Gustafsons law, Computer Engineering

Assignment Help:

Amdahl's law is suitable for applications where response time is critical. On the other hand, there are a lot of applications which need that accuracy of the resultant output should be high. In the current situation, the computing power has increased substantially due to increase in number of processors attached to a parallel computer. Therefore it is possible to increase the size of the problem i.e., the workload can be enlarged. How does this operate? Gustafson's Law relaxed the restriction of fixed size of difficulty and aimed at using the notion of constant implementation time in order to overcome the sequential bottleneck encountered in Amdahl's Law. This situation which does not suppose a fixed workload is analyzed by Gustafson. Therefore, Gustafson's Law suppose that the workload may increase substantially, with the number of processors but the whole implementation time should remain the similar as highlighted in Figures shown below.

2343_Gustafsons Law.png

Number of Processors

Parallel Load Increases for Gustafson's Law

 According to Gustafson's Law, if the amount of parallel operations for a problem increases sufficiently, then the sequential operations will no longer be a bottleneck.


Related Discussions:- Gustafsons law

Give difference between assembler and compiler, Give difference between ass...

Give difference between assembler and compiler. Assembler: It is the translator for an assembly language of computer. An assembly language is a low-level programming language

Explain lan topologies, Explain LAN Topologies and its basic topologies. ...

Explain LAN Topologies and its basic topologies. LAN Topologies: Network topology is a physical schematic that shows interconnection of the various users. There are four fund

Define memory management system, Define memory management system? The p...

Define memory management system? The part of the computer system that supervises the flow of information among auxiliary memory and main memory is known as memory management sy

Discuss about constrained-random verification methodology, Discuss about Co...

Discuss about Constrained-Random Verification Methodology Advent  of  constrained-random  verification  gives  verification  engineers  an  effective  method  to achieve covera

Texture - elements of composition, Texture Texture is how artists show...

Texture Texture is how artists show what an object would feel like to touch. This can have a dramatic effect on how an image is perceived. Imagine for instance an image that h

The components of i-way infrastructure, What are the components of I-way In...

What are the components of I-way Infrastructure? There are three mechanism of the I-way infrastructure: Consumer access equipment Local on-Ramps Global informa

Minimum total number of shelv, Write a program that finds the minimum total...

Write a program that finds the minimum total number of shelv, C/C++ Programming

Define memory allocation scheme in ''external'' fragmentation, The memory a...

The memory allocation scheme subject to “external” fragmentation is? Segmentation is the memory allocation scheme subject to “external” fragmentation.

Differentiate between protected and real modes of an intel, Differentiate b...

Differentiate between protected and real modes of an Intel microprocessor Operation of Real mode interrupt: When microprocessor completes executing the current instruction, it

Truth tables, Any function can be expressed in a truth table.A truth table ...

Any function can be expressed in a truth table.A truth table lists all possible combinations ofinputs and gives the output produced in eachcase.Truth tables must include all combin

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd