Data alignment in processor arrangements, Computer Networking

Assignment Help:

Data Alignment

Arrays are aligned to templates by the ALIGN directive. The ALIGN directive is used to align elements of different arrays with each other, indicating that they should be spreaded in the similar manner. The syntax of an ALIGN derivative is:

!HPF$ ALIGN array1 WITH array2

where array1 is the name of array to be aligned and array2 is the array to be aligned to.

Example 6

Consider the statement

ALIGN A[i] WITH B[i]

This statement aligns each A[i] with B[i] as shown in Figure.

1980_ALIGN A[i] WITH B[i].png

                                                                                                                        ALIGN A[i] WITH B[i]

Consider the statement

ALLIGN A[i] WITH B[i+1]

This statement aligns the each A[i] with B[i+1] as shown in Figure.

2141_ALIGN A[i] WITH B[i+1].png

                               ALIGN A[i] WITH B[i+1]

* can be used to fall down the dimensions. Consider the statement

ALLIGN A[:, *] WITH B[:]

This statement aligns two dimensional array with one dimensional array by collapsing as shown in Figure.

1355_alignmen.png

                                                                                                     Alignmen


Related Discussions:- Data alignment in processor arrangements

What is meant by asymmetrical protocols, What is meant by Asymmetrical prot...

What is meant by Asymmetrical protocols? There is a many-to-one relationship among clients and server. Clients always initiate the dialog by requesting a service. Servers are p

Distortion, what is the differnce between noise and distortion

what is the differnce between noise and distortion

Configure vtp on the switches - ccna, Configure VTP on the Switches VTP...

Configure VTP on the Switches VTP permits the network administrator to control the instances of VLANs on the network by creating VTP domains. Within each VTP domain, one or mor

Shortest path tree and minimum-spanning tree, We studied Dijkstra's link-st...

We studied Dijkstra's link-state routing algorithm for computing the unicast paths that are individually the shortest paths from the source to all destinations. The union of these

Netware protocol provides link-state routing, Which NetWare protocol provid...

Which NetWare protocol provides link-state routing? Ans) NetWare Link Services Protocol (NLSP) gives link-state routing. SAP (Service Advertisement Protocol) advertises network

What are reasons behind using layered protocols, What are reasons behind us...

What are reasons behind using layered protocols  Reasons for using layered protocols, using them leads to breaking up design problem into smaller more manageable pieces and lay

Mail access protocols - application layer, Mail Access Protocols The e...

Mail Access Protocols The e mail  message  are usually  sent to  an email  server that stores received message  in the  recipient   e mail  mailbox.  The user  retrieves messa

What is aspects of security, Q. What is Aspects of Security? - Securit...

Q. What is Aspects of Security? - Security Attack: Any action whichcompromises the security of information owned by an organization. - Security Mechanism: A mechanism th

Minimum possible response time , Consider the similar conditions as the las...

Consider the similar conditions as the last problem, except for the following: what's the minimum possible response time for the 1 Gbps and a 1 Mbps line?  What does the diffrentia

Illustrate addressing, Addressing Complicated addressing scheme because...

Addressing Complicated addressing scheme because there may be intermediate stations (APs), identified by flags

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd