Category: computer-sciences-systems-analysis-and-design

Order the answer to: Exercise 4.5 asks you to add the Exclusive state to

computer-sciences-systems-analysis-and-design

Order the answer to: Exercise 4.5 asks you to add the Exclusive state to

Posted By George smith

Question
Exercise 4.5 asks you to add the Exclusive state to the simple MSI snooping protocol. Discuss why this is much more difficult to do with the simple directory protocol. Give an example of the kinds of issues that arise.

Subject
Read More

Order the answer to: Exercise 4.3 asks you to add the Owned state to

computer-sciences-systems-analysis-and-design

Order the answer to: Exercise 4.3 asks you to add the Owned state to

Posted By George smith

Question
Exercise 4.3 asks you to add the Owned state to the simple MSI snooping protocol. Repeat the question, but with the simple directory protocol above.

Subject
computer-sciences-systems-analysis-and-design

Read More
Order the answer to: Directory protocols are more scalable than snooping protocols because they

computer-sciences-systems-analysis-and-design

Order the answer to: Directory protocols are more scalable than snooping protocols because they

Posted By George smith

Question
Directory protocols are more scalable than snooping protocols because they send explicit request and invalidate messages to those nodes that have copies of a block, while snooping protocols broadcast all requests and invalidates to all nodes. Consider the 16-processor system illustrated in

Read More
Order the answer to: For each part of this exercise, assume the initial cache

computer-sciences-systems-analysis-and-design

Order the answer to: For each part of this exercise, assume the initial cache

Posted By George smith

Question
For each part of this exercise, assume the initial cache and memory state in Figure 4.42. Each part of this exercise specifies a sequence of one or more CPU operations of the form:
P#:

Subject
computer-sciences-systems-analysis-and-design

Read More
Order the answer to: The switched snooping protocol above supports sequential consistency in part

computer-sciences-systems-analysis-and-design

Order the answer to: The switched snooping protocol above supports sequential consistency in part

Posted By George smith

Question
The switched snooping protocol above supports sequential consistency in part by making sure that reads are not performed while another node has a writeable block and writes are not performed while another processor has a writeable block. A more aggressive protocol will

Read More
Order the answer to: Sequential consistency (SC) requires that all reads and writes appear

computer-sciences-systems-analysis-and-design

Order the answer to: Sequential consistency (SC) requires that all reads and writes appear

Posted By George smith

Question
Sequential consistency (SC) requires that all reads and writes appear to have executed in some total order. This may require the processor to stall in certain cases before committing a read or write instruction. Consider the following code sequence:
Write A
Read More

Order the answer to: Exercise 4.5 asks you to add the Exclusive state to

computer-sciences-systems-analysis-and-design

Order the answer to: Exercise 4.5 asks you to add the Exclusive state to

Posted By George smith

Question
Exercise 4.5 asks you to add the Exclusive state to the simple MSI snooping protocol. Discuss why this is much more difficult to do with the switched snooping protocol. Give an example of the kinds of issues that arise.

Subject
Read More

Order the answer to: Exercise 4.3 asks you to add the Owned state to

computer-sciences-systems-analysis-and-design

Order the answer to: Exercise 4.3 asks you to add the Owned state to

Posted By George smith

Question
Exercise 4.3 asks you to add the Owned state to the simple MSI snooping protocol. Repeat the question, but with the switched snooping protocol above.

Subject
computer-sciences-systems-analysis-and-design

Read More
Order the answer to: The switched snooping protocol of Figure 4.40 assumes that memory

computer-sciences-systems-analysis-and-design

Order the answer to: The switched snooping protocol of Figure 4.40 assumes that memory

Posted By George smith

Question
The switched snooping protocol of Figure 4.40 assumes that memory “knows” whether a processor node is in state Modified and thus will respond with data. Real systems implement this in one of two ways. The first way uses a shared “Owned” signal.

Read More
Order the answer to: A) What is brute-force password guessing?
b) Why is it important

computer-sciences-systems-analysis-and-design

Order the answer to: A) What is brute-force password guessing? b) Why is it important

Posted By George smith

Question
a) What is brute-force password guessing?
b) Why is it important to not simply use all lowercase letters in passwords?
c) What are complex passwords?
d) Why is password length important?
e) What is a dictionary attack?

Read More