Merits of message passage-shared memory, Computer Networking

  • Gives excellent low-level control of parallelism;
  • Portable;
  • Minimal overhead in data distribution and parallel synchronisation; and
  • It is less error prone.

Drawbacks

Message-passing code generally needs more software overhead than parallel shared-memory code.

Shared Memory

In shared memory approach, more focus is on the control parallelism in its place of data parallelism. In this model, many processes run independently on different processors, but they share a common address space accessible to all as shown in Figure.

1238_Shared memory.png

                                                                              Shared memory

The processors communicate with one another by one processor reading data into a location in memory and another processor writing the data. Any modification in a memory location effected by one processor is visible to all other processors. As shared data can be accessed by more than one process at the similar time, some control mechanism such as semaphores / locks should be devised to make sure mutual exclusion. This model is often referred to as SMP (Symmetric Multi Processors), named so because a common symmetric implementation is used for several processors of the similar type to access the same shared memory.  A number of multi-processor systems executes a shared-memory programming model; examples includes: SGI Power Onyx/ Origin 2000; NEC SX-5, Hewlett-Packard V2600/HyperPlex; SUN HPC 10000 400 MHz; DELL PowerEdge8450.

Posted Date: 3/2/2013 7:02:44 AM | Location : United States







Related Discussions:- Merits of message passage-shared memory, Assignment Help, Ask Question on Merits of message passage-shared memory, Get Answer, Expert's Help, Merits of message passage-shared memory Discussions

Write discussion on Merits of message passage-shared memory
Your posts are moderated
Related Questions
CAUSES OF FAILURES Every failure has a well-defined cause.  Any system or device has an inherent strength or capacity to resist failures. This depends on design, material, man

Q. Illustrate Network Layer in osi layers model? Network Layer :  This is responsible for addressing messages and data so they are sent to the required destination, and for tr

Cut-Through is the best mode of switching. Store and Forward reads in the whole frame, confirms the frame is valid, and then forwards the frame onto the wire. Cut-Through only chec

iLab 2: Office Network Expansion Connect to the iLab here. Submit your assignment to the Dropbox located on the silver tab at the top of this page. (See "Due Da

What are the Data link protocols? Data link protocols are sets of specifications used to implement the data link layer. The categories of Data Link protocols are 1. Asynchro

Assume a network as depicted below with a home agent (HA), a foreign agent (FA), a mobile host (MH), and a remote host (RH). The dotted box is the home location of MH. Assume MH's

What do you mean by OSI? The Open System Interconnection (OSI) reference model explains how information from a software application in one computer moves by a network medium to

What is SAP? Series of interface points that permit other computers to interact with the other layers of network protocol stack is known as SAP.

What is an Object server? With an object server, the Client/Server application is printed as a set of communicating objects. Client object converse with server objects using an

Q. Error Correction in Burst Error Correction? Error Correction-Burst Error Correction In its place of sending all the bits in a data unit together we can organize "N