Data alignment in processor arrangements, Computer Networking

Data Alignment

Arrays are aligned to templates by the ALIGN directive. The ALIGN directive is used to align elements of different arrays with each other, indicating that they should be spreaded in the similar manner. The syntax of an ALIGN derivative is:

!HPF$ ALIGN array1 WITH array2

where array1 is the name of array to be aligned and array2 is the array to be aligned to.

Example 6

Consider the statement

ALIGN A[i] WITH B[i]

This statement aligns each A[i] with B[i] as shown in Figure.

1980_ALIGN A[i] WITH B[i].png

                                                                                                                        ALIGN A[i] WITH B[i]

Consider the statement

ALLIGN A[i] WITH B[i+1]

This statement aligns the each A[i] with B[i+1] as shown in Figure.

2141_ALIGN A[i] WITH B[i+1].png

                               ALIGN A[i] WITH B[i+1]

* can be used to fall down the dimensions. Consider the statement

ALLIGN A[:, *] WITH B[:]

This statement aligns two dimensional array with one dimensional array by collapsing as shown in Figure.

1355_alignmen.png

                                                                                                     Alignmen

Posted Date: 3/2/2013 8:10:53 AM | Location : United States







Related Discussions:- Data alignment in processor arrangements, Assignment Help, Ask Question on Data alignment in processor arrangements, Get Answer, Expert's Help, Data alignment in processor arrangements Discussions

Write discussion on Data alignment in processor arrangements
Your posts are moderated
Related Questions
How does EIGRP protocol update route information to its neighbors

SWITCHING: A switched LAN has a single electronic device that sends frames among the connected devices. A hub with several ports simulates a single shared phase. However a swi

DNS Tunneling – Domain Name Server "If, on one system, it is possible to transmit bits to another in any form, and in turn receive a reply as a result of that transmission, th

Authoritative DNS Servers Every  organization with publicly  accessible hosts  ( such  as web  server and mail  several  on the  internet  must  provide  publicly accessible D

Message Passing The PVM communication model gives asynchronous blocking receive, asynchronous blocking send and nonblocking receive functions. In our methodology, a blocking se

You are logged into a router, what command would represent you the IP addresses of routers linked to you? Ans)show cdp neighbors detail

QUESTION (a) Figure 3 below shows a reference model of the Foundations of Intelligent Physical Agents (FIPA). Explain the roles of the following components (i) Agent platfor

What is OSPF? It is an Internet routing protocol that scales well, can route traffic with multiple paths, and uses knowledge of an Internet's topology to make precise routing de

Question: a) In relation to network design, give two reasons why the building-block approach is favoured to the traditional approach. b) Explain the following steps in rela

System Deadlock A deadlock refers to the situation when simultaneous processes are holding resources and preventing each other from completing their implementation. The fol