Ia Iii - QP
Ia Iii - QP
Ia Iii - QP
HOD
PRINCIPAL
MISS RATIO:
The miss ratio is the fraction of accesses which are a miss. It holds that. miss rate=1hit
rate. miss rate = 1 hit rate . The (hit/miss) latency (AKA access time) is the time it takes to
fetch the data in case of a hit/miss.
8. Where is a TLB located and what does it contain?
A translation lookaside buffer (TLB) is a cache that memory management
hardware uses to improve virtual address translation speed.[1] The majority of desktop, laptop,
and server processors includes one or more TLBs in the memory management hardware, and it is
nearly always present in any hardware that utilizes paged or segmented virtual memory.
9. What is DMA? Mention its advantages.
Transfer of a block of data directly between an external device and main memory, with
out continuous intervention by the processor is called DMA.DMA allows a peripheral device to
read from/write to memory without going through the CPU. DMA allows for faster processing
since the processor can be working on something else while the peripheral can be populating
memory.
10. What is cycle stealing in DMA?
The processor originates most memory access cycles and the DMA controller can be
said to stael memory cyckles from the processor.This technique is known as cycle stealing.
Where is a TLB located and what does it contain?
PART B (16 5 = 80 marks)
11.a) Explain in detail the various components of computer system with neat diagram.
(16)
A computer can process data, pictures, sound and graphics. They can solve highly complicated problems quickly
and accurately. A computer as shown in Fig. performs basically five major computer operations or functions
irrespective of their size and make. These are
1) it accepts data or instructions by way of input,
2) it stores data,
3) it can process data as required by the user,
4) it gives results in the form of output, and
5) it controls all operations inside a computer.
FUNCTIONAL UNITS
In order to carry out the operations mentioned in the previous section the computer allocates the task between its
various functional units. The computer system is divided into three separate units for its operation. They are
1) arithmetic logical unit
2) control unit.
3) central processing unit.
(or)
b) State the CPU performance evaluation and discuss the factors that affect the performance.(16)
Computer performance is characterized by the amount of useful work accomplished by a
computer system or computer network compared to the time and resources used. Depending on the
context, high computerperformance may involve one or more of the following: Short response time for
a given piece of work.
CPU Performance Decomposed into Three Components:
Clock Frequency ()
Determined by technology and influenced by organization.
Clocks per Instruction (CPI) Determined by ISA, microarchitecture, compiler, and program.
Instruction Count (IC) Determined by program, compiler, and ISA.
These combined to form CPU Performance Equation tT = 1/ CPI IC , where tT denotes the
execution time.
(or)
b) With flowchart and numerical example, explain 32-bit Boolean number representation of
division Hardware.
(16)
13.a) With relevant diagram and expressions, explain the operation of carry look ahead adder.
(16)
(or)
(16)
14.a) Draw the typical block diagram of a DMA controller and explain how it is used for direct data
transfer between memory and peripherals?
(16)
b) What is the need for an I/O interface? Describe the functions of SCSI interface with a neat diagram.
(16)
In computing, input/output or I/O (or, informally, io or IO) is the communication between
an information processing system, such as a computer, and the outside world, possibly a human or
another information processing system. Inputs are the signals or data received by the system and
outputs are the signals or data sent from it. The term can also be used as part of an action; to "perform
I/O" is to perform an input or output operation. I/O devices are used by a human (or other system) to
communicate with a computer.
15.a) What is virtual memory? Explain the steps involved in virtual memory address translation.
.
(16)
Virtual memory is a feature of an operating system (OS) that allows a computer to
compensate for shortages of physical memory by temporarily transferring pages of data from
random access memory(RAM) to disk Storage
In a virtual memory system, the program memory is divided into fixed sized pages and allocated
in fixed sized physical memory frames. The pages do not have to be contiguous in memory. A page
table keeps track of where each page is located in physical memory. This allows the operating system to
load a program of any size into any available frames. Only the currently used pages need to be loaded.
Unused pages can remain on disk until they are referenced. This allows many large programs to be
executed on a relatively small memory system. A resident flag in the page table indicates whether or not
the page is in memory. The page table also includes several other flags to keep track of memory usage.
A use flag is set whenever the page is referenced. A dirty bit is set whenever the page is changed to
inform the operating system that the page in memory is different than the page on disk.
Size of a page
The addresses that appear in programs are the virtual addresses or program addresses. For every
memory access, either to fetch an instruction or data, the CPU must translate the virtual address to a real
physical address. A virtual memory address can be considered to be composed of two parts: a page
number and an offset into the page. The page number determines which page contains the information
and the offset specifies which byte within the page. The size of the offset field is the log base 2 of the
size of a page.
Consider an example system with:
10 bits
page number
offset
To convert a virtual address into a physical address, the CPU uses the page number as an index into the
page table. If the page is resident, the physical frame address in the page table is concatenated in front
of the offset to create the physical address.
(or)
b) Explain the structure of the cache memory with its characteristics and mapping techniques.
.
(16)
Cache memory, also called CPU memory, is random access memory (RAM) that a
computer microprocessor can access more quickly than it can access regular RAM.
Thismemory is typically integrated directly with the CPU chip or placed on a separate chipthat
has a separate bus interconnect with the CPU.
Direct mapping, in which each block is mapped to exactly one cache location. Conceptually,
this is like rows in a table with three columns: the data block or cache line that contains the actual
data fetched and stored, a tag that contains all or part of the address of the fetched data, and
a flag bit that connotes the presence of a valid bit of data in the row entry.
Fully associative mapping is similar to direct mapping in structure, but allows a block to be
mapped to any cache location rather than to a pre-specified cache location (as is the case with direct
mapping).
Set associative mapping can be viewed as a compromise between direct mapping and fully
associative mapping in which each block is mapped to a subset of cache locations. It is sometimes
called N-way set associative mapping, which provides for a location in main memory to be cached
to any of "N" locations in the L1 cache.
HOD
PRINCIPAL