Communication-Load Impact on the Performance of Processor Allocation Strategies in 2-D Mesh Multicomputer Systems
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 3
Abstract
A number of processor allocation strategies have been proposed in literature. A key performance factor that can highlight the difference between these strategies is the amount of communication conducted between the parallel jobs to be allocated. This paper aims to identifying how the density and pattern of communication can affect the performance of these strategies. Compared to the work already presented in literature, we examined a wider range of communication patterns. Other works consider only two types of communication patterns; those are the one-to-all and all-to-all patterns. This paper used the C language to implement the different allocation strategies, and then combined them with the ProcSimity simulation tool. The processor-allocation strategies are examined under the First-Come-First-Serve scheduling strategy. Results show that communication pattern and load are effective factors that have a significant impact on the performance of the processor allocation strategy used.
Authors and Affiliations
Zaid Mustafa, J. Alshaer, O. Dorgham, S. Bani-Ahmad
Improved QoS for Multimedia Transmission using Buffer Management in Wireless Sensor Network
Wireless Sensor Network (WSN) diverts the attention of the research community as it is easy to deploy, self-maintained and does not require predefine infrastructure. These networks are commonly used to broadcast multimed...
Genetic algorithms to optimize base station sitting in WCDMA networks
In UMTS network, radio planning cannot only be based on signal predictions, but it must also consider the traffic distribution, the power control mechanism as well as the power limits and the signal quality constraints....
Software Components’ Coupling Detection for Software Reusability
Most of the software systems design and modeling techniques concentrates on capturing the functional aspects that comprise a system’s architecture. Non-functional aspects are rarely considered on most of the software sys...
An Immunity-based Error Containment Algorithm for Database Intrusion Response Systems
The immune system has received a special attention as a potential source of inspiration for innovative approaches to solve database security issues and build artificial immune systems. Database security issues need to be...
A Privacy-Preserving Roaming Authentication Scheme for Ubiquitous Networks
A privacy-preserving roaming authentication scheme (PPRAS) for ubiquitous networks is proposed, in which a remote mobile user can obtain the service offered by a foreign agent after being authenticated. In order to prote...