Explain the term granularity, Computer Engineering

Assignment Help:

Granularity

Granularity refers to the quantity of computation done in concurrent relative to the size of whole program. In concurrent computing, granularity is a qualitative measure of the ratio of calculation to communication.  According to granularity of a system, parallel processing systems may be splitted in two groups: coarse-grain systems and fine-grain systems. In fine-grained systems, parallel parts are relatively small, that means more frequent communication. They have low calculation to communication ratio and need high communication overhead.  In coarse grained systems concurrent parts are relatively large, that means more calculation and less communication. If granularity is also fine, it is possible that the overhead needed for communications and synchronization between tasks takes longer than computation. On the other side, in coarse-grain parallel systems, relatively greater amount of computational work is done. They have high computation to communication ratio as well as imply more chance for performance increase.

The degree of granularity in a system is determined by algorithm applied in addition the hardware surroundings in which this runs. On an architecturally impartial system, the granularity affects the performance of resultant program. The communication of data needed to begin a large process can take a substantial amount of time. Conversely, a large process will frequently have less communication to do for the duration of processing. A process might need only a small quantity of data to get going, but may require receiving more data to carry on processing, or may require to do lots of communication with other processes so as to perform its processing. In main cases the overhead linked with communications and synchronization is high relative to implementation speed so it's advantageous to have coarse granularity. 

 


Related Discussions:- Explain the term granularity

Give explanation about the use of SSL to secure the network, Give explanati...

Give explanation about the use of SSL to secure the network. SS L stands for Secure Sockets Layer is a protocol developed through Netscape for transmitting private document

Doubly linked list than by singly linked list, Which operations is performe...

Which operations is performed more efficiently by doubly linked list than by singly linked list Deleting a node whose location is given.

Smtp vs esmtp, what shortcomings of smtp are over come by esmtp?

what shortcomings of smtp are over come by esmtp?

What is the gray equivalent of decimal number 25, What is the Gray equivale...

What is the Gray equivalent of  (25) 10 Ans. Gray equivalent of (25) 10 : The Decimal number 25 has binary equivalent as (00100101) 2 The left most bits (MSB) into gray

Define the register addressing mode, Q. Define the Register Addressing mode...

Q. Define the Register Addressing mode? When operands are taken from registers implicitly or explicitly it is known as register addressing. These operands are termed as regis

Explain the process of inter-register signalling, Explain the process of in...

Explain the process of inter-register signalling. Registers are utilized in common control exchanges to store and analyze routing data. They are given on a common basis is a

Illustrate about fourth generation computers, Q. Illustrate about fourth ge...

Q. Illustrate about fourth generation computers? One of the main milestones in IC technology is Very large scale integration (VLSI) where thousands of transistors can be integr

Features of hyper-threading, The salient features of hyper threading are: ...

The salient features of hyper threading are: i)  Improved support for multi-threaded code, permitting multiple threads to run concurrently. ii) Response time and improved rea

What are program-invisible registers, What are program-invisible registers?...

What are program-invisible registers? Ans: the local and global descriptor tables are found in the memory system. To access and specify the address of these tables, program inv

Recursive binary search, The implementation of a (non-recursive) binary sea...

The implementation of a (non-recursive) binary search of an array. The assumption is that a given array is sorted. We want to see if a particular value, that we'll call the target

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd