All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
computer sciences
systems analysis and design
Questions and Answers of
Systems Analysis And Design
For the multiprocessor illustrated in Figure 4.42 implementing the protocol described in Figure 4.43 and Figure 4.44, assume the following latencies:¢ CPU read and write hits generate no
In the case of a cache miss, both the switched snooping protocol described earlier and the directory protocol in this case study perform the read or write operation as soon as possible. In
Some directory protocols add an Owned (O) state to the protocol, similar to the optimization discussed for snooping protocols. The Owned state behaves like the Shared state, in that nodes may only
The advanced directory protocol described above relies on a point-to-point ordered interconnect to ensure correct operation. Assuming the initial cache contents of Figure 4.42 and the following
Many snooping coherence protocols have additional states, state transitions, or bus transactions to reduce the overhead of maintaining cache coherency. In Implementation 1 of Exercise 4.2, misses are
For the following code sequences and the timing parameters for the two implementations in Figure 4.38, compute the total stall cycles for the base MSI protocol and the optimized MOSI protocol in
Some applications read a large data set first, then modify most or all of it. The base MSI coherence protocol will first fetch all of the cache blocks in the Shared state, and then be forced to
Assume the cache contents of Figure 4.37 and the timing of Implementation 1 in Figure 4.38. What are the total stall cycles for the following code sequences with both the base protocol and the new
The test-and-set spin lock is the simplest synchronization mechanism possible on most commercial shared-memory machines. This spin lock relies on the exchange primitive to atomically load the old
Consider the switched network snooping protocol described above and the cache contents from Figure 4.37. What are the sequence of transient states that the affected cache blocks move through in each
Consider the switched network snooping protocol described above and the cache contents from Figure 4.37. What are the sequence of transient states that the affected cache blocks move through in each
The following questions investigate the impact of small and simple caches using CACTI, and assume a 90 nm (0.09 μm) technology. a. Compare the access times of 32 KB caches with 64-byte blocks and a
Assume the system is your desktop PC and only one core on the CMP is active. Assume there is only one memory channel. a. How many DRAMs are on the DIMM if 512 Mbit DRAMs are used, and how many data
Assume just one DIMM is used in a system, and the rest of the system costs $800. Consider the performance of the system using the DDR2-667 and DDR2-533 DIMMs on a workload with 3.33 level 2 misses
You are provisioning a server based on the system above. All 8 cores on the CMP will be busy with an overall CPI of 2.0 (assuming level 2 cache miss refills are not delayed). What bandwidth is
A large amount (more than a third) of DRAM power can be due to page activation (see download.micron.com/pdf/technotes/ddr2/TN4704.pdf and www.micron.com/systemcalc). Assume you are building a system
Virtual machines have the potential for adding many beneficial capabilities to computer systems, for example, resulting in improved total cost of ownership (TCO) or availability. Could VMs be used to
Virtual machines can lose performance from a number of events, such as the execution of privileged instructions, TLB misses, traps, and I/O. These events are usually handled in system code. Thus one
With the adoption of virtualization support on the x86 architecture, virtual machines are actively evolving and becoming mainstream. Compare and contrast the Intel VT-x and AMD Secure Virtual Machine
Using the sample program results in Figure 5.33:a. How many levels of cache are there?b. What are the overall size and block size of the first-level cache?c. What is the miss penalty of the
Modify the code in Figure 5.32 to measure the following system characteristics. Plot the experimental results with elapsed time on the y-axis and the memory stride on the x-axis. Use logarithmic
You are investigating the possible benefits of a way-predicting level 1 cache. Assume that the 32 KB two-way set-associative single-banked level 1 data cache is currently the cycle time limiter. As
In multiprocessor memory systems, lower levels of the memory hierarchy may not be able to be saturated by a single processor, but should be able to be saturated by multiple processors working
You have been asked to investigate the relative performance of a banked versus pipelined level 1 data cache for a new microprocessor. Assume a 64 KB two-way set-associative cache with 64 B blocks.
Inspired by the usage of critical word first and early restart on level 1 cache misses, consider their use on level 2 cache misses. Assume a 1 MB L2 cache with 64-byte blocks and a refill path that
You are designing a write buffer between a write-through level 1 cache and a write-back level 2 cache. The level 2 cache write data bus is 16 bytes wide and can perform a write to an independent
For the simple implementation given above, this execution order would be nonideal for the input matrix. However, applying a loop interchange optimization would create a nonideal order for the output
Assume you are redesigning a hardware prefetcher for the unblocked matrix transposition code above. The simplest type of hardware prefetcher only prefetches sequential cache blocks after a miss. More
Assume you are redesigning a hardware prefetcher for the unblocked matrix transposition code as in Exercise 5.7. However, in this case we evaluate a simple two-stream sequential prefetcher. If there
The results of running Skippy are shown for a mock disk (Disk Alpha) in Figure 6.25.a. What is the minimal transfer time?b. What is the rotational latency?c. What is the head switch time?Figure 6.25
Assume that reconstruction of the RAID 4 array begins at time t. a. What read and write operations are required to perform the reconstruction? b. For offline reconstruction, when will the
In this exercise, we will investigate the mean time until data loss (MTDL). In RAID 4, data is lost only if a second disk fails before the first failed disk is repaired. a. What is the likelihood of
What is performability for the RAID 4 array for offline reconstruction? Calculate the performability using IOPS, assuming a random readonly workload that is evenly distributed across the disks of the
What is the performability for the RAID 4 array for online reconstruction? During online repair, you can assume that the IOPS drop to 70% of their peak rate. Does offline or online reconstruction
RAID 6 is used to tolerate up to two simultaneous disk failures. Assume that you have a RAID 6 system based on row-diagonal parity, or RAIDDP; your six-disk RAID-DP system is based on RAID 4, with p
Begin by assuming that the storage system consists of a single 40 GB disk. a. Given this workload and storage system, what is the average service time? b. On average, what is the utilization of the
Imagine that the storage system is now configured to contain two 40 GB disks in a RAID 0 array; that is, the data is striped in blocks of 8 KB equally across the two disks with no redundancy. a. How
Instead imagine that the storage system is configured to contain two 40 GB disks in a RAID 1 array; that is, the data is mirrored across the two disks. Use queuing theory to model this system for a
You will begin by designing an I/O subsystem that is optimized only for capacity and performance (and not reliability), specifically IOPS. Discuss the RAID level and block size that will deliver the
Draw an approximation of the graph that would result from running Skippy on Disk Beta, a disk with the following parameters: • Minimal transfer time: 2.0 ms • Rotational latency: 6.0 ms • Head
What configuration of SCSI disks, controllers, and enclosures results in the best performance given your monetary and capacity constraints? a. How many IOPS do you expect to deliver with your
You will now redesign your system to optimize for reliability, by creating a RAID 10 or RAID 01 array. Your storage system should be robust not only to disk failures, but to controller, cable, power
Optimizing your RAID 10 or RAID 01 array only for reliability (but keeping within your capacity and monetary constraints), what is your RAID configuration? a. What is the overall MTTF of the
Assume that you now have access to a disk that has twice the capacity, for the same price. If you continue to design only for reliability, how would you change the configuration of your storage
Assume that you will use simple parity protection in Exercises 6.24 through 6.27. Specifically, assume that you will be computing one parity block for each file in the file system. Further, assume
One big problem that arises in data protection is error detection. One approach is to perform error detection lazily-that is, wait until a file is accessed, and at that point, check it and make sure
Another potential cost of added data protection is found in performance overhead. We now study the performance overhead of this data protection approach. a. Assume we write a 40 MB file to the SCSI
We will start by configuring a system to complete a sort in the least possible time, with no limits on how much we can spend. To get peak bandwidth from the sort, we have to make sure all the paths
We will now examine cost-performance issues in sorting. After all, it is easy to buy a high-performing machine; it is much harder to buy a costeffective one. One place where this issue arises is with
Getting good disk performance often requires amortization of overhead. The idea is simple: if you must incur an overhead of some kind, do as much useful work as possible after paying the cost, and
One can uncover the pattern size with the following code. The code accesses the raw device to avoid file system optimizations. The key to all of the Shear algorithms is to use random requests to
One can uncover the chunk size with the following code. The basic idea is to perform reads from N patterns chosen at random, but always at controlled offsets, c and c - 1, within the pattern.Figure
Finally, one can determine the layout of chunks to disks with the following code. The basic idea is to select N random patterns, and to exhaustively read together all pairwise combinations of the
Draw the graph that would result from running the layout algorithm on the storage system shown in Figure 6.29. This storage system has 4 disks, a chunk size of four 4 KB blocks (16 KB), and is using
When a single disk fails, the RAID 4 system will perform reconstruction. What is the expected time until a reconstruction is needed?
Write a use case description for the PRODUCE HARDWARE SOFTWARE CROSS REFERENCE REPORT use case. Use the use case diagram to determine the heading information, making any reasonable assumptions. The
Write the use case description for the PRODUCE HARDWARE INVESTMENT REPORT use case. Use the use case diagram to define the header information. The steps involve reading each hardware record, counting
Write the use case description for the QUERY TRAINING CLASSES use case. Use the use case diagram to define the header information. The steps involve entering information on the Web form, validating
Use the Repository feature to view the entry for the central process.
Explain why the external entities on the context-level diagram are not found on the entity-relationship diagram.
Explain why the entities MANAGEMENT and FACULTY are found on both sides of the process on the context-level diagram.
Add the INSTALL DESKTOP COMPUTER use case to the upper right area of the diagram. This use case extends the ADD NEW COMPUTER use case.
Add a use case description for the ADD SOFTWARE use case. It should contain the following information:A. Obtain the use case name and actors from the use case diagram. The stakeholder and level are
List five of the many benefits of cloud computing for organizations.
List three of the many drawbacks of cloud computing for organizations.
What costs need to be estimated to prepare a budget?
What three instances call for expediting a systems project?
Using the PERT diagram in Figure 3.EX2 to determine answers: a. What activities can you expedite to complete the project a week ahead of schedule? b. Suppose Activity E is the least costly activity
Robyn Cucurullo is developing a social networking app for tablet computers. She has the following stages completed so far:a. Create a table similar to the one in Figure 3.27. b. For Week 3, calculate
List all paths and calculate and determine the critical path for the Gathering Information PERT diagram.
List all paths and calculate and determine the critical path for the Interviewing Users PERT diagram. List all paths and calculate and determine the critical path for the Interviewing Users PERT
Create the problem definition for the CPU case. Read the interview with Hy Perteks in the CPU case found in Chapter 4.Go to www.pearsonhighered.com/kendall and click the CPU Student.
Write user requirements for the CPU case.
Design a test plan for the requirements created in Exercise E-7.
Analyze the five interviews. In a paragraph, discuss what type of structure each interview had.
List each interview, 1 through 5, and then write a paragraph for each, discussing ways that Anna might improve on her interviews for next time.
Analyze the questions used in the five interviews. In a paragraph, discuss the question types used and whether they were appropriate for getting needed information.
From the list of concerns presented earlier in this chapter, select the issues that would best be phrased as closed questions.
From the list of concerns, select the issues that would best be phrased as open-ended questions.
Pilot your questionnaire by having other students in class fill it out. On the basis of their feedback and your capability to analyze the data you receive, revise your questionnaire.
Based on Anna's written observation of Dot's office and clothing, use STROBE to analyze Dot as a decision maker. In two paragraphs, compare and contrast what you learned in Dot's interview and what
After examining Anna's written observations about Mike Crowe's office, use STROBE to analyze Mike as a decision maker. What differences (if any) did you see between Mike in his interview and Mike in
Use STROBE to analyze Anna's written observations about Cher Ware and Paige Prynter. Use two paragraphs to compare and contrast the decision-making style of each person as it is revealed by their
Use STROBE to analyze Anna's written observations about Hy Perteks. Now compare your analysis with Hy's interview. Use two paragraphs to discuss whether STROBE confirms, negates, reverses, or serves
Locate the prototype currently proposed for use in one of MRE's departments. Suggest a few modifications that would make this prototype even more responsive to the unit's needs.
Using a word processor, construct a nonoperational prototype for a Training Unit Project Reporting System. Include features brought up by the user stories you found. Hint: See sample screens in
Create an event table for the activities listed for World's Trend order processing system.
Modify Diagram 0 of the proposed computer system. Add process 10, UPDATE SOFTWARE RECORD. You will have to move the MANAGEMENT external entity lower in the diagram; place it to the left of process 7,
Explode to Diagram 10, UPDATE SOFTWARE RECORD. Maximize the window and create the diagram illustrated in Figure E7.10. Connect to the SOFTWARE MASTER using a double-headed arrow. Print the final
Modify Diagram 8, INSTALL SOFTWARE. Add the following processes, describing each in the repository. Zoom to 100 percent and scroll around the screen, checking your diagram for a professional
Modify Diagram 6, CHANGE COMPUTER RECORD, which is shown in Figure E7.11. This is an interactive, online program to change computer information. Add the following three processes. Create repository
Create the explosion data flow diagram for process 4, DELETE COMPUTER. The following table summarizes input, process, and output. Describe each process and data flow in the repository. When
Michael (from Problem 4) also assembles packages of camping kits. Each kit is a group of separate products that are sold as a package. Each package (called a PRODUCT) is built using many parts, which
Use Visible Analyst or the Repository Web page to view the COMPUTER MASTER data store. Jump to the data structure and browse the elements and structural records.
Use the SOFTWARE INSTALL LIST to jump to (and therefore create) the SOFTWARE INSTALLATION LISTING. The elements on the listing are as follows: SOFTWARE INVENTORY NUMBER TITLE VERSION NUMBER HARDWARE
Create the following element descriptions. Use the values supplied in the table. Create any alternate names and definitions based on your understanding of the element.
Use the Repository Reports feature to produce the following reports and matrices, either by printing the reports or by previewing them using your Web browser. The selection criteria from the
Use the Report Query feature to produce the following reports. Explain in a sentence what information the report is providing you with. a. The Undefined Elements report b. The Elements without
Print a summary report for all data flow components that do not have a description.
Print a summary report for all data flow components that are not on a diagram.
Showing 3200 - 3300
of 3387
First
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34