Parallel random access machines, Computer Networking

PRAM is one of the models used for designing the parallel algorithm as given in Figure. The PRAM models have the following components:

  • A set of identical type of processors state P1, P2, P3 ...Pn.
  • It contains a single shared memory module being shared by all the N processors. As the processors can't communicate with each other directly, shared memory acts as a communication medium for the processors.
  • In direct to connect the N processor with the single shared memory, a component called Memory Access Unit (MAU) is used for accessing the shared memory.

2210_PRAM Model.png

                                                                     PRAM Model

The Following steps are followed by a PRAM model while implementing an algorithm:

i)  Read phase: Firstly, the N processors concurrently read data from N different memory locations of the shared memory and subsequently save the read data into its local registers.

ii)  Compute phase: After that, these N processors perform the logical or arithmetic operation on the data stored in their local registers.

iii) Write phase: Lastly, the N processors parallel write the computed values from their local registers into the N memory locations of the shared memory.

Posted Date: 3/2/2013 6:34:47 AM | Location : United States







Related Discussions:- Parallel random access machines, Assignment Help, Ask Question on Parallel random access machines, Get Answer, Expert's Help, Parallel random access machines Discussions

Write discussion on Parallel random access machines
Your posts are moderated
Related Questions

LAN HARDWARE AND PACKET FILTERING: The diagram below explain the LAN hardware LAN INTERFACE:  LAN interface operates all details of frame reception and transmis

3.  Explain how you would pipeline the four following pairs of statements.  (4×5 points) a)  add $t0, $s0, $s1 beq $s1,$s2, 300 b)  add $t2, $t0, $t1 sw $t3, 36($t2) c)

What is General Middleware in client server environment? Ans) It having the communication stacks, distributed directories, authentication services, network time, RPC, Queuing se

PARTS COUNT METHOD This prediction method is applicable at preliminary stages, during bid proposal and early design phases; when insufficient information is available regardin

Question The operational amplifier in the peak detector circuit shown in the figure below is powered from plus and minus 15 V. If Vout is at 1V and Vin is at 0.5V, at approxima

The steps of forwarding the packets of information is known routing. The information about receivers is saved in routing tables. Note that several entries have same next hop. It is

The progress of any industry and indeed countries as well, today is linked to the effective performance of its equipments, processes and systems. Reliability engineering, not only

if the signal input to an amplifier is 0 dBm what is the power output in mW if the gain of the amplifier is 20 dB ?

State the Example of security audit as case study Linda narrates one of her experience about a security audit. She was performing a spot audit where she was checking certain