SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Introduction to Parallel
      Computing
         Part Ib
Processor Intercommunication
In part 1b we will look at the interconnection
network between processors. Using these
connections, various communication patterns
can be used to transport information from
one or more source processors, to one or more
destination processors.
Processor Topologies (1)
There are several ways in which processors
can be interconnected. The most important
include
    • Bus               • Ring
    • Star              • Mesh
    • Tree              • Wraparound mesh
    • Fully connected   • Hypercube
Topology Issues
Before looking at some of the major processor
topologies we have to know what makes a
certain topology well or ill suited to connect
processors.
There are two aspects of topologies that
should be looked at. These are scalability and
cost (communication and hardware).
Terminology
Communication is one-to-one when one
processor sends a message to another one.
In one-to-all or broadcast, one processor
  sends
a message to all other processors. In all-to-one
communication, all processors send their
message to one processor. Other forms of
communication include gather and all-to-all.
Connection Properties
There are three elements that are used in
Building the interconnection network. These
are the wire, a relay node, and a processor
node. The latter two elements can at a given
time send or receive only one message, no
matter how many wires enter or leave the
element.
Bus Topology (1)

      P2        P4        P…




P1         P3        P5
Bus Topology (2)
Hardware cost   1
One-to-one      1
One-to-all      1
All-to-all      p

Problems        Bus becomes bottleneck
Star Topology (1)
           P3
      P2        P4


 P1        P0        P5


      P8        P6
           P7
Star Topology (2)
Hardware cost   p–1
One-to-one      1 or 2
One-to-all      p–1
All-to-all      2 · (p – 1)

Problems        Central processor becomes
                bottleneck.
Tree Topology (1)




P1   P2   P3   P4   P5   P6   P7   P8
Tree Topology (2)
Hardware cost   2p – 2, when p power of 2
One-to-one      2 · 2log p
One-to-all      (2log p) · (1 + 2log p)
All-to-all      2 · (2log p) · (1 + 2log p)

Problems        Top node becomes bottleneck
                This can be solved by adding
                more wires at the top (fat tree)
Tree Topology – One-to-all




 P1   P2   P3   P4   P5   P6   P7   P8
Fully Connected Topology (1)

            P2   P3


       P1             P4


            P6   P5
Fully Connected Topology (2)
Hardware cost p·(p – 1)/2
One-to-one    1
One-to-all     2log p
All-to-all    2·2log p

Problems       Hardware cost increases
               quadratically with respect to p
Ring Topology (1)

      P2   P3


 P1             P4


      P6   P5
Ring Topology (2)
Hardware cost   p
One-to-one      p / 2
One-to-all      p / 2
All-to-all      2·p / 2

Problems        Processors are loaded with
                transport jobs. But hardware
                and communication cost low
2D-Mesh Topology (1)
 P12   P13   P14   P15


 P8    P9    P10   P11


 P4    P5    P6    P7


 P0    P1    P2    P3
2D-Mesh Topology (2)
Hardware cost   2·(√p)·(√p – 1)
One-to-one      2(√p – 1)
One-to-all      2(√p – 1)
All-to-all      2·√p / 2

Remarks         Scalable both in network and
                communication cost. Can be
                found in many architectures.
Mesh – All-to-all
Step 0
     6
     5
     4
     3
     2
     1


         P1     P2   P3      P4      P5

   1 23 45 1 23 45 1 23 45 1 23 45 1 23 45
2D Wrap-around Mesh (1)
   P12   P13   P14   P15


   P8    P9    P10   P11


   P4    P5    P6    P7


   P0    P1    P2    P3
2D Wrap-around Mesh (2)
Hardware cost   2p
One-to-one      2·√p / 2
One-to-all      2· √p / 2
All-to-all      4· √p / 2

Remarks         Scalable both in network and
                communication cost. Can be
                found in many architectures.
2D Wrap-around – One-to-all
     P12   P13   P14   P15


     P8    P9    P10   P11


     P4    P5    P6    P7


     P0    P1    P2    P3
Hypercube Topology (1)

        1D
                2D




   3D

                         4D
Hypercube Construction
   4D
   3D
   2D
   1D
Hypercube
Hypercube Topology (2)
Hardware cost     (p / 2) · 2log p
One-to-one      2
                 log p
One-to-all      2
                 log p
All-to-all      2 · 2log p
Remarks         The most elegant design, also
                when it comes down to routing
                algorithms. But difficult to build
                in hardware.
4D Hypercube – One-to-all
Communication Issues
There are some things left to be said about
communication :
• In general the time required for data transmission
  is of the form startup-time + transfer speed *
  package size. So it is more efficient to sent one
  large package instead of many small packages
  (startup-time can be high, e.g. think about internet)
• Asynchronous vs. Synchronous transfer and
  deadlocks.
Asynchronous vs. Synchronous
The major difference between asynchronous
and synchronous communication is that the
first methods sends a message and continues,
while the second sends a message and waits
for the receiver program to receive the
message.
Example asynchronous comm.
    Processor A      Processor B
  Instruction A1
  InstructionA1    Instruction B1
                   InstructionB1
  Send to B
  Send to B        Instruction B2
                   Instruction B2
  Instruction A2
  Instruction A2   Instruction B3
                   Instruction B3
  Instruction A3
  Instruction A3   Instruction B4
                   Instruction B4
  Instruction A4
  Instruction A4   Receive from A
                            from A
  Instruction A5
  Instruction A5   Instruction B5
                   Instruction B5
Asynchronous Comm.
• Convenient because processors do not have to
  wait for each other.
• However, we often need to know whether or not
  the destination processors has received the data,
  this often requires some checking code later in the
  program.
• Need to know whether the OS supports reliable
  communication layers.
• Receive instruction may or may not be blocking.
Example synchronous comm.
   Processor A      Processor B
 Instruction A1
 InstructionA1    Instruction B1
                  InstructionB1
 Send to B
 Send to B        Instruction B2
                  Instruction B2
 Instruction A2
 Instruction A2   Instruction B3
                  Instruction B3
 Instruction A3   Instruction B4
                  Instruction B4
 Instruction A4   Receive from A
                           from A
 Instruction A5   Instruction B5
                  Instruction B5
Synchronous comm.
• Both send and receive are blocking
• Processors have to wait for each other. This
  reduces efficiency.
• Implicitly offers a synchronisation point.
• Easy to program because fewer unexpected
  situations can arise.
• Problem: Deadlocks may occur.
Deadlocks (1)
A deadlock is a situation where two or more
processors are waiting to for each other
infinitely.
Deadlocks (2)

         Processor A                Processor B
      Send to B                  Send to A
      Receive from B             Receive from A




Note: Only occurs with synchronous communication.
Deadlocks (3)

  Processor A      Processor B
Send to B        Receive from A
Receive from B   Send to A
Deadlocks (4)
               P2      P3


        P1                   P4


               P6      P5


Pattern: P1 → P2 → P5 → P4 → P6 → P3 → P1
End of Part I
Are there any questions regarding part I

Weitere ähnliche Inhalte

Was ist angesagt?

TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)Kruti Niranjan
 
system interconnect architectures in ACA
system interconnect architectures in ACAsystem interconnect architectures in ACA
system interconnect architectures in ACAPankaj Kumar Jain
 
Protection in Operating System Layer
Protection in Operating System LayerProtection in Operating System Layer
Protection in Operating System LayerSidharth D
 
Basic communication operations - One to all Broadcast
Basic communication operations - One to all BroadcastBasic communication operations - One to all Broadcast
Basic communication operations - One to all BroadcastRashiJoshi11
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection NetworkHeman Pathak
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)Ramola Dhande
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed SystemSunita Sahu
 
Parallel Programing Model
Parallel Programing ModelParallel Programing Model
Parallel Programing ModelAdlin Jeena
 
Flynns classification
Flynns classificationFlynns classification
Flynns classificationYasir Khan
 
Cache coherence problem and its solutions
Cache coherence problem and its solutionsCache coherence problem and its solutions
Cache coherence problem and its solutionsMajid Saleem
 
Ports & sockets
Ports  & sockets Ports  & sockets
Ports & sockets myrajendra
 

Was ist angesagt? (20)

TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
system interconnect architectures in ACA
system interconnect architectures in ACAsystem interconnect architectures in ACA
system interconnect architectures in ACA
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Replication in Distributed Systems
Replication in Distributed SystemsReplication in Distributed Systems
Replication in Distributed Systems
 
Processes and threads
Processes and threadsProcesses and threads
Processes and threads
 
Pram model
Pram modelPram model
Pram model
 
Protection in Operating System Layer
Protection in Operating System LayerProtection in Operating System Layer
Protection in Operating System Layer
 
Basic communication operations - One to all Broadcast
Basic communication operations - One to all BroadcastBasic communication operations - One to all Broadcast
Basic communication operations - One to all Broadcast
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection Network
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Tcp
TcpTcp
Tcp
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
 
DMA and DMA controller
DMA and DMA controllerDMA and DMA controller
DMA and DMA controller
 
Parallel Programing Model
Parallel Programing ModelParallel Programing Model
Parallel Programing Model
 
Flynns classification
Flynns classificationFlynns classification
Flynns classification
 
Cache coherence problem and its solutions
Cache coherence problem and its solutionsCache coherence problem and its solutions
Cache coherence problem and its solutions
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
 
Ports & sockets
Ports  & sockets Ports  & sockets
Ports & sockets
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 

Andere mochten auch

Introduction To Parallel Computing
Introduction To Parallel ComputingIntroduction To Parallel Computing
Introduction To Parallel ComputingJörn Dinkla
 
Higher nab preparation
Higher nab preparationHigher nab preparation
Higher nab preparationscaddell
 
Introduction to Parallel Computing
Introduction to Parallel ComputingIntroduction to Parallel Computing
Introduction to Parallel ComputingRoshan Karunarathna
 
Highly Surmountable Challenges in Ruby+OMR JIT Compilation
Highly Surmountable Challenges in Ruby+OMR JIT CompilationHighly Surmountable Challenges in Ruby+OMR JIT Compilation
Highly Surmountable Challenges in Ruby+OMR JIT CompilationMatthew Gaudet
 
network ram parallel computing
network ram parallel computingnetwork ram parallel computing
network ram parallel computingNiranjana Ambadi
 
Introduction to parallel_computing
Introduction to parallel_computingIntroduction to parallel_computing
Introduction to parallel_computingMehul Patel
 
VLSI Design(Fabrication)
VLSI Design(Fabrication)VLSI Design(Fabrication)
VLSI Design(Fabrication)Trijit Mallick
 
Database management system chapter15
Database management system chapter15Database management system chapter15
Database management system chapter15Md. Mahedi Mahfuj
 
Fyp list batch-2009 (project approval -rejected list)
Fyp list batch-2009 (project approval -rejected list)Fyp list batch-2009 (project approval -rejected list)
Fyp list batch-2009 (project approval -rejected list)Mr SMAK
 
Parallel computing
Parallel computingParallel computing
Parallel computingvirend111
 
Lecture 1
Lecture 1Lecture 1
Lecture 1Mr SMAK
 
Parallel computing chapter 2
Parallel computing chapter 2Parallel computing chapter 2
Parallel computing chapter 2Md. Mahedi Mahfuj
 
Advanced Comuter Architecture Ch6 Problem Solutions
Advanced Comuter Architecture Ch6 Problem SolutionsAdvanced Comuter Architecture Ch6 Problem Solutions
Advanced Comuter Architecture Ch6 Problem SolutionsJoe Christensen
 
Computer architecture kai hwang
Computer architecture   kai hwangComputer architecture   kai hwang
Computer architecture kai hwangSumedha
 
Parallel computing chapter 3
Parallel computing chapter 3Parallel computing chapter 3
Parallel computing chapter 3Md. Mahedi Mahfuj
 

Andere mochten auch (20)

Parallel computing(2)
Parallel computing(2)Parallel computing(2)
Parallel computing(2)
 
Introduction To Parallel Computing
Introduction To Parallel ComputingIntroduction To Parallel Computing
Introduction To Parallel Computing
 
Higher nab preparation
Higher nab preparationHigher nab preparation
Higher nab preparation
 
Introduction to Parallel Computing
Introduction to Parallel ComputingIntroduction to Parallel Computing
Introduction to Parallel Computing
 
Highly Surmountable Challenges in Ruby+OMR JIT Compilation
Highly Surmountable Challenges in Ruby+OMR JIT CompilationHighly Surmountable Challenges in Ruby+OMR JIT Compilation
Highly Surmountable Challenges in Ruby+OMR JIT Compilation
 
network ram parallel computing
network ram parallel computingnetwork ram parallel computing
network ram parallel computing
 
Chapter6 pipelining
Chapter6  pipeliningChapter6  pipelining
Chapter6 pipelining
 
Introduction to parallel_computing
Introduction to parallel_computingIntroduction to parallel_computing
Introduction to parallel_computing
 
VLSI Design(Fabrication)
VLSI Design(Fabrication)VLSI Design(Fabrication)
VLSI Design(Fabrication)
 
Database management system chapter15
Database management system chapter15Database management system chapter15
Database management system chapter15
 
Fyp list batch-2009 (project approval -rejected list)
Fyp list batch-2009 (project approval -rejected list)Fyp list batch-2009 (project approval -rejected list)
Fyp list batch-2009 (project approval -rejected list)
 
Parallel computing
Parallel computingParallel computing
Parallel computing
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
Parallel computing chapter 2
Parallel computing chapter 2Parallel computing chapter 2
Parallel computing chapter 2
 
Advanced Comuter Architecture Ch6 Problem Solutions
Advanced Comuter Architecture Ch6 Problem SolutionsAdvanced Comuter Architecture Ch6 Problem Solutions
Advanced Comuter Architecture Ch6 Problem Solutions
 
Parallel processing
Parallel processingParallel processing
Parallel processing
 
Computer architecture kai hwang
Computer architecture   kai hwangComputer architecture   kai hwang
Computer architecture kai hwang
 
Parallel computing chapter 3
Parallel computing chapter 3Parallel computing chapter 3
Parallel computing chapter 3
 
Parallel Algorithms
Parallel AlgorithmsParallel Algorithms
Parallel Algorithms
 
Parallel Algorithms
Parallel AlgorithmsParallel Algorithms
Parallel Algorithms
 

Ähnlich wie Parallel computing(1)

Efficient Topology Discovery in Software Defined Networks
Efficient Topology Discovery in Software Defined NetworksEfficient Topology Discovery in Software Defined Networks
Efficient Topology Discovery in Software Defined NetworksFarzaneh Pakzad
 
UNIT-3 network security layers andits types
UNIT-3 network security layers andits typesUNIT-3 network security layers andits types
UNIT-3 network security layers andits typesgjeyasriitaamecnew
 
Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)NYversity
 
Prescriptive Topology Daemon - ptmd
Prescriptive Topology Daemon - ptmdPrescriptive Topology Daemon - ptmd
Prescriptive Topology Daemon - ptmdNat Morris
 
MODULE II.pdf
MODULE II.pdfMODULE II.pdf
MODULE II.pdfADARSHN40
 
Network Topologies, L1-L2 Basics, Networking Devices
Network Topologies, L1-L2 Basics, Networking DevicesNetwork Topologies, L1-L2 Basics, Networking Devices
Network Topologies, L1-L2 Basics, Networking DevicesAalok Shah
 
IRJET - Improving TCP Performance in Wireless Networks
IRJET -  	  Improving TCP Performance in Wireless NetworksIRJET -  	  Improving TCP Performance in Wireless Networks
IRJET - Improving TCP Performance in Wireless NetworksIRJET Journal
 
Transport protocols
Transport protocolsTransport protocols
Transport protocolsAman Jaiswal
 
RIFT A New Approach to Building DC Fabrics
RIFT A New Approach to Building DC FabricsRIFT A New Approach to Building DC Fabrics
RIFT A New Approach to Building DC FabricsMyNOG
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File MulticastYoss Cohen
 
Integrating Cache Oblivious Approach with Modern Processor Architecture: The ...
Integrating Cache Oblivious Approach with Modern Processor Architecture: The ...Integrating Cache Oblivious Approach with Modern Processor Architecture: The ...
Integrating Cache Oblivious Approach with Modern Processor Architecture: The ...Tokyo Institute of Technology
 
A Flexible Router Architecture for 3D Network-on-Chips
A Flexible Router Architecture for 3D Network-on-ChipsA Flexible Router Architecture for 3D Network-on-Chips
A Flexible Router Architecture for 3D Network-on-ChipsMostafa Khamis
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET Journal
 

Ähnlich wie Parallel computing(1) (20)

Efficient Topology Discovery in Software Defined Networks
Efficient Topology Discovery in Software Defined NetworksEfficient Topology Discovery in Software Defined Networks
Efficient Topology Discovery in Software Defined Networks
 
UNIT-3 network security layers andits types
UNIT-3 network security layers andits typesUNIT-3 network security layers andits types
UNIT-3 network security layers andits types
 
Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)
 
Prescriptive Topology Daemon - ptmd
Prescriptive Topology Daemon - ptmdPrescriptive Topology Daemon - ptmd
Prescriptive Topology Daemon - ptmd
 
5G mmwaves - problems and solutions (graduation project)
5G mmwaves - problems and solutions (graduation project)5G mmwaves - problems and solutions (graduation project)
5G mmwaves - problems and solutions (graduation project)
 
MODULE II.ppt
MODULE II.pptMODULE II.ppt
MODULE II.ppt
 
MODULE II.pdf
MODULE II.pdfMODULE II.pdf
MODULE II.pdf
 
Lec9
Lec9Lec9
Lec9
 
Network Topologies, L1-L2 Basics, Networking Devices
Network Topologies, L1-L2 Basics, Networking DevicesNetwork Topologies, L1-L2 Basics, Networking Devices
Network Topologies, L1-L2 Basics, Networking Devices
 
IRJET - Improving TCP Performance in Wireless Networks
IRJET -  	  Improving TCP Performance in Wireless NetworksIRJET -  	  Improving TCP Performance in Wireless Networks
IRJET - Improving TCP Performance in Wireless Networks
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Transport Protocols
Transport ProtocolsTransport Protocols
Transport Protocols
 
gio's tesi
gio's tesigio's tesi
gio's tesi
 
RIFT A New Approach to Building DC Fabrics
RIFT A New Approach to Building DC FabricsRIFT A New Approach to Building DC Fabrics
RIFT A New Approach to Building DC Fabrics
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File Multicast
 
CN UNIT III.pptx
CN UNIT III.pptxCN UNIT III.pptx
CN UNIT III.pptx
 
Integrating Cache Oblivious Approach with Modern Processor Architecture: The ...
Integrating Cache Oblivious Approach with Modern Processor Architecture: The ...Integrating Cache Oblivious Approach with Modern Processor Architecture: The ...
Integrating Cache Oblivious Approach with Modern Processor Architecture: The ...
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
A Flexible Router Architecture for 3D Network-on-Chips
A Flexible Router Architecture for 3D Network-on-ChipsA Flexible Router Architecture for 3D Network-on-Chips
A Flexible Router Architecture for 3D Network-on-Chips
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
 

Mehr von Md. Mahedi Mahfuj

Mehr von Md. Mahedi Mahfuj (20)

Bengali optical character recognition system
Bengali optical character recognition systemBengali optical character recognition system
Bengali optical character recognition system
 
Message passing interface
Message passing interfaceMessage passing interface
Message passing interface
 
Advanced computer architecture
Advanced computer architectureAdvanced computer architecture
Advanced computer architecture
 
Parallel searching
Parallel searchingParallel searching
Parallel searching
 
Clustering manual
Clustering manualClustering manual
Clustering manual
 
Matrix multiplication graph
Matrix multiplication graphMatrix multiplication graph
Matrix multiplication graph
 
Strategy pattern
Strategy patternStrategy pattern
Strategy pattern
 
Observer pattern
Observer patternObserver pattern
Observer pattern
 
Mediator pattern
Mediator patternMediator pattern
Mediator pattern
 
Database management system chapter16
Database management system chapter16Database management system chapter16
Database management system chapter16
 
Database management system chapter12
Database management system chapter12Database management system chapter12
Database management system chapter12
 
Strategies in job search process
Strategies in job search processStrategies in job search process
Strategies in job search process
 
Report writing(short)
Report writing(short)Report writing(short)
Report writing(short)
 
Report writing(long)
Report writing(long)Report writing(long)
Report writing(long)
 
Job search_resume
Job search_resumeJob search_resume
Job search_resume
 
Job search_interview
Job search_interviewJob search_interview
Job search_interview
 
Apache hadoop & map reduce
Apache hadoop & map reduceApache hadoop & map reduce
Apache hadoop & map reduce
 
Basic and logical implementation of r language
Basic and logical implementation of r language Basic and logical implementation of r language
Basic and logical implementation of r language
 
Map reduce
Map reduceMap reduce
Map reduce
 
R with excel
R with excelR with excel
R with excel
 

Kürzlich hochgeladen

Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Parallel computing(1)

  • 1. Introduction to Parallel Computing Part Ib
  • 2. Processor Intercommunication In part 1b we will look at the interconnection network between processors. Using these connections, various communication patterns can be used to transport information from one or more source processors, to one or more destination processors.
  • 3. Processor Topologies (1) There are several ways in which processors can be interconnected. The most important include • Bus • Ring • Star • Mesh • Tree • Wraparound mesh • Fully connected • Hypercube
  • 4. Topology Issues Before looking at some of the major processor topologies we have to know what makes a certain topology well or ill suited to connect processors. There are two aspects of topologies that should be looked at. These are scalability and cost (communication and hardware).
  • 5. Terminology Communication is one-to-one when one processor sends a message to another one. In one-to-all or broadcast, one processor sends a message to all other processors. In all-to-one communication, all processors send their message to one processor. Other forms of communication include gather and all-to-all.
  • 6. Connection Properties There are three elements that are used in Building the interconnection network. These are the wire, a relay node, and a processor node. The latter two elements can at a given time send or receive only one message, no matter how many wires enter or leave the element.
  • 7. Bus Topology (1) P2 P4 P… P1 P3 P5
  • 8. Bus Topology (2) Hardware cost 1 One-to-one 1 One-to-all 1 All-to-all p Problems Bus becomes bottleneck
  • 9. Star Topology (1) P3 P2 P4 P1 P0 P5 P8 P6 P7
  • 10. Star Topology (2) Hardware cost p–1 One-to-one 1 or 2 One-to-all p–1 All-to-all 2 · (p – 1) Problems Central processor becomes bottleneck.
  • 11. Tree Topology (1) P1 P2 P3 P4 P5 P6 P7 P8
  • 12. Tree Topology (2) Hardware cost 2p – 2, when p power of 2 One-to-one 2 · 2log p One-to-all (2log p) · (1 + 2log p) All-to-all 2 · (2log p) · (1 + 2log p) Problems Top node becomes bottleneck This can be solved by adding more wires at the top (fat tree)
  • 13. Tree Topology – One-to-all P1 P2 P3 P4 P5 P6 P7 P8
  • 14. Fully Connected Topology (1) P2 P3 P1 P4 P6 P5
  • 15. Fully Connected Topology (2) Hardware cost p·(p – 1)/2 One-to-one 1 One-to-all 2log p All-to-all 2·2log p Problems Hardware cost increases quadratically with respect to p
  • 16. Ring Topology (1) P2 P3 P1 P4 P6 P5
  • 17. Ring Topology (2) Hardware cost p One-to-one p / 2 One-to-all p / 2 All-to-all 2·p / 2 Problems Processors are loaded with transport jobs. But hardware and communication cost low
  • 18. 2D-Mesh Topology (1) P12 P13 P14 P15 P8 P9 P10 P11 P4 P5 P6 P7 P0 P1 P2 P3
  • 19. 2D-Mesh Topology (2) Hardware cost 2·(√p)·(√p – 1) One-to-one 2(√p – 1) One-to-all 2(√p – 1) All-to-all 2·√p / 2 Remarks Scalable both in network and communication cost. Can be found in many architectures.
  • 20. Mesh – All-to-all Step 0 6 5 4 3 2 1 P1 P2 P3 P4 P5 1 23 45 1 23 45 1 23 45 1 23 45 1 23 45
  • 21. 2D Wrap-around Mesh (1) P12 P13 P14 P15 P8 P9 P10 P11 P4 P5 P6 P7 P0 P1 P2 P3
  • 22. 2D Wrap-around Mesh (2) Hardware cost 2p One-to-one 2·√p / 2 One-to-all 2· √p / 2 All-to-all 4· √p / 2 Remarks Scalable both in network and communication cost. Can be found in many architectures.
  • 23. 2D Wrap-around – One-to-all P12 P13 P14 P15 P8 P9 P10 P11 P4 P5 P6 P7 P0 P1 P2 P3
  • 24. Hypercube Topology (1) 1D 2D 3D 4D
  • 25. Hypercube Construction 4D 3D 2D 1D Hypercube
  • 26. Hypercube Topology (2) Hardware cost (p / 2) · 2log p One-to-one 2 log p One-to-all 2 log p All-to-all 2 · 2log p Remarks The most elegant design, also when it comes down to routing algorithms. But difficult to build in hardware.
  • 27. 4D Hypercube – One-to-all
  • 28. Communication Issues There are some things left to be said about communication : • In general the time required for data transmission is of the form startup-time + transfer speed * package size. So it is more efficient to sent one large package instead of many small packages (startup-time can be high, e.g. think about internet) • Asynchronous vs. Synchronous transfer and deadlocks.
  • 29. Asynchronous vs. Synchronous The major difference between asynchronous and synchronous communication is that the first methods sends a message and continues, while the second sends a message and waits for the receiver program to receive the message.
  • 30. Example asynchronous comm. Processor A Processor B Instruction A1 InstructionA1 Instruction B1 InstructionB1 Send to B Send to B Instruction B2 Instruction B2 Instruction A2 Instruction A2 Instruction B3 Instruction B3 Instruction A3 Instruction A3 Instruction B4 Instruction B4 Instruction A4 Instruction A4 Receive from A from A Instruction A5 Instruction A5 Instruction B5 Instruction B5
  • 31. Asynchronous Comm. • Convenient because processors do not have to wait for each other. • However, we often need to know whether or not the destination processors has received the data, this often requires some checking code later in the program. • Need to know whether the OS supports reliable communication layers. • Receive instruction may or may not be blocking.
  • 32. Example synchronous comm. Processor A Processor B Instruction A1 InstructionA1 Instruction B1 InstructionB1 Send to B Send to B Instruction B2 Instruction B2 Instruction A2 Instruction A2 Instruction B3 Instruction B3 Instruction A3 Instruction B4 Instruction B4 Instruction A4 Receive from A from A Instruction A5 Instruction B5 Instruction B5
  • 33. Synchronous comm. • Both send and receive are blocking • Processors have to wait for each other. This reduces efficiency. • Implicitly offers a synchronisation point. • Easy to program because fewer unexpected situations can arise. • Problem: Deadlocks may occur.
  • 34. Deadlocks (1) A deadlock is a situation where two or more processors are waiting to for each other infinitely.
  • 35. Deadlocks (2) Processor A Processor B Send to B Send to A Receive from B Receive from A Note: Only occurs with synchronous communication.
  • 36. Deadlocks (3) Processor A Processor B Send to B Receive from A Receive from B Send to A
  • 37. Deadlocks (4) P2 P3 P1 P4 P6 P5 Pattern: P1 → P2 → P5 → P4 → P6 → P3 → P1
  • 38. End of Part I Are there any questions regarding part I