the address of the instruction following the branch.

    10. Define branch taken and not.

    A branch where the branch condition is satisfied and the program counter (PC) becomes thebranch target. All unconditional jumps are taken branches. Branch not taken or (untaken

    branch) means a branch where the branch condition is false and the program counter (PC)becomes the address of the instruction that sequentially follows the branch.

    11.Define branchA type of branch where the instruction immediately following the branch is always executed

    independent of whether the branch condition is true or false.

    12.Define truth table From logic, a representation of a logical operation by listing all the values of the inputs and

    then in each case showing what the resulting outputs should be.

    13. Define dont-care term

    An element of a logical function in which the output does not depend on the values of all theinputs. Dont-care terms may be specified in different ways.

    14. What are the four steps to execute the instruction?1. The instruction is fetched, and the PC is incremented.

    2. Two registers, $t2 and $t3, are read from the register file; also, the main control unitcomputes the setting of the control lines during this step.3. The ALU operates on the data read from the register file, using the function code (bits 5:0,

    which is the funct field, of the instruction) to generate the ALU function.4. The result from the ALU is written into the register fi le using bits 15:11 of the instruction

    to select the destination register ($t1).

    15. Define single clock cycle implementation.

    An implementation in which an instruction is executed in one clock cycle. While easy tounderstand, it is too slow to be practical.

    16.Define pipeliningAn implementation technique in which multiple instructions are overlapped in execution,

    much like an assembly line.

    17. How MIPS instructions classically into five steps:1. Fetch instruction from memory.2. Read registers while decoding the instruction. The regular format of MIPS instructions

    allows reading and decoding to occur simultaneously.3. Execute the operation or calculate an address.

    4. Access an operand in data memory.5. Write the result into a register.

    18. What is Hazards?

    There are situations in pipelining when the next instruction cannot execute in the followingclock cycle. These events are called hazards, and there are three different types.

    http://francis/http://francis/http://francis/
  • 7/25/2019 CS6303_QB

    7/21

    http://francisXavier.ac.in Page 7

    19. Define structural hazard

    When a planned instruction cannot execute in the proper clock cycle because the hardwaredoes not support the combination of instructions that are set to execute is called structural

    hazard.

    20. Define data hazardAlso called a pipeline data hazard. When a planned instruction cannot execute in the proper

    clock cycle because data that is needed to execute the instruction is not yet available.

    21. Define forwarding or Bypassing.A method of resolving a data hazard by retrieving the missing data element from internal

    buffers rather than waiting for it to arrive from programmer visible registers or memory load-

    use data hazard.

    22. Define Pipeline.Pipeline stall Also called bubble. A stall initiated in order to resolve a hazard.

    23. Define control hazardControl hazard also called branch hazard. When the proper instruction cannot execute in the

    proper pipeline clock cycle because the instruction that was fetched is not the one that isneeded; that is, the flow of instruction addresses is not what the pipeline expected.

    24. Define branch predictionA method of resolving a branch hazard that assumes a given outcome for the branch and

    proceeds from that assumption rather than waiting to ascertain the actual outcome.

    25. Define latency (pipeline)

    The number of stages in a pipeline or the number of stages between two instructions duringexecution

    26. Define Dynamic Branch PredictionPrediction of branches at runtime using runtime information.

    27. Define Branch prediction buffer or branch history table.

    A small memory that is indexed by the lower portion of the address of the branch instructionand that contains one or more its indicating whether the branch was recently taken or not.

    28. Define branch delay slotThe slot directly after a delayed branch instruction, which in the MIPS architecture is filled

    by an instruction that does not affect the branch

    29. Define branch target buffer

    A structure that caches the destination PC or destination instruction for a branch. It is usuallyorganized as a cache with tags, making it more costly than a simple prediction buffer.

    30. Define correlating predictorA branch predictor that combines local behaviour of a particular branch and global

    information about the behaviour of some recent number of executed branches.

    31. Define tournament branch predictor

    http://francis/http://francis/http://francis/
  • 7/25/2019 CS6303_QB

    8/21

    http://francisXavier.ac.in Page 8

    A branch predictor with multiple predictions for each branch and a selection mechanism thatchooses which predictor to enable for a given branch.

    32. Define Interrupt, Vectored Interrupt

    An exception that comes from outside of the processor. (Some architectures use the term

    interrupt for all exceptions.)33. Define vectored interrupt

    An interrupt for which the address to which control is transferred is determined by the causeof the exception.

    34. Define imprecise interrupt or imprecise exception.Interrupts or exceptions in pipelined computers that is not associated with the exact

    instruction that was the cause of the interrupt or exception.

    UNIT IVPARALLELISM

    1. What is ILP?

    Pipelining exploits the potential parallelism among instructions. This parallelism is calledinstruction-level parallelism (ILP). There are two primary methods for increasing the

    potential amount of instruction-level parallelism. The first is increasing the depth of the

    pipeline to overlap more instructions

    2. What is static multiple issue?Static multiple issue is an approach to implementing a multiple-issue processor where manydecisions are made by the compiler before execution.

    3. What is Dynamic multiple issue?Dynamic multiple issue is an approach to implementing a multiple issue processor wheremany decisions are made during execution by the processor.

    4. Define issue slotsThe positions from which instructions could issue in a given clock cycle; by analogy, these

    correspond to positions at the starting blocks for a sprint.

    5. Define speculation

    It is an approach that allows the compiler or the processor to guess about the properties ofan instruction, so as to enable execution to begin for other instructions that may depend on

    the speculated instruction. For example, we might speculate on the outcome of a branch, sothat instructions aft er the branch could be executed earlier

    6. Define issue packetThe set of instructions that issues together in one clock cycle; the packet may be determined

    statically by the compiler or dynamically by the processor.

    7. What is Very Long Instruction Word (VLIW) ?

    A style of instruction set architecture that launches many operations that are defined to beindependent in a single wide instruction, typically with many separate opcode fields.

    8. What is use latency Number?

    http://francis/http://francis/http://francis/
  • 7/25/2019 CS6303_QB

    9/21

    http://francisXavier.ac.in Page 9

    Use latency Number of clock cycles between a load instruction and an instruction that canuse the result of the load without stalling the pipeline.

    9. Define loop unrolling

    A technique to get more performance from loops that access arrays, in which multiple copies

    of the loop body are made and instructions from different iterations are.

    10. What is register renaming?The renaming of registers by the compiler or hardware to remove antidependences.

    Antidependence also called name dependence.

    11. What is Antidependence?

    It is an ordering forced by the reuse of a name, typically a register, rather than by a truedependence that carries a value between two instructions.

    12. Define superscalar

    It is an advanced pipelining technique that enables the processor to execute more than oneinstruction per clock cycle by selecting them during execution.

    13. Define dynamic pipelineIt means scheduling Hardware support for reordering the order of instruction execution so asto avoid stalls.

    14. What is the use of commit unit?

    The unit in a dynamic or out-of-order execution pipeline that decides when it is safe torelease the result of an operation to programmer visible registers and memory.

    15. Define the term Reservation Station , Reorder BufferReservation station : A buffer within a functional unit that holds the operands and the

    operation.Reorder buffer : The buffer that holds results in a dynamically scheduled processoruntil it is safe to store the results to memory or a register.

    16. Define out-of-order, In-order Execution

    out-of-order: A situation in pipelined execution when an instruction blocked from executingdoes not cause the following instructions to wait.In-order commit:A commit in which the results of pipelined execution are written to the

    programmer visible state in the same order that instruct ions are fetched.

    17. What is an SMP?An SMP consists of multiple similar processors within the same computer, interconnected by

    a bus or some sort of switching arrangement. The most critical problem to address in an SMPis that of cache coherence. Each processor has its own cache and so it is possible for a given

    line of data to be present in more than one cache.

    18. Define multithreaded processor.

    When more than one processor are implemented on a single chip, the configuration is

    referred to as chip multiprocessing. A related design scheme is to replicate some of the

    http://francis/http://francis/http://francis/
  • 7/25/2019 CS6303_QB

    10/21

    http://francisXavier.ac.in Page 10

    components of a single processor so that the processor can execute multiple threadsconcurrently; this is known as a multithreaded processor.

    19. What is a cluster?

    A cluster is a group of interconnected, whole computers working together as a unified

    computing resource that can create the illusion of being one machine. The term wholecomputer means a system that can run on its own, apart from the cluster.

    20. Define NUMANon uniform memory access (NUMA) is a type of single address space multiprocessor inwhich some memory accesses are much faster than others depending on which processor asks

    for which word.

    A NUMA system is a shared-memory multiprocessor in which the access time from a givenprocessor to a word in memory varies with the location of the memory word.

    21. What are Flynnscategories of computer systems?Single instruction, single data (SISD) stream

    Single instruction, multiple data (SIMD) streamMultiple instruction, single data (MISD) streamMultiple instruction, multiple data (MIMD) stream

    22. What are the characteristics of SMP?

    Characteristics:1. There are two or more similar processors of comparable capability.2. These processors share the same main memory and I/O facilities and are interconnected

    by a b us or other interna l connection scheme, such that memory access time is approximatelythe same for each processor.

    23. What are the features of bus organization? Simplicity

    Flexibility Reliability

    24. Define threadA thread includes the program counter, the register state, and the stack. It is a lightweight

    process; whereas threads commonly share a single address space, processes dont.

    25. What is process?A process includes one or more threads, the address space, and the operating system state.Hence, a process switch usually invokes the operating system, but not a thread switch.

    26. Define fine-grained multithreading, coarse-grained multithreading

    Fine-grained multithreading: A version of hardware multithreading that implies switchingbetween threads after every instruction.Coarse-grained multithreading: A version of hardware multithreading that implies switching

    between threads only after significant events, such as a last- level cache miss.

    27. What is simultaneous multithreading (SMT)?

    http://francis/http://francis/http://francis/
  • 7/25/2019 CS6303_QB

    11/21

    http://francisXavier.ac.in Page 11

    It is a version of multithreading that lowers the cost of multithreading by utilizing theresources needed for multiple issue, dynamically scheduled micro architecture.

    28. Define synchronization

    The process of coordinating the behaviour of two or more processes, which may be running

    on different processors. Lock a synchronization device that allows access to data to only oneProcessor at a time.

    UNIT V MEMORY AND I/O SYSTEMS

    1. What is the principle of locality states?Programs access a relatively small portion of their address space at any insta nt of time, just as

    you accessed a very small portion of the librarys collection. There are two different types oflocality.

    2. What is temporal locality?Temporal locality (locality in time): if an item is referenced, it will tend to be referenced

    again soon. Example if you recently brought a book to your desk to look at, you will probablyneed to look at it again soon.

    3. What is spatial locality?Spatial locality (locality in space): if an item is referenced, items whose addresses are close

    by will tend to be referenced soon.

    4. Define memory hierarchy.

    A memory hierarchy consists of multiple levels of memory with different speeds and sizes.

    The faster memories are more expensive per bit than the slower memories and thus aresmaller.

    5. Define Hit Rate , Miss Rate

    Hit rate means the fraction of memory accesses found in a level of the memory hierarchy.Miss rate means the fraction of memory accesses not found in a level of the memory

    hierarchy.

    6. Define Hit Time, Miss Penalty

    Hit time means the time required to access a level of the memory hierarchy, including the

    time needed to determine whether the access is a hit or a miss.Miss penalty means the time required to fetch a block into a level of the memory hierarchyfrom the lower level, including the time to access the block, transmit it from one level toanother.

    7. List the memory technology and its access time

    Memory technology Typical access time $ per GiB in 2012SRAM semiconductor memory 0.52.5 ns $500$1000DRAM semiconductor memory 5070 ns $10$20

    Flash semiconductor memory 5,00050,000 ns $0.75$1.00Magnetic disk 5,000,00020,000,000 ns $0.05$0.10

    8. Define DIMMs

    http://francis/http://francis/http://francis/
  • 7/25/2019 CS6303_QB

    12/21

    http://francisXavier.ac.in Page 12

    Personal Mobile Devices like the iPad use individual DRAMs, memory for servers arecommonly sold on small boards called dual inline memory modules (DIMMs). DIMMs

    typically contain 416 DRAMs, and they are normally organized to be 8 bytes wide forserver systems.

    9. What is the use of Flash Memory?Flash memory is a type of electrically erasable programmable read-only memory (EEPROM).

    Unlike disks and DRAM, but like other EEPROM technologies, writes can wear out flashmemory bits. To cope with such limits, most flash products include a controller to spread the

    writes by remapping blocks that have been written many times to less trodden blocks. Thistechnique is called wear levelling10. What are tracks and sectors?

    Each disk surface is divided into concentric circles, called tracks. There are typically tens ofthousands of tracks per surface. Each track is in turn divided into sectors that contain the

    information; each track may have thousands of sectors. Sectors are typically 512 to 4096bytes in size

    11. Define seek and seek timeThe process of positioning a read/write head over the proper track on a disk is called seek.

    The time to move the head to the desired track is called the seek time.

    12. Define cache.Cache was the name chosen to represent the level of the memory hierarchy between the

    processor and main memory in the first commercial computer to have this extra level. Cacheis a safe place for hiding or storing things.

    13. Define tag field

    Tag field in a table used for a memory hierarchy that contains the address informationrequired to identify whether the associated block in the hierarchy corresponds to a requestedword.

    14. Define cache miss

    Cache miss is a request for data from the cache that cannot be filled because the data is notpresent in the cache. The index, which is used to select the block

    15. Define write-throughA scheme in which writes always update both the cache and the next lower level of the

    memory hierarchy, ensuring that data is always consistent between the two.

    16. Define write buffer, Write-back

    A queue that holds data while the data is waiting to be written to memory is called writebuffer.

    Write-back means a scheme that handles writes by updating values only to the block in thecache, then writing the modified block to the lower level of the hierarchy when the block isreplaced.

    17. What is fully associative cache , set-associative cache.

    http://francis/http://francis/http://francis/
  • 7/25/2019 CS6303_QB

    13/21

    http://francisXavier.ac.in Page 13

    A cache structure in which a block can be placed in any location in the cache is called fullyassociative cache.

    Set-associative cache means a cache that has a fixed number of locations (atleast two) whereeach block can be placed.

    18. What is the use of least recently used (LRU)?An LRU scheme, the block replaced is the one that has been unused for the longest time. The

    set associative example on page 405 uses LRU, which is why we replaced Memory(0) insteadof Memory(6).

    19. Define global miss rate, local miss rate.

    Global miss rate: The fraction of references that miss in all levels of a multilevel cache.Local miss rate : The fraction of references to one level of a cache that miss; used in

    multilevel hierarchies.

    20. What is virtual memory

    The main memory can act as a cachefor the secondary storage, usually implemented withmagnetic disks. This technique is called virtual memory

    21. Define address translationIt is also called address mapping. The process by which a virtual address is mapped to an

    address used to access memory.

    22. Define segmentation

    A variable-size address mapping scheme in which an address consists of two parts: a segmentnumber, which is mapped to a physical address, and a segment off set.

    23. Define Page TableThe table containing the virtual to physical address translations in a virtual memory system.

    The table, which is stored in memory, is typically indexed by the virtual page number; eachentry in the table contains the physical page number for that virtual page if the page is

    currently in memory.

    24. Define Swap Space.

    The operating system usually creates the space on fl ash memory or disk for all the pages of aprocess when it creates the process. This space is called the swap space.

    25. Define Software PollWhen the processor detects an interrupt, it branches to an interrupt-service routine whose job

    it is to poll each I/O module to determine which module caused the interrupt. The poll couldbe in the form of a separate command line (e.g., TESTI/O). In this case, the processor raises

    TESTI/O and places the address of a particular I/O.

    http://francis/http://francis/http://francis/
  • 7/25/2019 CS6303_QB

    14/21

    http://francisXavier.ac.in Page 14

    16 MarksUNIT I OVERVIEW & INSTRUCTIONS

    1. Explain about Eight Ideas

    Design for Moores Law

    Use Abstraction to Simplify Design

    Make the Common Case Fast

    Performance via Parallelism

    Performance via Pipelining

    Performance via Prediction

    Hierarchy of Memories

    Dependability via Redundancy

    2. Explain the components of computer system (Explain about von Neumann

    architecture)

    Three key concepts:

    Programming in hardware

    Programming in software

    I/O components.

    Two Internal Registers (MAR , MBR)

    I/O address register (I/OAR)

    I/O buffer (I/OBR)

    Three modules

    3. Explain the concept of performance of computer system

    Introduction

    Defining Performance

    Throughput and Response Time

    Relative Performance

    Measuring Performance

    CPU Performance and Its Factors

    Improving Performance

    Instruction Performance

    The Classic CPU Performance Equation

    http://francis/http://francis/http://francis/
  • 7/25/2019 CS6303_QB

    15/21

    http://francisXavier.ac.in Page 15

    4. Explain the operation and operands of computer system

    Introduction

    MIPS operands

    MIPS assembly language

    Design Principle 1,2

    Memory Operands Compiling Using Load and Store

    Constant or Immediate Operands

    Sample Instruction

    5. How we can represent the instruction in computer system

    Instruction format The hexadecimal-binary conversion

    MIPS Fields

    MIPS instruction encoding.

    The stored-program concept.

    6.Explain the logical operations in computer system

    Introduction

    AND

    OR

    NOT

    NOR

    7.Explain the logical operations in computer system

    Micro-Operations

    The Fetch CycleThe Indirect Cycle

    The Interrupt CycleThe Execute CycleThe Instruction Cycle

    Control of the Processor

    Functional RequirementsControl SignalsA Control Signals Example

    Internal Processor OrganizationThe Intel 8085

    Hardwired Implementation

    Control Unit InputsControl Unit Logic

    8. Explain addressing modesThe most common addressing techniques:

    Immediate Direct

    http://francis/http://francis/http://francis/
  • 7/25/2019 CS6303_QB

    16/21

    http://francisXavier.ac.in Page 16

    Indirect Register

    Register indirect Displacement

    Stack

    http://francis/http://francis/http://francis/
  • 7/25/2019 CS6303_QB

    17/21

    http://francisXavier.ac.in Page 17

    UNIT II ARITHMETIC OPERATIONS

    1. How we can perform binary addition

    Introduction to addition

    Sample problem in binary addition Overflow

    Signed Number and Unsigned Number

    Condition for overflow occur

    Sample problem for overflow

    2. How we can perform binary subtraction

    Introduction to subtraction

    Sample problem in binary subtraction

    Overflow Signed Number and Unsigned Number

    Condition for overflow occur

    Sample problem for overflow

    3. Explain binary multiplication

    Introduction to multiplication

    Step in multiplication

    First version of the multiplication hardware

    Sequential Version of the Multiplication Algorithm

    Sample problem

    Signed Multiplication

    Faster Multiplication

    Multiply in MIPS

    4. Explain binary Division

    Introduction to Division

    A Division Algorithm and Hardware

    First version of the division hardware

    Sequential Version of the Division Algorithm Sample problem

    Signed Division

    Faster Division

    Division in MIPS

    5. Write short notes on Floating Point Operation

    Definition for floating point, Scientific Notation, Normalized Form

    Floating-Point Representation

    Single Precision Double precision

    http://francis/http://francis/http://francis/
  • 7/25/2019 CS6303_QB

    18/21

    http://francisXavier.ac.in Page 18

    Converting Binary to Decimal Floating Point

    Floating-Point Addition

    Floating-Point Multiplication

    Floating-Point Instructions in MIPS

    6. Explain Subword Parallelism Introduction to parallelism

    basic NEON instructions.

    Summary of ARM NEON instructions for subword parallelism

    UNIT III PROCESSOR AND CONTROL UNIT

    1. Explain basic MIPS implementation

    An Overview of the Implementation

    abstract view of the implementation of the MIPS The basic implementation of the MIPS subset

    2. Explain the concept of building data path

    Data path element

    Two state elements are needed to store and access instructions

    Data path used for fetching instructions and incrementing the program counter.

    The two elements needed to implement R-format ALU operations are the register fi leand the ALU

    branch target address, Branch taken Branch Not Taken

    Creating a Single Data path

    3. Explain the concept of control implementation scheme

    The ALU Control

    Designing the Main Control Unit

    Operation of the Datapath

    Finalizing Control

    Why a Single-Cycle Implementation Is Not Used Today

    4. Explain the concept of pipelining

    An Overview of Pipelining

    Designing Instruction Sets for Pipelining Pipeline Hazards

    Data hazards

    control hazards

    5. Write short notes on pipeline Data path and control

    stage of instruction execution

    Graphically Representing Pipelines

    Pipelined Control

    6.

    Describe about Data Hazards Forwarding versus Stalling

    http://francis/http://francis/http://francis/
  • 7/25/2019 CS6303_QB

    19/21

    http://francisXavier.ac.in Page 19

    Pipelined dependences in a five-instruction sequence

    Data Hazards and Stalls7. Describe Control hazards

    Assume Branch Not Taken

    Reducing the Delay of Branches

    Dynamic Branch Prediction Loops and Prediction

    8. Write short notes on exception

    Exceptions Are Handled in the MIPS Architecture

    vectored interrupt

    Exceptions in a Pipelined Implementation

    Exception in a Pipelined Computer

    The data path with controls to handle exceptions.

    UNIT IVPARALLELISM

    1. Write short notes on ILP

    Parallelism via Instructions

    Static and Dynamic multiple issues

    The Concept of Speculation

    An Example: Static Multiple Issue with the MIPS ISA

    Simple Multiple-Issue Code Scheduling

    Loop Unrolling for Multiple-Issue Pipelines

    Energy Efficiency and Advanced Pipelining

    2. Explain Parallel processing Challenges

    Multiple Processor OrganizationsTypes of Parallel Processor Systems

    Parallel Organizations

    Symmetric Multiprocessors

    OrganizationMultiprocessor Operating System Design Considerations

    A Mainframe SMP

    Cache Coherence and the Mesi Protocol

    Software SolutionsHardware SolutionsThe MESI Protocol

    Multithreading and Chip MultiprocessorsImplicit and Explicit Multithreading

    Approaches to Explicit Multithreading

    Clusters

    Cluster ConfigurationsOperating System Design IssuesCluster Computer Architecture

    Blade Servers

    Clusters Compared to SMP

    Nonuniform Memory Access

    http://francis/http://francis/http://francis/
  • 7/25/2019 CS6303_QB

    20/21

    http://francisXavier.ac.in Page 20

    MotivationOrganization

    3. Explain Flynns classification

    Single instruction, single data (SISD) stream

    Single instruction, multiple data (SIMD) stream

    Multiple instruction, single data (MISD) stream Multiple instruction, multiple data (MIMD) stream

    4. Explain Hardware multithreading

    Definition for thread and process

    fine-grained multithreading

    Coarse-grained multithreading

    Simultaneous multithreading (SMT)

    5. Write short notes on multicore processor

    uniform memory access nonuniform memory access (NUMA)

    synchronization

    A Simple Parallel Processing Program

    UNIT V MEMORY AND I/O SYSTEMS

    1. Explain the concept of memory technologies

    SRAM Technology

    DRAM Technology Flash Memory

    Disk Memory

    2. Explain the concept of cache memory

    Accessing a Cache

    Handling Cache Misses

    Handling Cache Misses

    An Example Cache: The Intrinsity FastMATH Processor

    3. Write short notes on measuring and improving cache performance Reducing Cache Misses by More Flexible Placement of Blocks

    Locating a Block in the Cache

    Locating a Block in the Cache

    Reducing the Miss Penalty Using Multilevel Caches

    Software Optimization via Blocking

    4. Explain Virtual Memory

    Definition for physical address, Virtual Address, Page fault

    Placing a Page and Finding It Again

    Page Faults Swap space ,LRU

    about Writes

    http://francis/http://francis/http://francis/
  • 7/25/2019 CS6303_QB

    21/21

    http://francis Xavier ac in Page 21

    5. Explain about TLB

    translation-lookaside buffer (TLB)

    The Intrinsity FastMATH TLB

    Integrating Virtual Memory, TLBs, and Caches Implementing Protection with Virtual Memory

    Handling TLB Misses and Page Faults

    6. Explain about Programmed I/O

    .External DevicesKeyboard/Monitor

    Disk Drive

    I/O Modules

    Module Function

    I/O Module Structure Programmed I/O

    Overview of Programmed I/OI/O Commands

    I/O Instructions

    Interrupt-Driven I/O

    Interrupt ProcessingDesign Issues

    7. Explain about direct memory access

    Drawbacks of Programmed and Interrupt-Driven I/O

    DMA Function Intel 8237A DMA Controller

    DMA Operations

    8. Write short notes on I/O Processor

    The Evolution of the I/O Function

    Characteristics of I/O Channels

    I/O Channel Architecture

    http://francis/http://francis/http://francis/