Star Lion College of Engineering & Technology: Cs2354 Aca-2 Marks & 16 Marks
Star Lion College of Engineering & Technology: Cs2354 Aca-2 Marks & 16 Marks
Star Lion College of Engineering & Technology: Cs2354 Aca-2 Marks & 16 Marks
com
Star Lion College of Engineering & Technology
(Approved by AICTE New Delhi and affiliated to Anna University ,chennai)
Manankorai, Thanjavur - 614 206, Tamil Nadu.
Ph: 04374-243243 , Fax: 04374-244244
UNIT-I
PART-A
1. Explain the concept of pipelining.
Pipelining is an implementation technique whereby multiple instructions are overlapped in
execution. It takes advantage of parallelism that exists among actions needed to execute an
instruction.
PART B
1. Explain the data dependences and hazards in detail with examples. (16)
Dynamic scheduling
3.Explain dynamic scheduling using tomosulo’s approach with an example. (or) Explain
technique used for overcoming the data hazards with an example.
-Diagram
4.Explain in detail about the hardware based speculation and explain how it overcomes
the control dependencies. (16)
Issue
Execute
Write result
Commit
UNIT-II
PART-A
1. Explain the VLIW approach?
They uses multiple, independent functional units. Rather than attempting to issue multiple,
independent instructions to the units, a VLIW packages the multiple operations into one very long
instruction.
They are less expensive, they have cache based memory system, more parallelism.
www.vidyarthiplus.com
www.vidyarthiplus.com
3. What are loop carried dependence?
They focus on determining whether data accesses in later iterations are dependent on data values
produced in earlier iterations; such a dependence is called loop carried dependence. E.g
for(i=1000;i>0;i=i-1)
4. Use the G.C.D test to determine whether dependence exists in the following loop.
for(i=1;i<=100;i=i+1)
X[2*i+3]=X[2*i]*5.0; Solution:
a=2, b=3, c=2, d=0 GCD(a,c)=2 and
d-b=-3
Since 2 does not divide -3, no dependence is possible.
5. What is software pipelining?
Software pipelining is a technique for reorganizing loops that each iteration in the software pipelined
code is made from instruction chosen from different iterations of the original loop.
Global code scheduling aims to compact code fragment with internal control structure into the
shortest possible sequence that preserves the data and control dependence. Finding a shortest possible
sequence is finding the shortest sequence for the critical path.
7. What is Trace?
Trace selection tries to find a likely sequence of basic blocks whose operations will be put together
into smaller number of instructions, this sequence is called trace.
Superblocks are formed by a process similar to that used for traces, but are form of extended basic
block, which are restricted to a single entry point but allow multiple exits.
Poison bits are a set of status bits that are attached to the result registers written by the specified
instruction when the instruction causes exceptions. The poison bits cause a fault then a normal
instruction attempts to use the register.
It is a sequence of consecutive instructions with no register data dependences among them. All the
instructions in the group could be executed in parallel. An instruction group can be arbitrarily long.
www.vidyarthiplus.com
www.vidyarthiplus.com
13. What are the limitations of ILP?
The hardware model, limitation on the window size and maximum issue count, the effects of realistic
branch and jump prediction, the effects of finite registers, the effect of imperfect alias analysis.
Within a basic block, algebraic simplification of expressions and an optimization called copy
propagation. Which eliminates operations that copy values, can be used to simplify sequences like the
following:
#8
A special register called the current frame pointer points to the set of registers to be used
by a given procedure.
PART B
1.Explain the VLIW and EPIC processors. (8)
ILP in VLIW
EPIC ARCHITECTURE
Specification
Branching
Register mechanism
Predication
UNIT-III
PART-A
4. What are the ways to maintain cache coherence? OR what are the ways to enforce
cache coherence?
Directory based protocol, Snooping based protocol.
5. What are the ways to maintain cache coherence using snooping protocol?
Write invalidate protocol, write update or write broadcast protocol.
www.vidyarthiplus.com
www.vidyarthiplus.com
12. Explain the types of messages that can be send between the processors and directories?
Local Node: node where the requests originates
Home Node: Node where memory location and directory entry of the address resides.
Remote Note: the copy of the block in the third node called remote node.
13. What is consistency? And what are the models used for consistency?
Consistency says in what order processor must observe the data writes of another processor.
Models used for Consistency:
Sequential Consistency Model,
Relaxed Consistency Model
www.vidyarthiplus.com
www.vidyarthiplus.com
PART B
1. Explain the symmetric shared memory architecture. Explain the snooping based
protocols with neat diagram. (16)
Symmetric Shared Memory Architectures:
Cache Coherence in Multiprocessors: Basic
Schemes for Enforcing Coherence
Snooping Protocols
Write invalidate Write
update protocol
State transition diagram
2.Explain the concept of distributed shared memory and also explain directory based
protocols with an example. (or) Explain the numa architecture with neat diagram.
3.Explain the basics of multithreading and it types. (8) (or) Explain how multihreading
approach can be used to exploit thread level parallelism within a processor? (8)
Fine-grained multithreading
Coarse-grained multithreading
Simultaneous Multithreading
Design Challenges in SMT processors
4. Explain in detail about the need for consistency models and it types.(8)
Sequential consistency
5. Explain the performance of the symmetric shared memory with necessary graphs.
(16)
www.vidyarthiplus.com
www.vidyarthiplus.com
UNIT-IV
PART-A
1. What is cache miss and cache hit?
Cache Miss: When the CPU finds a requested data item in the cache, it is called cache
miss.
Cache Hit: When the CPU finds a requested data item is available in the cache, it is called
cache hit.
5. What is stripping?
Spreading multiple data over multiple disks is called stripping, which automatically forces
accesses to several disks.
Disks in the configuration are mirrored or copied to another disk. With this arrangement
data on the failed disks can be replaced by reading it from the other mirrored disks.
Drawback: writing onto the disk is slower since the disks are not synchronized, seek time
will be different.
It imposes 50% space penalty hence expensive.
The sum of entry time, response time and think time is called transaction time.
Little law relates the average number of tasks in the system. It relates to Average arrival rate
of new tasks with the average time to perform a task.
I/O buses – these buses are lengthy and have any types of devices connected to it.
CPU memory buses – They are short and generally of high speed.
12. What is bus master?
Bus master are devices that can initiate the read or write transaction.
Eg. Processor – processor are always has the bus mastership.
It offers higher bandwidth by using packets, as opposed to holding the bus for full
transaction.
The idea behind this is to split the bus into request and replies, so that the bus can be used in
the time between request and the reply.
Access Time: Is the time between when a read is required and when the desired word arrives.
Cycle Time: Is the minimum time between requests to memory.
PART B
1. Explain in detail about the vaious optimization techniques for improving the cache
performance. (16)
Cache performance
There are 17 cache optimizations into four categories:
First Miss Penalty Reduction Technique: Multi-Level Caches
Second Miss Penalty Reduction Technique: Critical Word First and Early Restart Third Miss
Penalty Reduction Technique: Giving Priority to Read Misses over Writes
Fourth Miss Penalty Reduction Technique: Merging Write Buffer Fifth
Miss Penalty Reduction Technique: Victim Caches
www.vidyarthiplus.com
www.vidyarthiplus.com
Magnetic Disks
Optical Disks
Magnetic Tape
Automated Tape Libraries
Flash Memory
4. Explain the buses and i/o devices (16)
Bus Standards
Mirroring (RAID 1)
www.vidyarthiplus.com
www.vidyarthiplus.com
UNIT-V
PART-A
It is hard to overcome throughput losses from shorter stalls, due to pipeline start-up
costs.
Since CPU, issues instruction from 1 thread, when a stall occurs, the pipeline must be
emptied or frozen.
New thread must fill pipeline before instruction can complete.
PART B
1.Briefly explain multicore architecture with neat diagram and also write its applications.
(8) (or) chip multiprocessors (or) cmp architecture.
Single-core computer
CMP architecture:
CHIP multi threading:
Multi-core architectures
2.Explain in detail about the various types of software and hardware based multi-
threading. (8)
Software and hardware multithreading
Multithreading in Hardware
Hardware Multithreading Techniques
Cycle-by-cycle interleaving (Fine Grained Multithreading)
Block interleaving (Coarse Grain Multithreading)
www.vidyarthiplus.com
www.vidyarthiplus.com
3.Explain the architectural features of ibm cell processors with neat diagram. (or) explain
cell processors. (or) explain cell broadband engine. (10)
IBM Cell Processor
Applications of cell processors
Power Processor Element (PPE)
Synergistic Processing Elements
Input/output interfaces
4.Explain simultanous multi-threading concept for converting thread level parallelism into
instruction level parallelism. (8)
Design Challenges in SMT
Potential Performance Advantages from SMT
www.vidyarthiplus.com