Bus Adapter CPU RAM Disk Net Printer

نویسنده

  • David Kotz
چکیده

The computational performance of multiprocessors continues to improve by leaps and bounds fueled in part by rapid improvements in processor and interconnection technology I O performance thus becomes ever more critical to avoid becoming the bottleneck of system performance In this paper we provide an introduction to I O architectural issues in multiprocessors with a focus on disk subsystems While we discuss examples from actual architectures and provide pointers to interesting research in the literature we do not attempt to provide a comprehensive survey We concentrate on a study of the architectural design issues and the e ects of di erent design alternatives

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Tamper and Leakage Resilient von Neumann Architecture

We present a universal framework for tamper and leakage resilient computation on a von Neumann Random Access Architecture (RAM in short). The RAM has one CPU that accesses a storage, which we call the disk. The disk is subject to leakage and tampering. So is the bus connecting the CPU to the disk. We assume that the CPU is leakage and tamper-free. For a fixed value of the security parameter, th...

متن کامل

Hierarchical Caching and Prefetching for Continuous Media

reason for this is disk access time, which depends on slow mechanical movements that are unlikely to speed up in the near future. Storage device vendors are thus offering disks with ever more powerful embedded controllers and increasingly big drive-level caches (see the sidebar “Trends and opportunities in disk technology”). Research efforts, in turn, are directed at developing “smart disks” to...

متن کامل

Data Exfiltration from Air-Gapped Computers based on ARM CPU

Air-gapped Network is a network isolated from public networks. Several techniques of data exfiltration from airgapped networks have been recently proposed. Air-gap malware is a malware that breaks the isolation of an air-gapped computer using air-gap covert channels, which extract information from air-gapped computers running on air-gap networks. Guri et al. presented an air-gap malware “GSMem”...

متن کامل

Software and Driver Synthesis from Transaction Level Models

This work presents a method of automatically generating embedded software including bus driver code from a transaction level model (TLM). For the application software, a real time operating system (RTOS) adapter is introduced to model scheduling and synchronization at C level. ANSI-C code is generated targeting this RTOS adapter. Bus drivers are also automatically created for HW/SW communicatio...

متن کامل

Towards SSD-Ready Enterprise Platforms

High-performance solid state disks (SSDs) deliver a 2–3 orders of magnitude increase in I/O operations per second (IOPS) over hard disk drives (HDDs). Extreme-performance SSDs can produce up to 120,000 IOPS for random-access reads, taking as few as eight direct-attached SSDs to reach one million IOPS. However, today’s multi-core platforms have long been optimized for HDDs, leading to the questi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008