Free Essay

Advanced Computer Architecture Hw

In: Computers and Technology

Submitted By jrambo
Words 598
Pages 3
(1.12) Case Study #4
Original Values from Figure 1.26 Chip | # of cores | Clock Frequency (MHz) | Memory Performance | Dhrystone Performance | Athlon 64 X2 4800+ | 2 | 2400 | 3423 | 20718 | Pentium EE 840 | 2 | 2200 | 3228 | 18893 | Pentium D 820 | 2 | 3000 | 3000 | 15220 | Athlon 64 X2 3800+ | 2 | 3200 | 2941 | 17129 | Pentium 4 | 1 | 2800 | 2731 | 7621 | Athlon 64 3000+ | 1 | 1800 | 2953 | 7628 | Pentium 4 570 | 1 | 2800 | 3501 | 11210 | Processor X | 1 | 3000 | 7000 | 5000 |

a) Results normalized to Pentium D 820
(calculation performed in MS Excel) Chip | # of cores | Clock Frequency (MHz) | Memory Performance | Dhrystone Performance | Athlon 64 X2 4800+ | 2 | 2400 | 1.141 | 1.361235217 | Pentium EE 840 | 2 | 2200 | 1.076 | 1.241327201 | Pentium D 820 | 2 | 3000 | 1 | 1 | Athlon 64 X2 3800+ | 2 | 3200 | 0.980333333 | 1.12542707 | Pentium 4 | 1 | 2800 | 0.910333333 | 0.500722733 | Athlon 64 3000+ | 1 | 1800 | 0.984333333 | 0.501182654 | Pentium 4 570 | 1 | 2800 | 1.167 | 0.73653088 | Processor X | 1 | 3000 | 2.333333333 | 0.328515112 |

b) Arithmetic means calculation results
(calculation performed in MS Excel) Chip | Original Arithmetic Means of Performance | Normalized Arithmetic Means of Performance | Athlon 64 X2 4800+ | 12070.5 | 1.251117608 | Pentium EE 840 | 11060.5 | 1.158663601 | Pentium D 820 | 9110 | 1 | Athlon 64 X2 3800+ | 10035 | 1.052880201 | Pentium 4 | 5176 | 0.705528033 | Athlon 64 3000+ | 5290.5 | 0.742757994 | Pentium 4 570 | 7355.5 | 0.95176544 | Processor X | 6000 | 1.330924223 |

c) Strictly looking at the arithmetic means results, the main conclusion would be that the values reflect a larger rate in performance in dual-core processors, over the single core processors. There however is one caveat to this finding, and that’s Processor X. Its normalized arithmetic mean is 1.330924223, which is the highest of all values. This is due to its memory performance being just a bit smaller than double that of the Pentium 4 750 single-core processor.

d) Geometric Means of Dhrystone Performance
(calculation performed in MS Excel)

Dual Core | 1.174314 | Single Core | 0.496404 |

Equation used: Geometric Mean = exp⁡(1n*i=1nlnsamplei)

e) X-Y Scatter Plot of Processor Performance

f) A dual-core processor is able to perform double the amount of CPU operations that a single-core processor can at any point in time. However, this only holds true as long as the memory does not create a bottleneck in the system. Looking at the scatter plot as well as previous results, it can be seen that the greater performance of dual-core processors lies in their ability to complete operations of the Dhrystone benchmark (which uses simple operations and non-floating-point values to mimic normal CPU operation). This is compared with roughly similar/average results in the memory benchmark.

a. Weighted Execution Time of Benchmarks
(calculation performed in MS Excel) Chip | Result | Athlon 64 X2 4800+ | 13800 | Pentium EE 840 | 12627 | Pentium D 820 | 10332 | Athlon 64 X2 3800+ | 11453.8 | Pentium 4 | 5665 | Athlon 64 3000+ | 5758 | Pentium 4 570 | 8126.4 | Processor X | 5800 |

Memory: 40%, Dhrystone: 60%

b) CPU Intensive Application Suite:
Pentium 4 -> Athlon 64 X2 4800 speedup = 20718 / 7621 => 2.719

Pentium 4 570 -> Athlon 64 X2 4800 speedup = 20718 / 11210 => 1.848

c) Pentium 4 570 -> Pentium D 820 x * 3501 + (1 - x) * 11210 = x * 3000 + (1 - x) * 15220
3501x + 11210 – 11210x = 3000x + 15220 – 15220x
3501x – 11210x – 3000x + 15220x = 15220 – 11210
4511x = 4010

x = 4010 / 4511 => 0.8889 (memory)
1 - 0.8889 = 0.1111 (processor)

Ratio = 0.8889 / 0.1111 = 8.0009

Similar Documents

Premium Essay

Matching Dell

...manufacturing inhouse (Main frame) • Open Architecture : OS – Microsoft, Microprocessor – Intel , reason, to encourage application developers and enhance Peripheral market • Sales : o Largely corporate clients - thought its huge sales force o Retail clients through value added resellers – handled, installations, configured SW,customer networks and service part of responsibility • Competition : Apple with propriety architecture had 20% market share, Compac enters in ’82, Dell in ’84, • Competitors strategy :: use resellers for large corporate accounts, due to lack of sales force • 1986- IBM moves to propriety architecture with PS/2 line and rejects 386 chip • 1980-90 – PC performace improved and chip price declined, o New technology advancement of 386DX and Pentium II processors were significant o Windows 3.0 launched in 1990, commonly called Wintel architecture o PC Sales declined in 1990 due to US recession • Post 1990 o Demand picks up due to economic growth, and technology like computer Networking, email and WWW. o PC prices decline to less than 499USD, 45.5% of US household owsn PC in 1998 â–ª Modular architecture prevalent for HW and SW, PC differed depending on configuration â–ª Most HW components sourced my numerous companies and highly competitive, however the Microprocessor was controlled by INTEL with 90% share, similarly for OS , Microsoft owned the market and even 80% of the productivity SW, like word processor, â–ª HW and SW started selling as integrated......

Words: 1511 - Pages: 7

Premium Essay

Networking Architecture

...important component of IT infrastructure. Within the healthcare industry, the value of an efficient and stable network is immeasurable. The challenge in most industries, especially healthcare, is address security concerns and the rights of the patience. Patton-Fuller Community Hospital, located in the City of Kelsey, is a fully function hospital servicing the local area since 1975. Recently, The Chief Executive Officer (CEO) of Patton-Fuller Community Hospital expressed the desire to design an upgrade to the current network architecture. This design will include upgrades to hardware components and software components. This proposal will discuss and summarize the current network structure, propose an upgrade design to meet future challenges while addressing network security and compliance; more specifically, the transfer and confidentiality of patient records information. Patton Fuller Community Hospital – Current Network The current networking architecture of the Patton-Fuller Community Hospital can be broken down into two major sections. Today the two major backbones of the network include a 1000 Base T using CAT6 cable which provides network access to many administrative and operational areas of the facility. Executive management, Human Resources, Operations, Facilities, Finance, as well as the IT data center are all connected directly to this side of the network backbone. The hospital side is connected via 1000 Base F which uses fiber optics to ensure the very......

Words: 1760 - Pages: 8

Free Essay


...YORN Shuttle Service By Hammad Alam Usmani Student ID No. BB-35071 Muhammad Shakeeb Alam Student ID No. BB-25215 Submitted to the Faculty of Computer Sciences and Information Technology Institute of Business & Technology, Karachi In Partial fulfillment of requirement for the degree of Bachelors of Science in (Computer Science) (Software Engineering) YORN Shuttle Service by Hammad Alam Usmani Student ID No. BB-35071 Muhammad Shakeeb Alam Student ID No. BB-25215 Project Supervisor: Sir Tayyab Yaqoob Lecturer IBT, Karachi Faculty of Computer Sciences & Information Technology Institute of Business & Technology (IBT), Karachi Certificate This is to certify that Hammad Alam Usmani (ID No. BB-35071) and Muhammad Shakeeb Alam (ID No. BB-25215) has completed their Final Year project having title “YORN Shuttle Service”. The Project is submitted to the IS committee of the Institute of Business & Technology, Karachi, Pakistan for evaluation. _______________________ Sir Tayyab Yaqoob Thesis Supervisor | ________________________ Prof.Dr.Mansoor-uz-Zafar Dean Faculty of Computer Sciences & Information Technology | Acknowledgement I would like to thank Allah who made it possible for us to......

Words: 10673 - Pages: 43

Premium Essay

Ibm Casestudy

...started its activities in 1911. Its origins however, can be traced to 1890, during the height of the Industrial Revolution. It was first known as the Computing-Recording Company, and then in 1924, it took the name of International Business Machines. Nowadays, this multinational company is known as the ¡§Big Blue¡¨ It was first known as the Computing-Recording Company, and then in 1924, it took the name of International Business Machines. Nowadays, this multinational company is known as the ¡§Big Blue¡¨ IBM main activity is to find solutions to its wide range of clients using advanced information technology. Its clients are individual users, specialized businesses, and institutions such as government, science, defense, and spatial and educational organizations. To meet and respond to its customers needs, IBM creates, develops and manufactures many of the world’s most advanced technologies, ranging from computer systems and software to networking systems,...

Words: 2802 - Pages: 12

Free Essay

Design and Analysis of a Chassis

...DESIGN AND ANALYSIS OF A CHASSIS FOR A 60 TON PAY LOAD Abstract: As the chassis frame forms the backbone of a heavy vehicle, its principal function is to safely carry the maximum load for all designed operating conditions. To achieve a satisfactory performance, the construction of a chassis is the result of careful design and rigorous testing. Various manufacturers have individual design concepts and different methods of achieving the desired performance standards for the complete chassis, not all chassis components are interchangeable between various makes and models of vehicles. So, there is no standard design for chassis frame. Even though start with the chassis frame design start with selection of the section for side rails and cross members. In this paper we have designed a chassis for storage cum resting fixture. Storage cum resting fixture is a structure of length 11000mm & width 2300mm, used to store cylindrical specimens of various sizes and weights in horizontal configuration. The storage cum resting fixture is used to carry the propellant stored in the cylindrical specimens. The trolley fixture should be designed for a maximum pay load of 60 tons. The Objective of my project is to design a chassis for a pay load of 60 Tons. The design process involves manual design calculations, 3d modeling using UNIGRAPHICS software and analysis to validate the design. Ansys package has been implemented to perform the structural analysis. ...

Words: 13647 - Pages: 55

Premium Essay

Availability and Energy Consumption Analysis of Mobile Cloud Environments

...Availability and Energy Consumption Analysis of Mobile Cloud Environments Danilo Oliveira∗ , Jean Araujo∗† , Rubens Matos∗ and Paulo Maciel∗ ∗ Informatics † Academic Center, Federal University of Pernambuco, Recife, Brazil Unit of Garanhuns, Federal Rural University of Pernambuco, Garanhuns, Brazil {dmo4, jcta, rsmj, prmm}∗ ,† The remainder of this paper is organized as follows. Section II provides an overview about mobile clouds and the analytical modeling for availability evaluation. The methodology adopted is presented in detail in Section III. Section IV presents the models developed to represent a mobile cloud system. A case study is described in Section V, with the results obtained through model analysis. Section VI concludes the paper, presenting also some possible future works. II. BACKGROUND Abstract—Mobile cloud computing refers to abstraction of computational power to outside of the mobile device, processed in the “clouds”. This paper provides an availability and energy consumption study using hierarchical heterogeneous modeling. Different scenarios were analyzed considering wireless communication technologies, such as 3G and WiFi. The results shows that the 3G protocol causes a lower availability and is the greater responsible for the discharge of battery, but when is combined with WiFi protocol providing communication redundancy, we have the best results of availability and better results of uninterrupted operation time of......

Words: 5125 - Pages: 21

Free Essay


...WeMakeConnections TTI Multi Campus Network Executive Summary: WeMakeConnections is an up-and-coming networking and infrastructure company; we offer network solutions that are customized to each client, and their specific financial and technical needs. We provide a le82vel of service you would expect from a close friend, not a company. We service all network sizes, large and small, and have worked extensively with existing network upgrades, as well as total network creation. WeMakeConnections offers personalized services to match any budget. In this day and age competition is fierce, and money is tight. That is why we only hire people who love networking; they know what works, what doesn't, and where we can cut waste. That is why WeMakeConnections is the only company that offers a complimentary follow up, one month after your network is complete. We want to make sure you love your network. Each of our eight core employee's graduated from the prestigious ITT Tech, San Diego. Each has a passion for networking, and genuine love for problem solving. From the cabling in the walls to workstations on the desks, a trained professional will be on the job. Based on the request for proposal from TTI, we have created what may be, our masterpiece work. The following pages detail our plan of action for TTI's success, and subsequent expansions. We are confident that our network provides the best return on investment for TTI's four additional campuses, and will be easily scaled to...

Words: 18593 - Pages: 75

Premium Essay


...recommendations to the company about deploying a SAN at each branch office, since each office uses data, audio, video and graphic files that are shared by staff at each location. The SAN may incorporate NAS devices which we have evaluated with different vendors. As we conducted a further research in order to provide you with more detail specifications on SAN and NAS solutions, we were able to come up with the following information design in a form of questions and answers. What is required to implement a SAN and /or NAS?  Storage-area networks (SANs) are composed of computers and remote storage devices. The computers are typically connected to the remote storage devices using SCSI over Fibre Channel (see Figure 1). Other implementations of SAN exist, but this is the most common. In a SAN, all the storage appears local, just as if the remote disk were directly connected to the computer and physically located inside the computer chassis. Network-attached storage (NAS) devices appear to the user as a remote drive letter or are named remote storage device. Typically, the operating system employs a protocol such as Network File System (NFS) or Common Internet File System (CIFS) to discover, log in, and transfer content to and from a storage device. NFS and CIFS both communicate over Ethernet. The user typically enters a username and password, and then is granted access to a particular device. Figure 1. SAN and NAS use different protocols and transports. Click here to see an......

Words: 7132 - Pages: 29

Free Essay

Digital Rights Management

...Digital Rights Management 12/1/2010 Digital Rights Management 1 Introduction • Digital Rights Management (DRM) is a term used for systems that restrict the use of digital media • DRM defends against the illegal altering, sharing, copying, printing, viewing of digital media • Copyright owners claim DRM is needed to prevent revenue lost from illegal distribution of their copyrighted material 12/1/2010 Digital Rights Management 2 DRM Content and Actions • There are many capabilities covered by DRM Digital Rights Management Digital content: • Videos • Music • Audio books • Digital books • Software • Video games Possible Actions and Restrictions: • Play once • Play k times • Play for a set time period • Play an unlimited amount • Copy • Burn to physical media • Lend to a friend • Sell • Transfer to a different device 12/7/2010 Digital Rights Management 3 Early U.S. Copyright History • US Constitution, Article 1, Section 8 – “The Congress shall have the Power … To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries” • Copyright Act of 1790 – "the author and authors of any map, chart, book or books already printed within these United States, being a citizen or citizens thereof....shall have the sole right and liberty of printing, reprinting, publishing and vending such map, chart, book or books...." – Citizens could patent...

Words: 2387 - Pages: 10

Free Essay

Computer Virtualization

...CHAPTER I Project Title Proposed Computer Virtualization of NEUST-Gabaldon Computer Laboratory Using Thin-Client Network Project Description NEUST-Gabaldon Campus (Formerly Sabani Estate Agricultural College) established their computer laboratory on 2011 which help the students of College and High School for their computer subjects (Office Productivity). Since then, the computer laboratory has its computer administrator in presence of Mr. Jefrain M. Padre, although there was computer network architecture in the campus there were times that the computer had some troubles including the System Unit and its operating system. So, the researchers decided to make a proposal entitled “Proposed Computer Virtualization of NEUST-Gabaldon Computer Laboratory Using Thin-Client Network”. The proposed project used virtualization for it was essentially lets one computer do the job of multiple computers, by sharing the resources of a single computer across multiple environments. Using an Ncomputing M300 (thin-client) series connection of network it was possible for the entire project. Thoroughly, the entire project covered up network of computer using this device (Ncomputing M300 series) to connect through a server in a series type of network. Also, using a server with a high specification it will then try to run at least one programming language that can be used by the Bachelor of Science in Information Technology students of Gabaldon Campus. Project......

Words: 8853 - Pages: 36

Premium Essay

Electrical Electronics

...UNIVERSITY OF KERALA B. TECH DEGREE COURSE 2008 SCHEME ELECTRICAL AND ELECTRONICS ENGINEERING I to VIII SEMESTER SCHEME AND SYLLABUS BOARD OF STUDIES IN ENGINEERING AND FACULTY OF ENGINEERING AND TECHNOLOGY UNIVERSITY OF KERALA B.Tech Degree Course – 2008 Scheme REGULATIONS 1. Conditions for Admission Candidates for admission to the B.Tech degree course shall be required to have passed the Higher Secondary Examination, Kerala or 12th Standard V.H.S.E., C.B.S.E., I.S.C. or any examination accepted by the university as equivalent thereto obtaining not less than 50% in Mathematics and 50% in Mathematics, Physics and Chemistry/ Bio- technology/ Computer Science/ Biology put together, or a diploma in Engineering awarded by the Board of Technical Education, Kerala or an examination recognized as equivalent thereto after undergoing an institutional course of at least three years securing a minimum of 50 % marks in the final diploma examination subject to the usual concessions allowed for backward classes and other communities as specified from time to time. 2. Duration of the course i) The course for the B.Tech Degree shall extend over a period of four academic years comprising of eight semesters. The first and second semester shall be combined and each semester from third semester onwards shall cover the groups of subjects as given in the curriculum and scheme of examination ii) Each semester shall ordinarily comprise of not less than 400 working periods each of 60......

Words: 36386 - Pages: 146

Premium Essay


...Bentley University McCallum Graduate School of Business Administration GS601-100 Strategic Information Fundamentals Spring 2012 Syllabus & Schedule as of January 3, 2012 Professor: Dennis Anderson Office: Smith 402 Email: Office Phone: 781 891 2238 Class Times: Section 100: Monday, 7:30 - 9:50 pm Office Hours: For quick/easy questions, send me an email. For tough questions, career advice and other matters, face to face is better, and I’m happy to meet with you by appointment. Description: GS601 provides an enterprise-wide perspective on the management of information technologies (IT), software applications and the operational processes they support, and the data and knowledge that inform business processes and decisions. The course focuses on how IT professionals and non-technical managers work together to ensure that applications and data are aligned with organizational strategy and business processes. The cases and readings examine how companies in various industries use IT to serve customers well, manage operations efficiently, coordinate with business partners, and make better business decisions. A key theme -- IT as a double-edged sword -- reflects a central challenge: how to maximize the strategic benefits of investments in hardware and software, while minimizing accompanying technical and business risks. The course places equal weight on technical and managerial skills. Our primary objective is to...

Words: 7908 - Pages: 32

Premium Essay

Network Administration

...Advanced Network Technology June 1993 OTA-BP-TCT-101 NTIS order #PB93-203735 Recommended Citation: U.S. Congress, Office of Technology Assessment, Advanced Network Technology--Background Paper, OTA-BP-TCT-1O1 (Washington, DC: U.S. Government printing Office, June 1993). For sale by the U.S. Government Printing Office Supcl IIIILWIICIII (If [k)c ulllLlll\. \lAll stop $s01’, \$ Allllg((u. [)(’ 2(141? () ~?x ISBN 0-16 -041805-4 -— . . Foreword omputer networks are having dramatic impacts on our lives. What were once esoteric tools used only by scientists and engineers are becoming more widely used in schools, libraries, and businesses. At the same time, researchers are working to develop even more capable networks that promise to change fundamentally the way we communicate. This background paper analyzes technologies for tomorrow’s information superhighways. Advanced networks will first be used to support scientists in their work, linking researchers to supercomputers, databases, and scientific instruments. As the new networks are deployed more widely, they will be used by a broader range of users for business, entertainment, health care, and education applications. The background paper also describes six test networks that are being funded as part of the High Performance Computing and Communications Program. These test networks are a collaboration of government, industry, and academia, and allow researchers to try new approaches to network design and to attack a......

Words: 37290 - Pages: 150

Premium Essay

Computer Organization and Architecture Designing for Performance 8th Edition

...COMPUTER ORGANIZATION AND ARCHITECTURE DESIGNING FOR PERFORMANCE EIGHTH EDITION William Stallings Prentice Hall Upper Saddle River, NJ 07458 Library of Congress Cataloging-in-Publication Data On File Vice President and Editorial Director: Marcia J. Horton Editor-in-Chief: Michael Hirsch Executive Editor: Tracy Dunkelberger Associate Editor: Melinda Haggerty Marketing Manager: Erin Davis Senior Managing Editor: Scott Disanno Production Editor: Rose Kernan Operations Specialist: Lisa McDowell Art Director: Kenny Beck Cover Design: Kristine Carney Director, Image Resource Center: Melinda Patelli Manager, Rights and Permissions: Zina Arabia Manager, Visual Research: Beth Brenzel Manager, Cover Visual Research & Permissions: Karen Sanatar Composition: Rakesh Poddar, Aptara®, Inc. Cover Image: Picturegarden /Image Bank /Getty Images, Inc. Copyright © 2010, 2006 by Pearson Education, Inc., Upper Saddle River, New Jersey, 07458. Pearson Prentice Hall. All rights reserved. Printed in the United States of America. This publication is protected by Copyright and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. For information regarding permission(s), write to: Rights and Permissions Department. Pearson Prentice Hall™ is a trademark of Pearson Education, Inc. Pearson® is a registered trademark......

Words: 239771 - Pages: 960

Premium Essay


...4 TH EDITION Managing and Using Information Systems A Strategic Approach KERI E. PEARLSON KP Partners CAROL S. SAUNDERS University of Central Florida JOHN WILEY & SONS, INC. To Yale & Hana To Rusty, Russell &Kristin VICE PRESIDENT & EXECUTIVE PUBLISHER EXECUTIVE EDITOR EDITORIAL ASSISTANT MARKETING MANAGER DESIGN DIRECTOR SENIOR DESIGNER SENIOR PRODUCTION EDITOR SENIOR MEDIA EDITOR PRODUCTION MANAGEMENT SERVICES This book is printed on acid-free paper. Don Fowley Beth Lang Golub Lyle Curry Carly DeCandia Harry Nolan Kevin Murphy Patricia McFadden Lauren Sapira Pine Tree Composition Copyright  2010 John Wiley & Sons, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc. 222 Rosewood Drive, Danvers, MA 01923, website Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201) 748-6011, fax (201) 748-6008, website To order books or for customer service please, call 1-800-CALL WILEY......

Words: 175164 - Pages: 701