Define transferring data from any core to any other core

Assignment Help Basic Computer Science
Reference no: EM13761254

Q1: Design a system with 2 4-bit shift registers with a bus (single wire) connecting the two.

a) Design the system so that the endianness (bit order) is retained

b) Design where the endianness is reversed

Q2: Design a system which has an array of memory in registers, with 4 rows of words, with a word length of 16 bits. You can assume the existence of an 8-bit register as a primitive component you just draw as a box. (E.g. lecture 9 slide 26)

a) Design a system that will transfer data from any selected row into a shift register of the word size, preserving endianness.

b) Design a system that will transfer data from any selected row into a shift register of the word size that reverses byte ordering but not endianness

c) Design a system that will transfer data from any selected row that will transfer data into a shift register that reverses both byte order and endianness

Q3. Explain why loose timings on RAM memory might be useful in a multicore environment. If you know how to do a timing diagram that could be useful but you can also explain the concept. Assume that transferring data from any core to any other core could take at least one clock pulse.

Q4. Assume the speed of electricity in a copper wire is 2x10^8 m/s. Now assume you have a memory system with 3 levels of caches and main memory - hard disk, connected in the following way CPU - L1 -L2 -L3 - Main Memory - hard disk.

Assume that the fastest (L1) cache takes 0.5 ns per access from the CPU, the L2 cache 7ns from the L1, the L3 cache 40 ns from L2, RAM takes 160ns from L3, and a hard disk takes 2000 ns from RAM.

What is the maximum distance each of these components can be from the next one in the chain before they would need longer access times?

Just calculate how far electricity can travel in those access times (N.B. For physicists, ignore the concept of the speed of the wave versus speed of the electrons, for networking students, you can ignore nyquist and Shannon's theorems).

Q5. Compare the latency, single word, and 8 world read time of memory with the following properties, (I lifted this example from the 2 bestselling ddr4 memory kits on newegg.ca)

a) DDR4 - 2666 (PC4-21300) timings 16-18-18-35

DDR4 2400 (PC-19200) - timings 15-15-15-35

b) If you were to Improve the timings on this memory (e.g. reduce the timings to 14-16-16-35 and 13-13-13-35)how likely is it that you would be able to notice the performance improvement in a typical video game or regular office use scenario?

Reference no: EM13761254

Questions Cloud

Discuss the single most surprising or interesting thing : Develop a metaphor or simile that would help someone unfamiliar with microeconomics understand the basic ideas.
Describe how earned value can be used as a tool : Describe how earned value can be used as a tool for communicating project progress. Provide an example of how a performance index is used by a project manager to convey meaningful information to his or her stakeholders
Small business do to increase its customer retention rate : With a 70 percent customer retention rate (average for most U.S. firms according to the American Management Association), every $1 million of business in 2014 will grow to more than $4 million by 2024. If you retain 80 percent of your customers, the ..
Production run length for optimal production run quantity : Product X is a standard item in a firm’s inventory. Final assembly of the product is performed on an assembly line that is in operation every day. One component of product X (call it component A) is produced in another department. This department, wh..
Define transferring data from any core to any other core : Explain why loose timings on RAM memory might be useful in a multicore environment. If you know how to do a timing diagram that could be useful but you can also explain the concept. Assume that transferring data from any core to any other core c..
Summarize the influences of diversity within a workplace : Summarize the influences of diversity within a workplace
Minimize the risk of material misstatement : According to the text, to minimize the risk of material misstatement, auditors seek third- party verification of account balances by mailing customers their statements. Discuss the advantages of positive and negative confirmations, and ascertain w..
Total cost of servicing the warranties : (a) Prepare 2007 entries for Crow using the expense warranty approach. Assume that Crow estimates the total cost of servicing the warranties will be $120,000 for 2 years.
Corruption perceptions index is a comparative assessment : The corruption perceptions index (CPI) is a comparative assessment of integrity performance for a variety of countries. What is CPI? What is its purpose? What is the value of this index? What are the trends or similarities between countries with the ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  You enable completeonly specific input element true or false

You can enable auto complete only for specific input element. True or False

  Enforcing mandatory access control environment

Users dont seem to understand that they need to handle certain documents with more care and control than others. Which of the following will improve this situation?

  A relational database model

A relational Database Model allows database users to analyze data thoroughly.

  Create an object-oriented java web application

Create an object-oriented Java Web application that: a. displays the entire product inventory to the screen, including the product ID, name, description, and quantity. b. allows for a product to be searched by the product ID or product name.

  Understanding of computer hardware

The purpose of this assignment is for you to test your understanding of computer hardware, compatible architecture, and system requirements. You will design your own computer by selecting parts from the website NewEgg.com. You will be given a budget ..

  Why are timestamps used in the kerberos protocol

1. Why are timestamps used in the Kerberos protocol?

  Describe the key characteristics of a whistleblower

Describe the key characteristics of a whistleblower, and briefly summarize one (1) researched instance of whistleblowing in one (1) publicly traded company within the last 12 months. Include the details of the issue that the whistleblower reporte..

  Alternative donation scenario

Another alternative donation scenario is to deposit $25,000 now in a savings account with a guaranteed rate of return of 5% per year compounded monthly.

  Identify organizations that may be susceptible

Acts considered cyberterrorism and / or information warfare can be divided into four separate categories; infrastructure attacks, information attacks, technological facilitation, and promotion.

  Creat an intrest account for amazon

Write a program with subclass InterestAccount and CDAccount. The driver program (Account.java) must perform following transactions.

  Explain the differences between server-side and client

3. Logic is a key factor in laying out the processes for programming a game/application/website. Explain why logic is an important part of OOP.

  Which structure best for the storyboard created

Case 2-3 Michael wants to create a Website based on his famous cooking show. He would like to provide instructions on how to create some of his favorite dishes. He would like his recipes to be displayed in very simple, step by step pages. Which st..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd