Software overheads in parallel programming , Computer Networking

Assignment Help:

Besides these hardware overheads, there are certain software overheads imposed by libraries, parallel compilers, tools and operating systems.

The parallel programming languages are developed for parallel computer environments. These are developed either by introducing new languages (e.g. occam) or by modifying existing languages like, (C and FORTRAN).  Normally the language extension approach is preferred by most computer designs. This decreases compatibility problem.  High-level parallel constructs were added to C and FORTRAN to make these languages suitable for parallel computers. Besides these, optimizing compilers are designed to automatically detect the parallelism in program code and change the code to parallel code.

In addition to development of compilers and languages for parallel programming, a parallel programming environment should also have supporting tools for text editing and development of parallel programmes.

Let us now talk about the examples of parallel programming environments of Cray Y-MP software and Intel paragaon XP/S.

The Cray Y-MP system works with UNICOS operating system.  It has two FORTRAN compilers CFT and CFT 77 for automatic vector code generation. The system software has large library of routines, program management utilities, assembler UNICOS and debugging aids written in C. It supports optimizing, vectorizing, concurrentising facilities for FORTRAN compilers and also has vetorizing and optimizing C compiler. The Cray Y-MP has three multitasking / multiprocessing methods namely, (i) microtasking (ii) macrotasking, , (iii) autotasking. As well, it has a subroutine library, containing a variety of utilities, high performance subroutines along with scientific routines and math.

The Intel Paragaon XP/S system is an extension of Delta systems and Intel iPSC/860, and is a mesh and scalable connected multicompiler which is executed in a distributed memory system.

The processors that for nodes of the system are 50 MHz i860 XP Processors. Furthermore, it uses distributed UNIX based OS technology. The languages supported by Paragaon have C, C++, ADA and Data Parallel Fortran. The tools for integration contain FORGE and Cast parallelisation tools. The programming environment contains an Interactive Parallel Debugger (IPD).


Related Discussions:- Software overheads in parallel programming

Routing principle - network layer and routing , Routing Principle The p...

Routing Principle The principle  criterion of  successful routing is of course correctness but it not only criterion. You might  prefer to take the most direct route ( the  one

What do you meant by triple x in networks, What do you meant by "triple X" ...

What do you meant by "triple X" in Networks? The function of PAD (Packet Assembler Disassembler) is defined in a document known as X.3. The standard protocol has been explaine

Describe in detail how rsvp actually works, Normal 0 false fa...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

What are the drawbacks of wireless devices, What are the drawbacks of wirel...

What are the drawbacks of wireless devices One drawback is security. Every random delivery man who happens to be in building can listen on network. Another weakness is reliabil

What is round trip time, What is Round Trip Time? The duration of time ...

What is Round Trip Time? The duration of time it takes to send a message from one end of a network to the other and back, is known as RTT.

Design network, where can i find some informations about the subject and th...

where can i find some informations about the subject and the assignment is called Clotilde manufacturing group

How firewall configuration makes all the difference, How Firewall configura...

How Firewall configuration makes all the difference The greatest blunder that any company make is to just install a firewall and think that they have ensured perfect securit

Encryption authentication - point to point , Encryption Authentication ...

Encryption Authentication One common  technique  used to encrypt and authenticate in VPNs is IP security. IP sec  is a collection of protocols designed by the IETF( Internet En

Routing protocol used in design a banking network, You have been asked to d...

You have been asked to design a Banking Network with two primary types of locations.  Branches that will have 3 subnets, one /25 subnet one /26 subnet for ABMS and one /26 s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd