Examine the difficulty of adding a proposed swap rs, rt instruction to MIPS. Interpretation: Reg[rt] = Reg[rs]; Reg[rs] = Reg[rt] 1. Which new functional blocks (if any) do we need for this...
Given the extended LAN shown in Figure 3.46, indicate which ports are not selected by the spanning tree algorithm. Figure 3. 46) E G A B1 1 B7 B4 D B2 (B3) B6 (B5 F H J B
How long does it take to transmit x kB over a y-Mbps link? Give your answer as a ratio of x and y.
In this exercise we look at memory locality properties of matrix computation. The following code is written in C, where elements within the same row are stored contiguously. Assume each word is a...
Use a computer-based logic minimization program to design the instruction decoder for a RISC from Table 10-3. Create an HDL model of your design and verify its correctness in simulation. Table 10-3...
For the RISC CPU in Figure 10-8, manually simulate, in hexadecimal, the processing of the instruction ADI R1 R16 2F01 located in PC = 10F. Assume that R16 contains 0000001F. Show the contents of each...
Inputs X i and Y i of each full adder in an arithmetic circuit have digital logic specified by the Boolean functions where S is a selection variable, C in is the input carry, and A i and B i are...
Repeat Problem 4-59, assuming that the circuit consists of two copies of the circuit in Figure 4-49 with input X of the second circuit copy driven by output Y of the first circuit copy. Problem 4-59...
The state diagram for a sequential circuit appears in Figure 4-51. Figure 4-51 (a) Find the state table for the circuit. (b) Make a state assignment for the circuit using 3-bit codes for the six...
Consider the circuits in Figure P10-6 and answer the following questions. (a) What is the maximum number of poles possible for each of the circuits? (b) Can any of the circuits shown have an unstable...
A first-order dynamic system is modeled as \[\dot{y}+3 y=f(t), y(0)=1\] Assuming the input \(f(t)\) is a step function with magnitude 0.8 , find \(y_{s s}\).
The model of a dynamic system is derived as \[3 \ddot{x}+7 \dot{x}+2 x=50 \sin t, x(0)=-1, \dot{x}(0)=1\] Find the system's total response, and identify the transient and steady-state responses.
When do you use primitives like load linked and store conditional? 1. When cooperating threads of a parallel program need to synchronize to get proper behavior for reading and writing shared data 2....
Trace the Shirt program in Figures 8.6, 8.7a, and 8.7b, using either the short form or the long form. To help you get started, heres the trace setup, including the input. If you use the long form,...
Given the system described by the state equations (a) Calculate the transfer function Y(z)/U(z), using (2-84). (b) Draw a simulation diagram for this system, from the state equations given. (c) Use...
Given the second-order digital-filter transfer function Figure p2.8-2 Figure p2. 8-1 2z-2.4z+0.72 z - 1.4z +0.98 (a) Find the coefficients of the 3D structure of Fig. P2.8-1 such that D(z) is...
Shown in Fig. P2.8-2 is the second-order digital-filter structure 1X. e(k) 83 84 fi(k) f(k) b 81 T 82 82 T 81 FIGURE P2.8-2 Digital-filter structure 1X. y(k)
Let T = 0.1 s for the system of Fig. P5.4-4. Derive a set of discrete state equations for the close dloop system, for the plant described by each of the differential equations. U(s) + M(s) T 1-8-7's...
In the system of Fig. P5.3-11, the ideal time delay represents the time required to complete the computations in the computer. (a) Derive the output function C (z) for this system. (b) Suppose that...
Find the z-transform of the following functions, using z-transform tables. Compare the pole-zero locations of E(z) in the z-plane with those of E(s) and E * (s) in the s-plane. Let T = 0.1s- (a) (c)...
Consider the following fragment of assembly language that is to be executed on a generic three way superscalar processor that can accommodate one memory access per clock. Rewrite the code to improve...
Consider the robot-joint control system of Fig. P5.3-13. This system is described in Problem 1.5-4. Problem 1.5-4 T Controller D(z) Volts Power Zero-order hold Servomotor Ea 200 100 s (0.5 s + 1)...
Repeat Problem 4.3-2 for the case that T = 0.1 s and the plant transfer function is given by: Problem 4.3-2 (a) Find the system response at the sampling instants to a unit step input for the system...
Suppose a 100-Mbps point-to-point link is being set up between Earth and a new lunar colony. The distance from the moon to the Earth is approximately 385,000 km, and data travel over the link at the...
Consider the RL circuit shown in Figure 8.1a, consisting of a resistance \(R\) and an inductance \(L\). The initial current is \(i(0)=i_{0}\). Assuming the applied voltage \(v_{a}\) is modeled as a...
Suppose we want to process the continuous-time signal \[x_{\mathrm{a}}(t)=3 \cos (2 \pi 1000 t)+7 \sin (2 \pi 1100 t)\] using a discrete-time system. The sampling frequency used is 4000 samples per...
The results of the SPEC CPU 2006 bzip2 benchmark running on an AMD Barcelona has an instruction count of 2.389E12, an execution time of 750 s, and a reference time of 9650 s. 1. Find the CPI if the...
For the following MIPS assembly instructions above, what is a corresponding C statement? add f, g, h add f, i, f
Assume a 15 cm diameter wafer has a cost of 12, contains 84 dies, and has 0.020 defects/cm 2 . Assume a 20 cm diameter wafer has a cost of 15, contains 100 dies, and has 0.031 defects/cm 2 . 1. Find...
Th e Pentium 4 Prescott processor, released in 2004, had a clock rate of 3.6 GHz and voltage of 1.25 V. Assume that, on average, it consumed 10 W of static power and 90 W of dynamic power. The Core...
Compilers can have a profound impact on the performance of an application. Assume that for a program, compiler A results in a dynamic instruction count of 1.0E9 and has an execution time of 1.1 s,...
For the following C statement, what is the corresponding MIPS assembly code? Assume that the variables f, g, h, and i are given and could be considered 32-bit integers as declared in a C program. Use...
Find the shortest sequence of MIPS instructions that extracts bits 16 down to 11 from register $t0 and uses the value of this field to replace bits 31 down to 26 in register $t1 without changing the...
Write the MIPS assembly code that creates the 32-bit constant 0010 0000 0000 0001 0100 1001 0010 0100two and stores that value to register $t1.
Assume 185 and 122 are signed 8-bit decimal integers stored in sign-magnitude format. Calculate 185 - 122. Is there overflow, underflow, or neither?
Write down the binary representation of the decimal number 63.25 assuming it was stored using the single precision IBM format (base 16, instead of base 2, with 7 bits of exponent).
IEEE 754-2008 contains a half precision that is only 16 bits wide. The left most bit is still the sign bit, the exponent is 5 bits wide and has a bias of 15, and the mantissa is 10 bits long. A...
The Hewlett-Packard 2114, 2115, and 2116 used a format with the left most 16 bits being the fraction stored in twos complement format, followed by another 16-bit fi eld which had the left most 8 bits...
Calculate by hand 8.625 10 1 divided by -4.875 10 0 . Show all the steps necessary to achieve your answer. Assume there is a guard, a round bit, and a sticky bit, and use them if necessary. Write...
For the problems in this exercise, assume that there are no pipeline stalls and that the breakdown of executed instructions is as follows: 1. In what fraction of all cycles is the data memory used?...
Give an implementation of the size( ) method for the DoublyLinkedList class, assuming that we did not maintain size as an instance variable.
In this exercise, we examine how data dependences affect execution in the basic 5-stage pipeline described in Section 4.5. Problems in this exercise refer to the following sequence of instructions:...
This exercise is intended to help you understand the cost/complexity/ performance trade-off s of forwarding in a pipelined processor. Problems in this exercise refer to pipelined datapaths from...
Give an algorithm for concatenating two doubly linked lists L andM, with header and trailer sentinel nodes, into a single list L.
The number of operations executed by algorithms A and B is 8nlogn and 2n 2 , respectively. Determine n 0 such that A is better than B for n n 0 .
This exercise is intended to help you understand the relationship between forwarding, hazard detection, and ISA design. Problems in this exercise refer to the following sequence of instructions, and...
Show that (n+1) 5 is O(n 5 ).
In this exercise we compare the performance of 1-issue and 2-issue processors, taking into account program transformations that can be made to optimize for 2-issue execution. Problems in this...
This exercise explores energy efficiency and its relationship with performance. Problems in this exercise assume the following energy consumption for activity in Instruction memory, Registers, and...
Given an array A of n arbitrary integers, design an O(n)-time method for finding an integer that cannot be formed as the sum of two integers in A.
Redo the justification of Proposition 7.2 assuming that the the cost of growing the array from size k to size 2k is 3k cyber-dollars. How much should each push operation be charged to make the...
The java.util.ArrayList includes a method, trimToSize( ), that replaces the underlying array with one whose capacity precisely equals the number of elements currently in the list. Implement such a...
Given the set of element {a,b,c,d,e, f } stored in a list, show the final state of the list, assuming we use the move-to-front heuristic and access the elements according to the following sequence:...
Is the search tree of Figure 11.22(a) a (2,4) tree? Why or why not? Figure 11.22(a) 22 5 10 25 3 4 23 24 6 8 14 27 11 13 17 (a)
The ALU supported set on less than (slt) using just the sign bit of the adder. Lets try a set on less than operation using the values -7 ten and 6 ten . To make it simpler to follow the example, lets...
Assume that we are using a linked representation of a complete binary tree T, and an extra reference to the last node of that tree. Show how to update the reference to the last node after operations...
Give an implementation of the deque ADT using an array list for storage.
Give a precise and complete definition of the concept of matching for grouping symbols in an arithmetic expression. Your definition may be recursive.
Would you use the adjacency matrix structure or the adjacency list structure in each of the following cases? Justify your choice. a. The graph has 10,000 vertices and 20,000 edges, and it is...
Give an example input that requires merge-sort and heap-sort to take O(nlogn) time to sort, but insertion-sort runs in O(n) time. What if you reverse this list?
Suppose we are given two n-element sorted sequences A and B each with distinct elements, but potentially some elements that are in both sequences. Describe an O(n)-time method for computing a...
The rules for a deletion in an AVL tree specifically require that when the two subtrees of the node denoted as y have equal height, child x should be chosen to be aligned with y (so that x and y are...
Repeat the previous problem, considering the case in which ys children start with different heights. Previous problem Consider a deletion operation in an AVL tree that triggers a trinode...
Match the following to one or more layers of the TCP/IP protocol suite: a. Route determination b. Connection to transmission media c. Providing services for the end user
When we use local telephones to talk to a friend, are we using a circuit switched network or a packet-switched network?
What are the three criteria necessary for an effective and efficient network?
What is an internet? What is the Internet?
A beam of light moves from one medium to another medium with less density. The critical angle is 60. Do we have refraction or reflection for each of the following incident angles? Show the bending of...
Figure 8.28 shows a switch in a virtual-circuit network. Find the output port and the output VCI for packets with the following input port and input VCI addresses: a. Packet 1: 3, 78 b. Packet 2: 2,...
Using Figure 7.16, tabulate the attenuation (in dB) of an optical fiber for the indicated wavelength and distances. Figure 7.16 100 50 10 0.5 0.1 0.05 0.01 800 1000 1200 1400 1600 1800 Wavelength...
Assume that a voice channel occupies a bandwidth of 4 kHz. We need to multiplex 10 voice channels with guard bands of 500 Hz using FDM. Calculate the required bandwidth.
A cable company uses one of the cable TV channels (with a bandwidth of 6 MHz) to provide digital communication for each resident. What is the available data rate for each resident if the company uses...
The telephone line has 4 KHz bandwidth. What is the maximum number of bits we can send using each of the following techniques? Let d = 0. a. ASK b. QPSK c. 16-QAM d. 64-QAM
What is the required bandwidth for the following cases if we need to send 4000 bps? Let d = 1. a. ASK b. FSK with 2f = 4 KHz c. QPSK d. 16-QAM
Draw the constellation diagram for the following: a. ASK, with peak amplitude values of 1 and 3 b. BPSK, with a peak amplitude value of 2 c. QPSK, with a peak amplitude value of 3 d. 8-QAM with two...
Calculate the baud rate for the given bit rate and type of modulation. a. 2000 bps, FSK b. 4000 bps, ASK c. 6000 bps, QPSK d. 36,000 bps, 64-QAM
Consider an n k crossbar switch with n inputs and k outputs. a. Can we say that the switch acts as a multiplexer if n > k? b. Can we say that the switch acts as a demultiplexer if n < k?
An NRZ-I signal has a data rate of 100 Kbps. Using Figure 4.6, calculate the value of the normalized energy (P) for frequencies at 0 Hz, 50 KHz, and 100 KHz. Figure 4.6 10 | 0 | 1 0 | r = 1 Save =...
Define a DC component and its effect on digital transmission.
How many bits can fit on a link with a 2 ms delay if the bandwidth of the link is a. 1 Mbps? b. 10 Mbps? c. 100 Mbps?
We need to upgrade a channel to a higher bandwidth. Answer the following questions: a. How is the rate improved if we double the bandwidth? b. How is the rate improved if we double the SNR?
What is the theoretical capacity of a channel in each of the following cases? a. Bandwidth: 20 KHz SNR dB = 40 b. Bandwidth: 200 KHz SNR dB = 4 c. Bandwidth: 1 MHz SNR dB = 20
The attenuation of a signal is 10 dB. What is the final signal power if it was originally 5 W?
Is the frequency domain plot of an alarm system discrete or continuous?
What is the frequency of the signal in Figure 3.36? 4 ms Time
Can we say whether a signal is periodic or nonperiodic by just looking at its frequency domain plot? How?
What is the phase shift for the following? a. A sine wave with the maximum amplitude at time zero b. A sine wave with maximum amplitude after 1/4 cycle c. A sine wave with zero amplitude after 3/4...
Unstuff the following frame payload in which E is the escape byte, F is the flag byte, and D is a data byte other than an escape or a flag character. D DEF E D DD DE E
Assume the network in Figure 9.7 does not support broadcasting. What do you suggest for sending the ARP request in this network? Figure 9.7 LAN System A System B N, L, N, L2 Request N3L3 N, L4...
In a slotted Aloha network with G = 1/2, how is the throughput affected in each of the following cases? a. G is increased to 1. b. G is decreased to 1/4.
In the previous problem, we showed that the throughput is S = Ge 2G for a pure Aloha network and S = Ge G for a slotted Aloha network. In this problem, we want to find the value of G in each network...
To understand the uses of K in Figure 12.13, find the probability that a station can send immediately in each of the following cases: Figure 12.13 a. After one failure. b. After four failures....
Assume the propagation delay in a broadcast network is 5 s and the frame transmission time is 10 s. a. How long does it take for the first bit to reach the destination? b. How long does it take for...
We have a pure ALOHA network with a data rate of 10 Mbps. What is the maximum number of 1000-bit frames that can be successfully sent by this network?
Can the value of a traditional checksum be all 0s (in binary)? Defend your answer.
Assume we are sending data items of 16-bit length. If two data items are swapped during transmission, can the traditional checksum detect this error? Explain.
Consider Figure 1. 1 (b). Suppose that each link between the server and the client has a packet loss probability p, and the packet loss probabilities for these links are independent. What is the...
Consider the rt2.2 receiver in Figure 3.14, and the creation of a new packet in the se1f-ansition (i.e., the transition from the state back to itself) in the Waifor-0-from-below arid the...
Consider the previous problem, but suppose that D has the value a. 1001010101. b. 0101101010. c. 1010100000.
In Section 8.6. 1, it is shown that without sequence numbers, Trudy (a woman- in-the middle) can wreak havoc in an SSL session by interchanging TCP segments. Can Trudy do something similar by...