Merits of message passage-shared memory, Computer Networking

  • Gives excellent low-level control of parallelism;
  • Portable;
  • Minimal overhead in data distribution and parallel synchronisation; and
  • It is less error prone.

Drawbacks

Message-passing code generally needs more software overhead than parallel shared-memory code.

Shared Memory

In shared memory approach, more focus is on the control parallelism in its place of data parallelism. In this model, many processes run independently on different processors, but they share a common address space accessible to all as shown in Figure.

1238_Shared memory.png

                                                                              Shared memory

The processors communicate with one another by one processor reading data into a location in memory and another processor writing the data. Any modification in a memory location effected by one processor is visible to all other processors. As shared data can be accessed by more than one process at the similar time, some control mechanism such as semaphores / locks should be devised to make sure mutual exclusion. This model is often referred to as SMP (Symmetric Multi Processors), named so because a common symmetric implementation is used for several processors of the similar type to access the same shared memory.  A number of multi-processor systems executes a shared-memory programming model; examples includes: SGI Power Onyx/ Origin 2000; NEC SX-5, Hewlett-Packard V2600/HyperPlex; SUN HPC 10000 400 MHz; DELL PowerEdge8450.

Posted Date: 3/2/2013 7:02:44 AM | Location : United States







Related Discussions:- Merits of message passage-shared memory, Assignment Help, Ask Question on Merits of message passage-shared memory, Get Answer, Expert's Help, Merits of message passage-shared memory Discussions

Write discussion on Merits of message passage-shared memory
Your posts are moderated
Related Questions
Which of the following commands will display the current print jobs on a printer named Office Printer 01?

Q. Explain Dynamic Domain Name System? DDNS - Dynamic Domain Name System automatically updates the DNS master file - Sent by DHCP to a primary DNS server; secondary se

Encryption/decryption using by SSL Once a session is established, the SSL generates a session key using public-key encryption to exchange information between the client and ser

Explain how does router share information in Distance Vector routing?

Byte Number TCP number all data  bytes that  are transmitted  in a connection. Numbering  is independent  in each direction when TCP receives bytes of data  a process. It stor

Objective : After going through this part you will be sure to explain the features of software and operating systems for parallel computers. In particular you should be able

#questiGE 1-A Objectives: • Consolidate EIGRP knowledge. • Introduce the Route Redistribution concept. • Introduce the EIGRP External Routes concept. • Introduce the Default Met

Networks are more frequently being prepared to allow specification of the quality of service needed by users. For example: - a typical voice telephone call may give a QoS para

What is NVT (Network Virtual Terminal) It is a set of rules explaining a very simple virtual terminal interaction. The NVT is used in the begin of a Telnet session.

RIP It is Broadcast There is no authentication It Support FLSM   RIPV2 It is Multicast There is Authentication It Support VLSM