© Distribution of this video is restricted by its owner
Transcript ×
Auto highlight
Font-size
00:01 Okay. No. Okay. So , I will start to talk about

00:19 next programming paradigm, N B This is a chart. Uh the

00:28 kid background two. Well yet another paradigm and then talk uh that's Generally

00:43 today. About 10 PI get some picture stuff. Next time. Talk

00:48 specifics. So um first about clusters what's also known as m p p

01:00 that stands for massively parallel processors of the current there aren't that many around

01:06 goes in waves come and go um point out what the different differences are

01:14 those. But as a part of guess graduate education, which you also

01:20 what employees are. All right. clusters you already use clusters in this

01:30 mostly have used single notes on clusters not. So in that case there's

01:36 difference whether the notice in the cluster just stand there don't think. Um

01:46 the cluster is best to have a your by yourself collection of servers or

01:55 and you will come up by network then you and to call it the

01:59 . And I thought more about specifics clusters I think on the very first

02:05 second lecture, talking about slow rem fastest poster has notes that are at

02:15 the same same type of seed to but sometimes also that's different. The

02:20 difference among the notes and the prostitutes be that that they have different demands

02:26 memory on the notes. However, accelerated from some of the notes such

02:30 depressed for the british customs, you regular members, large memory. Extra

02:38 memory or sense either it's the fourth non jobs. More of this giant

02:44 then there are the deep, you um so I didn't put the picture

02:49 then there is a Also at least typically known as front end. No

02:56 this so on that access the cluster , throw it then the other special

03:04 sizes for cluster management things. But a user you basically see the front

03:10 you log in and transfer your codes it and manager execution from that.

03:18 talk a little bit about how things then connected so and so on and

03:28 otherwise, you know, I'll show some pictures and clusters and semen ever

03:33 just you know, be an abstract the net. Then there's a massively

03:37 processors and GPS and they tend to , they have a more highly integrated

03:43 and talk about the difference for that it says that the differences that that

03:51 to be engineered more for low I invent nothing to connect and the

03:57 of the single system as opposed to systems roman program and I said tested

04:06 the same note. So that's pictures clusters all kinds of flavors. Early

04:14 uh you know, build itself that are one more professionally put together clusters

04:21 some deep uh bridges and somehow they and it's just not a little bit

04:28 detail of things. So yes, their networks between the notes on your

04:35 switches and cables of all kinds of tables or fiber tables that connects between

04:44 and switches to build the network of clusters and sometimes there are put together

04:52 this one that happens to be an but they can look from the north

04:57 the outside but it is inside. it's just an example of finally most

05:07 empathy is that in this case is audience blue team computer system from another

05:14 . General questions and clusters. Yeah. I am just so far

05:22 me connection. You know the not internet. Maybe I'll talk about

05:29 But that's one if it's if the is not the capabilities of the internet

05:37 not all that critical then because the that because of expense, it is

05:43 flipping is something that we have updated . The connections like that rescue

05:51 All right, terrible. So which you know higher bandwidth? Right.

06:05 but they don't use the internet for internet of internet taxi. Oh,

06:13 why don't you use USB type 00. I say yes. That's

06:17 oh, USB type C. First bandit is about less than what is

06:25 typically in clusters and also the licenses fancy and you came back and

06:36 So what's used as I said, on what is needed for the system

06:48 such targets than you think, you maybe because uh I don't under they

06:58 to be apparently unwilling to spend money to connect. So you speak of

07:05 in there sometimes and it is changing bit terms of busters that is used

07:14 many scientific applications were interconnected. It's they use 100 because it's higher and

07:22 that the use of some comments on protocols and also I remember that discussion

07:31 processors, they have a bunch of lane's that reason to hide the area

07:42 tend to have more than one or of the speed force. So I

07:47 the process of side or in the other boss do not have any of

07:52 closest and capability of movement because you compared to figure to teach in there

07:58 something else. Oh yeah, You're kidding. Right. So that's

08:11 good question. So I talked to first comment a little bit more only

08:18 . So the other part, since talked about um, you know,

08:23 and programming. So in terms of single notes and look they notes would

08:31 using it like kind of up to 96 3rd maximum I think we have

08:37 example 48 Cores and two or 4 that I quit reading. So it's

08:44 to about 100 threats in the note when it comes to castries and several

08:52 of magnitude potentially board. So scalability strengths is very important. So I

08:58 give a perspective, zone area is of course, and typically, you

09:04 , as we know Courses, one 2 threads in some cases four threads

09:08 core possible. Uh It's just like months before that's actually more. But

09:18 in terms of number of third some small factory depending upon was living

09:26 , but the president is enabled but in this case, so this is

09:32 the horizontal, so access time and goes until The last 500 list uh

09:40 Tom June last year there are a of weeks, But as you can

09:49 it's up to 100,000 plus scores. compared to about 100 threads, this

09:56 considerably higher question, scalability is very , of course, Top 500 system

10:05 kind of large systems compared to your systems, but I'll come back to

10:09 too. And this is sort of maximum number, of Course insistence uh

10:17 is up to about 10 million So it's uh and even as if

10:24 look at the lower end of the , so the number of minimum number

10:30 that end up on the list is in the water. Thousands, of

10:35 . Yeah, down here is another of ceo look at science, it's

10:46 both enough then the bar them from . This uh huh of course,

10:55 the bottom map. Yeah, of . So we have this capability is

11:03 important and I didn't have a sorting since most of you probably going to

11:11 industry as it is a large share the distance on this top priority limericks

11:24 even though they're citizens center, the the collective performance of their system a

11:32 bit more than the quarter of the number of systems is more than

11:39 Yes. Yes. It's a So this is a gun summarizing whatever

11:47 said, this is scalability is a deal in terms of uh, the

11:56 and algorithms, clusters in general. next is a little bit on listening

12:05 connect and what makes the difference between these clusters in the society, the

12:12 of integration. Uh, and I sent to comprehensive systems. It tends

12:19 be that the empathy. He's the the connection between those are kind of

12:26 the level of Level three Cache is that means whether it's remote now remote

12:33 almost as goes to the functional units a test was to typical courses in

12:43 ways. A few times they used bust the PcR basis to connect and

12:51 a picture at all and one of and that is the idea of a

12:56 that I mentioned and it just shows in this case an approach into

13:02 Thank you a lot of food. . I mean into the system in

13:12 to get very low latency connection between and no, I was and also

13:18 bandits that's proprietor interconnection And it's something . Time forever. Interconnect technology as

13:28 and otherwise. And the cost of . The system mentioned a few times

13:34 used the PC express bus and the started circuit court to put things up

13:46 mm hmm. Yeah, it's Yeah. So, um,

13:54 That's not really talked about the terminal . Was the standards uh dr $400

14:04 use connections. Close distance. Uh, is there a 59 overhead

14:15 can see So if things are in effort. Oh, his critical

14:24 those systems that you see them in van or I believe the finances.

14:33 , it's simple enough to are you mhm. Think about so revolution.

14:45 processor obviously they want to get a coarse and capability 17 years. And

14:55 , this is a correspondent and particularly also, oh, The technology for

15:03 happening about every three years in terms both even. Uh mhm. So

15:13 don't drive too compete in the african . But it's something people in the

15:21 that unfortunate about this incomparable power. no. So is that enough for

15:30 ? Opposition? Yeah. Um, put that one. What is the

15:37 access inside coming off screenshot produced design . The song. Great computer company

15:49 is our speak require says to Um and I think I will talk

15:57 that a little bit today. But . So, so everybody. So

16:10 relationship of economics is so what happens etcetera, put it on the car

16:16 a second friend words. Yeah, been about 32 soldiers. Uh,

16:24 the, you know, the two points. That's the reason why it

16:33 , these technologies exist and systems where communication is important for the moments.

16:44 . So Yes, a question or . Yeah. So from the biggest

16:53 we have a different types of media to help pay for he's gonna

17:00 So opening the neck, those we'd there for you. I can

17:07 All right. Oh, how to it away. Yeah. Economic disputes

17:14 these wireless technology. Oh yeah. , uh, okay. The number

17:26 white pine and make the standard, fun. A couple of 100 megabits

17:30 second. A Big Boy 5, brakes, one number of minutes under

17:43 . I'm nine Point says become pick this person, you know me.

17:50 , for my question. Okay. it's still over and then in order

17:58 thousands onion soup and it's the, say I'm sure is cold outside.

18:16 , and also so weird to think having, I don't know, were

18:26 still hold experience your entire, you know, it's going to have

18:34 little radio in your back pocket, device you have and it's also an

18:39 point and the access point usually cannot . All right, more than ever

18:47 started yet. I'm just, so this case The northern clusters here than

18:56 are 10,000 or or out. It about 10,000 people working to elect a

19:02 access point that would it doesn't have take the willing to dealing with each

19:09 because it's the taxes come from what doesn't help to dozens connection at the

19:19 time. Got it. Traffic Yeah. Yes, yes. So

19:38 also say seven at books also growth you have lots of people and they

19:45 for the area part of the Yeah. Our oh so led by

19:56 of us are used to in terms customs. Uh Yes. Uh yeah

20:10 so on. Oh some are a bit okay dr months old. The

20:19 on the strength of nine communicating with other sometimes or Yeah, that's a

20:31 processor and so on. Pretty much proprietary technologies can use. So,

20:39 know, foreign policy figures should not anybody else. Oh, in with

20:47 . Uh huh. If you don't too many force on the ring.

20:55 . No it's not Okay. But from my report, you know,

21:05 or avoid congestion by uh this piece so that's the National forest. No

21:13 . Right? Their craft just so that's what this car they got the

21:20 into connect awesome example. Uh huh then one between office first report,

21:35 also a dominant prior to connect. processors uh huh acknowledges it's the family

21:49 of mask into the Yeah, our protocol. Not respectable as onto effort

22:01 Okay. So I love that. , it's press button, are you

22:07 it? Yeah, that's on it possible systems to books implement so.

22:21 hmm. And then when it comes you as compensation knows no system just

22:29 from the net for you. Did . Uh huh. Citizens desire for

22:38 efficient computation. Our technologies and All right. Also because it's the

22:52 and they tend to use the diese or sometimes they will send a special

23:00 , african or question the faces from processors. So it's again the processors

23:08 about the particularly taking into them and their support. He said express

23:16 internet protocols and uh, also some protocols must follow uh, intercity traffic

23:26 management and other things. So we find a bunch of wires and go

23:30 and look at the sky lake. will see the collection of they said

23:35 transport and nuclear courts 45 to communicate different ways. Either with other sockets

23:46 but other notes. So, this kind of the picture again, that

23:55 a bunch of notes that are independent effective their own memories and processes and

24:03 they put into some networks typically the it's quite simple basis. So any

24:13 questions on that. Okay. All . So the new thing in terms

24:22 technology that we have talked about was works At that .6 but functionally there

24:32 now also data communication. What does system memory or access to accelerator sentinel

24:41 . So what I'll talk a little about one's characteristics that from performance point

24:48 view. So um, so this of vacancy and that comes back memories

24:59 that. It's also expected no conversation system. Uh, someone is still

25:11 put together some message some way or information to the receiver. Yeah,

25:20 difficult required some work. Yeah. the time different parts of the desiccated

25:29 are the consequence two put together heather said something about sending the there's a

25:39 that requires sometimes transporting similarly anywhere that want to do and that's sort of

25:51 message. So there's a big confusion being used there system stops off the

26:03 being effect ability over huh. So we start and they stop and

26:12 these were delayed for the whole transaction the fact that the table yeah actions

26:23 change the whole time or delay for communication transactions is the different areas to

26:33 the latency as opposed the reason for rest of trust mission. So as

26:41 said sometimes when you read papers or a treat pregnancy as the whole time

26:49 supposed to Thanks related to overhead. this is just kind of find them

26:58 show. Mm hmm. The fact all different basis is uh, to

27:06 around with the numbers and the So what uh the vacancy is something

27:17 an independent of the table sites of bike uh detective agency. Large

27:26 It was like a city uh huh of science for the payload size pieces

27:36 are kept. Yes. Crichton illustrates trainers. Yeah separate so difficult and

27:50 fact that made our first arrival vacancy save us. Oh uh and I

28:01 to see the doctor the cradle needs be to get ready comfortable to the

28:08 data. Okay station so the assignment has to do then for NPR should

28:19 be asked positive fight identified agency and again communication so this um so uh

28:37 is uh what when you're trying to of like you have an understanding of

28:44 goes on one also to mention a times in terms of the congestion that's

28:53 . And that defense clearly are what computation task is and that's what busses

29:02 are no longer used generally because you , perhaps things get congested very quickly

29:11 . That's true. Did announce very for instance. Mhm The reason is

29:19 it's kind of also limited uh in of what handle so that when the

29:27 count today what is being used on silicon processor is the best technology connectivity

29:37 it comes to clusters that even The d. mash is not used very

29:44 anymore because the number of those are high Even a two d mass to

29:49 this enough conversation capability to and the from all the notes sold, you

29:57 , higher dimensional Manchester's for what snow wrapped around him to connect them out

30:03 door. A tourist or a little And they have five or 6

30:10 You're right. We become in order have something that has enough communication technical

30:18 many applications um and then it's all or is a driving protocol. So

30:29 and for sandals this course also or effort and opportunity for holidays protocols for

30:38 to be with the rising this effort the modern networks also message priority.

30:51 uh huh other features that yes, retaliation but after rioting and many different

31:07 are happening and today's networks so they by normal central So any questions on

31:19 general aspects. So I want your . I have a few slides here

31:28 fix it very quickly and it's uh or less just for you too.

31:37 attention when you read papers as opposed um I took the tracks but the

31:45 not what to read. So I these were kind of became uh so

31:54 the competition after it. So And what is the number one center

32:01 the liver type of to connect That's absurd. I'm trying to make

32:09 that he by their own the fact connect or a bunch of papers showing

32:20 . All right. No presentations of Avengers inside visual. They're always the

32:26 . And compared to the other guys is a little bit of the difference

32:33 aggressiveness of position themselves. Uh huh Compared to the competition. So

32:42 So in this case uh in terms mental notes when they compare themselves to

32:50 internet to connect knowledge always win uh or less and uh on the other

32:59 uh intel waters on the right hand but then the events Parks admitted that

33:06 were not always the best. Uh and then is so there's a bunch

33:13 size writing. Okay. You curious more than anything you need to

33:20 far class but you can see how different ones and they are. They

33:26 themselves and in this case I was impressed by into making, you

33:33 we don't always win something this configuration but and they are not sent to

33:39 we're all this best buy significant This is a little bit here.

33:45 of this somewhere is lining the blue is the this is us and a

33:51 and look at what the guy So I know, I know,

33:57 maybe his sister cautionary tale fun how interpret what to see that And a

34:05 of comments on this slingshot technology that is as you see the amount of

34:14 and it's being used the largest the latest and largest acquisitions department of

34:23 for the higher systems that this interconnect . Yeah. Um here's a comparison

34:32 with this being compared to Uh So they specifically for that.

34:43 and it's not me. It's the if I'd be correspondent. It's about

34:51 quality. Yeah. It's already shows comparable rather than as much but it's

35:01 some technology positive. Just control the . So seven has been the

35:10 Yeah. This big that position. uh I guess so. I showed

35:18 effect of this congestion control that and , I'm not going to care

35:25 So you basically about whenever the country's with something that is also an

35:34 uh until we're done. So it's johnson. Mhm. All right.

35:47 their questions on that. I'm not to talk more about network today.

35:57 . So now I talked about NPR , so what is behind this message

36:09 interface? So yeah, it's conversation library thing and the underlying things

36:18 definitely like the open and see it done well put together based on the

36:25 hardware characteristics. It was open. to see whether it's american spaces,

36:32 instruction sets and trying to figure out to manage all of that for us

36:37 succeed. Uh, notion of independent hooked together over a network. The

36:47 for africa. So, but what means is that it's about the independent

36:56 . General, there is no notion global address space. So each computer

37:05 its own uh that's it and that stuck. It was all in the

37:14 losing a bunch of pills and buster maybe that is it's up to the

37:22 to figure out. And it's a our power to yeah, variable updates

37:31 sharing data between the notes in any . And you're absolutely right right.

37:40 language of the compartments and so the main difference compared to for instance open

37:49 Yes. Mentioned this in the program also on this place every now getting

37:54 program quick say uh probably uh There's something you're welcome to write

38:02 Unique culture installed problems, particularly people 50. Okay, excuse the single

38:10 and replicated across the notes in order get some time. It's very much

38:28 . So then sent to the bottom this I say yes. People they're

38:32 to But in the case of all the genesis program. And we talked

38:40 even if my memory. So in to simplify programming from trying to create

38:46 illusion of it single address space uh then provide mechanisms for it that the

38:53 of what you need to and what in fact, so you can comment

38:59 that from somewhere exercise right? I to Vietnam or later. And that's

39:07 because of the frameworks that's mentioned here the slide of figures. Yeah.

39:15 it as part of life. All . We're basically trying to collect baker

39:23 . Uh huh. On the programmer so that we can use our

39:29 But as knowledge the responsible one. . And then you don't have to

39:36 about it does the anti battles even the internal Biggest movements but presents the

39:44 after space. Is just one verify was based on the ground.

39:51 The product mainly involved simplifying the programming coming from almost without losing too much

40:04 . Yeah. Because if you try make things abstract performances Compare it to

40:12 using five numbers of seats. I give you program and believe it or

40:17 the money back. Too much performance the similarities. Yeah. So in

40:24 case, well this part this can as further. Just the basic notion

40:34 the programmer has this seeing what uh the work for their financials in order

40:40 get told job to. So The independent. And this takes a

40:52 level. Program is nose and accept process. Not this president doesn't tattoos

41:03 FBI. But just keep it simple the moment. Uh processes by whatever

41:11 a. I'm sort of fit the that is between processes the apartment

41:23 It notes the processes can be on same note that it's not impossible or

41:32 run an FBI probe the fact that proper speed. Yeah. If we

41:43 hadn't using communication. Right. Interaction the wow, right. And this

41:59 just a reminder of the difference in of processes versus thread and that is

42:05 . I think processes. I dismissed state associated. Um And this is

42:13 one of the side that it's up the program and to figure out and

42:19 for the district notes. So it's , in terms of open empty it's

42:26 global address pesos later is a fun . Open. H you see,

42:31 was a little bit more work because are two different memory spaces and the

42:36 . What sort of device? Um us an FBI that there is now

42:45 no on family space at least you know, if you have an

42:51 processor in front of the nose and are additional complications the member spaces of

42:57 touch processor and almost no medications. a lot of the things I'll talk

43:05 more in detail next time as the went the communication part. Yes.

43:12 example for within the cluster between notes we'll join the examples next time.

43:23 that's like uh huh. The most example there was this a good

43:32 So you're stuck with last time was . To do you think you can

43:38 of is really dark? Uh something needs couple then they would do all

43:47 us suffer spread. But at the I wish this former example of the

43:54 you can have a time and he's of the notes and under the city

43:59 department times. I don't know. haven't created in different notes. I

44:06 give you a concrete examples. so conserve it's very flexible. So

44:18 also thinks the holidays or something known the clock ticks operating system that we're

44:24 in essence passing operating system where different sends messages to coordinate the work between

44:31 other. So it's incredibly flexible model it's also not jbl to implement this

44:40 here so that's fine. Libraries exist yeah, Up to six awhile to

44:50 , this offer to be efficient because complicated and it also depends on the

44:56 hardware hardly implement this. Uh And here is just a very simple principle

45:06 message passing that I want to sure doesn't happen. Another note, the

45:14 are and uh the basic thing is order for the things up to get

45:21 . So I kind of got to out if they're ready to receive

45:26 Sorry, dissipates and something and then get all the expenses TCP protocol,

45:34 kind of a handshake to request to something. Actually just okay. Search

45:44 actually between receiver in order for So that's it on the night and

45:53 see that next time. What about fact. Right. And other forms

46:02 communication. And so kind of the someone's IT uh business FBI certainly system

46:22 model versions have seen porter uh help I think I think there are there

46:33 I have not built into something because not something that you see because uh

46:44 . The version four. Mm. yes yes. Just like with open

46:58 be, can open it to see point of M. P.

47:03 Is for the program and to be to write you affordable codes,

47:11 You know you can use CUda accelerator that's not filled with people do that

47:23 they have their own one level of or progress specific stuff and the purpose

47:32 small you have to in this case only do you not currently in the

47:39 important but they're not about technology. to figure out the scent energy

47:46 Mhm. Um uh second. So tried to get a bunch of

47:58 Uh the same communication. Sure. . Uh A place it shouldn't

48:09 Uh huh. They're not. And this notion of collective communication so that

48:20 . Okay there's a bunch of processes engaged. The action one centre that

48:27 and I'm up for the receivers so connected complication. Is that the one

48:34 talks about different shapes and forms this . So if they have there's been

48:42 things up across from results from additional . That's another type of bullet

48:50 NPR's support. Yeah. Um And also certain you can define data

49:01 . Uh I think concern open and define your own data. There is

49:13 . Okay. Change to different types more against complex applications. Various Sudan

49:19 so defining it on data types. so here's superintendents references to where they

49:28 there's tons of things. There were uh editorials decision papers from. So

49:39 the basement. So there's no shortage of information about about the FBI.

49:47 there is another forum the clients often so they they support performance. What

50:00 goes on five. Right? Yes am. Yeah. So well conscious

50:14 of the time that it cooks for external programs accept information. But uh

50:28 I think that I don't remember any . Change the communities themselves. Certain

50:39 . Mhm. But normally they would some of this on a towel.

50:47 that is linked to NPR numbers. step. So I get to

50:56 Oh, so or in except for for instance you may. Yes.

51:08 data from some FBI uh in terms analyzed the problem however, take a

51:18 of enough. Whereas the town and are the tools waste of extracting useful

51:25 from several months. So that's the why we are that you use the

51:35 because of animals that once a Yeah. Itself it was broken up

51:52 it's like, you know, something on the doctor about party party to

51:55 to that counters. It doesn't mean can't trying to get the content information

52:02 . It comes in the form. is not a comprehensive. Yeah.

52:18 . All right. So this is little bit you know what address this

52:27 on the point and nancy. If sequential program, it's good enough for

52:36 that you want. There's no point to make it complicated. Classical

52:43 saying things you can do the And I think I know there's no

52:49 scientific african notes recently. And that's there's and we also have an open

52:59 this example that just because of the creating regions in that taste and

53:05 well, there's a number of situations . Next. Just two singles that

53:10 talk to Carlos. It was And if this case yes, generate

53:16 friend's father was stopped. It's the thing. Always conscientious of how much

53:22 there is. And it's always better try to optimize its internal code and

53:26 to paralyze. It's pretty much the home message and this is the

53:35 This is still alive and well in of new Russians understanding the pretty much

53:43 the time and then part of it to increase functionality. Um, and

53:51 fact it is to adapt things to evolving hardware on this is being used

53:58 running. But it also said that the basic ends up in violence.

54:07 burning any form of suffering these three fire under this after. Right.

54:18 . You can do go little bit . 16 that area on stage of

54:28 so a little bit more about mm . Control. But essentially what the

54:41 Okay. Region in the past. ? So I was just closing

54:52 All right. Uh, they You're welcome. No problem. Oh

55:04 our ball. Uh huh. I think that frank is uh trade

55:18 open empty so whether Yeah and then obvious but how they work is not

55:31 mm Any comments from the international service . Okay. So this is a

55:43 time. So uh and the other to do so again not to use

55:54 level. This is fun a communication for the chief and have in the

56:02 of the paris protocol. Uh For science Posturings, anything for

56:12 No population. Yeah. Mm and you get it off of there.

56:20 right. So also different all the is hidden in the library. The

56:30 needs to worry about the sand routine sort of our in terms of the

56:40 called whether the underlying thing you can the door Tennessee. So That's why

56:49 of these 15 and the F. . i. Patient library that's the

56:55 person when they recognize what the hardware that too used to accept of.

57:01 huh. Called to actually make the complication. Um so then there is

57:12 I'm trying to put NPR library God. Uh huh First one and

57:21 some of it in the finalized asbestos things up. Uh vision. Uh

57:28 category any time. Third one is communication communication between processes. Uh huh

57:48 as correspondent things. So it's important keep in mind that is between processes

57:56 process source. Mhm There is nothing on the processes and process source.

58:04 there was nothing that's of course open . So I want to talk

58:11 Uh huh. The so called collective works so. Mhm. Um

58:23 I think this is best to be what I just said and some sort

58:27 different kind of boys. Mhm. these collective communications are and uh interesting

58:42 and good strength uh because you know so early on some implementations to well

58:58 libraries for this collective communication. So I think about uh confusing on the

59:07 . Princess the fools have lots of long as there's no lines coming into

59:19 so that means you kind of get equivalent of denial of service attack because

59:25 and any messages coming into the So that made some of the really

59:33 um very badly in place of someone collected communication. So it's very important

59:40 figure out how to scale things again terms of someone who's communications.

59:50 there is some over Oh and your . Uh huh dolphins or what types

60:06 africa? The 17 member. So let me uh let the product

60:29 about that Roxanne. Uh Well, are FBI works on palpatine prvs.

60:37 what involvement. Yeah. There there some toxicity ideas again, have the

60:45 pass is just not what I want do but there's a principle but the

60:56 problem uh these these incredible women. . But so you can you

61:13 implement you know the FBI is that want to do it across several network

61:19 is with your mobile what you're thinking they think it was best. It

61:27 uh this is our servers and have talk over if I see you.

61:35 protocol. But you wouldn't do that you want to do. But technically

61:42 make it work. Yes. So I need a product yet. So

61:47 we are just the right there for but we're going in the right to

61:53 programs for messages to the different Yes. Yeah. So I'm so

62:10 said, you know in terms of , you have an authenticity I implemented

62:17 europe for long network that will be to bacteria. But I don't think

62:30 any interpretation that natively supports one fire at all. No tv or some

62:39 the other seven for the falls that's traded what they send them to form

62:44 it doesn't because people don't just kind a set up to the spc or

62:52 computing. So I was mm uh name of it. But there was

63:09 am trying to the island use it you know, and you can

63:23 you know FBI across the network, know, land type services or

63:34 I already won right. You might able to do it. Uh I

63:46 think there's any FBI conversations that supported all right. Try protocol but participate

63:54 protocol on your right side. Nothing. Yeah. Oh, so

64:06 implementation of support of Cinnabon support is that uh huh supportive therapy. Uh

64:17 You know, it's stopping implemented on of the internet so there's a layer

64:24 for these protocols but some specific All right. Some FBI implementation support

64:40 . That's what you want to do ecstasy because it's too high overhead um

65:00 , call myself this my God. oh as you will see their example

65:11 concerts remember, wow, correct processes that they want to be different processes

65:25 a group. So when the box time that Saddam. Mm thank

65:36 Operations Operations Director, you may want things for those and columns or so

65:42 can create groups or processes represent the of the infrastructure or a roll or

65:54 block of That's a waste of creating of processes. NPR Yeah. And

66:03 as the subject of context because that's way you sure that among other things

66:12 communication state, I don't know the memorable patients. Your answer.

66:20 me too. So these two notions again, the example of today but

66:26 about that how the school to conflicts are combined into what's known as.

66:35 that means processes that are in the communicator having the same context that they

66:44 send information with each other. But right, there's a different process to

66:48 to communicate or change information between different huh the branch is the equivalent of

66:59 red eyed in open empty. And this is something more or less

67:06 same. So talk a little bit safe. Me tell someone it

67:11 So the because they were written something a simple model for that's a handshake

67:19 terms of sender and receiver agreement to that since our sending and receiving

67:28 But there's also nowadays are they on of the standard is started communications in

67:40 to reduce the overhead so and says sender and receiver to uh some degree

67:49 at least. Um I think so a process right? The song memory

67:59 or receive their uh other process agree what's supposed to happen and are some

68:08 the things that so yes also experimented during the summer in terms of the

68:14 sided communication, we can talk about in this next time at some

68:20 Next one probably do with demos of FBI works and the tools. Um

68:29 this is best they wanted a massive so it is uh what this does

68:40 for me that was all uh otherwise called the heather that has information about

68:48 receiver something else that is relevant for On the 2nd 1 to deal

68:56 So uh uh is payroll partners of data that you want. Uh Mhm

69:11 if. Uh huh And it's the idea is in the country to

69:18 Oh remember for the memory location for dog that they want transfer and specify

69:29 documented by income type. So the I'm into bikes or works that is

69:39 on the numbers. The fact. what is this character is you know

69:46 characters that X. Number of bytes are certain Double position that may be

69:52 for advice for 20. So it it out based on what type of

69:59 is the sound. The other thing this example chose that distance. The

70:09 says you know 7 13 elements of characters. Uh zero basically allocate space

70:18 20. So they don't need to in terms of the company international types

70:25 attacks. Now talk and talk about too. So uh an envelope.

70:40 are and they just got to find this indicator. The best and name

70:50 are prostitutes. And this communication transaction the context something some sausages In the

70:59 out of this one. Yeah. . Book is community. It's all

71:04 houses. Uh huh. It is for the application religion. Right?

71:15 they didn't find out. Right. first community as a nation. So

71:26 center respect from the destination uh Good. Thank you. So it's

71:38 coming council Another five cases for what receiver. Uh Hard to treat this

71:54 message. And we'll be the example . Uh Yes. Mhm. It's

72:10 the intensity you. Right so a of bytes and what device me.

72:19 huh market in this attack to kind what type of information is that this

72:27 give it a summer receiver wants to one of his counsel's questions. But

72:35 I mean uh reflect you remember us some and something like the picture are

72:43 . It doesn't know its memory Wait, I don't think that I'm

72:53 to tell me that this is the . Yeah it sounds so you know

72:57 the memory So uh again data format doesn't know about it. Mm It

73:11 about the memory space and standard language tax. So I know it's about

73:16 from important single and other positions logic variables, everything all programs that

73:24 cars important by the FBI as data based on those you can do your

73:30 complex. They attack so you can the language construct I think that you

73:36 to do you want to you want format and then yes come in and

73:46 . Mm And we'll get fights another Syrian and you need to identify what's

74:01 size of each word inside nationally. in the asian markets them to basically

74:11 point or lift anything you say. we're gonna say to you fast there

74:24 to the other knows uh the No access yet current. No.

74:33 and there is the different notes. no idea on each other.

74:40 So it just gets goodbye to fight and then it's up to the receiver

74:49 where it wants to put this no relation to where they were member

74:56 picture on this, but it just out to be that couple months,

75:04 . If it's a sandwich, you go from one note to another.

75:08 it's broadcast them, it's just There are other constructs to them do

75:17 . So each receiving as a fraction a second. So the corresponding pixels

75:26 gathering have one source each of the our get the peace or war.

75:36 senators sets up the doctor stratification. is the broadcast, but it's gathered

75:43 device it up abusive the charm and . I have another person. I

75:54 that's okay. What about the So unlike mike open and the computations

76:04 china. Right. So I will for that fascinating in this.

76:14 so it's important to remember again that independent processes that hopefully about each other's

76:22 . So the university principle as you , it's right. Uh, you

76:29 another source and destination of any other . So for that record. So

76:35 to do this, take it from and there and then it just try

76:42 this identifiable command very by So I'm to dress and then instead of just

76:47 by explicit e allows you to specify count and type in order to figure

76:56 well and on the ending addresses. transfer is and then the time was

77:02 to them, uh, sort out to do with they overcome. Let's

77:12 . Yes, this is sponsor. um Yes. So I think this

77:19 also what I already said. So this this is a good month.

77:28 . So this I think so. is basically how you invoke an NPR

77:36 demo dot and this is now coming your question. Just take a

77:43 So in this case it's because the But one difference not better open and

77:52 all this said the first thing that from that this is the co

77:59 but he still has a song paul spending that what I'm saying, they're

78:05 1080. You can donald you need tell this to find but that's not

78:11 most hold something done for that clusters the same called deceptive. So that

78:19 lightning open. MPI uh evening used coast. It's he's no doubt the

78:29 thing. So things get replicated like current region. Unless you have some

78:34 qualifying the exact case, it's that the same call to have its own

78:40 and his own program counter. So may not, it's about the

78:46 It's construction uh, cycle because all of things. But there's one copy

78:53 the code that offense feeds and then have their own program FBI scenario faster

79:01 . Each note has separate copy of company but it's a copy of the

79:07 . So unless thing, unless something done, just get it replicated that

79:14 are the ones for processes. You , the four copies of the things

79:19 it's not. That's exactly the same in this case. Except the difference

79:25 is code gets replicated. So I to stop measuring every note instead of

79:30 single. So what else did not ? Yes. Our area Hamptons.

79:38 so I guess I have another but it's up. But it's so

79:43 you don't want this to happen, have to do some way of valiant

79:51 they want this process to do. . And with open empty. We

79:55 the idea that this uh do this that's actually that depending. NPR is

80:03 the rank. That is the process . That's called rank in this case

80:09 opposed to bread. And so then can condition with this process, does

80:15 on it, Right? That's what do to Typical, that's what to

80:21 . That. You don't want every to do the same thing. You

80:26 them to do different things. And use conditional. Is And the rank

80:30 the identify other process to decide what want. It. Can you last

80:38 and guards and get specified captain inside . Yeah. Yeah. So I

80:48 . So, so I guess that's . Well, first the process just

80:56 piece of code. So they can any level of understanding, you

81:00 uh groups or whatever you want to . Processes and processes for other

81:08 Um Now it works okay then you also have several processes back to the

81:17 physical note. It helps answerable My dog is back So I have

81:25 piece of course. I tell that did a particular law to be run

81:31 one single. Well, that's not . Yeah, huh They can create

81:43 of processes uh initially when you launch NPR program uh so one of the

81:51 was called on board, what what is this? Initially you have

81:59 30%. It processes we have a is in that world. Once you

82:05 launched about then we can start creating , all of those that each of

82:13 groups will have some sort of process then teach seven process and work on

82:19 part of the cooperation surf right? you want to do less than terrorism

82:28 uh process then disappeared from the process of us. A million fragments through

82:37 some people burn. And then, , in one way when you get

82:45 groups of processes, they provide identifying huh for example. Uh yes,

83:03 one, I believe there is one of the island sustainably made to stuff

83:07 different roles and columns and put different for the partition of the matrix into

83:15 of columns. Maybe a few processes his local columns and certain things.

83:24 , Those and then you can have over that set um, processes that

83:29 the notes. So the process can more than one of these communicators.

83:40 know, sometimes you want to be columns, sometimes broadcast those springs and

83:48 can be done by a framework that can't even Okay, we'll be more

84:00 . It's good questions. Yeah. started out 19 for details.

84:11 Well, I will stop session, we stopped recording. Oh,

84:25 Oh, yeah. All right. . Mhm, mm hmm.

84:43 Mhm. Uh huh. Good. . Yeah. Yeah. Uh

84:56 Yeah. Let's want to stop recordings stop. Doesn't do it simply

85:07 Yeah. Mhm. The the press . Uh huh. Uh huh.

85:20 ,

-
+