SlideShare a Scribd company logo
1 of 33
System Attributes to
Performance
22/9/2012
CPU/Processor driven by-
A clock with a constant cycle time (τ) in nSecond
Clock Rate: f = 1/ τ in megahertz
 Ic- Instruction Count: Size of program/number of
machine instructions to be executed in the program.
Different machine instructions needed- different no. of
clock cycles to execute
CPI (Cycles per Instruction): Time needed to execute
each Instruction.
Average CPI: For a given Instruction Set.
Performance Factors:
CPU Time (T): -Time needed to execute a Program.
- in seconds/program
T = CPU Time = Ic * CPI * τ
Execution of an instruction going through a cycle of
events :
Instruction fetch
Decode
Operand(s) fetch
Execution
Store results
Events Carried out in the CPU:
Instruction decodes
Execution phases
Remaining three required to Access the memory.
Memory Cycle :
Time needed to complete one memory reference.
Note- Memory cycle is k times processor cycle τ.
k depends upon speed of memory technology.
System Attributes Influence on Performance Factor (Ic,
p, m, k, t):
1.Instruction-set architecture-
Affects the program length (Ic) and processor
cycle needed (p)
2.Compiler Technology-
Affect value of Ic, p, m
3.CPU Implementation & Control-
Determine total processor time (p * τ)
4.Cache & Memory Hierarchy-
Affect the memory access latency (k*τ)
System
Attributes
Performance Factors
Instr.
Count
(Ic)
Avg. Cycles per Instruction, CPI Processor
Cycle Time
τ
Processor
Cycles per
instruction
(p)
Memory
Reference/
Instruction,
(m)
Memory
Access
Latency,
(k)
Instruction-Set
Architecture X X
Compiler
Technology X X X
Processor
Implementation
& Control
X X
Cache &
Memory
Hierarchy
X X
MIPS Rate: Million Instructions per Second
C = Total no. clock cycle needed to execute a Program
T = C * τ = C/f
CPI = C/Ic
T = Ic * CPI * τ = (Ic * CPI)/f
Throughput Rate (Ws):
No. of programs a system can execute per unit Time.
Ws = Program/Second
Note:- In Multiprogrammed system, System throughput
(Ws) is often lower than CPU throughput Wp.
Wp = f/ (Ic * CPI)
= 1/ Ic * CPI * τ
= 1 Program/T
Ws = Wp
If the CPU is kept busy in a perfect program-interleaving
fashion
Two approaches to parallel programming :
Sequential Coded Source Program
Detect Parallelism & Assign target
Machine Resources
Note:- Compiler Approach applied in programming
Shared-Memory Multiprocessors
•Parallel Dialects of C……
•Parallelism specified in user Program
Note:- Approach applied in Multicomputer
Parallel Computers Architectural Model/
Physical Model
Distinguished by having-
1. Shared Common Memory:
Three Shared-Memory Multiprocessor Models are:
i. UMA (Uniform-Memory Access)
ii. NUMA (Non-Uniform-Memory Access)
iii. COMA (Cache-Only Memory Architecture)
2. Unshared Distributed Memory
i. CC-NUMA (Cache-Coherent -NUMA)
UMA Multiprocessor Model
Physical memory is uniformly shared by all the
processors.
All Processors have equal access time to all memory
words, so it is called Uniform Memory Access.
Peripherals are also shared in some fashion.
Also called Tightly Coupled Systems -due to the high
degree of resource sharing.
Symmetric Vs Asymmetric Multiprocessor
Symmetric Multiprocessor: All processors have equal
access to all peripheral devices.
Asymmetric Multiprocessor:
Only one or a subset of processors are executive capable.
i. MP (Executive or Master Processor)-
Can execute the O.S. and handle I/O
ii. AP (Attached Processor)-
No I/O capability
AP execute user codes under Supervision of MP
NUMA Multiprocessor Model
Shared-Memory System
Access Time varies with the location of the Memory
Word
Local Memories (LM): Shared Memory is physically
distributed to all processors
Global Address Space: Forms by collection of all
Local Memories (LM) that is accessible by all
processors.
Faster Access to a local memory with a local processor
Slow Access to remote memory attached to other
processors due to the added delay through the
interconnection network
LM – Local Memory
P - Local Processor
P – Processor
CSM – Cluster Shared Memory
CIN – Cluster Interconnection Network
GSM – Global Shared Memory
UMA or
NUMA
(Access of Remote Memory)
Three Memory-Access Patterns when Globally Shared
Memory (GSM) added to a multiprocessor system:
i. The fastest is Local Memory(LM) access
ii. The next is global memory (GSM)access
iii. The slowest is access of Remote Memory
Remote Memory- LM attach to other processor
Note:
All cluster have equal access to GSM
Access right among Intercluster memories can be specified.
COMA Multiprocessor Model
• Distributed Main Memory converted to Cache
•Cache form Global Address Space
•Remote Cache access by – Distributed cache Directories
C – Cache
P – Processor
D - Directories
Multiprocessor System Suitable for-
General purpose Multiuser Applications
Programmability is major concern
Shortcoming of Multiprocessor System-
Lack of Scalability
Limitation in Latency Tolerance for Remote Memory
Access
Mini –
Super
Computer
Near- Super
Computer
MPP Class
Distributed-Memory Multicomputers
Nodes- Multiple Computer in System
Interconnection by Message-Passing Network
Node is an Autonomous Computer consists of:
Processor
Local memory
Sometimes attached Disks
Sometimes attached I/O Peripherals
Message-passing network provide: Point-to-point Static
connection among nodes
Local Memories(LM)- private (accessible only by Local
Processor)
NORMA(No-remote-memory-access)-traditional multicomputer
Fig:- Generic model of a message-passing multicomputer
M – Local Memory
P - Processor
Node
Parallel Computers: SIMD or MIMD configuration
SIMD-
For special purpose applications
CM 2 (Connection Machine) on SIMD architecture
MIMD-
CM 5 on MIMD architecture
Having globally shared virtual address space
Scalable multiprocessors or multicomputer:
use distributed shared memory
Unscalable multiprocessors:
use centrally shared memory
Fig:- Gordon Bell's
taxonomy of MIMD
computers.
Supercomputer Classification:
Pipelined Vector machine/ Vector Supercomputers-
*Using a few powerful processors equipped
with vector hardware
*Vector Processing
SIMD Computers / Parallel Processors-
*Emphasizing massive data parallelism
Vector Supercomputers
1
2
3
4
5 6
Step 1-2 Program & data are first loaded into the Main
Memory through a Host computer.
Step 3 All instructions are first decoded by the Scalar
Control Unit.
Step 4 If the decoded instruction is a scalar operation or
a program control operation, it will be directly
executed by the scalar processor using the Scalar
Functional Pipelines.
Step 5 If the instructions are decoded as a Vector
operation, it will be sent to the vector control
unit.
Step 6 Vector control unit will supervise the flow of
vector data between the main memory and vector
functional pipelines.
Note: A number of vector functional pipelines may be built into a
SIMD Supercomputers
CU- Control Unit
PE- Processing Element
LM- Local Memory
IS- Instruction Stream
DS- Data Stream
(Abstract Model of a SIMD computer)
(Operational model of SIMD computer)
SIMD Machine Model:
An operational model of an SIMD computer is specified
by a 5-tuple:
M = <N , C , I , M , R>
(1) N = No. of Processing Elements (PE) in the machine.
(2) C =Set of instructions directly executed by the
control unit (CU). Scalar & Program Flow Control
Instructions.
(3) I = Set of instructions broadcast by the CU to all
PEs for parallel execution.
Include: Arithmetic, logic, data routing, masking, and
other local operations executed by each active PE
over data within that PE.
(4) M = Set of Masking Schemes
Each mask partitions the set of PEs into enabled and
disabled subsets.
(5) R = Set of data-routing functions
Specifying various patterns to be set up in the
interconnection network for inter-PE communications.

More Related Content

What's hot

Superscalar processor
Superscalar processorSuperscalar processor
Superscalar processornoor ul ain
 
Multi core-architecture
Multi core-architectureMulti core-architecture
Multi core-architecturePiyush Mittal
 
Single &amp;Multi Core processor
Single &amp;Multi Core processorSingle &amp;Multi Core processor
Single &amp;Multi Core processorJustify Shadap
 
Parallel processing (simd and mimd)
Parallel processing (simd and mimd)Parallel processing (simd and mimd)
Parallel processing (simd and mimd)Bhavik Vashi
 
CS4109 Computer System Architecture
CS4109 Computer System ArchitectureCS4109 Computer System Architecture
CS4109 Computer System Architecturektosri
 
Multiprocessor
MultiprocessorMultiprocessor
MultiprocessorNeel Patel
 
Computer generations (1950–present)
Computer generations (1950–present)Computer generations (1950–present)
Computer generations (1950–present)AJAL A J
 
Io techniques & its types
Io techniques & its typesIo techniques & its types
Io techniques & its typesNehal Naik
 
Input output organisation
Input output organisationInput output organisation
Input output organisationSanjeev Patel
 
Asynchronous Data Transfer.pptx
Asynchronous Data Transfer.pptxAsynchronous Data Transfer.pptx
Asynchronous Data Transfer.pptxArunaDevi63
 
Pipeline hazards in computer Architecture ppt
Pipeline hazards in computer Architecture pptPipeline hazards in computer Architecture ppt
Pipeline hazards in computer Architecture pptmali yogesh kumar
 
Pipeline Mechanism
Pipeline MechanismPipeline Mechanism
Pipeline MechanismAshik Iqbal
 
Computer architecture input output organization
Computer architecture input output organizationComputer architecture input output organization
Computer architecture input output organizationMazin Alwaaly
 

What's hot (20)

Parallel computing persentation
Parallel computing persentationParallel computing persentation
Parallel computing persentation
 
Superscalar processor
Superscalar processorSuperscalar processor
Superscalar processor
 
Input & Output
Input & OutputInput & Output
Input & Output
 
Amdahl`s law -Processor performance
Amdahl`s law -Processor performanceAmdahl`s law -Processor performance
Amdahl`s law -Processor performance
 
Multi core-architecture
Multi core-architectureMulti core-architecture
Multi core-architecture
 
Single &amp;Multi Core processor
Single &amp;Multi Core processorSingle &amp;Multi Core processor
Single &amp;Multi Core processor
 
Interrupts
InterruptsInterrupts
Interrupts
 
Parallel processing (simd and mimd)
Parallel processing (simd and mimd)Parallel processing (simd and mimd)
Parallel processing (simd and mimd)
 
CS4109 Computer System Architecture
CS4109 Computer System ArchitectureCS4109 Computer System Architecture
CS4109 Computer System Architecture
 
Multiprocessor
MultiprocessorMultiprocessor
Multiprocessor
 
Computer generations (1950–present)
Computer generations (1950–present)Computer generations (1950–present)
Computer generations (1950–present)
 
Io techniques & its types
Io techniques & its typesIo techniques & its types
Io techniques & its types
 
Input output organisation
Input output organisationInput output organisation
Input output organisation
 
Asynchronous Data Transfer.pptx
Asynchronous Data Transfer.pptxAsynchronous Data Transfer.pptx
Asynchronous Data Transfer.pptx
 
Pipeline hazards in computer Architecture ppt
Pipeline hazards in computer Architecture pptPipeline hazards in computer Architecture ppt
Pipeline hazards in computer Architecture ppt
 
Pipeline Mechanism
Pipeline MechanismPipeline Mechanism
Pipeline Mechanism
 
Parallel processing
Parallel processingParallel processing
Parallel processing
 
I/O Organization
I/O OrganizationI/O Organization
I/O Organization
 
Computer architecture input output organization
Computer architecture input output organizationComputer architecture input output organization
Computer architecture input output organization
 
Multiprocessor
MultiprocessorMultiprocessor
Multiprocessor
 

Viewers also liked

Parallel computing
Parallel computingParallel computing
Parallel computingVinay Gupta
 
Flynns classification
Flynns classificationFlynns classification
Flynns classificationYasir Khan
 
Connection Machine
Connection MachineConnection Machine
Connection Machinebutest
 
System quality attributes
System quality attributes System quality attributes
System quality attributes Adil Mehmoood
 
Lecture 6.1
Lecture  6.1Lecture  6.1
Lecture 6.1Mr SMAK
 
VHPC'12: Pre-Copy and Post-Copy VM Live Migration for Memory Intensive Applic...
VHPC'12: Pre-Copy and Post-Copy VM Live Migration for Memory Intensive Applic...VHPC'12: Pre-Copy and Post-Copy VM Live Migration for Memory Intensive Applic...
VHPC'12: Pre-Copy and Post-Copy VM Live Migration for Memory Intensive Applic...aidanshribman
 
SLES Performance Enhancements for Large NUMA Systems
SLES Performance Enhancements for Large NUMA SystemsSLES Performance Enhancements for Large NUMA Systems
SLES Performance Enhancements for Large NUMA SystemsDavidlohr Bueso
 
Leveraging memory in sql server
Leveraging memory in sql serverLeveraging memory in sql server
Leveraging memory in sql serverChris Adkin
 
Advanced computer architecture
Advanced computer architectureAdvanced computer architecture
Advanced computer architectureMd. Mahedi Mahfuj
 
美团技术沙龙04 - 高性能服务器架构设计和调优
美团技术沙龙04 - 高性能服务器架构设计和调优美团技术沙龙04 - 高性能服务器架构设计和调优
美团技术沙龙04 - 高性能服务器架构设计和调优美团点评技术团队
 
Tuning Linux for Databases.
Tuning Linux for Databases.Tuning Linux for Databases.
Tuning Linux for Databases.Alexey Lesovsky
 
Summit2014 riel chegu_w_0340_automatic_numa_balancing_0
Summit2014 riel chegu_w_0340_automatic_numa_balancing_0Summit2014 riel chegu_w_0340_automatic_numa_balancing_0
Summit2014 riel chegu_w_0340_automatic_numa_balancing_0sprdd
 
Technical update KVM and Red Hat Enterprise Virtualization (RHEV) by syedmshaaf
Technical update KVM and Red Hat Enterprise Virtualization (RHEV) by syedmshaafTechnical update KVM and Red Hat Enterprise Virtualization (RHEV) by syedmshaaf
Technical update KVM and Red Hat Enterprise Virtualization (RHEV) by syedmshaafSyed Shaaf
 
Lecture 6
Lecture  6Lecture  6
Lecture 6Mr SMAK
 
Cache & CPU performance
Cache & CPU performanceCache & CPU performance
Cache & CPU performanceso61pi
 
Linux NUMA & Databases: Perils and Opportunities
Linux NUMA & Databases: Perils and OpportunitiesLinux NUMA & Databases: Perils and Opportunities
Linux NUMA & Databases: Perils and OpportunitiesRaghavendra Prabhu
 

Viewers also liked (20)

Parallel computing
Parallel computingParallel computing
Parallel computing
 
Flynns classification
Flynns classificationFlynns classification
Flynns classification
 
Mimd
MimdMimd
Mimd
 
Connection Machine
Connection MachineConnection Machine
Connection Machine
 
System quality attributes
System quality attributes System quality attributes
System quality attributes
 
Lecture 6.1
Lecture  6.1Lecture  6.1
Lecture 6.1
 
Cat @ scale
Cat @ scaleCat @ scale
Cat @ scale
 
VHPC'12: Pre-Copy and Post-Copy VM Live Migration for Memory Intensive Applic...
VHPC'12: Pre-Copy and Post-Copy VM Live Migration for Memory Intensive Applic...VHPC'12: Pre-Copy and Post-Copy VM Live Migration for Memory Intensive Applic...
VHPC'12: Pre-Copy and Post-Copy VM Live Migration for Memory Intensive Applic...
 
CPU Caches
CPU CachesCPU Caches
CPU Caches
 
SLES Performance Enhancements for Large NUMA Systems
SLES Performance Enhancements for Large NUMA SystemsSLES Performance Enhancements for Large NUMA Systems
SLES Performance Enhancements for Large NUMA Systems
 
Leveraging memory in sql server
Leveraging memory in sql serverLeveraging memory in sql server
Leveraging memory in sql server
 
Advanced computer architecture
Advanced computer architectureAdvanced computer architecture
Advanced computer architecture
 
美团技术沙龙04 - 高性能服务器架构设计和调优
美团技术沙龙04 - 高性能服务器架构设计和调优美团技术沙龙04 - 高性能服务器架构设计和调优
美团技术沙龙04 - 高性能服务器架构设计和调优
 
Tuning Linux for Databases.
Tuning Linux for Databases.Tuning Linux for Databases.
Tuning Linux for Databases.
 
Summit2014 riel chegu_w_0340_automatic_numa_balancing_0
Summit2014 riel chegu_w_0340_automatic_numa_balancing_0Summit2014 riel chegu_w_0340_automatic_numa_balancing_0
Summit2014 riel chegu_w_0340_automatic_numa_balancing_0
 
Technical update KVM and Red Hat Enterprise Virtualization (RHEV) by syedmshaaf
Technical update KVM and Red Hat Enterprise Virtualization (RHEV) by syedmshaafTechnical update KVM and Red Hat Enterprise Virtualization (RHEV) by syedmshaaf
Technical update KVM and Red Hat Enterprise Virtualization (RHEV) by syedmshaaf
 
Lecture 6
Lecture  6Lecture  6
Lecture 6
 
Cache & CPU performance
Cache & CPU performanceCache & CPU performance
Cache & CPU performance
 
Linux NUMA & Databases: Perils and Opportunities
Linux NUMA & Databases: Perils and OpportunitiesLinux NUMA & Databases: Perils and Opportunities
Linux NUMA & Databases: Perils and Opportunities
 
美团技术团队 - KVM性能优化
美团技术团队 - KVM性能优化美团技术团队 - KVM性能优化
美团技术团队 - KVM性能优化
 

Similar to System Attributes and Their Impact on Performance

Brief Introduction.ppt
Brief Introduction.pptBrief Introduction.ppt
Brief Introduction.pptMollyZolly
 
Operating Systems
Operating Systems Operating Systems
Operating Systems Fahad Shaikh
 
multiprocessors and multicomputers
 multiprocessors and multicomputers multiprocessors and multicomputers
multiprocessors and multicomputersPankaj Kumar Jain
 
Parallel computing in india
Parallel computing in indiaParallel computing in india
Parallel computing in indiaPreeti Chauhan
 
Organization of modern digital computers
Organization of modern digital computersOrganization of modern digital computers
Organization of modern digital computersDrRamaPrasathAssista
 
Unit 1os processes and threads
Unit 1os processes and threadsUnit 1os processes and threads
Unit 1os processes and threadsdonny101
 
Introduction to Embedded System
Introduction to Embedded SystemIntroduction to Embedded System
Introduction to Embedded SystemZakaria Gomaa
 
COA-Unit-1-Basics.ppt
COA-Unit-1-Basics.pptCOA-Unit-1-Basics.ppt
COA-Unit-1-Basics.pptRuhul Amin
 
Computer system Architecture. This PPT is based on computer system
Computer system Architecture. This PPT is based on computer systemComputer system Architecture. This PPT is based on computer system
Computer system Architecture. This PPT is based on computer systemmohantysikun0
 
Computer system architecture
Computer system architectureComputer system architecture
Computer system architecturejeetesh036
 
Embedded systems 101 final
Embedded systems 101 finalEmbedded systems 101 final
Embedded systems 101 finalKhalid Elmeadawy
 
Introduction to computer systems. Architecture of computer systems.
Introduction to computer systems. Architecture of computer systems.Introduction to computer systems. Architecture of computer systems.
Introduction to computer systems. Architecture of computer systems.TazhikDukenov
 

Similar to System Attributes and Their Impact on Performance (20)

unit_1.pdf
unit_1.pdfunit_1.pdf
unit_1.pdf
 
Brief Introduction.ppt
Brief Introduction.pptBrief Introduction.ppt
Brief Introduction.ppt
 
CSC204PPTNOTES
CSC204PPTNOTESCSC204PPTNOTES
CSC204PPTNOTES
 
Operating Systems
Operating Systems Operating Systems
Operating Systems
 
multiprocessors and multicomputers
 multiprocessors and multicomputers multiprocessors and multicomputers
multiprocessors and multicomputers
 
Parallel computing in india
Parallel computing in indiaParallel computing in india
Parallel computing in india
 
Operating System Overview.pdf
Operating System Overview.pdfOperating System Overview.pdf
Operating System Overview.pdf
 
Organization of modern digital computers
Organization of modern digital computersOrganization of modern digital computers
Organization of modern digital computers
 
Unit 1os processes and threads
Unit 1os processes and threadsUnit 1os processes and threads
Unit 1os processes and threads
 
Introduction to Embedded System
Introduction to Embedded SystemIntroduction to Embedded System
Introduction to Embedded System
 
module4.ppt
module4.pptmodule4.ppt
module4.ppt
 
EE8691 – EMBEDDED SYSTEMS.pptx
EE8691 – EMBEDDED SYSTEMS.pptxEE8691 – EMBEDDED SYSTEMS.pptx
EE8691 – EMBEDDED SYSTEMS.pptx
 
COA-Unit-1-Basics.ppt
COA-Unit-1-Basics.pptCOA-Unit-1-Basics.ppt
COA-Unit-1-Basics.ppt
 
Computer system Architecture. This PPT is based on computer system
Computer system Architecture. This PPT is based on computer systemComputer system Architecture. This PPT is based on computer system
Computer system Architecture. This PPT is based on computer system
 
Lecture 04 chapter 2 - Parallel Programming Platforms
Lecture 04  chapter 2 - Parallel Programming PlatformsLecture 04  chapter 2 - Parallel Programming Platforms
Lecture 04 chapter 2 - Parallel Programming Platforms
 
Spr ch-01
Spr ch-01Spr ch-01
Spr ch-01
 
Computer system architecture
Computer system architectureComputer system architecture
Computer system architecture
 
dhamo
dhamodhamo
dhamo
 
Embedded systems 101 final
Embedded systems 101 finalEmbedded systems 101 final
Embedded systems 101 final
 
Introduction to computer systems. Architecture of computer systems.
Introduction to computer systems. Architecture of computer systems.Introduction to computer systems. Architecture of computer systems.
Introduction to computer systems. Architecture of computer systems.
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

System Attributes and Their Impact on Performance

  • 2. CPU/Processor driven by- A clock with a constant cycle time (τ) in nSecond Clock Rate: f = 1/ τ in megahertz  Ic- Instruction Count: Size of program/number of machine instructions to be executed in the program. Different machine instructions needed- different no. of clock cycles to execute CPI (Cycles per Instruction): Time needed to execute each Instruction. Average CPI: For a given Instruction Set.
  • 3. Performance Factors: CPU Time (T): -Time needed to execute a Program. - in seconds/program T = CPU Time = Ic * CPI * τ Execution of an instruction going through a cycle of events : Instruction fetch Decode Operand(s) fetch Execution Store results
  • 4. Events Carried out in the CPU: Instruction decodes Execution phases Remaining three required to Access the memory. Memory Cycle : Time needed to complete one memory reference. Note- Memory cycle is k times processor cycle τ. k depends upon speed of memory technology.
  • 5.
  • 6. System Attributes Influence on Performance Factor (Ic, p, m, k, t): 1.Instruction-set architecture- Affects the program length (Ic) and processor cycle needed (p) 2.Compiler Technology- Affect value of Ic, p, m 3.CPU Implementation & Control- Determine total processor time (p * τ) 4.Cache & Memory Hierarchy- Affect the memory access latency (k*τ)
  • 7. System Attributes Performance Factors Instr. Count (Ic) Avg. Cycles per Instruction, CPI Processor Cycle Time τ Processor Cycles per instruction (p) Memory Reference/ Instruction, (m) Memory Access Latency, (k) Instruction-Set Architecture X X Compiler Technology X X X Processor Implementation & Control X X Cache & Memory Hierarchy X X
  • 8. MIPS Rate: Million Instructions per Second C = Total no. clock cycle needed to execute a Program T = C * τ = C/f CPI = C/Ic T = Ic * CPI * τ = (Ic * CPI)/f
  • 9. Throughput Rate (Ws): No. of programs a system can execute per unit Time. Ws = Program/Second Note:- In Multiprogrammed system, System throughput (Ws) is often lower than CPU throughput Wp. Wp = f/ (Ic * CPI) = 1/ Ic * CPI * τ = 1 Program/T Ws = Wp If the CPU is kept busy in a perfect program-interleaving fashion
  • 10. Two approaches to parallel programming : Sequential Coded Source Program Detect Parallelism & Assign target Machine Resources Note:- Compiler Approach applied in programming Shared-Memory Multiprocessors
  • 11. •Parallel Dialects of C…… •Parallelism specified in user Program Note:- Approach applied in Multicomputer
  • 12. Parallel Computers Architectural Model/ Physical Model Distinguished by having- 1. Shared Common Memory: Three Shared-Memory Multiprocessor Models are: i. UMA (Uniform-Memory Access) ii. NUMA (Non-Uniform-Memory Access) iii. COMA (Cache-Only Memory Architecture) 2. Unshared Distributed Memory i. CC-NUMA (Cache-Coherent -NUMA)
  • 14. Physical memory is uniformly shared by all the processors. All Processors have equal access time to all memory words, so it is called Uniform Memory Access. Peripherals are also shared in some fashion. Also called Tightly Coupled Systems -due to the high degree of resource sharing.
  • 15. Symmetric Vs Asymmetric Multiprocessor Symmetric Multiprocessor: All processors have equal access to all peripheral devices. Asymmetric Multiprocessor: Only one or a subset of processors are executive capable. i. MP (Executive or Master Processor)- Can execute the O.S. and handle I/O ii. AP (Attached Processor)- No I/O capability AP execute user codes under Supervision of MP
  • 16. NUMA Multiprocessor Model Shared-Memory System Access Time varies with the location of the Memory Word Local Memories (LM): Shared Memory is physically distributed to all processors Global Address Space: Forms by collection of all Local Memories (LM) that is accessible by all processors. Faster Access to a local memory with a local processor Slow Access to remote memory attached to other processors due to the added delay through the interconnection network
  • 17. LM – Local Memory P - Local Processor
  • 18. P – Processor CSM – Cluster Shared Memory CIN – Cluster Interconnection Network GSM – Global Shared Memory UMA or NUMA (Access of Remote Memory)
  • 19. Three Memory-Access Patterns when Globally Shared Memory (GSM) added to a multiprocessor system: i. The fastest is Local Memory(LM) access ii. The next is global memory (GSM)access iii. The slowest is access of Remote Memory Remote Memory- LM attach to other processor Note: All cluster have equal access to GSM Access right among Intercluster memories can be specified.
  • 20. COMA Multiprocessor Model • Distributed Main Memory converted to Cache •Cache form Global Address Space •Remote Cache access by – Distributed cache Directories C – Cache P – Processor D - Directories
  • 21. Multiprocessor System Suitable for- General purpose Multiuser Applications Programmability is major concern Shortcoming of Multiprocessor System- Lack of Scalability Limitation in Latency Tolerance for Remote Memory Access
  • 23. Distributed-Memory Multicomputers Nodes- Multiple Computer in System Interconnection by Message-Passing Network Node is an Autonomous Computer consists of: Processor Local memory Sometimes attached Disks Sometimes attached I/O Peripherals Message-passing network provide: Point-to-point Static connection among nodes Local Memories(LM)- private (accessible only by Local Processor) NORMA(No-remote-memory-access)-traditional multicomputer
  • 24. Fig:- Generic model of a message-passing multicomputer M – Local Memory P - Processor Node
  • 25. Parallel Computers: SIMD or MIMD configuration SIMD- For special purpose applications CM 2 (Connection Machine) on SIMD architecture MIMD- CM 5 on MIMD architecture Having globally shared virtual address space Scalable multiprocessors or multicomputer: use distributed shared memory Unscalable multiprocessors: use centrally shared memory
  • 26. Fig:- Gordon Bell's taxonomy of MIMD computers.
  • 27. Supercomputer Classification: Pipelined Vector machine/ Vector Supercomputers- *Using a few powerful processors equipped with vector hardware *Vector Processing SIMD Computers / Parallel Processors- *Emphasizing massive data parallelism
  • 29. Step 1-2 Program & data are first loaded into the Main Memory through a Host computer. Step 3 All instructions are first decoded by the Scalar Control Unit. Step 4 If the decoded instruction is a scalar operation or a program control operation, it will be directly executed by the scalar processor using the Scalar Functional Pipelines. Step 5 If the instructions are decoded as a Vector operation, it will be sent to the vector control unit. Step 6 Vector control unit will supervise the flow of vector data between the main memory and vector functional pipelines. Note: A number of vector functional pipelines may be built into a
  • 30. SIMD Supercomputers CU- Control Unit PE- Processing Element LM- Local Memory IS- Instruction Stream DS- Data Stream (Abstract Model of a SIMD computer)
  • 31. (Operational model of SIMD computer)
  • 32. SIMD Machine Model: An operational model of an SIMD computer is specified by a 5-tuple: M = <N , C , I , M , R> (1) N = No. of Processing Elements (PE) in the machine. (2) C =Set of instructions directly executed by the control unit (CU). Scalar & Program Flow Control Instructions. (3) I = Set of instructions broadcast by the CU to all PEs for parallel execution. Include: Arithmetic, logic, data routing, masking, and other local operations executed by each active PE over data within that PE.
  • 33. (4) M = Set of Masking Schemes Each mask partitions the set of PEs into enabled and disabled subsets. (5) R = Set of data-routing functions Specifying various patterns to be set up in the interconnection network for inter-PE communications.