Sun and nis law, Computer Engineering

Sun and Ni's Law

The Sun and Ni's Law is a generalization of Amdahl's Law as well as Gustafson's Law. The fundamental idea underlying the Sun and Ni's Law is to find the solution to a problem with a maximum size along with limited requirement of memory.  Now-a-days, there are a lot of applications which are bounded by the memory in contrast to the processing speed.

In a multiprocessor based parallel computer, every processor has an independent small memory.  In order to solve a problem, normally the problem is separated into sub-problems and distributed to a variety of processors. It may be noted that the size of the sub-problem should be in proportion with the size of the independent local memory available with the processor. Now, for a given problem, when large set of processors is culminated together, in that case the overall memory capacity of the system enhancing proportionately. Thus, instead of following Gustafson's Law i.e., fixing the implementation time, the size of the problem can be increased further such that the memory could be utilized. The above technique assists in generating more correct solution as the problem size has been increased.

Posted Date: 3/5/2013 5:06:16 AM | Location : United States







Related Discussions:- Sun and nis law, Assignment Help, Ask Question on Sun and nis law, Get Answer, Expert's Help, Sun and nis law Discussions

Write discussion on Sun and nis law
Your posts are moderated
Related Questions
CMOS circuits are extensively used for ON-chip computers mainly because of their extremely ? Ans. Since CMOS circuits have large packing density, so these are extensively use

1. The Goal: Do you think that this is an operational methodology or a philosophy? Please explain. 2. How to apply Constraint Management to a Production Facility? How about to a

What is Winchester technology? The disk and the read/write heads are placed in a sealed air-filtered enclosure known as Winchester technology.

What is a semaphore? Semaphore: It is a protected variable or abstract data type that constitutes the typical method for restricting access to shared resources as shared memo

What is the draw back of assigning one bit position to each control signals? Assigning individual bits to every control signal results in long microinstructions due to the numb

Appropriate Problems for ANN learning: Conversely as we did for decision trees there it's important to know where ANNs are the right representation scheme for such job. Howeve

Token packets in universal serial bus - computer architecture: Token packets consist of a PID byte followed by two payload bytes: a 5-bit CRC and 11 bits of address. Tokens

Explain the following design parameters S, SC, TC, C, CCI, EUF, K, T S The various terms are given below: S: Total number of switching components A good design sh

The Throughput graph represents the amount of data in bytes that the Vusers received from the server in a second. When we evaluate this with the transaction response time, we will

SET SCREEN With SET SCREEN the present screen simply specifies the next screen in the chain , control branches to this next screen  as soon as the current screen has been proce