Shared memory programming, Computer Networking

We know that all processors share a common memory in shared memory model. Every processor, however, can be assigned a different part of the program stored in the memory to implement with the data stored in specified locations. Every processor does computation independently with the data allocated to them by the controlling program, called the main program. After completion their computations, all of these processors join the main program. The main program complete only after all child processes have been terminated completely. There are many alternatives to execute these ideas through high level programming.  Some of them are:

i)   Using heavy weight processes.

ii)  Using threads.( e.g. Pthreads).

iii) Using a completely new programming language for parallel programming (e.g. Ada)

iv) Using library routines with an existing sequential programming language.

v)  Modifying the syntax of an existing sequential programming language to produce a parallel programming language (e.g. UPC).

vi) Using an existing sequential programming language improves with the compiler directives for specifying parallelism (e.g.  OpenMP).

We shall adopt the final alternative. We shall also give an introduction to the shared programming using library routines with an existing sequential programming language.

Posted Date: 3/4/2013 5:08:40 AM | Location : United States







Related Discussions:- Shared memory programming, Assignment Help, Ask Question on Shared memory programming, Get Answer, Expert's Help, Shared memory programming Discussions

Write discussion on Shared memory programming
Your posts are moderated
Related Questions
Benefits of Building up a well-designed Intranet Building up a well-designed Intranet can help the companies in the following activities that would improve their overall perfor

WEB TECHNOLOGY 1. Explain different protocols of internet. 2. Differentiate between DHTML and HTML. 3. What do you understand by Event-driven Programming? Classify differ

Routing Table Each  router now  uses the  shortest path tree to construct its routing table . each  router  uses the same algorithm and the same link state  database its own sh

What is the equivalent layer or layers of the TCP/IP Application layer in terms of OSI reference model? The TCP/IP Application layer really has three counterparts on the OSI mo

What is Unacknowledged connectionless service This service is a datagram-style service. It is a very simple service that does not involve any of the flow- and error-control mec

To accept its goals, ATM uses fixed, small sized packets known cells. Every cell has 53 octets. VPI/VCI fields shows the cells destination. PRIO say if cell can be discarded CRC

Ethernet Frame Format Consists of seven fields There is No mechanism for acknowledging received frames considered an unreliable medium

What does the following sequence of commands accomplish? router igrp 71 network 10.0.0.0 router igrp 109 network 172.68.7.0 Ans) It isolates network 10.0.0.0 and 172.68.7.0 and

CYCLE OF BRIDGES:  A bridges network can join several segments. One bridge is useded to connect every segment to the rest of the bridge network. This is given in the figure be

The are various limitations of employing Wireless LAN technology in any multistory building in middle of Melbourne or any other big city are: • Range: The main problem of Wire