Advanced Computer Arc.
Advanced Computer Arc.
Published by :
Think Tanks
ISBN: 978-93-82801-79-5
Edition : 2011
Price :
    While every effort is taken to avoid errors or omissions in this Publication, any mistake or
    omission that may have crept in is not intentional. It may be taken note of that neither the
    publisher nor the author will be responsible for any damage or loss of any kind arising to
    anyone in any manner on account of such errors and omissions.
Preface
I am glad to present this book, especially designed to serve the needs of the
students. The book has been written keeping in mind the general weakness in
understanding the fundamental concepts of the topics. The book is self-explanatory and
adopts the “Teach Yourself” style. It is based on question-answer pattern. The language of
book is quite easy and understandable based on scientific approach.
      Any further improvement in the contents of the book by making corrections, omission
and inclusion is keen to be achieved based on suggestions from the readers for which the
author shall be obliged.
      I acknowledge special thanks to Mr. Rajeev Biyani, Chairman & Dr. Sanjay Biyani,
Director (Acad.) Biyani Group of Colleges, who are the backbones and main concept
provider and also have been constant source of motivation throughout this Endeavour. They
played an active role in coordinating the various stages of this Endeavour and spearheaded
the publishing work.
                                                                                      Author
4
                             Syllabus
                            B.C.A. Part-III
            Advanced Computer Architecture
Content
                                    Chapter 1
               Parallel Computer Models
      can be alienated into three units and the operands diverted to each unit under
      the supervision of control unit.
      Singe Instruction stream – Single Data Stream (SISD)
                                          IS
                                IS               DS
                      CU                PU                MM
                                            DS1
                                    PU1               MM1
                                            DS2
                                    PU2               MM2
                     CU
                                            DSn
                                    PUn               MMn
IS
       IS1                  IS1
                    CU1            PU1
       IS2                  IS2
                    CU2            PU2
                                                MM1     MM2     MMn
         IS3                ISn            DS
                    CUn            PUn
                     ISn           DSn
             CUn            PUn           MMn
                      ISn
                            IS2
                                   IS1
        Computer Generations
        Over the past five decades, electronic computers have gone through fine
        generations of development. Each of first three generations lasted about 10
        years. The fourth generations covered a time span of 15 years. We have just
        entered the fifth generations with the use of processors & memory devices
        with more than 1 million transistors on solo silicon chip. The table shows the
        new hardware and software features introduced with each generation. Most
        features introduced in earlier generations have been passed to later
        generations.
        In other words, the latest generation computers have inherited all the bad
        ones found in previous generations.
Advanced Computer Arc.                                                                   13
     Conditions of Parallelism :
     1. Data and resource dependencies : A program is made up of several part,
     so the ability of executing several program segment in parallel requires that
     each segment should be independent other segment. Dependencies in various
     segment of a program may be in various form like resource dependency,
     control depending & data depending. Dependence graph is used to describe
     the relation. Program statements are represented by nodes and the directed
     edge with different labels shows the ordered relation among the statements.
     After analyzing dependence graph, it can be shown that where opportunity
     exist for parallelization & vectorization.
     Data Dependencies: Relation between statements is shown by data
     dependences. There are 5 types of data dependencies given below:
     (a) Antidependency: A statement S2 is antidependent on statement ST1 if ST2
     follows ST1 in order and if the output of ST2 overlap the input to ST1 .
     (b) Input dependence: Read & write are input statement input dependence
     occur not because of same variables involved put because of same file is
     referenced by both input statements.
     (c) Unknown dependence: The dependence relation between two statement
     cannot be found in following situation
      The subscript of variable is itself subscribed.
      The subscript does not have the loop index variable.
      Subscript is non linear in the loop index variable.
     (d) Output dependence: Two statements are output dependence if they
     produce the same output variable.
     (e) Flow dependence: The statement ST2 is flow dependent if an statement
     ST1 , if an expression path exists from ST1 to ST2 and at least are output of ST,
     feeds in an input to ST2 .
     2. Bernstein’s condition : Bernstein discovered a set of conditions depending
     on which two process can execute in parallel. A process is a program that is in
     execution. Process is an active entity. Actually it is an stumbling block of a
     program fragment defined at various processing levels. I i is the input set of
     process Pi which is set of all input variables needed to execute the process
     similarly the output set of consist of all output variable generated after
     execution of all process P i. Input variables are actually the operands which
     are fetched from the memory or registers. Output variables are the result to
     be stored in working registers or memory locations.
Advanced Computer Arc.                                                                      15
       that MIMD execution mode. But here major efforts are requisite by the
       programmer to reorganize a program at this level.
       4. Subprogram Level : Subprogram level communicate to job steps and
       related subprograms. Grain size here have less than 1000 instructions. Job
       steps can overlap across diverse jobs. Multiprogramming an uniprocessor or
       multiprocessor is conducted at this level.
       5. Job Level : It corresponds to parallel executions of independent tasks on
       parallel computer. Grain size here can be tens of thousands of instructions. It
       is handled by program loader and by operating system. Time sharing & space
       sharing multiprocessors explores this level of parallelism.
                                   Instructions                          Vector
                                                                         func. pipe
               Scalar       Main
                                                    Vector
               data         menory
                                                    registers
                                                                         Vector
                                                                         function pipe
               Mass                 Host
               storage              computer
1. UMA Model:
                                               Processor
                     P1              P2                           Pn
                                    System Interconnect
                            (Bus, Crossbar, Multistage network)
     In this model the physical memory is uniformly shared by all the processors.
     All processors have equal access time to all memory words, which is why it is
     called uniform memory access. Each processor may use a private cache.
     Peripherals are also shared.
     Multiprocessors are called tightly coupled systems for its high degree of
     resource sharing.
     UMA model is suitable for time sharing applications by multiple users. It can
     be used to speed up the execution of single large program in time critical
     application.When all processors have equal access to all peripheral devices,
     the system is called a symmetric multiprocessor. In this case, all the
     processors are equally capable of running programme, such as kernel.
     In an asymmetric multiprocessor, only one or subset of processors are
     executive capable. An executive or master processor can execute the
     operating system and handle I/O. The remaining processors called attached
     processors (AP) runs user code under the supervision of master processor.
Advanced Computer Arc.                                                                    19
LM1 P1
                                                    Inter
                                                  Connection
                           LM2          P2         Network
LMn Pn
               P1            CSM                              P1    C   CSM
                        C
               P2            CSM                               P2       CSM
                        I                                           I
                        N                                           N
               Pn            CSM                              Pn        CSM
D D D
C C C
                    P                        P                          P
Advanced Computer Arc.                                                                21
                                  M       M                   M
                                  P          P                 P
                M    P                                             M   P
                                      Message passing inter-
                                       connection network
                                         (mesh, ring etc.)
                M    P                                             M   P
                              M          M                M
                              P          P                P
       All local memories are private & accessible only by local processors. This
       network presents point-to-point static connection among nodes. Inter node
       communication is carried out by passing messages through the static
       connection network.
      (3) I is set of instructions broadcast by CPU to all PEs for parallel execution.
      These include arithmetic, logic, data routing, masking and other local
      operations executed by each active PE over data within that PE.
      (4) M is the set of masking schemes, where each mask partitions the set of PEs
      into enabled & disabled subsets.
      (5) R is the set of data routing functions, specifying various patterns to be set
      up in the inter connection network for inter PE communications.
                                NYU/
                                Ultra Computer
BBN Butterfly
CUBE – 2/6400
             CDC 7600
                                              Cray Y- mp       Cray/m PP
                               Cray 1
      The CDC 7600 was first vector dual processor system. There are 2 subtracks
      derived from CDC-7600. The latest cray/mpp is a massively parallel system
      with distributed shared memory.
24
                    Illiac IV
                                                   Mas Par MP1
                                     BSP
                                               IBM GF/11
Tera
Mamchester
arrangement I
                                                     I/O
                                                     Data & Instruction
                                          CU
                      Data bus           Memory
                                          CU
                     PE   0
                                        PE   1                             PEN
                     PEM      0
                                        PEM      1                         PEM   n
                                                                          Control
                                   Interconnection Network
arrangement II
I/O
                                   CU Memory
                                                      Control
                                      CU
Alignment Network
M0 M1 Mn-1
                             arrangement II (BSP)
     Main differences in arrangement I and II is in 2 aspects. First the local
     memories are attached to the PEs are replaced by parallel memory module
     shared by all the PEs through an alignment network. Second, inter PE
     network is replace by the inter PE memory alignment network, which is
     controlled by CU.
     Example of configuration II is Burrough Scientific processor (BSP). There are
     N PEs and P memory modules in configuration II. These two numbers (N and
     P) are not equal and are relatively prime. The alignment network is a path
     switching network between PEs and parallel memories.
Advanced Computer Arc.                                                                     27
                                    Chapter 2
       Program Partitioning or Scheduling
                                         x
                            Local Path
                                              Token                 Program
                                              Match                 memory
                                                                    Compute
                                                                      Tag
                      1-Structure
ALU
Form Token
       the memory. The time required for two processes to synchronize with each
       other is called synchronization latency; computational granularity and
       communication latency are closely related.
Q.4.   How can we partition a program into parallel branches, program modules,
       microtasks or grains to yield the shortest possible execution time?
Ans. There exists a tradeoff among parallelism and scheduling overheads. The
     time complexity entail both computation and communication overheads. The
     program partitioning entail the algorithm designer, programmer, compiler,
     operating system support etc.
       The concept of grain packing is to apply five grain first in order to achieve a
       higher degree of parallelism. Then one combines multiple fine grain nodes
       into a coarse grain node if it can remove redundant communications delays
       or lessen the overall scheduling overhead.
       Usually, all five grain operations within a single coarse, grain node are given
       to some processor for execution. Fine grain partition of a program often
       demands more inter processor communication than that required in a coarse
       grain partition. Thus grain pickings‘ offers a tradeoff between parallelism and
       scheduling. Internal delays amid fine grain operations within the same coarse
       grain node are negligible because the communication delay is given chiefly
       by inter processor delays rather than by delays within the same processor.
       The selection of optimal grain size is meant to get the shortest schedule for
       the nodes on a parallel system.
                                                                                  ppp
Advanced Computer Arc.                                                                   31
                                   Chapter 3
        System Interconnect Architecture
       The diameter D of a network is the maximum shortest path amid any two
       nodes. The path length is measured by the number of links visited. The
       network diameter show the maximum number of distinct hops amid any two
       nodes, thus giving a figure of communication pros for the network. thus, the
       network diameter should be as small as doable from communication point of
       view.
Q.3.   What is Data routing functions? Describe some data routing functions?
Ans. Data routing networks is used for inter PE data exchange. Data routing
     network can be static or dynamic. In multicomputer network data routing is
     achieved by message among multiple computer nodes. Routing network
     reduces the time required for data exchange and thus system performance is
     enhanced. Commonly used data routing functions are shifting, rotation,
     permutations, broadcast, multicast, personalized communication, shuffle etc.
       Some Data routing functions are described below:
       (a) Permutations: Let there are n objects, and then there are nf permutations
       by which n objects can be recorded. Set of all permutations form a
       permutation group with respect to composition operation. Generally cycle
       notation is used to specify permutation function. Cross can be used to
       implement the permutation. Multi stage network can implement some of the
       permutations in one or multiple passes through the network. Shifting and
       broadcast operation are also used to implement permutation operation.
       Permutation capability of a network is used to indicate the data routing
       capacity. Permutation speed dominates the performance of data routing
       network, when n is large.
       (b) Hypercube routing function: Three dimensional cube is shown below:
       Routing functions are defined by three bits in the node address. Bit order is
       C2 C1 Co. Data can be exchanged among adjacent nodes which differs in the
       least significant bit Co as shown below.
                              7     6     5     4
                              0     0     0     0
                              8     9     10    11
                              0     0     0     0
                              15    14    13    12
                              0     0     0     0
                                                                          12
                                                                  11      O      0
                          O                                        O            O
                                                         10
               O                                              O
                                        O                                               O1
                                                    9O
                                                                                            O2
           O              O                 O       8O
O3
                O                                     O
                                        O            7
                          O                                                            O
                                                                  O                     4
                                                                  6          O
                    Star topology                                            5
                                                                       Ring topology
      Systolic array: For implementing fixed algorithm this type of pipelined array
      architecture    is   used.  Figure    of systolic array        topology is
      shown:
O O
O O O
O O
O O
O O
O O
O O
                                       3- Cube
       A 4- cube is made by interconnecting the corresponding nodes of
       two 3-cubes. Node degree of n-cube is equal to n and so does the
       network diameter. Nodes degree increases linearly with respect to the
       dimensions, thus making hypercube difficult to use as a scalable architecture.
       Cube-Connected Cycles
       Improved architecture of hypercube is the cube connected cycles. 3- Cubes
       are customized to form 3-cube connected cycles (CCC).
       Thus, K-cube connected cycle can be made from the L-cube with n = 2x cycles
       nodes. Each vertex of K-dimensional hyper cube is replaced by a ring of K-
       nodes thus a k- cube is translated into a K-CCC with K x 2K nodes.
                              IS                  IS
                  o                                             o
                              O                   O
                  1           IS                  IS
                              1                   1             1
                                                  IS
                N-1           IS                               N-1
                                                  N-1
                              N-1
                    a0                                    b0
                                     Switch box
                    a1                                    b1
a0 > b0
a1 > b1
a0 b0
a1 b1
a0 b0
a1 b1
a0 b0
a1 b1
                                      Chapter 4
       Processors and Memory Hierarchy
10. Use of control memory     Control memory is employed. No use of control memory.
11. Cache memory              Unified cache memory      Splited cache is employed.
                              is employed.
12. Clock rate                35-50MHz                  50-150 MHz
       It involves highly multipored register files. Their input parts are required for
       each EU.
Multiple instruction
EU EU EU
                   Instruction/Data
                                                    Register file
                   Data
              EU : Execution unit
           Main
                                         Register file
           memory
                        Load/         F.P.
                                                     Integer   Branch
                        store         add
                                                     ALU       unit
                        unit          unit
                                VLIW processor
     VLIW processor expect dependency free code i.e. multi operation code. VLIW
     processors are statically programmed. VLIW notion is taken from horizontal
     micro coding. Different fields of the long instruction word carry the opcodes
     to be send off to different functional units.
Advanced Computer Arc.                                                                               43
  Cache               Fetch
  memory              unit
                                           Single multi operation interuction
EU EU EU EU
Register file
Q.5. What is Virtual memory? In how many classes virtual memory system is
      categorized?
Ans    Virtual memory is a notion used in some large system, that permits user to
       make program as through large memory space were present, equal to the
       totality of auxiliary memory. In memory ladder programs and data are first
       stored in auxiliary memory. Portion of program and data are then brought
       into main memory as they are needed by CPU. Each address referenced by
       CPU goes through an address mapping from virtual address to physical
       address in memory.
       Hence virtual memory forever give an false impression that they have large
       memory at their disposal, even through computer has relatively small
       memory.
       Virtual memory based system provides a mechanism for translating program
       generated address into correct main memory locations. This all process is
       done dynamically, when process are executing in main memory. The
       translation a mapping is handled by automatically using hardware of
       mapping table. The address used by programs are called virtual address as
       such addresses set is called address space. An address in main memory is
       called physical address set of such address is called memory space.
       Virtual Memory System is grouped in 2 classes:-
       (1) Those with fixed sized blocks called pages.
       (2) Those with variable size block called segments.
       Paging: It is a memory management method that allows the physical address
       space of a method to be non-continuous.
Advanced Computer Arc.                                                                45
                                                                                 t
               CPU         P d                           t   d          f0000
                                       Page table
                                                                      Physical
                                                                      memory
                                        s
                                            limit Base
     Various functional boards are plugged into slots on the backplane. Each slot
     is given with one or more connectors for pop in the boards as shown by the
     vertical arrows. For example one or two 96-pin connectors are used per slot
     on the VME backplane.
Slot 1
Utility Bus
                                   Chapter 5
                       Pipelines Processors
Single task
        Input                                                                            Onput
                                      Ready       S2       Ready              Sk
        Ready               S1                                                           Ready
                                      Ack                         Ack
          Ack                                                                            Ack
L L L L L
                                                                      Output
           S1                 S2                             Sk
   o                 o                   o           o            o
Clock
Output
                 Input                                            Output
                               S1               S2           Sk
1 2 3 4
S1 X
Stages S2 X
S3 X
S4 X
      Each reservation table displays the time space flow of data through the
      pipeline for one function evaluation. Different function may pursue different
      paths on the reservation table.
                                    1             2        3        4       5   6   7   8
                              S1    X                                           X       X
                     Stages
S2 X X
S3 X X X
      Processing sequence
      S1   S2   S1    S2           S3       S1        S3       S1
Advanced Computer Arc.                                                                 51
            the store of sum to memory location X must wait three cycles for the add
            to finish due to flow dependence.
a Exponents b A Mentissa B
R R
Segment 3
                                         Add or subtract
                                           Mantissa
R R
                  R                              R
Advanced Computer Arc.                                                               53
Case Studies
Case Study 1.
Cache Policies.
Consider two alternate caches, each with 4 sectors holding 1 block per sector and
one 32-bit word
per block. One cache is direct mapped and the other is fully associative with LRU
replacement
policy. The machine is byte addressed on word boundaries and uses write allocation
with write
back.
1a) What would the overall miss ratio be for the following address stream on the
direct
mapped cache? Assume the cache starts out completely invalidated.
read 0x00 M
read 0x04 M
write 0x08 M
read 0x10 M
read 0x08 H
write 0x00 M Miss ratio = 5/6 = 0.8333
LRU replacement
write back
byte addresses on word boundaries
2a) Sketch a block diagram of how the virtual address is mapped into the physical
address (assuming a TLB hit). Be sure to label exactly which/how many of the
address bits go
where. and how many bits are in each of the 3 fields in a TLB entry.
1 GB MEANS
30-BIT
VIRTUAL
ADDRESS
                    4 KB PAGE SIZE MEANS LOW 12 BITS ARE
UNTRANSLATED
                             TLB
      BITS 12-29
You have a computer with two levels of cache memory and the following
specifications:
CPU Clock: 200 MHz Bus speed: 50 MHz
Processor: 32-bit RISC scalar CPU, single data address maximum per instruction
L1 cache on-chip, 1 CPU cycle access
block size = 32 bytes, 1 block/sector, split I & D cache
each single-ported with one block available for access, non-blocking
L2 cache off-chip, 3 CPU cycles transport time (L1 miss penalty)
56
3a) What is the available (as opposed to used) sustained bandwidth between:
- L1 cache bandwidth available to CPU (assuming 0% L1 misses)?
200 MHz * 2 caches * 32 bytes / 1 clock = 12.8 * 109 B/sec = 11.92 GB/sec
- L2 cache bandwidth available to L1 cache (assuming 0% L2 misses)?
200 MHz * 1 cache * 32 bytes / 3 clocks = 2.133 * 109 B/sec = 1.98 GB/sec
- Main memory bandwidth available to L2 cache?
200 MHz * 32 bytes / (12+4+4+4) clocks = 267 * 106 B/sec = 254 MB/sec
3b) How long does an average instruction take to execute (in ns), assuming 1 clock
cycle per instruction in the absence of memory hierarchy stalls, no write buffering at
the L1 cache
level, and 0% L2 miss rate.
7362210 instructions = 7362210 clock cycles @ 1 clock effective access time
52206 demand misses @ 3 clocks = 156618 clocks delay penalty.
(7362210 + 156618) / 7362210 = 1.0213 clocks / 200 Mhz = 5.1065 ns
3c) A design study is performed to examine replacing the L2 cache with a victim
cache.
Advanced Computer Arc.                                                                    57
Compute a measure of speed for each alternative and indicate which is the faster
solution. Assume
the performance statistics are
L2 cache local miss ratio = 0.19
Victim cache miss ratio = 0.26; and its transport time from L1 miss = 1 clock
Given fixed L1 cache performance, it is fair to compare these head-to-head (but the
comparison
might not stay the same if L1 were changed):
tea for L2 cache beyond the L1 access time is:
3 + 0.19 * (12+4+4+4) = 7.56 clocks in addition to L1 delay
tea for L2 cache beyond the L1 access time is:
1 + 0.26 * (12+4+4+4) = 7.24 clocks in addition to L1 delay
So, in this (contrived) case the victim cache is a slight win in speed, and a whole lot
cheaper.
Case Study 4.
Discuss about the advantage(s) and the disadvantages of the von Nuemann concept.
Solution:
The von Neumann concept is a computer design model that uses a single storage
     model to hold both instructions and data.
Advantages:
Disadvantages:
Case Study 5.
Solution:
Advantage:
      Allows for pipeline CPUs to reduce the clock cycles wasted due to pipeline
      flushing during a branch or a jump operation
Disadvantage:
      If the compiler cannot put instructions to execute after the branch due to
      dependencies, then it must insert no-op instructions which increases the size
      of program
Case Study 6.
T = Ic* CPI *
          A RISC computer, ideally, should be able to execute one instruction per clock
          cycles. Within the scope of a RISC architecture, name and discuss (briefly)
          distinct issues that do not allow ideal performance.
Solution:
Issues:
          Memory Access: Any access to the memory can take longer than one
          instruction
          Branching: Program branches will flush instructions in a pipeline and cause it
          to take longer then one instruction
Case Study 7. Loop fusion allows two or more loops that are executed the same
      number of times and that use the same indices to be combined into one loop:
   1. Within the scope of a RISC processor, why does it (Loop fusion) improve
      performance (detail explanation)?
Solution:
Solution:
Solution:
Solution:
                                                Set-A
1.    RISC stands for:
      (a)     Register Instruction Set Computer
      (b)     Reduced Instruction Set Computer
      (c)     Reduced Instruction Set Clock
      (d)     None of the above                                                                         ( )
4.    ........................is a term used to denote a large class of techniques that are used to provide
      simultaneous data processing tasks
      (a)          Shared memory
      (b)          Parallel Processing
      (c)          Memory hierarchy
      (d)          None of the above                                                                   ( )
9.    Many operating system are designed to enable the CPU to process a number of
      independent program concurrently. This concept is called:
      (a)    Cache Memory
      (b)    Multiprogramming
      (c)    Multiprocessor
      (d)    None of the above                                                ( )
10.   A.......................system is an interconnection of two more CPU with memory and I/O
      equipment.
      (a)           Processor                                (b)    Synchronization
      (c)           Multiprocessor                   (d)     None of the above      ( )
13.   Computers are interconnected with each other by means of communication lines to form
      a:
      (a)   Computer Network
      (b)   Multiprocessor
      (c)   Data Dependency
      (d)   None of the above                                                          ( )
15.   Loosely coupled system are more efficient when the interaction between task is:
Advanced Computer Arc.                                                                                    63
17.   The memory connected to the common system bus is.......................by all processors.
      (a)   Shared                       (b)    Partitioned
      (c)   Distributed                         (d)       None of the above                        ( )
18.   The ...........................organization consists of number of cross points that are placed at
      intersection between buses and memory module paths
      (a)       Multiport memory                                (b)   Crossbar switch
      (c)       Multistage switch                               (d)   None of the above            ( )
21.   The signal lines in system bus are divided into.................functional groups.
      (a)     1                                          (b)          2
      (c)     3                                          (d)          None of the above            ( )
30.       Router is a :
          (a)     Data Transfer Protocol
          (b)     Networking device
          (c)     Modem
          (d)     None of the above                                                                    ( )
Answer
1. (b)      2. (b)     3. (c)      4. (b)     5. (a)    6. (c)     7. (d)    8. (a)    9. (b)      10. (c)
11. (b)     12. (d)    13. (a)     14. (b)    15. (b)   16. (c)    17. (a)   18. (a)   19. (d)     20. (a)
21. (c)     22. (a)    23. (c)     24. (b)    25. (a)   26. (a)    27. (a)   28. (a)   29. (d)     30. (b)
Advanced Computer Arc.                                                                               65
Set-B
1. The channel width of a ..............network increases as we ascend from leaves to the root.
2.    The time required for two processes to synchronize with each other is called:
      (a)    Synchronization time
      (b)    Synchronization Latency
      (c)    Process Latency
      (d)    Memory latency                                                                   ( )
3.    If the number of links is 2N, then this would be which kind of network?
      (a)      Illiac mesh
      (b)      2D Mesh
      (c)      Both (a) and (b)
      (d)      None of the above                                                              ( )
6.    SIMD is a :
      (a)     Memory management scheme
      (b)     Processor for multiple organization
      (c)     Attachment array processor
      (d)     Programming technique                                                           ( )
14.   .................is a shared memory system in which the access time varies with the location of
      the memory word:
      (a)          COMA
      (b)          UMA
      (c)          NUMA
      (d)          All of the above                                                              ( )
20.    The process of assigning control of the data transfer bus to a requester is called:
       (a)    Interleaving
       (b)    Interruption
       (c)    Synchronization
       (d)    Arbitration                                                                          ( )
23.   Processors that use multiphase clock with a much increases clock rate ranging from 100 to
500 MHz.
      (a)    RISC
      (b)    VLIW
      (c)    Both a and b
      (d)    None of the above                                                               ( )
68
25.       An/a .....................is a request from I/O or other devices to a processor for services or
          attention:
          (a)     Transaction                                  (b)    Arbitration
          (c)     Interrupt                                    (d)    None of the above              ( )
28.       The memory hierarchy developed was based on a program behaviour is known is:
          (a)   Locality of reference
          (b)   Locality of coherence
          (c)   Coherence property
          (d)   None of the above                                                                        ( )
29.       In a UMA multiprocessor model all processor have............access time to all memory
          words:
          (a)    Asynchronous
          (b)    Equal
          (c)    Different
          (d)    None of the above                                                          ( )
Answer
1. (a)      2. (b)     3. (c)     4. (a)     5. (c)     6. (b)     7. (a)    8. (d)     9. (a)       10. (a)
11. (b)     12. (d)    13. (b)    14. (c)    15. (d)    16. (b)    17. (a)   18. (d)    19. (a)      20. (b)
21. (d)     22. (c)    23. (c)    24. (b)    25. (c)    26. (b)    27. (b)   28. (a)    29. (b)      30. (c)
Advanced Computer Arc.                                                                                  69
                                             Set C
1.    Cache memory is:
      (a)    Temporary and costly
      (b)    Primary
      (c)    High speed memory
      (d)    All of the above                                                                   ( )
2.    ..................instruction is used to store the contents of accumulator into the memory word
      specified by the effective addresses:
      (a)          LDA
      (b)          BUN
      (c)          STA
      (d)          BSA                                                                            ( )
4.    A computer system consists of a CPU, a memory and one or more specialized I/O
      processor called:
      (a)    Bandwidth
      (b)    Data Channels
      (c)    Interrupt
      (d)    None of the above                                                 ( )
6.    SIMM is a :
      (a)    Single Instruction memory modular
      (b)    Single in Line Memory Modular
      (c)    Single Instruction Memory Manufacturer
      (d)    Single in Line Micrograms Modular                                          ( )
10.   The memory used in a computer system is based on the following principle:
      (a)   Principle of parallel computing
      (b)   Principle of concurrent occur
      (c)   Principle of locality
      (d)   None                                                                                  ( )
14.   The instruction set of a.............processor usually contains 200 to 300 instructions:
      (a)     CISC
      (b)     SMP
      (c)     RISC
      (d)     All of the above                                                                    ( )
Advanced Computer Arc.                                                                           71
15.   The transformation of data from main memory to cache memory is called:
      (a)     Mapping
      (b)     Processing
      (c)     Counting
      (d)     Multiplexing                                                                 ( )
16.   A memory deices in which a bit is stored as a charge across the stray capacitance:
      (a)   SRAM
      (b)   EPROM
      (c)   DRAM
      (d)   Bubble Memory                                                                  ( )
22.   Two or more CPU's present in a computer system which share some or all of the memory
      called:
      (a)     Paralled                            (b)    Multipgramming
      (c)     Multi tasking                       (d)    Random File processing ( )
72
23.   Which mode transits data in both directions, but not at the same time:
      (a)    Simplex mode
      (b)    Half duplex mode
      (c)    Full duplex
      (d)    None                                                                      ( )
24.   If a process does not have direct and unassisted access to data items these items are
      said to be:
      (a)      Off line                    (b)    Time shared
      (c)      On line                     (d)    None                          ( )
30.   SIMD is a :
      (a)     Memory management scheme
      (b)     Processor for multiple data organization
      (c)     Attached array processor
      (d)     Programming technique                                                    ( )
Advanced Computer Arc.                                                                              73
Answer
1. (d)    2. (c)    3. (b)    4. (d)    5. (d)    6. (a)    7. (c)    8. (b)    9. (a)    10. (c)
11. (d)   12. (d)   13. (b)   14. (a)   15. (a)   16. (c)   17. (c)   18. (c)   19. (c)   20. (c)
21. (b)   22. (a)   23. (b)   24. (a)   25. (d)   26. (b)   27. (b)   28. (c)   29. (b)   30. (b)
74
                                              Set – D
1.   ....................modules are used to select one out of n read or write requested for service:
     (a)          Multiplexer
     (b)          Demultiplexer
     (c)          Crossbar
     (d)          All of the above                                                           ( )
3.   It manager the allocation and deal location of resources during the exeuction of user
     programs:
     (a)    CPU
     (b)    OS
     (c)    Monitor
     (d)    Keyboard                                                                  ( )
11.     The total number of messages the network can handle is:
        (a)     Network efficiency
        (b)     Network throughout
        (c)     Network output
        (d)     All of the above                                                                         ( )
12.     Which dynamic connection network has a low with limited bandwidth features?
        (a)    Multistage interconnection
        (b)    Crossbar switch
        (c)    Bus system
        (d)    All of the above                                                                          ( )
13.     Which dynamic connection network provides highest bandwidth and interconnection?
        (a)    Crossbar networks                     (b)     Multi stage networks
        (c)    Bus system                            (d)    None of the above            ( )
15.     ...........................is a cascade of processing stage which are linearly connected to perform a
fixed function over a stream of data flowing from one end to the other:
        (a)             Omega network
        (b)             Tree Network
        (c)             Linear Pipeline
        (d)             Parallel Processor `                                                               ( )
18.   In proposed future bus + standard, the..................are used to declare special bus
      transaction:
      (a)     Command Lines                      (b)          Status lines
      (c)     Capability lines                   (d)          Miscellaneous lines         ( )
19.   The percentage of time that each pipeline stage is used over a sufficiently long series of
      task initiation is the:
      (a)      Pipeline throughout                 (b)     Pipeline efficiency
      (c)      Pipeline latency                    (d)     Pipeline clock                   ( )
23.   The............model is a special case of NUMA machine, in which the distributed main
      memories are converted to caches:
      (a)       UMA
      (b)       Special NUMA
      (c)       COMA
      (d)       None of the above                                                      ( )
Advanced Computer Arc.                                                                                       77
24.    The................network provide point to point static connections among the nodes:
       (a)       Message passing                            (b)     Data Passing
       (c)       Both a and b                               (d)     Neither a nor b       ( )
27.    .....................is a pair of nodes that accounts for a disproportionately large portion of the
       total network traffic.
       (a)          Hit ration
       (b)          Hot ratio
       (c)          Hot spot
       (d)          Hit spot                                                                          ( )
28.    The memory hierarchy developed was based on a program behaviour is known as:
       (a)   Coherence property
       (b)   Locality of reference
       (c)   Locality of coherence
       (d)   None of the above                                                                         ( )
29.    Write through and write back are two strategies for maintaining:
       (a)     Locality of reference                        (b)     Collision
       (c)     Coherence                                    (d)     All of the above                   ( )
Answer
1. (a)  2. (b)      3. (b)     4. (d)     5. (b)     6. (c)     7. (d)     8. (a)     9. (a)       10. (a)
11. (b) 12. (c)     13. (a)    14. (b)    15. (c)    16. (b)    17. (a)    18. (a)    19. (c)      20. (b)
21. (d) 22. (c)     23. (b)    24. (a)    25. (b)    26. (c)    27. (c)    28. (b)    29. (d)      30. (b)
78
                                               Year - 2011
Time allowed : One Hour                                                       Maximum Marks : 20
        The question paper contains 40 multiple choice questions with four choices and students
will have to pick the correct one. (Each carrying ½ marks.).
6.    Router is a :
      (a)     Data transfer protocol
      (b)     Networking device
      (c)     Modem
      (d)     None of the above                                                        ( )
9.    SIMM is a :
      (a)    Single Instruction Memory Modular
      (b)    Single in-Line memory modular
      (c)    Single instruction memory manufacturer
      (d)    Single In-Line Micro programs Modular                               ( )
14.   If a process does not have direct and unassisted access to data items, these items   are
      said to be:
      (a)      Off-line
      (b)      Time shared
      (c)      On-line
      (d)      None of the above                                                           ( )
18.   The total number of message the network can handle in:
      (a)     Network Efficiency
      (b)     Network throughput
      (c)     Network output
      (d)     All of the above                                                             ( )
22.   For a reservation table with n columns, the maximum forbidden latency (m) :
      (a)     m n
      (b)     m n–n
      (c)     m n
      (d)     m n–1                                                                 ( )
27.   In future Bus + standard, the 64-bit address line are multiplexed with:
      (a)     Lower order 64-bit data lines
      (b)     High order 64-bit data lines
      (c)     Lower order 32-bit data lines
      (d)     Any one of the above                                                  ( )
82
32.   Only....................of the instruction of a complex instruction set are frequently   used
      about 95% of the time:
      (a)      75%
      (b)      25%
      (c)      80%
      (d)      30%                                                                                    ( )
                                           ______________
84
DESCRIPTIVE PART-II
Year- 2011
Attempt any four descriptive types of questions out of the six. All questions carry 7½ marks
each.
                                             Year - 2010
Time allowed : One Hour                                                      Maximum Marks : 20
        The question paper contains 40 multiple choice questions with four choices and students
will have to pick the correct one. (Each carrying ½ marks.).
4.     ........................is a term used to denote a large class of techniques that are used to provide
       simultaneous data processing tasks
       (a)          Shared memory
       (b)          Parallel Processing
       (c)          Memory hierarchy
       (d)          None of the above                                                                   ( )
86
9.    Many operating system are designed to enable the CPU to process a number of
      independent program concurrently. This concept is called:
      (a)    Cache Memory
      (b)    Multiprogramming
      (c)    Multiprocessor
      (d)    None of the above                                                ( )
10.   A.......................system is an interconnection of two more CPU with memory and I/O
      equipment.
      (a)           Processor                                (b)    Synchronization
      (c)           Multiprocessor                   (d)     None of the above      ( )
13.   Computers are interconnected with each other by means of communication lines to form
      a:
      (a)   Computer Network
      (b)   Multiprocessor
      (c)   Data Dependency
      (d)   None of the above                                                          ( )
15.   Loosely coupled system are more efficient when the interaction between task is:
      (a)     Maximum                               (b)      Minimum
      (c)     Can not say                           (d)      None of the above                     ( )
17.   The memory connected to the common system bus is.......................by all processors.
      (a)   Shared                       (b)    Partitioned
      (c)   Distributed                         (d)       None of the above                        ( )
18.   The ...........................organization consists of number of cross points that are placed at
      intersection between buses and memory module paths
      (a)       Multiport memory                                (b)   Crossbar switch
      (c)       Multistage switch                               (d)   None of the above            ( )
21.   The signal lines in system bus are divided into.................functional groups.
      (a)     1                                          (b)          2
      (c)     3                                          (d)          None of the above            ( )
30.   Router is a :
      (a)     Data Transfer Protocol
      (b)     Networking device
Advanced Computer Arc.                                                                           89
      (c)      Modem
      (d)      None of the above                                                           ( )
31.   Two or more CPUs present in a computer system which share some or all of the memory?
      (a)    Parallel Processing
      (b)    Multiprogramming
      (c)    Random file processing
      (d)    Multitasking                                                                ( )
40.       ..........................is a concept used in some large computer systems that permit the user to
          construct programs as thought a large memory space.
          (a)          Cache memory
          (b)          Random access memory
          (c)          Virtual memory
          (d)          None of the above                                                                ( )
Answer Key
1. (b) 2. (b) 3. (c) 4. (b) 5. (a) 6. (c) 7. (d) 8. (a) 9. (b) 10. (c)
11. (b) 12. (d) 13. (a) 14. (b) 15. (b) 16. (c) 17. (a) 18. (a) 19. (d) 20. (a)
21. (c) 22. (a) 23. (c) 24. (b) 25. (a) 26. (a) 27. (a) 28. (a) 29. (d) 30. (b)
31. (d) 32. (c) 33. (b) 34. (a) 35. (d) 36. (b) 37. (b) 38. (c) 39. (b) 40. (c)
                                               ___________
Advanced Computer Arc.                                                                         91
DESCRIPTIVE PART-II
Year- 2010
Attempt any four descriptive types of questions out of the six. All questions carry 7½ marks
each.
Q.1    (a)      What is meant by Parallelism? What are conditions of parallelism? Discuss
                the    network properties.
       (b)      Explain the static interconnection network.
Q.4    (a)      What is meant by cache memory? Discuss the virtual memory technology
       (b)      Write short note on shared memory
Q.5    (a)      What is meant by pipelining? Discuss the instruction pipeline design.
       (b)      Explain RISC processors.
OBJECTIVE PART- I
                                          Year - 2009
Time allowed : One Hour                                                Maximum Marks : 20
The question paper contains 40 multiple choice questions with four choices and student will have
to pick the correct one. (Each carrying ½ marks.).
1. The channel width of a ..............network increases as we ascend from leaves to the root.
2.     The time required for two processes to synchronize with each other is called:
       (a)    Synchronization time
       (b)    Synchronization Latency
       (c)    Process Latency
       (d)    Memory latency                                                                   ( )
3.     If the number of links is 2N, then this would be which kind of network?
       (a)      Illiac mesh
       (b)      2D Mesh
       (c)      Both (a) and (b)
       (d)      None of the above                                                              ( )
6.     SIMD is a :
       (a)     Memory management scheme
       (b)     Processor for multiple organization
       (c)     Attachment array processor
       (d)     Programming technique                                                           ( )
Advanced Computer Arc.                                                                                  93
14.   .................is a shared memory system in which the access time varies with the location of
      the memory word:
      (a)          COMA
      (b)          UMA
94
      (c)     NUMA
      (d)     All of the above                                                              ( )
20.   The process of assigning control of the data transfer bus to a requester is called:
      (a)    Interleaving
      (b)    Interruption
      (c)    Synchronization
      (d)    Arbitration                                                                    ( )
23.   Processors that use multiphase clock with a much increases clock rate ranging from 100 to
500 MHz.
      (a)    RISC
      (b)    VLIW
      (c)    Both a and b
      (d)    None of the above                                                               ( )
25.    An/a .....................is a request from I/O or other devices to a processor for services or
       attention:
       (a)     Transaction                                  (b)    Arbitration
       (c)     Interrupt                                    (d)    None of the above              ( )
28.    The memory hierarchy developed was based on a program behaviour is known is:
       (a)   Locality of reference
       (b)   Locality of coherence
       (c)   Coherence property
       (d)   None of the above                                                                      ( )
29.    In a UMA multiprocessor model all processor have............access time to all memory
       words:
       (a)    Asynchronous
       (b)    Equal
       (c)    Different
       (d)    None of the above                                                          ( )
33.   ......................is a pair of nodes that accounts for a disproportionately large portion of the
      total network traffic.
      (a)          Hot spot
      (b)          Hit Spot
      (c)          Hot ratio
      (d)          Hit ratio                                                                          ( )
36.   Router is a :
      (a)     Data Transfer protocol
      (b)     Networking device
      (c)     Modem
      (d)     None of the above                                                                      ( )
37.   Two or more CPUs present in a computer system which share some or all of the memory:
      (a)    Parallel Processing
      (b)    Multiprogramming
      (c)    Random file processing
      (d)    Multitasking                                                                ( )
Answer Key
1. (a) 2. (b) 3. (c) 4. (a) 5. (c) 6. (b) 7. (a) 8. (d) 9. (a) 10. (a)
11. (b) 12. (d) 13. (b) 14. (c) 15. (d) 16. (b) 17. (a) 18. (d) 19. (a) 20. (b)
21. (d) 22. (c) 23. (c) 24. (b) 25. (c) 26. (b) 27. (b) 28. (a) 29. (b) 30. (c)
31. (b) 32. (d) 33. (b) 34. (d) 35. (b) 36. (b) 37. (b) 38. (d) 39. (c) 40. (c)
                                              _____________
98
DESCRIPTIVE PART - II
                                          Year 2009
Time allowed : 2 Hours                                                 Maximum Marks : 30
Attempt any four questions out of the six. All questions carry 7½ marks each.
Q.1    (a)    Discuss and describe a typical superscalar architecture for a RISC processor.
       (b)    What do you understand by superscalar and vector processes?
Q.4    (a)    Discuss the terms data transfer bus (DTB) bus arbitration and control and
                      Financial modules related to backplane bus.
       (b)    What do you mean by Backplane Bus system?
Q.6    What is the basic difference between a linear pipeline processor and non-linear pipeline
       processor? Discuss the asynchronous and synchronous models of linear pipeline
       processor.
                                            _______
Advanced Computer Arc.                                                                                   99
OBJECTIVE PART- I
                                           Year - 2008
Time allowed : One Hour                                                     Maximum Marks : 20
The question paper contains 40 multiple choice questions with four choices and student will have
to pick the correct one. (Each carrying ½ marks.).
2.     ..................instruction is used to store the contents of accumulator into the memory word
       specified by the effective addresses:
       (a)          LDA
       (b)          BUN
       (c)          STA
       (d)          BSA                                                                            ( )
4.     A computer system consists of a CPU, a memory and one or more specialized I/O
       processor called:
       (a)    Bandwidth
       (b)    Data Channels
       (c)    Interrupt
       (d)    None of the above                                                 ( )
6.     SIMM is a :
       (a)    Single Instruction memory modular
       (b)    Single in Line Memory Modular
100
10.   The memory used in a computer system is based on the following principle:
      (a)   Principle of parallel computing
      (b)   Principle of concurrent occur
      (c)   Principle of locality
      (d)   None                                                                                 ( )
14.   The instruction set of a.............processor usually contains 200 to 300 instructions:
Advanced Computer Arc.                                                                           101
      (a)     CISC
      (b)     SMP
      (c)     RISC
      (d)     All of the above                                                             ( )
15.   The transformation of data from main memory to cache memory is called:
      (a)     Mapping
      (b)     Processing
      (c)     Counting
      (d)     Multiplexing                                                                 ( )
16.   A memory deices in which a bit is stored as a charge across the stray capacitance:
      (a)   SRAM
      (b)   EPROM
      (c)   DRAM
      (d)   Bubble Memory                                                                  ( )
22.   Two or more CPU's present in a computer system which share some or all of the memory
      called:
      (a)     Paralled                            (b)    Multipgramming
      (c)     Multi tasking                       (d)    Random File processing        ( )
23.   Which mode transits data in both directions, but not at the same time:
      (a)    Simplex mode
      (b)    Half duplex mode
      (c)    Full duplex
      (d)    None                                                                      ( )
24.   If a process does not have direct and unassisted access to data items these items are
      said to be:
      (a)      Off line                    (b)    Time shared
      (c)      On line                     (d)    None                                  ( )
30.   SIMD is a :
      (a)     Memory management scheme
      (b)     Processor for multiple data organization
      (c)     Attached array processor
      (d)     Programming technique                                            ( )
35.   Router is a:
      (a)     Networking device
      (b)     Data transfer protocol
      (c)     Modem
      (d)     None                                                             ( )
36.   Bus is a:
      (a)      Logical Channel for transferring data
      (b)      Electronic pathway for transferring data
      (c)      Dedicated path
      (d)      None                                                            ( )
(d) Microsoft ( )
Answer Key
1. (d)      2. (c)    3. (b)    4. (d)      5. (d)    6. (a)     7. (c)    8. (b)      9. (a)    10. (c)
11. (d)     12. (d)   13. (b)   14. (a)     15. (a)   16. (c)    17. (c)   18. (c)     19. (c)   20. (c)
21. (b)     22. (a)   23. (b)   24. (a)     25. (d)   26. (b)    27. (b)   28. (c)     29. (b)   30. (b)
31. (a)     32. (d)   33. (c)   34. (a)     35. (a)   36. (a)    37. (c)   38. (a)     39. (b)   40. (d)
                                             _____________
Advanced Computer Arc.                                                                            105
DESCRIPTIVE PART - II
Year 2008
Attempt any four questions out of the six. All questions carry 7½ marks each.
Q.1    What do you understand with virtual memory? Describe the page replacement techniques
       in virtual memory
Q.3    Explain the interconnection structures of network. Describe the multistage switching
       network with the help of diagram.
Q.4    What do you understand with pipelining processor? Describe the arithmetic pipeli ne with
       the help of example
Q.5    Describe:
       (i)    Vector Processing principles
       (ii)   Memory interleaving
Q.6    Differentiate between the RISC and CISC processors. Explain also the characteristics of
       both.
                                             _______
106
OBJECTIVE PART- I
                                             Year - 2007
Time allowed : One Hour                                                      Maximum Marks : 20
The question paper contains 40 multiple choice questions with four choices and student will have
to pick the correct one. (Each carrying ½ marks.).
1.     ....................modules are used to select one out of n read or write requested for service:
       (a)          Multiplexer
       (b)          Demultiplexer
       (c)          Crossbar
       (d)          All of the above                                                                    ( )
3.     It manager the allocation and deal location of resources during the exeuction of user
       programs:
       (a)    CPU
       (b)    OS
       (c)    Monitor
       (d)    Keyboard                                                                  ( )
      (b)     COMA
      (c)     UMA
      (d)     All of the above                                                                         ( )
11.   The total number of messages the network can handle is:
      (a)     Network efficiency
      (b)     Network throughout
      (c)     Network output
      (d)     All of the above                                                                         ( )
12.   Which dynamic connection network has a low with limited bandwidth features?
      (a)    Multistage interconnection
      (b)    Crossbar switch
      (c)    Bus system
      (d)    All of the above                                                                          ( )
13.   Which dynamic connection network provides highest bandwidth and interconnection?
      (a)    Crossbar networks                    (b)      Multi stage networks
      (c)    Bus system                           (d)     None of the above            ( )
15.     ...........................is a cascade of processing stage which are linearly connected to perform a
fixed function over a stream of data flowing from one end to the other:
        (a)             Omega network
        (b)             Tree Network
        (c)             Linear Pipeline
        (d)             Parallel Processor `                                                               ( )
18.     In proposed future bus + standard, the..................are used to declare special bus
        transaction:
        (a)     Command Lines                      (b)          Status lines
        (c)     Capability lines                   (d)          Miscellaneous lines         ( )
19.     The percentage of time that each pipeline stage is used over a sufficiently long series of
        task initiation is the:
        (a)      Pipeline throughout                 (b)     Pipeline efficiency
        (c)      Pipeline latency                    (d)     Pipeline clock                   ( )
23.   The............model is a special case of NUMA machine, in which the distributed main
      memories are converted to caches:
      (a)       UMA
      (b)       Special NUMA
      (c)       COMA
      (d)       None of the above                                                       ( )
24.   The................network provide point to point static connections among the nodes:
      (a)       Message passing                            (b)     Data Passing
      (c)       Both a and b                               (d)     Neither a nor b                  ( )
27.   .....................is a pair of nodes that accounts for a disproportionately large portion of the
      total network traffic.
      (a)          Hit ration
      (b)          Hot ratio
      (c)          Hot spot
      (d)          Hit spot                                                                          ( )
28.   The memory hierarchy developed was based on a program behaviour is known as:
      (a)   Coherence property
      (b)   Locality of reference
      (c)   Locality of coherence
      (d)   None of the above                                                                       ( )
29.   Write through and write back are two strategies for maintaining:
      (a)     Locality of reference                        (b)     Collision
      (c)     Coherence                                    (d)     All of the above                 ( )
34.   For a reservation table with n columns, the maximum forbidden latency (m):
      (a)     M n                                     (b)   n n–1
      (c)     M n                                     (d)   n n–1                          ( )
35.   Intrinsic parallel computer are those that execute program in:
      (a)      SIMD mode only
      (b)      MIMD Mode only
      (c)      SIMD and MIMD modes
      (d)      None of the above                                                           ( )
36.   .......................is a shared memory system in which the access time varies with the
      location of the memory word.
      (a)          UMA
      (b)          COMA
      (c)          NUMA
      (d)          All of the above                                                         ( )
40.    The portion of the operating system kernel which handles the allocation and deallocation
       of main memory to executing processes is called:
       (a)     Memory Swapper
       (b)     Memory Manager
       (c)     Process Swapper
       (d)     Process Manager                                                             ( )
Answer Key
1. (a)  2. (b)    3. (b)    4. (d)    5. (b)    6. (c)    7. (d)    8. (a)    9. (a)    10. (a)
11. (b) 12. (c)   13. (a)   14. (b)   15. (c)   16. (b)   17. (a)   18. (a)   19. (c)   20. (b)
21. (d) 22. (c)   23. (b)   24. (a)   25. (b)   26. (c)   27. (c)   28. (b)   29. (d)   30. (b)
31. (b) 32. (c)   33. (b)   34. (a)   35. (c)   36. (c)   37. (c)   38. (b)   39. (a)   40. (d)
                                       ______________
112
DESCRIPTIVE PART - II
Year 2007
Attempt any four questions out of the six. All questions carry 7½ marks each.
Q.3    Describe :
       (i)    Generations of electronic computers.
       (ii)   Elements of moderns computer
Q.6    Describe the following terms associated with program partitioning and scheduling:
       (a)    Grain Sizes and latency
       (b)    Grain packing and scheduling
                                           _________
Advanced Computer Arc.                                                                             113
OBJECTIVE PART- I
                                            Year - 2006
Time allowed : One Hour                                              Maximum Marks : 20
The question paper contains 40 multiple choice questions with four choices and student will have
to pick the correct one. (Each carrying ½ marks.).
3.     In UMA multiprocessor model, all the processors have unequal access time to all
       memory words:
       (a)   True
       (b)   False                                                                ( )
17.   Processors that use multiphase clocks with a muck increase clock rate ranging from 100 to
500 MHz are:
      (a)    VLIW                                    (b)     RISC
      (c)    Memory interleaving                     (d)     Super view                      ( )
18.    ................is a process of moving blocks of information between the levels of memory
       hierarchy:
       (a)          Memory swapping
       (b)          Memory allocation
       (c)          Memory interleaving
       (d)          Memory scheduling                                                        ( )
22.    The typical clock rate of today's CISC processor ranges from:
       (a)     1 to 40 MHz
       (b)     20 to 33 MHz
       (c)     33 to 50 MHz
       (d)     All of the above                                                              ( )
27.   In future Bus + standards, the 64 bit address lines are multiplexed with:
      (a)     Lower order 64 - bit data lines
      (b)     High order 64-bit data lines
      (c)     Lower order 32 bit data lines
      (d)     Any one                                                                             ( )
28.   The time in cycles required between the issuing of two adjacent instruction is:
      (a)    Instruction issue rate
      (b)    Instruction pipeline cycle
      (c)    Instruction operations latency
      (d)    Instruction issue latency                                                            ( )
29.   .........................refers to the process in which a resident page in main memory is repaced
      by a new page transferred from the disk
      (a)          Page allocation                      (b)    page replacement
      (c)          both a and b                                (d)     Neither a nor b              ( )
31.   If the number of links is 2NB, then this would be which kind of network:
      (a)      Illiac mesh                              (b)    2D Mesh
      (c)      Both a and b                             (d)    None of the above                  ( )
32.   ...................techniques were introduced for prefect instructions in order to overlap I/E
      operations:
      (a)          Sequential                             (b)     Look ahead
      (c)          Both a and b                           (d)     None of the above             ( )
33.   ................uses high order bits as the module address and low order bits as the word
      address within each module:
Advanced Computer Arc.                                                                                         117
34.       Printed circuit on which many connectors are used to plus in functional boards?
          (a)     I/O Buses                              (b)     Hierarchical Buses
          (c)     Cache                                  (d)     Backplane Buses                       ( )
35.       ...............................is an operation that fetches the non zero elements of sparse vector
          from the memory using indicates:
          (a)          Masking                                      (b)    Gather
          (c)          Scatter                                      (d)    Reduction                    ( )
36.       The number of clock cycles between two initiations of a pipeline is:
          (a)    latency cycle                           (b)      Gather
          (c)    Scatter                        (d)      Evaluation analysis                           ( )
Answer Key
1. (c) 2. (c) 3. (b) 4. (a) 5. (b) 6. (c) 7. (b) 8. (b) 9. (c) 10. (a)
11. (a)     12. (b)      13. (a)   14. (a)    15. (c)   16. (a)    17. (c)   18. (a)    19. (c)    20. (c)
21. (c)     22. (c)      23. (c)   24. (c)    25. (b)   26. (d)    27. (d)   28. (d)    29. (b)    30. (c)
31. (b)     32. (c)      33. (b)   34. (a)    35. (a)   36. (b)    37. (d)   38. (b)    39. (c)    40. (d)
118
DESCRIPTIVE PART - II
                                       Year 2006
Time allowed : 2 Hours                                            Maximum Marks : 30
Attempt any four questions out of the six. All questions carry 7½ marks each.
Q.1    What do you understand by shared memory multiprocessor and distributed memory
       multi computers ? Explain different models of shared memory multiprocessor.
Q.2    Explain the following terms associated with program partitioning and scheduling:
       (a)    Grain sizes and latency
       (b)    Grain packing and scheduling
Q.3    Explain all the factors on which the performance of interconnected network depends.
       Discuss the following dynamic connection networks.
       (a)    Digital buses
       (b)    Omega network
Q.4    Describe:
       (a)    Locality of reference
       (b)    Write back caches
       (c)    Write through caches
Q.6    What do you mean by vector processing? Explain different types of vector
       instructions with example.
Advanced Computer Arc.                                                                         119
                                Key Terms
A
Access Time                Time required to place read/write heads of the disk over a
                           particular track & sector. Rotational delay and seek time should
                           also be considered.
Accumulator                CPU register that has the outcome of operations and
                           occasionally the operands
Address Bus                System bus used to move addresses in RAM or I/O device
ALU                        element of the CPU that does arithmetic and logical operations
ASCII (American            A 7-bit standard character set that signify characters inside the
Standard Code for          computer.
Information Interchange)
ASRAM (Asynchronous        Static RAM is the one for transferring data without using the
RAM)                       system clock.
Assembler                  A system program that interpret a mnemonic assembly
                           language to low level language.
Associative Memory         Memory whose location are recognized by their contents,
                           rather than their position
B
Binary Operator            An operator that perform on two operands.
Bit (Binary Digit)         A single memory unit that has a single binary value (0 or 1)
Boolean Algebra            Mathematics laws applied by the processor to do logical and
                           shift operations.
Buffer                     Memory locations used to hold input or output data. It is
                           required to balance difference in speed amid the CPU and the
                           I/O devices.
Bus                        Communication path consisting of a group of lines that carry
                           signals, addresses, or data amid PC‘s elements. A bus can be
                           used by all computer elements.
Byte                       Memory unit that embrace 8 bits.
C
Cache                      A small, fast memory - perform like a buffer. It is used to
                           improve performance of CPU.
Chipset                    A collection of typical PC functions pooled onto one or more
                           integrated circuit.
Clock                      Square wave with equal intervals. Used to harmonize CPU
                           process. Events typically happen at rising or falling rim of the
                           clock.
Combinational              Logic circuit who's yield is a function of its input only at any
(combinatorial) Circuit    specified time. There is no storage capacity of preceding
                           contents of the circuit.
COMA                        Cache-only memory architecture
Control Bus                System bus for transferring control signals among processor
120
D
Data Bus                  System bus for transferring data.
Decoder                   Combinational circuit for transferring input signal combination
                          on numerous input lines into one specific 2 n-output lines.
Distributed Memory        Physical memory that is alienated into module every allocated
                          to a processor in a multiprocessor organization.
DMA (Direct Memory        I/O method that permit direct data swap between memory and
Access)                   I/O devices without holding the processor time. CPU only
                          begins the I/O request and is interrupted after the transfer is
                          complete.
DRAM (Dynamic RAM)        RAM put into practice using capacitors and that requires to be
                          sporadically re-energized
E
EEPROM (Electronically    usually used in BIOS chip and can be reorganized with a
Erasable Programmable     procedure known as flashing using dedicated software.
Read-Only Memory)
Error-Correcting Code     Code used for sending/receiving signals or characters used to
                          automatically correct errors.
Error-Detecting Code      Code used for sending/receiving signals or characters used to
                          automatically detect errors.
Exclusive-OR Gate         The logic - produce logical value ―True‖ if both input values
(Function)                are dissimilar else produce ―False‖.
F
Fetch Cycle               It is used for obtaining the instruction to be carried out from
                          memory.
Fixed-Point               Representation of Real number in which the radix (decimal for
Representation System     radix 10) is kept in a fixed place.
Flip-Flop                 A memory unit that include one binary value and in which the
                          output signify the current state. The next state depends on
                          current state and the input.
Floating-Point            Real number system in which the number is symbolize as two
Representation System     distinct parts- mantissa and exponent.
G
Advanced Computer Arc.                                                                          121
MAR (Memory address       A CPU registers for keeping address of memory location being
Register)                 accessed.
Microinstruction          Low-level control instruction in which machine instruction is
                          used to produce control signals.
Micro-operation           Basic CPU operation, carried out for the period of one clock
                          cycle.
Microprocessor            Integrated circuits making the heart of the PC that include
                          ALU, general and special registers, and Control units.
Micro program             Microinstruction sequence.
O
Opcode (Operation         Component of an instruction that indicate the operation and
Code)                     format of an instruction.
Operand                   Entity on which an operation is carry out. piece of an
                          instruction.
Operating System          System software to control program execution, assign and deal
                          with resources, program tasks, control I/O operations, and
                          manage data.
P
Page                      A fixed length memory blocks that has virtual address and is
                          swap as a entity amid two memory types (RAM & cache or
                          RAM & secondary memory).
Page Fault                A condition that takes place when referencing a memory word
                          that is not in RAM. It originates interrupt & needs loading the
                          page ongoing the preferred word before the program can go on.
Page Frame                A block in RAM that can keep a page.
Parity Bit                An extra bit attached to a word and basis for sum of all digits to
                          be either odd or even, depending on the type of parity (odd or
Advanced Computer Arc.                                                                         123
                         even parity).
Peer-to-Peer Network     Two or more computers directly linked and directly share the
                         data and hardware resources.
Pipeline                 The procedure employed to begin one function in every
                         cycle without waiting for the final outcome to be created,
                         or completion of formerly commenced functions.
PRAM
                         Parallel random access machine
R
Radix (Base)             Representation of Number system.
Register                 High-speed memory constituent exist in in the CPU used to
                         keep data.
S
SCSI (Small Computer     A bus used as a standard for I/O devices.
System Interface)
Seek Time                Time required for the head actuator to travel the read/write
                         head from one track to the next.
Segmentation             Variable-size address mapping method in which an address is
                         alienated into two parts: a part number and part offset.
Sequential Circuit       Logic circuit in which the next state is a function of both the
                         current state and the input. It works as a memory element.
Sign-Magnitude           Number representation used to represent binary integers. The
Representation           leftmost bit is used to represent the sign (1 for negative, 0 for
                         positive). rest bits keep the magnitude of the number.
SIMD (Single-            Multiprocessor architecture that can do a single function on
Instruction Stream /     multiple set of data.
Single-Data Stream)
SIMD (Single-            The categorization under Flynn's nomenclature for a parallel
Instruction stream,      processor where many processing part do the same action on
Multiple-Data stream)    different data. There is often a central controller that broadcasts
(Or "data parallel")     the instruction stream to all the processing elements.
SIMM (Single-Inline      Memory unit made up of DRAM chip in special packaging.
Memory Module)           Soldered on a tiny circuit board with 30- or 72- edge connector.
SISD (Single-Inline,     Computer organization in Flynn's classification that refers to
Single-Data Stream)      the conservative processor.
Snooping Cache Memory    technique for retain cache coherency in which all cache
                         controllers scrutinize the bus to decide whether or not they
                         have the preferred block.
Spatial Locality         Locality principle that states that data referencing be apt to
                         reference close by addresses.
SRAM (Static RAM)        RAM put into practice with flip-flops. Data keeps as long as the
                         power is on. No periodic revitalizing is required.
Stack                    A list that is efforts on LIFO (Last-In First-Out) basis.
124
U
Unary Operator           An operator that perform on one operand only
Underflow                A condition that can take place when the outcome of a floating-
                         point function would be lesser in scale (closer to zero, either
                         positive or negative) than the smallest quantity
                         characterizeable. Underflow is in fact (negative) overflow of the
                         exponent of the floating-point quantity. It happens when a
                         negative exponent is too great to be characterized. That means
UMA                      the number is too small to be represented.
V
Virtual Address          A memory location accessed in a system by an application
                         program with virtual memory such that intervening hardware
                         and/or software maps the virtual address to real (physical)
                         memory.
Virtual Memory           Address space that can be seen as addressable main memory by
                         the user. They are plotted by the processor into physical address
                         space. Usually the virtual address space is bigger than the
                         physical address space.
Volatile Memory          Memory that lose its contents when the power is off. Example:
Advanced Computer Arc.                                                                     125
                         RAM.
W
Write Back               A cache structural design in which data is only written to main
                         memory when it is enforced out of the cache. Contrary to write-
                         through.
Write Through            A cache structural design in which data is written to main
                         memory at the similar time as it is cached.
126
Websites
http://williamstallings.com/COA5e.html
http://iiusatech.com/murdocca/CAO/
http://courses.soe.ucsc.edu/courses/cmpe202
http://www.randelshofer.ch/fhw/gri/float.html#chapterfloatapplet
http://courses.soe.ucsc.edu/courses/cmpe110
http://booksite.mkp.com/9780123838728/
      http://inst.eecs.berkeley.edu/~cs152/sp12/
      http://www.randelshofer.ch/fhw/gri/float.html
      http://www.britannica.com/EBchecked/topic/163278/digital-computer
      http://williamstallings.com/COA/COA7e.html
      http://csg.csail.mit.edu/6.823/lecnotes.html
      http://www.cs.berkeley.edu/~pattrsn/252S01/
      http://gs.fanshawec.ca/tlc/math270/
      http://courses.cs.vt.edu/~csonline/NumberSystems/Lessons/BinaryNumb
      ers/index.html
      http://www.math.grin.edu/~stone/courses/fundamentals/IEEE-
      reals.html
      http://www.randelshofer.ch/fhw/gri/doubleapplet.html
       http://www.intel.com/products/processor (for Intel Itanium
      Processor)
      http://www.ibm.com/servers/eserver/pserieslhardware/whitepaper
      s/power/ppc - arch.html
       http://www . i bm .com! servers/ eserver/pserics/hard ware/wh
      itepapers/power/ppc arch 2.html
Advanced Computer Arc.                                                        127
Bibliography