What is shared memory programming, Computer Engineering

Assignment Help:

Q. What is Shared Memory Programming?

We know all processors share a common memory in shared memory model. Every processor can be assigned a separate portion of program stored in memory to execute with data stored in specified locations. Every processor does calculation independently with data assigned to them by controlling program known as the main program. After finishing their calculations all of these processors unite the main program. The main program completes only after all child processes have been finished completely. There are plentiful alternatives to apply these ideas by high level programming. Few of them are:

i)  Employing heavy weight processes.

ii) Employing threads. (E.g. Pthreads).

iii) Using a totally new programming language for parallel programming (E.g. Ada).

iv) Employing library routines with existing sequential programming language.

v) Editing the syntax of an existing sequential programming language to create a parallel programming language (e.g. UPC).

vi) Using an existing sequential programming language supplemented with compiler directives for specifying parallelism (e.g.  OpenMP)

We will take the last alternative. We will also give an introduction to shared programming employing library routines with an existing sequential programming language.


Related Discussions:- What is shared memory programming

Determine the concepts of object oriented analysis, Determine the concepts ...

Determine the concepts of Object Oriented Analysis  In OOA the initial focus is on identifying objects from the application domain, after that fitting those procedures around

Name of all sap databases, All SAP Databases are Relational Databases ...

All SAP Databases are Relational Databases is the all sap databases.

Define restoring method, Define restoring method? The hardware method j...

Define restoring method? The hardware method just explained is called the restoring method. The reason for this name is that the partial reminder is restored by adding the divi

Multiple layers of intranet security, Multiple Layers of Intranet Security ...

Multiple Layers of Intranet Security Security requirements vary from organisation to organisation. They also vary on the content that the organisations intend to place on their

Adbms, what are the different way of executing pipelines

what are the different way of executing pipelines

What is the task of the pass 2 in a two-pass assembler, In a two-pass assem...

In a two-pass assembler, the task of the Pass II is to? Ans. The task of the Pass II is to synthesize the target program in a two-pass assembler.

Illustrate basic strategy used in raid, Q. Illustrate Basic strategy used i...

Q. Illustrate Basic strategy used in RAID? Basic strategy used in RAID is to replace large capacity disk drive with multiple smaller capacity disks. Data on these disks is dist

Define optimistic synchronization, Q. Define Optimistic Synchronization? ...

Q. Define Optimistic Synchronization? Optimistic Synchronization: This method too updates atom by requester process however sole access is granted after atomic operation by abo

What is a unix device driver, A UNIX device driver is ? Ans. A UNIX devi...

A UNIX device driver is ? Ans. A UNIX device driver is structured in two halves termed as top half and bottom half.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd