Nt1330 Course Project

Decent Essays
2.1 Goals
The goals of this internship are:
a. Provide a solution which reduces the stall time and increases the system efficiency.
b. A solution which could be generalized in future to be used with more than two sub-systems.
2.2 Solution Overview
The most common solution to such a problem is by making use of a buffer.
“A buffer often adjusts timing by implementing a queue (or FIFO) algorithm in memory, simultaneously writing data into the queue at one rate and reading it at another rate.”[2]
The simplest form of buffer that could be used in between the two sub-systems is a FIFO. But a simple on chip FIFO could not solve this problem entirely as the amount of available FIFO on a particular FPGA is very less.
Hence, a simple external RAM module is used for this purpose. There is a memory controller (MIG) designed by Xilinx and available as an IP core for the system designers to use to communicate with the RAM. But, it is only possible for a single system to communicate with a single MIG which in turn communicates with the RAM module.
…show more content…
This gave birth to the Data Flow Controller (DFC) module. The job of the DFC is to appropriately route the data between the two sub-systems and RAM as and when requested.
2.3 Related Work
[3] is one of the work which introduces the idea of a Memory Management Unit. “MMU allows multiple tasks to concurrently use external RAM banks.”
[4] is another piece of work which also introduces the use of “a memory arbiter system capable of allowing two systems to communicate to the same DDR3 SDRAM

Related Documents

  • Decent Essays

    Nt1330 Unit 1 Term Paper

    • 455 Words
    • 2 Pages

    5.2.3Direct Access DirectAccess is new to the Windows 7 operating systems. DirectAccess enables a remote user to work on their corporate network when they are away from the office without the need of a VPN. As long as the remote user is connected to the Internet, DirectAccess will automatically connect the remote user to the corporate network without the need of any user intervention.…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    In this task I will be using a diagram to outline the relationship between the layers in an interface showing each other of the points in the corresponding layer in the TCP/IP protocol suite. I will also be describing the type and functions of entities and the service they provide. A) The way communications are done between a computers on a network is through protocol suits. The most used protocol suite and commonly available protocol suite is TCP/IP protocol suite.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1 Study Guide

    • 573 Words
    • 3 Pages

    1. Software as a Service (SaaS) – Model of software deployment where an application is hosted as a service provided across the internet. 2. Outsourcing is the transfer of information systems development, operation, or maintenance to an outside firm that provides these services for a fee on a temporary or long-term basis. 3.…

    • 573 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    · Memory: This is any computer component that has the ability to storing information or data temporary or permanently, e.g. Read And Write Memory (RAM) and Not Volatile Read And Write Memory (NVRAM). · CPU: This is the brain of the computer and is the central process unit, and it received command/instruction from the computer software and sends the instruction to the right hardware to execute the instruction, and also received the feedback from the hardware and forwards it to the software. · Storage: This is the part of the computer where information or data have been kept temporary or permanently.…

    • 363 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Central Processing Unit (CPU) which is made up of three major components, the arithmetic/logic unit (ALU), the control unit (CU) and memory by combining the ALU and CU together you get the CPU), (Englander, I. 2014). The arithmetic/logic unit holds data temporary and where calculation are processed the control units controls and deciphers the execution command and follow the instruction that goes with the sequence of actions. The control unit determines the particular instruction to be executed by reading the program counter (PC) (Englander, I. 2014). Primary memory holds program instructions and data and interacts directly with the CPU during program execution. The control unit also reads and interprets instructions from memory and transforms them into a series of signals to activate other parts of the computer.…

    • 567 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Homework 4 Elaine Le Hawaii Pacific University Part A: Textbook p293 Exercises 9.4 Consider the interrupt that occurs at the completion of a disk transfer. a. Direct memory access (DMA) is an alternative method that avoids the use of the CPU by allowing direct data transfers between memory and I/O devices or peripherals. Once the data is transferred the CPU is notified of the transfer completion and able to resume access of the main memory. It is able to do this with interrupts; are signals that are generated once an action is completed. Normally it suspends the execution of the running program and jumps to a special interrupt service routine.…

    • 568 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 7

    • 507 Words
    • 3 Pages

    Famanga Ngobeh Prof. Saunders Review Question Lab September 23, 2015 1. Move copies data from one memory location or register to another. The term “move” is a misnomer because data values in the source location aren’t removed. They’re tested, and copies of these values are placed in the destination location. Therefore, a move operator is really a copy operator.…

    • 507 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 1 Study

    • 419 Words
    • 2 Pages

    1.2.1 Studying Server Consolidation Server consolidation is an approach to the capable usage of computer server sources in order to reduce the total number of servers or server location that an organization needs. The practice was developed in reply to the problem of “server sprawl,” a position in which several under-utilized servers take up more space and consume more sources than can be acceptable by their workload. SERVER PRODUCT ARCHITECTURE A few definitions provide a good starting point. Three terms are important to VMware: 1.…

    • 419 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Concurrency loss due to IO path critical sections (IPCS) Time lost in waiting queue (WT) to enter a critical section affects an application concurrency (AC), and impedes the application performance from scaling (AC ∝ 1 / WT) if a workload is bursty and highly parallelized. It is apparent that the wait time to enter a critical section is a function of the CS’s size (CSS) and the number of waiting threads (NWT) i.e. WT ∝ CSS * NWT. Furthermore, the work done (IO completed) is proportional to the trips made through the CSSs (i.e. IOs completed ∝ NWT). Therefore, existence of CSSs in IO path, high wait time, and large CSS’s size affects an application concurrency, and demands the measures to minimize their effects.…

    • 560 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 7 Study Guide

    • 998 Words
    • 4 Pages

    Piseth Hul ITE 221 Prof: Jenee’ Saunders Sep 21, 2015 Review Questions Ch.4 1. Describe the operation of a MOVE instruction. Why is the name MOVE a misnomer?  Move is a instruction that copies data bits to storage locations and can copy data between any combination of registers and primary storage locations.…

    • 998 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    The specification of hardware is GPU used : NVIDIA GTX280 (has about 30 multiprocessors each with 8 processors, frequency is 1.29 GHz) CPU used : Intel i5D, 4 cores, frequency of 2.67 GHz. GPU memory, bandwidth : 1 GB, 141.7GB/s To get a more clear picture speedup calculated only after the I/O file is completed. Results that are obtained from the proposed differential (data size dependent) approach are compared with other approaches like HP_k_means (for smaller hence low-dimension data), UV_k-means , GMiner (for large data sets) and then fialy the performance is compared with CPU. A. Small data sets (Low –dimension) For this a data set of sizes 2 million and 4 million with varying values of “k” (number of the distinct sets/groups) and “d”…

    • 971 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 8 Lab Report

    • 494 Words
    • 2 Pages

    1.3.1 Measurement Overhead In this experiment, we found the latency incurred in measuring CPU cycles. This measurement of time overhead has to be subtracted from the forthcoming experiments. Methodology: We have used the RDTSC – RDTSCP instruction along with CPUID (serialize the instruction pipeline). This function fetches the count of CPU clock cycles.…

    • 494 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    RAM Random access memory (RAM) provides temporary application data storage. Instead of having to go back and find information on the hard drive every time a computer needs a piece of data, the computer temporarily stores frequently used files on RAM, making them easier to find. When the computer shuts down, all the data in RAM is erased or transferred to the hard drive, making room for new data when the computer begins operating again. ROM Read-only memory (ROM) is used to store data that controls the most basic computer functionality, such as starting up, detecting peripherals and operating the computer fan. As the name suggests, the data cannot be edited by the system or users and, unlike RAM, the data stays recorded even when the computer…

    • 161 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Misappropriation Trade secret misappropriation is different from violations of other IP rights, since by definition trade secrets are secret, while patents and registered copyrights and trademarks are publicly available. Unlike other forms of IP [2], trade secret is basically a do it yourself form of protection. You do not register with the government to secure your trade secret. You simply keep the information confidential and personal. Trade secret protection lasts for as long as the secret is kept confidential.…

    • 524 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Jeff Moran CET 3510 Monday, May 18, 2015 Memory Management on OS X and iOS The history of virtual memory on Mac OS and its faults. Allocation and deallocation of memory through pointers The end of dealloc, retain, and release calls on iOS Automatic Reference Counting in OS X and iOS Memory management is the act of dynamically allocating memory to different programs as it is requested and freeing it when it is no longer needed. The goal of any memory management system is the reduce a program’s memory footprint.…

    • 426 Words
    • 2 Pages
    Decent Essays