Shared memory programming, Computer Networking

We know that all processors share a common memory in shared memory model. Every processor, however, can be assigned a different part of the program stored in the memory to implement with the data stored in specified locations. Every processor does computation independently with the data allocated to them by the controlling program, called the main program. After completion their computations, all of these processors join the main program. The main program complete only after all child processes have been terminated completely. There are many alternatives to execute these ideas through high level programming.  Some of them are:

i)   Using heavy weight processes.

ii)  Using threads.( e.g. Pthreads).

iii) Using a completely new programming language for parallel programming (e.g. Ada)

iv) Using library routines with an existing sequential programming language.

v)  Modifying the syntax of an existing sequential programming language to produce a parallel programming language (e.g. UPC).

vi) Using an existing sequential programming language improves with the compiler directives for specifying parallelism (e.g.  OpenMP).

We shall adopt the final alternative. We shall also give an introduction to the shared programming using library routines with an existing sequential programming language.

Posted Date: 3/4/2013 5:08:40 AM | Location : United States







Related Discussions:- Shared memory programming, Assignment Help, Ask Question on Shared memory programming, Get Answer, Expert's Help, Shared memory programming Discussions

Write discussion on Shared memory programming
Your posts are moderated
Related Questions
Connection Oriented Transport TCP In addition  to providing  reliable communication transmission control protocols  effects errors  control flow  control  and resequencing of

Question 1: (a) In networking, there are different possible topologies. Explain the Linear bus, Ring and Star topology along with their advantages and disadvantages. (b) W

Assume the following 64-bit DES key (expressed in hexadecimal): FEFE FEFE FEFE FEFE (a) What is the term for such a key? (b) State the value of each of the 48-bit round keys


Q. Example of go back - N protocol? The window size is 4. A sender has sent frame 6 as well as the timer expires for frame 3 (frame 3 not ACKn'd). The sender goes back as we


What are short, long and medium-term scheduling? Long term scheduler verifies which programs are admitted to the system for processing. It controls the degree of multiprogrammi

You have been asked to design a Banking Network with two primary types of locations.  Branches that will have 3 subnets, one /25 subnet one /26 subnet for ABMS and one /26 s

PRAM is one of the models used for designing the parallel algorithm as given in Figure. The PRAM models have the following components: A set of identical type of processors

Write the Generic Name of the OSI Layer a)  The figures below illustrate, side by side, the OSI 7-layer reference model and the Internet protocol stack. Inside each box represen