Concurrently read concurrently write (crcw), Computer Networking

It is one of the models based on PRAM. In this model, the processors access the memory locations concurrently for reading as well as writing operations. In the algorithm, which uses CRCW model of computation, n3 number of processors is employed. Whenever a concurrent write operation is executed on a specific memory location, say m, than there are chances of happening of a conflict. Thus, the write conflicts i.e. (WR, RW, and WW) have been determined in the following manner. In a condition when more than one processor tries to write on the similar memory location, the bit stored in the memory location is always the sum of the values computed by the a variety of processors.

Algorithm Matrix Multiplication using CRCW

Input// Two Matrices M1 and M2

For I=1 to n            //Operation performed in PARALLEL For j=1 to n     //Operation performed in PARALLEL For k=1 to n //Operation performed in PARALLEL

Oij = 0;

Oij = M1ik * M2kj

End For

End For

End For

The complexity of CRCW based algorithm is O(1).

Posted Date: 3/2/2013 6:54:49 AM | Location : United States







Related Discussions:- Concurrently read concurrently write (crcw), Assignment Help, Ask Question on Concurrently read concurrently write (crcw), Get Answer, Expert's Help, Concurrently read concurrently write (crcw) Discussions

Write discussion on Concurrently read concurrently write (crcw)
Your posts are moderated
Related Questions
QUESTION (a) What are the problems with IPv4 on today's Internet and how does IPv6 solve these problems? (b) Describe at least three ways in which IPv6 is more efficient tha

Groupware addresses the management of semi-structured information like text, image, mail, bulletin boards and the flow of work. These Client/Server systems have people in direct co

ENCODING THE DATA TYPE: The figure explain a frame in which the data kind is specified by using the data area. To ensure interoperability format of encoding location m

Alice sends a message to Bob, encrypted with a symmetric key. Bob decrypts the message and finds it is a purchase order for an expensive workstation. When the time comes to deliver

Q. What are the trends in Network Security ? Trends in Network Security Improved vigilance for virus infections Continual maturation of firewall technologies

Packet loss and retransmission in TCP TCP gets reliability by retransmission. An acknowledgement is used to check that data has arrived successfully. If acknowledgement does no

What is mesh topology Mesh topology is a setup wherein every device is linked directly to each other device on the network. Consequently, it needs that each device has at least

Network Laye The network  layer provides  communication  between the multiple networks. Whereas the  data link  layer provides the  communication between  two systems on the s

Question 1 Explain the TCP/IP protocol suite. List (Network Interface Layer, Internet Layer, Transport Layer, Application Layer) Question 2 Write short note on