CS2253 - Computerorganization Architecture-Qb
CS2253 - Computerorganization Architecture-Qb
PART A QUESTIONS
UNIT-I
1 .What is cache memory?
The small and fast RAM units are called as caches. When the execution of an instruction
calls for data located in main memory, the data are fetched and a copy is placed in the
cache. Later if the same data is required it is read directly from the cache.
2. What is the function of ALU?
Most of the computer operations(arithmetic and logic)are performed in ALU. The data
required for the operation is brought by the processor and the operation is performed by
ALU.
3. What is the function of CU?
The control unit acts as the nerve center, that coordinates all the computer operations. It
issues timing signals that governs the data transfer.
4. What are the basic operations of a computer?
The basic operations are READ and WRITE.
5. What are the registers generally contained in the processor?
MAR-memory address register
MDR-memory data register
IR-Instruction Register
RO-Rn-General purpose register
PC-Program counter
6. What are the steps in executing the program?
1.fetch
2.decode
3.execute
4.store
7. Define interrupt and ISR?
An interrupt is a request from an I/O device for service by the processor. The processor
provides the requested service by executing the interrupt service routine.
1
8. Define bus?
A group of lines that serves as a connecting path for several devices is called a bus.
9. What is the use of buffer register?
The buffer register is used to avoid speed mismatch between the I/O device and the
processor.
10. Compare single bus structure and multiple bus structure?
A system that contains only one bus(i.e only one transfer at a time) is called as a single
bus structure. A system is called as multiple bus structure if it contains multiple buses.
11. What is system software? Give an example.
It is a collection of program that are executed as needed to perform functions such as
I.
receiving and interpreting user commands
II.
entering and editing application programs and storing them as files in
secondary storage devices.
Eg. assembler, linker, compiler etc
12. What is application software? Give example.
Application programs are usually written in a high level programming language, in which
the programmer specifies mathematical or text processing operations. These operations
are described in a format that is independent of the particular computer used to execute
the program.
Ex: C,C++,JAVA
13. What is compiler?
A system software program called a compiler translates the high-level language program
into a suitable machine language program containing instruction such as the Add and
Load instructions.
14. what is text editor?
It is used for entering and editing application programs. The user of this program
interactively executes command that allow statements of a source program entered at a
keyboard to be accumulated in a file.
15. Discuss about OS as system software?
OS is a large program or actually a collection of routines, that is used to control the
sharing of and interaction among various computer units as they execute application
programs. The OS routines perform the tasks required to assign computer resources to
individual application programs.
2
UNIT II
1. Explain MDR and MAR.
The data and address lines of the external memory bus connected to the internal processor
bus via the memory data register, MDR,and the memory address register , MAR,
respectively. Register MDR has two inpits and two outputs. Data may be loaded into
MDR either from the memory bus or from the internal processor bus the data stored in
MDR may be placed on either bus. The input of MAR is connected to the internal bus
and its output is connected to the external bus.
2. Name two special purpose registers.
Index register
Stack pointer
3. Define data path.
The registers, the ALU, and the interconnecting bus are collectively referred to as the data
path.
4. Define processor clock.
Processor clock is defined as the time periods in which all operations and data transfer
with in the processor take place.
5. What is known as multiphase clocking?
When edge-triggered flip flops are not used, two or more clock signals may be needed to
guarantee proper transfer of data. This is known as multiphase clocking.
6. Define MFC.
To accommodate the variability in response time, the processor waits until it receives an
indication that the requested read operation has been completed. The control signal used
for this purpose is known as memory-function-completed(MFC).
7. What is WMFC?
WMFC if the control signal that causes the processors control circuitry to wait for the
arrival of the MFC signal.
8. What is meant by branch instruction?
A branch instruction is an instruction which replaces the contents of the PC with
the branch target address. This address is usually obtained by adding offset X, which is
given in the branch instruction is called a branch delay slot.
6
Hardwired control
Microprogrammed control
Vertical organization
Highly encoded schemes.
Horizontal organization
Minimally encoded schemes.
control signals.
The micro program shows that branches are not always made to a single branch
address. This is a direct consequence of combining simple micro routines by sharing
common parts. Consider a point in the microprogram sequencing. At this point, it is
necessary to choose between actions required by direct and indirect addressing modes. If
the indirect mode is specified in the instruction, then the microinstruction in the location
170 is performed to fetch the operand from the memory. If the direct mode is specified,
this fetch must be bypassed by branching immediately to location 171. the most efficient
way to bypass microinstruction 170 is to have the preceding branch microinstructions
specify the address 170 and then use an OR gate change the least significant bit of this
address to 1 if the direct addressing mode is involved. This is known as the bit-O-ring
technique for modifying branch address.
23. What is the draw back of micro programmed control?
It leads to a slower operating speed because of the time it takes to fetch
microinstructions from the control store.
24. Define emulation.
Given a computer with a certain instruction set, it is possible to define additional
machine instructions and implement them with extra micro routines. Emulation allows us
to replace obsolete equipment with more up to date machines. If the replacement
computer fully emulates the original one, then no software changes have to be made to
run existing programs. Thus, emulation facilitates transitions to new computer systems
with minimal distribution.
UNIT III
1. Define pipelining.
Pipelining is an effective way of organizing concurrent activity in a computer
system. The processor executes the program by fetching and executing instructions, one
after another.
2. What are the major characteristics of a pipeline?
Decode
Execute
Write
10
Any condition that causes the pipeline to stall is called a hazard. A data hazard is
any condition in which either the source or destination operands of instruction are not
available at the time expected in the pipeline. As a result some operation has to be
delayed, and the pipeline stalls.
8. What are instruction hazards?
The pipeline may also be stalled because of a delay in the availability of an
instruction. For example, this may be a result of a miss in the cache, requiring the
instruction to be fetched from the main memory. Such hazards are often called control
hazards or instruction hazards.
9. What are called stalls?
An alternative representation of the operation of a pipeline in the case of a cache
miss gives the function performed by each pipeline stage in each clock cycle. The periods
in which the decode unit, execute unit and the write unit are idle are called stalls. They
are also referred to as bubbles in the pipeline.
10. What is structural hazard?
Structural hazard is the situation when two instructions require the use of a given
hardware resource at the same time. The most common case in which this hazard may
arise is in access to memory.
11. What is said to be side effect?
When a location other than one explicitly named in an instruction as a destination
operand is affected, the instruction is said to have a side effect.
12. What is dispatch unit?
A separate unit which we call the dispatch unit takes instructions from the front of
the queue and sends them to the execution unit. The dispatch unit also performs the
decoding function.
The instruction fetch unit has executed the branch instruction concurrently with
the execution of other instructions. This technique is referred to a branch folding.
14. What are the two types of branch prediction techniques available?
Ans: The two types of branch prediction techniques are
1) Static branch prediction
2) Dynamic branch prediction
15. What is delayed branching?
A technique called delayed branching can minimize the penalty incurred as a
result of conditional branch instructions. The idea is simple. The instructions in the delay
slots are always fetched. Therefore, we would like to arrange for them to be fully
executed whether or not the branch is taken. The objective is to be able to place useful
instructions in these slots. If no useful instructions can be placed in the delay slots, these
slots must be filled with NOP instructions.
16. Define speculative execution.
Speculative execution means that instructions are executed before the processor is
certain that they are in the correct execution sequence. Hence, care must be taken that no
processor registers or memory locations are updated until it is confirmed that these
instructions should indeed be executed. If the branch decision indicates otherwise, the
instructions and all their associated data in the execution units must be purged, and the
correct instruction fetched and executed.
17. What is called static and dynamic branch prediction?
The branch prediction decision is always the same every time a given instruction
is executed. Any approach that has this characteristic is called static branch prediction.
Another approach in which the prediction decision may change depending on execution
history is called dynamic branch prediction.
In many processors, the condition code flags are stored in the processor status
register. They are either set are cleared by many instructions, so that they can be tested by
subsequent conditional branch instructions to change the flow of program execution.
19. What are superscalar processors?
Several instructions start execution in the same clock cycle, and the processor is
said to use multiple issue. Such processors are capable of achieving an instruction
execution throughput of more than one instruction per cycle. They are known as
superscalar processors.
20. What is imprecise and precise exception?
Situation in which one or more of the succeeding instructions have been executed
to completion is called imprecise exception. Situation in which all subsequent
instructions that may have been partially executed are discarded. This is called a precise
exception.
21. What is commitment unit?
When out-of-order execution is allowed, a special control unit is needed to
guarantee in-order commitment. This is called the commitment unit. It uses queue called
the recorder buffer to determine which instruction should be committed next. Instructions
are entered in the queue strictly in program order as they are dispatched for execution.
22. What is a deadlock?
A deadlock is a situation that can arise when two units, A and B use a shared
resource. Suppose that unit B cannot complete its task until unit A completes its task. At
the same time, unit B has been assigned a resource that unit A needs. If this happens,
neither unit can complete its task. Unit A is waiting for the resource it needs, which is
being held by unit B at the same time, unit B is waiting for unit A to finish before it can
release that resource.
13
UNIT IV
1. What is the maximum size of the memory that can be used in a 16-bit computer
and 32 bit computer?
The maximum size of the memory that can be used in a 16-bit computer is 2
memory locations. The maximum size of the memory that can be used in a 32-bit
computer is 2 memory locations.
2.
the time that elapses between the initiation of an operation and the completion of that
operation
3. Define memory cycle time?
It is the time delay required between the initiations of two successive memory
operations.
Eg. The time between two successive read operations.
4. When is a memory unit called as RAM?
A memory unit is called as RAM if any location can be accessed for a read or
writes operation in some fixed amount of time that is independent of the locations
address.
5. What is MMU?
MMU is the Memory Management Unit. It is a special memory control circuit
used for implementing the mapping of the virtual address space onto the physical
memory.
6. Define memory cell?
A memory cell is capable of storing one bit of information. It is usually organized
in the form of an array.
7. What is a word line?
In a memory cell, all the cells of a row are connected to a common line called as
word line.
8.Define static memories?
Memories that consists of circuits capable of retaining their state as long as power
is applied is called static memories
14
Less density
Low cost
High density
15
STATIC RAM
They are fast
They are very expensive
They retain their state indefinitely
They require several transistors
Low density
DYNAMIC RAM
They are slow
They are less expensive
They do not retain their state indefinitely
They require less no transistors
High density
16
Faster
Less expensive
More Flexible
29. Why EPROM chips are mounted in packages that have transparent window?
Since the erasure requires dissipating the charges trapped in the transistors of
memory cells. This can be done by exposing the chip to UV light.
30. What are disadvantages of EPROM?
The chip must be physically removed from the circuit for reprogramming and its
entire contents are erased by the UV light.
17
2
3
4
FLASH DEVICES
It is possible to read the contents of a single cell,
EEPROM DEVICES
It is possible to read and
cells
Greater density which leads to higher capacity
Lower cost per bit
Consumes less power in their operations and
cell
Relatively lower density
Relatively more cost
Consumes more power
Processor
Cache
Main Memory
18
Analysis of program shows that many instructions ion localized areas of the
program are executed repeatedly during some time period, and the remainder of the
program, accessed relatively infrequently. This is referred to as locality of reference. This
property leads to the effectiveness of cache mechanism.
36. What are the two aspects of locality of reference? Define them.
Two aspects of locality of reference are temporal aspects and spatial aspect.
When a read miss occurs for a system with cache the required word may be sent
to the processor as soon as it is read from the main memory instead of loading in to the
cache. This approach is called load through or early restart and it reduces the processors
waiting period.
42. What are the mapping techniques?
Direct mapping
associative mapping
Set associative mapping
43. What is hit?
A successful access to data in cache memory is called hit.
44. Define hit rate?
The number of hit states as a fraction of all attempted access.
45. What are the two ways of constructing a larger module to mount flash chips on a
small card?
Flash cards
Flash drivers.
46. Describe the memory hierarchy.
The extra time needed to bring the desired information into the cache is called
miss penalty.
50. Define access time for magnetic disk.
The sum of seek time and rotational delay is called as access time for disks.
Seek Time:
Seek time is the time required to move the read/write head to the proper
track.
Rotational latency:
Rotational latency is the amount of time that elapses after the head is
positioned over the correct track until the stating position of the addressed sector
passes under the read/write head.
51. What is phase encoding or Manchestor encoding?
It is the technique for combining clock information with data. It is a scheme in
which changes in magnetization occur for each data bit. Its disadvantage is poor bitstorage density.
52. What is the formula for calculating the average access time experienced by the
processor?
T avg = h c + (1-h) M
Where
h- Hit Rate
M Miss Penalty
C Time to access information in the cache.
53. What is the formula for calculating the average access time experienced by the
processor in a system with two levels of cache?
T avg = h1 c1 +(1-h1) h2 c2 + (1-h1) (1-h2) M
h 1 Hit rate in L1 cache
h 2 Hit rate in L2 cache
c 1 Time to access information in the L1 cache
c 2 Time to access information in the L2 cache
Prefetch instructions are those instructions which can be inserted into a program
either by the programmer or by the compiler.
55. Define system space.
Management routines are part of the operating system of the computer. It is
convenient to assemble the OS routines into a virtual address space.
56. Define user space?
The system space is separated from virtual address space in which the user
application programs reside. The letter space is called user space.
57. What are pages?
All programs and date are composed of fixed length units called pages. Each
consists of blocks of words that occupy contiguous locations in main memory.
58. What is replacement algorithm?
When the cache is full and a memory word that is not in the cache is referenced,
the cache control hardware must decide which block should be removed to create space
for the new block that contains the reference word. The collection of rules for making this
decision constitutes the replacement algorithm.
59. What is write miss?
During the write operation if the addressed word is not in cache then said to be
write miss.
60. What is associative search?
The cost of an associative cache is higher that the cost of a direct mapped cache
because of the need to search all 128 bit tag patterns to determine whether a given block
is in the cache. A search of this kind is called an associative search.
61. What is virtual memory?
Technique that automatically move program and datablocks into the physical
main memory when they are required for execution are called as virtual memory.
62. What is virtual address?
The binary address that the processor used for either instruction or data called as
virtual address.
63. What is page frame?
22
An area in the main memory that can hold one page is called as page frame.
64. What is Winchester technology?
The disk and the read/write heads are placed in a sealed air-filtered enclosure
called Winchester technology.
65. What is a disk drive?
The electro mechanical mechanism that spins the disk and moves the read/write
heads called disk drive.
66. What is disk controller?
The electronic circuit that controls the operation of the disk called disk controller.
67. What is word count?
The number of words in the block to be transferred.
68. What is error checking?
It computes the error correcting code (ECC) value for the data read from the given
sector and compares it with the corresponding ECC value read from the disk.
69. What is booting?
When the power is turned on, the OS has to be loaded into the main memory
which is taken place as part of a process called booting. To initiate booting a tiny part of
main memory is implemented as a nonvolatile ROM.
70. Draw static RAM cell.
UNIT V
23
Interrupts
DMA
Ans: Synchronous buses are the ones in which each item is transferred during a time
slot(clock cycle) known to both the source and destination units. Synchronization can be
achieved by connecting both units to a common clock source.
15. Define asynchronous bus.
Ans: Asynchronous buses are the ones in which each item being transferred is
accompanied by a control signal that indicates its presence to the destination unit. The
destination can respond with another control signal to acknowledge receipt of the items.
16. What do you mean by memory mapped I/O?
Ans: In Memory mapped I/O, there are no specific input or output instructions. The CPU
can manipulate I/O data residing in interface registers with the same instructions that are
used to manipulate memory words i.e. the same set of instructions are used for reading
and writing memory can be used to input and output.
17. What is program-controlled I/O?
Ans: In program controlled I/O the processor repeatedly checks a status flags to achieve
the required synchronization between the processor and an input and output device.
18. Define interrupt.
Ans: An interrupt is any exceptional event that causes a CPUU to temporarily transfer
control from its current program to another program , an interrupt handler that services
the event in question.
19. Define exception.
Ans: The term exception is used to refer to any event that causes an interruption
20. What are the different methods used for handling the situation when multiple
interrupts occurs?
Ans: 1) Vectores interrupts
2) Interrupt nesting
3) Simultaneous Requests.
21. What is a privileged instruction?
Ans: To protect the operating system of a computer from being corrupted by user
programs, certain instructions can be executed only while the processor is in the
supervisor mode. These are called privileged instruction.
22. What is bus arbitration?
Ans: it is process by which the next device to become the bus master is selected and bus
mastership is transferred to it. There are two ways for doing this:
1. Centralized arbitration
2. Distributed arbitration.
23. What is port? What are the types of port available?
26
Ans: An I/O interface consists of circuitry required to connect an I/O device to computer
bus. One side consists of a data path with its associated controls to transfer data between
the interface and I/O device. This is called port. It is classified into:
1) Parallel port
2) Serial port.
24. What is a parallel port?
Ans: A parallel port transfers data in the form a number of bits, typically 8 to 16,
simultaneously to or from the device.
25. What is a serial port?
Ans: A serial port transfers and receives data one bit at a time.
26. What is PCI bus?
Ans: The Peripheral component interconnect(PCI) bus is a standard that supports the
functions found on a processor bus but in a standardized format that is independent of
any particular processor.
27. What is SCSI?
Ans: It is the acronym for small computer system interface. It refers to a standard bus
defined ANSI. Devices such as disks are connected to a computer via 50-wire cable,
which can be upto 25 meters in length and can transfer data at rate up to 55 megabytes/s.
28. Define USB.
Ans: The Universal Serial Bus(USB) is an industry standard developed to provide two
speed of operation called low-speed and full-speed. They provide simple, low cost and
easy to use interconnection system.
29. What are the objectives of USB?
Simple
Low cost
Easy to use
Supports wide range of data transfer characteristics
Plug and play mode of operation
30. What is time slicing?
With this technique each program runs for a short period called a time slice, and
then another program runs for its time slice and so on.
27
PART B QUESTIONS
UNIT-I
1. Explain the various addressing modes.
Register mode
Absolute mode
Immediate mode
Indirect mode
Indexed mode
Relative mode
Auto increment mode
Auto decrement mode
Processor clock
Pipelining and super scalar operation
Clock rate
Instruction set
Compiler
5. Explain in detail the data transfer between the memory & I/O unit.
Input unit
Output unit
ALU
CU
MU
UNIT-II
1. Give the basic organization of a micro programmed control unit. Draw a
flowchart of a
Micro routine for the instruction Add src, Rdst.
29
4. Describe the Hardwired control method for generating the control signals
Hints: Hard-wired control can be defined as sequential logic circuit that generates
specific sequences of control signal in response to externally supplied instruction
Refer page no. 425- 429
5. Draw the organization of a single bus processor and give the control sequences for
fetching a word from memory, storing a word in memory, executing a complete
instruction and unconditional branch.
Diagram
Control sequences
UNIT III
1. Explain the various types of hazards in pipelining.
Instruction hazard
Data hazard
Structural hazard
Control hazard
Explanation
Diagram
3. Give the organization of the internal data path of a processor that supports a 4stage pipeline for instructions and uses a 3- bus structure and discuss the same.
Hints: The speed of execution of programs can be improved by arranging the hardware
so that more than one operation can be performed at the same time.
Explain about the 4- stage pipeline.
Refer page no. 4556-459
For 3- bus structure refer page no. 479-481.
4. What is pipelining? What are the various hazards encountered in pipelining?
Explain in detail.
Hints: The major characteristics of a pipeline are:
a) Pipelining cannot be implemented on a single task, as it works by splitting multiple
tasks into a number of subtasks and operating on them simultaneously.
30
b) The speedup or efficiency achieved by suing a pipeline depends on the number of pipe
stages and the number of available tasks that can be subdivided.
c) If the task that can be subdivided has uneven length of execution times, then the
speedup of the pipeline is reduced.
d) Though the pipeline architecture does not reduce the time of execution of a single task,
it reduces the overall time taken for the entire job to get completed.
The various pipeline hazards are:
1. Data hazard
2. Structural Hazard
3. Control Hazard.
Refer page no. 459-476.
UNIT-IV
1. Write notes on semiconductor RAM memories
Internal organization of memory chips
Static memories
Asynchronous DRAMs
Synchronous DRAMs
2. Write notes on various types of ROMs.
ROM
PROM
EPROM
EEPROM
Flash memory
3. What are the various types of cache mapping mechanisms? Explain in detail.
Direct mapping
Associated mapping
Set associative mapping
Explanation
4. Describe the three mapping techniques used in cache memories with suitable
Example.
Hints: The cache memory is a fast memory that is inserted between the larger slower
main memory and the processor. It holds the currently active segments of a program and
their data.
i)
Associative mapping.
ii)
Direct mapping.
iii)
Set-associative mapping
Refer page no. 314-325
31
5. Explain with neat diagram the internal organization of bit cells in a memory
chip.
Hints: Memory cells are usually organized in the form of an array, in which each cell is
capable of storing one bit of information. Each row consists a memory word, and all cells
of a row are connected to a common line referred to as word line, which is driven by he
address decoder on the chip.
Refer Page no. 295-297.
6. Discuss the virtual memory management technique in detail
Hints: The data is to be stored in physical memory locations that have addresses different
from those specified by the program. The memory control circuitry translates the address
specified by the program into an address that can be used to access the physical memory.
Refer page no. 337-343
7. Explain the various secondary storage devices in detail.
Hints: The various secondary storage devices are:
1. Magnetic hard disks
2. Optical disks
3. Magnetic tape systems Refer page no. 344-359
8. What is memory interleaving? Explain with neat diagram.
Hints: The main memory of a computer is structure as a collection of physically separate
modules each with its own address buffer register and data buffer register, memory access
operations may proceed in more than one module at the same time. Thus the aggregate
rate of transmission of words to and from the main memory system can be increased.
Refer page no. 330-331
UNIT-V
1. Describe the data transfer method using DMA.
Hints: A modest increase in hardware enables an IO device to transfer a block of
information to or from memory without CPU intervention. This task requires the IO
device to generate memory addresses and transfer data through the bus using interface
controllers.
Vectored interrupt
33
Interrupt nesting
Simultaneous requests
Explanation
Explanation
Diagram
(8 Marks)
(8 Marks)
Page No. 26
(Or)
(b) What is instruction hazard? Explain the methods for dealing with the instruction
hazards.
(16 Marks)
Page No. 504
14. (a) (i) What are the different secondary storage devices? Elaborate on any one of
the devices.
(8 Marks)
Page No. 344
(ii) Explain how the virtual address is converted into real address in a paged virtual
memory system.
(8 Marks)
Page No. 337
(Or)
(b) (i) Explain approaches for addressing multiple- module memory systems with
suitable diagrams.
(6 Marks)
Page No.
(ii) Briefly describe magnetic disk principles and also the organization and accessing
of data on a disk.
(10 Marks)
Page No. 344
15. (a) (i) Describe the hardware mechanism for handling multiple interrupt
requests.
(8 Marks)
Page No. 9
(ii) What are handshaking signals? Explain the handshake control of data transfer
during input and output operation.
(8 Marks)
Page No. 244
(Or)
(b) (i) What are the needs for input- output interface? Explain the functions of a
typical 8- bit parallel interface in detail.
(10 Marks)
Page No. 454
(ii) Describe the USB architecture with the help of a neat diagram.
(6 Marks)
Page No. 2
B.E./B.Tech. DEGREE EXAMINATION,NOVEMBER/DECEMBER 2007.
Fourth Semester
(Regulation 2004)
CS1251- COMPUTER ARCHITECTURE
Time:Three hours
Maximum:100 marks
Answer ALL questions.
PART A-(10*2=20 marks)
1. A memory byte location contains the pattern 00101100.What does this pattern
represent when interpreted as a number? What does it represent as an ASCII
Code?
36
Interpreted number is 44
ACCII code is NULL/idle
2. What is the information conveyed by addressing modes?
The information conveyed by the addressing mode is to specify the location of an
operand in an instruction
3. Draw the full Adder circuit using two half adders.
4. What are the various ways of representing signed integers in the system?
5. What are the advantages and disadvantages of hardwired and micro
programmed control?
Advantages of hardwired control
i.operate at high speed
ii. each state of this counter corresponds to one control step
disadvantages
i.little flexibility
ii.complexity of the instruction set can implement is limited
advantages of microprogram control
i. control signals are generated by program itself
ii.high flexibility
disadvantages
i.slower operating speed
6. What is data hazard in pipelining? What are the solutions?
A data hazard is a situation in which the pipeline is stalled because the data to be
operated on are delayed for some reason.
The solution for data hazard is
i.operand forwading
ii. handled by software
iii. to stall
37
PART B-(5*16=80marks)
11
(a)
(i)
(ii)
(b)
(i)
(ii)
(iii)
12.
(a)
(i)
38
(b)
13.
(a)
(ii)
(i)
(ii)
(i)
(ii)
Draw the single bus and three bus organization of the data path
inside a processor. (4)
Page No: 412
Describe the organization of micro programmed control
unit. (4)
Page No: 429
(iii)
OR
(b)
(i)
(8)
Page No: 454
14.
(a)
(ii)
(i)
(8)
OR
Write notes on :
(i)
ROM Technologies.
(ii)
Memory Inter Leaving.
(iii)
Set associative mapping of cache.
(iv)
RAID Disk arrays.
(ii)
(b)
15.
(a)
(i)
(8)
(i)
(ii)
(b)
Time:Three hours
Maximum:100 marks
Answer ALL questions.
PART A-(10*2=20 marks)
40
Where T(m) is the execution time for some target workload on an m-stage pipeline.
T(l) is the execution time for some workload an a similar non pipelined processor.
6. State the differences between hardwired and micro programmed control unit.
Hardwired control
Microprogrammed control
--Execution is faster.
--Execution is slower.
--Modification is difficult.
--RISC machines
--CISC Machines.
41
(a)
(i)
(ii).
(b).
(i)
(ii)
12.
(a)
(9)
(i).
(ii)
(b)
(i).
(ii)
13
(a)
(i)
(8)
(b)
(ii)
(i)
(ii)
14.
(a)
(i).
(ii)
(b)
(i)
(ii)
15.
(a)
(i)
(ii).
(b)
(i)
(ii)
Time:Three hours
Maximum:100 marks
Answer ALL questions.
PART A-(10*2=20 marks)
i.
ii.
44
(a)
(b)
12.
(i)
(ii)
(i)
(12)
(4)
45
(b)
(ii)
(i)
(ii)
13.
(a)
(i)
What is branch hazard? Describe the methods for dealing with the
branch hazards.
(10)
Page No: 465
(ii)
14.
(b)
What is data hazard? Explain the methods for dealing with the data
hazards.
(16)
Page No : 461
(a)
(i)
(ii)
(b)
(i)
(ii)
15.
(a)
Draw the typical block diagram of a DMA controller and explain how it is
used for direct data transfer between memory and peripherals.
(16)
Page No: 234
Or
(b)
(i)
(ii)
(8)
Time:Three hours
Maximum:100 marks
Answer ALL questions.
PART A-(10*2=20 marks)
ii.
iii.
iv.
I/O transfer
3. Draw the symbolic representation of the full adder and give the expression for
the sum.
4. In confirming to the IEEE standard mention any four situations under which a
processor sets exception flag.
i.
Underflow
ii.
Overflow
47
iii.
Divide by zero
iv.
Invalid
ii.
iii.
iv.
48
PART B-(5*16=80marks)
11.
(a)
(i)
(ii)
(b)
12.
(a)
(i)
(ii)
(i)
(ii)
(10).
OR
(b)
13.
(a)
(i)
(ii)
49
(16)
(b)
14.
(a)
(i)
Explain the
unit. (8)
(ii)
(i)
(ii)
(b).
15.
(a)
(i)
(ii)
(i)
(ii)
(b)
(8)
Time:Three hours
Maximum:100 marks
Answer ALL questions.
PART A-(10*2=20 marks)
50
1. Give an example each of zero-address, one address, two-address, and threeaddress instructions.
i.
Zero address Instruction: locations of all operands are defined
implicitly
ii.
One address Instruction: Add A
iii.
Two address Instruction: Add A , B
iv.
Three address Instruction: Add A , B , C
2. Which data structures can be best supported using (a) indirect addressing
mode (b) indexed addressing mode?
(a) Indirect Addressing mode
Pointer data structure
(b) Indexed Addressing mode
Array data structure
3. What is the purpose of guard bits used in floating point operations?
The guard bits are the extra bits which is used to retain the intermediate
steps to increase the accuracy in the final result.
4. Give the booths recording and bit pair recording of the number
1000111101000101.
5. Why is the Wait-For-Memory-Function-Completed step needed when
reading from or writing to the main memory?
WMFC step is required for the write control signal / read control signal
caause the memory bus interface hardware to issue write command / read command
on the memory bus. The processor wait in this process until the memory operation is
completed and an WMFC response is received.
6. How do you control instructions like branch, cause problems in a pipelined
processor?
Pipelined processor gives the best throughput for sequenced line
instruction. In branch instruction, as it has to calculate the target address, whether the
instruction jump from one memory location to other. In the mean time, before
calculating the larger, the next sequence instructions are got into the pipelines, which
are rolled back when target is calculated.
7. What is the function of a TLB (translation look-aside buffer)?
A small cache called the TLB is interporated into MMU, which consists of
the page table entries that corresponding to the most recently accessed page.
8. An eight-way set-associative cache consists of a total of 256 blocks. The main
memory, contains 8192 blocks, each consisting of 128 words.
(a) How many bits are there in the main memory address?
(b) How many bits are there in the TAG, SET and WORD fields?
51
The main memory contains of 256 blocks and each block consists of 128
words.
(a) Total words in MM = 8192 * 128 = 1048576.
(b) To address 32768 words we require ( 2 20 = 1048576) 20 bits
9. Why are interrupt masks provided in any processor?
Interrupt mask enable the higher priority devices comes first and there for
lower priority devices comes last. The interrupt enable bits as a bit vector is called as
interrupt mask. Which enables / disables the devices according to the correct
configuration of the mask.
10. How does bus arbitration typically work?
i.
A bus master waiting to use the bus asserts by the bus request.
ii.
A bus master cannot be the bus until its request is granted.
iii.
A bus master must signal to the arbitor at the end of the bus utilization.
OR
(b) Explain in detail the working of a micro-programmed control unit. (16)
Page No: 429
14. (a) (i) Discuss the address translation mechanism and the different page
replacement policies used in virtual memory system.
(10)
Page No: 337
(ii) A byte addressable computer has a small data cache capable of holding
eight 32-bit words. Each cache block contains 132-bit word. When a
given program is executed, the processor reads data from the following
sequence of hex addresses 200, 204, 208, 20C, 2F4, 2F0, 200, 204,
218, 21C, 24C, 2F4. The pattern is repeated four times. Assuming that
the cache is initially empty, show the contents of the cache at the end of
each pass, and compute the hit rate for a direct mapped cache. (6)
OR
14 (b) (i) Discuss the various mapping schemes used in cache design.Comare the
schemes in terms of cost and performance.(10)
Page No: 316
(ii) Consider a two level cache with access times of 5 ns, and 8-0 ns
respectively.If the hit rates are 95%and 75% respectively in the two
caches,and the memory access time is 250ns,what is the average access
time?
15 (a) (i) Explain the use of vectored interrupts in processors.Why is priority
handling desired in interrupt controllers?How do the different priority
schemes work ? (10)
Page No: 208
(ii) Discuss the data transfer mechanism of the PCI bus.(6) Page No: 261
OR
(b) (i) Explain how data may be transferred from a hard disk to memory using
DMA including arbitration for the bus.Assume a synchronous bus,and
draw a timing diagram showing the data transfer.(10)
Page No: 234
(ii) Discuss the salient features of the USB operation(6) Page No: 272
53
54