What is shared memory programming, Computer Engineering

Assignment Help:

Q. What is Shared Memory Programming?

We know all processors share a common memory in shared memory model. Every processor can be assigned a separate portion of program stored in memory to execute with data stored in specified locations. Every processor does calculation independently with data assigned to them by controlling program known as the main program. After finishing their calculations all of these processors unite the main program. The main program completes only after all child processes have been finished completely. There are plentiful alternatives to apply these ideas by high level programming. Few of them are:

i)  Employing heavy weight processes.

ii) Employing threads. (E.g. Pthreads).

iii) Using a totally new programming language for parallel programming (E.g. Ada).

iv) Employing library routines with existing sequential programming language.

v) Editing the syntax of an existing sequential programming language to create a parallel programming language (e.g. UPC).

vi) Using an existing sequential programming language supplemented with compiler directives for specifying parallelism (e.g.  OpenMP)

We will take the last alternative. We will also give an introduction to shared programming employing library routines with an existing sequential programming language.


Related Discussions:- What is shared memory programming

Minterms, A minterm is an AND expression involving all input variables in e...

A minterm is an AND expression involving all input variables in either inverted or non-inverted form.For one particular row the associated mintermis the only minterm which equals l

Data packet from one network to another, A device that forwards data packet...

A device that forwards data packet from one network to another is known as a  Switch device.

Explain the term- hacking, Explain the term- Hacking    Use of passwor...

Explain the term- Hacking    Use of passwords and ids to prevent illegal access to files. Also locking the computer itself or locking computer room can help here. Encryption s

Which one is an error reporting protocol, Which one is an error reporting p...

Which one is an error reporting protocol? An error reporting protocol is ICMP.

State the optimal route of node, State the optimal route of node Consid...

State the optimal route of node Consider the node i which has path length K+1, with the directly preceding node on the path being j. The distance to node i is w(j, i) plus the

Explain briefly how firewalls protect network, Explain briefly how firewall...

Explain briefly how firewalls protect network.       A firewall is simply a program or hardware device that filters the information coming by the Internet connection into your

Computer Graphics, Distinguish between uniform scaling differential scaling...

Distinguish between uniform scaling differential scaling

Why do we call motherboard a motherboard, Motherboard is called as motherbo...

Motherboard is called as motherboard because in the world all borned creature is directly attached to her mother & after it all the relations makes due to her mother so in the simi

Carry look-ahead adder and booth''s algorithm, Describe carry look-ahead ad...

Describe carry look-ahead adder? Ans: The input carry required by a stage is directly computed from carry signals obtained from all of the preceding stages i-1,i-2,.....0, rat

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd