Unit-1Basics of Computing: Computer Architecture and Technology Trends, Moore's Law and its Applications, Classification of parallel computers, Performance based Computing, The Myopic View of Computer Architecture, Trends in Technology, Energy, Power and Cost, Dependability, Processor Speed, Cost, Power Consumption, Fabrication YieldPerformance Metrics and Evaluation: Measuring Performance, Benchmark Standards, Amdahl's Law, Lhadma's Law9
2Unit-2Memory Hierarchy Design: Basics of Memory Hierarchy, Coherence and locality properties, Cache memory organizations, Advanced Optimization of Cache Performance, Memory Technology and Optimization, Cache Coherence and Synchronization Mechanism, Virtual Memory, Virtual Machines10
3Unit-3Pipeline: Linear pipeline processor, nonlinear pipeline processor, Instruction pipeline Design, Dynamic instruction scheduling, Branch Handling techniques, branch prediction, Arithmetic Pipeline Design Data, and resource Dependences, Performance Issues in Pipeline: Pipeline Hazards, Data Hazards Branch hazards and Resource Hazards10
4Unit-4Instruction Level Parallelism: Concepts and Challenges, Basic Compiler techniques for exploiting ILP, Reducing the branch penalty with advanced branch predictions, overcoming data hazards with dynamic scheduling, exploiting ILP using multiple issues state scheduling8
5Unit-5Multiprocessor architecture: Taxonomy of parallel architectures. Centralized shared-memory, distributed shared-memory architecture, Message passing vs Shared MemoryThread and Process Level Parallel Architecture: Instruction Level Data Parallel Architecture, SIMD Architecture, Fine Grained and Coarse-Grained Associative and Neural Architecture, Data Parallel Pipelined and Systolic Architectures, Vector Architectures


CO1: Classify security vulnerabilities involved in data communication over Internet and

After completion of the course the students will be able to:

Outcome

CO2: Make use of modern block ciphers to secure data transmission and storage

make use of classical algorithms to address the vulnerabilities.

CO3; Analyze challenges involved in key distribution and select approache that can be

CO4: Analyze strengths of public key algorithms and explore applications in exchange,

adopted

CO5: Appreciate application of algorithms for ensuring access control, authentication,

authentication and hashing of messages.

CO6: Appraise risks related to wireless, web, cloud security and measures to be adopted to

secured transmission of data at different layers. Secure organizational network.

Software Verification Validation and Testing