Shared memory and distributed memory, Computer Engineering

Shared Memory

Refers to the memory part of a computer system in which the memory can processed directly by any of the processors in the system.

Distributed Memory

Refers to network based memory in which there is no general address space for the a variety of memory modules consist of the memory system of the (networked) system. Generally, a processor or a collection of processors have some memory module connected with it, independent of the memory modules connected with other processors or group of processors.

 

Posted Date: 3/1/2013 5:42:54 AM | Location : United States







Related Discussions:- Shared memory and distributed memory, Assignment Help, Ask Question on Shared memory and distributed memory, Get Answer, Expert's Help, Shared memory and distributed memory Discussions

Write discussion on Shared memory and distributed memory
Your posts are moderated
Related Questions
Question 1 Why is it important that an expert system be able to explain why and how questions related to a problem solving session. 2 Give the architecture of an Expert syst

What is Boundary Scan?  Boundary scan is a board level design method that provides test access to the input and output pads of ICs on PCBs. Boundary scan changes the IO circuit

Q. Explain Magnetic Read and Write Mechanisms? Data are recorded on and then retrieved from disk via a conducting coil called the head. In numerous systems there are two heads,

Q. Give the difference between Register and Counter. Q. Give the difference between Flip-flop and Latch. Q. Draw a set of waveforms for following signal on out-put line.

An eight stage ripple counter uses a flip-flop with propagation delay of 75 nanoseconds.  The pulse width of the strobe is 50ns.  The frequency of the input signal which can be use

a company has 4 machines to do 3 jobs.each job can be assigned to one and only machine.determine the job assignments which will minimize the total cost

Q. What do you mean by Manual Assembly? It was an old method which required the programmer to translate every opcode in its numerical machine language representation by search

State the scope of security policy The scope of security policy depends on aspects such as the size of the Intranet site, type of information hosted on it, and the number of u

How future climate/environment changes can be predicted -  Information over time is fed into a weather/climate model -  based on changes in weather patterns, carries out a s

Relocatable programs? Ans. Relocatable programs can be loaded almost anywhere inside the memory.