Merits of message passage-shared memory, Computer Networking

  • Gives excellent low-level control of parallelism;
  • Portable;
  • Minimal overhead in data distribution and parallel synchronisation; and
  • It is less error prone.

Drawbacks

Message-passing code generally needs more software overhead than parallel shared-memory code.

Shared Memory

In shared memory approach, more focus is on the control parallelism in its place of data parallelism. In this model, many processes run independently on different processors, but they share a common address space accessible to all as shown in Figure.

1238_Shared memory.png

                                                                              Shared memory

The processors communicate with one another by one processor reading data into a location in memory and another processor writing the data. Any modification in a memory location effected by one processor is visible to all other processors. As shared data can be accessed by more than one process at the similar time, some control mechanism such as semaphores / locks should be devised to make sure mutual exclusion. This model is often referred to as SMP (Symmetric Multi Processors), named so because a common symmetric implementation is used for several processors of the similar type to access the same shared memory.  A number of multi-processor systems executes a shared-memory programming model; examples includes: SGI Power Onyx/ Origin 2000; NEC SX-5, Hewlett-Packard V2600/HyperPlex; SUN HPC 10000 400 MHz; DELL PowerEdge8450.

Posted Date: 3/2/2013 7:02:44 AM | Location : United States







Related Discussions:- Merits of message passage-shared memory, Assignment Help, Ask Question on Merits of message passage-shared memory, Get Answer, Expert's Help, Merits of message passage-shared memory Discussions

Write discussion on Merits of message passage-shared memory
Your posts are moderated
Related Questions
Explain the Forward congestion avoidance process Notifies the user that congestion avoidance process should be initiated where applicable for traffic in the similar direction a

What is Network Architecture? When two or more computer are linked with one another for the purpose of communicating data electronically, besides physical connection of comput

Q. Show the steps used at sender end by check sum? The sender follows these steps: The data unit is divided into "k" sections, each off "n" bits All sections ar

Q. Show VPNs Security and the Internet Model? - VPN's Security and the Internet Model - Application layer - provide for each application protocol (other layers may be left v


802.11a OFDM a) Orthogonal frequency-division multiplexing utilizing a 5-GHz band b) Same as FDM except all sub bands are used by only one source at a given time c)  Secu

Question: (a) Suppose that you are a communication engineer and you have to construct a mobile telephone network with bandwidth W = 4.2 MHz in each link. The data rate is

a transperent switch is inserted between two local area networks ABC and XYZ.network ABC has workstation 1,2,and 3 and Network XYZ has workstation 4,5, and 6. show the contents of

Performance Running on  inexpensive  hardware oracle web cache  increase the  throughput of  website  by several  orders of magnitude. In  addition  oracle web cache  signific