Merits of message passage-shared memory, Computer Networking

  • Gives excellent low-level control of parallelism;
  • Portable;
  • Minimal overhead in data distribution and parallel synchronisation; and
  • It is less error prone.

Drawbacks

Message-passing code generally needs more software overhead than parallel shared-memory code.

Shared Memory

In shared memory approach, more focus is on the control parallelism in its place of data parallelism. In this model, many processes run independently on different processors, but they share a common address space accessible to all as shown in Figure.

1238_Shared memory.png

                                                                              Shared memory

The processors communicate with one another by one processor reading data into a location in memory and another processor writing the data. Any modification in a memory location effected by one processor is visible to all other processors. As shared data can be accessed by more than one process at the similar time, some control mechanism such as semaphores / locks should be devised to make sure mutual exclusion. This model is often referred to as SMP (Symmetric Multi Processors), named so because a common symmetric implementation is used for several processors of the similar type to access the same shared memory.  A number of multi-processor systems executes a shared-memory programming model; examples includes: SGI Power Onyx/ Origin 2000; NEC SX-5, Hewlett-Packard V2600/HyperPlex; SUN HPC 10000 400 MHz; DELL PowerEdge8450.

Posted Date: 3/2/2013 7:02:44 AM | Location : United States







Related Discussions:- Merits of message passage-shared memory, Assignment Help, Ask Question on Merits of message passage-shared memory, Get Answer, Expert's Help, Merits of message passage-shared memory Discussions

Write discussion on Merits of message passage-shared memory
Your posts are moderated
Related Questions
Can you define the architecture of TCP IP Protocol?

Physical Media In order  to define what is meant by a physical medium let us reflect on the brief life of a bit. Consider  a bit travelling from one end system through a serie

What are the two types of Transmission Technology available in ccna? Ans) Point - to - Point and Broadcast are the Two types of Transmission Technology available in CCNA

Recognize the command to disable CDP on an interface Ans) Router(config-if)# no cdp enable

a)  What does the "CD" mean in the CSMA/CD? How is it implemented in the Ethernet?   b)  Consider an Ethernet hub with 8 ports and an Ethernet switch with 8 ports. In both cases


The following DNA sequences are extracted from promoter region of genes which are co-regulated by the same transcription factor (TF). The nucleotide segments capitalized in the giv

Single-cell wireless LAN All of the wireless end systems are within range of a single control module. Multiple-cell wireless LAN: there are many control modules interlinked by

Question: (a) How can governments provide the mobile industry with the long-term clarity and certainty it needs to make substantial capital investments in new networks? (b)

An FDDI frame or Token Ring frames those points to serious problem with the ring, like a broken cable. The beacon frame carries the address of the station thought to be down.