Concurrently read concurrently write (crcw), Computer Networking

It is one of the models based on PRAM. In this model, the processors access the memory locations concurrently for reading as well as writing operations. In the algorithm, which uses CRCW model of computation, n3 number of processors is employed. Whenever a concurrent write operation is executed on a specific memory location, say m, than there are chances of happening of a conflict. Thus, the write conflicts i.e. (WR, RW, and WW) have been determined in the following manner. In a condition when more than one processor tries to write on the similar memory location, the bit stored in the memory location is always the sum of the values computed by the a variety of processors.

Algorithm Matrix Multiplication using CRCW

Input// Two Matrices M1 and M2

For I=1 to n            //Operation performed in PARALLEL For j=1 to n     //Operation performed in PARALLEL For k=1 to n //Operation performed in PARALLEL

Oij = 0;

Oij = M1ik * M2kj

End For

End For

End For

The complexity of CRCW based algorithm is O(1).

Posted Date: 3/2/2013 6:54:49 AM | Location : United States







Related Discussions:- Concurrently read concurrently write (crcw), Assignment Help, Ask Question on Concurrently read concurrently write (crcw), Get Answer, Expert's Help, Concurrently read concurrently write (crcw) Discussions

Write discussion on Concurrently read concurrently write (crcw)
Your posts are moderated
Related Questions

After going through this part, you should be capable to: Describe the concepts of message passing programming; List out the various communication modes for communication

Point out the disadvantages of Ring Topology. The drawbacks of ring topologies are: a. It is considerably complex to install and reconfigure ring topology b. Media failur

Q. Describe about Data Communications? - Data - Information presented in whatsoever form is agreed upon by the parties creating and using the data - Data Communications - ex

What is Security solutions Though there are a number of security solutions available due to sophistication in technology, there are a number of risks and difficulties attached

What is Kerberos in Networking? It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to stop intruders from discover

An FDDI frame or Token Ring frames those points to serious problem with the ring, like a broken cable. The beacon frame carries the address of the station thought to be down.

What is the implication of increasing and decreasing subnet Bits?

Define Choke packet and Implicit congestion signalling Choke packet: A choke packet is a control packet produced at a congested node and transmitted back to a source node to co

List some most useful advantages of Token Ring. Here are Token ring's most useful advantages: a. It depends excellent throughput under high-load conditions. b. Token Ring