SlideShare a Scribd company logo
Advanced Computer Architecture
(Assignment –II)
Submitted in partial fulfilment of the requirements for the degree of
Master of Technology in Information TechnologyMaster of Technology in Information TechnologyMaster of Technology in Information TechnologyMaster of Technology in Information Technology
by
Vijayananda D Mohire
(Enrolment No.921DMTE0113)
Information Technology Department
Karnataka State Open University
Manasagangotri, Mysore – 570006
Karnataka, India
(2009)
MT-12-II
2
Advanced Computer Architecture
MT-12-II
3
CERTIFICATECERTIFICATECERTIFICATECERTIFICATE
This is to certify that the Assignment-II entitled (Advanced Computer
Architecture, subject code: MT12) submitted by Vijayananda D Mohire
having Roll Number 921DMTE0113 for the partial fulfilment of the
requirements of Master of Technology in Information Technology degree
of Karnataka State Open University, Mysore, embodies the bonafide
work done by him under my supervision.
Place: ________________Place: ________________Place: ________________Place: ________________ Signature of the Internal SupervisorSignature of the Internal SupervisorSignature of the Internal SupervisorSignature of the Internal Supervisor
NameNameNameName
Date: ________________Date: ________________Date: ________________Date: ________________ DesignationDesignationDesignationDesignation
MT-12-II
4
For EvaluationFor EvaluationFor EvaluationFor Evaluation
QuestionQuestionQuestionQuestion
NumberNumberNumberNumber
Maximum MarksMaximum MarksMaximum MarksMaximum Marks MarksMarksMarksMarks
awardedawardedawardedawarded
Comments,Comments,Comments,Comments, if anyif anyif anyif any
1 5
2 5
TOTALTOTALTOTALTOTAL 10
Evaluator’s Name and Signature Date
MT-12-II
5
PrefacePrefacePrefacePreface
This document has been prepared specially for the assignments of M.Tech – IT I
Semester. This is mainly intended for evaluation of assignment of the academic
M.Tech - IT, I semester. I have made a sincere attempt to gather and study the best
answers to the assignment questions and have attempted the responses to the
questions. I am confident that the evaluator’s will find this submission informative
and evaluate based on the provide content.
For clarity and ease of use there is a Table of contents and Evaluators section to
make easier navigation and recording of the marks. A list of references has been
provided in the last page – Bibliography that provides the source of information both
internal and external. Evaluator’s are welcome to provide the necessary comments
against each response, suitable space has been provided at the end of each
response.
I am grateful to the Infysys academy, Koramangala, Bangalore in making this a big
success. Many thanks for the timely help and attention in making this possible within
specified timeframe. Special thanks to Mr. Vivek and Mr. Prakash for their timely
help and guidance.
Candidate’s Name and Signature Date
MT-12-II
6
Table of ContentsTable of ContentsTable of ContentsTable of Contents
FFFFOROROROR EEEEVALUATIONVALUATIONVALUATIONVALUATION.............................................................................................................................................................. 4
PPPPREFACEREFACEREFACEREFACE............................................................................................................................................................................. 5
QQQQUESTIONUESTIONUESTIONUESTION 1111........................................................................................................................................................................ 9
AAAANSWERNSWERNSWERNSWER 1111........................................................................................................................................................................... 9
QQQQUESTIONUESTIONUESTIONUESTION 2222......................................................................................................................................................................16
AAAANSWERNSWERNSWERNSWER 2222.........................................................................................................................................................................16
BIBLIOGRAPHY................................................................................................................................ 21
MT-12-II
7
Table of FiguresTable of FiguresTable of FiguresTable of Figures
Figure 1Figure 1Figure 1Figure 1 Memory Hierarchy.............................................................................................................................................................9
Figure 2Figure 2Figure 2Figure 2 Levels of Memory (Hyde, 2008)...............................................................................................................................11
Figure 3Figure 3Figure 3Figure 3 Computer classifications defined by Flynn (Anonymous, Flynn's_taxonomy, 2009)..........................17
Figure 4Figure 4Figure 4Figure 4 Pictorials of Flynn’s Taxonomy (Anonymous, Flynn's_taxonomy, 2009)................................................19
Figure 5Figure 5Figure 5Figure 5 Refined Flynn's taxonomy..........................................................................................................................................20
MT-12-II
8
ADVANCEDADVANCEDADVANCEDADVANCED COMPUTERCOMPUTERCOMPUTERCOMPUTER ARCHITECTUREARCHITECTUREARCHITECTUREARCHITECTURE
RESPONSE TO ASSIGNMENTRESPONSE TO ASSIGNMENTRESPONSE TO ASSIGNMENTRESPONSE TO ASSIGNMENT –––– IIIIIIII
MT-12-II
9
Question 1Question 1Question 1Question 1 What is memory hierarchy? Explain the different levels of memory
hierarchy?
Answer 1Answer 1Answer 1Answer 1
FigureFigureFigureFigure 1111 Memory Hierarchy
A ranking of computer memory devices, with devices having the fastest access
time at the top of the hierarchy, and devices with slower access times but larger
capacity and lower cost at lower levels.
We classify memory based on its "distance" from the processor, with distance
MT-12-II
10
measured by the number of machine cycles required for access. The closer
memory is to the processor, the faster it should be. As memory gets further from
the main processor, we can afford longer access times. Thus, slower technologies
are used for these memories, and faster technologies are used for memories
closer to the CPU. The better the technology, the faster and more expensive the
memory becomes. Thus, faster memories tend to be smaller than slower ones,
due to cost.
Memory hierarchy refers to a CPU-centric latency (delay)—the primary criterion
for designing a placement in storage in a memory hierarchy—that fits the storage
device into the design considerations concerning the operators of the computer. It
is used only incidentally in operations, artifactually. It's primary use is in thinking
about an abstract machines.
The levels of memory in a computer (Hyde, 2008). From fastest to slowest speed,
they are:
1. CPU registers
2. L1 cache
3. L2 cache
4. Main memory
5. Virtual memory
6. Disk
FigureFigureFigureFigure 2222 Levels of Memory
At the top level of the memory hierarchy are the CPU's general purpose registers.
The registers provide the fastest access to data possible on the 80x86 CPU. The
register file is also the smallest memory object in the memory hierarchy (with just
eight general purpose registers available). By virtue of the fact that it is virtually
impossible to add more registers to the 80x86, registers are also the most
expensive memory locations. Note that we can include FPU, MMX, SIMD, and
other CPU registers in this cla
the fact that there are a very limited number of registers and the cost per byte is
quite high (figuring the cost of the CPU divided by the number of bytes of register
available).
11
Levels of Memory (Hyde, 2008)
At the top level of the memory hierarchy are the CPU's general purpose registers.
The registers provide the fastest access to data possible on the 80x86 CPU. The
register file is also the smallest memory object in the memory hierarchy (with just
ral purpose registers available). By virtue of the fact that it is virtually
impossible to add more registers to the 80x86, registers are also the most
expensive memory locations. Note that we can include FPU, MMX, SIMD, and
other CPU registers in this class as well. These additional registers do not change
the fact that there are a very limited number of registers and the cost per byte is
quite high (figuring the cost of the CPU divided by the number of bytes of register
MT-12-II
At the top level of the memory hierarchy are the CPU's general purpose registers.
The registers provide the fastest access to data possible on the 80x86 CPU. The
register file is also the smallest memory object in the memory hierarchy (with just
ral purpose registers available). By virtue of the fact that it is virtually
impossible to add more registers to the 80x86, registers are also the most
expensive memory locations. Note that we can include FPU, MMX, SIMD, and
ss as well. These additional registers do not change
the fact that there are a very limited number of registers and the cost per byte is
quite high (figuring the cost of the CPU divided by the number of bytes of register
MT-12-II
12
Working our way down, the Level One Cache system is the next highest
performance subsystem in the memory hierarchy. On the 80x86 CPUs, the Level
One Cache is provided on-chip by Intel and cannot be expanded. The size is
usually quite small (typically between 4Kbytes and 32Kbytes), though much larger
than the registers available on the CPU chip. Although the Level One Cache size
is fixed on the CPU and you cannot expand it, the cost per byte of cache memory
is much lower than that of the registers because the cache contains far more
storage than is available in all the combined registers.
The Level Two Cache is present on some CPUs, on other CPUs it is the system
designer's task to incorporate this cache (if it is present at all). For example, most
Pentium II, III, and IV CPUs have a level two cache as part of the CPU package,
but many of Intel's Celeron chips do not1. The Level Two Cache is generally much
larger than the level one cache (e.g., 256 or 512KBytes versus 16 Kilobytes). On
CPUs where Intel includes the Level Two Cache as part of the CPU package, the
cache is not expandable. It is still lower cost than the Level One Cache because
we amortize the cost of the CPU across all the bytes in the Level Two Cache. On
systems where the Level Two Cache is external, many system designers let the
end user select the cache size and upgrade the size. For economic reasons,
external caches are actually more expensive than caches that are part of the CPU
MT-12-II
13
package, but the cost per bit at the transistor level is still equivalent to the in-
package caches.
Below the Level Two Cache system in the memory hierarchy falls the main
memory subsystem. This is the general-purpose, relatively low-cost memory
found in most computer systems. Typically, this is DRAM or some similar
inexpensive memory technology.
Below main memory is the NUMA category. NUMA, which stands for NonUniform
Memory Access is a bit of a misnomer here. NUMA means that different types of
memory have different access times. Therefore, the term NUMA is fairly
descriptive of the entire memory hierarchy. In Fig.2, however, we'll use the term
NUMA to describe blocks of memory that are electronically similar to main
memory but for one reason or another operate significantly slower than main
memory. A good example is the memory on a video display card. Access to
memory on video display cards is often much slower than access to main
memory. Other peripheral devices that provide a block of shared memory
between the CPU and the peripheral probably have similar access times as this
video card example. Another example of NUMA includes certain slower memory
technologies like Flash Memory that have significant slower access and transfers
times than standard semiconductor RAM. We'll use the term NUMA in this chapter
MT-12-II
14
to describe these blocks of memory that look like main memory but run at slower
speeds.
Most modern computer systems implement a Virtual Memory scheme that lets
them simulate main memory using storage on a disk drive. While disks are
significantly slower than main memory, the cost per bit is also significantly lower.
Therefore, it is far less expensive (by three orders of magnitude) to keep some
data on magnetic storage rather than in main memory. A Virtual Memory
subsystem is responsible for transparently copying data between the disk and
main memory as needed by a program.
File Storage also uses disk media to store program data. However, it is the
program's responsibility to store and retrieve file data. In many instances, this is a
bit slower than using Virtual Memory, hence the lower position in the memory
hierarchy.
Below File Storage in the memory hierarchy comes Network Storage. At this level
a program is keeping data on a different system that connects the program's
system via a network. With Network Storage you can implement Virtual Memory,
File Storage, and a system known as Distributed Shared Memory (where
processes running on different computer systems share data in a common block
MT-12-II
15
of memory and communicate changes to that block across the network).
Virtual Memory, File Storage, and Network Storage are examples of so-called on-
line memory subsystems. Memory access via these mechanism is slower than
main memory access, but when a program requests data from one of these
memory devices, the device is ready and able to respond to the request as quickly
as is physically possible. This is not true for the remaining levels in the memory
hierarchy.
The Near-Line and Off-Line Storage subsystems are not immediately ready to
respond to a program's request for data. An Off-Line Storage system keeps its
data in electronic form (usually magnetic or optical) but on media that is not
(necessarily) connected to the computer system while the program that needs the
data is running. Examples of Off-Line Storage include magnetic tapes, disk
cartridges, optical disks, and floppy diskettes. When a program needs data from
an off-line medium, the program must stop and wait for a someone or something
to mount the appropriate media on the computer system. This delay can be quite
long (perhaps the computer operator decided to take a coffee break?). Near-Line
Storage uses the same media as Off-Line Storage, the difference is that the
system holds the media in a special robotic jukebox device that can automatically
mount the desired media when some program requests it. Tapes and removable
MT-12-II
16
media are among the most inexpensive electronic data storage formats available.
Hence, these media are great for storing large amounts of data for long time
periods.
Hard Copy storage is simply a print-out (in one form or another) of some data. If a
program requests some data and that data is present only in hard copy form,
someone will have to manually enter the data into the computer. Paper (or other
hard copy media) is probably the least expensive form of memory, at least for
certain data types.
Evaluator’s Comments if any:
Question 2Question 2Question 2Question 2 Explain the different Flynn’s Taxonomy of computer architecture
Answer 2Answer 2Answer 2Answer 2
Over the years, several attempts have been made to find a satisfactory way to
categorize computer architectures. Although none of them are perfect, today's
MT-12-II
17
most widely accepted taxonomy is the one proposed by Michael Flynn in
1972. Flynn's taxonomy considers two factors: the number of instructions and
the number of data streams that flow into the processor. A machine can have
either one or multiple streams of data, and can have either one or multiple
processors working on this data. This gives us four possible combinations:
SISD (single instruction stream, single data stream), SIMD (single instruction
stream, multiple data streams), MISD (multiple instruction streams, single
data stream), and MIMD (multiple instruction streams, multiple data streams).
(Anonymous, Flynn's_taxonomy, 2009)
SingleSingleSingleSingle
InstructionInstructionInstructionInstruction
MultipleMultipleMultipleMultiple
InstructionInstructionInstructionInstruction
SingleSingleSingleSingle
DataDataDataData
SISD MISD
MultipleMultipleMultipleMultiple
DataDataDataData
SIMD MIMD
FigureFigureFigureFigure 3333 Computer classifications defined by Flynn (Anonymous,
Flynn's_taxonomy, 2009)
The four classifications defined by Flynn are based upon the number of
concurrent instruction (or control) and data streams available in the
architecture:
MT-12-II
18
Single Instruction, Single Data stream (SISD)
A sequential computer which exploits no parallelism in either the
instruction or data streams. Examples of SISD architecture are the
traditional uniprocessor machines like a PC or old mainframes.
Single Instruction, Multiple Data streams (SIMD)
A computer which exploits multiple data streams against a single
instruction stream to perform operations which may be naturally
parallelized. For example, an array processor or GPU.
Multiple Instruction, Single Data stream (MISD)
Multiple instructions operate on a single data stream. Uncommon
architecture which is generally used for fault tolerance. Heterogeneous
systems operate on the same data stream and must agree on the
result. Examples include the Space Shuttle flight control computer.
Multiple Instruction, Multiple Data streams (MIMD)
Multiple autonomous processors simultaneously executing different
instructions on different data. Distributed systems are generally
recognized to be MIMD architectures; either exploiting a single shared
memory space or a distributed memory space.
Visually, these four architectures are shown below where each "PU" is a
processing unit:
SISDSISDSISDSISD
SIMDSIMDSIMDSIMD
FigureFigureFigureFigure 4444 Pictorials of
2009)
At a level above where Flynn begins his taxonomy, we need to add one more
characteristic, and that is whether the architecture is instruction driven or data
driven. The classic von Neumann architecture is instruction driven. All
processor activities are de
instructions act on the data. Data driven, or
opposite. The characteristics of the data determine the sequence of processor
19
Visually, these four architectures are shown below where each "PU" is a
SISDSISDSISDSISD MISDMISDMISDMISD
SIMDSIMDSIMDSIMD MIMDMIMDMIMDMIMD
Pictorials of Flynn’s Taxonomy (Anonymous, Flynn's_taxonomy,
At a level above where Flynn begins his taxonomy, we need to add one more
characteristic, and that is whether the architecture is instruction driven or data
driven. The classic von Neumann architecture is instruction driven. All
processor activities are determined by a sequence of program code. Program
the data. Data driven, or dataflow, architectures do just the
opposite. The characteristics of the data determine the sequence of processor
MT-12-II
Visually, these four architectures are shown below where each "PU" is a
(Anonymous, Flynn's_taxonomy,
At a level above where Flynn begins his taxonomy, we need to add one more
characteristic, and that is whether the architecture is instruction driven or data
driven. The classic von Neumann architecture is instruction driven. All
termined by a sequence of program code. Program
, architectures do just the
opposite. The characteristics of the data determine the sequence of processor
MT-12-II
20
events.
With the addition of dataflow computers and some refinements to the MIMD
classification, we obtain the taxonomy shown below .
FigureFigureFigureFigure 5555 Refined Flynn's taxonomy
Evaluator’s Comments if any:
MT-12-II
21
Bibliography
Anonymous. (2009). Flynn's_taxonomy. Retrieved 2009, from Wikipedia:
http://en.wikipedia.org/wiki/Flynn's_taxonomy
Hyde, R. (2008). Chapter Six Memory Architecture . Retrieved from Art of Assembly Language by Webster:
http://webster.cs.ucr.edu/AoA/Windows/HTML/MemoryArchitecture.html

More Related Content

PPTX
PPT
DISCOS DUROS
PPTX
Mantenimiento de cpu y tarjeta madre
PDF
Embedded Storage Management
PPTX
Risc and cisc
PPTX
Intel processor family
PPTX
Lenguaje ensamblador (assembler)
PPTX
Gpu with cuda architecture
DISCOS DUROS
Mantenimiento de cpu y tarjeta madre
Embedded Storage Management
Risc and cisc
Intel processor family
Lenguaje ensamblador (assembler)
Gpu with cuda architecture

What's hot (20)

PDF
4 threads
PPTX
Hash Function
PPTX
Multithreading computer architecture
PPTX
x86 architecture
 
DOCX
Study of power supply used in computers
PDF
Aes tipo de encriptacion ppt utp
PDF
Client-centric Consistency Models
PDF
Estructura y funcionamiento del procesador
PPT
Sistema de archivos HPFS
PDF
ARM® Cortex M Boot & CMSIS Part 1-3
PPTX
Microprocesador
PPT
Embedded Systems : introduction
PPT
isa architecture
PPTX
Microprocesadores
PPSX
Evolution of microprocessors
DOCX
PPT
The Anatomy Of The Google Architecture Fina Lv1.1
PPT
Clasificacion de los sistemas operativos
PPTX
Secret key cryptography
PDF
5 Memoria ram
4 threads
Hash Function
Multithreading computer architecture
x86 architecture
 
Study of power supply used in computers
Aes tipo de encriptacion ppt utp
Client-centric Consistency Models
Estructura y funcionamiento del procesador
Sistema de archivos HPFS
ARM® Cortex M Boot & CMSIS Part 1-3
Microprocesador
Embedded Systems : introduction
isa architecture
Microprocesadores
Evolution of microprocessors
The Anatomy Of The Google Architecture Fina Lv1.1
Clasificacion de los sistemas operativos
Secret key cryptography
5 Memoria ram
Ad

Viewers also liked (13)

PDF
IS 139 Assignment 1
PDF
Advanced Computer Architecture Chapter 123 Problems Solution
PDF
Cse viii-advanced-computer-architectures-06cs81-solution
PDF
Advanced Computer Architecture chapter 5 problem solutions
DOCX
Nadeem cyber law assignment
DOCX
Cyber law assignment
DOCX
Cyber law assignment
PDF
Aca2 10 11
PDF
PDF
Kai hwang solution
PDF
Parallel programming model, language and compiler in ACA.
DOC
Assignment of cyber crimes for oumh1203
PDF
Advanced Comuter Architecture Ch6 Problem Solutions
IS 139 Assignment 1
Advanced Computer Architecture Chapter 123 Problems Solution
Cse viii-advanced-computer-architectures-06cs81-solution
Advanced Computer Architecture chapter 5 problem solutions
Nadeem cyber law assignment
Cyber law assignment
Cyber law assignment
Aca2 10 11
Kai hwang solution
Parallel programming model, language and compiler in ACA.
Assignment of cyber crimes for oumh1203
Advanced Comuter Architecture Ch6 Problem Solutions
Ad

Similar to M.Tech: Advanced Computer Architecture Assignment II (20)

PDF
Advanced Computer Arch Assign II
PPT
Basicarchitecturememory
PDF
International Journal of Engineering Research and Development
PPT
Computer Hardware
PPT
PDF
Architecture and implementation issues of multi core processors and caching –...
DOCX
Virtual Memory In Contemporary Microprocessors And 64-Bit Microprocessors Arc...
PPT
Cache memory
PDF
Area Optimized Implementation For Mips Processor
PDF
Implementation of RISC-Based Architecture for Low power applications
PDF
Nt1310 Unit 3 Computer Components
PPTX
Paging and Segmentation
PPT
Multilevel arch & str org.& mips, 8086, memory
PDF
Co question 2006
PPTX
How to Measure RTOS Performance
PDF
A SURVEY OF DIFFERENT APPROACHES FOR OVERCOMING THE PROCESSOR-MEMORY BOTTLENECK
PDF
A Survey of Different Approaches for Overcoming the Processor - Memory Bottle...
PDF
A Survey of Different Approaches for Overcoming the Processor - Memory Bottle...
PDF
151 A SURVEY OF DIFFERENT APPROACHES FOR OVERCOMING THE PROCESSOR-MEMORY BOTT...
PDF
Freertos based environmental data acquisition using arm cortex m4 f core
Advanced Computer Arch Assign II
Basicarchitecturememory
International Journal of Engineering Research and Development
Computer Hardware
Architecture and implementation issues of multi core processors and caching –...
Virtual Memory In Contemporary Microprocessors And 64-Bit Microprocessors Arc...
Cache memory
Area Optimized Implementation For Mips Processor
Implementation of RISC-Based Architecture for Low power applications
Nt1310 Unit 3 Computer Components
Paging and Segmentation
Multilevel arch & str org.& mips, 8086, memory
Co question 2006
How to Measure RTOS Performance
A SURVEY OF DIFFERENT APPROACHES FOR OVERCOMING THE PROCESSOR-MEMORY BOTTLENECK
A Survey of Different Approaches for Overcoming the Processor - Memory Bottle...
A Survey of Different Approaches for Overcoming the Processor - Memory Bottle...
151 A SURVEY OF DIFFERENT APPROACHES FOR OVERCOMING THE PROCESSOR-MEMORY BOTT...
Freertos based environmental data acquisition using arm cortex m4 f core

More from Vijayananda Mohire (20)

PDF
Bhadale QAI Hub - for multicloud, multitechnology platform
PDF
Practical_Introduction_to_Quantum_Safe_Cryptography
PDF
Progress Report- MIT Course 8.371.3x - VD-Mohire
PDF
Quantum Communications Q&A with Gemini LLM
PDF
Peer Review Certificate for Journal of Engg
PDF
Quantum Algorithms for Electronics - IEEE Certificate
PDF
NexGen Solutions for cloud platforms, powered by GenQAI
PDF
Certificate- Peer Review of Book Chapter on ML
PDF
Key projects Data Science and Engineering
PDF
Key projects Data Science and Engineering
PDF
Bhadale IT Hub-Multi Cloud and Multi QAI
PDF
My key hands-on projects in Quantum, and QAI
PDF
Azure Quantum Workspace for developing Q# based quantum circuits
PDF
Key projects in AI, ML and Generative AI
PDF
My Journey towards Artificial Intelligence
PDF
Bhadale IT Cloud Solutions for Agriculture
PDF
Bhadale IT Cloud Solutions for Agriculture
PDF
Bhadale IT Intel and Azure Cloud Offerings
PDF
GitHub Copilot-vijaymohire
PDF
Practical ChatGPT From Use Cases to Prompt Engineering & Ethical Implications
Bhadale QAI Hub - for multicloud, multitechnology platform
Practical_Introduction_to_Quantum_Safe_Cryptography
Progress Report- MIT Course 8.371.3x - VD-Mohire
Quantum Communications Q&A with Gemini LLM
Peer Review Certificate for Journal of Engg
Quantum Algorithms for Electronics - IEEE Certificate
NexGen Solutions for cloud platforms, powered by GenQAI
Certificate- Peer Review of Book Chapter on ML
Key projects Data Science and Engineering
Key projects Data Science and Engineering
Bhadale IT Hub-Multi Cloud and Multi QAI
My key hands-on projects in Quantum, and QAI
Azure Quantum Workspace for developing Q# based quantum circuits
Key projects in AI, ML and Generative AI
My Journey towards Artificial Intelligence
Bhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for Agriculture
Bhadale IT Intel and Azure Cloud Offerings
GitHub Copilot-vijaymohire
Practical ChatGPT From Use Cases to Prompt Engineering & Ethical Implications

Recently uploaded (20)

PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
System and Network Administraation Chapter 3
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Understanding Forklifts - TECH EHS Solution
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
L1 - Introduction to python Backend.pptx
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
medical staffing services at VALiNTRY
PPTX
Transform Your Business with a Software ERP System
PDF
top salesforce developer skills in 2025.pdf
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
history of c programming in notes for students .pptx
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Designing Intelligence for the Shop Floor.pdf
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
System and Network Administraation Chapter 3
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Understanding Forklifts - TECH EHS Solution
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
How to Choose the Right IT Partner for Your Business in Malaysia
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
L1 - Introduction to python Backend.pptx
Which alternative to Crystal Reports is best for small or large businesses.pdf
Design an Analysis of Algorithms II-SECS-1021-03
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
medical staffing services at VALiNTRY
Transform Your Business with a Software ERP System
top salesforce developer skills in 2025.pdf
CHAPTER 2 - PM Management and IT Context
Navsoft: AI-Powered Business Solutions & Custom Software Development
Adobe Illustrator 28.6 Crack My Vision of Vector Design
history of c programming in notes for students .pptx
Reimagine Home Health with the Power of Agentic AI​
Designing Intelligence for the Shop Floor.pdf

M.Tech: Advanced Computer Architecture Assignment II

  • 1. Advanced Computer Architecture (Assignment –II) Submitted in partial fulfilment of the requirements for the degree of Master of Technology in Information TechnologyMaster of Technology in Information TechnologyMaster of Technology in Information TechnologyMaster of Technology in Information Technology by Vijayananda D Mohire (Enrolment No.921DMTE0113) Information Technology Department Karnataka State Open University Manasagangotri, Mysore – 570006 Karnataka, India (2009)
  • 3. MT-12-II 3 CERTIFICATECERTIFICATECERTIFICATECERTIFICATE This is to certify that the Assignment-II entitled (Advanced Computer Architecture, subject code: MT12) submitted by Vijayananda D Mohire having Roll Number 921DMTE0113 for the partial fulfilment of the requirements of Master of Technology in Information Technology degree of Karnataka State Open University, Mysore, embodies the bonafide work done by him under my supervision. Place: ________________Place: ________________Place: ________________Place: ________________ Signature of the Internal SupervisorSignature of the Internal SupervisorSignature of the Internal SupervisorSignature of the Internal Supervisor NameNameNameName Date: ________________Date: ________________Date: ________________Date: ________________ DesignationDesignationDesignationDesignation
  • 4. MT-12-II 4 For EvaluationFor EvaluationFor EvaluationFor Evaluation QuestionQuestionQuestionQuestion NumberNumberNumberNumber Maximum MarksMaximum MarksMaximum MarksMaximum Marks MarksMarksMarksMarks awardedawardedawardedawarded Comments,Comments,Comments,Comments, if anyif anyif anyif any 1 5 2 5 TOTALTOTALTOTALTOTAL 10 Evaluator’s Name and Signature Date
  • 5. MT-12-II 5 PrefacePrefacePrefacePreface This document has been prepared specially for the assignments of M.Tech – IT I Semester. This is mainly intended for evaluation of assignment of the academic M.Tech - IT, I semester. I have made a sincere attempt to gather and study the best answers to the assignment questions and have attempted the responses to the questions. I am confident that the evaluator’s will find this submission informative and evaluate based on the provide content. For clarity and ease of use there is a Table of contents and Evaluators section to make easier navigation and recording of the marks. A list of references has been provided in the last page – Bibliography that provides the source of information both internal and external. Evaluator’s are welcome to provide the necessary comments against each response, suitable space has been provided at the end of each response. I am grateful to the Infysys academy, Koramangala, Bangalore in making this a big success. Many thanks for the timely help and attention in making this possible within specified timeframe. Special thanks to Mr. Vivek and Mr. Prakash for their timely help and guidance. Candidate’s Name and Signature Date
  • 6. MT-12-II 6 Table of ContentsTable of ContentsTable of ContentsTable of Contents FFFFOROROROR EEEEVALUATIONVALUATIONVALUATIONVALUATION.............................................................................................................................................................. 4 PPPPREFACEREFACEREFACEREFACE............................................................................................................................................................................. 5 QQQQUESTIONUESTIONUESTIONUESTION 1111........................................................................................................................................................................ 9 AAAANSWERNSWERNSWERNSWER 1111........................................................................................................................................................................... 9 QQQQUESTIONUESTIONUESTIONUESTION 2222......................................................................................................................................................................16 AAAANSWERNSWERNSWERNSWER 2222.........................................................................................................................................................................16 BIBLIOGRAPHY................................................................................................................................ 21
  • 7. MT-12-II 7 Table of FiguresTable of FiguresTable of FiguresTable of Figures Figure 1Figure 1Figure 1Figure 1 Memory Hierarchy.............................................................................................................................................................9 Figure 2Figure 2Figure 2Figure 2 Levels of Memory (Hyde, 2008)...............................................................................................................................11 Figure 3Figure 3Figure 3Figure 3 Computer classifications defined by Flynn (Anonymous, Flynn's_taxonomy, 2009)..........................17 Figure 4Figure 4Figure 4Figure 4 Pictorials of Flynn’s Taxonomy (Anonymous, Flynn's_taxonomy, 2009)................................................19 Figure 5Figure 5Figure 5Figure 5 Refined Flynn's taxonomy..........................................................................................................................................20
  • 8. MT-12-II 8 ADVANCEDADVANCEDADVANCEDADVANCED COMPUTERCOMPUTERCOMPUTERCOMPUTER ARCHITECTUREARCHITECTUREARCHITECTUREARCHITECTURE RESPONSE TO ASSIGNMENTRESPONSE TO ASSIGNMENTRESPONSE TO ASSIGNMENTRESPONSE TO ASSIGNMENT –––– IIIIIIII
  • 9. MT-12-II 9 Question 1Question 1Question 1Question 1 What is memory hierarchy? Explain the different levels of memory hierarchy? Answer 1Answer 1Answer 1Answer 1 FigureFigureFigureFigure 1111 Memory Hierarchy A ranking of computer memory devices, with devices having the fastest access time at the top of the hierarchy, and devices with slower access times but larger capacity and lower cost at lower levels. We classify memory based on its "distance" from the processor, with distance
  • 10. MT-12-II 10 measured by the number of machine cycles required for access. The closer memory is to the processor, the faster it should be. As memory gets further from the main processor, we can afford longer access times. Thus, slower technologies are used for these memories, and faster technologies are used for memories closer to the CPU. The better the technology, the faster and more expensive the memory becomes. Thus, faster memories tend to be smaller than slower ones, due to cost. Memory hierarchy refers to a CPU-centric latency (delay)—the primary criterion for designing a placement in storage in a memory hierarchy—that fits the storage device into the design considerations concerning the operators of the computer. It is used only incidentally in operations, artifactually. It's primary use is in thinking about an abstract machines. The levels of memory in a computer (Hyde, 2008). From fastest to slowest speed, they are: 1. CPU registers 2. L1 cache 3. L2 cache 4. Main memory 5. Virtual memory
  • 11. 6. Disk FigureFigureFigureFigure 2222 Levels of Memory At the top level of the memory hierarchy are the CPU's general purpose registers. The registers provide the fastest access to data possible on the 80x86 CPU. The register file is also the smallest memory object in the memory hierarchy (with just eight general purpose registers available). By virtue of the fact that it is virtually impossible to add more registers to the 80x86, registers are also the most expensive memory locations. Note that we can include FPU, MMX, SIMD, and other CPU registers in this cla the fact that there are a very limited number of registers and the cost per byte is quite high (figuring the cost of the CPU divided by the number of bytes of register available). 11 Levels of Memory (Hyde, 2008) At the top level of the memory hierarchy are the CPU's general purpose registers. The registers provide the fastest access to data possible on the 80x86 CPU. The register file is also the smallest memory object in the memory hierarchy (with just ral purpose registers available). By virtue of the fact that it is virtually impossible to add more registers to the 80x86, registers are also the most expensive memory locations. Note that we can include FPU, MMX, SIMD, and other CPU registers in this class as well. These additional registers do not change the fact that there are a very limited number of registers and the cost per byte is quite high (figuring the cost of the CPU divided by the number of bytes of register MT-12-II At the top level of the memory hierarchy are the CPU's general purpose registers. The registers provide the fastest access to data possible on the 80x86 CPU. The register file is also the smallest memory object in the memory hierarchy (with just ral purpose registers available). By virtue of the fact that it is virtually impossible to add more registers to the 80x86, registers are also the most expensive memory locations. Note that we can include FPU, MMX, SIMD, and ss as well. These additional registers do not change the fact that there are a very limited number of registers and the cost per byte is quite high (figuring the cost of the CPU divided by the number of bytes of register
  • 12. MT-12-II 12 Working our way down, the Level One Cache system is the next highest performance subsystem in the memory hierarchy. On the 80x86 CPUs, the Level One Cache is provided on-chip by Intel and cannot be expanded. The size is usually quite small (typically between 4Kbytes and 32Kbytes), though much larger than the registers available on the CPU chip. Although the Level One Cache size is fixed on the CPU and you cannot expand it, the cost per byte of cache memory is much lower than that of the registers because the cache contains far more storage than is available in all the combined registers. The Level Two Cache is present on some CPUs, on other CPUs it is the system designer's task to incorporate this cache (if it is present at all). For example, most Pentium II, III, and IV CPUs have a level two cache as part of the CPU package, but many of Intel's Celeron chips do not1. The Level Two Cache is generally much larger than the level one cache (e.g., 256 or 512KBytes versus 16 Kilobytes). On CPUs where Intel includes the Level Two Cache as part of the CPU package, the cache is not expandable. It is still lower cost than the Level One Cache because we amortize the cost of the CPU across all the bytes in the Level Two Cache. On systems where the Level Two Cache is external, many system designers let the end user select the cache size and upgrade the size. For economic reasons, external caches are actually more expensive than caches that are part of the CPU
  • 13. MT-12-II 13 package, but the cost per bit at the transistor level is still equivalent to the in- package caches. Below the Level Two Cache system in the memory hierarchy falls the main memory subsystem. This is the general-purpose, relatively low-cost memory found in most computer systems. Typically, this is DRAM or some similar inexpensive memory technology. Below main memory is the NUMA category. NUMA, which stands for NonUniform Memory Access is a bit of a misnomer here. NUMA means that different types of memory have different access times. Therefore, the term NUMA is fairly descriptive of the entire memory hierarchy. In Fig.2, however, we'll use the term NUMA to describe blocks of memory that are electronically similar to main memory but for one reason or another operate significantly slower than main memory. A good example is the memory on a video display card. Access to memory on video display cards is often much slower than access to main memory. Other peripheral devices that provide a block of shared memory between the CPU and the peripheral probably have similar access times as this video card example. Another example of NUMA includes certain slower memory technologies like Flash Memory that have significant slower access and transfers times than standard semiconductor RAM. We'll use the term NUMA in this chapter
  • 14. MT-12-II 14 to describe these blocks of memory that look like main memory but run at slower speeds. Most modern computer systems implement a Virtual Memory scheme that lets them simulate main memory using storage on a disk drive. While disks are significantly slower than main memory, the cost per bit is also significantly lower. Therefore, it is far less expensive (by three orders of magnitude) to keep some data on magnetic storage rather than in main memory. A Virtual Memory subsystem is responsible for transparently copying data between the disk and main memory as needed by a program. File Storage also uses disk media to store program data. However, it is the program's responsibility to store and retrieve file data. In many instances, this is a bit slower than using Virtual Memory, hence the lower position in the memory hierarchy. Below File Storage in the memory hierarchy comes Network Storage. At this level a program is keeping data on a different system that connects the program's system via a network. With Network Storage you can implement Virtual Memory, File Storage, and a system known as Distributed Shared Memory (where processes running on different computer systems share data in a common block
  • 15. MT-12-II 15 of memory and communicate changes to that block across the network). Virtual Memory, File Storage, and Network Storage are examples of so-called on- line memory subsystems. Memory access via these mechanism is slower than main memory access, but when a program requests data from one of these memory devices, the device is ready and able to respond to the request as quickly as is physically possible. This is not true for the remaining levels in the memory hierarchy. The Near-Line and Off-Line Storage subsystems are not immediately ready to respond to a program's request for data. An Off-Line Storage system keeps its data in electronic form (usually magnetic or optical) but on media that is not (necessarily) connected to the computer system while the program that needs the data is running. Examples of Off-Line Storage include magnetic tapes, disk cartridges, optical disks, and floppy diskettes. When a program needs data from an off-line medium, the program must stop and wait for a someone or something to mount the appropriate media on the computer system. This delay can be quite long (perhaps the computer operator decided to take a coffee break?). Near-Line Storage uses the same media as Off-Line Storage, the difference is that the system holds the media in a special robotic jukebox device that can automatically mount the desired media when some program requests it. Tapes and removable
  • 16. MT-12-II 16 media are among the most inexpensive electronic data storage formats available. Hence, these media are great for storing large amounts of data for long time periods. Hard Copy storage is simply a print-out (in one form or another) of some data. If a program requests some data and that data is present only in hard copy form, someone will have to manually enter the data into the computer. Paper (or other hard copy media) is probably the least expensive form of memory, at least for certain data types. Evaluator’s Comments if any: Question 2Question 2Question 2Question 2 Explain the different Flynn’s Taxonomy of computer architecture Answer 2Answer 2Answer 2Answer 2 Over the years, several attempts have been made to find a satisfactory way to categorize computer architectures. Although none of them are perfect, today's
  • 17. MT-12-II 17 most widely accepted taxonomy is the one proposed by Michael Flynn in 1972. Flynn's taxonomy considers two factors: the number of instructions and the number of data streams that flow into the processor. A machine can have either one or multiple streams of data, and can have either one or multiple processors working on this data. This gives us four possible combinations: SISD (single instruction stream, single data stream), SIMD (single instruction stream, multiple data streams), MISD (multiple instruction streams, single data stream), and MIMD (multiple instruction streams, multiple data streams). (Anonymous, Flynn's_taxonomy, 2009) SingleSingleSingleSingle InstructionInstructionInstructionInstruction MultipleMultipleMultipleMultiple InstructionInstructionInstructionInstruction SingleSingleSingleSingle DataDataDataData SISD MISD MultipleMultipleMultipleMultiple DataDataDataData SIMD MIMD FigureFigureFigureFigure 3333 Computer classifications defined by Flynn (Anonymous, Flynn's_taxonomy, 2009) The four classifications defined by Flynn are based upon the number of concurrent instruction (or control) and data streams available in the architecture:
  • 18. MT-12-II 18 Single Instruction, Single Data stream (SISD) A sequential computer which exploits no parallelism in either the instruction or data streams. Examples of SISD architecture are the traditional uniprocessor machines like a PC or old mainframes. Single Instruction, Multiple Data streams (SIMD) A computer which exploits multiple data streams against a single instruction stream to perform operations which may be naturally parallelized. For example, an array processor or GPU. Multiple Instruction, Single Data stream (MISD) Multiple instructions operate on a single data stream. Uncommon architecture which is generally used for fault tolerance. Heterogeneous systems operate on the same data stream and must agree on the result. Examples include the Space Shuttle flight control computer. Multiple Instruction, Multiple Data streams (MIMD) Multiple autonomous processors simultaneously executing different instructions on different data. Distributed systems are generally recognized to be MIMD architectures; either exploiting a single shared memory space or a distributed memory space.
  • 19. Visually, these four architectures are shown below where each "PU" is a processing unit: SISDSISDSISDSISD SIMDSIMDSIMDSIMD FigureFigureFigureFigure 4444 Pictorials of 2009) At a level above where Flynn begins his taxonomy, we need to add one more characteristic, and that is whether the architecture is instruction driven or data driven. The classic von Neumann architecture is instruction driven. All processor activities are de instructions act on the data. Data driven, or opposite. The characteristics of the data determine the sequence of processor 19 Visually, these four architectures are shown below where each "PU" is a SISDSISDSISDSISD MISDMISDMISDMISD SIMDSIMDSIMDSIMD MIMDMIMDMIMDMIMD Pictorials of Flynn’s Taxonomy (Anonymous, Flynn's_taxonomy, At a level above where Flynn begins his taxonomy, we need to add one more characteristic, and that is whether the architecture is instruction driven or data driven. The classic von Neumann architecture is instruction driven. All processor activities are determined by a sequence of program code. Program the data. Data driven, or dataflow, architectures do just the opposite. The characteristics of the data determine the sequence of processor MT-12-II Visually, these four architectures are shown below where each "PU" is a (Anonymous, Flynn's_taxonomy, At a level above where Flynn begins his taxonomy, we need to add one more characteristic, and that is whether the architecture is instruction driven or data driven. The classic von Neumann architecture is instruction driven. All termined by a sequence of program code. Program , architectures do just the opposite. The characteristics of the data determine the sequence of processor
  • 20. MT-12-II 20 events. With the addition of dataflow computers and some refinements to the MIMD classification, we obtain the taxonomy shown below . FigureFigureFigureFigure 5555 Refined Flynn's taxonomy Evaluator’s Comments if any:
  • 21. MT-12-II 21 Bibliography Anonymous. (2009). Flynn's_taxonomy. Retrieved 2009, from Wikipedia: http://en.wikipedia.org/wiki/Flynn's_taxonomy Hyde, R. (2008). Chapter Six Memory Architecture . Retrieved from Art of Assembly Language by Webster: http://webster.cs.ucr.edu/AoA/Windows/HTML/MemoryArchitecture.html