Processor arrangements-array, Computer Networking

Assignment Help:

Processor Arrangements

It is a very frequent event in data parallel programming to group a number of processors to perform definite tasks. To reach this goal, HPF gives a directive called PROCESSORS directive. This directive declares a conceptual processor grid. In other words, the PROCESSORS directive is used to show the shape and size of an array of abstract processors. These do not have to be of the similar shape as the underlying hardware. The syntax of a PROCESSORS directive is:

!HPF$ PROCESSORS  array_name (dim1, dim 2, ....dim n)

Where  array_name is collective name of abstract processors. dim i specifies the size of ith

dimension of array_name.

Example 2:

!HPF$ PROCESSORS P (10)

This introduce a set of 10 abstract processors, assigning them the collective name P.

!HPF$ PROCESSORS Q (4, 4)

It introduces 16 abstract processors in a 4 by 4 array.

 


Related Discussions:- Processor arrangements-array

Switching via memory - network layer and routing , Switching  via memory ...

Switching  via memory Traditional  computers with switching  between  input and output  being  doen under  direct  control  of the CPU input and output  ports  functioned as tr

Broadcast domain and collision domain, Explain Difference between broadcast...

Explain Difference between broadcast domain and collision domain? Ans) Broadcast Domain Send the packet to all the Present Network IT might be send by the person It mig

Security - fundamentals of networks, Security Security  is the  protec...

Security Security  is the  protection of hardware software and data  from  unauthorized access. Restricted physical  access to computer password protection limiting  user priv

What is backbone network, What is backbone network? A backbone network ...

What is backbone network? A backbone network is a centralized infrastructure that is intended to distribute dissimilar routes and data to various networks. It also handles mana

Explain the types of security service, Q. Explain the Types of Security Ser...

Q. Explain the Types of Security Service? Security Services fall into one of the subsequent categories - Confidentiality: Confirms that the info in a system and transm

State about the future of the intranet, Future of the intranet At ...

Future of the intranet At present, the world of information technology is guided bythe C 3 paradigm that stands for Command, Control and Communication, which is normally

What is the full form of FDM and TDM, What is the full form of FDM and TDM ...

What is the full form of FDM and TDM It is both. Each of the 100 channels is possess its own frequency band (FDM), and on every channel two logical streams are intermixed by th

What are triggers and rules, What are Triggers and Rules? Triggers are...

What are Triggers and Rules? Triggers are special user defined actions generally in the form of stored processes that are automatically invoked by the server based on data rel

Reliable data transfer - transport layer, Reliable Data Transfer Figur...

Reliable Data Transfer Figure illustrate the  framework for reliable  transfer. The service  abstraction provided  to the upper  layer  entities is that  of a reliable channel

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd