Parallel Models
Different ways to exploit parallelism
Parallel Models Different ways to exploit parallelism Outline - - PowerPoint PPT Presentation
Parallel Models Different ways to exploit parallelism Outline Shared-Variables Parallelism threads shared-memory architectures Message-Passing Parallelism processes distributed-memory architectures Practicalities
Different ways to exploit parallelism
Threads-based parallelism
my data
my data
PC PC PC
Private data Private data Private data
Shared data Thread 1 Thread 2 Thread 3 6
loop: i = istart,istop myasum += a[i] end loop asum asum=0
Memory
Processor
Shared Bus
Processor Processor Processor Processor
10
11
12
process
13
Process-based parallelism
asynchronous
has started to be received
message has gone
must wait until the message arrives 19
20
received. 21
22
groups of processes is required
implemented separately, for efficiency 23
24
25
0 1 2 3 4 5 1 3 4 5 2
26
0 1 2 3 4 5 1 3 4 5 2
27
Strik ike? e?
28
1 3 4 5 2 15
29
distributed-memory
processor-core
the interconnect, between nodes/OS’s
Processor Processor Processor Processor Processor Processor Processor Processor
Interconnect
nodes
machine?
cores on the same node are fast
to the network
Interconnect
programs run by a special job launcher
allocation to nodes