Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Amdahl's law is suitable for applications where response time is critical. On the other hand, there are a lot of applications which need that accuracy of the resultant output should be high. In the current situation, the computing power has increased substantially due to increase in number of processors attached to a parallel computer. Therefore it is possible to increase the size of the problem i.e., the workload can be enlarged. How does this operate? Gustafson's Law relaxed the restriction of fixed size of difficulty and aimed at using the notion of constant implementation time in order to overcome the sequential bottleneck encountered in Amdahl's Law. This situation which does not suppose a fixed workload is analyzed by Gustafson. Therefore, Gustafson's Law suppose that the workload may increase substantially, with the number of processors but the whole implementation time should remain the similar as highlighted in Figures shown below.
Number of Processors
Parallel Load Increases for Gustafson's Law
According to Gustafson's Law, if the amount of parallel operations for a problem increases sufficiently, then the sequential operations will no longer be a bottleneck.
Q. Era of first generation computers? The trends that were encountered at the time of the era of first generation computers were: Centralized control in a single CPU (al
Multiple Instruction and Single Data stream (MISD): In this type of organization multiple processing elements are ordered under the control of multiple control units. Every contro
Hard disk Architecture: A hard disk drive having the platters and motor hub removed indicating the copper colored stator coils surrounding a bearing at the cen
Real Life Business Subsystems A Subsystem is a component of a System even though it can also be described as a system in its own right. Consider a manufacturing firm. It compr
Explain the use of SSL to secure the network. SSL (Secure Sockets Layer) is a protocol developed by Netscape for transferring private documents by the Internet. SSL works by u
Determine the types of Sensors Different types of sensors are used to give real time information to computers. Frequently, an analogue to digital converter (ADC) is required a
Q. Why are binary, octal and hexadecimal used for computer applications? Q. Perform the following: (189.3) 10 = (?) 2
what is hashing
er table for hospital management system
Define addressing modes. The dissimilar ways in which the location of an operand is specified in an instruction are referred to as addressing modes.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd