Skip to main content

Parallel Processors

Computer architecture parallelism is explained with task-level parallelism and is also called process-level parallelism. Task-level parallelism is “utilizing multiple processors by running independent programs simultaneously” (Patterson & Hennessy, 2014, sect. 6.1). The overall goal of computer architecture parallelism is better performance and better energy efficiency. The basic purpose of a multiprocessor is to speed up how many instructions it can completed within a clock cycle. According to Patterson and Hennessy (2014) the difficulty lies with writing correct programs to take full advantage multiprocessing. When programs are not written correctly it is similar to using instruction level parallelism with a uniprocessor. 

To increase the speed of a multiprocessor, three things must be achieved. Strong scaling, weak scaling, and load balancing. Strong scaling is speeding up the multiprocessor while not making the instruction larger, and weak scaling is increasing the size of the instruction to be proportional to the size of the multiprocessor (Patterson & Hennessy, 2014). Strong scaling is used to complete programs that take a long time to complete. The example our textbook uses the process of completing an ATM transaction. Strong scaling would be used to assist a customer’s transaction in thirty seconds instead of two minutes. Weak scaling is the opposite, it is used to complete larger more complex instructions. The third method, load balancing, is giving each processor an equal amount of work to do so that it improves efficiency and performance. 

A GPU or graphic processing unit gained popularity with gaming consoles and computer gaming. GPUs can also be used mine crypto currency. The two characteristics of how GPUs differ from CPUs are that GPUs “are accelerators that supplement the CPU” and a GPUs “problems sizes are typically hundreds of megabytes to gigabytes, but not hundreds of gigabytes to terabytes” (Patterson & Hennessy, 2014, sect. 6.6). Because a GPU supplements a CPU, it does not need to do the same things a CPU does so it can focus solely on what it needs to get done, which is graphics.


References 

Patterson, D. A., & Hennessy, J. L. (2014). Computer organization and design: The hardware/software interface (5th ed.). Retrieved from https://zybooks.zyante.com/  

Soloman, D. A., Russinovich, M. E., & Ionescu, A. (2007). Windows Internals. Retrieved 9 December, 2021, from https://books.google.com/books



Comments

Popular posts from this blog

Peering Points and the Network Application Interface

According to Gibb (2019), “Peering is a method that allows two networks to connect and exchange traffic directly without having to pay a third party to carry traffic across the Internet.” Utilizing a peering point allows users to send a receive data directly to one another without the need to route through other computer networks. Doing so allows for a quicker, more efficient, and safer form of communication.  Researching the total number of active Internet Exchange Points (IXP) proved difficult as it was hard to pinpoint an accurate number. However, according to Rosas (2021), “as of January 2021, of the 630 registered IXPs, 229 are in Europe, 126 in North America, 140 in Asia-Pacific, 96 in Latin America and the Caribbean (LAC), and 39 in Africa.” These numbers are constantly changing as new IXPs are added, and some are removed.  Finding a definitive number of Internet Service Providers (ISP) globally was also difficult to accomplish. Most sources seem to point to the Nations Encyclop

VLAN Aggregation for Efficient IP Address Allocation

The project I chose to summarize on the Internet Engineering Task Force (IETF) website was RFC: 3069, VLAN Aggregation for Efficient IP Address Allocation. Within this project, the authors point out how inefficiently a Virtual Local Area Network (VLAN) allocates IP addresses along with their proposed solutions. I have also attached a diagram showing how the network would look pertaining to this project. Currently, an IP subnet would be made for each existing customer by understanding how many hosts they currently need and may need in the future. Based on that total number, the IP subnet and gateway address would change according to how many hosts the customer requested. For example, if a customer has indicated that they need ten hosts, and they only use five, the additional five that are not in use cannot be used by another customer. An illustration of this is shown below. The proposed solution to this problem is to allocate IP addresses under the same IP subnet and gateway address uti

Access Lists and Capabilities

To implement an access matrix, we must first understand what it is. An access matrix is a protection model within an operating system consisting of objects and domains. The access matrix determines which processes interact with objects within the domain. Objects within the domain can consist of both hardware and software. The lists below show the advantages and disadvantages of access lists associated with objects, and capabilities with domains.  Access lists associated with objects Advantages  Corresponds directly to the user’s needs.  Easy revocation and review of access.  Disadvantages  Difficult to determine access rights for a domain.  Takes time to search the domain for access rights.  Capabilities with domains Advantages  Useful for localizing information for a process.  Secured against unauthorized access.  Disadvantages  Inefficient at the revocation of capabilities.  Does not correspond directly to the user’s needs.  Even though each implementation has its own strengths and w