Parallelism based on granularity size-granularity, Computer Engineering

Assignment Help:

Parallelism based on Granularity size

Granularity:  Granularity or Grain size is a determine which measure how much computation is devoted in a process.Granularity size is determined by counting the number of instructions in a program section. The following types of grain sizes have been recognized (shown in Figure):

                                        2282_Parallelism based on Granularity size-Granularity.png

 1)   Fine Grain: This type includes approximately less than 20 instructions.

2)   Medium Grain: This type includes approximately less than 500 instructions.

3)   Coarse Grain: This type includes approximately greater than or identical to one thousand instructions.

Based on these Granularity sizes, parallelism can be specified at various stages in a program. These parallelism stages form a hierarchy according to which, lower the level, the greater is the granularity of the process. The degree of parallelism reduces with increase in level. Every stages according to a granularity size demands scheduling and communication overhead. Following are the parallelism levels (shown in Figure ):

                                     788_Parallelism based on Granularity size-Granularity 1.png


Related Discussions:- Parallelism based on granularity size-granularity

Explain how someone refine the ratio analysis, Refining the Ratio Analysis ...

Refining the Ratio Analysis Basically, refinement leads to purity. Thus to get a cleaner, more understandable and consistent design need to iterate analysis process.  R

Invoke on the dataadapter control, Which method do you invoke on the DataAd...

Which method do you invoke on the DataAdapter control to load  your generated dataset with data? DataAdapter.Fill(ds). The beauty of this method is it automatically implicitly

Research methods, Building on their knowledge of research methods and their...

Building on their knowledge of research methods and their interest in a particular aspect of information technology this assessment enables students to put this knowledge into prac

Sql injection, SQL Injection includes entering SQL code into web forms, eg....

SQL Injection includes entering SQL code into web forms, eg. login fields, or into the browser address field, to access and manipulate the database across the site, application or

Fingerprint- biometric computer security systems, Fingerprint- Biometric co...

Fingerprint- Biometric computer security systems First of all, fingerprint is the most commonly used biometric technology, because every person has unique fingerprints and the

C token, describe briefly about the c token with suitable example program

describe briefly about the c token with suitable example program

Software engineering, what is modular system ? list important properties of...

what is modular system ? list important properties of modular system

What do you mean by e-cash, What do you mean by E-cash? E-Cash and it...

What do you mean by E-cash? E-Cash and its Properties:  Ecash is cash which is represented by two models. One is the on-line form of e-cash which allows for the completi

Hard and soft real time systems, Q. Hard and Soft Real Time Systems? ...

Q. Hard and Soft Real Time Systems? Hard Real Time Systems that guarantee critical tasks are completed on time. Soft Real Time Systems that are less restrictive type o

How is a multidimensional array defined pointer, How is a multidimensional ...

How is a multidimensional array defined in terms of a pointer to a collection of contiguous arrays of lower dimensionality ? C does not have true multidimensional arrays. Howev

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd