Parallelism based on granularity size-granularity, Computer Engineering

Assignment Help:

Parallelism based on Granularity size

Granularity:  Granularity or Grain size is a determine which measure how much computation is devoted in a process.Granularity size is determined by counting the number of instructions in a program section. The following types of grain sizes have been recognized (shown in Figure):

                                        2282_Parallelism based on Granularity size-Granularity.png

 1)   Fine Grain: This type includes approximately less than 20 instructions.

2)   Medium Grain: This type includes approximately less than 500 instructions.

3)   Coarse Grain: This type includes approximately greater than or identical to one thousand instructions.

Based on these Granularity sizes, parallelism can be specified at various stages in a program. These parallelism stages form a hierarchy according to which, lower the level, the greater is the granularity of the process. The degree of parallelism reduces with increase in level. Every stages according to a granularity size demands scheduling and communication overhead. Following are the parallelism levels (shown in Figure ):

                                     788_Parallelism based on Granularity size-Granularity 1.png


Related Discussions:- Parallelism based on granularity size-granularity

What are the exceptions encountered for fp operation, What are the exceptio...

What are the exceptions encountered for FP operation? The exceptions encountered for FP operation are overflow, underflow. /0, inexact and invalid values.

Clustering-coefficient- artificial intelligence, This programming assignmen...

This programming assignment is about computing topological properties of Protein-Protein Interaction (PPI) networks. Recall that a PPI network is represented by a graph G=(V,E) whe

Neural architectures, Neural architectures are appealing as mechanisms for...

Neural architectures are appealing as mechanisms for implementing intelligence for a number of reasons. Traditional AI programs tend to be brittle and overly sensitive to noise

Two methods of copying a information document, There are basically two meth...

There are basically two methods of copying: Photocopying This is a modified development of photography. It is quite expensive and slow and is not often used for routine rep

State the various security tools, State the various Security Tools Sec...

State the various Security Tools Securing an Intranet is not a simple task. Just as articles in a house are protected by use of various types of security systems such as lock

Define the thread libraries, Q. Define the Thread libraries? The most d...

Q. Define the Thread libraries? The most distinctive representatives of shared memory programming models are thread libraries present in most of modern operating systems. Illus

Decision Tree - ID3 algorithm:, . weather (windy, rainy or sunny) 2. how...

. weather (windy, rainy or sunny) 2. how much money you have (rich or poor) 3. whether your parents are visiting (yes or no)

Rule in a single direction - equivalences rules, Rule in a single direction...

Rule in a single direction - equivalences rules: Hence there the power to replace  sub expressions always allows use to prove theorems with equivalences: as given in the above

Temporary registers w and z, Why the temporary registers W and Z are named ...

Why the temporary registers W and Z are named so I mean we start from A,B,C,D,E then H and L coz H stands for higher bit nd L for lower bit of the address pointed by memory pointer

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd