Merits of shared memory and drawbacks, Computer Networking

Merits of Shared Memory Programming

  • Global address space gives a user-friendly programming perspective to memory.
  • Data sharing among processes is both fast and uniform due to the proximity of memory to CPUs.
  • No use to specify explicitly the communication of data between processes.
  • Insignificant process-communication overhead.
  • More easier and intuitive to learn.

Drawbacks

  • Complex to manage data locality.
  • Not portable.
  • Scalability is limited by the number of open pathways to memory.
  • User is liable for specifying synchronization, example:- locks.

 

Posted Date: 3/2/2013 7:04:53 AM | Location : United States







Related Discussions:- Merits of shared memory and drawbacks, Assignment Help, Ask Question on Merits of shared memory and drawbacks, Get Answer, Expert's Help, Merits of shared memory and drawbacks Discussions

Write discussion on Merits of shared memory and drawbacks
Your posts are moderated
Related Questions
A modified NRZ code known as enhanced-NRZ (E-NRZ) operates on 7-bit words; inverting bits 2,3,6 and 7; and adding one parity bit to each word. The parity bit is chosen to make the

What Automatic Repeat Request (ARQ)? Error control is both error detection and error correction. It allows the receiver to inform the sender of any frames lost or damaged in tr

working of belmen ford algorithm

FRAME FILTERING:  The very important task a bridge operates is frame filtering. If both the destination and source are on the same segment, it does not repeat the frame to the

Determine in detail about the world wide web The latest has been Web commerce that is currently making big news, and many businesses are setting up electronic shops on the Inte


Consider a subnet with subnet prefix 101.101.101/24  a)  If you subdivide the subnet into four equal size subnets, what are their prefixes? Give all four prefixes in the form a.

Operating System - Server and Client Various operating systems that support Intranets are all variants of Windows and Unix. In addition to these, certain other software releva

Question: a) Differentiate between the following key terms used in any e-banking security system: (i) Authorisation v/s Authentication. (ii) Data Integrity v/s Data Conf

Suppose there are exactly five packet switches (Figure 4) between a sending host and a receiving host connected by a virtual circuit line (shown as dotted line in figure 4). The tr