Performance architecture

Search case studies by Company Type or by Solution to find studies for this assignment.

GTR is pleased with the report you submitted, which addressed many of the concerns with AWS. They are getting closer to moving forward with the decision to adopt AWS for their cloud computing; however, they are interested in finding out if/how other large retailers have used AWS to solve challenges. As the IT Architect, prepare a summary of at least 3 or 4 case studies with citations, to help them see how other retailers were able to use the cloud technology.

Write a 2- to 3-page summary of 3 or 4 case studies including:

Define performance architecture.
Describe the issue or challenge the retailer wished to solve in each case study.
Discuss how they used the technology and their outcome.
Discuss common challenges among the retailers and how the solutions may relate to GTR.
Explain how you think AWS can help GTR create performance architectures based on outcomes for the retailers in the case studies.

Sample Solution

Computer Systems Architecture and concepts

Q1. Using your textbook or from the Internet, apply the learning outcomes for the course – Computer Systems Architecture and concepts to a business organization that exhibits and demonstrates these concepts. You should develop a summary of the organization’s strategy and how they use these concepts to compete.
• Whether concerned with buildings or information systems, architecture is a design process that determines the structure, organization, and integration of key components.
• The type and depth of required technology knowledge differ among disciplines of the Unified Process (UP).
• Technical knowledge is also needed to manage an organization’s information systems and infrastructure, with particular attention to compatibility issues and future trends.
• With rapid changes in hardware and software technologies, technical knowledge must be updated constantly.
• A computer is an automated device for performing computational tasks.
• Computer capabilities include processing, storage, and communication.
• A computer system consists of a central processing unit (CPU), primary storage, secondary storage, and I/O devices.
• Computer systems can be roughly classified as personal computing devices, servers, and smart devices.
• A computer network consists of hardware and software components that enable multiple users and computers to share information, software, and hardware resources.
• The role of software is to translate user requests into machine instructions.
• The operating system is the most important system software component in most computers.

Q2. Research a current event that demonstrates a leader who is envisioning the future. You can use the Internet, electronic news agencies, or journals to research a current event that should be fewer than three (3) years old. In your post, address the following:
• A summary of the event
• A brief statement about the relationship of the current event
As a manager, how would you apply what you have learned to an organization?
Include an industry example demonstrating the application of your researched current event.

Sample Solution

Quantitative Design

All research endeavors must, by necessity, progress through a series of logical and meaningful steps. These steps allow a researcher to be confident that the inferences and conclusions reached at the culmination of a project are valid, unbiased, representative, and generalizable.

In Chapter 8 of the text, Creswell identifies six steps critical to the construction of a quantitative research proposal (pp. 162-166). After reading this chapter, discuss the six steps of the critical aspects of data analysis and interpretation identified by Creswell:

What are the six steps and why are they essential?
How do these steps assist us when evaluating criminal justice data?
How do these steps contribute to successfully interpreting published research findings?
How would you apply these steps to answer a criminal justice research question?

Sample Solution

Design a frame

Design a frame, the span is 13 m with the distance between the frames being 5 m and a total of 6 frames.

Height of building is 4.5m with the angle of the internal frame being 30 degrees.

Take into consideration the structural, live, temperature, snow, wind, fire loads.

Design should be inline with Eurocode Standards.

Sample Solution

Computer systems architecture

identify the most appropriate computer systems architecture for a specific type of business (you might need to project out 1-2 years for what the business will ultimately need). Follow these steps to complete your CLA 2 assignment:

Identify a business.
What data structures are needed to support this business? (Examples, databases, Web presence/apps, etc.)
What types of data are recommended for use with each data structure object?
Which classes contain which data structures, and what methods should you use?
What data storage approaches would be appropriate?

Sample Solution

Monumental Architecture and Sculpture

The cultures we studied this week produced architecture, earthworks, and monumental sculpture, in addition to smaller works of art. Using your course textbook locate three examples of architecture, earthworks or monumental sculpture from three different cultures listed here: Islamic, Chinese, Japanese, or the Americas.
First, completely identify each structure or sculpture you would like to discuss by listing its name, date, and location.

Sample Solution

Introduction to Computer Architecture

Section 1

  1. In this question, you are adding addi I-type instruction, which is in the format of “addi Rd, Rs1, imm”. The operation is to perform Reg[Rd] = Reg[Rs1] + Imm. Highlight the datapath used for this instruction based on the datapath figure shown below. (10 points)
    Hint: the instruction is very similar to LW, except it needs to write the ALU output to the register, and you can use LW datapath as reference for this question. Check slides about how to highlight data path for instructions.
    Section 2
    Please download this Excel File Updated for Section 2, Question 2 and 3.
    The answer sheets provide some example answers for both question 2 and 3. Please fill the missing blanks and submit the sheet as your solution, do NOT modify the sheet structure, e.g. do not add or removing any row or column, do not merge or unmerge cells.
  2. CPU execute instructions; data movement in the datapath; and control signals.
    Your work is to fill in the provided Excel sheet the values of the datapath that are relevant to the instruction CPU is executing, and the setting of control signals of each type of instruction. Datapaths are labeled as in the following diagram. If you need references, book chapter 4.4 and 4.5 provide detailed description about how each type of instruction is executed, what datapath each uses and what control signals each instruction set or reset. Some of the pictures of the textbook are already copied to the answer sheet to help you look up. Check the comments of some cell (if they have comments) for details how the value is calculated. To simplify answering with the sheet, we assume that the execution of the instruction does not change the actual value in the register files and memory.
    Your answers should be in the yellow-colored and brown-colored areas of the sheet.

(50 points in total; Each instruction has 5 points for data path and 5 points for control signals).

  1. Pipeline execution and RAW (Read-After-Write) data hazard and control hazards.
    The following high-level C code is translated to RISC-V assembly. Instructions are executed on the CPU using the standard 5-stage pipeline (IF, ID, EXE, MEM, and WB). Register files can be read/write in the same cycle, and instruction memory and data memory are separated. Branch outcome is determined at the end of EX stage.
    for (i=0; i!=n-2; i++) a[i] += a[i+1];
    Variable n is stored in register x5 and i is in register x9. Array a is an array of integers (a word).

Initialize registers for variable i and n-2

li x9, 0 # i=0
add x10, x5, -2 # x11 now has n-2

branch check

loop: beq x9, x10, exit # if loop condition is NOT true, exit loop

load a[i] to register

lw x7, a(x9) # load a[i] to x7

load a[i+1] to register

addi x12, x9, 1 # x12 now has i+1
lw x8, a(x12) # load a[i+1] to x8

Do the addition of a[i] + a[i+1] and store the result to a[i]

add x6, x7, x8 # a[i] + a[i+1], and in x9;
sw x6, a(x19) # store a[i] + a[i+1] into a[i]
# Increment loop index i and jump to the beginning of the loop
addi x9, x9, 1 # i=i+1
beq x0, x0, loop # back to condition check
# loop exit
a) Fill in the rest of the following table about the RAW data dependency between two instructions, and the register that introduces the dependency. Highlight it if it is Load-Use. (6 points in total)
Instruction that writes the register Instruction that reads the register The register
li x9, 0 beq x9, x10, exit x9

Answers to the following three questions in provided Excel sheet (Question 3 tab). Your answers should be in the yellow-colored area of the sheet. Fill in cell with red color for the stall cycles caused by data and control hazards. The sheet “Examples discussed at the class” tab shows how this is done using a more complicated examples and detailed comments are given in the sheet for you to work on the problem 3.
b) Draw the 5-stage pipeline execution of the first TWO iterations using stage labels (IF, ID, EXE, MEM, and WB) with no any data forwarding in the CPU. All RAW dependencies between consecutive two instructions (including AL-Use and Load-use) cause 2 cycle delay. BEQ cause two cycle delay for issuing next instruction. (10 points)
c) Draw the 5-stage pipeline execution of the first TWO iterations using stage labels on the CPU but with fully data forwarding. With forwarding, the AL-Use RAW dependencies between consecutive two instructions cause 0 cycle delay. The Load-use dependency between consecutive two instructions cause 1 cycle delay. BEQ still has two cycle delay for issuing next instruction. (12 points)
d) For the CPU with fully data forwarding, rearrange instructions using the techniques we discussed in the Chapter 4 lecture to eliminate the stall(s) from load-use hazard. All the load-use stall cycles should be completely eliminated, and then draw the 5-stage pipeline execution of the first TWO iterations using stage labels. When you do reschedule, you are allowed to change instruction to make sure the code is executed correctly. Hints, you are allowed to have “SW, a+/-ConstantOffset (base)” format, e.g. “sw x11 a-4(x10)” meaning to store x11 to address “a-4+x10”. (12 points)

Sample Solution

Modern cryptography uses public algorithms with secret material (keys).

These public algorithms are arrived at through large scale “competitions” in which people compete to produce the most secure but efficient algorithm while also inspecting each other’s algorithms (see the NIST AES selection process). In this model of a publicly known encryption algorithm, the most protected element will be the key. Do you think it would enhance security to also have a secret algorithm agreed upon with your communication partners? Defend your answer.

Sample Solution