Read this before starting!

Similar documents
Read this before starting!

Read this before starting!

Read this before starting!

Section 001. Read this before starting!

Read this before starting!

Section 001. Read this before starting! You may use one sheet of scrap paper that you will turn in with your test.

Read this before starting!

Read this before starting!

East Tennessee State University Department of Computer and Information Sciences CSCI 4717 Computer Architecture TEST 3 for Fall Semester, 2006

Read this before starting!

Read this before starting!

Read this before starting!

Read this before starting!

East Tennessee State University Department of Computer and Information Sciences CSCI 4717 Computer Architecture TEST 2 for Fall Semester, 2007

Read this before starting!

East Tennessee State University Department of Computer and Information Sciences CSCI 4717 Computer Architecture TEST 3 for Fall Semester, 2005

East Tennessee State University Department of Computer and Information Sciences CSCI 1710/Section 001 Web Design I TEST 1 for Fall Semester, 2000

Section 001. Read this before starting!

Section 001 & 002. Read this before starting!

Section 002. Read this before starting!

Read this before starting!

If a b or a c, then a bc If a b and b c, then a c Every positive integer n > 1 can be written uniquely as n = p 1 k1 p 2 k2 p 3 k3 p 4 k4 p s

Section 001. Read this before starting!

Read this before starting!

Read this before starting!

Computer Organization. 8th Edition. Chapter 5 Internal Memory

Chapter 4 Main Memory

Chapter 5 Internal Memory

Organization. 5.1 Semiconductor Main Memory. William Stallings Computer Organization and Architecture 6th Edition

William Stallings Computer Organization and Architecture 6th Edition. Chapter 5 Internal Memory

Chapter 5. Internal Memory. Yonsei University

Internal Memory. Computer Architecture. Outline. Memory Hierarchy. Semiconductor Memory Types. Copyright 2000 N. AYDIN. All rights reserved.

CS 320 February 2, 2018 Ch 5 Memory

Basic Organization Memory Cell Operation. CSCI 4717 Computer Architecture. ROM Uses. Random Access Memory. Semiconductor Memory Types

William Stallings Computer Organization and Architecture 8th Edition. Chapter 5 Internal Memory

Memory memories memory

Caches. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University

Concept of Memory. The memory of computer is broadly categories into two categories:

CS650 Computer Architecture. Lecture 9 Memory Hierarchy - Main Memory

Memory. Objectives. Introduction. 6.2 Types of Memory

EE414 Embedded Systems Ch 5. Memory Part 2/2

Memory systems. Memory technology. Memory technology Memory hierarchy Virtual memory

Announcement. Computer Architecture (CSC-3501) Lecture 20 (08 April 2008) Chapter 6 Objectives. 6.1 Introduction. 6.

Three-box Model: These three boxes need interconnecting (usually done by wiring known as a bus. 1. Processor CPU e.g. Pentium 4 2.

Chapter 2: Fundamentals of a microprocessor based system

falling edge Intro Computer Organization

ECE 485/585 Midterm Exam

Contents. Memory System Overview Cache Memory. Internal Memory. Virtual Memory. Memory Hierarchy. Registers In CPU Internal or Main memory

Overview. Memory Classification Read-Only Memory (ROM) Random Access Memory (RAM) Functional Behavior of RAM. Implementing Static RAM

Computer Memory Basic Concepts. Lecture for CPSC 5155 Edward Bosworth, Ph.D. Computer Science Department Columbus State University

Internal Memory Cache Stallings: Ch 4, Ch 5 Key Characteristics Locality Cache Main Memory

ECE 485/585 Midterm Exam

Chapter 6 Objectives

7/28/ Prentice-Hall, Inc Prentice-Hall, Inc Prentice-Hall, Inc Prentice-Hall, Inc Prentice-Hall, Inc.

CS 2506 Computer Organization II Test 2

Memory. Lecture 22 CS301

Characteristics of Memory Location wrt Motherboard. CSCI 4717 Computer Architecture. Characteristics of Memory Capacity Addressable Units

ECE7995 (4) Basics of Memory Hierarchy. [Adapted from Mary Jane Irwin s slides (PSU)]

Digital Design, Kyung Hee Univ. Chapter 7. Memory and Programmable Logic

Random Access Memory (RAM)

Random Access Memory (RAM)

TAG Word 0 Word 1 Word 2 Word 3 0x0A0 D2 55 C7 C8 0x0A0 FC FA AC C7 0x0A0 A5 A6 FF 00

ECE Lab 8. Logic Design for a Direct-Mapped Cache. To understand the function and design of a direct-mapped memory cache.

ELE 758 * DIGITAL SYSTEMS ENGINEERING * MIDTERM TEST * Circle the memory type based on electrically re-chargeable elements

The Memory Component

Chapter 8 Memory Basics

MEMORY. Objectives. L10 Memory

(Advanced) Computer Organization & Architechture. Prof. Dr. Hasan Hüseyin BALIK (5 th Week)

Chapter 5B. Large and Fast: Exploiting Memory Hierarchy

BEng (Hons.) Telecommunications. BSc (Hons.) Computer Science with Network Security

Do not start the test until instructed to do so!

Memory classification:- Topics covered:- types,organization and working

EPC6055 Digital Integrated Circuits EXAM 1 Fall Semester 2013

Computer Systems Architecture I. CSE 560M Lecture 18 Guest Lecturer: Shakir James

This Unit: Main Memory. Building a Memory System. First Memory System Design. An Example Memory System

One and a half hours. Section A is COMPULSORY

Lecture 20: Memory Hierarchy Main Memory and Enhancing its Performance. Grinch-Like Stuff

Lecture 18: DRAM Technologies

University of Alexandria Faculty of Engineering Division of Communications & Electronics

SAE5C Computer Organization and Architecture. Unit : I - V

Memory Pearson Education, Inc., Hoboken, NJ. All rights reserved.

COMP2121: Microprocessors and Interfacing. Introduction to Microprocessors

ELEC 5200/6200 Computer Architecture and Design Spring 2017 Lecture 7: Memory Organization Part II

Large and Fast: Exploiting Memory Hierarchy

Where Have We Been? Ch. 6 Memory Technology

COSC 6385 Computer Architecture - Memory Hierarchies (II)

Logic and Computer Design Fundamentals. Chapter 8 Memory Basics

Overview IN this chapter we will study. William Stallings Computer Organization and Architecture 6th Edition

Chapter 2: Memory Hierarchy Design (Part 3) Introduction Caches Main Memory (Section 2.2) Virtual Memory (Section 2.4, Appendix B.4, B.

IMPORTANT: Circle the last two letters of your class account:

CS303 LOGIC DESIGN FINAL EXAM

Solve only 2 out of 3 questions

Computer Systems Laboratory Sungkyunkwan University

1. (11 pts) For each question, state which answer is the most apropriate. First one is done for you.

ECE 1160/2160 Embedded Systems Design. Midterm Review. Wei Gao. ECE 1160/2160 Embedded Systems Design

TECHNOLOGY BRIEF. Double Data Rate SDRAM: Fast Performance at an Economical Price EXECUTIVE SUMMARY C ONTENTS

Topic #6. Processor Design

COSC 6385 Computer Architecture - Memory Hierarchies (III)

Embedded Systems Design: A Unified Hardware/Software Introduction. Outline. Chapter 5 Memory. Introduction. Memory: basic concepts

Embedded Systems Design: A Unified Hardware/Software Introduction. Chapter 5 Memory. Outline. Introduction

Transcription:

Points missed: Student's Name: Total score: /100 points East Tennessee State University Department of Computer and Information Sciences CSCI 4717 Computer Architecture TEST 1 for Fall Semester, 2006 Section 001 Read this before starting! The total possible score for this test is 100 points. This test is closed book and closed notes Please turn off all cell phones & pagers during the test. You may use one sheet of scrap paper that you will turn in with your test. When possible, indicate final answers by drawing a box around them. This is to aid the grader. Failure to do so might result in no credit for answer. Example: If you perform work on the back of a page in this test, indicate that you have done so in case the need arises for partial credit to be determined. Binary Hex Binary Hex Power of 2 Equals 0000 0 1000 8 2 4 16 0001 1 1001 9 2 5 32 0010 2 1010 A 2 6 64 0011 3 1011 B 2 7 128 0100 4 1100 C 2 8 256 0101 5 1101 D 2 9 512 0110 6 1110 E 2 10 1K 0111 7 1111 F 2 20 1M 2 30 1G Fine print Academic Misconduct: Section 5.7 "Academic Misconduct" of the East Tennessee State University Faculty Handbook, June 1, 2001: "Academic misconduct will be subject to disciplinary action. Any act of dishonesty in academic work constitutes academic misconduct. This includes plagiarism, the changing of falsifying of any academic documents or materials, cheating, and the giving or receiving of unauthorized aid in tests, examinations, or other assigned school work. Penalties for academic misconduct will vary with the seriousness of the offense and may include, but are not limited to: a grade of 'F' on the work in question, a grade of 'F' of the course, reprimand, probation, suspension, and expulsion. For a second academic offense the penalty is permanent expulsion."

1. For each of the following traits of system component design, indicate which implementation method is the best, hardware (HW), software (SW), or firmware (FW), and which is the worst. Best Worst Characteristic Least expensive during development (2 points) Least expensive during manufacturing (2 points) Ease of upgrade (2 points) Reliability (2 points) 2. For the following items, indicate whether the characteristic more closely describes a top-down (TD) or a bottom-up (BU) design method. (1 point each) Best for small production quantities, i.e., we're not going to sell a lot of these Doesn't have any excess components, e.g., one goal is to reduce chip count for size New design is closely related to long-standing, existing product line Cost is not a concern There are critical performance goals that need to be met 3. Name an important performance measurement for a video conferencing system? Justify your answer. (3 points) 4. Name an important performance measurement for a PDA? Justify your answer. (3 points) For problems 5 through 8, identify which of the following system functional diagrams, a, b, c, or d, best describes the operation of the example system or application. (2 points each) a.) b.) c.) d.) 5. An inventory control system checking inventory in and out of a database: 6. A hard drive controller buffering data between hard drives and the processor: 7. A lighting controller reading switch inputs to control the lighting in a room: 8. Hand writing recognition (processor must identify character written before storing it):

9. Name three of the five effects discussed in class that Moore s law has had on the contemporary application of computers. (4 points) 10. Name two of the four solutions discussed in class for improving DRAM transfer rates. (3 points) 11. Circle all of the following traits that are identified as key concepts of the von Neumann architecture. (3 points) a.) unit interprets instructions and causes them to be executed b.) Memory divided into blocks as a way to group related data or instructions c.) Sequential execution of code except in the case of jumps d.) The use of transistors instead of vacuum tubes for the implementation of circuits e.) Addressable memory contents without consideration to type of content 12. In the space below, sketch the basic von Neumann architecture. Be sure to label each component and include each of the interconnections. (4 points) 13. Which cache mapping function does not require a replacement algorithm? (2 points) 14. Which cache mapping function does not relate a block address to a specific line or set of lines in the cache? (2 points) 15. Which cache mapping function is the most expensive to implement? (2 points)

16. Which cache mapping function is most likely to thrash, i.e., two blocks contending with each other to be stored in the same line of the cache? (2 points) 17. Which replacement algorithm is easier to implement with a 2-way set associative cache, Least Frequently Used or Least Recently Used? (2 points) 18. Describe how the Least Frequently Used cache replacement algorithm works. (3 points) 19. Assume the processor needs to check the cache for data from the 20-bit memory address 3C45D 16 = 00111100010001011101 2. The cache is a fully associative cache with 2 10 = 1024 lines and a block size of 2 3 = 8. Derive the tag from the address that will be used to compare to the tags in the cache. (3 points) 20. Repeat the previous problem for a direct cache instead of fully associative. (3 points) The table below represents a small section of a cache that uses direct mapping. Refer to it to answer questions 21 and 22. Assume the processor's memory bus uses 24 bits for an address. Tag (binary) Line number (binary) Word within block 00 01 10 11 100111011010 0101001011 08 16 19 16 2A 16 3B 16 110110011000 0101001100 4C 16 5D 16 6E 16 7F 16 101101010101 0101001101 50 16 61 16 72 16 83 16 010010111101 0101001110 94 16 A5 16 B6 16 C7 16 111001110011 0101001111 D7 16 E9 16 FA 16 0B 16 011001111001 0101010000 1C 16 2D 16 3E 16 4F 16 Col 0 Col 1 Col 2 Col 3 Row a Row b Row c Row d Row e Row f 21. What is the size of the cache in words (bytes)? (2 points) 22. A block containing the address 8B453F 16 = 100010110100010100111111 2 is not contained in the cache. When loaded, which row (a-f) and column (0-3) will its values be stored in? (3 points)

23. Assume a 2-way set-associative cache with 2 11 = 2048 lines is being used in a system with a 24- bit address using a 16-word block size. If a block containing the address 7BE453 16 = 011110111110010001010011 2 is stored in the cache, what would the tag be? (2 points) 24. Assume a memory access to main memory on a cache "miss" takes 40 ns and a memory access to the cache on a cache "hit" takes 10 ns. If 75% of the processor's memory requests result in a cache "hit", what is the average memory access time? (2 points) a.) 17.5 ns b.) 32.5 ns c.) 10 ns d.) 40.0 ns e.) 7.5 ns f.) 2.5 ns 25. For each of the following statements, identify which represent write-back (WB) and which represent write-through (WT) cache writing policies? (2 points each) When using this write policy with multiple cache-equipped processors sharing a single RAM, it is possible for RAM to contain an incorrect value for a significant period. This write policy generates higher write traffic to DRAM. 26. Why does a DRAM use column and row addressing? Circle all that apply. (2 points) a.) It reduces the number of pins needed to interface with the DRAM b.) It's necessary in order to store data to capacitors. c.) It can be used to speed up transfers of sequential data within the same row by using page mode. d.) It allows for simultaneous writing data to and reading data from the DRAM. e.) The cache uses the columns and rows to organize its own data. 27. True or false: The processor may still read from the DRAM while the DRAM is being refreshed. (2 points) 28. True or false: A time critical interrupt should allow nested interrupts. (2 points) 29. Name and describe one of the four types of interrupts, i.e., what types of interrupt triggers are there, that we discussed in class. (2 points)

30. Match the DRAM type with its primary characteristic. (5 points) Fast Page Mode overlaps data read with column address write for next read Extended Data Out uses fixed row address for multiple column reads SDRAM requires adherence to exact bus specification DDR-SDRAM incorporates a cache on the memory stick RAMBUS returns data to processor synchronized to a full clock pulse returns data to processor synchronized with both the rising CDRAM and falling edges of a clock pulse 31. For single error correction, what is the minimum number of check bits required for 12 data bits? (2 points) a.) 4 b.) 5 c.) 6 d.) 7 e.) 8 f.) 9 g.) 10 h.) 11 i.) 12 32. If it takes a minimum of 9 bits to correct a single error in a 256-bit data word, then how many bits will it take to do single-error correction with double-error detection? (2 points) a.) 8 b.) 9 c.) 10 d.) Cannot be determined e.) None of the above 33. What is the total number of possible syndrome word values for 4 data bits and 3 check bits if we only allow for the cases of no errors or single bit errors? (2 points) a.) 6 b.) 7 c.) 8 d.) 16 e.) 32 f.) 64 g.) 128 h.) 256 i.) 512 34. The graphic to the right depicts the digits of a 4-bit Hamming code where a single bit error has occurred. Circle the bit that has flipped. 1 1 1 (2 points) 0 1 0 35. True or false: The graphic to the right depicts the digits of a 4-bit Hamming 1 code with parity where a double bit error has occurred. (2 points) 36. Assume the figure below shows the grouping of four data bits, D 0, D 1, D 2, and D 3, with three check code bits, C 0, C 1, and C 2. In the space provided, write the expressions used to generate the check code bits for this system. (4 points) 1 0 1 1 1 1 1 0 C 2 D 1 C 0 C 2 = D 0 D 2 D 3 C 1 = C 1 C 0 =