HW4
.pdf
keyboard_arrow_up
School
Northeastern University *
*We aren’t endorsed by this school
Course
7352
Subject
Computer Science
Date
Feb 20, 2024
Type
Pages
3
Uploaded by Codja
EECE 7352: Computer Architecture HW4: Due at 11:59pm April 21, 2022 As always, goals of these assignments are to help you: (1) practice knowledge gained during the lectures, (2) learn new technical material (esp. experimental learning), (3) apply course concepts and principles to new problems, (4) develop additional skills in expressing yourself in writing and orally, (5) analyze and evaluate ideas, arguments, and points of view. You will not receive any points if you simply copy paste from the suggested readings or online resources. Please express your ideas, understanding and viewpoints in your own words (why steal others’ words to convey what should be completely your point!). Question 1. (30 points) Download and set up the Dinero IV cache simulator on a COE machine. The Dinero IV cache simulator is available here: http://pages.cs.wisc.edu/~markhill/DineroIV/ We will use the traditional din input format for the trace (-informat d). You can find more details on using dineroIV by issuing dineroIV –help. Dinero allows you to configure a cache using command line. The simulator takes as input an address trace. We will use the "din" input format, which is an ASCII file with one LABEL and one ADDRESS per line. The rest of the line is ignored so that it can be used for comments. LABEL = 0 read data = 1 write data = 2 instruction fetch = 3 escape record (treated as unknown access type) = 4 escape record (causes cache flush) 0 <= ADDRESS <= ffffffff where the hexadecimal addresses are NOT preceded by "0x." Here are some examples: 2 0 This is an instruction fetch at hex address 0. 0 1000 This is a data read at hex address 1000. 1 70f60888 This is a data write at hex address 70f60888. Given a trace file (e.g., trace.txt), you run Dinero as follows: ./dineroIV –l1-isize 32K –l1-ibsize 32 –l1-dsize 16K –l1-dbsize 32 -informat d < trace.txt This will simulate a 32 KB instruction cache with a 32 byte cache block size and a 16 KB data cache with a 32 byte block size.
(A)
[18 points] Using the trace provided on the Canvas as input to DineroIV (trace.txt), model an instruction cache and a data cache with a combined total cache space of 32KB (for a split cache, assume a 16KB instruction cache and a 16KB data cache. The block size should be varied (32B, 64B and 128B) and the associativity should be varied (direct mapped and 8-way). Model both split (separate instruction and data caches) and shared (all accesses go to a single cache that holds both instructions and data) caches. These are a total of 12 simulations. No other parameters should be varied. Graph the results you get from these experiments and analyze in detail the trends you observe inyour graphs. Copy the trace file provided to the COE Linux system /local system to complete your homework. (B)
[12 points] In this interesting part, you will generate reference streams in Dinero's din format that achieve a specific purpose (you do not need to use the trace given in part A). When turning in your report, submit enough of the trace so that we can understand the reasoning and provide some evidence that you have been successful in achieving the desired goal whenever possible. 1.
Assume that you have a 2-way set associative 16KB instruction cache with 32Byte block size and the replacement policy is LRU. Generate an address stream that touches every cache set exactly 5 times, producing 3 misses and 2 hits, but only 3 unique addresses access each set. Describe your approach in detail. 2.
Given a n-way set associative 16KB instruction cache with 32Byte block size and the replacement policy as LRU (when n is great than 1), how would you generate one or multiple address stream to decode the associativity of the cache (i.e., value of n)? Of course, given an access stream, you can observe the hit and miss events from this n-way set associative cache. Q2. (10 points)
This paper is surprisingly novel and insightful. Most programmers focus on optimizing parts of their code that take up most of the execution time. This paper (surprisingly) shows why such an intuitive and long-standing practice might not be optimal. It introduces the concept of “virtual speed ups” where effect of speeding up a certain part of the program on the whole execution time is estimated. Please read this paper and list three major findings and why do you think they are important and correct! “COZ: Finding Code that Counts with Causal Profiling” (SOSP 2015) https://sigops.org/s/conferences/sosp/2015/current/2015-Monterey/printable/090-curtsinger.pdf
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Project - ITDR2104 (10 Marks)
General Instructions:
This project work consists of four parts. This is not a group work. Every student must
work on this project individually.
This project has to be completed as we make progress in this course.
Each part of the project can be completed within 3 weeks from the completion of relevant
part in class.
Two or more students submitting a similar report will get ZERO marks.
• Submit this report on 23/12/2021 4nm through Blackboard only. No email submission
will be acknowledged/accepted/marked.
Part-1:5 marks
Create a Java Project (with a class and a test class) to represent some real-world entity such as a
technology item (TV, Fan etc), an animal, a person, a vehicle, etc. In our class, we have already
seen example classes such as Circle, Student, Rectangle, TV etc.
The class will:
a) Create a total of 5 member variables for the class by selecting the appropriate data types
for each field. For example, a class to represent a lamp might include…
arrow_forward
ASSIGNMENT - MIDTERM
Due: Fri, Apr 16 2021 at 11:59 PM
1. Why is there a need to review literature rewalated
to one's study?
2. How does beginner go about doing a review?
3. Where in the research process should the review
of related literature be made?
arrow_forward
(a) Every invention or innovation is brought about by the successful application of a
physical or chemical principle or theory (like the law of gravity, law of floatation
etc.). With this in mind, identify any three recent inventions and briefly detail the
principles on which they are based on and how they operate.
(b) Computers follow the same basic logical structure and perform five basic operations
for converting raw input data into information. As an IT professional, technically
explain in detail how processing is done from the input device such as keyboard
through the activities of the central processing unit and memory. Illustrate these
processes and explain how the data outputs onto your output devices such as the
screen.
(c) You have been short listed for an interview for promotion by your company based on
your current program of study. One of the panel members ask you a simple question,
“What is your “strength or strong hold” in your current field of study and what…
arrow_forward
Computer Science
You are the project manager of a building construction project. A conflict has emerged between two key stakeholders due to their personal working styles. This conflict has been escalated to you and you should facilitate a satisfactory resolution.
Part A: Explain your resolution strategy. Part B: How would you address the issue.
arrow_forward
Computer Science
Scenario: Suppose you were to let your friend use your computer for a couple of hours in order for them to complete their homework assignments.
What kind of precautions would you take before letting them use your computer?
In those precautions, what is the logic behind your reasoning?
How would your precautions change if this computer was being used by the general public instead?
arrow_forward
When working with computers and other forms of technology, it is beneficial to have a fundamental grasp of computers. This applies to both computer technology and other sorts of technology.To what degree are educational institutions, industry, and society as a whole able to profit more from embracing technological advancements than they risk losing out due to the possible downsides associated with these developments?
arrow_forward
Every invention or innovation is brought about by the successful application of aphysical or chemical principle or theory (like the law of gravity, law of floatation etc.). With this in mind, identify three recent inventions and carefully detail the principles on which they are based on
arrow_forward
To what extent is it important to be technologically literate, and how can one acquire such skills?
arrow_forward
If you are dealing with a subject that might benefit from the assistance of an expert system, could you please provide at least five rules for the knowledge base as well as one fact for the working memory?
arrow_forward
The usage of computers and information systems is now prevalent in many common items such as amusement park rides, automobiles, elevators, and ovens, among other things, that you would not usually connect with computers or information systems. There are certain advantages, but are there any dangers as well? If, for example, you were riding a roller coaster that was computer controlled, would you feel more or less at ease? Alternatively, would you feel secure enough traveling in a Tesla with the auto-drive function turned on? What are the advantages and disadvantages of computerizing a growing number of daily objects? Do the potential benefits outweigh the risks? What is the reason for this or why is it not?
arrow_forward
Conclusion: End your research with a conclusion that summarizes the importance of being computer literate and encourages elderly persons to take steps towards improving their computer literacy.
arrow_forward
Please write them in Clarity and Concision way.
Computer technology and its associated software applications in conjunction with the widespread usage of the World Wide Web have had the most profound and visible effects of any invention in modern history.
Technologies have dramatically impacted and modified our complex communication systems, exchanges of information, and commercial endeavors.
As technology permeates nearly every facet of business entities, the question is whether today’s college students receive adequate information and assistance as they prepare for the high-tech world of business.
A multitude of employers is now testing prospective employees prior to employment to determine if their information technology knowledge and skill levels will meet or exceed their technology expectations in terms of meeting their workplace needs.
arrow_forward
Systems Analysis Assignment (Microsoft Word and Excel)
You and your team have been hired to set up a computer classroom for Tech United, Inc. An up
and coming tech startup who will like to become a tech training company.
Tech United, Inc. wants to offer various different kinds of tech training at their new office location.
They have only one classroom space available that can accommodate up to 30 students. The
classroom is already equipped with tables and chairs. The classroom, however, does not have any
computers, routers, projectors, smartboard etc. This is where you come in. The company has
$40,000 as a starting budget and will like for you to determine for them what
computers/keyboards/mouse/router/printer/smartboard etc. they should buy. You determine
based on their budget, how many of each item should be purchased for the classroom.
Deliverables
Deliverable Part 1: A systems analysis report on what kind of computers and hardware the
company should use in their classroom,…
arrow_forward
Education is the process of facilitating learning, or the acquisition of knowledge, skills, values, morals, beliefs, habits, and personal development. Educational methods include teaching, training, storytelling, discussion and directed research. Education frequently takes place under the guidance of educators; however, learners can also educate themselves. Education can take place in formal or informal settings, and any experience that has a formative effect on the way one thinks, feels, or acts may be considered educational. The methodology of teaching is called pedagogy.
Describe the overriding benefits of education, training, and awareness.
arrow_forward
Computer Science
ADMISSION AND ENROLLMENT PROCEDURES
1. Evaluation of School Credentials
2. Entrance Examination
3. Issuance of Notice of Admission (NOA) for
examination passer at the Guidance Office
4. Get the medical referral slip at the campus
clinic
5. Take the interview at the Department of
your chosen course. Have the NOA signed if
you'are accepted to the program
6. If accepted, proceed to the date of medical
examination. If not, go to the Guidance office
7. Claim the medical examination result at the
campus clinic
8. Submit all the requirements at the Campus
Registrar
Faculty
please help me to create a data flow diagram
(DFD)
From this proceedures., thanks in advance!
arrow_forward
In the contemporary era characterized by the proliferation of information, what are the reasons for acquiring computer literacy?
arrow_forward
Computer Science:
Provide an overview of assigning of people and resources to each activity in the WBS.
arrow_forward
Life and Times of the Thunderbolt Kid by Bill Bryson:
My sister and brother were considerably older than I -
my sister by six years, my brother by nine - and so
were effectively adults from my perspective. They
were big enough to be seldom around for most of my
childhood. For the first few years of my life, I shared a
small bedroom with my brother. We got along fine. My
brother had constant colds and allergies, and owned at
least four hundred cotton handkerchiefs, which he
devotedly filled with great honks and then pushed into
any convenient resting place under the mattress,
between sofa cushions, behind the curtains. When I was
nine he left for college and a life as a journalist in
New York City, never to return permanently, and I
the room to myself after that. But I was still finding
his handkerchiefs when I was in high school. Q/ What
?do we learn about Michael in this paragraph
He was proud of his collection of
handkerchiefs.
O
He found sharing a room inconvenient. O
He had some…
arrow_forward
To what extent may these difficulties be avoided?
arrow_forward
5
arrow_forward
Do you have any personal or anecdotal proof that computers have been important in the classroom for decades?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,
Related Questions
- Project - ITDR2104 (10 Marks) General Instructions: This project work consists of four parts. This is not a group work. Every student must work on this project individually. This project has to be completed as we make progress in this course. Each part of the project can be completed within 3 weeks from the completion of relevant part in class. Two or more students submitting a similar report will get ZERO marks. • Submit this report on 23/12/2021 4nm through Blackboard only. No email submission will be acknowledged/accepted/marked. Part-1:5 marks Create a Java Project (with a class and a test class) to represent some real-world entity such as a technology item (TV, Fan etc), an animal, a person, a vehicle, etc. In our class, we have already seen example classes such as Circle, Student, Rectangle, TV etc. The class will: a) Create a total of 5 member variables for the class by selecting the appropriate data types for each field. For example, a class to represent a lamp might include…arrow_forwardASSIGNMENT - MIDTERM Due: Fri, Apr 16 2021 at 11:59 PM 1. Why is there a need to review literature rewalated to one's study? 2. How does beginner go about doing a review? 3. Where in the research process should the review of related literature be made?arrow_forward(a) Every invention or innovation is brought about by the successful application of a physical or chemical principle or theory (like the law of gravity, law of floatation etc.). With this in mind, identify any three recent inventions and briefly detail the principles on which they are based on and how they operate. (b) Computers follow the same basic logical structure and perform five basic operations for converting raw input data into information. As an IT professional, technically explain in detail how processing is done from the input device such as keyboard through the activities of the central processing unit and memory. Illustrate these processes and explain how the data outputs onto your output devices such as the screen. (c) You have been short listed for an interview for promotion by your company based on your current program of study. One of the panel members ask you a simple question, “What is your “strength or strong hold” in your current field of study and what…arrow_forward
- Computer Science You are the project manager of a building construction project. A conflict has emerged between two key stakeholders due to their personal working styles. This conflict has been escalated to you and you should facilitate a satisfactory resolution. Part A: Explain your resolution strategy. Part B: How would you address the issue.arrow_forwardComputer Science Scenario: Suppose you were to let your friend use your computer for a couple of hours in order for them to complete their homework assignments. What kind of precautions would you take before letting them use your computer? In those precautions, what is the logic behind your reasoning? How would your precautions change if this computer was being used by the general public instead?arrow_forwardWhen working with computers and other forms of technology, it is beneficial to have a fundamental grasp of computers. This applies to both computer technology and other sorts of technology.To what degree are educational institutions, industry, and society as a whole able to profit more from embracing technological advancements than they risk losing out due to the possible downsides associated with these developments?arrow_forward
- Every invention or innovation is brought about by the successful application of aphysical or chemical principle or theory (like the law of gravity, law of floatation etc.). With this in mind, identify three recent inventions and carefully detail the principles on which they are based onarrow_forwardTo what extent is it important to be technologically literate, and how can one acquire such skills?arrow_forwardIf you are dealing with a subject that might benefit from the assistance of an expert system, could you please provide at least five rules for the knowledge base as well as one fact for the working memory?arrow_forward
- The usage of computers and information systems is now prevalent in many common items such as amusement park rides, automobiles, elevators, and ovens, among other things, that you would not usually connect with computers or information systems. There are certain advantages, but are there any dangers as well? If, for example, you were riding a roller coaster that was computer controlled, would you feel more or less at ease? Alternatively, would you feel secure enough traveling in a Tesla with the auto-drive function turned on? What are the advantages and disadvantages of computerizing a growing number of daily objects? Do the potential benefits outweigh the risks? What is the reason for this or why is it not?arrow_forwardConclusion: End your research with a conclusion that summarizes the importance of being computer literate and encourages elderly persons to take steps towards improving their computer literacy.arrow_forwardPlease write them in Clarity and Concision way. Computer technology and its associated software applications in conjunction with the widespread usage of the World Wide Web have had the most profound and visible effects of any invention in modern history. Technologies have dramatically impacted and modified our complex communication systems, exchanges of information, and commercial endeavors. As technology permeates nearly every facet of business entities, the question is whether today’s college students receive adequate information and assistance as they prepare for the high-tech world of business. A multitude of employers is now testing prospective employees prior to employment to determine if their information technology knowledge and skill levels will meet or exceed their technology expectations in terms of meeting their workplace needs.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningA+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,