Merits of message passage-shared memory, Computer Networking

  • Gives excellent low-level control of parallelism;
  • Portable;
  • Minimal overhead in data distribution and parallel synchronisation; and
  • It is less error prone.

Drawbacks

Message-passing code generally needs more software overhead than parallel shared-memory code.

Shared Memory

In shared memory approach, more focus is on the control parallelism in its place of data parallelism. In this model, many processes run independently on different processors, but they share a common address space accessible to all as shown in Figure.

1238_Shared memory.png

                                                                              Shared memory

The processors communicate with one another by one processor reading data into a location in memory and another processor writing the data. Any modification in a memory location effected by one processor is visible to all other processors. As shared data can be accessed by more than one process at the similar time, some control mechanism such as semaphores / locks should be devised to make sure mutual exclusion. This model is often referred to as SMP (Symmetric Multi Processors), named so because a common symmetric implementation is used for several processors of the similar type to access the same shared memory.  A number of multi-processor systems executes a shared-memory programming model; examples includes: SGI Power Onyx/ Origin 2000; NEC SX-5, Hewlett-Packard V2600/HyperPlex; SUN HPC 10000 400 MHz; DELL PowerEdge8450.

Posted Date: 3/2/2013 7:02:44 AM | Location : United States







Related Discussions:- Merits of message passage-shared memory, Assignment Help, Ask Question on Merits of message passage-shared memory, Get Answer, Expert's Help, Merits of message passage-shared memory Discussions

Write discussion on Merits of message passage-shared memory
Your posts are moderated
Related Questions
The hotel has a class C public address space. The network number is 203.220.72.0/24. The hotel provides a number of eatery, office, accommodation and conference like services. This

These are fully-loaded machines which consists of multiprocessors, high-speed disk arrays for interview I/O and fault tolerant features.


What metrics are used by routing protocols to verify the best path?

What are the features of Intranet Intranets provide access to electronic databases, documents, electronic training manuals, office circulars, internal job vacancies, etc. Any t

Q. Illustrate the Drawbacks of stop and wait? Drawbacks of stop and wait - Only one frame is able to be in transit at a time - After every frame sent the host must wai

Categorization according to kind of instruction and data According to types of instruction and data subsequent types are identified under this classification: Scalar Pi

A UDP header does not have Sequence number and Acknowledgement number fields. Is it an advantage or a disadvantage? Explain your answer in detail. User Datagram Protocol Th

Simple Mail Transfer Protocols (SMTP) The application  layer  protocols  for electronic  mail is SMTP( Simple mail  transfer protocols). Internet  electronic  mail  has man

Determine the concept of placing antenna on hieght First, starting deployment simply placed cells in regions where there was high density of vehicle or human population. Once t