Cache simulator

 

In this final project you will implement a cache simulator. Your simulator will be configurable and will be able to handle caches with varying capacities, block sizes, levels of associativity, replacement policies, and write policies. The simulator will operate on trace files that indicate memory access properties. All input files to your simulator will follow a specific structure so that you can parse the contents and use the information to set the properties of your simulator.

After execution is finished, your simulator will generate an output file containing information on the number of cache misses, hits, and miss evictions (i.e. the number of block replacements). In addition, the file will also record the total number of (simulated) clock cycles used during the situation. Lastly, the file will indicate how many read and write operations were requested by the CPU.

It is important to note that your simulator is required to make several significant assumptions for the sake of simplicity.

  1. You do not have to simulate the actual data contents. We simply pretend that we copied data from main memory and keep track of the hypothetical time that would have elapsed.
  2. Accessing a sub-portion of a cache block takes the exact same time as it would require to access the entire block. Imagine that you are working with a cache that uses a 32 byte block size and has an access time of 15 clock cycles. Reading a 32 byte block from this cache will require 15 clock cycles. However, the same amount of time is required to read 1 byte from the cache.
  3. In this project assume that main memory RAM is always accessed in units of 8 bytes (i.e. 64 bits at a time).
    When accessing main memory, it’s expensive to access the first unit. However, DDR memory typically includes buffering which means that the RAM can provide access to the successive memory (in 8 byte chunks) with minimal overhead. In this project we assume an overhead of 1 additional clock cycle per contiguous unit.
    For example, suppose that it costs 255 clock cycles to access the first unit from main memory. Based on our assumption, it would only cost 257 clock cycles to access 24 bytes of memory.
  4. Assume that all caches utilize a “fetch-on-write” scheme if a miss occurs on a Store operation. This means that you must always fetch a block (i.e. load it) before you can store to that location (if that block is not already in the cache).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Advanced operating system 3 assignment questions. Please complete within 3 hours.

 

Question 1.              (10  Marks)

a. How Process migration within a heterogeneous network is usually impossible, given the differences in architectures and operating systems. Describe a method for process migration across different architectures running:

    i. The same operating system

    ii. Different operating systems

b. To build a robust distributed system, you must know what kinds of failures can occur.

  1. List three possible types of failure in a distributed system.
  2. Specify which of the entries in your list also are applicable to a centralized system. 

Question 2.          (10 Marks)

a. Protection in a Distributed system is more difficult, where the users are allowed to do their own I/O, explain your answer with justifications, Why?

b. Why is deadlock detection much more expensive in a distributed environment than in a centralized environment?

Question 3.      (10 Marks)

Explain the following with diagram

  1. How do caches help improve performance? Why do systems not use more or larger caches if they are so useful?
  2. Stateful vs Stateless service
  3. Majority vs Biased Protocol
  4. Hard real time systems vs Soft real time systems
  5. Interrupt Latency vs Dispatch Latency

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Programming exercise

Please write a Python Code to solve these problems and include the output of screen shot along with separate .py/ipy file in a single zip folder

2.9 (INTEGER VALUE OF A CHARACTER) Here’s a peek ahead. In this chapter, you learned about strings. Each of a string’s characters has an integer representation. The set of characters a computer uses together with the characters’ integer representations is called that computer’s character set. You can indicate a character value in a program by enclosing that character in quotes, as in ‘A’. To determine a character’s integer value, call the built-in function ord:

In [1]: ord(‘A’)

Out[1]: 65

Display the integer equivalents of B C D b c d 0 1 2 $ * + and the space character.

2.14 (TARGET HEART-RATE CALCULATOR) While exercising, you can use a heart-rate monitor to see that your heart rate stays within a safe range suggested by your doctors and trainers. According to the American Heart Association (AHA) ( HYPERLINK “http://bit.ly/AHATargetHeartRates” http://bit.ly/AHATargetHeartRates), the formula for calculating your maximum heart rate in beats per minute is 220 minus your age in years. Your target heart rate is 50–85% of your maximum heart rate. Write a script that prompts for and inputs the user’s age and calculates and displays the user’s maximum heart rate and the range of the user’s target heart rate. [These formulas are estimates provided by the AHA; maximum and target heart rates may vary based on the health, fitness and gender of the individual. Always consult a physician or qualified healthcare professional before beginning or modifying an exercise program.]

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Python Project

 Task 1 (50 points): (Intro to Data Science: Survey Response Statistics) Twenty students were asked to rate on a scale of 1 to 5 the quality of the food in the student cafeteria, with 1 being “awful” and 5 being “excellent”. Place the 20 responses in a list. 1, 2, 5, 4, 3, 5, 2, 1, 3, 3, 1, 4, 3, 3, 3, 2, 3, 3, 2, 5 Write a program that does the following: (a) Determine and display the frequency of each rating. (b) Use the built-in functions, statistics module functions and NumPy or Panda functions covered in the course materials to display the following response statistics: minimum, maximum, range, mean, median, variance and standard deviation. (c) Display a bar chart showing the response frequencies and their percentages of the total responses. Grading Rubric – 10 points for defining functions. – 15 points for finishing Task1(a)-(c). – 5 points for appropriate comments. – 10 points for a runnable python program with correct data visualization. – 10 points for screenshots of the program. Task 2 (50 points): (Classification with k-Nearest Neighbors and the Digits Dataset) Read the file “09-02-MachineLearning.pdf” and the python program “CaseStudy1.py” to learn the algorithm of k-Nearest Neighbors with the Digits dataset for recognizing handwritten digits. Re-write the python program by doing the following subtasks: (a) Write code to display the two-dimensional array representing the sample image at index 24 and numeric value of the digit the image represents. (b) Write code to display the image for the sample image at index 24 of the Digits dataset. (c) For the Digits dataset, what numbers of samples would the following statement reserve for training and testing purposes? X train, X test, y train, y test = 1 train test split(digits.data, digits.target, random state=11, test size=0.60) 2 (d) Write code to get and display these numbers. (e) Rewrite the list comprehension in snippet [50] using a for loop. Hint: create an empty list and then use the built-in function “append”. Grading Rubric – 15 points for finishing Task2(a)-(e). – 5 points for appropriate comments. – 20 points for a runnable rewritten python program – 10 points for screenshots of the program. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Security Architecture and Design

  

Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? If you were an antivirus designer or maker, what other methods do you utilize to prevent virus?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

BIOMETRICS

Topic is Biometrics

Subtopics are :
 

1. What are Biometrics?

2.Why Biometrics.

3.Types of Biometrics.

4.Use of Biometrics.

5.Application.

6.Problems with Biometrics.

7.Advantages and Disadvantages.

8.Conclusion.

9.Refrences.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

UD

 

William Montgomery Gardner III (WG) is the owner of Gardner Novelties, Inc., a large family business that designs and manufactures specialty items for sale at roadside restaurants around the country. The company has over 2,500 employees in 13 locations around the world. They have recently begun to outsource a lot of their manufacturing to China, Mexico and India. In spite of a bad economy, WG has been able to consistently grow the company’s revenues at a rate of over 10% per year over the last ten years. As a result, WG has decided to take the company public. The Initial Public Offering (IPO) is scheduled to take place next month.

WG calls you, Joseph K. Barnes (JB) into his office. You have been in charge of all Information Technology services for the company for the past 17 years. You have a staff of 12 direct reports in your department, of which 6 are located in the company headquarters office with you. Since the items being manufactured are not technical in nature, there has never been a lot of emphasis placed on protecting proprietary data in the corporate network. Most of your time is spent dealing with service calls and Internet disruptions, maintaining the firewall, and uploading software patches.

WG tells you of the plans for the company. You try to act surprised, but the rumor has been floating around the company for months now so it is anything but a surprise. You are a little alarmed by the fact that the IPO is planned for next month, however.

WG explains that once the IPO takes place, they will need to have everything in place to be in compliance with Sarbanes-Oxley. WG asks if you are familiar with Section 404 of SOX.

You struggle to find the right words. You’ve heard of Section 404 from friends and colleagues who have had to deal with it for years now, but you never though it was something you needed to know. You mention that you know Section 404 deals with management’s assessment of internal controls, and that the IT network will need to have some controls put in place.

WG tells you he needs a plan from you in one week on how to get the IT system in compliance with SOX. You will need to make a presentation to the Executive Committee (ExCom) on your plan. The ExCom will consist of, among others, WG, the COO, VP of Human Resources, and the CFO of the company. WG warns you not to let him down…there is a lot riding on this IPO and the investors and analysts want to know that the company will be in compliance with SOX.

JB walks out of the meeting and his head is spinning. He has one week to develop a plan to bring the company’s entire IT system into compliance with SOX. How is he supposed to do that? He decides that the first course of action will be to call a friend, Robert Rodes (RR), who works for a publicly-traded company. Maybe he can help point JB in the right direction.

 

Read the scenario and decide on a response. Your goal is to identify the critical issues in the scenario and determine how you would resolve. Write a 3 to 4 page paper that addresses the following issues:

  1. Explain your plan for implementing COBIT for Gardner Novelties. Your plan should include a discussion of the following elements:
    1. What will Gardner Novelties be required to do with IT to remain in compliance with SOX?
    2. What is COBIT and how can it help keep Gardner Novelties in compliance with SOX?
    3. What are the benefits of using COBIT as opposed to other control frameworks?
  2. What questions would you expect to receive from the Executive Committee of Gardner Novelties? Identify two questions that you could be asked and address how you would answer them.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

(10 Pages) Disaster Recovery Plan Report

 Develop a Complete Disaster Recovery Plan to be submitted to the executive board of your company. 

***5 minimum peer-reviewed references***

Instructions:

 1.5 Spacing , 10 pages, Times Roman font.

***no Plagiarism, APA format***

!!!! No money Negotiations after accepting the Bid !!!!!!!

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Dark Web

Write a brief paper on the following topic: Dark Web

1. What is the Dark Web? 

2. How is it accessed? 

3. How is it used by criminals? 

4. How can it be used in a positive way? 

5. How can be used by law enforcement and intelligence services. 

6. How can be used by private individuals.

Write between 200 and 300 words.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Organizational Risk Assessment

 

In this assignment you will be conducting a risk assessment. This will not be a technical risk assessment, but an assessment of your hypothetical organization/business. For your organization/business, take the NIST Cybersecurity Framework controls and reduce them to system configuration requirements and system test cases with pass/fail criteria. Refer to the “Framework for Improving Critical Infrastructure Cybersecurity,” located within the Course Materials. Then, include the following in a report:

  1. Describe when some controls cannot be implemented (such as on a personal laptop).
  2. Explain what is to be done in each case identified above to compensate for controls that cannot be implemented (e.g., create an identification authentication scheme).
  3. Demonstrate how compensating controls can ensure the non-compliant system can continue to operate within the secured and compliant environment.
  4. Discern the likelihood of a cybersecurity breach within the compliant environment and the impact it might have on the organization (make sure to consider emerging risks, threats, and vulnerability).

APA style is not required, but solid academic writing is expected.

Refer to “Organizational Risk Assessment Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion. 

You are not required to submit this assignment to LopesWrite.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now