Merits of shared memory and drawbacks, Computer Networking

Merits of Shared Memory Programming

  • Global address space gives a user-friendly programming perspective to memory.
  • Data sharing among processes is both fast and uniform due to the proximity of memory to CPUs.
  • No use to specify explicitly the communication of data between processes.
  • Insignificant process-communication overhead.
  • More easier and intuitive to learn.

Drawbacks

  • Complex to manage data locality.
  • Not portable.
  • Scalability is limited by the number of open pathways to memory.
  • User is liable for specifying synchronization, example:- locks.

 

Posted Date: 3/2/2013 7:04:53 AM | Location : United States







Related Discussions:- Merits of shared memory and drawbacks, Assignment Help, Ask Question on Merits of shared memory and drawbacks, Get Answer, Expert's Help, Merits of shared memory and drawbacks Discussions

Write discussion on Merits of shared memory and drawbacks
Your posts are moderated
Related Questions
Questions: 1. A 5V Zener diode has a maximum power dissipation of 2W. What is the maximum current that can be safely passed through the device? 2. List three properties of a

Define the term - frame and packets Frames sum up packets. When a packet arrives at data link layer, the complete packet, header, data and remaining all, is used as data field

Write the Generic Name of the OSI Layer a)  The figures below illustrate, side by side, the OSI 7-layer reference model and the Internet protocol stack. Inside each box represen

Q. Show V.32 standard? - ITU-T's V.32 standard was issued in 1991 for asynchronous and full-duplex operation at 14.4 Kbps. V.32bis - Is an extension of the V.32 technology?

XYZ company's executives have approached you to architect, design, and recommend if they should use an IP network infrastructure for all their applications. Here is some informa

Q. Define layered network model? - The OSI Reference Model is collection of seven layers every specifying particular network functions. - The process of breaking up the func

Solve the following CPM/PERT Network Analysis problem: Given the following network and activity time estimates, determine earliest and latest activity times, slack, the expecte

Q. Explain TCP-IP Routing Architecture? The TCP/IP routing architecture looks extremely much like the OSI routing architecture. Hosts utilize a discovery protocol to o

Checksum This 16 bits field contain  the checksum. The  calculation of the   checksum for TCP follows  the same  procedure as the  described for  UDP. However the inclusion

This example illustrate the use of lastprivate clause void for_loop (int n, float *a, float *b) { int i; #pragma omp parallel { #pragma omp for lastprivate(i) for