Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Single Instruction and Multiple Data stream (SIMD)
In this organisation, multiple processing elements are working under the control of a one control unit. It has multiple data stream and only one instruction. All the processing fundamentals of this organization get the same instruction broadcast from the CU. Main memory can also be separted into modules for producing multiple data streams acting as a distributed memory as shown in Figure 5. Thus, all the processing fundamentals simultaneously implement the same instruction and are supposed to be 'lock-stepped' together. Each processor obtain the data from its own memory and hence it has on distinct data streams. (Some systems also supply a shared global memory for communications.) Every processor must be allowed to finish its instruction previous to the next instruction is taken for implememtation. Thus, the implementation of instructions is synchronous. Examples of SIMD organisation are PEPE, ILLIAC-IV, , STARAN, BSP, DAP, MPP, and the Connection Machine (CM-1).
This type of computer organisation is represent as:
Q. Show the Features of parallel virtual machine? Easy to install; Easy to configure; Multiple users each can use PVM concurrently; Multiple applications fro
What is Virtual memory The term virtual memory signifies something that appears to be present though actually it is not. Virtual memory technique enables users to use more mem
Six machines H1, H2, ..., H6 are linked by two Ethernet switches SW1 and SW2 as given below. Both switches have four ports drawn. The port numbers are as indicated. Suppose the two
Why are interrupt masks provided in any processor? Interrupt mask enable the higher priority devices comes first and there for lower priority devices comes last. The interrupt
How many address bits are required to represent a 32 K memory ? Ans. 32K = 25 x 210 = 215, Hence 15 address bits are needed; Only 16 bits can address this.
State the various Security Tools Securing an Intranet is not a simple task. Just as articles in a house are protected by use of various types of security systems such as lock
Shell is the exclusive feature of? Ans. Shell is the exclusive feature of UNIX.
Illustrate about 8259 8259A adds 8 vectored priority encoded interrupts to the microprocessor. We can expand it to 64 interrupt requests by using one master 8259A and 8 slave
Within the Microelectronics centre we support the following microcontrollers 68HC11, 80C51 and the PIC16C5xx series; we have a set of software tools and emulators to help debug hig
A router is used to Distributes information among networks.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd