Intrinsic functions, Computer Networking

Assignment Help:

Intrinsic Functions

HPF introduces some new intrinsic functions in addition to those defined in F90. The two most regularly used in parallel programming are the system inquiry functions PROCESSORS_SHAPE and NUMBER_OF_PROCESSORS  . These functions gives the information about the number of physical processors on which the running program implements and processor configuration. General syntax of is

NUMBER_OF_PROCESSORS is

NUMBER_OF_PROCESSORS (dim)

where dim is an optional argument. It returns the number of processors in the underlying array or, if the optional argument is present, the size of this array along a shows dimension.

General syntax of  PROCESSORS_SHAPE is

PROCESSORS_SHAPE()

It returns an one-dimensional array, whose  ith element provides the size of the underlying processor array in its ith dimension.

 Example 10

Consider the call of the two intrinsic functions discussed above for a 32-Processor (4×8) Multicomputer:

The function call NUMBER_OF_PROCESORS () will return 32. The function call NUMBER_OF_PROCESORS (1) will return 4. The function call NUMBER_OF_PROCESORS (2) will return 8.

The function call PROCESSORS_SHAPE () will return an array with two elements 4 and 8.

We can use these intrinsic functions in tandem with array declarations and HPF directives, to give flexibility to the programmer to declare abstract processor arrays that match available physical resources. For example, the following statement! HPF$ PROCESSORS P(NUMBER_OF_PROCESSORS()) declares an abstract processor array P with size equivalent to the number of physical processors.


Related Discussions:- Intrinsic functions

Thick ethernet wiring, THICK ETHERNET WIRING:  It needs thick coax cab...

THICK ETHERNET WIRING:  It needs thick coax cable. AUI cable joins from NIC to transceiver. AUI cable take digital signal from NIC to transceiver. The transceiver creates anal

What is domains in active directory, In Windows 2000, a domain describes bo...

In Windows 2000, a domain describes both an administrative boundary and a security boundary for a collection of objects that are relevant to a particular group of users on a networ

Determine the subnet with subnet prefix, Consider a subnet with subnet pref...

Consider a subnet with subnet prefix 101.101.101/24  a)  If you subdivide the subnet into four equal size subnets, what are their prefixes? Give all four prefixes in the form a.

Hierarchical routing strategy, i want a program of hierarchical programming...

i want a program of hierarchical programming in c language with its output. please help me .

Error and flow control in dll, differntiate between error control and flow...

differntiate between error control and flow control in data link layer

Estimate of average delay deviation, Consider the procedure described for e...

Consider the procedure described for estimating average delay di. Suppose that u=0.1. Let r1-t1 be the most recent sample delay, let     r2 -t2 be the next most recent sample delay

What do you mean by substitutional ciphers, Q. What do you mean by Substitu...

Q. What do you mean by Substitutional Ciphers? Substitutional Ciphers Monoalphabetic Substitution Polyalphabetic Substitution - Transpositional - character

Ccna, Can you do my ccna assignment

Can you do my ccna assignment

Two types of transmission technology , What are the two types of Transmissi...

What are the two types of Transmission Technology available in ccna? Ans) Point - to - Point and Broadcast are the Two types of Transmission Technology available in CCNA

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd