System Architecture Flashcards

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/110

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

111 Terms

1
New cards

Harvard Architecture

The Harvard architecture is a computer design that separates memory for instructions (program code) and data, allowing simultaneous access to both.

Key Features:

- Separate memory spaces for instructions and data.

- Parallel access improves speed.

- Simpler instruction pipelines.

Applications: Used in microcontrollers, DSPs, and real-time systems.

2
New cards

Harvard Architecture Advantages and Disadvantages

Advantages:

Faster processing.

Efficient for embedded systems.

Separate caches improve performance.

Disadvantages:

More hardware complexity.

Higher cost.

Limited flexibility (e.g., self-modifying code).

3
New cards

What is branch prediction?

Branch prediction is a CPU technique that guesses the outcome of a decision to keep the pipeline full and reduce delays.

4
New cards

How does branch prediction work?

The CPU guesses the branch direction before it's resolved.

5
New cards

What happens when the CPU makes a correct guess in branch prediction?

Smooth execution occurs.

6
New cards

What happens when the CPU makes a wrong guess in branch prediction?

A pipeline flush occurs, resulting in a performance penalty.

7
New cards

What are the two types of branch prediction?

Static and dynamic.

8
New cards

What is static branch prediction?

Static branch prediction uses fixed rules, such as always predicting taken.

9
New cards

What is dynamic branch prediction?

Dynamic branch prediction uses historical data, such as a Branch History Table.

10
New cards

What is a pro of branch prediction?

It speeds up execution and minimizes CPU stalls.

11
New cards

What is a con of branch prediction?

Wrong predictions cause delays and add design complexity.

12
New cards

stages of the MIPS pipeline

Fetch instruction, decode/read register, execute, access memory, write to register

13
New cards

Stall

Waiting for the next instruction to be fetched after a branch is taken

14
New cards

The Higher level languages are platform independent because of?

The last two phases of the complier process can be rewritten for different machines

15
New cards

What does CISC stand for?

Complex Instruction Set Computer

16
New cards

What is a characteristic of CISC regarding instruction size?

Variable instruction size

17
New cards

What does RISC stand for?

Reduced Instruction Set Computer

18
New cards

What type of instructions does RISC use?

Simple, limited instructions (one per cycle)

19
New cards

What is a characteristic of RISC instruction size?

Fixed instruction size

20
New cards

What is RISC optimized for?

Speed and efficiency

21
New cards

Does RISC require more or fewer lines of code compared to other architectures?

More lines of code

22
New cards

In what types of devices is RISC commonly used?

Mobile devices and embedded systems

23
New cards

What is one advantage of CISC architecture?

Optimized for reducing program size

24
New cards

What is a disadvantage of CISC architecture?

Fewer lines of code but slower execution

25
New cards

In which types of CPUs is CISC commonly found?

Common in desktop and server CPUs (e.g., x86)

26
New cards

Sequential Locality

Instructions tend to be accessed sequentially. When programs access memory locations in a certain order.

27
New cards

What is 2's complement a good way of representing negative numbers?

No special sign bit, easy to implement in hardware, no -0

28
New cards

MAR <- X

MBR <- M[MAR]

AC <- AC + MBR

Add X

29
New cards

Computers made in order from the 1st to now

Mechanical, Vacuum tube, Transistor, IC, VLSI, SoC

30
New cards

What is the difference in operation between a LOAD x and a LOADI x instruction?

The LOAD loads the value at address x to the AC; the LOADI loads the value found in the location addressed by the value in x to the AC

31
New cards

PC <- X

Jump X

32
New cards

What are the two fields in an instruction?

Opcode & Address

33
New cards

What is pipelining?

Pipelining is a technique where tasks are divided into smaller subtasks executed in parallel.

- Increases instruction throughput.

- Seen in the fetch-decode-execute cycle.

- Reduces CPU idle time.

1. Performance measured by:Execution time (latency): Time to 2. complete one task.Throughput: Tasks completed per unit time.

34
New cards

What are pipelining hazards?

Situations preventing the next instruction in the pipeline. Types include:

- Data Hazard: Dependency on previous instruction results.

- Control Hazard: Decision outcome unknown (e.g., branch).

- Structural Hazard: Hardware limitations for simultaneous tasks.

35
New cards

What is MIPS

MIPS (Microprocessor without Interlocked Pipeline Stages) is used in embedded systems with a 5-stage pipeline:

IF: Instruction Fetch.

ID: Instruction Decode.

EX: Execute/Address Calculation.

MEM: Access Memory.

WB: Write Back to Register.

36
New cards

How to resolve control hazards?

Stall on Branch: Wait for branch outcome before fetching.

Branch Prediction: Guess the outcome and proceed; correct predictions save time.

Delayed Decisions: Rearrange non-decision-related instructions to fill the gap.

37
New cards

What is instruction-level parallelism (ILP)?

ILP measures the number of operations that can be executed simultaneously.

Independent instructions are executed in parallel.

Dependent instructions wait for results of earlier ones.

38
New cards

How to resolve data hazards?

Forwarding: Use results before they're written to registers.

Bubbles/Interlock: Delay pipeline stages.

Compiler Optimization: Rearrange instructions to avoid stalls.

39
New cards

What are superscalar architectures?

Superscalar processors execute multiple instructions in parallel using:

Multiple pipelines or execution units.

Out-of-order execution to maximize ILP.

40
New cards

What is the meaning of ALU?

Arithmetic Logic Unit

41
New cards

What is the numeric range of an 8-bit binary number in 2's complement arithmetic?

-128 ...127

42
New cards

What is Flynn's Taxonomy?

A classification of parallel architectures:

SISD: Single Instruction, Single Data (sequential).

MISD: Multiple Instruction, Single Data (rare).

SIMD: Single Instruction, Multiple Data (e.g., vector processing).

MIMD: Multiple Instruction, Multiple Data (e.g., multicore systems).

43
New cards

What is Flynn's Taxonomy?

Flynn's Taxonomy classifies computer architectures based on simultaneous instruction and data streams:

SISD (Single Instruction, Single Data):

Sequential, no parallelism.

Example: Traditional single-core processors.

SIMD (Single Instruction, Multiple Data):

One instruction, multiple data streams.

Example: GPUs, vector processors.

MISD (Multiple Instruction, Single Data):

Multiple instructions, same data.

Rare; used in fault-tolerant systems.

MIMD (Multiple Instruction, Multiple Data):

Multiple instructions, multiple data streams.

Example: Multicore CPUs, clusters.

44
New cards

Which best describes the concept of context switching?

Preserve the process state and switch the CPU to another process

45
New cards

What were the essential functions of the simplest possible OS?

Load, execute and terminate a program

46
New cards

Exclusive-OR (XOR) logic gates can be constructed from what other logic gates?

AND gates, OR gates, and NOT gates

47
New cards

MAR <- X

MBR <- M [MAR]

AC <- AC + MBR

ADD X

48
New cards

What is a computer system architecture?

It's the fundamental organization of a computer system, its components, their relationships, and design principles.

49
New cards

Describe the von Neumann model.

A stored-program computer with components: Control Unit, ALU, Registers, Main Memory, and I/O System. It operates using a single datapath.

50
New cards

What is the principle of abstraction in computer science?

It involves representing essential features without unnecessary details, allowing for reduced complexity and efficient system design.

51
New cards

What are the historical generations of computers?

Mechanical Calculating Machines (1642-1945)

First Generation: Vacuum Tube Computers (1945-1953)

Second Generation: Transistorised Computers (1955-1965)

Third Generation: Integrated Circuit Computers (1965-1980)

Fourth Generation: VLSI Computers (1980-Now)

52
New cards

What are the main systems in a computer?

Processor

Motherboard

Main Memory

Disk Drives

Expansion Cards

I/O Ports

Case

53
New cards

What is Moore's law?

The transistor count in integrated circuits doubles approximately every 18-24 months.

54
New cards

What is a semiconductor?

A material that can act as a conductor or insulator, essential for making transistors and silicon chips.

55
New cards

What were mechanical calculating machines capable of?

They performed basic arithmetic operations and included devices like the Difference Engine and Analytical Engine.

56
New cards

What advancements did third-generation computers introduce?

Integrated circuits, multiprogramming, time-sharing, and smaller, faster, cheaper systems.

57
New cards

What does the term "von Neumann bottleneck" refer to?

Delays caused by a single memory space for instructions and data.

58
New cards

What is the positional number system?

It represents numbers based on the position of digits and powers of the base, such as base 10 for decimal.

59
New cards

How do binary numbers represent data?

Using two symbols, "0" (off) and "1" (on), which can represent text, instructions, or numbers.

60
New cards

Define "bit," "byte," "nibble," and "word."

Bit: A single binary digit (0 or 1).

Byte: 8 bits.

Nibble: 4 bits.

Word: Two or more adjacent bytes.

61
New cards

What is the difference between signed and unsigned binary numbers?

Signed: Uses one bit for the sign (0 = positive, 1 = negative).

Unsigned: Does not use a bit for sign; all bits represent the number.

62
New cards

What are the steps for converting a negative number to binary using 2's complement?

Write the number as a positive binary.

Flip the bits (0 → 1, 1 → 0).

Add 1 to the flipped number.

63
New cards

What are floating-point numbers used for?

Representing very large, very small, rational, and irrational numbers.

64
New cards

What is hexadecimal, and why is it used?

A base-16 number system (0-9, A-F) used to simplify long binary numbers.

65
New cards

How do you convert binary to hexadecimal?

Split the binary number into 4-bit nibbles, then convert each nibble to hexadecimal.

66
New cards

What is ASCII used for?

Representing characters as binary numbers, limited to 128 or 256 characters.

67
New cards

What advantage does Unicode have over ASCII?

It can represent over 109,000 characters, including emojis and symbols from various languages.

68
New cards

What is a bitmap?

A matrix of bits representing an image, with pixel depth determining the color range.

69
New cards

How many bits per pixel do modern color images require?

24 bits or more per pixel for millions of colors.

70
New cards

What is Boolean Algebra?

A mathematical system for manipulating variables that have two values: 1 (true/on) or 0 (false/off).

71
New cards

What are the three main components of a simple computer?

CPU, Main Memory, and Input/Output Subsystem.

72
New cards

What are the core parts of the CPU?

he Datapath (includes ALU and Registers) and the Control Unit.

73
New cards

What is the role of the Control Unit (CU) in a CPU?

It sequences operations based on program counter values and signals other components.

74
New cards

How is clock speed measured, and what does it represent?

Measured in GHz or MHz; represents how fast a CPU can execute instructions.

75
New cards

What is MARIE architecture?

A simplified computer model for understanding CPU functionality and low-level programming.

76
New cards

Name the primary registers in MARIE.

AC, MAR, MBR, PC, IR, InReg, OutReg.

77
New cards

What are the key characteristics of MARIE architecture?

2's complement binary data representation.

Fixed 16-bit word length.

4K word-addressable main memory

78
New cards

Describe the Fetch-Decode-Execute (FDE) cycle in MARIE.

Fetch instruction → Decode in IR → Retrieve operand → Execute instruction.

79
New cards

What is the SKIPCOND instruction in MARIE?

Acts like an "IF" statement, skipping the next instruction based on the AC value.

80
New cards

How does MARIE differentiate between direct and indirect addressing?

Direct: Operand's address is in the instruction.

Indirect: Address of the operand's address is in the instruction.

81
New cards

What is an assembler's role?

Converts human-readable instructions (e.g., LOAD 104) into machine language.

82
New cards

What is the main difference between RISC and CISC architectures?

RISC: Few instructions, single-cycle execution, post-1990.

CISC: Complex instructions, multiple cycles, pre-1990.

83
New cards

What is the Instruction Set Architecture (ISA)?

Specifies the set of instructions a computer can perform, serving as an interface between hardware and software.

84
New cards

How is microoperation sequence defined in MARIE?

Using Register Transfer Language (RTL), e.g., M[X]←ACM[X] \leftarrow ACM[X]←AC to show memory transfer.

85
New cards

How does the program counter (PC) function in MARIE?

It holds the address of the next instruction to be executed and increments after each instruction.

86
New cards

What are the two types of main memory

AM (volatile) and ROM (non-volatile)

87
New cards

What are the two types of RAM?

DRAM (Dynamic RAM) and SRAM (Static RAM

88
New cards

What are key characteristics of DRAM?

Uses capacitors, requires frequent refreshing.

Low power consumption.

Small size and low cost.

89
New cards

What are key characteristics of SRAM?

Uses 6 transistors per bit, fast access.

High power consumption.

Larger size and high cost.

90
New cards

ROM Overview

What is ROM?A: Non-volatile memory used to store permanent data that cannot be changed.

91
New cards

Name the types of ROM.

PROM, EPROM, EEPROM, and Flash Memory.

92
New cards

Arrange the memory hierarchy from fastest to slowest.

Registers → L1 Cache → L2 Cache → Main Memory → SSD → HDD → Optical Disk → Magnetic Tape.

93
New cards

What is a hit and a miss in memory?

Hit: Data found at a memory level.

Miss: Data not found, requiring access to lower levels.

94
New cards

Effective Access Time (EAT) Formula

EAT=H×Access TimeC​+(1−H)×Access TimeMM​,where HHH is hit rate.

95
New cards

What are the three cache mapping methods?

Direct Mapping, Associative Mapping, and Set-Associative Mapping.

96
New cards

What is virtual memory?A:

Temporary memory used when RAM is full, storing tasks in secondary storage.

97
New cards

What are the three forms of locality?

Temporal locality, Spatial locality, Sequential locality.

98
New cards

What is the difference between split and combined cache?

Split Cache: Separate pathways for instructions and data (Harvard Architecture).

Combined Cache: Shared pathway (Von Neumann Architecture).

99
New cards

What is flash memory, and where is it used?

A modern EEPROM used in USB drives, SSDs, and phones.

100
New cards

What is the role of an operating system?

The OS is a hardware interface, resource manager, and execution platform for programs.