Computer Architecture: RISC vs CISC
47 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a primary characteristic of RISC architectures?

  • Complex assembly code requiring manual optimization
  • High code density
  • Numerous instruction addressing modes
  • Effective compiler optimization (correct)
  • In socket programming with TCP, what must a client do to successfully contact a server?

  • Wait for the server to automatically establish a connection
  • Create a UDP socket to initiate contact
  • Use the correct IP address and port number of the server process (correct)
  • Specify an arbitrary port number of the server process
  • When referring to a socket in communication, which analogy accurately describes its function?

  • It serves as a bridge for connecting multiple communication links.
  • It operates as a gatekeeper for network security protocols.
  • It acts as a door through which messages are sent and received. (correct)
  • It functions as a mailbox for sending various messages.
  • What is the primary goal of routing protocols in networking?

    <p>To determine optimal paths through a network of routers</p> Signup and view all the answers

    Which of the following statements is true regarding CISC architectures?

    <p>They often have numerous addressing modes and instructions.</p> Signup and view all the answers

    What is the primary purpose of the Master In Slave Out (MISO) line in the SPI protocol?

    <p>To send data from slave to master</p> Signup and view all the answers

    Which of the following statements about I2C is correct?

    <p>I2C can have multiple masters.</p> Signup and view all the answers

    In a hard real-time system, what is the consequence of violating timing constraints?

    <p>Failure of the system occurs.</p> Signup and view all the answers

    Which characteristic is true regarding TCP compared to UDP?

    <p>TCP is connection-oriented while UDP is connectionless.</p> Signup and view all the answers

    What is a significant advantage of SPI over I2C?

    <p>SPI supports full-duplex communication.</p> Signup and view all the answers

    In which architecture do both data and instructions share the same memory?

    <p>Von Neumann architecture</p> Signup and view all the answers

    Which of the following best describes an application of soft real-time systems?

    <p>GPS map</p> Signup and view all the answers

    What is a notable disadvantage of I2C compared to SPI?

    <p>Higher power consumption than SPI</p> Signup and view all the answers

    What is the function of a watchdog timer?

    <p>To detect and recover from system malfunctions</p> Signup and view all the answers

    Which statement correctly describes the priority of interrupts?

    <p>Higher-numbered interrupt lines can be prioritized by reconnection</p> Signup and view all the answers

    In an I2C communication setup, what role does the master play?

    <p>It generates the bus clock and sends signals</p> Signup and view all the answers

    What differentiates a counter from a timer?

    <p>A timer updates continuously over time</p> Signup and view all the answers

    Which statement best describes multi-master I2C systems?

    <p>Multiple masters can communicate simultaneously but require arbitration</p> Signup and view all the answers

    What is a characteristic of a non-maskable interrupt (NMI)?

    <p>It is the highest priority and cannot be masked</p> Signup and view all the answers

    In SPI communication, what does MOSI stand for?

    <p>Master Out Slave In</p> Signup and view all the answers

    What triggers an interrupt in a timer or counter system?

    <p>Exceeding a predefined time limit or rollover</p> Signup and view all the answers

    What is the primary difference between a router and a switch in terms of the layer they operate on?

    <p>Routers are network-layer devices, while switches are link-layer devices.</p> Signup and view all the answers

    What role does a base station play in a wireless network?

    <p>It serves as a relay between wired networks and wireless hosts.</p> Signup and view all the answers

    In passive scanning, what is the first step initiated by Access Points (APs)?

    <p>Beacon frames sent from Access Points.</p> Signup and view all the answers

    Which mechanism ensures that the highest priority interrupt is processed first by the CPU?

    <p>Priorities.</p> Signup and view all the answers

    What happens during a handoff in a wireless infrastructure mode?

    <p>A mobile host connects to a new base station.</p> Signup and view all the answers

    Which statement accurately describes ad hoc mode in wireless networks?

    <p>Nodes can only communicate if within direct link coverage.</p> Signup and view all the answers

    Which of the following best describes the way routers compute their forwarding tables?

    <p>They compute tables based on routing algorithms using IP addresses.</p> Signup and view all the answers

    What is the main purpose of a multiple access protocol in wireless networks?

    <p>To coordinate link access among multiple devices.</p> Signup and view all the answers

    What is the main disadvantage of non-persistent HTTP compared to persistent HTTP?

    <p>Needs multiple TCP connections for multiple objects</p> Signup and view all the answers

    In non-persistent HTTP, what is the formula used to calculate response time?

    <p>2RTT + file transmission time</p> Signup and view all the answers

    Which of the following best describes the role of the transport layer?

    <p>Enhances network layer services</p> Signup and view all the answers

    What does TDMA stand for in the context of MAC protocols?

    <p>Time Division Multiple Access</p> Signup and view all the answers

    What is a primary characteristic of Slotted ALOHA?

    <p>Time is divided into equal slots for transmitting frames</p> Signup and view all the answers

    Which MAC protocol allows nodes to recover from collisions?

    <p>Random access</p> Signup and view all the answers

    In persistent HTTP, how is response time affected as compared to non-persistent HTTP?

    <p>It is reduced to one RTT for all referenced objects</p> Signup and view all the answers

    What does the term 'channel partitioning' in MAC protocols refer to?

    <p>Dividing the channel into smaller exclusive pieces for nodes</p> Signup and view all the answers

    Which is NOT an assumption of Slotted ALOHA?

    <p>Time is not divided into slots</p> Signup and view all the answers

    What is an example of a MAC protocol classified under 'taking turns'?

    <p>Time Division Multiple Access (TDMA)</p> Signup and view all the answers

    What characterizes multiplexing at the sender in a data communication context?

    <p>It includes adding transport headers for demultiplexing.</p> Signup and view all the answers

    Which I/O method allows for multiple inputs and outputs simultaneously?

    <p>Parallel I/O</p> Signup and view all the answers

    In synchronous communication, what is the role of the Master device?

    <p>It generates the clock signal for data transmission.</p> Signup and view all the answers

    In which mode can the sender transmit and receive data simultaneously?

    <p>Full-duplex</p> Signup and view all the answers

    What is essential for asynchronous communication to function properly?

    <p>A data recovery mechanism.</p> Signup and view all the answers

    Which of the following reduces the overhead in data transmission methods?

    <p>Serial I/O with fewer wires.</p> Signup and view all the answers

    What is the primary function of a transport header in data communication?

    <p>To facilitate accurate demultiplexing.</p> Signup and view all the answers

    What distinguishes half-duplex mode from full-duplex mode?

    <p>Half-duplex transmits data alternately, not at the same time.</p> Signup and view all the answers

    Study Notes

    RISC vs CISC

    • CISC (Complex Instruction Set Computer)

      • Used in early computer architectures
      • Many addressing modes and instructions
      • High code density
      • Often requires manual optimization for embedded systems
    • RISC (Reduced Instruction Set Computer)

      • Compact, uniform instructions facilitate pipelining
      • More lines of code may have a poor memory footprint
      • Allows effective compiler optimizations

    Sockets

    • Process sends/receives messages to/from its socket
    • Socket analogous to a door
    • Sending process shoves message out the door
    • Sending process relies on the transport infrastructure on the other side of the door to deliver the message to the receiving process's socket

    Socket Programming (Example)

    • Server:
      • Creates a socket, specifies port (e.g., x)
      • Binds socket to local port number
      • Enters an infinite loop:
        • Reads data from a socket
        • Converts input to upper-case
        • Sends upper-cased data back to client
    • Client:
      • Creates a socket
      • Connects to the server's hostid (IP address) and port (x)
      • Sends a message
      • Reads and prints the server's response

    Python UDPClient/Server

    • Client:
      • Imports socket library
      • Creates a UDP socket
      • Sends a message to the server
      • Receives and prints the modified message from the server
      • Closes the socket
    • Server:
      • Imports socket library
      • Creates a UDP socket and binds it to a port number
      • Enters an infinite loop to receive messages and send back upper-cased responses.

    Routing Protocol Goal

    • Determine the "good" path from sending hosts to receiving hosts
    • Path: Sequence of routers the packets will traverse
    • Good: fastest, least congested, least cost
    • Routing is a top-10 networking challenge

    HTTP Connections

    • Non-persistent HTTP:
      • At most one object sent over a TCP connection
      • Connection is closed
      • Downloading multiple objects requires multiple connections
    • Persistent HTTP:
      • Multiple objects can be sent over a single TCP connection

    Non-persistent HTTP (cont.)

    • Steps for a user entering a URL with multiple objects
      • Client initiates a TCP connection to the server
      • Sends an HTTP request message
      • Server sends response message, including requested object
      • Client receives the response and displays it
      • Server closes the TCP connection
      • Steps repeated for each object requested

    Persistent HTTP

    • Server leaves connection open after sending response
    • Client sends requests as soon as it encounters a referenced object
    • Response time reduced compared to non-persistent HTTP

    Transport vs Network Layer

    • Network Layer: Logical communication between hosts

    • Transport Layer: Logical communication between processes

      • Relies on, and enhances network layer services

    MAC Protocols

    • Channel partitioning: Splits the channel into smaller pieces (time slots, frequencies, or codes)
    • Random access: Divides channel, allows collisions, handles collisions, with recover mechanisms like "taking turns."
    • TDMA: Time division multiple access, divides channel into rounds, and each station gets a fixed time slot.
    • FDMA: Frequency division multiple access, splits channel spectrum into frequency bands.

    Switches vs Routers

    • Both store-and-forward
    • Routers: Network-layer devices, examine network layer headers.
    • Switches: Link-layer devices, examine link-layer headers.
      • Both have forwarding tables.

    HTTP Time

    • RTT: Time for a small packet to travel from client to server and back
    • Non-persistent HTTP: 2RTT + File transmission time
    • Persistent HTTP: As little as one RTT for all referenced objects

    Interrupts

    • Interrupt handling mechanisms
    • Priorities determine which interrupt is handled first
    • Vectors establish handlers for specific interrupts types.

    Timers and Counters

    • Increment periodically by either a periodic signal (timer) or an asynchronous signal (counter)
    • A timeout or rollover causes interrupts

    Watchdog Timer

    • I/O device that detects system malfunctions
    • Periodically reset by the system timer
    • Timeout generates an interrupt to reset the host if not reset

    Inter-integrated Circuit (I2C)

    • Two-wire interface with simple master/slave relationships
    • Software addressable devices
    • Master device generates bus clock
    • Slaves listen for bus and wait for addressing by master
    • Arbitration decides which master to use the wire, if multiple masters are connected
    • I2C terminology: master, slave, multi-master, arbitration

    Serial Peripheral Interface (SPI)

    • Serial Protocol
    • Communication over short distance
    • Master device generates clock signal (SCLK), MOSI (master output), MISO (master input), slave select(SS).

    Real-time

    • Hard deadlines: must be met for system integrity.
    • Missing a deadline results in degraded system performance.

    TCP vs UDP

    • TCP (Transmission Control Protocol) reliable connection-based protocol. Sends data in a sequence, ensures integrity, and can manage congestion.
    • UDP (User Datagram Protocol) unreliable connectionless protocol. Sends data as best effort, faster but lacks guaranteed delivery or integrity.

    Multiplexing and Demultiplexing

    • Multiplexing combines data from multiple sources onto a single channel.
    • Demultiplexing separates data for different destinations from a single channel.

    Parallel I/O vs Serial I/O

    • Parallel I/O transfers data simultaneously using multiple lines in parallel. (Data bus, Address bus)
    • Serial I/O transfers bits sequentially using a single line.

    Synchronous vs Asynchronous Communication

    • Synchronous: Requires a common clock signal between transmitter and receiver for synchronized data transfers. Timing is crucial for reliable operation.
    • Asynchronous: Does not require a common clock. It uses start/stop bits or other signaling mechanism to provide timing information for communication. Less overhead, but more complex to implement.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Study Concepts 40862 PDF

    Description

    This quiz explores the key differences between RISC (Reduced Instruction Set Computer) and CISC (Complex Instruction Set Computer) architectures. It also covers the basics of socket programming, including how processes communicate through sockets. Test your understanding of these fundamental concepts in computer science.

    More Like This

    RISC & CISC: Evaluating Expression X
    42 questions
    CMSC 132: Computer Architecture
    29 questions

    CMSC 132: Computer Architecture

    RestfulWatermelonTourmaline5201 avatar
    RestfulWatermelonTourmaline5201
    Arquiteturas RISC e CISC
    40 questions
    Use Quizgecko on...
    Browser
    Browser