Openmp in shared memory programming, Computer Networking

Assignment Help:

OpenMP is a compiler directive based standard developed in the late 1990s jointly by a group of main computer hardware and software vendors. It is portable across a lot of popular platforms including Unix and Windows NT platforms. The OpenMP Fortran API was released on October 28, 1997 and the C/C++ API was released in late 1998. We shall talk about only about C/C++ API.

The OpenMP API uses the fork-join model of parallel implementation. As soon as an OpenMP program starts implementing it creates a single thread of implementation, known as the initial thread. The initial thread implements sequentially. As early as it gets a parallel construct, the thread makes additional threads and works as the master thread for all threads. All of the new threads implement the code inside the parallel construct. Only the master thread continues implementation of the user code beyond the end of the parallel construct. There is no restriction on the number of parallel constructs in a one program. When a thread with its child threads encounters a work-sharing construct, the work inside the construct is separated between the members of the team and implemented co-operatively instead of being implemented by every thread. Implementation of the code by every thread in the team resumes after the end of the work-sharing construct. Library routines and the Synchronization constructs are available in OpenMP to co-ordinate threads and data in parallel and work-sharing constructs.

Each OpenMP directive begins with #pragma omp. The general syntax is

#pragma omp directive-name [Set of clauses]

where omp is an OpenMP keyword. There may be additional clauses (parameters) after the directive name for dissimilar options.

Now, we shall talk about some compiler directives in OpenMP.


Related Discussions:- Openmp in shared memory programming

Application layer - computer network, Application Layer The  applicati...

Application Layer The  application layer is where  network  applications and their  application layer protocols  reside. The internet application layer includes many protocols

Calculate the peak-to-peak voltage of the signal, A multimeter is used to m...

A multimeter is used to measure a sinusoidal signal and reads 2V RMS; what is the peak-to-peak voltage of the signal? A mark will be deducted if you do not quote your answer to 2 s

Cpm-pert network analysis problem, Solve the following CPM/PERT Network Ana...

Solve the following CPM/PERT Network Analysis problem: Given the following network and activity time estimates, determine earliest and latest activity times, slack, the expecte

Ethernet interface on the cisco router , As a system administrator, you req...

As a system administrator, you require to set up single Ethernet interface on the Cisco router to permit for both sap and Novell-ether encapsulations. Which set of commands will ac

Direct isp service through leased line, The most expensive method of access...

The most expensive method of accessing the Internet is to employ leased lines that directly connect to the ISP. This will enhance access rate to anywhere between 64 K and 1.5 Mbps,

What is nic - networking, NICs Network interface cards, commonly referr...

NICs Network interface cards, commonly referred to as NICs are used to connect a PC to a network. The NIC gives a physical connection among the networking medium and the comput

Design a logical lan topology- ccna, Design a Logical LAN Topology Step...

Design a Logical LAN Topology Step: Design an IP addressing scheme. Given the IP address block of 192.168.7.0 /24, design an IP addressing scheme that states the following r

Addresses and connection identifiers, Address is a full unique identifier. ...

Address is a full unique identifier. Connectionless delivery needs address on every packet. Connection-oriented delivery may use a short hand that shows the connection rather th

Explain the importance of authentication, Explain the importance of authent...

Explain the importance of authentication. Authentication is the method of verifying a user's credentials before he can log into the network. It is normally performed using a us

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd