Complete the code that passes the array a and b

Assignment Help Computer Networking
Reference no: EM131310065

MPI network

Please, let me know if anyone is able to do it right and in the proper time.

Please put Course number, your Full Name, Assignment number on top right. Submit your homework on Blackboard. Please name your file as "ITS470HW5FirstNameLastName.(doc or docx)". You should submit all source codes, script files, and all output files from job submission. Documentation is important. The more clear and detail documentation is a good way to earn better grade.

1. Complete the code that passes the array a and b from process 0 to process 1 using the algorithm shown in textbook p.246. Vary the size of arraya and b from 100, 1000, and 2000 to compare and discuss the results. Explain your results from each size. For MPI_Recv function, see sample code given in course website.

2. In given code "mpi-pi.c", the jobs aredistributedin cyclic manner.Modify and write the code that distributes the job using block partition, which assignsa set of consecutive jobs to each process. For example, if there are 40 jobs and 4 processes, distribute10 jobs each process such as 1to 10 to process 0, 11 to 20 to process 1, 21 to 30 to process 2, and 31 to 40 to process 3. For the simplicity, assume that userinputsthe number of steps that is the multiple of the number of processes. For example, if the number of processes is 4, the number of steps should be multiple of 4 such as 16, 100, 200, 10000, etc.Your code should dynamically distribute the same amount of jobs over the number of available processes. Explain your job distribution method and it should be clearly documented in your code.

3. Re-write pi estimation code using MPI_Send and MPI_Recv communication functions only. You can download sample code at course website called "mpi-pi.c". Explain how you did in word here and it should be documented in your code. (Hint: Process 0 receives all partial local results and computes the estimating pi)

4. Use given "mpi-pi.c" code, modify it to compute and print the elapsed time at process 0 using Wtim( ) function. Then, choose the large number of steps (i.e., n = 2,000,000,000) and run the program by use of 1, 4, 8, and 16 processes to find each corresponding elapsed time. Do this with the small number of steps (i.e., 200) to find the elapsed time at each number of processes. Plot both results to observe the relation between the number of processes and elapsed time at each number of steps.

Reference no: EM131310065

Questions Cloud

Explain importance of critical path in project management : Explain the importance of the critical path in project management. Examine the advantages of using a Gantt chart over a PERT chart and vice versa. Determine when it is appropriate to use one over the other.
Display sentinel value so that user may ultimately be able : Loop through all of the above steps until the user types the sentinel value when prompted. Display the sentinel value so that the user may ultimately be able to demonstrate an understanding of the way in which to end the program.
What would be the firms expected dividend per share : Coca-Cola stock has an expected ROE of 14% per year, expected earnings per share of $4, and expected dividends of $2.50 per share. Its market capitalization rate is 15% per year. a) what are its expected growth rate, its price and its P/E ratio? b) I..
What is the list price of the bond on the settlement date : Calculate the price of the bond for a market interest rate of 3% per half year. Compare the capital gains for the interest rate decline to the losses incurred when the rate increases to 5%. A bond with a settlement date of April 30, 2013 and a maturi..
Complete the code that passes the array a and b : Complete the code that passes the array a and b from process 0 to process 1 using the algorithm shown in textbook p.246. Vary the size of arraya and b from 100, 1000, and 2000 to compare and discuss the results.
What is the required rate of return on the project : Stock XYZ has an expected return of 12% and B = 1. Stock ABC is expected to return 13% with a beta of 1.5%. The market's expected return is 11% and r1 = 5%. According to the CAPM,which stock is a better buy? What is the alpha of each stock? What is t..
Create a system reference guide for your employer : You have been called upon to put together some reference materials for other groups to follow, Create a System Reference Guide for your employer in three parts over Weeks Two, Three, and Four.
How enciphering of connections would affect thumbprinting : If the connection contents were enciphered using a link encipherment protocol, would thumbprinting work? Why or why not?
Create an uml sequence diagram explaining the addition : The firms involved in the financing, parts suppliers, manufacturing hardware suppliers, design consultants, and the labor unions want to see a uml sequence diagram explaining the addition.

Reviews

Write a Review

Computer Networking Questions & Answers

  Ipv6 transition technology

What record must be added to a DNS zone file to alias a host to another name? Complete this sentence with an appropriate phrase or follow-on sentence.

  The university has recently leased a building in adelphi

the university has recently leased a building in adelphi maryland.nbsp the building will house some offices classrooms

  Protocol and network switching device use for the wireless

Explain which protocol and network switching device(s) you would use for the five computers on the LAN and for the wireless access?

  At the end of the report there must be a section for works

each student will choose one topic either from the following list or something they have a particular interest in.

  One-way to solidify the concepts of clientserver computing

one-way to solidify the concepts of clientserver computing and interprocess communication is to develop the

  Relevant remote access applications

For this assignment, submit your initial post addressing the topics below. Continue to follow your classmates' posts for the remainder of the week and post at least one to two follow-up messages to your classmates' posts prior to midnight ET on Su..

  Explain get nearest server request from client

Each of network segments has at least one NetWare server on it. Which of the given replies to Get Nearest Server (GNS) request from client?

  The osi models layered approach to networking has many

the osi models layered approach to networking has many advantages. describe some of the advantages that it brings to

  Data gathering from rfc of udp protocol

data gathering from RFC of UDP protocol for these Quality Models

  Using the web search for software firewalls examine the

using the web search for software firewalls. examine the various alternatives available and compare their

  Database connectivity methods

Database solutions today must be able to adapt and integrate among various computing applications. Determine at least three forms of database connectivity methods that can be used as an interface between applications.

  Provide an information security assessment

Provide an Information Security assessment on your chosen provider using the techniques proposed by Ramgovind et al, and the ASD Cloud Computing Security Considerations as your primary references. This assessment should be no m..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd