Define transferring data from any core to any other core

Assignment Help Basic Computer Science
Reference no: EM13761254

Q1: Design a system with 2 4-bit shift registers with a bus (single wire) connecting the two.

a) Design the system so that the endianness (bit order) is retained

b) Design where the endianness is reversed

Q2: Design a system which has an array of memory in registers, with 4 rows of words, with a word length of 16 bits. You can assume the existence of an 8-bit register as a primitive component you just draw as a box. (E.g. lecture 9 slide 26)

a) Design a system that will transfer data from any selected row into a shift register of the word size, preserving endianness.

b) Design a system that will transfer data from any selected row into a shift register of the word size that reverses byte ordering but not endianness

c) Design a system that will transfer data from any selected row that will transfer data into a shift register that reverses both byte order and endianness

Q3. Explain why loose timings on RAM memory might be useful in a multicore environment. If you know how to do a timing diagram that could be useful but you can also explain the concept. Assume that transferring data from any core to any other core could take at least one clock pulse.

Q4. Assume the speed of electricity in a copper wire is 2x10^8 m/s. Now assume you have a memory system with 3 levels of caches and main memory - hard disk, connected in the following way CPU - L1 -L2 -L3 - Main Memory - hard disk.

Assume that the fastest (L1) cache takes 0.5 ns per access from the CPU, the L2 cache 7ns from the L1, the L3 cache 40 ns from L2, RAM takes 160ns from L3, and a hard disk takes 2000 ns from RAM.

What is the maximum distance each of these components can be from the next one in the chain before they would need longer access times?

Just calculate how far electricity can travel in those access times (N.B. For physicists, ignore the concept of the speed of the wave versus speed of the electrons, for networking students, you can ignore nyquist and Shannon's theorems).

Q5. Compare the latency, single word, and 8 world read time of memory with the following properties, (I lifted this example from the 2 bestselling ddr4 memory kits on newegg.ca)

a) DDR4 - 2666 (PC4-21300) timings 16-18-18-35

DDR4 2400 (PC-19200) - timings 15-15-15-35

b) If you were to Improve the timings on this memory (e.g. reduce the timings to 14-16-16-35 and 13-13-13-35)how likely is it that you would be able to notice the performance improvement in a typical video game or regular office use scenario?

Reference no: EM13761254

Questions Cloud

Discuss the single most surprising or interesting thing : Develop a metaphor or simile that would help someone unfamiliar with microeconomics understand the basic ideas.
Describe how earned value can be used as a tool : Describe how earned value can be used as a tool for communicating project progress. Provide an example of how a performance index is used by a project manager to convey meaningful information to his or her stakeholders
Small business do to increase its customer retention rate : With a 70 percent customer retention rate (average for most U.S. firms according to the American Management Association), every $1 million of business in 2014 will grow to more than $4 million by 2024. If you retain 80 percent of your customers, the ..
Production run length for optimal production run quantity : Product X is a standard item in a firm’s inventory. Final assembly of the product is performed on an assembly line that is in operation every day. One component of product X (call it component A) is produced in another department. This department, wh..
Define transferring data from any core to any other core : Explain why loose timings on RAM memory might be useful in a multicore environment. If you know how to do a timing diagram that could be useful but you can also explain the concept. Assume that transferring data from any core to any other core c..
Summarize the influences of diversity within a workplace : Summarize the influences of diversity within a workplace
Minimize the risk of material misstatement : According to the text, to minimize the risk of material misstatement, auditors seek third- party verification of account balances by mailing customers their statements. Discuss the advantages of positive and negative confirmations, and ascertain w..
Total cost of servicing the warranties : (a) Prepare 2007 entries for Crow using the expense warranty approach. Assume that Crow estimates the total cost of servicing the warranties will be $120,000 for 2 years.
Corruption perceptions index is a comparative assessment : The corruption perceptions index (CPI) is a comparative assessment of integrity performance for a variety of countries. What is CPI? What is its purpose? What is the value of this index? What are the trends or similarities between countries with the ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explain why you would want each feature

Explain why you would want each feature. Do you need to include any other devices in this design?

  Convert the decimal fractions to binary

Convert the following decimal fractions to binary with a maximum of six places to the right of the binary point:

  Data execution protection

Data Execution Protection (DEP)

  Item number in the inventory

Write a console program that will ask the user for an item number in the inventory and display the name of that item. Stay in a loop so that the user may enter the item number multiple times. Use the letter E to exit the application. Show an error me..

  Design two level and-or and not circuit

Design a two level AND , OR ,NOT circuit for the following I/O priority circuit,when the ack input is true ack will be made true for the smallest j for which req is true.

  Find the error in the following pseudocode

Find the error in the following pseudocode

  What window events can a program handle

What window events can a program handle? Explain the difference between the WindowListener interface and the WindowAdapter.

  Privilege to e-mail addresses in discount warehouse database

Checkout clerk with ____ privileges to e-mail addresses in discount warehouse database could view addresses but not change them.

  You are expected to research the necessary commands

You are expected to research the necessary commands by themselves. There are numerous web sites available that discuss Linux networking. You are expected to list your sources of information for the different tasks.

  Determining contents of the register a

The hexadecimal form of a 3-byte instruction for SIC/XE is 010030. The opcode in the instruction is LDA. Indicate the contents of the register A in decimal.

  Create an array of numbers filled by the random number

Create an array of numbers filled by the random number generator. Determine the smallest, largest, average, and calculate the standard deviation. Allow the client to pick the size of the array to be used and allow the client to repeat the process ..

  The wireless technology company

The Wireless Technology Company

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd