Differentiate concurrent and parallel executions, Computer Engineering

Assignment Help:

Differentiate concurrent and parallel executions?

The words "parallel "and "concurrent" are often used interchangeably, however they are different. Parallel execution is connected with the N-client N-server model. It allows the repairing of more than one client at the similar time as the number of servers is more than one. For facilitating equations of parallel programs, a quantity of parallel languages is presented including: Parallel C, strand-88 and Occam-2,.

Parallel execution doesn't need explicit concurrency in the language. Parallelism can be accomplished by the underlying hardware.  Similarly, we can have concurrency in words without parallel execution. This is the case when a program is implemented on a single processor.

Concurrent execution is only the temporal behavior of the N-client 1-server model where only the one client is served at any given moment. It has a double nature: It is sequential in a small time scale, but concurrently in large time scale. In our framework the processor works as a server and a thread or a process works as a client. For facilitating equations of concurrent programs, number of concurrent languages is existing including, concurrent pascal, Ada Modula-2 and concurrent PROLOG.

 


Related Discussions:- Differentiate concurrent and parallel executions

Explain the term thread scheduling, Problem: a) Most RMI and RPC system...

Problem: a) Most RMI and RPC systems expect to be supported by the "Request-Reply Protocol". Describe what "Request-Reply Protocol" is. b) Describe the invocation semantics

Define http, Http Hyper Text Transfer Protocol: The WWW protocol that...

Http Hyper Text Transfer Protocol: The WWW protocol that performs the request and regain functions of a server. Generally seen as the first part of a website address. It is t

Personal computer software, Personal Computer Software     The perso...

Personal Computer Software     The personal computer software market has burgeoned from the past decade. Spreadsheets, Word processing, computer graphics, database managemen

Give some examples of malicious data, Give some examples of malicious data....

Give some examples of malicious data.  In May 2002, the Norton Anti-Virus software for Windows operating systems detects about 61000 malicious programs. Some of them are named

Design a half adder, Q. Design a half adder? In half adder inputs are: ...

Q. Design a half adder? In half adder inputs are: The augend let's say 'x' and addend 'y' bits. The outputs are sum 'S' and carry 'C' bits. Logical relationship betwee

Symbolic reasoning, An expert system also represents knowledge symbolica...

An expert system also represents knowledge symbolically as sets of symbols that stand for problem concepts. In AI jargon symbol is a string of characters that stands for

Explain debug monitors, Explain Debug monitors. Debug monitors give d...

Explain Debug monitors. Debug monitors give debugging support for a program. A debug monitor executes the program being debugged in its own control thereby giving execution e

Computational fluid dynamics, Q. Computational Fluid Dynamics? Computat...

Q. Computational Fluid Dynamics? Computational Fluid Dynamics: CFD was a FORTRAN like language developed in the early 70s at "Computational Fluid Dynamics Branch of Ames Resear

What is the security vulnerabilities for vba, Microsoft Visual basic has it...

Microsoft Visual basic has its host of problems one such being macros, Macros can be formed which can make havoc for a programmer with good intentions. Also the security issue rest

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd