SlideShare a Scribd company logo
Introduction to Parallel
      Computing
         Part Ib
Processor Intercommunication
In part 1b we will look at the interconnection
network between processors. Using these
connections, various communication patterns
can be used to transport information from
one or more source processors, to one or more
destination processors.
Processor Topologies (1)
There are several ways in which processors
can be interconnected. The most important
include
    • Bus               • Ring
    • Star              • Mesh
    • Tree              • Wraparound mesh
    • Fully connected   • Hypercube
Topology Issues
Before looking at some of the major processor
topologies we have to know what makes a
certain topology well or ill suited to connect
processors.
There are two aspects of topologies that
should be looked at. These are scalability and
cost (communication and hardware).
Terminology
Communication is one-to-one when one
processor sends a message to another one.
In one-to-all or broadcast, one processor
  sends
a message to all other processors. In all-to-one
communication, all processors send their
message to one processor. Other forms of
communication include gather and all-to-all.
Connection Properties
There are three elements that are used in
Building the interconnection network. These
are the wire, a relay node, and a processor
node. The latter two elements can at a given
time send or receive only one message, no
matter how many wires enter or leave the
element.
Bus Topology (1)

      P2        P4        P…




P1         P3        P5
Bus Topology (2)
Hardware cost   1
One-to-one      1
One-to-all      1
All-to-all      p

Problems        Bus becomes bottleneck
Star Topology (1)
           P3
      P2        P4


 P1        P0        P5


      P8        P6
           P7
Star Topology (2)
Hardware cost   p–1
One-to-one      1 or 2
One-to-all      p–1
All-to-all      2 · (p – 1)

Problems        Central processor becomes
                bottleneck.
Tree Topology (1)




P1   P2   P3   P4   P5   P6   P7   P8
Tree Topology (2)
Hardware cost   2p – 2, when p power of 2
One-to-one      2 · 2log p
One-to-all      (2log p) · (1 + 2log p)
All-to-all      2 · (2log p) · (1 + 2log p)

Problems        Top node becomes bottleneck
                This can be solved by adding
                more wires at the top (fat tree)
Tree Topology – One-to-all




 P1   P2   P3   P4   P5   P6   P7   P8
Fully Connected Topology (1)

            P2   P3


       P1             P4


            P6   P5
Fully Connected Topology (2)
Hardware cost p·(p – 1)/2
One-to-one    1
One-to-all     2log p
All-to-all    2·2log p

Problems       Hardware cost increases
               quadratically with respect to p
Ring Topology (1)

      P2   P3


 P1             P4


      P6   P5
Ring Topology (2)
Hardware cost   p
One-to-one      p / 2
One-to-all      p / 2
All-to-all      2·p / 2

Problems        Processors are loaded with
                transport jobs. But hardware
                and communication cost low
2D-Mesh Topology (1)
 P12   P13   P14   P15


 P8    P9    P10   P11


 P4    P5    P6    P7


 P0    P1    P2    P3
2D-Mesh Topology (2)
Hardware cost   2·(√p)·(√p – 1)
One-to-one      2(√p – 1)
One-to-all      2(√p – 1)
All-to-all      2·√p / 2

Remarks         Scalable both in network and
                communication cost. Can be
                found in many architectures.
Mesh – All-to-all
Step 0
     6
     5
     4
     3
     2
     1


         P1     P2   P3      P4      P5

   1 23 45 1 23 45 1 23 45 1 23 45 1 23 45
2D Wrap-around Mesh (1)
   P12   P13   P14   P15


   P8    P9    P10   P11


   P4    P5    P6    P7


   P0    P1    P2    P3
2D Wrap-around Mesh (2)
Hardware cost   2p
One-to-one      2·√p / 2
One-to-all      2· √p / 2
All-to-all      4· √p / 2

Remarks         Scalable both in network and
                communication cost. Can be
                found in many architectures.
2D Wrap-around – One-to-all
     P12   P13   P14   P15


     P8    P9    P10   P11


     P4    P5    P6    P7


     P0    P1    P2    P3
Hypercube Topology (1)

        1D
                2D




   3D

                         4D
Hypercube Construction
   4D
   3D
   2D
   1D
Hypercube
Hypercube Topology (2)
Hardware cost     (p / 2) · 2log p
One-to-one      2
                 log p
One-to-all      2
                 log p
All-to-all      2 · 2log p
Remarks         The most elegant design, also
                when it comes down to routing
                algorithms. But difficult to build
                in hardware.
4D Hypercube – One-to-all
Communication Issues
There are some things left to be said about
communication :
• In general the time required for data transmission
  is of the form startup-time + transfer speed *
  package size. So it is more efficient to sent one
  large package instead of many small packages
  (startup-time can be high, e.g. think about internet)
• Asynchronous vs. Synchronous transfer and
  deadlocks.
Asynchronous vs. Synchronous
The major difference between asynchronous
and synchronous communication is that the
first methods sends a message and continues,
while the second sends a message and waits
for the receiver program to receive the
message.
Example asynchronous comm.
    Processor A      Processor B
  Instruction A1
  InstructionA1    Instruction B1
                   InstructionB1
  Send to B
  Send to B        Instruction B2
                   Instruction B2
  Instruction A2
  Instruction A2   Instruction B3
                   Instruction B3
  Instruction A3
  Instruction A3   Instruction B4
                   Instruction B4
  Instruction A4
  Instruction A4   Receive from A
                            from A
  Instruction A5
  Instruction A5   Instruction B5
                   Instruction B5
Asynchronous Comm.
• Convenient because processors do not have to
  wait for each other.
• However, we often need to know whether or not
  the destination processors has received the data,
  this often requires some checking code later in the
  program.
• Need to know whether the OS supports reliable
  communication layers.
• Receive instruction may or may not be blocking.
Example synchronous comm.
   Processor A      Processor B
 Instruction A1
 InstructionA1    Instruction B1
                  InstructionB1
 Send to B
 Send to B        Instruction B2
                  Instruction B2
 Instruction A2
 Instruction A2   Instruction B3
                  Instruction B3
 Instruction A3   Instruction B4
                  Instruction B4
 Instruction A4   Receive from A
                           from A
 Instruction A5   Instruction B5
                  Instruction B5
Synchronous comm.
• Both send and receive are blocking
• Processors have to wait for each other. This
  reduces efficiency.
• Implicitly offers a synchronisation point.
• Easy to program because fewer unexpected
  situations can arise.
• Problem: Deadlocks may occur.
Deadlocks (1)
A deadlock is a situation where two or more
processors are waiting to for each other
infinitely.
Deadlocks (2)

         Processor A                Processor B
      Send to B                  Send to A
      Receive from B             Receive from A




Note: Only occurs with synchronous communication.
Deadlocks (3)

  Processor A      Processor B
Send to B        Receive from A
Receive from B   Send to A
Deadlocks (4)
               P2      P3


        P1                   P4


               P6      P5


Pattern: P1 → P2 → P5 → P4 → P6 → P3 → P1
End of Part I
Are there any questions regarding part I

More Related Content

What's hot

Transport layer services
Transport layer servicesTransport layer services
Transport layer services
Melvin Cabatuan
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
Sunita Sahu
 
Multiprocessor
MultiprocessorMultiprocessor
Multiprocessor
Kamal Acharya
 
Message passing interface
Message passing interfaceMessage passing interface
Message passing interface
Md. Mahedi Mahfuj
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
Mahesh Kumar Chelimilla
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
Phan Vuong
 
Mac layer
Mac  layerMac  layer
Mac layer
Shubham Kansal
 
Rarp
RarpRarp
Tcp ip tutorial
Tcp ip tutorialTcp ip tutorial
Tcp ip tutorial
PRINCE KUMAR
 
Interfacing With High Level Programming Language
Interfacing With High Level Programming Language Interfacing With High Level Programming Language
Interfacing With High Level Programming Language
.AIR UNIVERSITY ISLAMABAD
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
asimnawaz54
 
Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]
Ravindra Raju Kolahalam
 
Data link layer
Data link layer Data link layer
Data link layer
Mukesh Chinta
 
Introduction to parallel processing
Introduction to parallel processingIntroduction to parallel processing
Introduction to parallel processing
Page Maker
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
Mukesh Tekwani
 
Parallelism
ParallelismParallelism
Parallelism
Md Raseduzzaman
 
Computer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPTComputer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPT
KalpanaC14
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
Aman Jaiswal
 
MPI message passing interface
MPI message passing interfaceMPI message passing interface
MPI message passing interface
Mohit Raghuvanshi
 
Stop-and-Wait ARQ Protocol
Stop-and-Wait ARQ ProtocolStop-and-Wait ARQ Protocol
Stop-and-Wait ARQ Protocol
praneetayargattikar
 

What's hot (20)

Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
 
Multiprocessor
MultiprocessorMultiprocessor
Multiprocessor
 
Message passing interface
Message passing interfaceMessage passing interface
Message passing interface
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
Mac layer
Mac  layerMac  layer
Mac layer
 
Rarp
RarpRarp
Rarp
 
Tcp ip tutorial
Tcp ip tutorialTcp ip tutorial
Tcp ip tutorial
 
Interfacing With High Level Programming Language
Interfacing With High Level Programming Language Interfacing With High Level Programming Language
Interfacing With High Level Programming Language
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]
 
Data link layer
Data link layer Data link layer
Data link layer
 
Introduction to parallel processing
Introduction to parallel processingIntroduction to parallel processing
Introduction to parallel processing
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Parallelism
ParallelismParallelism
Parallelism
 
Computer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPTComputer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPT
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
MPI message passing interface
MPI message passing interfaceMPI message passing interface
MPI message passing interface
 
Stop-and-Wait ARQ Protocol
Stop-and-Wait ARQ ProtocolStop-and-Wait ARQ Protocol
Stop-and-Wait ARQ Protocol
 

Viewers also liked

Parallel computing(2)
Parallel computing(2)Parallel computing(2)
Parallel computing(2)
Md. Mahedi Mahfuj
 
Introduction To Parallel Computing
Introduction To Parallel ComputingIntroduction To Parallel Computing
Introduction To Parallel Computing
Jörn Dinkla
 
Higher nab preparation
Higher nab preparationHigher nab preparation
Higher nab preparation
scaddell
 
Introduction to Parallel Computing
Introduction to Parallel ComputingIntroduction to Parallel Computing
Introduction to Parallel Computing
Roshan Karunarathna
 
Highly Surmountable Challenges in Ruby+OMR JIT Compilation
Highly Surmountable Challenges in Ruby+OMR JIT CompilationHighly Surmountable Challenges in Ruby+OMR JIT Compilation
Highly Surmountable Challenges in Ruby+OMR JIT Compilation
Matthew Gaudet
 
network ram parallel computing
network ram parallel computingnetwork ram parallel computing
network ram parallel computing
Niranjana Ambadi
 
Chapter6 pipelining
Chapter6  pipeliningChapter6  pipelining
Chapter6 pipelining
Gurpreet Singh
 
Introduction to parallel_computing
Introduction to parallel_computingIntroduction to parallel_computing
Introduction to parallel_computing
Mehul Patel
 
VLSI Design(Fabrication)
VLSI Design(Fabrication)VLSI Design(Fabrication)
VLSI Design(Fabrication)
Trijit Mallick
 
Database management system chapter15
Database management system chapter15Database management system chapter15
Database management system chapter15
Md. Mahedi Mahfuj
 
Fyp list batch-2009 (project approval -rejected list)
Fyp list batch-2009 (project approval -rejected list)Fyp list batch-2009 (project approval -rejected list)
Fyp list batch-2009 (project approval -rejected list)
Mr SMAK
 
Parallel computing
Parallel computingParallel computing
Parallel computing
virend111
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
Mr SMAK
 
Parallel computing chapter 2
Parallel computing chapter 2Parallel computing chapter 2
Parallel computing chapter 2
Md. Mahedi Mahfuj
 
Advanced Comuter Architecture Ch6 Problem Solutions
Advanced Comuter Architecture Ch6 Problem SolutionsAdvanced Comuter Architecture Ch6 Problem Solutions
Advanced Comuter Architecture Ch6 Problem Solutions
Joe Christensen
 
Parallel processing
Parallel processingParallel processing
Parallel processing
Syed Zaid Irshad
 
Computer architecture kai hwang
Computer architecture   kai hwangComputer architecture   kai hwang
Computer architecture kai hwang
Sumedha
 
Parallel computing chapter 3
Parallel computing chapter 3Parallel computing chapter 3
Parallel computing chapter 3
Md. Mahedi Mahfuj
 
Parallel Algorithms
Parallel AlgorithmsParallel Algorithms
Parallel Algorithms
Dr Sandeep Kumar Poonia
 
Parallel Algorithms
Parallel AlgorithmsParallel Algorithms
Parallel Algorithms
Dr Sandeep Kumar Poonia
 

Viewers also liked (20)

Parallel computing(2)
Parallel computing(2)Parallel computing(2)
Parallel computing(2)
 
Introduction To Parallel Computing
Introduction To Parallel ComputingIntroduction To Parallel Computing
Introduction To Parallel Computing
 
Higher nab preparation
Higher nab preparationHigher nab preparation
Higher nab preparation
 
Introduction to Parallel Computing
Introduction to Parallel ComputingIntroduction to Parallel Computing
Introduction to Parallel Computing
 
Highly Surmountable Challenges in Ruby+OMR JIT Compilation
Highly Surmountable Challenges in Ruby+OMR JIT CompilationHighly Surmountable Challenges in Ruby+OMR JIT Compilation
Highly Surmountable Challenges in Ruby+OMR JIT Compilation
 
network ram parallel computing
network ram parallel computingnetwork ram parallel computing
network ram parallel computing
 
Chapter6 pipelining
Chapter6  pipeliningChapter6  pipelining
Chapter6 pipelining
 
Introduction to parallel_computing
Introduction to parallel_computingIntroduction to parallel_computing
Introduction to parallel_computing
 
VLSI Design(Fabrication)
VLSI Design(Fabrication)VLSI Design(Fabrication)
VLSI Design(Fabrication)
 
Database management system chapter15
Database management system chapter15Database management system chapter15
Database management system chapter15
 
Fyp list batch-2009 (project approval -rejected list)
Fyp list batch-2009 (project approval -rejected list)Fyp list batch-2009 (project approval -rejected list)
Fyp list batch-2009 (project approval -rejected list)
 
Parallel computing
Parallel computingParallel computing
Parallel computing
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
Parallel computing chapter 2
Parallel computing chapter 2Parallel computing chapter 2
Parallel computing chapter 2
 
Advanced Comuter Architecture Ch6 Problem Solutions
Advanced Comuter Architecture Ch6 Problem SolutionsAdvanced Comuter Architecture Ch6 Problem Solutions
Advanced Comuter Architecture Ch6 Problem Solutions
 
Parallel processing
Parallel processingParallel processing
Parallel processing
 
Computer architecture kai hwang
Computer architecture   kai hwangComputer architecture   kai hwang
Computer architecture kai hwang
 
Parallel computing chapter 3
Parallel computing chapter 3Parallel computing chapter 3
Parallel computing chapter 3
 
Parallel Algorithms
Parallel AlgorithmsParallel Algorithms
Parallel Algorithms
 
Parallel Algorithms
Parallel AlgorithmsParallel Algorithms
Parallel Algorithms
 

Similar to Parallel computing(1)

Efficient Topology Discovery in Software Defined Networks
Efficient Topology Discovery in Software Defined NetworksEfficient Topology Discovery in Software Defined Networks
Efficient Topology Discovery in Software Defined Networks
Farzaneh Pakzad
 
Chapter 4 pc
Chapter 4 pcChapter 4 pc
Chapter 4 pc
Hanif Durad
 
UNIT-3 network security layers andits types
UNIT-3 network security layers andits typesUNIT-3 network security layers andits types
UNIT-3 network security layers andits types
gjeyasriitaamecnew
 
Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)
NYversity
 
Prescriptive Topology Daemon - ptmd
Prescriptive Topology Daemon - ptmdPrescriptive Topology Daemon - ptmd
Prescriptive Topology Daemon - ptmd
Nat Morris
 
5G mmwaves - problems and solutions (graduation project)
5G mmwaves - problems and solutions (graduation project)5G mmwaves - problems and solutions (graduation project)
5G mmwaves - problems and solutions (graduation project)
Faculty of Engineering - Alexandria University
 
MODULE II.ppt
MODULE II.pptMODULE II.ppt
MODULE II.ppt
SibenConor
 
MODULE II.pdf
MODULE II.pdfMODULE II.pdf
MODULE II.pdf
ADARSHN40
 
Lec9
Lec9Lec9
Network Topologies, L1-L2 Basics, Networking Devices
Network Topologies, L1-L2 Basics, Networking DevicesNetwork Topologies, L1-L2 Basics, Networking Devices
Network Topologies, L1-L2 Basics, Networking Devices
Aalok Shah
 
IRJET - Improving TCP Performance in Wireless Networks
IRJET -  	  Improving TCP Performance in Wireless NetworksIRJET -  	  Improving TCP Performance in Wireless Networks
IRJET - Improving TCP Performance in Wireless Networks
IRJET Journal
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
Aman Jaiswal
 
Transport Protocols
Transport ProtocolsTransport Protocols
Transport Protocols
Peter R. Egli
 
gio's tesi
gio's tesigio's tesi
gio's tesi
capitan_jo
 
RIFT A New Approach to Building DC Fabrics
RIFT A New Approach to Building DC FabricsRIFT A New Approach to Building DC Fabrics
RIFT A New Approach to Building DC Fabrics
MyNOG
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File Multicast
Yoss Cohen
 
CN UNIT III.pptx
CN UNIT III.pptxCN UNIT III.pptx
CN UNIT III.pptx
VISWANATHAN R V
 
Integrating Cache Oblivious Approach with Modern Processor Architecture: The ...
Integrating Cache Oblivious Approach with Modern Processor Architecture: The ...Integrating Cache Oblivious Approach with Modern Processor Architecture: The ...
Integrating Cache Oblivious Approach with Modern Processor Architecture: The ...
Tokyo Institute of Technology
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
Yogesh Thawait
 
A Flexible Router Architecture for 3D Network-on-Chips
A Flexible Router Architecture for 3D Network-on-ChipsA Flexible Router Architecture for 3D Network-on-Chips
A Flexible Router Architecture for 3D Network-on-Chips
Mostafa Khamis
 

Similar to Parallel computing(1) (20)

Efficient Topology Discovery in Software Defined Networks
Efficient Topology Discovery in Software Defined NetworksEfficient Topology Discovery in Software Defined Networks
Efficient Topology Discovery in Software Defined Networks
 
Chapter 4 pc
Chapter 4 pcChapter 4 pc
Chapter 4 pc
 
UNIT-3 network security layers andits types
UNIT-3 network security layers andits typesUNIT-3 network security layers andits types
UNIT-3 network security layers andits types
 
Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)
 
Prescriptive Topology Daemon - ptmd
Prescriptive Topology Daemon - ptmdPrescriptive Topology Daemon - ptmd
Prescriptive Topology Daemon - ptmd
 
5G mmwaves - problems and solutions (graduation project)
5G mmwaves - problems and solutions (graduation project)5G mmwaves - problems and solutions (graduation project)
5G mmwaves - problems and solutions (graduation project)
 
MODULE II.ppt
MODULE II.pptMODULE II.ppt
MODULE II.ppt
 
MODULE II.pdf
MODULE II.pdfMODULE II.pdf
MODULE II.pdf
 
Lec9
Lec9Lec9
Lec9
 
Network Topologies, L1-L2 Basics, Networking Devices
Network Topologies, L1-L2 Basics, Networking DevicesNetwork Topologies, L1-L2 Basics, Networking Devices
Network Topologies, L1-L2 Basics, Networking Devices
 
IRJET - Improving TCP Performance in Wireless Networks
IRJET -  	  Improving TCP Performance in Wireless NetworksIRJET -  	  Improving TCP Performance in Wireless Networks
IRJET - Improving TCP Performance in Wireless Networks
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Transport Protocols
Transport ProtocolsTransport Protocols
Transport Protocols
 
gio's tesi
gio's tesigio's tesi
gio's tesi
 
RIFT A New Approach to Building DC Fabrics
RIFT A New Approach to Building DC FabricsRIFT A New Approach to Building DC Fabrics
RIFT A New Approach to Building DC Fabrics
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File Multicast
 
CN UNIT III.pptx
CN UNIT III.pptxCN UNIT III.pptx
CN UNIT III.pptx
 
Integrating Cache Oblivious Approach with Modern Processor Architecture: The ...
Integrating Cache Oblivious Approach with Modern Processor Architecture: The ...Integrating Cache Oblivious Approach with Modern Processor Architecture: The ...
Integrating Cache Oblivious Approach with Modern Processor Architecture: The ...
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
A Flexible Router Architecture for 3D Network-on-Chips
A Flexible Router Architecture for 3D Network-on-ChipsA Flexible Router Architecture for 3D Network-on-Chips
A Flexible Router Architecture for 3D Network-on-Chips
 

More from Md. Mahedi Mahfuj

Bengali optical character recognition system
Bengali optical character recognition systemBengali optical character recognition system
Bengali optical character recognition system
Md. Mahedi Mahfuj
 
Advanced computer architecture
Advanced computer architectureAdvanced computer architecture
Advanced computer architecture
Md. Mahedi Mahfuj
 
Parallel searching
Parallel searchingParallel searching
Parallel searching
Md. Mahedi Mahfuj
 
Clustering manual
Clustering manualClustering manual
Clustering manual
Md. Mahedi Mahfuj
 
Matrix multiplication graph
Matrix multiplication graphMatrix multiplication graph
Matrix multiplication graph
Md. Mahedi Mahfuj
 
Strategy pattern
Strategy patternStrategy pattern
Strategy pattern
Md. Mahedi Mahfuj
 
Observer pattern
Observer patternObserver pattern
Observer pattern
Md. Mahedi Mahfuj
 
Mediator pattern
Mediator patternMediator pattern
Mediator pattern
Md. Mahedi Mahfuj
 
Database management system chapter16
Database management system chapter16Database management system chapter16
Database management system chapter16
Md. Mahedi Mahfuj
 
Database management system chapter12
Database management system chapter12Database management system chapter12
Database management system chapter12
Md. Mahedi Mahfuj
 
Strategies in job search process
Strategies in job search processStrategies in job search process
Strategies in job search process
Md. Mahedi Mahfuj
 
Report writing(short)
Report writing(short)Report writing(short)
Report writing(short)
Md. Mahedi Mahfuj
 
Report writing(long)
Report writing(long)Report writing(long)
Report writing(long)
Md. Mahedi Mahfuj
 
Job search_resume
Job search_resumeJob search_resume
Job search_resume
Md. Mahedi Mahfuj
 
Job search_interview
Job search_interviewJob search_interview
Job search_interview
Md. Mahedi Mahfuj
 
Apache hadoop & map reduce
Apache hadoop & map reduceApache hadoop & map reduce
Apache hadoop & map reduce
Md. Mahedi Mahfuj
 
Basic and logical implementation of r language
Basic and logical implementation of r language Basic and logical implementation of r language
Basic and logical implementation of r language
Md. Mahedi Mahfuj
 
Map reduce
Map reduceMap reduce
Map reduce
Md. Mahedi Mahfuj
 
R with excel
R with excelR with excel
R with excel
Md. Mahedi Mahfuj
 
R language
R languageR language
R language
Md. Mahedi Mahfuj
 

More from Md. Mahedi Mahfuj (20)

Bengali optical character recognition system
Bengali optical character recognition systemBengali optical character recognition system
Bengali optical character recognition system
 
Advanced computer architecture
Advanced computer architectureAdvanced computer architecture
Advanced computer architecture
 
Parallel searching
Parallel searchingParallel searching
Parallel searching
 
Clustering manual
Clustering manualClustering manual
Clustering manual
 
Matrix multiplication graph
Matrix multiplication graphMatrix multiplication graph
Matrix multiplication graph
 
Strategy pattern
Strategy patternStrategy pattern
Strategy pattern
 
Observer pattern
Observer patternObserver pattern
Observer pattern
 
Mediator pattern
Mediator patternMediator pattern
Mediator pattern
 
Database management system chapter16
Database management system chapter16Database management system chapter16
Database management system chapter16
 
Database management system chapter12
Database management system chapter12Database management system chapter12
Database management system chapter12
 
Strategies in job search process
Strategies in job search processStrategies in job search process
Strategies in job search process
 
Report writing(short)
Report writing(short)Report writing(short)
Report writing(short)
 
Report writing(long)
Report writing(long)Report writing(long)
Report writing(long)
 
Job search_resume
Job search_resumeJob search_resume
Job search_resume
 
Job search_interview
Job search_interviewJob search_interview
Job search_interview
 
Apache hadoop & map reduce
Apache hadoop & map reduceApache hadoop & map reduce
Apache hadoop & map reduce
 
Basic and logical implementation of r language
Basic and logical implementation of r language Basic and logical implementation of r language
Basic and logical implementation of r language
 
Map reduce
Map reduceMap reduce
Map reduce
 
R with excel
R with excelR with excel
R with excel
 
R language
R languageR language
R language
 

Recently uploaded

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 

Recently uploaded (20)

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 

Parallel computing(1)

  • 1. Introduction to Parallel Computing Part Ib
  • 2. Processor Intercommunication In part 1b we will look at the interconnection network between processors. Using these connections, various communication patterns can be used to transport information from one or more source processors, to one or more destination processors.
  • 3. Processor Topologies (1) There are several ways in which processors can be interconnected. The most important include • Bus • Ring • Star • Mesh • Tree • Wraparound mesh • Fully connected • Hypercube
  • 4. Topology Issues Before looking at some of the major processor topologies we have to know what makes a certain topology well or ill suited to connect processors. There are two aspects of topologies that should be looked at. These are scalability and cost (communication and hardware).
  • 5. Terminology Communication is one-to-one when one processor sends a message to another one. In one-to-all or broadcast, one processor sends a message to all other processors. In all-to-one communication, all processors send their message to one processor. Other forms of communication include gather and all-to-all.
  • 6. Connection Properties There are three elements that are used in Building the interconnection network. These are the wire, a relay node, and a processor node. The latter two elements can at a given time send or receive only one message, no matter how many wires enter or leave the element.
  • 7. Bus Topology (1) P2 P4 P… P1 P3 P5
  • 8. Bus Topology (2) Hardware cost 1 One-to-one 1 One-to-all 1 All-to-all p Problems Bus becomes bottleneck
  • 9. Star Topology (1) P3 P2 P4 P1 P0 P5 P8 P6 P7
  • 10. Star Topology (2) Hardware cost p–1 One-to-one 1 or 2 One-to-all p–1 All-to-all 2 · (p – 1) Problems Central processor becomes bottleneck.
  • 11. Tree Topology (1) P1 P2 P3 P4 P5 P6 P7 P8
  • 12. Tree Topology (2) Hardware cost 2p – 2, when p power of 2 One-to-one 2 · 2log p One-to-all (2log p) · (1 + 2log p) All-to-all 2 · (2log p) · (1 + 2log p) Problems Top node becomes bottleneck This can be solved by adding more wires at the top (fat tree)
  • 13. Tree Topology – One-to-all P1 P2 P3 P4 P5 P6 P7 P8
  • 14. Fully Connected Topology (1) P2 P3 P1 P4 P6 P5
  • 15. Fully Connected Topology (2) Hardware cost p·(p – 1)/2 One-to-one 1 One-to-all 2log p All-to-all 2·2log p Problems Hardware cost increases quadratically with respect to p
  • 16. Ring Topology (1) P2 P3 P1 P4 P6 P5
  • 17. Ring Topology (2) Hardware cost p One-to-one p / 2 One-to-all p / 2 All-to-all 2·p / 2 Problems Processors are loaded with transport jobs. But hardware and communication cost low
  • 18. 2D-Mesh Topology (1) P12 P13 P14 P15 P8 P9 P10 P11 P4 P5 P6 P7 P0 P1 P2 P3
  • 19. 2D-Mesh Topology (2) Hardware cost 2·(√p)·(√p – 1) One-to-one 2(√p – 1) One-to-all 2(√p – 1) All-to-all 2·√p / 2 Remarks Scalable both in network and communication cost. Can be found in many architectures.
  • 20. Mesh – All-to-all Step 0 6 5 4 3 2 1 P1 P2 P3 P4 P5 1 23 45 1 23 45 1 23 45 1 23 45 1 23 45
  • 21. 2D Wrap-around Mesh (1) P12 P13 P14 P15 P8 P9 P10 P11 P4 P5 P6 P7 P0 P1 P2 P3
  • 22. 2D Wrap-around Mesh (2) Hardware cost 2p One-to-one 2·√p / 2 One-to-all 2· √p / 2 All-to-all 4· √p / 2 Remarks Scalable both in network and communication cost. Can be found in many architectures.
  • 23. 2D Wrap-around – One-to-all P12 P13 P14 P15 P8 P9 P10 P11 P4 P5 P6 P7 P0 P1 P2 P3
  • 24. Hypercube Topology (1) 1D 2D 3D 4D
  • 25. Hypercube Construction 4D 3D 2D 1D Hypercube
  • 26. Hypercube Topology (2) Hardware cost (p / 2) · 2log p One-to-one 2 log p One-to-all 2 log p All-to-all 2 · 2log p Remarks The most elegant design, also when it comes down to routing algorithms. But difficult to build in hardware.
  • 27. 4D Hypercube – One-to-all
  • 28. Communication Issues There are some things left to be said about communication : • In general the time required for data transmission is of the form startup-time + transfer speed * package size. So it is more efficient to sent one large package instead of many small packages (startup-time can be high, e.g. think about internet) • Asynchronous vs. Synchronous transfer and deadlocks.
  • 29. Asynchronous vs. Synchronous The major difference between asynchronous and synchronous communication is that the first methods sends a message and continues, while the second sends a message and waits for the receiver program to receive the message.
  • 30. Example asynchronous comm. Processor A Processor B Instruction A1 InstructionA1 Instruction B1 InstructionB1 Send to B Send to B Instruction B2 Instruction B2 Instruction A2 Instruction A2 Instruction B3 Instruction B3 Instruction A3 Instruction A3 Instruction B4 Instruction B4 Instruction A4 Instruction A4 Receive from A from A Instruction A5 Instruction A5 Instruction B5 Instruction B5
  • 31. Asynchronous Comm. • Convenient because processors do not have to wait for each other. • However, we often need to know whether or not the destination processors has received the data, this often requires some checking code later in the program. • Need to know whether the OS supports reliable communication layers. • Receive instruction may or may not be blocking.
  • 32. Example synchronous comm. Processor A Processor B Instruction A1 InstructionA1 Instruction B1 InstructionB1 Send to B Send to B Instruction B2 Instruction B2 Instruction A2 Instruction A2 Instruction B3 Instruction B3 Instruction A3 Instruction B4 Instruction B4 Instruction A4 Receive from A from A Instruction A5 Instruction B5 Instruction B5
  • 33. Synchronous comm. • Both send and receive are blocking • Processors have to wait for each other. This reduces efficiency. • Implicitly offers a synchronisation point. • Easy to program because fewer unexpected situations can arise. • Problem: Deadlocks may occur.
  • 34. Deadlocks (1) A deadlock is a situation where two or more processors are waiting to for each other infinitely.
  • 35. Deadlocks (2) Processor A Processor B Send to B Send to A Receive from B Receive from A Note: Only occurs with synchronous communication.
  • 36. Deadlocks (3) Processor A Processor B Send to B Receive from A Receive from B Send to A
  • 37. Deadlocks (4) P2 P3 P1 P4 P6 P5 Pattern: P1 → P2 → P5 → P4 → P6 → P3 → P1
  • 38. End of Part I Are there any questions regarding part I