Advanced Computer Architecture: Optimizing Performance and Efficiency
Amdahl’s Law
- Formula: S = (1 / ((1 – f) + (f / Senhanced))), where f is the fraction, S is the system speedup, and Senhanced is the enhanced speedup factor.
- Perfect parallelism is limited by serial components.
- Small sequential portions dominate performance for large N.
- Example: For f = 0.9 and Senhanced = 10, S = 5.26.
Response Time
- Definition: Time elapsed from the start to completion of a task.
- Includes:
- Disk access, memory latency, I/O, and OS overhead.
- Formula: Tresponse = Tservice + Tqueuing
Instruction
Read MoreUnderstanding Vector Embeddings: Applications, Creation, and Similarity Search
Week 10: Vector Databases, Cloud Architecture, and Operations
Introduction: Vector embeddings are lists of numbers, a core concept in machine learning. They are central to many applications, including:
- Natural Language Processing (NLP)
- Recommendation systems
- Search algorithms
Examples of real-world systems that rely on embeddings:
- Recommendation engines
- Voice assistants
- Language translators
What Are Vector Embeddings?
Vector embeddings are lists of numbers representing complex data structures. They allow
Read MoreNetwork Topologies and Communication Methods: Key Concepts
What are LANs?
A Local Area Network (LAN) is a communication system that connects computers at high speed within a limited area, usually within the same building. A LAN consists of network hardware and software, providing the ability to share resources, including software, information, hard drives, directories, and printers.
What is a MAN?
A Metropolitan Area Network (MAN) is used to interconnect LANs. They are not geographically limited in size and often need to interface with special hardware, telephone
Read MoreNoSQL and MongoDB: Scalable Database Solutions
Week 7: NoSQL
What is Big Data?
Scale – Dimensions
- Workload – Number of concurrent sessions and operations
- Operation mix (create, read, update, delete)
- Read – query mix
- Generally, each system use case represents a distinct workload
- Data Sets – Volume, Velocity, Variety
- Number of records
- Record size
- Record structure (e.g., sparse records)
- Homogeneity/heterogeneity of structure/schema
- Elasticity
- Runtime peaks and valleys – how frequently, how quickly, how much
Scalability
“Scalability is the ability
Read MoreSecure API Authentication with JWT and Microservices Architecture
Week 6: Secure Authentication Using JWT for APIs
Cloud Account – Billing Purpose // DB Account – DB Access
Implementing Secure Authentication Using JWT for APIs
Goal: Implement secure authentication using JWT (JSON Web Tokens) for managing API access.
Topics Covered:
- JWT Generation
- JWT Validation
- JWT Integration with API Endpoints
- Security Best Practices
JWT Generation
Steps:
- Install PyJWT library:
pip install pyjwt
- Configure the JWT secret, header, and payload.
Summary of HS256 – Encrypts and Gives Symmetry
Read MoreAPI Design: Comparing gRPC, OpenAPI, and REST
Topic 4: API Design
Understanding gRPC, OpenAPI, and REST in API Design
Introduction
- Two primary models for API design: RPC [Procedure] and REST [Entity]
- Most modern APIs map to the HTTP protocol
- RPC API designs often adopt ideas from HTTP
- This presentation explains the choices and provides guidance
gRPC Overview
- gRPC: Technology for implementing RPC APIs using HTTP 2.0
- RPC model: Addressable entities are procedures, data hidden behind procedures
- HTTP model: Addressable entities are data entities (resources)