Identify tasks that can be assigned to the faculty members

Assignment Help Computer Engineering
Reference no: EM131888996

Assignment: Introduction to High Performance Computing

1. Answer the following questions

i. Try to write pseudo-code for the tree-structured global sum illustrated in Figure 1. Assume the number of cores is a power of two (1, 2, 4, 8, . . . ).

2214_Multiple cores forming a global sum.jpg
FIGURE 1: Multiple cores forming a global sum

Hints: Use a variable divisor to determine whether a core should send its sum or receive and add. The divisor should start with the value 2 and be doubled after each iteration. Also use a variable core difference to determine which core should be partnered with the current core. It should start with the value 1 and also be doubled after each iteration. For example, in the ?rst iteration 0 % divisor = 0 and 1 % divisor = 1, so 0 receives and adds, while 1 sends. Also in the ?rst iteration 0 + core difference = 1 and 1 core difference = 0, so 0 and 1 are paired in the ?rst iteration.

ii. As an alternative to the approach outlined in the preceding problem, we can use C's bitwise operators to implement the tree-structured global sum. In order to see how this works, it helps to write down the binary (base 2) representation of each of the core ranks, and note the pairings during each stage:

Cores

Stages

1

2

3

010 = 0002

110 = 0012

210 = 0102

410 = 1002

110 = 0012

010 = 0002

X

x

210 = 0102

310 = 0112

010 = 0002

x

310 = 0112

210 = 0102

X

x

410 = 1002

510 = 1012

610 = 1102

010 = 0002

510 = 1012

410 = 1002

X

x

610 = 1102

710 = 1112

410 = 1002

x

710 = 1112

610 = 1102

x

x

From the table we see that during the ?rst stage each core is paired with the core whose rank differs in the rightmost or ?rst bit. During the second stage cores that continue are paired with the core whose rank differs in the second bit, and during the third stage cores are paired with the core whose rank differs in the third bit. Thus, if we have a binary value bitmask that is 0012 for the ?rst stage, 0102 for the second, and 1002 for the third, we can get the rank of the core we're paired with by "inverting" the bit in our rank that is nonzero in bitmask. This can be done using the bitwise exclusive or ^ operator.

Implement this algorithm in pseudo-code using the bitwise exclusive or and the left-shift operator.

iii. What happens if your pseudo-code in problem i or ii is run when the number of cores is not a power of two (e.g., 3, 5, 6, 7)? Can you modify the pseudo-code so that it will work correctly regardless of the number of cores?

iv. Suppose the faculty are going to have a party for the students in the department.

a. Identify tasks that can be assigned to the faculty members that will allow them to use task-parallelism when they prepare for the party. Work out a schedule that shows when the various tasks can be performed.

b. We might hope that one of the tasks in the preceding part is cleaning the house where the party will be held. How can we use data-parallelism to partition the work of cleaning the house among the faculty?

c. Use a combination of task- and data-parallelism to prepare for the party. (If there's too much work for the faculty, you can use TAs to pick up the slack.)

2. Write a research paper on High Performance Computing. Address the items given below:

a. How can you use High Performance Computing in your research or life? Give two examples.

b. Why do we need to write parallel programs? (read pages 1-3 from your book)

c. Discuss the local and global impact of high performance computing on individuals, organizations, and society.

Reference no: EM131888996

Questions Cloud

Talk about the technical issues of migrating : Talk about the technical issues of migrating from IPv4 to IPv6 and how can the smooth transition be done - research and developyour arguments
Determining the thermochemical equations : Consider the following thermochemical equations.
Analyze the intended impact of environmental health laws : What is the role of various government agencies that are charged with enforcing and evaluating the impact of the law?
Total mass of solids remaining : What is the extent of reaction, ?, when the total mass of solids remaining (KClO3 plus KCl) is 5.52 g?
Identify tasks that can be assigned to the faculty members : Identify tasks that can be assigned to the faculty members that will allow them to use task-parallelism when they prepare for the party.
What is the standard enthalpy of formation : For the reaction below, ?rH° = -3307.9 kJ mol-1. What is the standard enthalpy of formation of FeS2(s)?
What determines the toxicity of a chemical : Examines how environmental exposures to chemical pollutants may present risks to biological organisms, particularly animals, birds, and fishes.
Condensed to the liquid at the normal boiling point : How much heat energy, as kJ, is released when 10.0 g of benzene gas at 95.0 degrees Celsius are condensed to the liquid at the normal boiling point
What are the other ways to prevent future occurrences : What are the steps that could have been taken to prevent the adverse health outcomes from occurring?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Summarize the last section in the given chapter

Read chapter 4 in Computer Science: An Overview and note especially section 4.5 on Security. Create a 1 page document which will summarize the last section in the chapter on "Legal Approaches to Network Security."

  How the actor-critic control method could be combined

Describe how the actor-critic control method could be combined with gradient-descent function approximation.

  What security issues should be resolved now which cannot

question 1 what security issues must be resolved now which cannot wait for the next version of windows to arrive? are

  Compute the inverse of a nonsingular upper triangular matrix

Note that by solving the multiple right-hand-side problem TX = B with B = J, then the solution is the inverse of T. Write a MATLAB function X = UTriInv(U).

  What different kinds of data will the system use

Does it have characteristics of more than one? What different kinds of data will this system use? On the basis of your answers, what kind of data storage format(s) do you recommend for this system?

  What is the monetary unit sampling

For each of the following independent situations, indicate the advantages and disadvantages of MUS and classical variables sampling.

  Perform a swot analysis on the viability of upgrading to

you are a junior network administrator for wingtip toys a medium-sized toy manufacturing company with approximately 100

  Determine the time resolution

Assume that a speech signal has been sampled at 8000 Hz and then analyzed with MATLAB specgram function using the following parameters.

  What is bobs private key xb and alices private key

What is Bob's private key XB and Alice's private key XA? What is their secret combinedkey?

  Questionq1 assume that the ith operation on a data

questionq1 assume that the ith operation on a data structure takes thetaui time where ui is the number of units in the

  Suppose that you are a cio of a startup company the company

imagine you are starting a web business and want to incorporate cloud technology. describe how you would

  Implement value iteration for the gamblers problem

Implement value iteration for the gambler's problem and solve it for p = .25 and p = .55. Are your results stable as ? ? 0.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd