This website uses cookies to ensure you have the best experience. Learn more

Computer Architecture Essay

3309 words - 14 pages

Solution* for Chapter 1 Exercise*

Solutions for Chapter 1 Exercises
1.1 5, CPU
1.2 1, abstraction
1.3 3, bit
1.4 8, computer family
1.5 19, memory
1.6 10, datapath
1.7 9, control
1.8 11, desktop (personal computer)
1.9 15, embedded system
1.10 22, server
1.11 18, LAN
1.12 27, WAN
1.13 23, supercomputer
1.14 14, DRAM
1.15 13, defect
1.16 6, chip
1.17 24, transistor
1.18 12, DVD
1.19 28, yield
1.20 2, assembler
1.21 20, operating system
1.22 7, compiler
1.23 25, VLSI
1.24 16, instruction
1.25 4, cache •
1.26 17, instruction set architecture

Solutions for Chapter 1 Exercises

1.27 21, semiconductor
1.28 26, wafer
1.29 i
1.30 b
1.31 e
1.32 i
1.33 h
1.34 ...view middle of the document...

1.52 CISCtime = P x 8 r = 8 P r n s
RISC time = 2Px 2T= 4 PTns
RISC time = CISC time/2, so the RISC architecture has better performance.
1.53 Using a Hub:
Bandwidth that the other four computers consume = 2 Mbps x 4 = 8 Mbps
Bandwidth left for you = 10 - 8 = 2 Mbps
Time needed = (10 MB x 8 bits/byte) / 2 Mbps = 40 seconds
Using a Switch:
Bandwidth that the other four computers consume = 2 Mbps x 4 = 8 Mbps
Bandwidth left for you = 10 Mbps. The communication between the other
computers will not disturb you!
Time needed = (10 MB x 8 bits/byte)/10 Mbps = 8 seconds

Solutions for Chapter 1 EXWCIMS

1.54 To calculate d = a x f c - a x c , the CPU will perform 2 multiplications and 1
Time needed = 1 0 x 2 + 1 x 1 = 2 1 nanoseconds.
We can simply rewrite the equation &sd = axb-axc= ax (b-c). Then 1 multiplication and 1 subtraction will be performed.
Time needed = 1 0 x 1 + 1 x 1 = 11 nanoseconds.
1.55 No solution provided.
1.56 No solution provided.
1.57 No solution provided.
1.68 Performance characteristics:
Network address
Bandwidth (how fast can data be transferred?)
Latency (time between a request/response pair)
Max transmission unit (the maximum number of data that can be transmitted in one shot)
Functions the interface provides:
Send data
Receive data
Status report (whether the cable is connected, etc?)
1.69 We can write Dies per wafer = /((Die area)"1) and Yield = /((Die area)"2)
and thus Cost per die = /((Die area)3).
1.60 No solution provided.
1.61 From the caption in Figure 1.15, we have 165 dies at 100% yield. If the defect
density is 1 per square centimeter, then the yield is approximated by

= .198.

1 +

Thus, 165 x .198 = 32 dies with a cost of $1000/32 = $31.25 per die.

Solution* for Chapter 1 Exercises

1.62 Defects per area.

Yield =

(1 + Defects per area x Die a r e a / 2 ) 2

Defects per area = —:


Die ares
Defect density
Die area

1992 + 19S0

Defect density


j —L ••— - 1 |


Solutions for Chapter 2 ExardsM

Solutions for Chapter 2 Exercises
2.2 By lookup using the table in Figure 2.5 on page 62,
7ffififfohoi = 0111 1111 1111 1111 1111 1111 1
= 2,147,483,642^.
2.3 By lookup using the table in Figure 2.5 on page 62,
1100 1010 1111 1110 1111 1010 1100 111
V Time,

y Time;

l JL,
- > Tirr

where AM is the arithmetic mean of the corresponding execution times.
4.32 No solution provided.
4.33 The time of execution is (Number of instructions) * (CPI) * (Clock period).
So the ratio of the times (the performance increase) is:
10.1 = (Number of instructions) * (CPI) * (Clock period)
(Number of instructions w/opt.) * (CPI w/opt.) * (Clock period)
= l/(Reduction in instruction count) * (2.5 improvement in CPI)
Reduction in instruction count = .2475.
Thus the instruction count must have been reduced to 24.75% of the original....

Other Essays Like Computer Architecture

Computer Science Essay

711 words - 3 pages Computer Science Computer science is one of the fastest growing career fields in modern history. Dating back only a few decades to the late 1950's and early 1960's, it has become on of the leading industries in the world today. Developed through the technological architecture of electrical engineering and the computational language of mathematics, the science of computer technology has provided considerable recognition and financial gain for

Database Systems and How They Are Used

517 words - 3 pages purpose, or be transactional or analytical. Take Oracle database architecture for example. “Oracle9i, Oracle8i, and Oracle8 databases are powerful, flexible, and scalable relational database management system (RDBMS) servers that run on a range of computer systems, from personal computers to largest mainframes. Oracle is designed to run effectively in a client/server environment and supports hundreds to thousands of users” (Oracle, "Migration Process

Compuer Base

5150 words - 21 pages , Clusters, Parallel Systems, Web Servers, Storage Solutions by René J. Chevance (Dec 29, 2004) 4. Peer-to-Peer : Harnessing the Power of Disruptive Technologies by Andrew Oram (Mar 15, 2001) 5. Client/Server Survival Guide, 3rd Edition by Dan Harkey (Jan 25, 1999) 6. The Architecture of Computer Hardware, Systems Software, & Networking: An Information Technology Approach by Irv Englander (May 4, 2009) 7.

A Look Into Computer Memory

1571 words - 7 pages A Look into Computer Memory   Table of Contents Abstract 3 A Look into Computer Memory 4 Memory Hierarchy 4 Allocation Policies 5 Relocation Policies 6 Hit and Hit Ratio 6 Modern Computer Applications 7 Conclusion 7 References 8   Abstract The memory of a computer is a key component of the overall architecture of a computer. Several types of memory exist with the architecture of the computer which collectively is known as the

Industrial Revolution

1843 words - 8 pages reliable. Corporations seeing the value in this technology began producing the new computers. At this the basis of computers was in place, with transistors the computers were faster and now contained stored program architecture, programs as we know them today. These programs, or software you could use the computer for almost anything. New high level programs soon arrived, FORTRAN (1956), ALGOL (1958), and COBOL (1959), and as of the late 1970’s these

HỏI Con 5s

2617 words - 11 pages of data from buffer storage directly to main memory without CPU intervention. • Only one interrupt is generated per block, rather than the one interrupt per byte. 44 Computer Hardware Review Structure of a large Pentium system 45 Computer Hardware Review BUS • • • • • • • • Cache BUS Local BUS System BUS ISA Industry Standard Architecture PCI Peripheral Component Interconnect USB Universal Serial BUS SCSI

Pilot Job

1113 words - 5 pages Running head: Computer Software 1 Modern Day Computers and The Use of Software By Joseph P. Berardesco MGMT 221 Introduction to Management Information Systems Embry-Riddle Aeronautical University April 13, 2013 Computer Software 2

History of Computers

895 words - 4 pages information on technical characteristics and design of foreign machines in this class. This state of affairs resulted in the designing of hundreds of computer types with different architecture and characteristics. This type of isolated computer development effort was a very costly proposition, which undoubtedly can be listed among its disadvantages. But it had its advantages as well, resulting as it did in a plethora of original and highly

Cloud Computing

2173 words - 9 pages opportunities and challenges  computing services in the cloud  cloud computing in science  cloud oriented file service for mobile internet devices  multiscale not multicore efficient heterogeneous cloud computing  towards a discipline of mission aware cloud computing  research projects computer science cloud computing 2  free research papers network security 11  business models for internet based e commerce  the reservoir model and architecture for

Kudler Fine Foods Network Analysis

1013 words - 5 pages scalable which enables expansion of the network as needed. It also provides very reliable data delivery. The Suite includes protocols such as Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP) and Simple Mail Transfer Protocol (SMTP). HTTP transfers web pages including plain text, audio, video, images and hypertext. FTP transfers files from one computer to another. SMTP is the protocol needed to send and receive email messages. The

Review Questions: Chapter 1

2512 words - 11 pages other types of computer networks. • Three-Tier Architecture – adds an intermediate layer between the client and the database server. The main usage is to improve the database security. • N-Tier Architecture – it is customary to divide the layers between the user and the stored data further into finer components, thereby giving rise to n-tier architectures where n may be four or five. 2.2. Discuss the main categories of data models

Related Papers

Evolution Of Computer Applications & Architecture

3647 words - 15 pages Evolution of Computer Applications and Architecture By Ken Jacobi, Computer Architecture (IT-501) In discussing the evolution of computer architecture, we find that there are many angles on how people tend to view things. Some will take consideration in how things have changed over the last few years. Others will take a stronger look at the direction of where they believe technology is going. A third focus is in regards to the

Artificial Intelligence Essay

4544 words - 19 pages proposals into perspective. As we review various proposals, we will present some judgements of our own about relevant issues. But first, we need to review the notion of an architecture and make some additional distinctions. A. Form and Content Issues in Architectures In computer science, a programming language corresponds to a virtual architecture. A specific program in that language describes a particular (virtual) machine, which then responds

Computers A Personal Appeal From

3125 words - 13 pages design 3 Components 3.1 Control unit 3.2 Arithmetic logic unit (ALU) 3.3 Memory 3.4 Input/output (I/O) 3.5 Multitasking 3.6 Multiprocessing 3.7 Networking and the Internet 3.8 Computer architecture paradigms 4 Misconceptions 4.1 Required technology 5 Further topics 5.1 Artificial intelligence 5.2 Hardware 5.3 Software

Executive Summary On Computer Forensics Suites

523 words - 3 pages  Unit 10 Assignment 1: Executive Summary on Computer Forensics Suites IS 3350 Computer forensics is a relatively new scientific process for examining data stored on, received, or transmitted by electronic devices. The data from these electronic devices are examined to find evidence about an event of crime. Computer forensic examiners use specialized software and tools to collect and study data stored on various electronic