Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Assignment: Introduction to High Performance Computing

1. Answer the following questions

i. Try to write pseudo-code for the tree-structured global sum illustrated in Figure 1. Assume the number of cores is a power of two (1, 2, 4, 8, . . . ).

2214_Multiple cores forming a global sum.jpg
FIGURE 1: Multiple cores forming a global sum

Hints: Use a variable divisor to determine whether a core should send its sum or receive and add. The divisor should start with the value 2 and be doubled after each iteration. Also use a variable core difference to determine which core should be partnered with the current core. It should start with the value 1 and also be doubled after each iteration. For example, in the ?rst iteration 0 % divisor = 0 and 1 % divisor = 1, so 0 receives and adds, while 1 sends. Also in the ?rst iteration 0 + core difference = 1 and 1 core difference = 0, so 0 and 1 are paired in the ?rst iteration.

ii. As an alternative to the approach outlined in the preceding problem, we can use C's bitwise operators to implement the tree-structured global sum. In order to see how this works, it helps to write down the binary (base 2) representation of each of the core ranks, and note the pairings during each stage:

Cores

Stages

1

2

3

010 = 0002

110 = 0012

210 = 0102

410 = 1002

110 = 0012

010 = 0002

X

x

210 = 0102

310 = 0112

010 = 0002

x

310 = 0112

210 = 0102

X

x

410 = 1002

510 = 1012

610 = 1102

010 = 0002

510 = 1012

410 = 1002

X

x

610 = 1102

710 = 1112

410 = 1002

x

710 = 1112

610 = 1102

x

x

From the table we see that during the ?rst stage each core is paired with the core whose rank differs in the rightmost or ?rst bit. During the second stage cores that continue are paired with the core whose rank differs in the second bit, and during the third stage cores are paired with the core whose rank differs in the third bit. Thus, if we have a binary value bitmask that is 0012 for the ?rst stage, 0102 for the second, and 1002 for the third, we can get the rank of the core we're paired with by "inverting" the bit in our rank that is nonzero in bitmask. This can be done using the bitwise exclusive or ^ operator.

Implement this algorithm in pseudo-code using the bitwise exclusive or and the left-shift operator.

iii. What happens if your pseudo-code in problem i or ii is run when the number of cores is not a power of two (e.g., 3, 5, 6, 7)? Can you modify the pseudo-code so that it will work correctly regardless of the number of cores?

iv. Suppose the faculty are going to have a party for the students in the department.

a. Identify tasks that can be assigned to the faculty members that will allow them to use task-parallelism when they prepare for the party. Work out a schedule that shows when the various tasks can be performed.

b. We might hope that one of the tasks in the preceding part is cleaning the house where the party will be held. How can we use data-parallelism to partition the work of cleaning the house among the faculty?

c. Use a combination of task- and data-parallelism to prepare for the party. (If there's too much work for the faculty, you can use TAs to pick up the slack.)

2. Write a research paper on High Performance Computing. Address the items given below:

a. How can you use High Performance Computing in your research or life? Give two examples.

b. Why do we need to write parallel programs? (read pages 1-3 from your book)

c. Discuss the local and global impact of high performance computing on individuals, organizations, and society.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92717343
  • Price:- $45

Priced at Now at $45, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Listen to or read the transcript of this podcast

Listen to (or read the transcript of) this podcast (https://www.stlouisfed.org/education/economic-lowdown-podcast-series/episode-16-elasticity-of-demand) from the Federal Reserve Bank of St. Louis. describe your experien ...

A 200g sample of acetylsalicylic acid better known

A 2.00g sample of acetylsalicylic acid, better known asaspirin, is dissolved in 100mL of water and titrated with 0.200mol/L NaOH(aq) to the end point. The volume of base required is 55.5mL. Calculate the molar mass of ac ...

Subject digital securitybesides legal factors what are

Subject : Digital Security Besides legal factors, what are some of other important factors that need to be seriously considered when the cloud computing and service company(assuming) you work for decides to extend busine ...

Find example that shows ideas can have big consequences in

Find example that shows ideas can have big consequences in the world. Describe the problem and how the idea helped to solve the problem. Include references

Question after reading this chapter you should now be

Question : After reading this chapter, you should now be familiar with the "Fun" part of Java utilizing the GUI. The GUI offers all kinds of functionality in the graphical sence. Why do you think Java and Javas GUI are s ...

Question suppose that you were creating a new global

Question : Suppose that you were creating a new global organization. The new organization will provide Information Technology (IT) infrastructure consulting services, computer security consulting services, and cloud comp ...

With respect to the needham-schroeder 0v0ap authentication

With respect to the Needham-Schroeder (0V0AP) authentication protocol, assume that a client (point A in the 0V0AP description) is holding the wrong key Describe in PRECISE terms (in terms of the contents of the packets t ...

An inhaled anesthetic of formula c2hbrclf3 is unusual in

An inhaled anesthetic of formula C2HBrClF3 is unusual in that it contains three different halogen atoms but no oxygen. What is its pressure in atmospheres at 27°C if its density is 0.187 g/L at that temperature?

Question what are the server-side attacks what are the

Question : What are the server-side attacks? What are the techniques a developer can employ to minimize these attacks? The response must be typed, single spaced, must be in times new roman font (size 12) and must follow ...

Single purpose processorsdesign the sequence recognizer for

Single Purpose Processors Design the sequence recognizer for 101 . Perform the following steps: - the state diagram -the state table -K-map -Simplification of the function by using the K-map -Circuit (logic diagram).

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As