CUSTOMER_CODE SMUDE DIVISION_CODE SMUDE

advertisement
CUSTOMER_CODE
SMUDE
DIVISION_CODE
SMUDE
EVENT_CODE
OCTOBER15
ASSESSMENT_CODE MCA2050_OCTOBER15
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
17527
QUESTION_TEXT
What is embedded system? Give one example for embedded system.
Explain characteristics of embedded computers.
An embedded computer is a computer system designed to perform a
particular unction or task. It is embedded as component of a bigger
complete device. Embedded system contain microcontroller dedicated to
complete device.
Microwave, washing machines, air conditioners, printers are examples of
embedded systems.
SCHEME OF
EVALUATION
Characteristics of embedded computers:
1. Real-time performance: The performance requisite in a embedded
application is real – time execution. Speed though in varying degrees, is
an important factor in all architectures. The ability to assure real-time
performance acts as a constraint on the speed needs of the system. Realtime performance means that the agent is assured to perform within
certain time restraints as specified by the task and the environment.
2. Soft real – time: In a number of applications, a more advanced
requisite exists: the standard time for a particular job is constrained and
the number of occurrences when the maximum time is exceeded. Such
techniques are occasionally called soft real – time and they occur when it
is possible to sometimes miss the time limitation on an incident,
provided that not plenty of them are missed.
3. Need to minimize memory size: Memory can be a considerable
element of the system cost. Thus, it is vital to limit the memory size
according to the requirement.
4. Need to minimize memory power: Larger memory also means high
power need. Emphasis on low power is made by the use of batteries.
Unnecessary usage of power needs to be avoided to keep the power need
low.
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
17528
QUESTION_TEXT
Write any 10 features of MIPS architecture.
SCHEME OF
EVALUATION
1.It has a five-stage execution pipeline: fetch, decode, execute,
memory access, writeresult.
2.It has a regular instruction set where all instruction are 32 bit
3.There are three – operand arithmetical and logical instruction
4.It consists of 32 general-purpose registers of 32-bits each.
5.There are no status register or instruction side-effects
6.There are no complex instructions
7.It has optional coprocessors for system management and floating –
point
8.It consists of only the load and store instruction access memory.
9.It has a flat address space of 4 Gigabyte of main memory
10.The Memory-management unit maps virtual to actual physical
addresses
11.Optimizing C compiler replaces hand – written assembly code.
12.Its software tool chain knows about hardware and generates
correct code.
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
73361
QUESTION_TEXT
What is Branch prediction. Explain the Different strategies of branch
prediction
SCHEME OF
EVALUATION
Branch prediction is a method which is basically utilised for handling the
problems related to branch. (1 Mark)
Different strategies of branch prediction include:
1 Fixed branch prediction
In fixed branch prediction, prediction is considered to be fixed. This
approach of branch prediction is easy to implement. This approach
presumes either of the following:
branch is never taken
or
branch is always taken
2 Static branch prediction
Till now it is understood that instead of using a fixed approach,
theperformance can be improved by making use of an approach which
is relianton the type of branch. This type of approach is known as the
static branchprediction. This approach makes use of instruction opcode
for predictingwhether the branch is taken. This approach provides high
prediction correctness. To illustrate this, let us show sample data for
industrial environments. In these types of environments, the prediction
of branche sand loops from all branch-type operations are discussed
below:
branches are about 70%,
loops are about10%
remaining operations include procedure calls/returns
3 Dynamic branch prediction
For making more accurate predictions, this approach considers run-time
history. Here the n branch executions of history are considered and this
information is used for predicting the next one. The experiential study
done by Smith and Lee proposes that this approach provides major
enhancement in prediction accuracy.
(3 Marks each)
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
73364
i. Write a short notes on available design alternatives for a shared
memory processor
QUESTION_TEXT
ii.
SCHEME OF
EVALUATION
Write any four features of shared memory organization
i.
1. No physical sharing: In this memory system organization, every
processor or a node that consists of more than one processor has its
own private main memory. It can access remote memory connected to
other nodes through interconnection network. This architecture is known
as the non-uniform memory access architecture.
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
125203
QUESTION_TEXT
Explain Flynn classification of the computer system.
1.
Single instruction Single Data.
2.
Single instruction Multiple Data.
SCHEME OF EVALUATION 3.
Multiple instruction Single Data.
4.
Multiple instruction Multiple Data
(2.5 marks for each)
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
125204
QUESTION_TEXT
Explain Direct Mapping and Associative Mapping. What are the main
Elements of Cache Design
Direct mapping
Associative memories are very costly as compared to RAM due to the
additional logic association with all cells. Generally there are 2j words in
main memory and 2k words in cache memory. The j-bit memory
address is separated by 2 fields. k bits are used for index field. j-k bits
are long-fields. The direct mapping cache organization utilizes k-bit
indexes to access the cache memory and j-bit address for main
memory. Cache words contain data and related tags. Every memory
block is assigned to a particular line of cache in direct mapping. But if a
line already contains memory block when new block is to be added then
the old memory block is removed
Associative mapping
SCHEME OF
EVALUATION
Associative mapping is used in cache organization which is the quickest
and most supple organization. Addresses of the word and content of
the words are stored in associative memory. It means cache can store
any word in main memory.
(2 Marks each)
Main elements of Cache design are:
1. Cache Size: The size of cache should be small enough to bring overall
cost per bit closer to the main memory. On the contrary, the size must
be large enough, so that the cache and overall access time be
somewhat equal. Mostly large caches are slow than smaller ones
because if the cache is large then there are numerous gates are
concerned in addressing the cache which makes it slow
2. Mapping Function: The two types of mapping—Direct Mapping and
Associative Mapping
3. Replacement Algorithm: LRU (Least recently Used), FIFO (First-in,
First-out), LFU (Least Frequently Used) or some Random one i.e. simple
to build in hardware.
4. Write Policy: Write Through, Write Back or Write Once.
5. Line Size: Optimum size depends on workload.
6. Number of Caches: Single or two levels and Unified or split.
(1 Mark each)
Download