Example on cyclic distribution of data, Computer Engineering

Assignment Help:

Q. Example on Cyclic Distribution of data?

!HPF$ PROCESSORS P1(4)

!HPF$ TEMPLATE T1(18)

!HPF$ DISTRIBUTE T1(CYCLIC) ONTO P1

The result of these instructions is displayed in Figure below.

671_Example on Cyclic Distribution of data.png

Figure: Cyclic Distribution

However in an analogous alternative of cyclic distribution

!HPF$ DISTRIBUTE T1 (BLOCK (3)) ONTO P1

919_Example on Cyclic Distribution of data1.png

Figure: Variation of Cyclic Distribution

It covers case where both template and processor are one dimensional. When the and processor have (same) higher dimension every dimension is able to be distributed separately mixing any of four distribution formats. The correspondence between template and processor dimension is the obvious one. In! HPF$ PROCESSORS P2 (4, 3)

!HPF$ TEMPLATE T2 (17, 20)

!HPF$ DISTRIBUTE T2 (CYCLIC, BLOCK) ONTO P2

The first dimension of T2 is distributed cyclically over first dimension of P2 the second dimension is distributed block wise over second dimension of P2. 

(c) * Distribution

Some dimensions of a template can have 'collapsed distributions' allowing a template to be distributed on a processor arrangement with fewer dimensions than the template.


Related Discussions:- Example on cyclic distribution of data

The functions islower() and tolower(), Distinguish among the functions islo...

Distinguish among the functions islower() and tolower().   islower( ) and tolower( ): islower(c) is a character testing function described  in ctype.h header file. This

What is source and listener, A source is an object that produces an event. ...

A source is an object that produces an event. This happens when the internal state of that object changes in some way. A listener is an object that is notified when an event happen

Pruning - artificial intelligence, Pruning - Artificial intelligence Re...

Pruning - Artificial intelligence Remember that pruning a search space means deciding that particular branches should not be explored. If an agent  surly  knows that exploring

List the key notions concerning macro expansion, List the key notions conce...

List the key notions concerning macro expansion. Two key notions relating to macro expansion is: 1. Expansion time control flow- Determines the order of model statements tha

The major underlying concepts of object orientation, Objects, messages, cla...

Objects, messages, class, inheritance and polymorphism are the major concepts of object orientation.

Interactive computer graphics.., graphical adapters and input methods in co...

graphical adapters and input methods in computer graphics

Bubbling the pipeline - computer architecture, Bubbling the Pipeline: B...

Bubbling the Pipeline: Bubbling the pipeline (also known as a pipeline break or pipeline stall) is a technique for preventing, structural, data and branch hazards from taking p

Perfect fundamental logic - artificial intelligence, Perfect fundamental lo...

Perfect fundamental logic - artificial intelligence: However, while it's theoretically  possible to do definite intelligent things (like prove some easy mathematics theorems a

Variables and quantifiers for first-order models , Variables and Quantifier...

Variables and Quantifiers for First-order models -artificial intelligence: So what do sentences containing variables mean? In other words, how does first order model select whe

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd