Shared memory programming, Computer Networking

We know that all processors share a common memory in shared memory model. Every processor, however, can be assigned a different part of the program stored in the memory to implement with the data stored in specified locations. Every processor does computation independently with the data allocated to them by the controlling program, called the main program. After completion their computations, all of these processors join the main program. The main program complete only after all child processes have been terminated completely. There are many alternatives to execute these ideas through high level programming.  Some of them are:

i)   Using heavy weight processes.

ii)  Using threads.( e.g. Pthreads).

iii) Using a completely new programming language for parallel programming (e.g. Ada)

iv) Using library routines with an existing sequential programming language.

v)  Modifying the syntax of an existing sequential programming language to produce a parallel programming language (e.g. UPC).

vi) Using an existing sequential programming language improves with the compiler directives for specifying parallelism (e.g.  OpenMP).

We shall adopt the final alternative. We shall also give an introduction to the shared programming using library routines with an existing sequential programming language.

Posted Date: 3/4/2013 5:08:40 AM | Location : United States







Related Discussions:- Shared memory programming, Assignment Help, Ask Question on Shared memory programming, Get Answer, Expert's Help, Shared memory programming Discussions

Write discussion on Shared memory programming
Your posts are moderated
Related Questions
Split Horizon - If you attain a protocol's route on an interface, do not send information about that route back out that interface.


What is D-AMPS D-AMPS uses 832 channels (in every direction) with three users sharing a sole channel. This allows D-AMPS to support up to the 2496 users simultaneously per cel

Q. Presentation layer of osi reference model? - The presentation layer makes sure that the information that the application layer of one system sends out is readable by the app

State the difference between Byte streams and message Byte streams and message are different. In a message stream, network keeps track of the message boundaries. In a byte stre

Recognize the access-list range for an extended IP access-list? Ans) IP extended access-lists use the number range of 100-199.

Explain the Forward congestion avoidance process Notifies the user that congestion avoidance process should be initiated where applicable for traffic in the similar direction a

What are the benefits of Intranet applications The benefits of successful Intranet applications can be enumerated as follows: Cheaper: Use of client browsers with one

Assume that a user wants to download from a server a web page that references 3 objects. The base page and each of the objects are of the same size that requires 20 ms transmission

Describe the advantages of Intranet to the organisation The most obvious advantage is that everyone with access to a computer terminal connected to the Intranet can obtain the