Merits of shared memory and drawbacks, Computer Networking

Assignment Help:

Merits of Shared Memory Programming

  • Global address space gives a user-friendly programming perspective to memory.
  • Data sharing among processes is both fast and uniform due to the proximity of memory to CPUs.
  • No use to specify explicitly the communication of data between processes.
  • Insignificant process-communication overhead.
  • More easier and intuitive to learn.

Drawbacks

  • Complex to manage data locality.
  • Not portable.
  • Scalability is limited by the number of open pathways to memory.
  • User is liable for specifying synchronization, example:- locks.

 


Related Discussions:- Merits of shared memory and drawbacks

Low-earth-orbiting leo satellites , LOW-Earth Orbiting have more advantageo...

LOW-Earth Orbiting have more advantageous in Mobile based communication devices like PDAs, Cell phones and automobile communications. The LOW-Earth Orbiting is a satellite of orbit

What is meant by middleware, Middleware is distributed software required to...

Middleware is distributed software required to support interaction among clients and servers. In short, it is the software that is in the middle of the Client/Server systems and it

Explain about twisted-pair cable, Q. Explain about Twisted-Pair Cable? ...

Q. Explain about Twisted-Pair Cable? - Two conductors surrounded by insulating material - One wire utilize to carry signals and other used as a ground reference - Twistin

What is an object server, With an object server, the Client/Server applicat...

With an object server, the Client/Server application is taken as a set of communicating objects. Client object commune with server objects using an Object Request Broker (ORB). The

Tech ed, can you help me convert binary into decimals?

can you help me convert binary into decimals?

Discuss an example of threats in computer software, Discuss an example of t...

Discuss an example of threats in computer software Assume only one attack out of the above list i.e., the virus attack. Though the present anti-virus software solutions can det

Dns id hacking - domain name server, DNS ID hacking The Dns use ID sys...

DNS ID hacking The Dns use ID system in order to keep track of each every request and replies. In order to spoof the DNS’s response, the hacker needs to do ID Hacking. In orde

eigrp protocol update route information, How does EIGRP protocol update ro...

How does EIGRP protocol update route information to its neighbors

Torus, Torus The mesh network with enclose around connections is called...

Torus The mesh network with enclose around connections is called Tours Network.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd