Intrinsic functions, Computer Networking

Intrinsic Functions

HPF introduces some new intrinsic functions in addition to those defined in F90. The two most regularly used in parallel programming are the system inquiry functions PROCESSORS_SHAPE and NUMBER_OF_PROCESSORS  . These functions gives the information about the number of physical processors on which the running program implements and processor configuration. General syntax of is



where dim is an optional argument. It returns the number of processors in the underlying array or, if the optional argument is present, the size of this array along a shows dimension.

General syntax of  PROCESSORS_SHAPE is


It returns an one-dimensional array, whose  ith element provides the size of the underlying processor array in its ith dimension.

 Example 10

Consider the call of the two intrinsic functions discussed above for a 32-Processor (4×8) Multicomputer:

The function call NUMBER_OF_PROCESORS () will return 32. The function call NUMBER_OF_PROCESORS (1) will return 4. The function call NUMBER_OF_PROCESORS (2) will return 8.

The function call PROCESSORS_SHAPE () will return an array with two elements 4 and 8.

We can use these intrinsic functions in tandem with array declarations and HPF directives, to give flexibility to the programmer to declare abstract processor arrays that match available physical resources. For example, the following statement! HPF$ PROCESSORS P(NUMBER_OF_PROCESSORS()) declares an abstract processor array P with size equivalent to the number of physical processors.

Posted Date: 3/2/2013 8:13:56 AM | Location : United States

Related Discussions:- Intrinsic functions, Assignment Help, Ask Question on Intrinsic functions, Get Answer, Expert's Help, Intrinsic functions Discussions

Write discussion on Intrinsic functions
Your posts are moderated
Related Questions
FRAME FILTERING:  The very important task a bridge operates is frame filtering. If both the destination and source are on the same segment, it does not repeat the frame to the

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Question 1: Describe the following terms in your own words: a. Internet b. WWW c. Intranet

Question : a) Explain why pervasive computing can be termed as a "technology that disappears". b) List and briefly explain four main components of a MOTE used in Wireless

What are the different types of network topologies

What utility can you use to see the path a packet takes through an internetwork? Ans) Trace - Uses Time-To-Live (TTL) values to make messages from each router used along the pat

IP plus port (IP on layer 3 and port on Layer 4 - In Encapsulation, socket base decision on Network Layer -Layer 3)

Describe difference among Single path and Multipath?

INDEPENDENT Loops HPF gives additional opportunities for parallel implementation by using the INDEPENDENT directive to assert that the iterations of a do-loop can be done indep