synchronization principles of parallel programming , Computer Networking

In multiprocessing, various processors have to to communicate with each other. Therefore, synchronisation is needed between them. The correctness and performance of parallel execution depends upon efficient synchronisation between concurrent computations in multiple processes. The synchronisation problem may occur because of sharing of writable data objects between processes. Synchronisation includes executing the order of operations in an algorithm by finding the dependencies in writable data. Shared object access in an MIMD architecture needs dynamic management at run time, which is much more difficult as compared to that of SIMD architecture. Low-level synchronization primitives are executed directly in hardware. Other resources like Bus, CPU and memory unit also need synchronisation in Parallel computers.

To study the synchronization, the following dependencies are identified:

i)  Data Dependency:  These are RAW,WAR and WAW dependency.

ii) Control dependency: These depend upon control statements like IF THEN, GO TO, etc.

iii)Side Effect Dependencies:  These arise due to Traps, exceptions, I/O accesses. For the proper implementation order as enforced by correct synchronization, program dependencies must be analyzed properly. Protocols like wait protocol and sole access protocol are used for doing synchronization.

 

Posted Date: 3/4/2013 5:30:42 AM | Location : United States







Related Discussions:- synchronization principles of parallel programming , Assignment Help, Ask Question on synchronization principles of parallel programming , Get Answer, Expert's Help, synchronization principles of parallel programming Discussions

Write discussion on synchronization principles of parallel programming
Your posts are moderated
Related Questions
Bridged Ethernet Raises bandwidth by dividing the network into smaller networks allowing concurrent communications Separates collision domains because traffic is lower

DNS in the Internet -Domain name space is split into three sections: country, generic and inverse -Generic domains define hosts by generic behavior -Country domains are

Distance vector-based routing algorithms (also called as Bellman-Ford algorithms) pass periodic copies of a routing table from router to router. Regular updates among routers commu

Transparency really means adumbrating the network and its servers from the users and even the application programmers.


Cable, Erase, and Reload the Router Step 1: Cable the network. Cable a network that is same to the one in the topology diagram. Step 2: Clear the configuration on the rou

List the layers of OSI There are seven layers in OSI model a. Physical Layer b. Data Link Layer c. Network Layer d. Transport Layer e. Session Layer f. Presen

Determine about the TCP/IP and OSI model Both models are based on the layered protocols. Both comprise network, transport and application layer. In both the models, transport s

State about data and data files - Information The third and major component of the system liable to be attacked is the data and data files used by the company. It is the most s

Q. Illustrate Nonboundary-Level Masking with example? Nonboundary-Level Masking Example IP address 45 123 21 8 Mask 255 192 0 0 Subnet 45 64 0 0 123 0