Concurrently read concurrently write (crcw), Computer Networking

It is one of the models based on PRAM. In this model, the processors access the memory locations concurrently for reading as well as writing operations. In the algorithm, which uses CRCW model of computation, n3 number of processors is employed. Whenever a concurrent write operation is executed on a specific memory location, say m, than there are chances of happening of a conflict. Thus, the write conflicts i.e. (WR, RW, and WW) have been determined in the following manner. In a condition when more than one processor tries to write on the similar memory location, the bit stored in the memory location is always the sum of the values computed by the a variety of processors.

Algorithm Matrix Multiplication using CRCW

Input// Two Matrices M1 and M2

For I=1 to n            //Operation performed in PARALLEL For j=1 to n     //Operation performed in PARALLEL For k=1 to n //Operation performed in PARALLEL

Oij = 0;

Oij = M1ik * M2kj

End For

End For

End For

The complexity of CRCW based algorithm is O(1).

Posted Date: 3/2/2013 6:54:49 AM | Location : United States







Related Discussions:- Concurrently read concurrently write (crcw), Assignment Help, Ask Question on Concurrently read concurrently write (crcw), Get Answer, Expert's Help, Concurrently read concurrently write (crcw) Discussions

Write discussion on Concurrently read concurrently write (crcw)
Your posts are moderated
Related Questions
MPI parallel programs are written with conventional languages like, C and Fortran  .One or more header files such as "mpi.h" may be needed to give the necessary definitions and dec

Q. Show the Class D and Class E Addresses? Class D and Class E Addresses Class D - reserved for multicast addresses Multicasting - transmission method which allo

Describe the functions and significances of all fields (such as Source Port and Destination Port) of a TCP header. Functions and significance of tcp header's fields FIELDS

UDP Segment Structure The  primary  purpose  of the UDP protocols  is to expose datagram's to the application  layer. The UDP protocols does very  little and therefore  employ

Q. Illustrate the Model for Network Security? - A message is transferred from one party (Principal) to another. - A logical information channel is founded between the t

Data Distribution Data distribution directives tell the compiler how the program data is to be distributed between the memory areas associated with a set of processors. The log

Example Programmes for Parallel Systems Now we shall complete this with the examples on shared memory programming. Example 13: Adding elements of an array using two proce

Hybrid  of Client Server and P2P Architecture Both of  the architecture  are  commonly used  architecture. However  many  applications  are organized as by brides of the  clie

Primary Function Core network typically providing  the followings functionality 1.Aggregation : the  highest  level  of aggregation  in a service  provider  networks. The

Frequency Division Multiplexing Frequency  division  multiplexing (FDM) is an analogy technique that can be applied when the bandwidth of a link is greater than the combined b