Computer Architecture: RISC vs CISC

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a primary characteristic of RISC architectures?

  • Complex assembly code requiring manual optimization
  • High code density
  • Numerous instruction addressing modes
  • Effective compiler optimization (correct)

In socket programming with TCP, what must a client do to successfully contact a server?

  • Wait for the server to automatically establish a connection
  • Create a UDP socket to initiate contact
  • Use the correct IP address and port number of the server process (correct)
  • Specify an arbitrary port number of the server process

When referring to a socket in communication, which analogy accurately describes its function?

  • It serves as a bridge for connecting multiple communication links.
  • It operates as a gatekeeper for network security protocols.
  • It acts as a door through which messages are sent and received. (correct)
  • It functions as a mailbox for sending various messages.

What is the primary goal of routing protocols in networking?

<p>To determine optimal paths through a network of routers (D)</p> Signup and view all the answers

Which of the following statements is true regarding CISC architectures?

<p>They often have numerous addressing modes and instructions. (B)</p> Signup and view all the answers

What is the primary purpose of the Master In Slave Out (MISO) line in the SPI protocol?

<p>To send data from slave to master (B)</p> Signup and view all the answers

Which of the following statements about I2C is correct?

<p>I2C can have multiple masters. (D)</p> Signup and view all the answers

In a hard real-time system, what is the consequence of violating timing constraints?

<p>Failure of the system occurs. (D)</p> Signup and view all the answers

Which characteristic is true regarding TCP compared to UDP?

<p>TCP is connection-oriented while UDP is connectionless. (A)</p> Signup and view all the answers

What is a significant advantage of SPI over I2C?

<p>SPI supports full-duplex communication. (B)</p> Signup and view all the answers

In which architecture do both data and instructions share the same memory?

<p>Von Neumann architecture (C)</p> Signup and view all the answers

Which of the following best describes an application of soft real-time systems?

<p>GPS map (C)</p> Signup and view all the answers

What is a notable disadvantage of I2C compared to SPI?

<p>Higher power consumption than SPI (A)</p> Signup and view all the answers

What is the function of a watchdog timer?

<p>To detect and recover from system malfunctions (B)</p> Signup and view all the answers

Which statement correctly describes the priority of interrupts?

<p>Higher-numbered interrupt lines can be prioritized by reconnection (A)</p> Signup and view all the answers

In an I2C communication setup, what role does the master play?

<p>It generates the bus clock and sends signals (A)</p> Signup and view all the answers

What differentiates a counter from a timer?

<p>A timer updates continuously over time (D)</p> Signup and view all the answers

Which statement best describes multi-master I2C systems?

<p>Multiple masters can communicate simultaneously but require arbitration (D)</p> Signup and view all the answers

What is a characteristic of a non-maskable interrupt (NMI)?

<p>It is the highest priority and cannot be masked (A)</p> Signup and view all the answers

In SPI communication, what does MOSI stand for?

<p>Master Out Slave In (D)</p> Signup and view all the answers

What triggers an interrupt in a timer or counter system?

<p>Exceeding a predefined time limit or rollover (B)</p> Signup and view all the answers

What is the primary difference between a router and a switch in terms of the layer they operate on?

<p>Routers are network-layer devices, while switches are link-layer devices. (A)</p> Signup and view all the answers

What role does a base station play in a wireless network?

<p>It serves as a relay between wired networks and wireless hosts. (D)</p> Signup and view all the answers

In passive scanning, what is the first step initiated by Access Points (APs)?

<p>Beacon frames sent from Access Points. (A)</p> Signup and view all the answers

Which mechanism ensures that the highest priority interrupt is processed first by the CPU?

<p>Priorities. (D)</p> Signup and view all the answers

What happens during a handoff in a wireless infrastructure mode?

<p>A mobile host connects to a new base station. (D)</p> Signup and view all the answers

Which statement accurately describes ad hoc mode in wireless networks?

<p>Nodes can only communicate if within direct link coverage. (C)</p> Signup and view all the answers

Which of the following best describes the way routers compute their forwarding tables?

<p>They compute tables based on routing algorithms using IP addresses. (C)</p> Signup and view all the answers

What is the main purpose of a multiple access protocol in wireless networks?

<p>To coordinate link access among multiple devices. (D)</p> Signup and view all the answers

What is the main disadvantage of non-persistent HTTP compared to persistent HTTP?

<p>Needs multiple TCP connections for multiple objects (B)</p> Signup and view all the answers

In non-persistent HTTP, what is the formula used to calculate response time?

<p>2RTT + file transmission time (A)</p> Signup and view all the answers

Which of the following best describes the role of the transport layer?

<p>Enhances network layer services (C)</p> Signup and view all the answers

What does TDMA stand for in the context of MAC protocols?

<p>Time Division Multiple Access (B)</p> Signup and view all the answers

What is a primary characteristic of Slotted ALOHA?

<p>Time is divided into equal slots for transmitting frames (C)</p> Signup and view all the answers

Which MAC protocol allows nodes to recover from collisions?

<p>Random access (D)</p> Signup and view all the answers

In persistent HTTP, how is response time affected as compared to non-persistent HTTP?

<p>It is reduced to one RTT for all referenced objects (B)</p> Signup and view all the answers

What does the term 'channel partitioning' in MAC protocols refer to?

<p>Dividing the channel into smaller exclusive pieces for nodes (C)</p> Signup and view all the answers

Which is NOT an assumption of Slotted ALOHA?

<p>Time is not divided into slots (C)</p> Signup and view all the answers

What is an example of a MAC protocol classified under 'taking turns'?

<p>Time Division Multiple Access (TDMA) (B)</p> Signup and view all the answers

What characterizes multiplexing at the sender in a data communication context?

<p>It includes adding transport headers for demultiplexing. (C)</p> Signup and view all the answers

Which I/O method allows for multiple inputs and outputs simultaneously?

<p>Parallel I/O (D)</p> Signup and view all the answers

In synchronous communication, what is the role of the Master device?

<p>It generates the clock signal for data transmission. (A)</p> Signup and view all the answers

In which mode can the sender transmit and receive data simultaneously?

<p>Full-duplex (B)</p> Signup and view all the answers

What is essential for asynchronous communication to function properly?

<p>A data recovery mechanism. (B)</p> Signup and view all the answers

Which of the following reduces the overhead in data transmission methods?

<p>Serial I/O with fewer wires. (A)</p> Signup and view all the answers

What is the primary function of a transport header in data communication?

<p>To facilitate accurate demultiplexing. (C)</p> Signup and view all the answers

What distinguishes half-duplex mode from full-duplex mode?

<p>Half-duplex transmits data alternately, not at the same time. (C)</p> Signup and view all the answers

Flashcards

CISC

Complex Instruction Set Computer, used in early architectures, with many addressing modes and instructions, resulting in dense code requiring manual optimization.

RISC

Reduced Instruction Set Computer, using compact and uniform instructions for efficient pipelining. Although it requires more lines of code, it allows for effective compiler optimization.

Socket

A communication endpoint for processes, analogous to a door. Sending processes send messages through the socket, relying on the transport infrastructure to deliver them to the receiving process.

TCP Socket Programming

A client-server communication method using TCP sockets. The client initiates contact with a server process, establishing a connection via TCP. The server creates a new socket for each client, allowing for multiple connections.

Signup and view all the flashcards

Routing Protocol Goal

To determine the best path for data packets from a source host to a destination host through a network of routers, considering factors like cost, speed, and congestion.

Signup and view all the flashcards

Master In Slave Out (MISO)

A line in SPI communication where the master device sends data to the slave device.

Signup and view all the flashcards

Slave Select (SS)

A pin that allows the master device to select and enable specific slave devices in SPI communication.

Signup and view all the flashcards

SPI vs. I2C

Both are synchronous serial protocols for embedded applications, but differ in key features.

Signup and view all the flashcards

Hard Real-Time

A system where missing deadlines causes failure, often critical in safety systems like ABS.

Signup and view all the flashcards

Soft Real-Time

A system where missing deadlines results in degraded performance, like video streaming.

Signup and view all the flashcards

Von Neumann Architecture

A computer architecture where data and instructions share the same memory address space.

Signup and view all the flashcards

Harvard Architecture

A computer architecture where data and instructions have separate memory spaces.

Signup and view all the flashcards

TCP vs. UDP

Two network protocols with contrasting characteristics: TCP is reliable and connection-oriented, while UDP is faster and connectionless.

Signup and view all the flashcards

Multiplexing

Combining data from multiple sources into one channel for transmission.

Signup and view all the flashcards

Demultiplexing

Separating data streams received on a single channel into their original sources.

Signup and view all the flashcards

Parallel I/O

Simultaneous transmission of data between a device and the CPU using multiple wires, allowing faster data transfer.

Signup and view all the flashcards

Serial I/O

Sequential transmission of data bits one after the other using a single wire, ideal for long distances.

Signup and view all the flashcards

Synchronous Communication

Data transfer using a shared clock signal synchronized between both sender and receiver.

Signup and view all the flashcards

Asynchronous Communication

Data transfer without a shared clock signal, where the receiver uses a separate clock derived from data.

Signup and view all the flashcards

Simplex Transmission

Communication in only one direction, with sender unable to receive data.

Signup and view all the flashcards

Half-duplex Transmission

Communication where data can be sent and received but only one direction at a time.

Signup and view all the flashcards

Routers vs. Switches

Routers operate at the network layer, examining IP addresses and using routing algorithms to forward packets. Switches work at the link layer, examining MAC addresses and learning their forwarding table using flooding.

Signup and view all the flashcards

Wireless Network Elements

Wireless networks consist of wireless hosts (laptops, smartphones), a base station connected to the wired network, a wireless link connecting mobiles to the base station, and infrastructure or ad hoc mode for connectivity.

Signup and view all the flashcards

Base Station Role

A base station connects the wired network to wireless hosts, acting as a relay for communication between them and the wired network.

Signup and view all the flashcards

Infrastructure vs. Ad Hoc Mode

Infrastructure mode uses a base station to connect wireless devices to the wired network. Ad hoc mode allows devices to communicate directly without a base station.

Signup and view all the flashcards

Passive Scanning

Passive scanning involves listening for beacon frames from access points (APs) and sending an Association Request frame to the desired AP.

Signup and view all the flashcards

Active Scanning

Active scanning involves broadcasting a Probe Request frame, receiving Probe Response frames from APs, and then sending an Association Request frame.

Signup and view all the flashcards

Interrupt Priorities

Priorities determine the order in which interrupts from different devices are handled by the CPU, deciding which interrupt gets processed first.

Signup and view all the flashcards

Interrupt Vectors

Vectors specify the code that is executed when a particular type of interrupt occurs. This allows the CPU to respond correctly to different interrupt types.

Signup and view all the flashcards

Interrupt Masking

A mechanism to block interrupts with a lower priority than the current interrupt being handled. This prevents lower-priority interrupts from interrupting higher-priority tasks.

Signup and view all the flashcards

Non-Maskable Interrupt (NMI)

The highest priority interrupt, which cannot be masked and is always handled immediately.

Signup and view all the flashcards

Timer vs. Counter

Both are incremented, but a timer is incremented by a periodic signal while a counter is incremented by an asynchronous signal.

Signup and view all the flashcards

Watchdog Timer

A device that monitors system operation and triggers an interrupt if the system malfunctions (e.g., not resetting the watchdog timer).

Signup and view all the flashcards

I2C (Inter-Integrated Circuit) Bus

A two-wire serial communication protocol that simplifies communication between a master device and multiple slave devices.

Signup and view all the flashcards

I2C Master

The device that initiates communication on the I2C bus and controls the data flow. It generates the clock signal and sends data to slaves.

Signup and view all the flashcards

I2C Arbitration

A process to determine which master device will gain control of the I2C bus when multiple masters are connected.

Signup and view all the flashcards

Non-persistent HTTP

A type of HTTP connection where only one object is sent over a TCP connection before it is closed. Multiple objects require multiple connections.

Signup and view all the flashcards

Persistent HTTP

A type of HTTP connection where multiple objects can be sent over a single TCP connection between the client and server.

Signup and view all the flashcards

RTT (Round Trip Time)

The time it takes for a small packet to travel from the client to the server and back.

Signup and view all the flashcards

Non-persistent HTTP Response Time

The time it takes for a non-persistent HTTP request to complete, calculated as 2RTT + file transmission time.

Signup and view all the flashcards

Persistent HTTP Advantages

Persistent HTTP improves efficiency by reducing the number of TCP connections, leading to fewer RTTs and less OS overhead.

Signup and view all the flashcards

Network Layer

The layer in the network model responsible for logical communication between hosts.

Signup and view all the flashcards

Transport Layer

The layer in the network model responsible for logical communication between processes.

Signup and view all the flashcards

Channel Partitioning (MAC Protocol)

A MAC protocol strategy that divides the communication channel into smaller pieces (time slots, frequency bands, or codes) for exclusive use by different nodes.

Signup and view all the flashcards

Random Access (MAC Protocol)

A MAC protocol where multiple nodes can access the channel simultaneously, allowing for collisions, which are then handled through mechanisms like retransmission.

Signup and view all the flashcards

TDMA (Time Division Multiple Access)

A channel partitioning MAC protocol that divides time into fixed-length slots, assigning a slot to each node in a round-robin fashion.

Signup and view all the flashcards

Study Notes

RISC vs CISC

  • CISC (Complex Instruction Set Computer)

    • Used in early computer architectures
    • Many addressing modes and instructions
    • High code density
    • Often requires manual optimization for embedded systems
  • RISC (Reduced Instruction Set Computer)

    • Compact, uniform instructions facilitate pipelining
    • More lines of code may have a poor memory footprint
    • Allows effective compiler optimizations

Sockets

  • Process sends/receives messages to/from its socket
  • Socket analogous to a door
  • Sending process shoves message out the door
  • Sending process relies on the transport infrastructure on the other side of the door to deliver the message to the receiving process's socket

Socket Programming (Example)

  • Server:
    • Creates a socket, specifies port (e.g., x)
    • Binds socket to local port number
    • Enters an infinite loop:
      • Reads data from a socket
      • Converts input to upper-case
      • Sends upper-cased data back to client
  • Client:
    • Creates a socket
    • Connects to the server's hostid (IP address) and port (x)
    • Sends a message
    • Reads and prints the server's response

Python UDPClient/Server

  • Client:
    • Imports socket library
    • Creates a UDP socket
    • Sends a message to the server
    • Receives and prints the modified message from the server
    • Closes the socket
  • Server:
    • Imports socket library
    • Creates a UDP socket and binds it to a port number
    • Enters an infinite loop to receive messages and send back upper-cased responses.

Routing Protocol Goal

  • Determine the "good" path from sending hosts to receiving hosts
  • Path: Sequence of routers the packets will traverse
  • Good: fastest, least congested, least cost
  • Routing is a top-10 networking challenge

HTTP Connections

  • Non-persistent HTTP:
    • At most one object sent over a TCP connection
    • Connection is closed
    • Downloading multiple objects requires multiple connections
  • Persistent HTTP:
    • Multiple objects can be sent over a single TCP connection

Non-persistent HTTP (cont.)

  • Steps for a user entering a URL with multiple objects
    • Client initiates a TCP connection to the server
    • Sends an HTTP request message
    • Server sends response message, including requested object
    • Client receives the response and displays it
    • Server closes the TCP connection
    • Steps repeated for each object requested

Persistent HTTP

  • Server leaves connection open after sending response
  • Client sends requests as soon as it encounters a referenced object
  • Response time reduced compared to non-persistent HTTP

Transport vs Network Layer

  • Network Layer: Logical communication between hosts

  • Transport Layer: Logical communication between processes

    • Relies on, and enhances network layer services

MAC Protocols

  • Channel partitioning: Splits the channel into smaller pieces (time slots, frequencies, or codes)
  • Random access: Divides channel, allows collisions, handles collisions, with recover mechanisms like "taking turns."
  • TDMA: Time division multiple access, divides channel into rounds, and each station gets a fixed time slot.
  • FDMA: Frequency division multiple access, splits channel spectrum into frequency bands.

Switches vs Routers

  • Both store-and-forward
  • Routers: Network-layer devices, examine network layer headers.
  • Switches: Link-layer devices, examine link-layer headers.
    • Both have forwarding tables.

HTTP Time

  • RTT: Time for a small packet to travel from client to server and back
  • Non-persistent HTTP: 2RTT + File transmission time
  • Persistent HTTP: As little as one RTT for all referenced objects

Interrupts

  • Interrupt handling mechanisms
  • Priorities determine which interrupt is handled first
  • Vectors establish handlers for specific interrupts types.

Timers and Counters

  • Increment periodically by either a periodic signal (timer) or an asynchronous signal (counter)
  • A timeout or rollover causes interrupts

Watchdog Timer

  • I/O device that detects system malfunctions
  • Periodically reset by the system timer
  • Timeout generates an interrupt to reset the host if not reset

Inter-integrated Circuit (I2C)

  • Two-wire interface with simple master/slave relationships
  • Software addressable devices
  • Master device generates bus clock
  • Slaves listen for bus and wait for addressing by master
  • Arbitration decides which master to use the wire, if multiple masters are connected
  • I2C terminology: master, slave, multi-master, arbitration

Serial Peripheral Interface (SPI)

  • Serial Protocol
  • Communication over short distance
  • Master device generates clock signal (SCLK), MOSI (master output), MISO (master input), slave select(SS).

Real-time

  • Hard deadlines: must be met for system integrity.
  • Missing a deadline results in degraded system performance.

TCP vs UDP

  • TCP (Transmission Control Protocol) reliable connection-based protocol. Sends data in a sequence, ensures integrity, and can manage congestion.
  • UDP (User Datagram Protocol) unreliable connectionless protocol. Sends data as best effort, faster but lacks guaranteed delivery or integrity.

Multiplexing and Demultiplexing

  • Multiplexing combines data from multiple sources onto a single channel.
  • Demultiplexing separates data for different destinations from a single channel.

Parallel I/O vs Serial I/O

  • Parallel I/O transfers data simultaneously using multiple lines in parallel. (Data bus, Address bus)
  • Serial I/O transfers bits sequentially using a single line.

Synchronous vs Asynchronous Communication

  • Synchronous: Requires a common clock signal between transmitter and receiver for synchronized data transfers. Timing is crucial for reliable operation.
  • Asynchronous: Does not require a common clock. It uses start/stop bits or other signaling mechanism to provide timing information for communication. Less overhead, but more complex to implement.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Study Concepts 40862 PDF

More Like This

Arquiteturas RISC e CISC
40 questions
CISC vs RISC Architectures
16 questions
Use Quizgecko on...
Browser
Browser