Question

In: Computer Science

1- Explain Bus-Based Symmetric Multiprocessors.

1- Explain Bus-Based Symmetric Multiprocessors.

Solutions

Expert Solution

  • Shared memory systems can be designed using bus-based or switch-based interconnection networks.
  • The simplest network for shared memory systems is the bus.
  • The bus/cache architecture facilitates the need for expensive multi-ported memories and interface circuitry as well as the need to adopt a message-passing paradigm when developing application software.
  • However, the bus may get saturated if multiple processors are trying to access the shared memory (via the bus) simultaneously.
  • High-speed caches connected to each processor on one side and the bus on the other side mean that local copies of instructions and data can be supplied at the highest possible rate.
  • If the local processor finds all of its instructions and data in the local cache, we say the hit rate is 100%. The miss rate of a cache is the fraction of the references that cannot be satisfied by the cache, and so must be copied from the global memory, across the bus, into the cache, and then passed on to the local processor.
  • Hit rates are determined by a number of factors, ranging from the application programs being run to the manner in which cache hardware is implemented.
    • A processor goes through a duty cycle, where it executes instructions a certain number of times per clock cycle.
    • Typically, individual processors execute less than one instruction per cycle, thus reducing the number of times it needs to access memory.
    • Subscalar processors execute less than one instruction per cycle, and superscalar processors execute more than one instruction per cycle.
    • In any case, we want to minimize the number of times each local processor tries to use the central bus. Otherwise, processor speed will be limited by bus bandwidth.
    • We define the variables for hit rate, number of processors, processor speed, bus speed, and processor duty cycle rates as follows:
      • N = number of processors;
      • h = hit rate of each cache, assumed to be the same for all caches;
      • (1 - h) = miss rate of all caches;
      • B = bandwidth of the bus, measured in cycles/second;
      • I = processor duty cycle, assumed to be identical for all processors, in fetches/cycle;
      • V = peak processor speed, in fetches/second.
    • The effective bandwidth of the bus is B * I fetches/second.
      • If each processor is running at a speed of V, then misses are being generated at a rate of V * (1 - h)
      • For an N-processor system, misses are simultaneously being generated at a rate of N * (1 - h) * V
      • This leads to saturation of the bus when N processors simultaneously try to access the bus. That is, N * (1 - h) * V <= B * I
    • The maximum number of processors with cache memories that the bus can support is given by the relation,

      N <= B* I / ((1 - h) * V)


Related Solutions

1) in a small paragraph explain the main differences between symmetric and asymmetric cryptographic algorithms ?...
1) in a small paragraph explain the main differences between symmetric and asymmetric cryptographic algorithms ? 2) when is a PKI requierd ?
what are: bus extensions? bus bar? bus raiser? bus section?
what are: bus extensions? bus bar? bus raiser? bus section?
a) Briefly explain symmetric key encryption, its advantages and disadvantages
a) Briefly explain symmetric key encryption, its advantages and disadvantages
1) a) A public bus company official claims that the mean waiting time for bus number...
1) a) A public bus company official claims that the mean waiting time for bus number 14 during peak hours is less than 10 minutes. Karen took bus number 14 during peak hours on 18 different occasions. Her mean waiting time was 8.2 minutes with a standard deviation of 1.6 minutes. At the 0.01 significance level, test the claim that the mean waiting time is less than 10 minutes. Use the traditional (rejection region) method of testing. b) Use the...
1. The three normal modes of water are the symmetric stretch ( 1 ~  =...
1. The three normal modes of water are the symmetric stretch ( 1 ~  = 3652 cm-1 ), the antisymmetric stretch ( 3 ~  = 3756 cm-1 ), and the bend ( 2 ~  = 1595 cm-1 ). Each normal mode has a harmonic oscillator potential. (a) Calculate the molecular vibrational partition function of water at 3000 K. (b) (All at 3000 K.) What fraction of water molecules have the bend excited to v2=1. What fraction of...
explain operation of Ethernet protocol on a shared medium bus
explain operation of Ethernet protocol on a shared medium bus
Q1 Differentiate the bus, star, hybrid, and mesh topologies based on the complexity of the design,...
Q1 Differentiate the bus, star, hybrid, and mesh topologies based on the complexity of the design, the setup cost, and the types of business operations that suitable to each.
QUIESTION 1 A three-phase synchronous generator is connected to an infinite bus. The infinite bus voltage...
QUIESTION 1 A three-phase synchronous generator is connected to an infinite bus. The infinite bus voltage and the generated voltage are o 1.0 pu ∠0 and o 1.0pu ∠42.84 , respectively. The synchronous reactance is 0.85 pu and resistances are neglected. a) Compute power angle (δ), armature current (Is), power factor (pf), real power (P), and reactive power (Q). Draw the phasor diagram. b) If the prime mover torque is kept constant at a value corresponding to P=0.8 pu, compute...
How do we encrypt? Explain modern symmetric cryptography. Explain the digital signature scheme. Explain the cryptography...
How do we encrypt? Explain modern symmetric cryptography. Explain the digital signature scheme. Explain the cryptography tools. What is digital signature? What is steganography? Explain the protocol for secure communications.
Two systems of monetary policy implementation are the "floor" system and the "symmetric corridor" or "symmetric...
Two systems of monetary policy implementation are the "floor" system and the "symmetric corridor" or "symmetric channel" system. In which system would you expect to see central bank staff (such as the "Desk" at the Fed) engage more frequently in open-market operations, or would the frequency of open-market operations be the same under the two systems?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT