Data alignment in processor arrangements, Computer Networking

Data Alignment

Arrays are aligned to templates by the ALIGN directive. The ALIGN directive is used to align elements of different arrays with each other, indicating that they should be spreaded in the similar manner. The syntax of an ALIGN derivative is:

!HPF$ ALIGN array1 WITH array2

where array1 is the name of array to be aligned and array2 is the array to be aligned to.

Example 6

Consider the statement

ALIGN A[i] WITH B[i]

This statement aligns each A[i] with B[i] as shown in Figure.

1980_ALIGN A[i] WITH B[i].png

                                                                                                                        ALIGN A[i] WITH B[i]

Consider the statement

ALLIGN A[i] WITH B[i+1]

This statement aligns the each A[i] with B[i+1] as shown in Figure.

2141_ALIGN A[i] WITH B[i+1].png

                               ALIGN A[i] WITH B[i+1]

* can be used to fall down the dimensions. Consider the statement

ALLIGN A[:, *] WITH B[:]

This statement aligns two dimensional array with one dimensional array by collapsing as shown in Figure.

1355_alignmen.png

                                                                                                     Alignmen

Posted Date: 3/2/2013 8:10:53 AM | Location : United States







Related Discussions:- Data alignment in processor arrangements, Assignment Help, Ask Question on Data alignment in processor arrangements, Get Answer, Expert's Help, Data alignment in processor arrangements Discussions

Write discussion on Data alignment in processor arrangements
Your posts are moderated
Related Questions
Q. What is Multimode Graded-Index Fiber? - Ever since the core density decreases with distance from the centre the light beams refract into a curve - Eliminates problem with

Can you describe in a generic manner the packet of IPSec

The Physical layer deals with the definite physical medium and the method of transporting 1s and 0s.

What is anonymous FTP and why would you use it Anonymous FTP enables users to join to a host without using a valid login and password. Generally, anonymous FTP uses a login kno

.test a number to be prime number in network security

Layers, Massages, Segments, Datagram's and Frames Figure 2.15 show the physical  path data takes down a  sending  end  systems  protocol  stack up and  down the  protocol stac

Some of the ?elds of IP and ICMP datagrams will be ?xed, some will be settable by the application, and others will computed according to the situation. You must set all ?elds of th

Receive Window This  field  defines the size  of the  window in bytes  that the  other party  must  maintain. Note  that the  length  of this  field 16 bits  which  means

Q. Show Upper Layers of tcp-ip model? The Session Layer - The Session layer allows two parties to hold ongoing communications called a session across a network. - Not

A network in which there is multiple network links among computers to provide multiple paths for data to travel.