SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Reg. No. :
M.E. DEGREE EXAMINATION, JUNE 2010
Second Semester
Applied Electronics
AP9222 — COMPUTER ARCHITECTURE AND PARALLEL PROCESSING
(Common to M.E-Computer and Communication, M.E-VLSI Design and
M.E-Embedded System Technologies)
(Regulation 2009)
Time : Three hours Maximum : 100 Marks
Answer ALL Questions
PART A — (10 × 2 = 20 Marks)
1. Define Bernstein conditions related to parallelism and dependence relations.
2. A workstation uses a 15-MHz processor with a claimed 10-MIPS rating to
execute a given program mix. What is the effective CPI of this computer
assuming a one-cycle delay for each memory access?
3. List the parameters used for evaluating parallel computations.
4. Topologically equivalent networks are those whose graph representations are
isomorphic with the same interconnection capabilities. Prove that the Omega
network is topologically equivalent to the Baseline network.
5. A two — level memory system has eight virtual pages on a disk to be mapped
into four page frames in the main memory. A certain program generated the
following page trace:
1,0,2,2,1,7,6,7,0,1,2,0,3,0,4,5,1,5,2,4,5,6,7,6,7,2,4,2,7,3,3,2,3
Show the successive virtual pages residing in the four page frames with
respect to the above trace using LRU replacement policy. Compute the hit ratio
in the main memory. Assume the page frames are initially empty.
6. State the two sufficient conditions to achieve sequential consistency in shared
memory access.
7. Why are MIMD, MPMD or SPMD control preferred over SIMD data
parallelism?
Question Paper Code: J7605315
315
315
J76052
8. Compare the advantages and disadvantages of chained directories for cache
coherence control in large-scale multiprocessor systems.
9. Bring out the differences in the message passing OS models.
10. Distinguish between spin locks and suspended locks for sole access Lou critical
section.
PART B — (5 × 16 = 80 Marks)
11. (a) (i) Analyze the data dependencies among the following statements in
the given program:
s1: Load RI, 1024
s2: Load R2, M(10)
s3: Add Rl, R2
s4: Store M(1024), R1
s5: Store M((R2)), 1024
where (Ri) means the content of register Ri and M(10) contains 64
initially.
(1) Draw a dependence graph to show all the dependencies.
(2) Are there any resource dependencies if only one copy of each
functional unit is available the CPU? (8)
(ii) Explain about the theoretical models of parallel computers used by
algorithm designers and chip developers. (8)
Or
(b) Characterize the architectural operations of SIMD and MIMD computers.
Distinguish between multiprocessors and multicomputer based on their
structures, resource sharing and interprocessor communications. Also
explain the differences among UMA, NUMA, COMA and NORMA
computers. (16)
12. (a) Explain the applicability and restrictions involved in using Amdhal’s law,
Guustafon’s law, Sun and Ni’s law to estimate the speedup performance
of an n-processor system compared with that of a single-processor system
ignoring all communication overheads. (16)
Or
(b) (i) Compare control flow, data flow and reduction computers in terms
of the program flow mechanism used. Comment on the advantages
and disadvantages of the above computer models. (8)
(ii) Explain the steps involved in calculating the grain size and
communication latency for multiplying two 2 × 2 matrices. (8)
315
315
315
J76053
13. (a) (i) Explain the difference between superscalar and VLIW architectures
in terms of hardware and software requirements. (8)
(ii) Consider a two level memory hierarchy M1 and M2. Denote the hit
ratio of MI as h. Let c1 and c2 be the costs per kilobyte, s1 and s2
the memory capacities, and t1 and t2 the access times respectively.
(8)
(1) Under what conditions will the average cost of the entire
memory approach c2.
(2) What is the effective memory access time of this hierarchy?
(3) Let r=t2/tl be the speed ratio of the two memories.
Let E=t1/ta be the access efficiency of the memory system.
Express E in terms of r and h.
(4) What is the required hit ratio h to make E>0.95 if r=l00?
Or
(b) (i) Describe the daisy chaining and the distributed arbiter for bus
arbitration on a multiprocessor system. State the advantages and
shortcomings of each from both the implementational and
operational points of view. (8)
(ii) Consider the following three interleaved memory designs for a main
memory system with 16 memory modules. Each module is assumed
to have a capacity of 1Mbyte. The machine is byte-addressable.
Design I: 16- way interleaving with one memory bank
Design 2: 8-way interleaving with two memory banks.
Design 3: 4 way interleaving with four memory banks.
(1) Specify the address formats for each of the above memory
organizations.
(2) Determine the maximum memory bandwidth obtained if only
one memory module fails in each of the above memory
organizations.
(3) Comment on the relative merits of the three interleaved
memory organizations. (8)
14. (a) (i) Why are fine-grain processors chosen for future multiprocessors
over medium-grain processors used in the past? From scalability
point of view why is fine-grain parallelism more appealing than
medium-grain or coarse-grain parallelism for building MPP
systems? (8)
(ii) Compare the connection machines CM-2 and CM-5 in their
architectures, operation modes, functional capabilities and potential
performance. Comment on the improvement made in CM-5 over
CM-2 from the viewpoints of a computer architect and a machine
programmer. (8)
Or
315
315
315
J76054
(b) (i) Prove that the greedy algorithm for multicast routing on a
wormhole routed hypercube network always yields the minimum
network traffic and minimum distance from the source to any of the
destinations. (6)
(ii) Consider the following reservation table for a four stage pipeline
with a clock cycle r = 20 ns.
1 2 3 4 5 6
S1 X X
S2 X X
S3 X
S4 X X
One non-compute delay stage into the pipeline can be inserted to make a
latency of 1 permissible in the shortest greedy cycle. The purpose is to
yield a new reservation table leading to an optimal latency equal to the
upper bound. (10)
(1) Show the modified reservation table with five rows and seven
columns.
(2) Draw the state transition diagram for the optimal cycle.
(3) List all the simple and greedy cycles from the state diagram.
(4) Prove that the new MAL equals the lower bound.
(5) What is the optimal throughput of this pipeline?
15. (a) (i) What is perfect decomposition? Discuss the differences in program
replication techniques on multi-computers as opposed to program
partitioning on multiprocessors. (8)
(ii) Explain the multiprocessor UNIX design goals in the areas of
compatibility, portability, address space, load balancing, parallel
I/O and network services. (8)
Or
(b) Explain loop transformation theory and discuss how it can be applied for
loop vectorization or Parallelization.
———————
315
315
315

Más contenido relacionado

La actualidad más candente

Iaetsd vlsi architecture for exploiting carry save arithmetic using verilog hdl
Iaetsd vlsi architecture for exploiting carry save arithmetic using verilog hdlIaetsd vlsi architecture for exploiting carry save arithmetic using verilog hdl
Iaetsd vlsi architecture for exploiting carry save arithmetic using verilog hdl
Iaetsd Iaetsd
 
Parallel algorithms
Parallel algorithmsParallel algorithms
Parallel algorithms
guest084d20
 

La actualidad más candente (19)

Tute
TuteTute
Tute
 
Report adders
Report addersReport adders
Report adders
 
DAOC: Stable Clustering of Large Networks
DAOC: Stable Clustering of Large NetworksDAOC: Stable Clustering of Large Networks
DAOC: Stable Clustering of Large Networks
 
Csa papers
Csa papersCsa papers
Csa papers
 
FPGA Implementation of Mix and Inverse Mix Column for AES Algorithm
FPGA Implementation of Mix and Inverse Mix Column for AES AlgorithmFPGA Implementation of Mix and Inverse Mix Column for AES Algorithm
FPGA Implementation of Mix and Inverse Mix Column for AES Algorithm
 
Multiplier and Accumulator Using Csla
Multiplier and Accumulator Using CslaMultiplier and Accumulator Using Csla
Multiplier and Accumulator Using Csla
 
Parallel bfs using 2 stacks
Parallel bfs using 2 stacksParallel bfs using 2 stacks
Parallel bfs using 2 stacks
 
A high performance fir filter architecture for fixed and reconfigurable appli...
A high performance fir filter architecture for fixed and reconfigurable appli...A high performance fir filter architecture for fixed and reconfigurable appli...
A high performance fir filter architecture for fixed and reconfigurable appli...
 
Future semantic segmentation with convolutional LSTM
Future semantic segmentation with convolutional LSTMFuture semantic segmentation with convolutional LSTM
Future semantic segmentation with convolutional LSTM
 
Ramya Project
Ramya ProjectRamya Project
Ramya Project
 
Iaetsd vlsi architecture for exploiting carry save arithmetic using verilog hdl
Iaetsd vlsi architecture for exploiting carry save arithmetic using verilog hdlIaetsd vlsi architecture for exploiting carry save arithmetic using verilog hdl
Iaetsd vlsi architecture for exploiting carry save arithmetic using verilog hdl
 
High performance nb-ldpc decoder with reduction of message exchange
High performance nb-ldpc decoder with reduction of message exchange High performance nb-ldpc decoder with reduction of message exchange
High performance nb-ldpc decoder with reduction of message exchange
 
Implementation of Low Power and Area-Efficient Carry Select Adder
Implementation of Low Power and Area-Efficient Carry Select AdderImplementation of Low Power and Area-Efficient Carry Select Adder
Implementation of Low Power and Area-Efficient Carry Select Adder
 
Parallel algorithms
Parallel algorithmsParallel algorithms
Parallel algorithms
 
Question bank 15cs34 co
Question bank 15cs34  coQuestion bank 15cs34  co
Question bank 15cs34 co
 
L5 Adders
L5 AddersL5 Adders
L5 Adders
 
COUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSOR
COUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSORCOUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSOR
COUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSOR
 
Otl 552 model
Otl 552 modelOtl 552 model
Otl 552 model
 
Energy Efficient Full Adders for Arithmetic Applications Based on GDI Logic
Energy Efficient Full Adders for Arithmetic Applications Based on GDI LogicEnergy Efficient Full Adders for Arithmetic Applications Based on GDI Logic
Energy Efficient Full Adders for Arithmetic Applications Based on GDI Logic
 

Similar a ca-ap9222-pdf

IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docxIFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
scuttsginette
 
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
D I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{WwwD I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{Www
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
guest3f9c6b
 
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
Derryck Lamptey, MPhil, CISSP
 

Similar a ca-ap9222-pdf (20)

Capp nov dec2012
Capp nov dec2012Capp nov dec2012
Capp nov dec2012
 
1st Semester M Tech Computer Science and Engg (Dec-2013) Question Papers
1st Semester M Tech Computer Science and Engg  (Dec-2013) Question Papers 1st Semester M Tech Computer Science and Engg  (Dec-2013) Question Papers
1st Semester M Tech Computer Science and Engg (Dec-2013) Question Papers
 
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docxIFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
 
2nd Semester M Tech: Structural Engineering (June-2015) Question Papers
2nd  Semester M Tech: Structural Engineering  (June-2015) Question Papers2nd  Semester M Tech: Structural Engineering  (June-2015) Question Papers
2nd Semester M Tech: Structural Engineering (June-2015) Question Papers
 
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
 
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
D I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{WwwD I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{Www
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
 
8th Semester Computer Science (2013-June) Question Papers
8th Semester Computer Science (2013-June) Question Papers8th Semester Computer Science (2013-June) Question Papers
8th Semester Computer Science (2013-June) Question Papers
 
Dsp ic(2) jan 2013
Dsp ic(2) jan 2013Dsp ic(2) jan 2013
Dsp ic(2) jan 2013
 
Ec8791 model new
Ec8791 model newEc8791 model new
Ec8791 model new
 
Parallel Processing Concepts
Parallel Processing Concepts Parallel Processing Concepts
Parallel Processing Concepts
 
Cs 68
Cs 68Cs 68
Cs 68
 
shashank_mascots1996_00501002
shashank_mascots1996_00501002shashank_mascots1996_00501002
shashank_mascots1996_00501002
 
7th Semester (June; July-2015) Computer Science and Information Science Engin...
7th Semester (June; July-2015) Computer Science and Information Science Engin...7th Semester (June; July-2015) Computer Science and Information Science Engin...
7th Semester (June; July-2015) Computer Science and Information Science Engin...
 
All nsbm exam papers
All nsbm exam papersAll nsbm exam papers
All nsbm exam papers
 
Qb ar college
Qb ar collegeQb ar college
Qb ar college
 
Lightweight hamming product code based multiple bit error correction coding s...
Lightweight hamming product code based multiple bit error correction coding s...Lightweight hamming product code based multiple bit error correction coding s...
Lightweight hamming product code based multiple bit error correction coding s...
 
ICT III - MPMC - Answer Key.pdf
ICT III - MPMC - Answer Key.pdfICT III - MPMC - Answer Key.pdf
ICT III - MPMC - Answer Key.pdf
 
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
 
Comprehensive Performance Evaluation on Multiplication of Matrices using MPI
Comprehensive Performance Evaluation on Multiplication of Matrices using MPIComprehensive Performance Evaluation on Multiplication of Matrices using MPI
Comprehensive Performance Evaluation on Multiplication of Matrices using MPI
 
III EEE-CS2363-Computer-Networks-important-questions-for-unit-3-unit-4-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-3-unit-4-for-ma...III EEE-CS2363-Computer-Networks-important-questions-for-unit-3-unit-4-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-3-unit-4-for-ma...
 

Más de SRI TECHNOLOGICAL SOLUTIONS

Más de SRI TECHNOLOGICAL SOLUTIONS (20)

Request for-new-pan-card-or-and-changes-or-correction-in-pan-data-form
Request for-new-pan-card-or-and-changes-or-correction-in-pan-data-formRequest for-new-pan-card-or-and-changes-or-correction-in-pan-data-form
Request for-new-pan-card-or-and-changes-or-correction-in-pan-data-form
 
Ieee 2020
Ieee 2020Ieee 2020
Ieee 2020
 
4
44
4
 
Testing of vlsi circuits jan2012
Testing of vlsi circuits jan2012Testing of vlsi circuits jan2012
Testing of vlsi circuits jan2012
 
Testing of vlsi circuits dec 2013
Testing of vlsi circuits dec 2013Testing of vlsi circuits dec 2013
Testing of vlsi circuits dec 2013
 
Physical design vlsi circuits jan 2013
Physical design vlsi circuits jan 2013Physical design vlsi circuits jan 2013
Physical design vlsi circuits jan 2013
 
Physical design dec2013
Physical design dec2013Physical design dec2013
Physical design dec2013
 
Embedded systems dec 2013
Embedded systems dec 2013Embedded systems dec 2013
Embedded systems dec 2013
 
Cad for vlsi circuits june 2012
Cad for vlsi circuits june 2012Cad for vlsi circuits june 2012
Cad for vlsi circuits june 2012
 
Cad for vlsi circuits dec2013
Cad for vlsi circuits dec2013Cad for vlsi circuits dec2013
Cad for vlsi circuits dec2013
 
Asic june2012
Asic june2012Asic june2012
Asic june2012
 
Asic dec 2013
Asic dec 2013Asic dec 2013
Asic dec 2013
 
Asic dec 2010
Asic dec 2010Asic dec 2010
Asic dec 2010
 
Testing of vlsi circuits june2012
Testing of vlsi circuits june2012Testing of vlsi circuits june2012
Testing of vlsi circuits june2012
 
Dsp ic(3) jan 2013
Dsp ic(3) jan 2013Dsp ic(3) jan 2013
Dsp ic(3) jan 2013
 
Dsp ic(1) jan 2013
Dsp ic(1) jan 2013Dsp ic(1) jan 2013
Dsp ic(1) jan 2013
 
Dsp ic june2013 (3)
Dsp ic june2013 (3)Dsp ic june2013 (3)
Dsp ic june2013 (3)
 
Dsp ic june2013 (2)
Dsp ic june2013 (2)Dsp ic june2013 (2)
Dsp ic june2013 (2)
 
Dsp ic june2013 (1)
Dsp ic june2013 (1)Dsp ic june2013 (1)
Dsp ic june2013 (1)
 
Cad for vlsi design june2013 (3)
Cad for vlsi design june2013 (3)Cad for vlsi design june2013 (3)
Cad for vlsi design june2013 (3)
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

ca-ap9222-pdf

  • 1. Reg. No. : M.E. DEGREE EXAMINATION, JUNE 2010 Second Semester Applied Electronics AP9222 — COMPUTER ARCHITECTURE AND PARALLEL PROCESSING (Common to M.E-Computer and Communication, M.E-VLSI Design and M.E-Embedded System Technologies) (Regulation 2009) Time : Three hours Maximum : 100 Marks Answer ALL Questions PART A — (10 × 2 = 20 Marks) 1. Define Bernstein conditions related to parallelism and dependence relations. 2. A workstation uses a 15-MHz processor with a claimed 10-MIPS rating to execute a given program mix. What is the effective CPI of this computer assuming a one-cycle delay for each memory access? 3. List the parameters used for evaluating parallel computations. 4. Topologically equivalent networks are those whose graph representations are isomorphic with the same interconnection capabilities. Prove that the Omega network is topologically equivalent to the Baseline network. 5. A two — level memory system has eight virtual pages on a disk to be mapped into four page frames in the main memory. A certain program generated the following page trace: 1,0,2,2,1,7,6,7,0,1,2,0,3,0,4,5,1,5,2,4,5,6,7,6,7,2,4,2,7,3,3,2,3 Show the successive virtual pages residing in the four page frames with respect to the above trace using LRU replacement policy. Compute the hit ratio in the main memory. Assume the page frames are initially empty. 6. State the two sufficient conditions to achieve sequential consistency in shared memory access. 7. Why are MIMD, MPMD or SPMD control preferred over SIMD data parallelism? Question Paper Code: J7605315 315 315
  • 2. J76052 8. Compare the advantages and disadvantages of chained directories for cache coherence control in large-scale multiprocessor systems. 9. Bring out the differences in the message passing OS models. 10. Distinguish between spin locks and suspended locks for sole access Lou critical section. PART B — (5 × 16 = 80 Marks) 11. (a) (i) Analyze the data dependencies among the following statements in the given program: s1: Load RI, 1024 s2: Load R2, M(10) s3: Add Rl, R2 s4: Store M(1024), R1 s5: Store M((R2)), 1024 where (Ri) means the content of register Ri and M(10) contains 64 initially. (1) Draw a dependence graph to show all the dependencies. (2) Are there any resource dependencies if only one copy of each functional unit is available the CPU? (8) (ii) Explain about the theoretical models of parallel computers used by algorithm designers and chip developers. (8) Or (b) Characterize the architectural operations of SIMD and MIMD computers. Distinguish between multiprocessors and multicomputer based on their structures, resource sharing and interprocessor communications. Also explain the differences among UMA, NUMA, COMA and NORMA computers. (16) 12. (a) Explain the applicability and restrictions involved in using Amdhal’s law, Guustafon’s law, Sun and Ni’s law to estimate the speedup performance of an n-processor system compared with that of a single-processor system ignoring all communication overheads. (16) Or (b) (i) Compare control flow, data flow and reduction computers in terms of the program flow mechanism used. Comment on the advantages and disadvantages of the above computer models. (8) (ii) Explain the steps involved in calculating the grain size and communication latency for multiplying two 2 × 2 matrices. (8) 315 315 315
  • 3. J76053 13. (a) (i) Explain the difference between superscalar and VLIW architectures in terms of hardware and software requirements. (8) (ii) Consider a two level memory hierarchy M1 and M2. Denote the hit ratio of MI as h. Let c1 and c2 be the costs per kilobyte, s1 and s2 the memory capacities, and t1 and t2 the access times respectively. (8) (1) Under what conditions will the average cost of the entire memory approach c2. (2) What is the effective memory access time of this hierarchy? (3) Let r=t2/tl be the speed ratio of the two memories. Let E=t1/ta be the access efficiency of the memory system. Express E in terms of r and h. (4) What is the required hit ratio h to make E>0.95 if r=l00? Or (b) (i) Describe the daisy chaining and the distributed arbiter for bus arbitration on a multiprocessor system. State the advantages and shortcomings of each from both the implementational and operational points of view. (8) (ii) Consider the following three interleaved memory designs for a main memory system with 16 memory modules. Each module is assumed to have a capacity of 1Mbyte. The machine is byte-addressable. Design I: 16- way interleaving with one memory bank Design 2: 8-way interleaving with two memory banks. Design 3: 4 way interleaving with four memory banks. (1) Specify the address formats for each of the above memory organizations. (2) Determine the maximum memory bandwidth obtained if only one memory module fails in each of the above memory organizations. (3) Comment on the relative merits of the three interleaved memory organizations. (8) 14. (a) (i) Why are fine-grain processors chosen for future multiprocessors over medium-grain processors used in the past? From scalability point of view why is fine-grain parallelism more appealing than medium-grain or coarse-grain parallelism for building MPP systems? (8) (ii) Compare the connection machines CM-2 and CM-5 in their architectures, operation modes, functional capabilities and potential performance. Comment on the improvement made in CM-5 over CM-2 from the viewpoints of a computer architect and a machine programmer. (8) Or 315 315 315
  • 4. J76054 (b) (i) Prove that the greedy algorithm for multicast routing on a wormhole routed hypercube network always yields the minimum network traffic and minimum distance from the source to any of the destinations. (6) (ii) Consider the following reservation table for a four stage pipeline with a clock cycle r = 20 ns. 1 2 3 4 5 6 S1 X X S2 X X S3 X S4 X X One non-compute delay stage into the pipeline can be inserted to make a latency of 1 permissible in the shortest greedy cycle. The purpose is to yield a new reservation table leading to an optimal latency equal to the upper bound. (10) (1) Show the modified reservation table with five rows and seven columns. (2) Draw the state transition diagram for the optimal cycle. (3) List all the simple and greedy cycles from the state diagram. (4) Prove that the new MAL equals the lower bound. (5) What is the optimal throughput of this pipeline? 15. (a) (i) What is perfect decomposition? Discuss the differences in program replication techniques on multi-computers as opposed to program partitioning on multiprocessors. (8) (ii) Explain the multiprocessor UNIX design goals in the areas of compatibility, portability, address space, load balancing, parallel I/O and network services. (8) Or (b) Explain loop transformation theory and discuss how it can be applied for loop vectorization or Parallelization. ——————— 315 315 315