© Distribution of this video is restricted by its owner
Transcript ×
Auto highlight
Font-size
00:00 Thank you. Yeah. So So any more questions on we can't

00:10 have some of you. I've been an extended deadline for the assignment,

00:15 that things are not working properly yet make any sense. But the new

00:21 before you have access, once you access to figure out increasing the number

00:27 days to so they you're not in access. Neither am I.

00:37 you should not make accountable. I that that's not true. one thing

00:42 would say is just The show is crossed 100. Oh, but energy

00:58 and one of us when you're if you have something, you

01:04 you can check on. Yeah. . And the other question.

01:19 Yes. Yes. That's what I . So once you have access and

01:23 reasonable turnaround time terminals at a number days finish it. But I can't

01:30 the deadline if you have no access meaning. So, so once it's

01:37 and you have access, then we'll up with please people. Okay.

01:49 instance, today I will continue and about FBI next programming paradigm first.

01:59 hmm. 20 times. Yeah. . That's quickly These things.

02:06 Very much talk about that very Once I talked about last time and

02:12 I'm talking about the rest of the on this side. No, not

02:17 of that joy. And that will in this one more lecture than today

02:21 the members of the FBI is programming that is typically labeled as clusters basically

02:30 collection of independent computers book together over form of the network at it kind

02:39 asked one more week, relatively the contrast into connection network that is

02:45 to have a great uh the notion a common system or the cluster.

02:53 the difference compared to what we talked before is that in this case the

02:56 gets replicated. Typically the spending So the program in this society typically

03:04 in each one of the processors sold this uh, memory for the cold

03:11 consumed in every process and not just . So the cold, I think

03:16 executed is just getting and uh so is that's a certain evidence seemed a

03:27 and that means to get them to what you do is what people call

03:32 the paramount. So basically you just the collection of jobs and there's nothing

03:40 going on between the difference notes in cluster that's typically out what NPR is

03:48 . You can use it for The interesting part when it comes using

03:54 is typically that you divide up the for getting a job done among the

03:59 notes in the question and since they're independent, that means the only way

04:05 you can exchange information between the notes by sending messages and that's when

04:10 I can't seem to place. And that means typically had a network class

04:17 I haven't, it's like, you , you're thank you have experienced.

04:25 . Is may basically uh heather to envelope put an address and all kinds

04:32 stuff and then you have the message could see inside. So TCP iP

04:39 communication protocols worked with that, which ahead of that have some information that

04:44 something about source, destination priorities, kinds of other features. And then

04:51 what I tend to call a lot of the time. That is something

04:54 goes into the um we talked about . Um and then there's this notion

05:03 communicators that we'll talk more about And then there was a little bit

05:12 just how you get around these programs NPR and the different languages. So

05:18 has bindings for and then to the older versions to see a few versions

05:23 fortune and even fighting that doesn't show here. So there's it's they are

05:30 used for programming and clusters And the show. So in principle because the

05:37 is replicated for Eastern on each of notes. And when you run NPR

05:44 that makes all the different notes execute same problem. Uh huh. So

05:52 got similar to they talked about in open empty regions that every thread executes

05:59 same cold and you can customize what threats do by using the threat.

06:05 The Target two different kinds of things they do similar things that I'll show

06:10 example about today. But the principal is replicated. So everything process.

06:15 does execute the same code so that you get us money. It's a

06:21 little Hello World program then, you , to get everyone to print out

06:26 same thing and that's fine I think fine. So and then there is

06:39 have been suffered. Well not you use a wanting to, he ran

06:44 something crashes down the hole. Program some things things get supported across

06:52 Uh huh. Yeah. Culture on dock. Unless you have ways for

07:02 responding to the miracles that is given Westchester compartment Germany remember. Oh,

07:12 was so alright. Any questions so ? Yes. So if we have

07:24 , let's yeah, That's 50 Republicans . I think that for me and

07:31 this stuff, it always does copy code to every note that you ask

07:36 . So in the beginning has served ? Simply ask for anything else you

07:42 . And they called this cockpits on old sucker of the UCC. The

07:48 doesn't it never of course. It doesn't matter. So like for

07:56 NPR is either the problem at the , the FBI distributes please.

08:04 so mascot, the count is And so whether it just excluded on

08:17 the notes, depends on you may the early part of the code have

08:21 positions uh, that executed by the distributed into all. No. So

08:32 is for NPR it doesn't do It's all in the program. It

08:42 to figure out everything. So I that that is my last time that

08:49 only notion of some global aspects is the programmers have. So I think

08:58 program I need to distribute the data it's given data. So you have

09:05 data sensitivity, you haven't done this somewhere and it's downloaded and they went

09:13 the hole there. So every note is kind of wasteful otherwise they need

09:18 partition the note the benefits among the for a test data that you

09:25 generate part of the data and it's of the nose. And so sorry

09:34 so but and towards the end of course, I will talk to you

09:38 the way so partitioning data sets so can distribute it so that well,

09:50 . So the other way of summit a little bit about the open sea

10:02 I was sort of the first such and basically in that case in the

10:08 member assistant, where does the data up? And it depends on where

10:13 first being used. The kind of or Mental Model one has NPR is

10:23 of owner confused less than you try get the computation associated with data for

10:31 of the data. It's so that computation happens, spending needs to have

10:39 between uh different elements and the So I will give examples of that

10:48 . Mhm. Not today. My soul. Think of it as the

10:52 compute rules. So you assign certain set to note. You try to

10:57 that data sets and most of the to the datasets. Um It's kind

11:03 local on the processor references. The is not on that processor is relative

11:10 treatment. So yeah I guess that's comment. So some distance that one

11:21 to correspondent today the barrel construct an empty. You have to start a

11:29 . Uh reason I don't for the and the state but there are empty

11:35 . It sets up everything parallel as captain. So I really really but

11:45 know like all the talks about his . You know sometimes uh what was

11:50 and there was parallel but then they or was interested in the pharaoh

11:58 So and then there was some clothes movements in sort of on the library

12:04 necessary. So now the first of example here is how to customize what's

12:09 difference processes do and the process is be more precise um as he said

12:19 some smoke mistake, things that And the ideas with process is not

12:27 the sorts we're going to step that's mapping processes to process source. So

12:37 Alright, so here is one thing you're wrong the process mm compute different

12:43 of arrest. Cool. Mhm. that's that's what I mentioned already.

12:51 you can use that the process ID a trend I. D.

12:57 So and the process. I didn't that. Right? The concept.

13:05 it's a name. What about that on this case? This is just

13:11 I. V. The restaurant This essay I fundamentally I rank that

13:24 of that France. The idea that but also the fact. What's your

13:32 is here in boston. Are you the other thing I was gonna or

13:40 there is also the emotional the communicator groups of processes that can't talk to

13:50 other. There is one that is defined. What is this humble?

13:57 all the same. So I developed and other processes and then they talk

14:07 them. I construct your own uh for particular application. And then there

14:18 just so there's something and I think was just a more compact when you're

14:24 the same thing but it's has shown to customize what the processes are

14:30 So they don't necessarily straight on the . Same thing. Um All

14:39 Something. So any questions on this . Right. Oh all right.

14:51 So something you know uh Very very my plan was fine but that's

14:59 In a smaller versions of these also times the use of that's the point

15:11 . Not something we'll decide. Yeah different the problem thing first everything starts

15:17 the FBI on this court about this Common to all the different. That

15:24 fine. And then it's a difference the rest uh si depending on what

15:33 once it starts with a capital letter , it's your case forcing on everything

15:42 . So they're not so a little about data types and there's all the

15:56 language, you know, types are . Um and from there it doesn't

16:04 much but funding that one may not about so much is that machine representations

16:14 numbers are not necessarily, it used be the uh and was well I've

16:27 for instance in terms of number representation been these notions a little endian and

16:34 big idea and I think, So it's a question of which it

16:44 huh work is the most significant, know. Right, most big that

16:51 significant or is it the most so you send and that's something that is

17:02 dependence is one down there and I'm to the harbor numbers are represented and

17:09 don't necessarily want the user to have figure out if this underground one of

17:14 noses, you know, by Another one is my idea then that

17:19 number of citations different you have to action. So all of that is

17:26 by FBI converted. So whatever data to have in the language son interest

17:33 between machines with different representations. NPR you can figure out you get the

17:40 thing. So there are a number a lot of the stuff that takes

17:47 of. That's more difficult. We so um, so this is pretty

17:58 saying that um, its advantages to to use the standard data types that

18:06 from the languages. So I think next few slides there's nothing particularly remarkable

18:13 it is just and it gives example what uh huh. Standard data but

18:18 is no standard data up in the that is not supported by NPR's.

18:24 is just subset of C and C and four chan again, whatever language

18:31 touch is available is supported in So and then there's some more of

18:42 predefined functions or functions that we talked . Oh, so okay. So

18:55 anti communist resort communicator communicators define processes. Yeah. Yeah the center

19:09 and this time common once officials and the numbers on your contribution because we

19:21 hang too communicators on uh find on court. Common is the name of

19:29 that lets us this is the first use the empire on this cool

19:35 You know that that particular variable and the first community. Okay.

19:50 questions on that. And I'll talk little bit about read your data.

19:58 . But to something that is it continues and expect it allows you

20:06 customize and all that. That means future. It's a deal again.

20:13 matrix objects or then you can define types in those roles or columns of

20:20 natures or sub matrix So so and whatever assignment two or three or something

20:37 we got some spots of light single standard engine Spotify algorithms. The

20:48 common one is just getting in the both columns. So the marijuana column

20:53 nice objects. That's when they want treat abstract instead of just enumerating the

21:02 . Oh and so to use So the deal is the simplest or

21:20 these to counteract the known facts. processing this constructive example the next few

21:30 . But then when all sort of the you know advocates today that process

21:34 growth practices that the arctic are false you. Yeah so there are some

21:47 the thanks. I'll get example about they use the radio data base that

22:04 . So basically in the way of instructors from the acceptance. The one

22:10 is so there is a few of space And then the director and the

22:19 one space sector and discounts. Uh release okay you are certain attributes of

22:33 function is divine vice. Otherwise it's terms of what element reduced. Uh

22:45 And this is just a way of education come in. Yeah remarkable

22:58 So now just examples I promised the types of after this the instances oh

23:09 is oh that you want sorry. this example the council stand so the

23:20 type. It will and you can on cities. Well they will cut

23:35 structure isn't too much so there again depends on what the old type is

23:42 a floating point integration structures you can the same thing and there was this

23:53 I think now. So what's basically i structural system thing. So this

23:59 uh in addition to the account Yeah planes that tells you how many instances

24:06 one all all types and then we also science right. A division between

24:19 instances of that song created. So you play so that that's it

24:32 For example, for that comes to international arrest warrants and then this is

24:44 showing the same pretty much total and all these structures that are just simple

24:53 data types and this is the age just chose the only good things and

25:01 . This case started taking lots of . Oh yeah, I remember.

25:10 . It is more flexibility in terms uh huh Credit Simon doctor song and

25:23 fact in its space at this. friends of his army the same

25:31 Whoa. Associated displacement from the start decent source zero A for instance a

25:47 and then I was outside too totally bill having general structures using his tonight

25:57 the types. Mm hmm. Here is kind of one way thinking about

26:08 Remember three dimensional arrays are find the come into London national structures in the

26:19 making orders but it seems important. I'm really certain access is The straight

26:32 accident within a column. Not that line. So for instance they wanted

26:39 send the column to another. No can't access. My friend was just

26:44 to find it's also uh and said that's classifiable deal with after this now

26:52 up it is C. And you column then successive elements of the

27:04 And that is the question for what do. Well the battle of So

27:10 the elements and one element at a uh this conference is done does sending

27:20 into the start uh there anymore I would be long. Yeah. Yeah

27:30 is the stuff from the start and one sees them in concerns. There's

27:37 wrong with it. It should work it's not what you would like to

27:45 . Thank itself. Yes. And does it make itself? Yeah.

27:55 huh. So there is the overhead have to construct. Uh huh.

28:03 the fact that the deceptive or not and uh from America every time not

28:12 go never element there's also over the and then the communication forget itself just

28:20 one. And for all the overhead that uh they have the 100 science

28:29 processing network. Yes. That's very . So what you would like to

28:36 is best exactly how did it happen that's where again this directive notion um

28:48 put solid, this is by forming specter. Uh huh. Then there's

28:54 talent there. NPR and are too . The fact you could have done

28:59 yourself by first minute temporary rent, the columnist somewhere else in memory and

29:06 go and get this. That's a block of memory and put this,

29:11 it to another process. But this the FBI to figure out and potentially

29:18 here memory cards because the memory read from memory right back to memory and

29:27 communication software needs to go and grab out of ever again you and that's

29:32 I think the best card and put out on the network. So to

29:38 oh that the implementer of the FBI from sending stuff. And I figured

29:45 how to avoid that some memory copies order to to the column by using

29:51 the fact in this case. Any and that. So that's what I'm

30:03 them many times. In particular scientific complications in many cases. Yeah.

30:12 , well structured data not necessarily raised race and by no means uncommon and

30:18 this case they want to have different of access parents to multi dimensional race

30:24 then extract example. Uh by defining data types of just crabs, four

30:32 to certain elements of the common All right. And then you can

30:43 the same possibly some matrices. so many different. The loss of

30:50 is essentially to .2 subsets of data then the NPR libraries can figure out

30:59 to effectively combine it. You bigger on this side essentially. I said

31:09 depending upon its is constructed and used uh here more work to figure out

31:18 to disassemble it the previous simplest so it's a little bit more involved.

31:29 better. More work in order to the factories. Okay. So no

31:41 there is any questions on this data , but it's something that is it

31:47 useful. Okay, okay, so very many uh these communicators.

32:07 ? Electricity. The structures has some information about the processes that particular

32:16 correspondent car. Seriously. So thank for it the right. And these

32:41 are local to communicator. Most similar what was the key? Whatever

32:56 Red eyed was going up to the . So one has x dependents.

33:05 , numbering started again. The minister some Uh huh This kid back off

33:15 remains yourself other rights are for this of picture. I've been in this

33:23 of the work again at all. process is absolutely process. Mhm.

33:31 and uh solo communities construct uh huh constructive financial too. Mhm And but

33:46 the uh oh, a few hours . Right, okay. It's very

33:58 . The sauce still are you doing the communicator? So once this

34:07 what is it? That's the most both? Hey, playfully. And

34:18 exactly some messages within the different There is also a way of sending

34:25 between communities and most Oh right. are uh yeah the list of the

34:41 that useful communicators or just information. ? Uh huh. Cool acceptable to

34:55 it for I will fight conclusion from intended us to have established order,

35:06 Okay. Yeah. I don't see of the war. You know how

35:14 processes you have been? Yeah. . That's an example of this career

35:28 . Sign that to the point or a picture of communicators. Yeah.

35:36 the back of the process. It not. Is there a phone?

35:52 . I mean questions and comments from stage so far. Colonel, number

35:59 things to keep track of but hopefully not. That's difficult Fernandez an

36:07 Uh well the state is dividing up homework processes group. The ones that

36:20 even uh oh yeah. First thing politics in a rack. So let's

36:32 . Yeah. Yeah. Iron. , back to Harrison. Local conflicts

36:42 this time. Go work on. right. How many they probably even

36:54 that are. This is a Mm uh report. Mm hmm options

37:09 then I want to do uh exclusion schools. Hundreds. Show us an

37:19 of a house but effectively are for U. S. Number Processes and

37:28 work with the one room from the . Donald trump. Okay, hard

37:35 . The world's fast started. And this is strong. That's one

37:43 the process is accomplished. Oh So like on the side uh and

37:56 the different processes right down they are . Uh huh. Right now here's

38:04 advice. Uh What the Yeah one ranking buck install There are four officers

38:20 And three our bloodlines. Yeah. . Yeah. Well this is just

38:34 way of showing that they can use of this NPR functions to give zero

38:42 , subsets of processes. Any All right. So next is the

39:01 codes. Let's see. So this a bit uh I don't know.

39:11 would say oh uh send and receive in the number of the checkpoints Serious

39:27 different ways. And uh Another form is of 12. Um No,

39:38 gone through a lot first this or a senate and stuff in this evening

39:46 then talk about the um Right so a question what happens once you

40:02 Yes sir. There's some culture something . It's fresh. Um So one

40:14 this is the seven commanders other process process me that also had a correspondent

40:25 scene craft you see. Well uh sir. Mhm No, but things

40:37 since I remember oh the effort in cars on a lot that's questionable.

40:48 is it safe? But actually override you want. Percent dun part

41:00 Yeah senator. Uh Resistance. Uh . So it's not until there is

41:16 fact. Yeah. There has been problem. All right. Uh

41:23 Uh huh I don't know. So completion of the sun is stop there

41:34 but and then the synchronous son. Yes. Uh I don't think so

41:49 think they have to think that book the so the transit sinfulness I guess

41:58 should thanks clear to be given after independence computers basically communicating they don't necessarily

42:08 on the same clock speed or anything though they have the same code they

42:13 not be anywhere close to the same in their coats to give it

42:19 So it's totally I think that's what . And the messages are sometimes used

42:25 synchronize them and sometimes not. So one thing where some of it is

42:32 completion and somewhere it depends on what other processes and right the bumper boats

42:47 um so that's six. Yeah because still cooperating at once. So it

43:02 some of the applications responsible to make that things are probably stop the week

43:12 the code event always point for local because it uh for the most stringent

43:31 matching and the sender and receiver of that tell ready at both sides to

43:37 exchanged information so course analysts. The Virtus so I don't think so all

43:54 ones are sense of it or at level they are the codex stop events

44:05 uh and I think according to the different most done where is a non

44:13 son uh the the program complement. accent something uh just moves on but

44:28 problem and to make sure that to results have examples here on what the

44:40 are different since commands and questions on sample. So the sand molds we

44:48 , it certainly can affect performance a because whether you'll wait for now,

44:55 it also is in many cases criteria for the correctness of the code.

45:02 don't get over overwritten before it's safe do. So Okay. So this

45:15 a non blocking in Egypt I Uh huh Well, uh huh

45:26 Radio spectrum that's fine. The vocal that needs to The transfer to five

45:38 starting application. The number of them of the United States rights that this

45:44 to transfer on the destination personal Uh No, no. To be

45:52 the context of the communicator. So know, saw the started,

45:59 Didn't sound that part part of Mm All right. What a correspondent

46:17 in terms of open, empty open sec. And that they can

46:23 a little bit called progress. two little girls from here and

46:34 saga sounds just anymore. And so the number of performance, but sure

46:52 parents salts and and there's for some talking first. Yeah. Oh,

47:12 of this. Yeah, It's all it. And that's saying off from

47:30 huh And yes, it's not just me so that we don't have a

47:50 , more concrete example. Uh huh Oh, something. So,

48:03 so it's just process there are send to pass the buck remarkable.

48:13 But for innovation and under like a this process. The center for

48:21 Uh specifically? Uh huh. Yeah. Local farmers. Oh

48:35 His blood bar here here there is process. Uh huh, slightly larger

48:43 . Right. Send it because they're young. Maybe a design about

48:50 But this does not necessarily have. now it's, I'm not sure FBI

49:05 in case you specify a smaller at space. I don't know if it

49:11 checking and the course things or just a professional comments. I think it's

49:21 responsible. Right? How long? , okay, likely as possible.

49:35 , so aside from that, I there are lots of flexibility. So

49:41 as the footprint on this, what call the practice, the volume of

49:48 best table size. It's and receiving . You can also take sensational,

49:59 the continuance and receive it as a . As long as memory spaces there

50:06 lots of flexibility in tax on How to interpret the data that does

50:14 need to be the same home sender receiver. Mm hmm It's the same

50:25 . I'm just pointing it out. think of this central figure.

50:31 So yeah, so anyone maybe. , so we're going over this

50:48 Not so what else is there to out why this is not difficult.

50:55 adult. Good explain what both but Oh yeah, not sick.

51:28 Yes. These are not the Oh. Mhm. Oh my.

51:41 huh. Uh huh. Okay. think so. Not cool.

51:52 What the non expired What's on the of this 1? Um Probably fun

52:01 the road. Uh huh. From General. Yeah. As far as

52:18 order of 15 is the ceiling. . Uh huh. Here borders.

52:32 it's really the final sentence of America okay for registration center. Yeah.

52:47 and the I'll do the purpose of call. You may not happen in

52:52 council of sanctuary, the council So in this simple example probably I

53:04 you to get hurt. The data discovered form more comfortable in program sends

53:12 receives straight up and enough piece of . So there's no I shouldn't expect

53:20 a couple men off fine in the process. So you can probably use

53:35 and figure out that spends for every and that before it crashes all we

53:40 to given classified. So. most likely would. I'm telling you

53:49 start kicks it up. Oh But you can put a check.

53:57 ? So so this is based on this is certainly a simply flip.

54:06 . That's something but it's against something the conscientious although ordering is important in

54:13 country receives. So this is all trying to explain. Uh.

54:24 Right. In this case it's a who could work depends on water.

54:38 . Thanks for being from trying to it out and it gets to the

54:42 side standing on the bus which inside this is one way or time um

54:51 also combined Senator see Oh Korea or our conversation and if you start and

55:00 so help and get the water Oh so if you want to swap

55:06 between two processes using Senator Z have in both processes, we're going to

55:13 me out will fix it. Service something example. So the reason

55:33 simple. Uh Oh yeah and the of some cream sent there actually the

55:52 . I so yes it means these blocking uh the cold I decide will

56:10 progress until uh enough of this exchange thing place but I'm not sure um

56:24 depending on offer sizes that absolutely One before the other one. It's

56:38 It's a good question. You have space um one sense and has allocated

56:53 receive and then even may not from received over but there is not a

57:06 . Thanks go back. Yes it's one way to avoid that that

57:15 Right, so that's concerned. So sequencing is done right. Uh huh

57:21 huh. Someone sends and receive and it certainly can also send stuff to

57:35 next the seeds. So as long a buffer on the processor there,

57:45 first one but that's not sense in light phone I don't think the buffer

57:52 of it's principal. Uh huh Depending how the engine that implements it can

58:03 center guard can move on and potentially that buffer and then because the receive

58:09 and I'm not farms, it's write them down percent before that's

58:20 Business and you know it is for , you see. But the bucket

58:26 there someone in terms the can receive ? So All right. You

58:37 All the same that you're not just , well, no, it department

58:45 find a solution and then we have plans that some people say that office

58:53 in. I didn't no, I'm having this but it's a rocky bob

59:03 you can be sure that was the to execution finishes from this uh called

59:11 the next line, whatever you Oh guys, The other two expectant

59:19 received from Yeah. That obviously we from the another record faster. Yeah

59:28 . Inside this call the order may be that definitely something like that.

59:35 was personally wants to send the Are you want to play for receiving

59:43 soon as it comes out of? very well, wow, I don't

59:55 the exact 30 months please thank Things have to be posted. Both

60:04 right now that the actual execution is something so once it's posted on both

60:14 and so then it serves the correct things can see the different rates of

60:19 two sides will be my interpretation. . Generally the implementations of NPR as

60:31 something happened one or some set of can put the data that you present

60:38 locally as well and but they can all that difficult. Yeah, nice

60:45 see that the second but first thing the senators involved what might be uh

60:58 one of the spy service must guarantee the receiver yes, absolutely. Corners

61:09 huh restrictions. Mhm Right, so Extra piece of information. Mhm Experience

61:33 is a there are some and behind that can differentiate whether you're communication because

61:41 going across the nose or within the so you can have several processes inside

61:47 people inside Yeah, 48 course one everyone else is huge. There can

61:53 for the box that and the lever was Crosby not electricity idea. And

62:02 nowadays there are several frameworks that can upload your local manifest for a lot

62:11 thinking back and to the member can published with them share uh huh environments

62:18 doesn't have people going to adult. , right, active. So I'm

62:28 that going about processes and processes across source is the circus stage. Many

62:37 in the same process. So that that the of practice, you need

62:51 assemble to some things across an effort i overhead compared to memory reflects but

62:57 the end it processes jumps in the note, it's all about just the

63:02 of Russians, all these creating messages all centers and all of them.

63:09 , very high over. Oh really behind in conversation but realize that these

63:15 now running on the same process or his memory references and moments.

63:21 Different recognizable doing what I want but not implemented. Are you one of

63:29 ? Mhm. Such a personality Right. Yeah, that's a global

63:43 be there for them. Right. FBI is a standard. Yes.

63:50 there are different implementations. It's on of the national lifestyle. Yes.

63:58 there's in this open mp that is source and dial developed by the community

64:05 then the vendors tend to have their implementations trying to optimize things for their

64:13 . But again, the network is necessarily the offender's point. I can

64:19 into servers and when I go on network from somebody else and there's lots

64:25 effort for the calling is an art on the network interface, cards and

64:31 and all of that. It's something the wonders don't come. No,

64:36 really is. What's that? Right. So the arms are

64:49 Can you repeat that a question? the same question. So mhm.

65:05 we have the servers and they have are you busted as you should use

65:13 for connections and cost then how do need to cut service? There is

65:24 have a small buster human. This connection between a conservatory switch and this

65:32 of one half thing with is to a larger network and several layers of

65:41 that uh huh the structures or rashes collections of switches and uh, switches

66:00 . So you can have the best that I mentioned before and uh it's

66:06 to be about protocol and also support a property that uh, the mail

66:16 you can get whatever flavor long 10 or whatever about the switches starts.

66:23 protocol. And depending upon the switch has different amount of buffers. So

66:31 you optimize things for the next Depends on the particular speeches. Uh

66:43 And then also some of yeah software me. I may run on top

66:59 support removed uh direct memory access so several practice in the processor and expects

67:08 and so on that. He just the minimum number of cycles for the

67:13 for access other processes that they think the memory director senate basis and the

67:23 memory person Oh, I found out answer the question. That's what the

67:32 hearing stage with the positive, you , next time and lots of

67:44 I am not. Yeah, different are how uh yeah, probability of

68:02 NPR that's kind of more or less of the er itself joint as far

68:09 annoying. It was all in conversations the discovery americans figure out well switch

68:17 that are I think in that case opportunity and you figure what knowledge want

68:27 hurt. I don't uh that's a question because that what you're asking and

68:38 students trying to figure out and so now state of the art,

68:48 immigrants, which is, um, fits the vendors of big networks for

68:58 performance, these customs, they have own software for congestion control during that

69:16 to be some people for reactive because is that something has gone back and

69:24 can try to prove it and others trying to be proactive. four things

69:32 congested, charge balance ability, network , airports. Yeah. Traditionally,

69:41 of them they need to use the table, but they're there if you

69:45 to go to that destination, it's wants to know that small, attractive

69:50 track of the traffic patterns before or . And I'll talk about that.

70:00 that sort of if there's time I talk, but it was the head

70:09 the party for some time because, . No, it's a lot.

70:19 , uh, let me just make few more comments and then I'll talk

70:24 about the next step that it was communication Set up the context 1st.

70:30 so what it is, Yes. like, uh, broadcast reduction.

70:40 the opposite of broadcasting sometimes and got scatter operations for you distribute things

70:49 So let's try to, I think next month conduct together standard operation

70:55 So the broadcasting station, Yes, in some stuff for you enforcement reduction

71:09 , it's something different. Okay, going to do the opposite.

71:18 Foreign conference data. You want to the data and on Tuesday let's work

71:25 . Conflict is old different parts of work. So that's something Yeah.

71:32 their spreading into abusive. Yeah, both. So these are known as

71:40 computation in the sense that it is . Yeah. Other ones that send

71:47 disappointed .1 step to the receiver. those numbers of the form communication,

71:53 is kind of a little competition. . All right. Uh, so

72:03 are um, a barrier notion of that you need sometimes to synchronize and

72:14 that day comes people so talk about or sometimes who for incremental investments,

72:27 . It's a dedicated effort in some they don't use it all on

72:32 So sometimes in the past that's at three efforts. There's one for system

72:38 doesn't appear with data communication. There's important communication will step out and then

72:47 another one for synchronization Many times three efforts. So it's like I think

73:02 goes on there are your best Pizza . That tends to be the thing

73:06 goes the data communication. That is , high landed management is typically just

73:13 infinite communication of very high speed and synchronization. That doesn't take many

73:23 That's various sort of the network, it's important that is turn it all

73:31 and see. So that's why the types of networking. Uh no justice

73:38 serious high performance computers. The next slides is just illustrate thing again,

73:46 we already saw the other cartoon slides what it is in terms of

73:51 And we have the example of what broadcast is. There's so much remarkable

73:59 to say about that. Several things reduction where they have a notion more

74:05 examples and then the cartoonists frontline and such as what they uh huh.

74:13 are not for the reduction. And an example of that. And

74:19 we have had this same example for empty in terms of computing device and

74:24 it how you do the same thing work on an empty and then we

74:29 a couple of examples together scanner but not different from the other side a

74:33 bit. Just details the wanted and think that's pretty much it for

74:44 Uh stop there any more questions. saw that main concept in the numbers

74:54 governments, other cities. Uh huh to memory references is very expensive

75:05 Yes. Yeah. Fact that veterans the bus, it's all part of

75:12 with the information that how I implement fact that company. Mm Yeah,

75:24 through there about the cut. So former health something more more and more

75:32 what's been produced with annual his But the first time of course.

75:44 yes, all kinds of ways. efforts. Thanks disseminate. Tell you

75:52 you wanted to do. My sources priorities. Sign something and stuff.

76:01 are things you don't need to worry it because the social members, all

76:06 that's local and it's just memory Yeah, They have an everything.

76:12 next move. Okay. Thank you today. Oh, that's the

76:30 Probably right.

-
+