Analysis of amdahls law, Computer Engineering

Assignment Help:

The outcomes of analysis of Amdahl's law are:

1) To optimize the performance of parallel computers, modified compilers need to be developed which should aim to decrease the number of sequential operations pertaining to the fraction α.

2)  The manufacturers of parallel computers were discouraged from manufacturing large- scale machines having millions of processors.

There is one main shortcoming identified in Amdahl's law. According to Amdahl's law, the workload or the difficulty size is always fixed and the number of sequential operations mainly remains similar. Thus, it assumes that the distribution of number of sequential operations and parallel operations always remains similar.  This situation is shown in Figure and the ratio of sequential and parallel operations are independent of difficulty size.

1545_Analysis of Amdahls law.png

No. Of processors

Fixed load for Amdahl's Law

Though, practically the number of parallel operations increases according to the size of difficulty.  As the load is assumed to be fixed according to Amdahl's law, the implementation time will keep on decreasing when number of processors is increased. This situation is shown in Figure given below. This is in Introduction to the processes operation.

83_Analysis of Amdahls law1.png

No. Of processors

Execution Time decreases for Amdahl's Law


Related Discussions:- Analysis of amdahls law

What is a multiple line field, What is a multiple line field? A multipl...

What is a multiple line field? A multiple line field is a special part of field which allows the user to enter multiple lines of data into it.

What is memory address register, Q. What is Memory Address Register? Me...

Q. What is Memory Address Register? Memory Address Register (MAR): It specifies address of memory location from that data or instruction is to be accessed (read operation) or t

Automated injection, There are tools to automate the process of SQL Injecti...

There are tools to automate the process of SQL Injection into login and other fields. One hacker process, using a one tool, will be to search out a number of weak targets using Goo

What is pure virtual function, A class is made abstract by declaring one or...

A class is made abstract by declaring one or more of its virtual functions to be pure. A pure virtual function is one with an initializer of = 0 in its declaration

Why should i use cgi, CGI is significant whenever you require to retain sta...

CGI is significant whenever you require to retain state information about a user, or run an application which communicates with the server. Things like guestbook's, Chat clients, d

C program, #how to write c program for all types of beam reactions

#how to write c program for all types of beam reactions

Convert binary number in two''s compliment form, Convert binary number in t...

Convert binary number in two's compliment form 0100 1000. Converting the binary number into 2's compliment from 0100 1000 is given below: 01001000 => 10111000

Define main memory and auxiliary memory, Define main memory and auxiliary m...

Define main memory and auxiliary memory? The memory unit that communicates directly with the cpu is known as main memory [RAM].Devices that give backup storage are known as aux

Shm, composition of two shm in right angles to each other to havingg time p...

composition of two shm in right angles to each other to havingg time period in the ratio 1:2

Features of mpi-1, Features of MPI-1 Binding for FORTRAN and C ...

Features of MPI-1 Binding for FORTRAN and C Collective communication Communication domains and Process groups Point-to-point communication Virtual process

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd