Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Q1. Describe the concept of virtual memory and its mapping methods.

Q2. A task can be taken out with a six phase pipeline with clock cycle of 10ns.The similar task can be done in a non pipeline unit in 50ns. Find out the speed up ratio of the pipeline for 100 tasks. Illustrate the maximum speed up which can be accomplished? Find out the number of clock cycles it takes to process 200 tasks?

Q3. A program repeatedly executes a loop which has 120 iterations. Each iteration takes 10,000 cycles. On a multiprocessor system 50,000 additional cycles are enquired to synchronize the processor once all iterations of the loop have done.

a) Determine the execution time of each loop on a uniprocesser system?
b) Describe the execution time of each loop on a 2-processer system and the speed up over uniprocesser system?
c) Determine the execution time of each loop on a 4-processer system and the speed up over the uniprocesser system?

Q4. Describe cache coherence and its hardware and software oriented solution in the shared memory system.

Q5. Describe various types of serial and parallel data communications which are used in computer systems.

Q6. Describe the given terms:

a) Transparent mode DMA operation.
b) Interrupt service routine.      

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M911715

Have any Question? 


Related Questions in Computer Engineering

In el farol extension 1 we modify the color based on reward

In El Farol Extension 1, we modify the color based on reward with the agents starting as white and becoming darker as they accumulate rewards. Can you modify this code to use a different color? Or can you modify it so th ...

Assume that our network never corrupts loses or duplicates

Assume that our network never corrupts, loses, or duplicates packets. We are only concerned about flow control. We do not want the sender to overwhelm the receiver with packets. Design an FSM to allow the sender to send ...

1 who is ultimately responsible for managing a technology

1. Who is ultimately responsible for managing a technology? Who is responsible for enforcing policy that affects the use of a technology? 2. What is contingency planning? How is it different from routine management plann ...

1 what is a dmz is this really an appropriate name for the

1. What is a DMZ? Is this really an appropriate name for the technology, considering the function this type of subnet performs? 2. What are the three questions that must be addressed when selecting a firewall for a speci ...

1 design and implement a program that compares the use of

1. Design and implement a program that compares the use of linear probing, quadratic probing, and double hashing on a collection of string keys of varying lengths. The program should extract a collection of strings from ...

1 how is a repeater different from an amplifier2 what do we

1. How is a repeater different from an amplifier? 2. What do we mean when we say that a switch can filter traffic? Why is filtering important? 3. What is a transparent switch? 4. How is a hub related to a repeater? 5. Wh ...

1 in sctp a packet is carrying two data chunks each

1. In SCTP, a packet is carrying two DATA chunks, each containing 22 bytes of user data. What is the size of each DATA chunk? What is the total size of the packet? 2. In SCTP, a SACK chunk reports the receipt of three ou ...

1 investigate how netscape navigator and internet explorer

1. Investigate how Netscape Navigator and Internet Explorer implemented SSL technology. 2. Study both SSL and S-HTTP. Show that these two protocols have a lot in common. However, the two protocols have some differences. ...

Java questionallow the user to input two values a character

Java question: Allow the user to input two values: a character to be used for printing a triangle and the size of the peak for the triangle. Test the input for valid characters. The size of the triangle should not be lar ...

1 what is security auditing why is it necessary for system

1. What is security auditing? Why is it necessary for system security? 2. What are the differences between security monitoring and auditing? Which is better? 3. What is risk? What is the purpose of calculating risk when ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen