Processor arrangements-array, Computer Networking

Processor Arrangements

It is a very frequent event in data parallel programming to group a number of processors to perform definite tasks. To reach this goal, HPF gives a directive called PROCESSORS directive. This directive declares a conceptual processor grid. In other words, the PROCESSORS directive is used to show the shape and size of an array of abstract processors. These do not have to be of the similar shape as the underlying hardware. The syntax of a PROCESSORS directive is:

!HPF$ PROCESSORS  array_name (dim1, dim 2, ....dim n)

Where  array_name is collective name of abstract processors. dim i specifies the size of ith

dimension of array_name.

Example 2:

!HPF$ PROCESSORS P (10)

This introduce a set of 10 abstract processors, assigning them the collective name P.

!HPF$ PROCESSORS Q (4, 4)

It introduces 16 abstract processors in a 4 by 4 array.

 

Posted Date: 3/2/2013 7:55:10 AM | Location : United States







Related Discussions:- Processor arrangements-array, Assignment Help, Ask Question on Processor arrangements-array, Get Answer, Expert's Help, Processor arrangements-array Discussions

Write discussion on Processor arrangements-array
Your posts are moderated
Related Questions
Control Frames for Lost Tokens If station goes down ... token lost Predecessor listens for data frame or token Noticing none, retransmits token Sends whofoll


Question 1: (a) How are IPv4 addresses transformed into IPv6 addresses using IPv4 compatible addresses? (b) Name some of the simplifications that were introduced in IPv6.

Q. Explain about Domain Name System? -In the past, mapping of IP addresses was static using a host file -Impossible in today's dynamic environment -Domain Name System (DN

A Comparative Study between MPLS VPN and the Public Internet which has intro. operation of tecnology, analysis, discussion, recommendation, conclusion.

UDP Segment Structure The  primary  purpose  of the UDP protocols  is to expose datagram's to the application  layer. The UDP protocols does very  little and therefore  employ



Difference between Authentication and Deauthentication Authentication: Used to establish the self of stations to each other. Deauthentication: This service is appealed whene

LAN HARDWARE AND PACKET FILTERING: The diagram below explain the LAN hardware LAN INTERFACE:  LAN interface operates all details of frame reception and transmis