Intrinsic functions, Computer Networking

Intrinsic Functions

HPF introduces some new intrinsic functions in addition to those defined in F90. The two most regularly used in parallel programming are the system inquiry functions PROCESSORS_SHAPE and NUMBER_OF_PROCESSORS  . These functions gives the information about the number of physical processors on which the running program implements and processor configuration. General syntax of is

NUMBER_OF_PROCESSORS is

NUMBER_OF_PROCESSORS (dim)

where dim is an optional argument. It returns the number of processors in the underlying array or, if the optional argument is present, the size of this array along a shows dimension.

General syntax of  PROCESSORS_SHAPE is

PROCESSORS_SHAPE()

It returns an one-dimensional array, whose  ith element provides the size of the underlying processor array in its ith dimension.

 Example 10

Consider the call of the two intrinsic functions discussed above for a 32-Processor (4×8) Multicomputer:

The function call NUMBER_OF_PROCESORS () will return 32. The function call NUMBER_OF_PROCESORS (1) will return 4. The function call NUMBER_OF_PROCESORS (2) will return 8.

The function call PROCESSORS_SHAPE () will return an array with two elements 4 and 8.

We can use these intrinsic functions in tandem with array declarations and HPF directives, to give flexibility to the programmer to declare abstract processor arrays that match available physical resources. For example, the following statement! HPF$ PROCESSORS P(NUMBER_OF_PROCESSORS()) declares an abstract processor array P with size equivalent to the number of physical processors.

Posted Date: 3/2/2013 8:13:56 AM | Location : United States







Related Discussions:- Intrinsic functions, Assignment Help, Ask Question on Intrinsic functions, Get Answer, Expert's Help, Intrinsic functions Discussions

Write discussion on Intrinsic functions
Your posts are moderated
Related Questions
Let's consider the network shown in Figure 1 where Snort is deployed. In Figure 1, why is Snort deployed in the DMZ instead of the Internal Network? In Figure 1, say True or

Fragmentation - Wireless environment is very noisy - Corrupt frames must be retransmitted - Large frames must be divided into smaller ones to increase efficiency

Q. Show the seven layers of ISO's OSI model? Ans:- The seven layers are given below:   -  Application Layer -  Presentation Layer -  Session Layer -  Transport Laye

Discuss the interdependence of networking hardware and software. Is it possible to have one without the other? Explain

Given the address 172.16.2.120 and the subnet mask of 255.255.255.0. How many hosts are available? Ans) 172.16.2 120 is a standard Class B address with a subnet mask that permit

What are the disadvantages of bus topology? The disadvantages of bus topology are: a. The bus networks are dissimilar to reconfigure, especially when the acceptable number o

Local information is immediate hop routing table and distance from every switch. The switches regularly broadcast topology information i.e. distance, destination. Other switches mo

Describe Ethernet. Ethernet is one of the well-liked networking technologies used these days. It was developed during the early 1970s and is based on specifications as stated i

The FORALL Statement The FORALL statement allows for more common assignments to sections of an array. A FORALL statement has the general form.               FORALL ( triplet

The following DNA sequences are extracted from promoter region of genes which are co-regulated by the same transcription factor (TF). The nucleotide segments capitalized in the giv