Read this before starting!

Similar documents
Read this before starting!

Read this before starting!

Read this before starting!

East Tennessee State University Department of Computer and Information Sciences CSCI 4717 Computer Architecture TEST 2 for Fall Semester, 2007

Section 001. Read this before starting!

Section 001. Read this before starting! You may use one sheet of scrap paper that you will turn in with your test.

Read this before starting!

Read this before starting!

Read this before starting!

Read this before starting!

Read this before starting!

East Tennessee State University Department of Computer and Information Sciences CSCI 4717 Computer Architecture TEST 3 for Fall Semester, 2006

Read this before starting!

Read this before starting!

Read this before starting!

East Tennessee State University Department of Computer and Information Sciences CSCI 4717 Computer Architecture TEST 3 for Fall Semester, 2005

Section 001. Read this before starting!

Section 002. Read this before starting!

East Tennessee State University Department of Computer and Information Sciences CSCI 1710/Section 001 Web Design I TEST 1 for Fall Semester, 2000

If a b or a c, then a bc If a b and b c, then a c Every positive integer n > 1 can be written uniquely as n = p 1 k1 p 2 k2 p 3 k3 p 4 k4 p s

Section 001 & 002. Read this before starting!

Section 001. Read this before starting!

Read this before starting!

Read this before starting!

Read this before starting!

CS 341l Fall 2008 Test #4 NAME: Key

Administrivia. CMSC 411 Computer Systems Architecture Lecture 19 Storage Systems, cont. Disks (cont.) Disks - review

Chapter-6. SUBJECT:- Operating System TOPICS:- I/O Management. Created by : - Sanjay Patel

Input/Output Problems. External Devices. Input/Output Module. I/O Steps. I/O Module Function Computer Architecture

Input/Output Systems

Digital System Design

CSE 380 Computer Operating Systems

Storage Systems. Storage Systems

Lecture 23: Storage Systems. Topics: disk access, bus design, evaluation metrics, RAID (Sections )

Unit 1. Chapter 3 Top Level View of Computer Function and Interconnection

Organisasi Sistem Komputer

IO System. CP-226: Computer Architecture. Lecture 25 (24 April 2013) CADSL

Computer Architecture CS 355 Busses & I/O System

Storage. Hwansoo Han

Computer Science 146. Computer Architecture

Chapter 6. I/O issues

I/O CANNOT BE IGNORED

CSE 120. Operating Systems. March 27, 2014 Lecture 17. Mass Storage. Instructor: Neil Rhodes. Wednesday, March 26, 14

Chapter 8. A Typical collection of I/O devices. Interrupts. Processor. Cache. Memory I/O bus. I/O controller I/O I/O. Main memory.

Computer Organization and Structure. Bing-Yu Chen National Taiwan University

MaanavaN.Com CS1202 COMPUTER ARCHITECHTURE

CMSC 313 Lecture 26 DigSim Assignment 3 Cache Memory Virtual Memory + Cache Memory I/O Architecture


12/2/2016. Error Detection May Not Be Enough. ECE 120: Introduction to Computing. Can We Use Redundancy to Correct Errors?

Storage Systems. The text highlighted in green in these slides contain external hyperlinks. 1 / 12

Storage systems. Computer Systems Architecture CMSC 411 Unit 6 Storage Systems. (Hard) Disks. Disk and Tape Technologies. Disks (cont.

RAID SEMINAR REPORT /09/2004 Asha.P.M NO: 612 S7 ECE

Lecture 13 Input/Output (I/O) Systems (chapter 13)

Generic Model of I/O Module Interface to CPU and Memory Interface to one or more peripherals

CS330: Operating System and Lab. (Spring 2006) I/O Systems

I/O Systems. 04/16/2007 CSCI 315 Operating Systems Design 1

Programmed I/O Interrupt-Driven I/O Direct Memory Access (DMA) I/O Processors. 10/12/2017 Input/Output Systems and Peripheral Devices (02-2)

I/O CANNOT BE IGNORED

Chapter 3. Top Level View of Computer Function and Interconnection. Yonsei University

Interconnecting Components

Unit 3 and Unit 4: Chapter 4 INPUT/OUTPUT ORGANIZATION

STANDARD I/O INTERFACES

CITS2230 Operating Systems Mid-semester test 2006

Lecture 13. Storage, Network and Other Peripherals

Advanced Computer Architecture

2. Which of the following resources is not one which can result in deadlocking processes? a. a disk file b. a semaphore c. the central processor (CPU)

lecture 22 Input / Output (I/O) 4

ELEN 226 Embedded Systems Electronic Engineering Technology

Operating System: Chap13 I/O Systems. National Tsing-Hua University 2016, Fall Semester

System Buses Ch 3. Computer Function Interconnection Structures Bus Interconnection PCI Bus. 9/4/2002 Copyright Teemu Kerola 2002

Introduction I/O 1. I/O devices can be characterized by Behavior: input, output, storage Partner: human or machine Data rate: bytes/sec, transfers/sec

Module 11: I/O Systems

The control of I/O devices is a major concern for OS designers

Chapter 13: I/O Systems

UNIT I BASIC STRUCTURE OF COMPUTERS Part A( 2Marks) 1. What is meant by the stored program concept? 2. What are the basic functional units of a

Operating Systems 2010/2011

Without fully opening the exam, check that you have pages 1 through 11.

Computer Architecture

Chapter 4 Main Memory

Computer Organization ECE514. Chapter 5 Input/Output (9hrs)

Babbage Analytical Machine

Chapter 13: I/O Systems

IMPORTANT: Circle the last two letters of your class account:

CS370: System Architecture & Software [Fall 2014] Dept. Of Computer Science, Colorado State University

Lecture 23. Finish-up buses Storage

Where We Are in This Course Right Now. ECE 152 Introduction to Computer Architecture Input/Output (I/O) Copyright 2012 Daniel J. Sorin Duke University

Introduction to the PCI Interface. Meeta Srivastav

CSE 120. Overview. July 27, Day 8 Input/Output. Instructor: Neil Rhodes. Hardware. Hardware. Hardware

Bus System. Bus Lines. Bus Systems. Chapter 8. Common connection between the CPU, the memory, and the peripheral devices.

NT2 U3. 2-Bay RAID Storage Enclosure. User Manual May 18, 2010 v1.1

Computer Systems Laboratory Sungkyunkwan University


RAID (Redundant Array of Inexpensive Disks)

Part IV I/O System. Chapter 12: Mass Storage Structure

Module 6: INPUT - OUTPUT (I/O)

Bus (Väylä) Stallings: Ch 3 What moves on Bus? Bus characteristics PCI-bus PCI Express

Top-Level View of Computer Organization

Midterm #2 Exam Solutions April 26, 2006 CS162 Operating Systems

Digital Design Laboratory Lecture 6 I/O

Chapter 13: I/O Systems

Transcription:

Points missed: Student's Name: Total score: /100 points East Tennessee State University Department of Computer and Information Sciences CSCI 4717 Computer Architecture TEST 2 for Fall Semester, 2003 Section 201 Read this before starting! The total possible score for this test is 100 points. This test is closed book and closed notes You may use one sheet of scrap paper that you will turn in with your test. When possible, indicate final answers by drawing a box around them. This is to aid the grader (who might not be me!) Failure to do so might result in no credit for answer. Example: If you perform work on the back of a page in this test, indicate that you have done so in case the need arises for partial credit to be determined. Binary Hex Binary Hex Power of 2 Equals 0000 0 1000 8 2 4 16 0001 1 1001 9 2 5 32 0010 2 1010 A 2 6 64 0011 3 1011 B 2 7 128 0100 4 1100 C 2 8 256 0101 5 1101 D 2 9 512 0110 6 1110 E 2 10 1K 0111 7 1111 F 2 20 1M 2 30 1G Fine print Academic Misconduct: Section 5.7 "Academic Misconduct" of the East Tennessee State University Faculty Handbook, June 1, 2001: "Academic misconduct will be subject to disciplinary action. Any act of dishonesty in academic work constitutes academic misconduct. This includes plagiarism, the changing of falsifying of any academic documents or materials, cheating, and the giving or receiving of unauthorized aid in tests, examinations, or other assigned school work. Penalties for academic misconduct will vary with the seriousness of the offense and may include, but are not limited to: a grade of 'F' on the work in question, a grade of 'F' of the course, reprimand, probation, suspension, and expulsion. For a second academic offense the penalty is permanent expulsion."

Error Checking and Correction 1. True or false: Regarding types of memory errors, a hard error refers to a permanent defect in memory whereas a soft error is a random event causing no permanent damage. (2 points) See slide 2 of the Error Detection & Correction lecture. 2. An error checking code is generated both when data is stored and when it is retrieved. These two codes are compared by doing a bitwise XOR to see if an error has occurred. (2 points) 3. The graphic to the right depicts the digits of a 4-bit Hamming code where a single bit error has occurred. Circle the bit that has flipped. (2 points) 0 0 1 The goal here is to find the intersection of the circles with incorrect (non-even) parity. The parity of the top left circle is odd (incorrect). The parity of the top right circle is even (correct). The parity of the bottom circle is odd (incorrect). Therefore, the error is in the intersection of the top left and bottom circles, but NOT the top right circle. This gives us the one section here. 0 1 0 0 4. True or false: The graphic to the right depicts the digits of a 4-bit Hamming code with parity where a double bit error has occurred. (2 points) 1 0 0 Begin by using the same process from problem 3 to find and correct the 1 0 1 bit that is in error. The only circle that has incorrect parity is the bottom 1 0 circle, and it is corrected by changing the bottom 1 to a 0. Once the suspected 1 bit is corrected, parity is then computed for the entire diagram including the parity bit in the lower left corner. This results in 1 + 0 + 0 + 0 + 1 + 1 + 1 = 4 which is even. Therefore, since correcting the single bit error also corrected the whole diagram's parity, no double error has occurred. 5. If the check code stored with a piece of data is 10011 and the check code calculated on the data retrieved from memory is 10010, what is the syndrome word? (2 points) 10011 10010 00001 6. True or false: Assuming that a single bit error occurred for the syndrome word from problem 5, the syndrome word indicates that there was an error in the check bits, not the stored data. (2 pts) A syndrome word with exactly one bit set to a 1 occurs only when one bit differs between the two sets of check codes, the one calculated upon storing and the one calculated from the retrieved data. This indicates a bit in the check code was flipped since any error in the data would have resulted in a syndrome word with multiple bits set to one. 7. If it takes a minimum of 7 bits to correct a single error in a 64-bit data word, then how many bits will it take to do single-error correction with double-error detection? (2 points) a.) 7 b.) 8 c.) 9 d.) Cannot be determined e.) None of the above 8. What is the maximum number of data bits that can be monitored for single error correction using a 5 bit check code? (2 points) a.) 15 b.) 16 c.) 20 d.) 26 e.) 27 f.) 31 g.) 32 h.) 33 i.) 64

9. The table below describes the position number of the data and code bits of a single error correction code. Determine the equations to derive C 8, C 4, C 2, and C 1 from D 8 through D 1. (6 points) M+K bit position 12 11 10 9 8 7 6 5 4 3 2 1 Position number 1100 1011 1010 1001 1000 0111 0110 0101 0100 0011 0010 0001 Data bit D 8 D 7 D 6 D 5 D 4 D 3 D 2 D 1 Check code bit C 8 C 4 C 2 C 1 C 8 = D 8 D 7 D 6 D 5 C 4 = D 8 D 4 D 3 D 2 C 2 = D 7 D 6 D 4 D 3 D 1 C 1 = D 7 D 5 D 4 D 2 D 1 10. For the error correcting system of the previous question, assume that the check code retrieved from memory was 1001, and the newly calculated check code on the data retrieved from memory was 1111. Assuming a single bit error has occurred, which bit was the one that flipped, D 8, D 7, D 6, D 5, D 4, D 3, D 2, D 1, C 8, C 4, C 2, or C 1? (2 points) Begin by calculating the syndrome word. This is done as in problem 5 by a bitwise XOR. 1001 1111 0110 This implies that C 2 and C 4 are the parity calculations that are in error. The only bit that is a member of these two parity calculations and NOT the parity calculations for C 8 and C 1 is: D 3 RAID 11. Assume a user needs the capacity of 4 hard drives. How many drives would the user need for each of the following implementations of RAID? Note: There is a figure in the book that does this exact calculation for each of the configurations. RAID 0 4 drives (1 point) No data duplication, just striping no extra drives RAID 1 8 drives (1 point) Full mirroring duplicate number of drives RAID 2 7 drives (1 point) Hamming code 4 bits + 3 check bits = 7 drives RAID 5 5 drives (1 point) One additional disk for parity RAID 6 6 drives (1 point) One disk for parity, 2 nd for data check algorithm 12. True or false: RAID 1 with its mirrored disks potentially reduces read times over RAID 0. (2 points) Due to different positions of the read heads, the seek time of one of the mirrored disks will be slightly quicker than the other. This improves performance slightly.

13. What is the bottleneck of the RAID 4 configuration? (3 points) Every read or write to the array must access the parity disk regardless of which of the other disks the desired data is on. 14. Assume that disk 3 of 5 total disks in a RAID 3 system fails and must be replaced. What value would you replace bit X 3 (i) with if X 0 (i)=1, X 1 (i)=1, X 2 (i)=0, and X 4 (i)=0. (2 points) a.) 1 b.) 0 c.) Cannot be determined. Need to know which disk was parity disk. XOR is an odd mathematical operation in that any of the terms of a sequence of XOR'ed values can be moved to the other side of the equal sign with no effect. For example, the expression below is true: 0 = 1 0 1 1 1 If we move the last XOR'ed value to the other side of the equal sign, we still have a valid expression, i.e., both sides of the expression now equal 1: 0 1 = 1 0 1 1 Therefore, it doesn't matter which disk is missing, an XOR of the remaining values should result in the data that was present on the original disk. X 3 (i) = X 0 (i) X 1 (i) X 2 (i) X 4 (i) X 3 (i) = 1 1 0 0 X 3 (i) = 0 15. True or False: RAID level 0 does not provide data backup but does improve performance. (2 points) 16. Which level(s) of RAID (0 through 6) can recover from 2 drives failing at the same time regardless of which drives fail? (2 points) RAID 1, with its fully mirrored drives, could conceivably recover from multiple drives failing as long as the drives weren't the ones that were mirrors of each other. Therefore, RAID 6 is the only one that can recover regardless of which drives fail. 17. Which level(s) of RAID (0 through 6) detects errors using an error detection scheme such as a Hamming Code? (2 points) RAID 2 18. Which level(s) of RAID (0 through 6) does not provide for any data recovery? (2 points) RAID 0

Input/Output 19. What is the primary advantage of interrupt driven I/O over programmed or polling I/O. (3 points) If interrupts are not used, the processor must continually check to see if the I/O devices are available or if they are in need of attention. This responsibility is removed when interrupts are used because each device is given the mechanism to demand the processor's attention even if the processor is doing something else. This frees the processor to work on other tasks. 20. What is the primary advantage of DMA over interrupt driven I/O. (3 points) A two-step process is required when a processor is used to transfer data from an I/O device to memory. First, the processor reads a data element from the I/O device, then it has to store it to memory. With DMA, the DMA processor handles the data transfer freeing the processor to do other things at the cost of losing some access to the bus. 21. How is priority determined for interrupts connected to the processor where each interrupt has its own interrupt line into the processor? (3 points) The internal (hardware) structure of the processor makes it so that certain interrupt lines are checked before others are. It is this internal structure that determines the priority. Therefore, the order in which the devices are connected to the interrupt pins is how the designer makes the interrupts of one device have priority over another. 22. How is priority determined for interrupts sharing a single interrupt connected to the processor where the processor must use a software poll? (3 points) In a software poll, the interrupt routine goes through and checks each device to see which one needed service. It is the order that this checking is done in software that determines the priority. 23. What does the processor do while a DMA module takes and retains control of a bus? (2 points) When the DMA module takes control of the bus, it suspends the processor's bus accesses. Therefore, the processor is free to do anything except access the bus. 24. If the DMA module and the I/O device it communicates with are both attached to the system bus, then the DMA must perform both a read and a write for a single transaction. This is no different than the processor having to do both a read and a write. There is still a benefit though. What is it? (2 points) The processor can still perform operations that do not require the bus. In addition, it does not need to pass the data from the I/O device through its internal registers thereby disrupting a more critical process. 25. How many times must the DMA use the bus for a single transaction if the DMA module acts as a bridge between the I/O device and the system bus? (2 points) Once

26. Setting up a DMA transfer required the DMA module be told four details of the transfer. What are they? (4 points) From slide 41 of the I/O lecture, we have: 1. whether it will be a read or write operation 2. the address of device to transfer data from 3. the starting address of memory block for the data transfer 4. the amount of data to be transferred Bus Architectures 27. List two of the three problems discussed in class that occur when the number of devices on a single bus increases. (3 points) An increased number of devices usually requires a physically longer bus. A long bus causes attenuation of the bus signals and problems with signal reflections. Slower devices will dictate the maximum speed of the bus. More devices trying to communicate on the bus will cause congestion and force devices to wait longer for access to the bus. 28. Give an example of a device connected to the Northbridge of the Pentium architecture. (2 points) From slide 18 of the bus lecture, we can see that aside from its connection to the backside bus, the types of devices connected to the Northbridge are SDRAM, AGP graphics, and the PCI bus. 29. Give an example of a device connected to the Southbridge of the Pentium architecture. (2 points) From slide 18 of the bus lecture, we can see that aside from its connection to the Northbridge through the PCI bus, the Southbridge interfaces to slower buses such as ISA, EIDE, and USB. 30. True or false: The backside bus is used to connect the processor to high-speed devices such as the L2 cache and the Northbridge. (2 points) 31. True or false: The Northbridge and Southbridge are connected using a PCI bus. (2 points) 32. What signal does a bus with synchronous timing require that asynchronous does not? (2 points) A clock signal PCI Bus Architecture 33. The optional PCI bus lines (referring to the original PCI stardard) allow for data widths of how many bits? (2 points) a.) 16 b.) 32 c.) 64 d.) 128 e.) None of the above 34. Does the PCI bus arbitration use a single arbiter or distributed arbitration? (2 points) Single

35. One of the purposes of the PCI bus lines C/BE is to indicate which of the four byte-lanes carry meaningful data. What is their other purpose? (3 points) The 'C' in C/BE stands for "command" while the "BE" part stands for byte enable. Therefore, the other purpose of these lines is to provide the bus command, i.e., signal the transaction type. 36. What is the purpose of the JTAG/boundary scan pins? (2 points) They are used to verify or test the hardware. Of the following characteristics, identify whether the characteristic describes PCI, PCI-E, both, or neither. 37. Has a parallel bus structure. (2 points) PCI PCI-E Both Neither 38. Supports interrupts. (2 points) PCI PCI-E Both Neither 39. Uses differential signalling to allow for long distances. (2 points) PCI PCI-E Both Neither 40. Uses serial "lanes" to communicate. (2 points) PCI PCI-E Both Neither 41. Uses a command structure of approximately 12 to 16 commands. (2 points) PCI PCI-E Both Neither 42. Allows x1, x2, x4, x8, x12, and x16 cards to be plugged into an x16 socket. (2 points) PCI PCI-E Both Neither