Merit and drawback of mpi, Computer Networking

Merits of MPI

  • Runs on any shared or distributed memory architectures;
  • Can be used on a wider range of troubles than OpenMP;
  • Every process has its own local variables; and
  • Distributed memory computers are not costly rather than large shared memory computers.

Drawback of MPI

  • Needs more programming changes to go from serial to parallel version.
  • Can be harder to debug, and
  • Performance is partial by the communication network among the nodes.

 

Posted Date: 3/2/2013 7:14:20 AM | Location : United States







Related Discussions:- Merit and drawback of mpi, Assignment Help, Ask Question on Merit and drawback of mpi, Get Answer, Expert's Help, Merit and drawback of mpi Discussions

Write discussion on Merit and drawback of mpi
Your posts are moderated
Related Questions
Transition Phases A PPP connection goes through phases  which can be  shown in a transition phase . Dead: In  the dead phase  the link is not  being used. There is  no ac

objective practical questios answers

What Automatic Repeat Request (ARQ)? Error control is both error detection and error correction. It allows the receiver to inform the sender of any frames lost or damaged in tr

Q. Explain the Public-Key Cryptography? Public-Key Cryptography - Each user has the same encryption algorithm and key - Decryption algorithm also key are kept secret

Which layers are user support layers? Three layers are come under user support layer:- a. Session Layer b. Presentation Layer and c. Application Layer

Prepare the Network Step 1: Cable a network that is similar to the one in the topology diagram.  You can use any current switch in your lab as long as it has the needed inte


Network Service Model The network  service  model  defines  the characteristics of end to end  transport of data between  one edge of the  network  to the  other  that is betwe

Operating system for Server Since 1994, when the original pair of web servers - NCSA HTTPd and CERN HTTPd , were proposed, dozens of commercial and shareware programs have

Encryption Authentication One common  technique  used to encrypt and authenticate in VPNs is IP security. IP sec  is a collection of protocols designed by the IETF( Internet En