CUSTOMER_CODE SMUDE DIVISION_CODE SMUDE EVENT_CODE SMUAPR15 ASSESSMENT_CODE MCA2050_SMUAPR15 QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 17524 QUESTION_TEXT Explain the different types of addressing modes. a.Implied mode b.Immediate mode c.Register mode d.Register Indirect mode e.Auto-increment or Auto-decrement mode SCHEME OF EVALUATION f.Direct addressing mode g.Indirect addressing mode h.Relative address mode i.Indexed Addressing mode j.Base Register addressing mode QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 17526 QUESTION_TEXT Explain First generation to Fifth generation computer. SCHEME OF EVALUATION 1. First generation computer: The first generation of computer ( 1946-1954) was marked by the use of vacuum tubes or values as their basic electronic component. They were very large in size. They consumed too much power and generated too much heat, when used for even short duration of time. Some example of first generation computers are ENIAC, EDVAC, EDSAC, UNIVAC-I 2. Second Generation computers: The second generation of computers (1953-64) was marked by the use of transistors in place of vacuum tubes. The second – generation computers were smaller in size and generated less heat than first generation computers. Although they were slightly faster and more reliable than earlier computer. They also had many disadvantages. They had limited storage capacity, consumed more power and were also relatively slow in performance. Some examples of second generation computers are IBM 701, and IBM 650. 3. Third Generation Computer: The third generation of computer (1964-1978) was marked by use of Integrated Circuits(IC) in place of transistors. As hundred of transistors could be put on a single small circuit, so IC were more compact than transistors. The third generation computers were even smaller in size, very less heat generated and required very less power as compared to earlier two generation of computers. These computers required less human labour at the assembly stage. Some examples of third generation computers are IBM 360, PDP-8, Cray -1 and VAX. 4. Fourth Generation Computers: The fourth generation of computers(1978-till date) was marked by use of large-scale Integrated (LSI) circuits in place of ICs. LSI circuits are still more compact than ICs. In 1978, it was found that millions of components could be packed onto a single circuit, known as Very Large Scale Integration(VLSI). VLSI is the latest technology of computer that led to the development of the popular Personal Computer(PCs) also called as Microcomputers.Example of fourth generation computers are IBM PC, IBM PC/AT, 386, 486, Pentium and CRAY-2 5. Fifth Generation Computer: The fifth generation computers are still under research and development stage. These computers would have artificial intelligence. They will use USLI chips in place of VLSI chips. One USLI chip contains millions of components on a single IC. Robots have some features of fifth generation computers. QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 73360 QUESTION_TEXT What is Dynamic Scheduling with a scoreboard. Explain the four steps in the scoreboard technique. SCHEME OF EVALUATION Dynamic Scheduling with a ScoreboardIn a dynamically scheduled pipeline, all instructions pass through the issuestage in order (inorder issue); however, they can be stalled or bypass eachother in the second stage (read operands) and thus enter execution out oforder. Score board is a method of permitting out-of-order instructionexecution when sufficient resources are available and there are no datadependencies.(2 Marks) Four steps in the scoreboard technique. 1. Issue: Issue step is used as a replacement of a part of ID step of DLXpipeline. In this step the instruction is forwarded to FU. The internal dataconstruction is also modified here. It is done only in two situations: FU for the instruction is jobless. No other active instruction has the same register as destination. Thisensures that the operation is free from WAW (Write after Write) datahazard. When any structural or WAW hazards are detected, the stall occurs andthe issue of all subsequent instructions is stopped until these datahazards have been corrected. when a stall occurs in this stage, thebuffer between instruction issue and fetch is filled. If buffer contains asingle instruction then the instruction fetch also stalls at once but if thebuffer space contains a queue, it creates stalls only after the bufferqueue is fully filled. 2. Read operands: The scoreboard examines if the source operands isavailable or not. The source operand is said to be available when nopreviously issue active instruction is ready to write to it. The scoreboard prompts the FU to start reading the operands from data registers and start execution as soon as the source operands become available. Read after Write (RAW) hazards are resolved in a dynamic manner during thisstage. It may also send instructions for out-of-order execution. Issue and read operand step together completes the functions of the ID step ofDLX pipeline. 3. Execution: After receiving the operands, the FU starts execution. Oncompletion of execution, the result is generated. Thereafter FU informsthe scoreboard about the completion of execution step. execution step isused in place of EX step of DLX pipeline but in latter it may involve multiple cycles. 4. Write result: after the FU completes execution, the scoreboard detects whether the WAR hazards are present or not. If the WAR hazard is detected, it stalls the instruction. WAR hazard occurs when there is an instruction code as in our earlier example of ADDD & SUBD where bothutilize F8.(2 Marks each ) QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 73363 QUESTION_TEXT Describe components of a vector register processor. SCHEME OF EVALUATION 1. Vector registers: there are many vector registers that can perform different vector operations in an overlapped manner. Every vector register is affixed –length bank that consists of one vector with multiple elements and each element is 64-bit in length 2. Scalar registers the scalar registers are also linked to the functional units with the help pf the pair of crossbars. They are used for various purposes such as computing addresses for passing to the vector load/store unit and as buffer for input data to the vector registers. 3. Vector functional units these units are generally floating –points units that are completely pipelined, they are able to initiate a new operation on each clock cycle. They comprise all operation units that are utilized by the vector instruction 4. Vector load and store unit This unit can also be pipelined and perform an overlapped but independent transfer to or from the vector registers 5. Control unit this unit decodes and coordinates among functional units. It can detect data hazards as well as structural hazards. Data hazards are the conflicts in register accesses while functional hazards are the conflicts in functional units. ( 5x2=10 marks) QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 125202 QUESTION_TEXT What you mean by RAID? Explain different RAID levels RAID 1, RAID 3, RAID 5. RAID is the acronym for ‘redundant array of inexpensive disks’. There are several approaches to redundancy that have different overhead and performance. The Patterson, Gibson, and Katz 1987 paper introduced the term RAID. (1 mark) RAID 1 Mirroring or shadowing is the traditional solution to disk failure. It uses twice as many disks. Data is simultaneously written on two disks, one non-redundant and one redundant disk so that there are two copies of the data. The system goes to the mirror disk in case one disk fails to get the required information. This technique is the most expensive solution…. (3 marks) RAID 3 SCHEME OF EVALUATION Bit-Interleaved parity is an error detection technique where character bit patterns are forced into parity so the total number of one(1) bit is always odd or even. This is done by adding a “1” or “0” bit to each byte as the character/byte is transmitted. At the other end of the transmission the parity is checked for accuracy. BIP is also a method used at the physical layer (high speed transmission of binary data) level to monitor errors…… (3 marks) RAID 5 This level uses the same ratio of disks (data disks and check disks) as RAID 3, but data is accessed differently. In the prior organisation every access went to all disks. Some applications would prefer to do smaller accesses, allowing independent accesses to occur in parallel. That is the purpose of this next RAID level….. (3 marks) QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 125205 QUESTION_TEXT Explain the features of Fine-Grained SIMD Architecture. How MPP algorithm operates? SCHEME OF EVALUATION The features of fine-grained architecture: Complexity is minimal and the degree of autonomy is lowest feasible in each Processing Element (PE). Economic constraints are applicable on the maximum number of PEs provided. It is assumed by the programming model that there is equivalence between the number of PEs and the number of data items, and hides any mismatch as far as possible. The 4-connected nearest neighbour mesh is used as the basic interconnection method. A simple extension of a sequential language with parallel-data additions is the usual programming language (5 Marks) The MPP algorithm operates as follows: For each pixel in one of the images (the reference image) a local neighbourhood area is defined. This is correlated with the similar area surrounding each of the candidate match pixels in the second image. The measure applied is the normalised mean and variance cross correlation function. The candidate yielding the highest correlation is considered to be the best match, and the locations of the pixels in the two images are compared to produce the disparity value at that point of the reference image. The algorithm is iterative. It begins at low resolution, that is, with large areas of correlation around each of a few pixels. When the first pass is complete, the test image is geometrically warped according to the disparity map. The process is then repeated with a higher resolution (usually reducing the correlation area. and increasing the number of computed matches, by a factor of two), a new disparity map is calculated and a new warping applied, and so on. The procedure is continued either for a predetermined number of passes or until some quality criterion is exceeded. (5 Marks)