Professional Documents
Culture Documents
Pyramids Archtichture
Pyramids Archtichture
Agenda
Introduction to Pyramid Architecture. Pyramid Properties. Two level Pyramid. Advantages. Pyramid Computer. Lower Bounds. Fundamental Algorithms.
1/18/2012 2
1/18/2012
1/18/2012
Pyramid Properties
There are five nodes in the building block of the pyramid. The node on the top is called the parent of the four lowerlevel child nodes. Each parent can have only four children, and all the children are connected in a mesh. Each level of a pyramid is a mesh, and the bottom level or the level with maximum nodes (2n X 2n ) is called the base level. The ratio of nodes in a lower level to the node(s) in the adjacent upper level is 4:1. The topmost level ( level 0) is called the apex of the pyramid, and it has only one node (20 X 20 = 1 )
1/18/2012
1/18/2012
1/18/2012
Advantages
The offers several advantages when you build a pyramid. The concurrent DMA and CPU operations over the links reduce communication overhead for large amounts of data. The apex node has two free links that can be used for data I/O. Also, the children can pass data among themselves without slowing down the parent nodes. This is an advantage in image processing, where data decomposition and task scheduling are common.
1/18/2012 9
Pyramid Computer
A pyramid computer (pyramid) of size n is a machine that can be viewed as a full, rooted, 4-ary tree of height log n, with additional horizontal links so that each horizontal level is a mesh. It is often convenient to view the pyramid as a tapering array of meshes. A pyramid of size n has at its base a mesh of size n, and a total of (4/3 *n -1/3) processors. One advantage of the pyramid over the mesh is that the communication diameter of a pyramid computer of size n is only Q(log n). This is true since any two processors in the pyramid can exchange information through the apex
1/18/2012 10
Lower Bounds
A pyramid computer of size n has a communication diameter of Q(log n) Any two processors can exchange messages in O(log n) time, by communicating via the apex, and some pairs of processors, such as those at opposite corners of the base mesh, require W(log n) time to exchange messages. This gives a worst-case lower bound of W(log n) time on any problem that may require information to be exchanged between arbitrary processors.
1/18/2012 13
Fundamental Algorithms
Initializing Identity Registers. Bit Counting Problems. Computing Commutative Associative Binary Functions. Point Queries.
1/18/2012
14
1/18/2012
15
1/18/2012
16
1/18/2012
17
1/18/2012
18
n, the apex knows the total number of black pixels in the entire base. Since each of the log4n stages requires constant computation time, the algorithm runs in Q (log4n) time.
1/18/2012
20
1/18/2012
21