Complete the code that passes the array a and b

Assignment Help Computer Networking
Reference no: EM131310065

MPI network

Please, let me know if anyone is able to do it right and in the proper time.

Please put Course number, your Full Name, Assignment number on top right. Submit your homework on Blackboard. Please name your file as "ITS470HW5FirstNameLastName.(doc or docx)". You should submit all source codes, script files, and all output files from job submission. Documentation is important. The more clear and detail documentation is a good way to earn better grade.

1. Complete the code that passes the array a and b from process 0 to process 1 using the algorithm shown in textbook p.246. Vary the size of arraya and b from 100, 1000, and 2000 to compare and discuss the results. Explain your results from each size. For MPI_Recv function, see sample code given in course website.

2. In given code "mpi-pi.c", the jobs aredistributedin cyclic manner.Modify and write the code that distributes the job using block partition, which assignsa set of consecutive jobs to each process. For example, if there are 40 jobs and 4 processes, distribute10 jobs each process such as 1to 10 to process 0, 11 to 20 to process 1, 21 to 30 to process 2, and 31 to 40 to process 3. For the simplicity, assume that userinputsthe number of steps that is the multiple of the number of processes. For example, if the number of processes is 4, the number of steps should be multiple of 4 such as 16, 100, 200, 10000, etc.Your code should dynamically distribute the same amount of jobs over the number of available processes. Explain your job distribution method and it should be clearly documented in your code.

3. Re-write pi estimation code using MPI_Send and MPI_Recv communication functions only. You can download sample code at course website called "mpi-pi.c". Explain how you did in word here and it should be documented in your code. (Hint: Process 0 receives all partial local results and computes the estimating pi)

4. Use given "mpi-pi.c" code, modify it to compute and print the elapsed time at process 0 using Wtim( ) function. Then, choose the large number of steps (i.e., n = 2,000,000,000) and run the program by use of 1, 4, 8, and 16 processes to find each corresponding elapsed time. Do this with the small number of steps (i.e., 200) to find the elapsed time at each number of processes. Plot both results to observe the relation between the number of processes and elapsed time at each number of steps.

Reference no: EM131310065

Questions Cloud

Explain importance of critical path in project management : Explain the importance of the critical path in project management. Examine the advantages of using a Gantt chart over a PERT chart and vice versa. Determine when it is appropriate to use one over the other.
Display sentinel value so that user may ultimately be able : Loop through all of the above steps until the user types the sentinel value when prompted. Display the sentinel value so that the user may ultimately be able to demonstrate an understanding of the way in which to end the program.
What would be the firms expected dividend per share : Coca-Cola stock has an expected ROE of 14% per year, expected earnings per share of $4, and expected dividends of $2.50 per share. Its market capitalization rate is 15% per year. a) what are its expected growth rate, its price and its P/E ratio? b) I..
What is the list price of the bond on the settlement date : Calculate the price of the bond for a market interest rate of 3% per half year. Compare the capital gains for the interest rate decline to the losses incurred when the rate increases to 5%. A bond with a settlement date of April 30, 2013 and a maturi..
Complete the code that passes the array a and b : Complete the code that passes the array a and b from process 0 to process 1 using the algorithm shown in textbook p.246. Vary the size of arraya and b from 100, 1000, and 2000 to compare and discuss the results.
What is the required rate of return on the project : Stock XYZ has an expected return of 12% and B = 1. Stock ABC is expected to return 13% with a beta of 1.5%. The market's expected return is 11% and r1 = 5%. According to the CAPM,which stock is a better buy? What is the alpha of each stock? What is t..
Create a system reference guide for your employer : You have been called upon to put together some reference materials for other groups to follow, Create a System Reference Guide for your employer in three parts over Weeks Two, Three, and Four.
How enciphering of connections would affect thumbprinting : If the connection contents were enciphered using a link encipherment protocol, would thumbprinting work? Why or why not?
Create an uml sequence diagram explaining the addition : The firms involved in the financing, parts suppliers, manufacturing hardware suppliers, design consultants, and the labor unions want to see a uml sequence diagram explaining the addition.

Reviews

Write a Review

Computer Networking Questions & Answers

  Installing the nmap security scanner

Downloading and Installing the Nmap Security Scanner: Nmap is a port scanner. It sends packets to the target and monitors the responses to discover what network services are listening on that computer. It is a favorite tool for security profession..

  Explain the significance on the design and use of various

explain the significance on the design and use of various variables and attributes control charts of being based on

  Case studynetworks are evolving scalability presentation

case studynetworks are evolving. scalability presentation acts reliability safety measures and cost considerations are

  Project 1 bull in your own words what rfc gives

project 1 bull in your own words what rfc gives the protocol and specifications a news server must use to

  The purpose of this project is to provide you with an

the purpose of this project is to provide you with an opportunity to create a document retention policy. you will also

  What features of windows server 2003 provide remote server

Which Windows Server 2003 tools and third party utilities might IT use to monitor server performance?

  Which responds to a get nearest server request from a client

Your company has a network that contains several NetWare 4.11 servers and uses IPX as the routing protocol. Each of the network segments has at least one NetWare server on it

  What is the total file transfer time

How many packets must be transmitted to accomplish the file transfer - What is the total file transfer time.

  Designing new datacenter for existing complement of servers

You have been hired as independent contractor to support company in designing a new datacenter for its existing complement of 16 Unix servers, 32 Windows servers, and 10 racks of network

  Write a key transport protocol

Advanced Network Security (CSCI468/CSCI968) - Assignment serves as an exercise for you to understand security protocols and applications - Write a key transport protocol for them to establish a session key.

  Explain the tests that can be performed with an emulator

Explain the main differences between mobile app, mobile web app, and mobile hardware testing .Explain the tests that can be performed with an emulator and those that need to be tested on the actual mobile device .Explain the role of the transcoder i..

  Demonstrate understanding of type and typeface

Discuss the two type styles of typography, explaining how their differences effect your presentation within a webpage, and how you might use each to achieve your objectives.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd