[考古] 計算機結構學/張貴忠/98上 期末考

看板FCUProblems作者 (floyd)時間14年前 (2010/01/18 20:33), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
[開課學院]: 資電學院 [開課系所]: 資訊系 [課程名稱]: 計算機結構學 [老師名稱]: 張貴忠 老師 [開課學期]: 981 [類型]: 98-1期末考 1.(Pipelining-25%)Branch in simple five-stage pipeline (a)Name five typical pipeline stages in an instruction cycle. (b)Explain how the branch penalty can be reduced to 2 cycle? (c)Explain how the branch penalty can be reduced to 1 cycle? (d)What are the required cost in order to achieve the solution of 1 cycle penalty? (e)What are the software solutions to eliminate the branch penalty? 2.(Pipelining-20%)We have a program core consisting of five conditional branch .The program core will be executed thousands of times.Below are the outcomes of each branch for one execution of the program core(T for taken, N for not taken). Branch 1:T-T-T-T Branch 2:N-N-N-N Branch 3:T-N-T-N-T-N Branch 4:T-T-T-N-T Branch 5:T-T-N-T-T-N-T Assume the behavior of each branch remains the same for each program core execution. For dymanic schemes, assume each branch has its own prediction buffer and each buffer initialized to the same state before each execution. List the predictions for the following branch prediction schemes: (a)Always taken (b)Always not taken (c)1-bit predictor, initialized to prediction taken (d)2-bit predictor, initialized to weakly predict taken. 3.(Cache Design-25%) (a)[15%]For a 4KB cache with a block of 16 bytes, draw the whole cache structures for direct-mapped and four-way set associative respecively for 32-bit input address. (b)[5%]Split the 32-bit address into "tag","index",and "offset" pieces.How many address bits comprise each piece for each structure? (c)[5%]Compute the total bits(including tags and one valid bit) required for these two structures respectively. 4.(Memory Hierarchy-10%)A new processor can use either a write-through or write-back cache selectable through software. (a)Assume the processor will run data intensive applications with a large number of load and store operations. Explain which cache write policy should be used. (b)Consider the same question but this time for a safety critical system in which data integrity is more important then memory performance. 5.(Data Path & Control -20 pts)Given the simple implementation of MIPS processor, please fill the control table.(Please copy the table to your answer sheet.) ____________________________________________________________________________ | | | | | | | | | | | |Inst |RegDst|ALUSrc|MemtoReg|RegWrite|MemRead|MemWrite|Branch|ALUOp1|ALUOp2| |______|______|______|________|________|_______|________|______|______|______| | | | | | | | | | | | |R-type| | | | | | | | | | |______|______|______|________|________|_______|________|______|______|______| | | | | | | | | | | | |lw | | | | | | | | | | |______|______|______|________|________|_______|________|______|______|______| | | | | | | | | | | | |sw | | | | | | | | | | |______|______|______|________|________|_______|________|______|______|______| | | | | | | | | | | | |beq | | | | | | | | | | |______|______|______|________|________|_______|________|______|______|______| -- ※ 發信站: 批踢踢實業坊(ptt.cc) ◆ From: 218.170.118.214
文章代碼(AID): #1BL5KOQ3 (FCUProblems)