Computer Science 432/563
Operating Systems

Spring 2016, The College of Saint Rose

Lecture 0x18: Architecture Crash Course Part 1: Digital Logic; Protection and Security; Encryption
Date: Monday, April 25, 2016

Agenda

Lecture 0x18 Assignment

Due at the start of class, Wednesday, April 27.

Please submit answers to these questions either as a hard copy (typeset or handwritten are OK) or by email to terescoj AT strose.edu by the start of class. Please use a clear subject line when submitting by email (e.g., CS 432 Lecture 0x18 Assignment, Mary Smith). We will discuss these questions at the start of class, so no late submissions are accepted.

The readings for next class are SG&G Chapter 14.

  1. Explain briefly the security risk involved in having the entry "." in your search path in a Unix system. (3 points)
  2. Since the time to access data for both hits and misses affects performance, designers often use an effective access time (EAT) to evaluate alternative cache designs. Effective access time can be defined as:
    EAT = thit + rmiss * tmiss
    for a hit time of thit, a miss rate of rmiss and a miss penalty of tmiss.
    a. Find the EAT for a processor with a 2 ns clock, tmiss = 20 clock cycles, rmiss = 0.05 misses per instruction, and a thit (cache access time, including hit detection) = 1 clock cycle. Assume that the read and write miss penalties are the same and ignore other write stalls. (4 points)
    b. Suppose we can improve rmiss to 0.03 misses per reference by doubling the cache size. This causes the cache access time thit to increase to 1.2 clock cycles. Using the EAT as a metric, determine if this is a good trade-off. (4 points)

Examples

See the Logisim example circuits in the shared areas on mogul and ascg.

Links

Topic notes links from an old offering of my computer organization class: