UNIT 4
Distributed Memory Architecture
Q1) What Are the Major Difficulties Of Pipeline Conflicts In Processors Supporting Pipe Lining?
A1)
The following are the main reasons for pipe line conflicts in the processor:
Q2) Explain Mesi?
A2)
The MESI protocol is also known as Illinois protocol due to its development at the University of Illinois at Urbana-Champaign and MESI is a widely used cache coherency and memory coherence protocol.
MESI is the most common protocol which supports write-back cache. Its use in personal computers became widespread with the introduction of Intel's Pentium processor to "support the more efficient write-back cache in addition to the write-through cache previously used by the Intel 486 processor"
Q3) Point Out The Characteristics Of The Risc Architecture?
A3)
RISC meaning reduced instruction set as the acronym say aims to reduce the execution times of instructions by simplifying the instructions.
The major characteristics of RISC are as follows:
Q4) Explain A Snooping Cache?
A4)
Snooping is the process where the individual caches monitor address lines for accesses to memory locations that they have cached. When a write operation is observed to a location that a cache has a copy of, the cache controller invalidates its own copy of the snooped memory location.
Snarfing is where a cache controller watches both address and data in an attempt to update its own copy of a memory location when a second master modifies a location in main memory
Q5) What Are The Steps Involved In An Instruction Cycle?
A5)
Any program residing in the memory contains a set of instruction that need to be executed by the computer in a sequential manner. This cycle for every instruction is known as the instruction cycle . The cycle consists of the following steps:
Q6) Explain What Are Five Stages In A Dlx Pipeline?
A6)
The instruction sets can be differentiated by:
Q7) Explain The Components Of The Ven Neumann Architecture?
A7)
The main components of the Von Neumann architecture were as follows:
Q8) What Is External Interrupts?
A8)
These types of interrupts generally come from external input / output devices which are connected externally to the processor. They are generally independent and oblivious of any programming that is currently running on the processor.
Q9) Explain Briefly Six Different Types Of Addressing Modes Of An Instruction?
A9)
The different types of instructions are as follows:
Q10) What Is Internal Interrupts?
A10)
They are also known as traps and their causes could be due to some illegal operation or the erroneous use of data. Instead of being triggered by an external event they are usually triggered due to any exception that has been caused by the program itself. Some of the causes of these types of interrupts can be due to attempting a division by zero or an invalid opcode etc.