Identified access to the global pointer

Assignment Help Basic Computer Science
Reference no: EM131091100

we identified access to the global pointer, target, as a bottleneck in the GRR load-balancing scheme. Consider a modification of this scheme in which it is augmented with message combining. This scheme works as follows. All the requests to read the value of the global pointer target at processor zero are combined at intermediate processors. Thus, the total number of requests handled by processor zero is greatly reduced. This technique is essentially a software implementation of the fetch-andadd operation. This scheme is called GRR-M (GRR with message combining). An implementation of this scheme is illustrated in Figure 11.19. Each processor is at a leaf node in a complete (logical) binary tree. Note that such a logical tree can be easily mapped on to a physical topology. When a processor wants to atomically read and increment target, it sends a request up the tree toward processor zero. An internal node of the tree holds a request from one of its children for at most time d, then forwards the message to its parent. If a request comes from the node's other child within time d, the two requests are combined and sent up as a single request. If i is the total number of increment requests that have been combined, the resulting increment of target is i.

1357_4d5725ad-a6cc-4724-b388-36c812528f0b.png

The returned value at each processor is equal to what it would have been if all the requests to target had been serialized. This is done as follows: each combined message is stored in a table at each processor until the request is granted. When the value of target is sent back to an internal node, two values are sent down to the left and right children if both requested a value of target. The two values are determined from the entries in the table corresponding to increment requests by the two children. The scheme is illustrated by Figure 11.19, in which the original value of target is x, and processors P0, P2, P4, P6 and P7 issue requests. The total requested increment is five. After the messages are combined and processed, the value of target received at these processors is x, x + 1, x + 2, x + 3 and x + 4, respectively.

Reference no: EM131091100

Questions Cloud

Derive a parallel formulation that uses p processes : This formulation uses n processes to sort n elements. Based on this approach, derive a parallel formulation that uses p processes, where p
What is the probability of this worst-case scenario : What is the probability of this worst-case scenario?
Show how to apply the idea of the shellsort algorithm : Show how to apply the idea of the shellsort algorithm
Significant threats to the united states in cyberspace : 1. What four countries are considered by the DoD to be the most significant threats to the United States in cyberspace? 2. Would the attack on the Office of Personnel Management be considered a targeted or an opportunistic attack? Why?
Identified access to the global pointer : After the messages are combined and processed, the value of target received at these processors is x, x + 1, x + 2, x + 3 and x + 4, respectively.
Used in drafting or revising a paper : Consider the poem Galway Kinnell, "Blackberry Eating,". Draft a debatable statement about what the poem means from your perspective. What are the points you would make in an analysis? What specifics in the poem can you use to develop and illustra..
Meaning of health and the determinants of health : his week's course content focuses on the meaning of health and the determinants of health. It is appropriate then, at the start of your program of study, to turn the lens on yourself.
Word critical analysis of the chosen topic : The article and the two documentries is about doping in sports and focuses on the cases of Lance Armstrong and Marion Jones--two atheltes who were found guilty of using performance enhancing drugs, but suffered two very different consequences.
Complete a series of substitution values vertically : We have combined three chapters in Excel for this project: Excel - CH06: What-If Analysis, Excel - CH09: Multiple-Sheet Workbook Management, and Excel – CH12: Templates, Styles and Macros.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd