Example of parallel sections construct, Computer Networking

This example demonstrates the use of parallel sections construct. The three functions, fun1, fun2, and fun3, all can be executed concurrently.  Note that all the section directives need to appear in the parallel sections construct.

void fun1(); void fun2(); void fun3();

void  parallel_sec()

{

#pragma omp parallel sections

{

#pragma omp section fun1();

#pragma omp section fun2();

#pragma omp section fun3();

}

}

 

Posted Date: 3/4/2013 5:23:33 AM | Location : United States







Related Discussions:- Example of parallel sections construct, Assignment Help, Ask Question on Example of parallel sections construct, Get Answer, Expert's Help, Example of parallel sections construct Discussions

Write discussion on Example of parallel sections construct
Your posts are moderated
Related Questions
What is Round Trip Time? The duration of time it takes to send a message from one end of a network to the other and back, is known as RTT.

QUESTION Write a report to explain the concept of LAN and WAN including the various components of the telecommunication infrastructure required by UTM Ltd. You are required to

What is mesh topology Mesh topology is a setup wherein every device is linked directly to each other device on the network. Consequently, it needs that each device has at least

State the statements about PPP and SLIP for WAN communications?  Ans)    a) PPP uses its Network Control Programs (NCPs) component to encapsulate many protocols.  b) SLIP

Byte Number TCP number all data  bytes that  are transmitted  in a connection. Numbering  is independent  in each direction when TCP receives bytes of data  a process. It stor

OBJECTIVES After studying this part, you should be able to: Explain the Metrics for Performance Evaluation; Notify about various Parallel System Overheads; Desc

What is point to point link? It refers to a direct connection among two computers on a network. A point to point connection does not require any other network devices other tha


What are the threats include in computer software The second component vulnerable to threats to the system is software. Threats to software may include, but are not limited to

Monitor Stations Lost tokens - timer is issued each time a frame or token is generated If no frame is received in time period new token is generated by a monitor stat