Super computers, Basic Computer Science

Assignment Help:

Super Computers:

The specialised demands and requirements of science, industry and military have led to the creation of powerful super computers. For numerically intensive computing (geological exploration, wind tunnel simulations, molecular physics, and space and defence systems), computers capable of performing multiple giga flops (billion floating point operations per second) are being produced. These computers, of which Cray is a well known example, use vector and parallel processing to achieve the necessary number-crunching power. Vector and parallel processing require unusual computer architecture and special programming. For vector processing, the computer architecture works with vector arrays rather than discrete scalar elements, and the numerically intensive portions of a program must be written to use this facility. To achieve full speed and power in vector arrays processing, the super computer must not be interrupted in the middle of its program. which limits the interactive use of super computers. Scientists and engineers have found that they can experiment with more design and research solutions in a short period of time on interactive engineering and graphics workstations.

 Super computers built with a parallel processing architecture are designed to overcome the processing bottleneck caused by using a Von Neumann-type of single instruction stream. The parallel computer architecture must coordinate communication and timing across an array to allow simultaneous computation of subroutines. Although, massively parallel super computers, such as those made by Sequent and Floating Point Systems, are in principle faster and less expensive than the serial super computers, the unconventional programming required to utilise the parallel architectures has been an obstacle to wide wise of these machines.

 It may be stated here that while research continues in the United States and Japan to create faster super computers, some of the techniques employed in super computer architecture are being transferred to microprocessor design. For example, Intel has produced a RISC (Reduced Instruction Set Computing) microprocessor, the 80860, modeled on the Cray super computer. The design uses one million transistors to provide a 64 bit processor, data and instruction caches, integer and floating point math units and a graphics processor. The math units can operate in parallel using a pipe lining system and the data cache. Integrating these functions on a single chip makes it possible to sustain high processor speed over time. The Intel 80860 and similar RISC chips are produced by Motorola and other companies.  


Related Discussions:- Super computers

Geometric mean - algorithm, The geometric mean is obtained by multiplying a...

The geometric mean is obtained by multiplying all the four numbers and taking the fourth root of the product. Let x 1 ,x 2 ,x 3  and x 4  be the given four numbers then geometric

Cipher program in java, Cryptography, the study of secret writing, has been...

Cryptography, the study of secret writing, has been around for a very long time, from simplistic techniques to sophisticated mathematical techniques. No matter what the form howeve

Audio/video applications on network, AUDIO/VIDEO APPLICATIONS ON NETWORK ...

AUDIO/VIDEO APPLICATIONS ON NETWORK Clinical applications of a computer include recording of slit lamp images on a computer. These still images or even videos can be recorde

Ultrasonic waves, Ultrasonic Waves: Sound waves outside the audible range o...

Ultrasonic Waves: Sound waves outside the audible range of humans. Ultrasonic waves consist of frequencies greater than 20 kHz and exist in excess of 25 MHz. Applications include i

Multiplexing, draw the diagram to implement 32*1 mux by using 3 relevant ty...

draw the diagram to implement 32*1 mux by using 3 relevant type of mux

Data transmission, DATA TRANSMISSION: When we talk on the telephone we...

DATA TRANSMISSION: When we talk on the telephone we generally transmit a message to someone else. The message is made up of words that we speak into the telephone instrument.

Computer, identify application software from the list? ms excel linux inter...

identify application software from the list? ms excel linux internet explorer adobe photshop sound card driver window disk manger adobe dream weaver windows file explorer

Distinguish between passive and active attacks, QUESTION (a) Distinguis...

QUESTION (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Explain how s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd