Calculate the effective speedup

Assignment Help Computer Engineering
Reference no: EM133482102

Case: Let α be the percentage of program code that can be executed simultaneously by n computers in a cluster. An application program is executed on a nine-computer cluster. A benchmark program takes time T on this cluster. Further, 25% of T is time in which the application is running simultaneously on all nine computers. The remaining time, the application has to run on a single computer.

Question: Calculate the effective speedup under the aforementioned condition as compared to executing the program on a single computer. Also calculate the percentage of code that has been parallelized (programed or compiled so as to use the cluster mode) in the preceding program, i.e., the α.

Suppose that we are able to effectively us 18 computers rather than 9 computers on the parallelized portion of the code. Calculate the effective speedup that is achieved.

Reference no: EM133482102

Questions Cloud

What will be the actual code for the program to run : What will be the actual code for the program to run - entering for one event only You have been asked to design and develop a computer program to manage
What about the vsim went well : Where in the vSim did you struggle? What are the differences between coughing/deep breathing and incentive spirometry?
What does the united nations say about global agenda : What does the United Nations say about global agenda? An exploration of trends using natural language processing for machine learning
Discuss article on covid-19 long hauler syndrome : Provide the reference of a peer reviewed site/ article on COVID-19 long hauler syndrome and highlight from that site or article knowledge which was new to you.
Calculate the effective speedup : Calculate the effective speedup under the aforementioned condition as compared to executing the program on a single computer
What preventative care is recommended : It is mentioned that the Affordable Care Act does not allow for the use of a CEA to establish what preventative care is recommended. Why do you think that is?
What emergency information should your company keep : What emergency information should your company keep in central offline storage for the incident response plan?
Explain and paraphrase the quote from alex grijelmo : Explain and paraphrase the quote from Alex Grijelmo: "Words are the embryos of ideas, the germ of thought, the structure of reasons..."
Analyze the security controls measures : Describe what you consider to be the two to three most significant wireless threats and vulnerabilities and to what degree these concerns keep some organization

Reviews

Write a Review

Computer Engineering Questions & Answers

  What choice do you recommend for marcus weber

Given that Marcus's budget will permit him to add only Barry or Kim to this project team, but not both, what choice do you recommend for him? Justify your answer.

  What is the role of ram

What is the role of: RAM, clock speed, data on hard disk, data on CD ROM, and data on floppy disk.

  Issues or problems related to database architecture

In a Microsoft Word document, write an 800- to 1,000-word research paper. Your research paper should contain the following sections.

  Explain how the graphics should be interpreted

Every day we use data in one way or another in our daily lives, we find ways to analyze situations and create viable solutions based on quantitative.

  Write a program to store 10 student names

Write a C++ program to store 10 student names and grade point averages (GPAs) from the user.

  What advice or guidance would offer a company

In times of financial difficulty, companies often resort to trimming the human asset base, without proper prior analysis of the long-term impacts of those actions.

  Write the script before you run it in the terminal

How do you and where do you go to write the script before you run it in the Terminal and how you run it in the terminal.

  Pda and cell phone investigations

One of the aspects of the forensics procedure will be to secure and analyze the PDAs and Cell phones. What kinds of the tools may be selected for use in PDA and Cell phone investigations.

  What could you recommend to improve the situation

Current capacity is 900 GB, and still growing faster with hundreds of files everyday.

  What are some instances that outsourcing should not be

What are some instances that outsourcing should not be considered when implementing information security?

  How data mining can be preformed in those databases

CS 100 University of the Fraser Valley Explain how they are used by organizations and Discuss how data mining can be preformed in those databases

  Create a class called cemployee to store information

Create a class called CEmployee to store information, it will contain 5 data member for the name, gender, age, department and salary of the employee.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd