synchronization principles of parallel programming , Computer Networking

In multiprocessing, various processors have to to communicate with each other. Therefore, synchronisation is needed between them. The correctness and performance of parallel execution depends upon efficient synchronisation between concurrent computations in multiple processes. The synchronisation problem may occur because of sharing of writable data objects between processes. Synchronisation includes executing the order of operations in an algorithm by finding the dependencies in writable data. Shared object access in an MIMD architecture needs dynamic management at run time, which is much more difficult as compared to that of SIMD architecture. Low-level synchronization primitives are executed directly in hardware. Other resources like Bus, CPU and memory unit also need synchronisation in Parallel computers.

To study the synchronization, the following dependencies are identified:

i)  Data Dependency:  These are RAW,WAR and WAW dependency.

ii) Control dependency: These depend upon control statements like IF THEN, GO TO, etc.

iii)Side Effect Dependencies:  These arise due to Traps, exceptions, I/O accesses. For the proper implementation order as enforced by correct synchronization, program dependencies must be analyzed properly. Protocols like wait protocol and sole access protocol are used for doing synchronization.

 

Posted Date: 3/4/2013 5:30:42 AM | Location : United States







Related Discussions:- synchronization principles of parallel programming , Assignment Help, Ask Question on synchronization principles of parallel programming , Get Answer, Expert's Help, synchronization principles of parallel programming Discussions

Write discussion on synchronization principles of parallel programming
Your posts are moderated
Related Questions
IGRP uses flash updates, poison reverse updates, hold down times, and divide horizon. How often does it broadcast its routing table updates? Ans) 90 seconds

Q. Permutation representation through Matrix? Figure: Clos Network The functioning of this above permutation is displayed in Figure. This permutation is able to

This assignment will assess parts of objectives 2-6 from the subject outline: 1 Explain the principles of logical design 2 Discuss the strengths and weaknesses of various net

This example demonstrates the use of parallel sections construct. The three functions, fun1, fun2, and fun3, all can be executed concurrently.  Note that all the section directives

Quality assurance through statistical methods is a key component in a manufacturing organization where TQM generally starts by sampling a random selection selection of th

Question 1 What is bandwidth?                         >>What is the bandwidth of                            a) Telephone signal                            b) Commercial radio broa

Q. What are the trends in Network Security ? Trends in Network Security Improved vigilance for virus infections Continual maturation of firewall technologies

Single company or organization owns this. They are usually LAN technologies. There can be multiple LANs in a campus or building linked together. They are sometimes known Intranet.

a) Manages protocol access to the physical network medium b) Permits multiple devices to uniquely signify one another on the data link layer

One of the key roles of a System/Network Administrator is to monitor log files. This usually requires helper scripts (i.e. Perl programs) so a summary of large log files can be qui