Identified access to the global pointer

Assignment Help Basic Computer Science
Reference no: EM131091100

we identified access to the global pointer, target, as a bottleneck in the GRR load-balancing scheme. Consider a modification of this scheme in which it is augmented with message combining. This scheme works as follows. All the requests to read the value of the global pointer target at processor zero are combined at intermediate processors. Thus, the total number of requests handled by processor zero is greatly reduced. This technique is essentially a software implementation of the fetch-andadd operation. This scheme is called GRR-M (GRR with message combining). An implementation of this scheme is illustrated in Figure 11.19. Each processor is at a leaf node in a complete (logical) binary tree. Note that such a logical tree can be easily mapped on to a physical topology. When a processor wants to atomically read and increment target, it sends a request up the tree toward processor zero. An internal node of the tree holds a request from one of its children for at most time d, then forwards the message to its parent. If a request comes from the node's other child within time d, the two requests are combined and sent up as a single request. If i is the total number of increment requests that have been combined, the resulting increment of target is i.

1357_4d5725ad-a6cc-4724-b388-36c812528f0b.png

The returned value at each processor is equal to what it would have been if all the requests to target had been serialized. This is done as follows: each combined message is stored in a table at each processor until the request is granted. When the value of target is sent back to an internal node, two values are sent down to the left and right children if both requested a value of target. The two values are determined from the entries in the table corresponding to increment requests by the two children. The scheme is illustrated by Figure 11.19, in which the original value of target is x, and processors P0, P2, P4, P6 and P7 issue requests. The total requested increment is five. After the messages are combined and processed, the value of target received at these processors is x, x + 1, x + 2, x + 3 and x + 4, respectively.

Reference no: EM131091100

Questions Cloud

Derive a parallel formulation that uses p processes : This formulation uses n processes to sort n elements. Based on this approach, derive a parallel formulation that uses p processes, where p
What is the probability of this worst-case scenario : What is the probability of this worst-case scenario?
Show how to apply the idea of the shellsort algorithm : Show how to apply the idea of the shellsort algorithm
Significant threats to the united states in cyberspace : 1. What four countries are considered by the DoD to be the most significant threats to the United States in cyberspace? 2. Would the attack on the Office of Personnel Management be considered a targeted or an opportunistic attack? Why?
Identified access to the global pointer : After the messages are combined and processed, the value of target received at these processors is x, x + 1, x + 2, x + 3 and x + 4, respectively.
Used in drafting or revising a paper : Consider the poem Galway Kinnell, "Blackberry Eating,". Draft a debatable statement about what the poem means from your perspective. What are the points you would make in an analysis? What specifics in the poem can you use to develop and illustra..
Meaning of health and the determinants of health : his week's course content focuses on the meaning of health and the determinants of health. It is appropriate then, at the start of your program of study, to turn the lens on yourself.
Word critical analysis of the chosen topic : The article and the two documentries is about doping in sports and focuses on the cases of Lance Armstrong and Marion Jones--two atheltes who were found guilty of using performance enhancing drugs, but suffered two very different consequences.
Complete a series of substitution values vertically : We have combined three chapters in Excel for this project: Excel - CH06: What-If Analysis, Excel - CH09: Multiple-Sheet Workbook Management, and Excel – CH12: Templates, Styles and Macros.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the throughput of the pipelined processor

a. What is the speedup of this processor for this program compared to a non-pipelined processor, making the same assumptions used in Section 14.4? b. What is the throughput of the pipelined processor?

  Modules in c are called functions

Modules in C are called functions. C programs are typically written by combining user-created functions as well as "pre-packaged" functions found in the C Standard Library. For instance, printf() is a function that is found in the C Standard Library ..

  What change management initiatives should km group have

What change management initiatives should the KM group have initiated at Infosys before attempting to develop and implement knowledge management at the company?

  What big o would describe the performance of the method get

What Big O would describe the performance of the method get Position?

  Two vulnerability analysis tools used in research

two Vulnerability Analysis tools used in research and/or commercially available and describe their main features and functionality. Compare and contrast their relative strengths and weaknesses

  How use of the ident field might be applicable here

assuming any given fragment may have been part of either transmission? (c) Explain how use of the Ident field might be applicable here.

  Why is security of operation useful

1. Why is security of operation useful to overall information assurance

  Which is the best type of quality system and why

Compare and contrast 3 of what you consider the most appropriate types of quality systems for the project that you will use in your Key Assignment.

  Create a program that interviews the users

Create a program that interviews the users about their personal information, how many jobs they have and what the income is from each of their jobs. The program should then display back to the user the following items.

  Use the sql command line in oracle to perform

One of a DBA's primary responsibilities is to create and manage database user accounts and to grant or revoke access privileges as needed. Users should be able to access or modify only those parts of the database that they need to perform their jo..

  Write a paper that explains memory management requirements

Write a paper that explains memory management requirements. Write a paper that explains the differences in memory management between Windows® and Linux®.

  Pareto efficiency or domination

For each statement give 2x2 matrix that shows it is false. (I'd start by looking at the games I put up in class, Prisoner's Dilemma, Battle of the Sexes, World's Dumbest Game, etc.) When I talk about Pareto efficiency or domination assume it's strong..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd