Structural classification-flynns classification , Computer Engineering

Assignment Help:

Structural Classification

Flynn's classification examine the behavioural concept and does not receive into consideration the computer's structure. Parallel computers can be classified stand on their structure also, which is discussed under and shown in Figure 8.

As we have know, a parallel computer (MIMD) can be characterised as a set of multiple processors and memory modules or shared memory communicating via an interconnection network. When multiprocessors commune through the global shared memory modules then this organisation is called as tightly coupled systems or Shared memory computer as shown in Figure 9. Similarly, when each processor in a multiprocessor system, have its own local memory and the processors commune via messages transmitted among their local memories, then this organisation is said as Loosely coupled system or Distributed memory computer as shown in Figure 10. Figures  9 and 10 show the easy diagrams of both organisations.

The memory and processors in both organisations are interrelated via an interconnection  network. This interconnection network may be in dissimilar forms like multistage network, crossbar switch, etc. which will be discussed in the next unit.

                                                  545_Structural Classification.png


Related Discussions:- Structural classification-flynns classification

PHB, Power pc h bus

Power pc h bus

Should we use cgi or an api, APIs are proprietary programming interfaces su...

APIs are proprietary programming interfaces supported by certain platforms. By using an API, you lose all portability. If you know your application will only ever run on single pla

Memory that can be used in a 16-bit computer, What is the maximum size of t...

What is the maximum size of the memory that can be used in a 16-bit computer and 32 bit computer? The maximum size of the memory that can be used in a 16-bit computer is 2 memo

Generation of erp products, 1. How does this new generation of ERP products...

1. How does this new generation of ERP products differ from traditional solutions? 2. What are the major external forces driving competition in the ERP industry? Cloud comput

Explain the technique used in asymmetric key cryptography, Explain the tech...

Explain the technique used in the asymmetric Key Cryptography. Asymmetric or public-key cryptography be different from conventional cryptography in which key material is bound

#dbms., #example of cascading rollback#

#example of cascading rollback#

Derivatives and applications of derivatives, What can you say about the exi...

What can you say about the existence of a stationary point in the interval [ 1; 3] for the function f (x) = x 2 2x 3.

Example of the horizon problem, Example of the horizon problem: It is ...

Example of the horizon problem: It is also worth bearing in mind the horizon problem, however a game-playing agent cannot see much far satisfactory into the search space. Now

Additions of numbers by using 2’s complement, Add +25 to -15 by using 2's c...

Add +25 to -15 by using 2's complement ? Ans. Firstly convert the numbers 25 and 15 in its 8-bit binary equivalent and determine the 2's complement of 15, after that add +25 to -

Explain in brief about compact disks, Explain in brief about Compact disks ...

Explain in brief about Compact disks (CD) These are an optical storage media that have basically taken over from floppy disk. Software is now generally supplied on a CD (in for

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd