CMSC 411, Fall 2009
Computer Systems Architecture
Project 1 - Cache Simulator
Part B (Full simulator) - Due 11:59pm Wed, Dec 2rd, 2009
Part C (Performance evaluation) - Due 9:30am Thu, Dec 10th, 2009
You will need to implement a trace-driven cache simulator, and use it to evaluate the performance of different cache architecture features.
The project is described in detail in sim.pdf.
Getting StartedDownload the following archive file p1.zip and extract its contents.
Along with files used to make direct submissions to the submit server (submit.jar, .submit), you will find the following project files:
Execution traces (traces.zip):
You may also submit your project directly by executing a Java program on a computer with Java and network access. Use the submit.jar file from the archive p1.zip, To submit, go to the directory containing your project and type the following command:
You will be asked to enter your class account and password, then all files in the directory (and its subdirectories) will be put in a jar file and submitted to the submit server. If your submission is successful you will see the message:
The Campus Senate has adopted a policy asking students to include the following statement on each assignment in every course: "I pledge on my honor that I have not given or received any unauthorized assistance on this assignment." Consequently your program is requested to contain this pledge in a comment near the top.
Please carefully read the academic honesty section of the course syllabus. Any evidence of impermissible cooperation on projects, use of disallowed materials or resources, or unauthorized use of computer accounts, will be submitted to the Student Honor Council, which could result in an XF for the course, or suspension or expulsion from the University. Be sure you understand what you are and what you are not permitted to do in regards to academic integrity when it comes to project assignments. These policies apply to all students, and the Student Honor Council does not consider lack of knowledge of the policies to be a defense for violating them. Full information is found in the course syllabus---please review it at this time.