Camp - QB
Camp - QB
Camp - QB
Define CPI.
If a computer X runs a program in 25 ms and computer Y runs the same program in 30ms, how faster X
than Y?
What is the booth’s recoded multiplier for the given multiplier 11101000?
Analyze Instruction in MIPS single cycle implementation takes longest clock cycle time for execution?
What is the ideal speed-up expected in a pipelined architecture with ‘n’ stages? Justify your answer.
Define Exception.
What is Microprocessor?
How does the number of general-purpose registers affect the performance of an MPU?
Explain the function of address bus, data bus and control bus.
Define Stack
What are the different types of addressing modes of 8086 instruction set
i) What is the significance of stored program concept? ii) Explain about little-endian and big-endian
memory arrangement.
Describe the arithmetic operations and control operations of MIPS with suitable example.
Consider three different processors P1, P2, and P3 executing the same instruction set. P1 has a 3 GHz
clock rate and a CPI of 1.5. P2 has a 2.5 GHz clock rate and a CPI of 1.0. P3 has a 4.0 GHz clock rate and
has a CPI of 2.2.
i) Which processor has the highest performance expressed in instructions per second? (6)
ii). If the processors each execute a program in 10 seconds, find the number of cycles and the number of
instructions.
i) Suppose we have two implementations of the same instruction set architecture. Computer A has a clock
cycle time of 250 ps and a CPI of 2.0 for some program, and computer B has a clock cycle time of 500 ps
and a CPI of 1.2 for the same program. Which computer is faster for this program and by how much? (6)
Our favorite program runs in 10 seconds on computer A, which has a 2 GHz clock. ii) We are trying to help
a computer designer build a computer, B, which will run this program in 6 seconds. The designer has
determined that a substantial increase in the clock rate is possible, but this increase will affect the rest of the
CPU design, causing computer B to require 1.2 times as many clock cycles as computer A for this program.
What clock rate should we tell the designer to target?
Translate the following MIPS assembly instruction into machine instruction and also explain the fields of
the instruction format for each instruction
i) sub $t0, $s1, $s2
ii) addi $s1, $s2, 100
Translate the following MIPS assembly instruction into machine instruction and also explain the fields of
the instruction format for each instruction
i) add $t0, $s1, $s2 ii) sll $t2, $s0, 4
What is the need for carry-look-ahead adder? Explain carry-look-ahead adder with neat diagram.
Draw the multiplication hardware diagram and using the sequential multiplication algorithm, multiply 7 10 ×
610
Describe the sequential version of Multiplication algorithm in detail with diagram hardware.
Divide (12)10 by (3)10 using the Restoring division algorithm with step-by-step intermediate results and explain.
Describe in detail about non-restoring division algorithm with diagram and example.
Divide (12)10 by (3)10 using the Restoring division algorithm with step-by-step intermediate results and explain.
Divide (15)10 by (7)10 using the Non-restoring division algorithm with step by step intermediate results and explain
Show the IEEE 754 binary representation of the number -0.7510 in single precision floating-point format.
Add the numbers 0.5 10 and -0.437510 using binary Floating point Addition algorithm.
Draw the flowchart of floating-point addition algorithm and add the following numbers 0.3 10 and 1.310
Develop the portion of MIPS single cycle datapath which implements the fetching of instructions and
increments the program counter with neat diagram.
Develop the basic MIPS implementation with necessary multiplexors and control lines.
Explain the Main Control signals and ALU control signals with respect to MIPS single cycle datapath.
Explain the basic MIPS implementation with necessary multiplexors and control lines.
Explain datapath and its ALU control and main control signals in detail with neat diagram. (
Show how to build a data path and explain each functional units for the MIPS architecture.
Conclude the steps in constructing the datapath for R-type MIPS instruction with neat diagram.
Conclude the steps in constructing the datapath for I-type MIPS instruction with neat diagram.
Conclude the steps in constructing the datapath for store word MIPS instruction with neat diagram.
Conclude the steps in constructing the datapath for load word MIPS instruction with neat diagram.
Prioritize the three different types of hazards that will occur during the pipelined implementation of MIPS
datapath with examples.
Discuss the limitations of pipelining a processor’s datapath. Suggest the methods to overcome them.
Explain how instruction pipeline Works. Devise the various situation where an instruction pipeline stalls?
Illustrate with an example.
Demonstrate how instruction pipeline Works. What are the various situation where an instruction pipeline
stalls? Illustrate with an example.
Explain the steps involved in constructing the pipelined version of the MIPS datapath.
Describe the implementation of pipelined control for pipelined implementation of MIPS datapath with a neat
diagram which includes all identified control signals.
Explain the five stages involved during the load word MIPS instruction execution with respect to pipelined
implementation of the datapath with neat diagram. (
Discover the modified datapath to accommodate pipelined execution with a neat diagram.
What are the various methods for handling control hazards. Discover the concept of “Assume Branch Not
Taken” (Delayed Branch) method in detail.
What are the various methods for handling control hazards. Explain the concept of dynamic branch
prediction method in detail.
Which techniques are available for dealing with data hazards? Learn about reordering instructions in depth
with an example.
What are the various methods for handling data hazards? Determine the concept of bypassing or forwarding
in detail with example.
What exactly are the different approaches to managing control risks? Give a thorough explanation of the
dynamic branch prediction method.
Which techniques are available for dealing with data hazards? Explain in detail what is meant by bypassing
or forwarding, using an example.
Discover the usage of translation-look aside buffer with neat illustration with respect to the implementation
of page table.
Describe the concept of DMA and any one bus arbitration techniques with neat diagram.
Discover the fundamentals of cache memory and the process for accessing it in detail, using the appropriate
examples.
What are the techniques for handling interrupts from multiple devices? Explain the concept of daisy chaining with
priority.
Which methods are used to handle numerous device interrupts? Give a priority explanation of the daisy
chaining idea.
What techniques are there for managing interruptions from various devices? Learn about single-line (polling)
interrupts, multi-level interrupts, maskable and non-maskable interrupts.
What methods are there for dealing with many device interrupts? Learn about vectored interrupts in depth.
What are the techniques for handling interrupts from multiple devices? Explain the concept of interrupt
nesting.
What are the techniques for handling interrupts from multiple devices? Explain the concept of daisy chaining.
Discover the function of a typical interface circuits. Also compare between serial and parallel interface
Draw and explain the timing diagram for Synchronous and Asynchronous Bus data transfer
Explain the internal hardware architecture of 8086 microprocessor with neat diagram?
Explain the bus interface unit and execution unit of 8086 microprocessor
Explain the functions of different flags and segment registers
Find the status of the CF and ZF flags after the execution of following set of
instructions.
Assume AX=5260H
(i) ADD AX, 4841 H
(ii) CMP AX,5261H
(iii) XOR AL, AL
(iv) MOV AL, 77 H
Define interrupt and their two classes? Write in detail about interrupt service routine?
Draw the internal architecture of 8086 microprocessor and explain its Bus Interface Unit (BIU).
Give an example for the 8086 instructions: AAA, CWD, JNBE, LAHF, MOVS, RCL, ROL and SAHF
Add the numbers 0.5 10 and -0.437510 using binary Floating point Addition algorithm.
Draw the flowchart of floating-point addition algorithm and add the following numbers 0.3 10 and 1.310
i) Assume that the variables f anf g are assigned to register $s0 and $s1 respectively. Assume that base
address of the array A is in register $s2. Assume f is zero initially
F = g – A[4]
A[5] = f + 100
Translate the above C statement into MIPS code .how many MIPS assembly instructions are needed to
perform the C statements and how many different registers are needed to carry out the C statements?
ii) Assume that the variables f, g, h, i, and j are assigned to registers $s0, $s1, $s2, $s3, and $s4,
respectively. Assume that the base address of the arrays A and B are in registers $s6 and $s7, respectively.
C Code:
f = g + A[B[4]-B[3]];
For the C statement above, what is the corresponding MIPS assembly code?
i) Write the equivalent minimal number of MIPS assembly instruction for the following
f=f+g+h+i+j+2;
f=q+(h+5);
Translate the above C statement into MIPS code. How many MIPS assembly instructions are needed to
perform the C statements and how many different registers are needed to carry out the C statements?
ii) Assume that the variables f anf g are assigned to register $s0 and $s1 respectively. Assume that base
address of the array A is in register $s2. Assume f is zero initially
F = g – A[4]
A[5] = f + 100
Translate the above C statement into MIPS code. How many MIPS assembly instructions are needed to
perform the C statements and how many different registers are needed to carry out the C statements?
i) Assume that i and k correspond to registers $s3 and $s5 and the base of the array save is in $s6. What is
the MIPS assembly code corresponding to this C segment?
while (save[i] == k)
i += 1;
ii) In the following code segment, f, g, h, i, and j are variables. If the five variables f through j correspond
to the five registers $s0 through $s4, what is the compiled MIPS code for this C if statement?
if (i == j) f = g + h; else f = g – h;
i) Assume that the variables f anf g are assigned to register $s0 and $s1 respectively. Assume that base
address of the array A is in register $s2. Assume f is zero initially
F = g – A[4]
A[5] = f + 100
Translate the above C statement into MIPS code .how many MIPS assembly instructions are needed to
perform the C statements and how many different registers are needed to carry out the C statements?
ii) Assume that the variables f, g, h, i, and j are assigned to registers $s0, $s1, $s2, $s3, and $s4,
respectively. Assume that the base address of the arrays A and B are in registers $s6 and $s7, respectively.
C Code:
f = g + A[B[4]-B[3]];
For the C statement above, what is the corresponding MIPS assembly code?
Explain the steps in designing the floating-point multiplication hardware in detail with the following
example: 1.110×1010 X 9.200×10-5
The following sequence of instructions are executed in the basic 5-stage pipelined processor:
or r1,r2,r3
or r2,r1,r4
or r1,r1,r2
i) Indicate dependences and their type.
ii) Assume there is no forwarding in this pipelined processor. Indicate hazards and add NOP instructions to
avoid them.
iii) Assume there is full forwarding in this pipelined processor. Indicate hazards and add NOP instructions
to avoid them.
The following sequence of instructions are executed in the basic 5-stage pipelined processor:
lw $s1,40($s6)
add $s6,$s2,$s2
sw $s6,50($s1)
i) Indicate dependences and their type.
ii) Assume there is no forwarding in this pipelined processor. Indicate hazards and add NOP instructions to
avoid them.
The following sequence of instructions are executed in the basic 5-stage pipelined processor:
or r1,r2,r3
or r2,r1,r4
or r1,r1,r2
i) Indicate dependences and their type.
ii) Assume there is no forwarding in this pipelined processor. Indicate hazards and add NOP instructions to
avoid them.
iii) Assume there is full forwarding in this pipelined processor. Indicate hazards and add NOP instructions
to avoid them.
i) Consider a cache with 64 blocks and a block size of 16 bytes. To what block number does byte address
1200 map? ii) How many total bits are required for a direct-mapped cache with 16 KB of data and 4- word
blocks, assuming a 32-bit address?
ii) Also list if each reference is a hit or a miss, assuming the cache is initially empty.
i) Consider a cache with 64 blocks and a block size of 16 bytes. To what block number does byte address
1200 map?
ii) How many total bits are required for a direct-mapped cache with 16 KB of data and 4- word blocks,
assuming a 32-bit address?