Research. Inc •

Total Page:16

File Type:pdf, Size:1020Kb

Research. Inc • c: RESEARCH. INC •. CRAY® COMPUTER SYSTEMS UNICOS PRIMER SG-2010 Gopyright© 1986, 1987 by Gray Research, Inc. This manuat or parts thereof may not be reproduced in any form unless permitted by contract or by written permission of Gray Research, Inc. Cli::ai tIfJI',.'V RESEARCH, INC. PUBUCATION NUMBER SG-2010 ..... 1'.- ~ ~ Czay Raeudl. Inc. publicationa Ihculd be directed to the Diatributicn Center and comme:ntl .bouc tbeIe publications .hould be ctinIeted to: CRA Y JtBS8ARQI, INC. Technia1 PublioadaaI 1345 NOIthIand Olive M.doca 1WpM. MUu.Gca 55120 Revision Description February 1986 - First printing. Docwnentation to support the Cray operating system UNICOS, release 1.0. This documentation is derived from UNIX System V under license from AT&T Technologies, Inc. A Octo~ 1986 - Rewrite incorporating many editorial changes made in response to a usability study. This version of the manual is issued with the Cray operating system UNICOS, release 2.0. All trademarks are now documented in the record of revision. All previous versions of this manual are obsolete. B July 1987 - Complete rewrite and reorganization to support UNICOS release 3.0. This printing includes new features of UNICOS, many new examples, and documentation for the C shell as well as the Bourne shell. This printing obsoletes previous versions of this manual. B ii SG-2010 The UNICOS operating system is derived from the AT&T UNIX System V operating system. UNICOS is also based in part on the Fourth Berkeley Software Distribution under license from the Regents of The University' of California. The TCPIIP documentation is copyrighted by The Wollongong Group and may not be reproduced. transmitted. transcribed. stored in a retrieval system. or translated into any language or computer language. in any fonn or by any means. electronic. mechanical. magnetic. optical. chemical. manual or otherwise. except as provided in the license agreement governing the documentation or by written pennission of The Wollongong Group, Inc .• 1129 San Antonio Road. Palo Alto. California 94303. The Wollongong software and documentation is based in part on the Fourth Berkeley Software Distribution under license from The Regents of the University of California. @ The Wollongong Group 1985. CRAY. CRAY-l. UNICOS. and SSD are registered trademarks and APML. CFr. CF177. CFT2. COS. CRAY-2. CRAY X-MP. CSIM. 105. SEGLDR. SID. and SUPERLINK are trademarks of Cray Research. Inc. 3B20 is a trademark of AT&T. Apollo and DOMAIN are registered trademarks of Apollo Computer Inc. CDC is a registered trademark of Control Data Corporation. DEC. VAX, and VMS are trademarks of Digital Equipment Corporation. mM is a registered trademark of International Business Machines Corporation. IRIS is a trademark of Silicon Graphics, Inc. Pyramid is a trademark of Pyramid Technology Corporation. Sun Microsystems is a trademark of Sun Microsystems, Inc. UNIX is a registered trademark of AT&T. SG-2010 iii B PREFACE This manual provides introductory information on the Cray operating system UNICOS running on Cray computer systems. Other Cray Research, Inc. (CRI) publications detail specific aspects of the operating system. The following CRI manuals relate to UNICOS on any Cray computer system: Publication Title/Description SR-0066 Segment Loader (SEGLDR) Reference Manual; describes SEGLDR, an automatic loader for overlaid and nonoverlaid programs. SR-2011 UNICOS User Commands Reference Manual; describes UNICOS user commands. SR-2012 UNICOS System Calls Reference Manual; describes all UNICOS system calls and the error returns for these calls. SR-2014 UNICOS File Fonnats and Special Files Reference Manual; describes file formats and devices used by UNICOS. SO-2016 UNICOS Support Tools Ouide; describes software tools available to aid the UNICOS user. SO-2050 UNICOS Editors Primer; describes the three editors available under UNICOS, vi, ed, and ex. The following CRI manuals relate to UNICOS on CRA Y -2 computer systems only: Publication Title/Description SR-2013 CRA Y-2 UNICOS Libraries, Macros and Opdefs Reference Manual; describes all library routines available to users of the eRAY -2 computer system. The manual also describes macros and opdefs for UNlCOS and associated programming languages and contains calling sequence documentation. The following CRI manuals relate to UNICOS on CRA Y X-MP and eRA Y-1 computer systems: Publication Title/Description SR-0012 Macros and Opdefs Reference Manual; contains macro and opdef instructions for the Cray operating systems UNICOS and COS. SR-0113 Programmer's Library Reference Manual; describes the Cray Fortran routines available to users of the CRA Y X-MP and CRA Y-1 computer systems. SO-2010 v B Publica don Title/Description SR-0136 CRAY X-MP and CRAY~l C Library Reference Manual; desaibes the Clay C routines available to users of the CRAY X-MP and CRAY-l computer systems. B vi 5G-2010 CONTENTS 1. IN'I'R.ODUC110N .••••.....•••.•.•......•.•••.•.•.•...•••.•..••..•.•.....•.•.••••.•.•.••••••.•••.••••.•.••••..•••.••.•.•.•.•.•••••......•.•.•.•.•. 1-1 1.1 USING TInS MANUAL: WHAT YOU SHOULD KNOW............................................... 1-1 1.2 CONVENTIONS •...•...•...•.....•.•........•...•........•.•....•.....•.•.....•.....•.............••.•.•....•.•.•.....•..•.......... 1·2 1.3 DEFINTIONS ...•.•.............................•....••••...•.....••.....•..•........•.•..••..•.....•.......•.......•..•...•..•...... 1·2 1.4 ON-LINE MANUALS ..........•..........•....•.•....•.•..•...•.•••.•...•..••.•••.•.•...•.......•....•......•.............•..... 1-3 1.5 READER COMMEN1"S ............•.....•...•.•....•.••...•... ~............................................................... 1-4 2. BASICS FOR BEGINNERS .........••....•.............•..•..•..........•••.••....•.•.•...•.•........•.•.•.....•....•.•........•.........•.. 2-1 2.1 ACCESSING 'UNICOS ......................................................................................................... 2·1 2.1.1 LOGGING IN ........................................................................................................... 2-2 2.1.2 CHANGING YOUR PASSWORD ......................................................................... 2-2 2.1.3 LOGGING OFF ....................................................................................................... 2-3 2.1.4 CO~ LINE SYNTAX .....•.....•...........•••......•..••.•.......••.....•......................•... 2-3 2.2 FILES. ....•............ ...... ..... ..................... ...........•.•......•............• .•.••...........•..•.....• ....• ...•..•........... 2-4 2.2.1 NAMIN'G FILES .............................•...............•.....•.••....••••••.......•....•...•....•..........•... 2-4 2.2.2 CREATING AND SA VING FILES USING THE ed EDITOR ...•....•....•.•........... 2·5 2.2.2.1 Creating files with ed ..•..•.•••..•.•••••••••••.•••••••.••.•..•.•••••.••.•.•••....••••...••.••••••. 2-5 2.2.2.2 Editing files with ed commands .•...•.•.•••••••..••••••.••.•••••....••.•• .••.•.•.•••...•••. 2-5 2.2.2.3 Error messages and explanations in ed ••••••••••••••••••••••••••••••••••••••••••••••••• 2-7 2.2.2.4 Saving files in ed ••••.•.•.•..•..•••••.•..•••.•••••..••••••.••••••.••..•.•.•.••.•.•.•.•••••.•.••..... 2-7 2.2.2.5 Exiting ed ............................................................................................... 2-7 2.2.3 LIS11N'G N~S OF FILES ......•..........•...•.....•.•..•.•....•.......•..•.•......•.•...•..•........... 2-8 2.2.4 DISPLA YIN'G FILES .•.......•..•...••••...•......••••..•••••.....•.......•..•.......•......•..•.••..•....•..•... 2-9 2.2.4.1 Displaying files using the pg command ................................................ 2·9 2.2.4.2 Displaying files using the cat command ............................................... 2-9 2.2.4.3 Displaying files using the pr command ................................................ 2-9 2.2.5 RENAMING, COPYING, AND REMOVING FILES .......................................... 2-10 2.2.5.1 Renaming a file . ..... ......... ..... .....•. ..... ... ..•.•.... ..••....•........•.•.... ....•...........•. 2-10 2.2.5.2 Copying a file ..............••........................•••............................•................. 2-11 2.2.5.3 Removing a file ...........•...•.....••......................•........••.•.....•...............•...... 2-11 2.2.6 USING METACHARACTERS IN FILE NAMES ........•................•........••............ 2-12 2.2.6.1 The • metacharacter .....•......................•..•...•...............•........•.....•........... 2·12 2.2.6.2 The 0 metacharacters ...•.......•.•...................•.........•....................•........... 2-13 2.2.6.3 The ? metacharacter ..................•...•........•...•............................•.............. 2·14 2.2.6.4 The ' It and \ metacharacters ...........................................•..................... 2-14 2.2.7 SEARCHING FILES FOR TEXT PATTERNS: THE grep CO~ ..................................•..•.......................•...........................•................. 2-15 2.2.8 INTERPRETA nON OF METACHARACTERS .........................•..•.........•.•......... 2-17 SG·2010 vii B 2.2.9 USING MET ACHARACI'ERS WITHIN Fll..ES .................................................. 2-18 2.2.9.1 The A metacharacter .........•.....•..............••..••....•..................•......•..•.•.•.... 2-18 2.2.9.2 The $ metacharacter ..•••..............................•.•..........•.•......•.•...•...•.•........ 2-18 2.29.3 The . metacharacter .....................•.........•.•................. 00.........................
Recommended publications
  • CRAY X-MP Series of Computer Systems
    For close to a decade, Cray Research has been the industry leader in large-scale computer systems. Today, about 70 percent of all supercomputers installed worldwide are Cray systems. They are used in advanced scientific and research Eaboratories around the world and have gained strong acceptance in diverse industrial environments. No other manufacturer has Cray Research's breadth of success and experience in supercomputer development. The company's initial product, the CRAY-I Computer System, was first installed in 1976and quickly became the standard for large-scale scientific computers -and the first commercially successful vector processor. For some time previously, the potential advantages of vector processing had been understood, but effective practical implementation had eluded computer architects. The CRAY-1 broke that barrier, and today vectorization techniques are used commonly by scientists and engineers in a wide variety of disciplines. The field-proven GRAY X-MP Computer Systems now offer significantly more power tosolve new and bigger problems while providing better value than any other systems available. Large memory size options allow a wider range of problems to be solved, while innovative multiprocessor design provides practical opportunities to exploit multitasking, the next dimension of parallel processing beyond vectorization. Once again, Cray Research, has moved supercomputing forward, offering new levels of hardware performance and software techniques to serve the needs of scientists and engineers today and in the future. Introducing the CRAY X-MP Series of Computer Systems Announcing expanded capabilities to serve the needs of a broadening marketplace: the CRAY X-MP Series of Computer Systems. The CRAY X-MP Series now comprises nine models, ranging from a uniprocessor version with one million words of central memory to a top-end system with four processors and a 16-million-word memory.
    [Show full text]
  • Programming Languages, Database Language SQL, Graphics, GOSIP
    b fl ^ b 2 5 I AH1Q3 NISTIR 4951 (Supersedes NISTIR 4871) VALIDATED PRODUCTS LIST 1992 No. 4 PROGRAMMING LANGUAGES DATABASE LANGUAGE SQL GRAPHICS Judy B. Kailey GOSIP Editor POSIX COMPUTER SECURITY U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 100 . U56 4951 1992 NIST (Supersedes NISTIR 4871) VALIDATED PRODUCTS LIST 1992 No. 4 PROGRAMMING LANGUAGES DATABASE LANGUAGE SQL GRAPHICS Judy B. Kailey GOSIP Editor POSIX COMPUTER SECURITY U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 October 1992 (Supersedes July 1992 issue) U.S. DEPARTMENT OF COMMERCE Barbara Hackman Franklin, Secretary TECHNOLOGY ADMINISTRATION Robert M. White, Under Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY John W. Lyons, Director - ;,’; '^'i -; _ ^ '’>.£. ; '':k ' ' • ; <tr-f'' "i>: •v'k' I m''M - i*i^ a,)»# ' :,• 4 ie®®;'’’,' ;SJ' v: . I 'i^’i i 'OS -.! FOREWORD The Validated Products List is a collection of registers describing implementations of Federal Information Processing Standards (FTPS) that have been validated for conformance to FTPS. The Validated Products List also contains information about the organizations, test methods and procedures that support the validation programs for the FTPS identified in this document. The Validated Products List is updated quarterly. iii ' ;r,<R^v a;-' i-'r^ . /' ^'^uffoo'*^ ''vCJIt<*bjteV sdT : Jr /' i^iL'.JO 'j,-/5l ':. ;urj ->i: • ' *?> ^r:nT^^'Ad JlSid Uawfoof^ fa«Di)itbiI»V ,, ‘ isbt^u ri il .r^^iytsrH n 'V TABLE OF CONTENTS 1.
    [Show full text]
  • Internet Engineering Task Force January 18-20, 1989 at University
    Proceedings of the Twelfth Internet Engineering Task Force January 18-20, 1989 at University of Texas- Austin Compiled and Edited by Karen Bowers Phill Gross March 1989 Acknowledgements I would like to extend a very special thanks to Bill Bard and Allison Thompson of the University of Texas-Austin for hosting the January 18-20, 1989 IETF meeting. We certainly appreciated the modern meeting rooms and support facilities made available to us at the new Balcones Research Center. Our meeting was especially enhanced by Allison’s warmth and hospitality, and her timely response to an assortment of short notice meeting requirements. I would also like to thank Sara Tietz and Susie Karlson of ACE for tackling all the meeting, travel and lodging logistics and adding that touch of class we all so much enjoyed. We are very happy to have you on our team! Finally, a big thank you goes to Monica Hart (NRI) for the tireless and positive contribution she made to the compilation of these Proceedings. Phill Gross TABLE OF CONTENTS 1. CHAIRMANZS MESSAGE 2. IETF ATTENDEES 3. FINAL AGENDA do WORKING GROUP REPORTS/SLIDES UNIVERSITY OF TEXAS-AUSTIN JANUARY 18-20, 1989 NETWORK STATUS BRIEFINGS AND TECHNICAL PRESENTATIONS O MERIT NSFNET REPORT (SUSAN HARES) O INTERNET REPORT (ZBIGNIEW 0PALKA) o DOEESNET REPORT (TONY HAIN) O CSNET REPORT (CRAIG PARTRIDGE) O DOMAIN SYSTEM STATISTICS (MARK LOTTOR) O SUPPORT FOR 0SI PROTOCOLS IN 4.4 BSD (ROB HAGENS) O TNTERNET WORM(MICHAEL KARELS) PAPERS DISTRIBUTED AT ZETF O CONFORMANCETESTING PROFILE FOR D0D MILITARY STANDARD DATA COMMUNICATIONS HIGH LEVEL PROTOCOL ~MPLEMENTATIONS (DCA CODE R640) O CENTER FOR HIGH PERFORMANCE COMPUTING (U OF TEXAS) Chairman’s Message Phill Gross NRI Chair’s Message In the last Proceedings, I mentioned that we were working to improve the services of the IETF.
    [Show full text]
  • RATFOR User's Guide B
    General Disclaimer One or more of the Following Statements may affect this Document This document has been reproduced from the best copy furnished by the organizational source. It is being released in the interest of making available as much information as possible. This document may contain data, which exceeds the sheet parameters. It was furnished in this condition by the organizational source and is the best copy available. This document may contain tone-on-tone or color graphs, charts and/or pictures, which have been reproduced in black and white. This document is paginated as submitted by the original source. Portions of this document are not fully legible due to the historical nature of some of the material. However, it is the best reproduction available from the original submission. Produced by the NASA Center for Aerospace Information (CASI) NASA CONTRACTOR REPORT 166601 Ames RATFOR User's Guide b Leland C. Helmle (NASA—CH-166601) RATFOR USERS GUIDE 0 (Informatics General Corp,) N85-16490 51 p HC A04/mZ A01 CSCL 09B Unclas G3/61 13243 CONTRACT NAS2— 11555 January 1985 v NASA NASA CONTRACTOR REPORT 166601 *i Ames RATF'OR User's Guide Leland C. Helmle Informatics General Corporation 1121 San Antonio Road Palo Alto, CA 94303 i i _I Prepared for Ames Research Center under Contract NAS2-11555 i n ASA National Aeronautics and 1 Space Administration Ames Research Center Moffett Field, California 94035 '^ I I w Ames R.A.TFOR User's Guide Version 2.0 by Loland C. Helmle Informatics General Corporation July 16, 1983 Prepared under Contract NA52-11555, Task 101 ^ Table of Contents page v 1 Introduction .
    [Show full text]
  • Cielo Computational Environment Usage Model
    Cielo Computational Environment Usage Model With Mappings to ACE Requirements for the General Availability User Environment Capabilities Release Version 1.1 Version 1.0: Bob Tomlinson, John Cerutti, Robert A. Ballance (Eds.) Version 1.1: Manuel Vigil, Jeffrey Johnson, Karen Haskell, Robert A. Ballance (Eds.) Prepared by the Alliance for Computing at Extreme Scale (ACES), a partnership of Los Alamos National Laboratory and Sandia National Laboratories. Approved for public release, unlimited dissemination LA-UR-12-24015 July 2012 Los Alamos National Laboratory Sandia National Laboratories Disclaimer Unless otherwise indicated, this information has been authored by an employee or employees of the Los Alamos National Security, LLC. (LANS), operator of the Los Alamos National Laboratory under Contract No. DE-AC52-06NA25396 with the U.S. Department of Energy. The U.S. Government has rights to use, reproduce, and distribute this information. The public may copy and use this information without charge, provided that this Notice and any statement of authorship are reproduced on all copies. Neither the Government nor LANS makes any warranty, express or implied, or assumes any liability or responsibility for the use of this information. Bob Tomlinson – Los Alamos National Laboratory John H. Cerutti – Los Alamos National Laboratory Robert A. Ballance – Sandia National Laboratories Karen H. Haskell – Sandia National Laboratories (Editors) Cray, LibSci, and PathScale are federally registered trademarks. Cray Apprentice2, Cray Apprentice2 Desktop, Cray C++ Compiling System, Cray Fortran Compiler, Cray Linux Environment, Cray SHMEM, Cray XE, Cray XE6, Cray XT, Cray XTm, Cray XT3, Cray XT4, Cray XT5, Cray XT5h, Cray XT5m, Cray XT6, Cray XT6m, CrayDoc, CrayPort, CRInform, Gemini, Libsci and UNICOS/lc are trademarks of Cray Inc.
    [Show full text]
  • Operating RISC: UNIX Standards in the 1990S
    Operating RISC: UNIX Standards in the 1990s This case was written by Will Mitchell and Paul Kritikos at the University of Michigan. The case is based on public sources. Some figures are based on case-writers' estimates. We appreciate comments from David Girouard, Robert E. Thomas and Michael Wolff. The note "Product Standards and Competitive Advantage" (Mitchell 1992) supplements this case. The latest International Computerquest Corporation analysis of the market for UNIX- based computers landed on three desks on the same morning. Noel Sharp, founder, chief executive officer, chief engineer and chief bottle washer for the Superbly Quick Architecture Workstation Company (SQAWC) in Mountain View, California hoped to see strong growth predicted for the market for systems designed to help architects improve their designs. In New York, Bo Thomas, senior strategist for the UNIX systems division of A Big Computer Company (ABCC), hoped that general commercial markets for UNIX-based computer systems would show strong growth, but feared that the company's traditional mainframe and mini-computer sales would suffer as a result. Airborne in the middle of the Atlantic, Jean-Helmut Morini-Stokes, senior engineer for the UNIX division of European Electronic National Industry (EENI), immediately looked to see if European companies would finally have an impact on the American market for UNIX-based systems. After looking for analysis concerning their own companies, all three managers checked the outlook for the alliances competing to establish a UNIX operating system standard. Although their companies were alike only in being fictional, the three managers faced the same product standards issues. How could they hasten the adoption of a UNIX standard? The market simply would not grow until computer buyers and application software developers could count on operating system stability.
    [Show full text]
  • Chippewa Operating System
    Chippewa Operating System The Chippewa Operating System often called COS was the operating system for the CDC 6600 supercomputer, generally considered the first super computer in the world. The Chippewa was initially developed as an experimental system, but was then also deployed on other CDC 6000 machines. The Chippewa Operating System often called COS is the discontinued operating system for the CDC 6600 supercomputer, generally considered the first super computer in the world. The Chippewa was initially developed as an experimental system, but was then also deployed on other CDC 6000 machines. The Chippewa was a rather simple job control oriented system derived from the earlier CDC 3000 which later influenced Kronos and SCOPE. The name of the system was based on the Chippewa Falls research and The Chippewa Operating System often called COS was the operating system for the CDC 6600 supercomputer, generally considered the first super computer in the world.[1] The Chippewa was initially developed as an experimental system, but was then also deployed on other CDC 6000 machines.[2]. Bibliography. Peterson, J. B. (1969). CDC 6600 control cards, Chippewa Operating System. U.S. Dept. of the Interior. Categories: Operating systems. Supercomputing. Wikimedia Foundation. 2010. The Chippewa Operating System often called COS was the operating system for the CDC 6600 supercomputer, generally considered the first super computer in the world.[1] The Chippewa was initially developed as an experimental system, but was then also deployed on other CDC 6000 machines.[2]. This operating system at Control Data Corporation was distinct from and preceded the Cray Operating System (also called COS) at Cray.
    [Show full text]
  • Computer Architectures an Overview
    Computer Architectures An Overview PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 25 Feb 2012 22:35:32 UTC Contents Articles Microarchitecture 1 x86 7 PowerPC 23 IBM POWER 33 MIPS architecture 39 SPARC 57 ARM architecture 65 DEC Alpha 80 AlphaStation 92 AlphaServer 95 Very long instruction word 103 Instruction-level parallelism 107 Explicitly parallel instruction computing 108 References Article Sources and Contributors 111 Image Sources, Licenses and Contributors 113 Article Licenses License 114 Microarchitecture 1 Microarchitecture In computer engineering, microarchitecture (sometimes abbreviated to µarch or uarch), also called computer organization, is the way a given instruction set architecture (ISA) is implemented on a processor. A given ISA may be implemented with different microarchitectures.[1] Implementations might vary due to different goals of a given design or due to shifts in technology.[2] Computer architecture is the combination of microarchitecture and instruction set design. Relation to instruction set architecture The ISA is roughly the same as the programming model of a processor as seen by an assembly language programmer or compiler writer. The ISA includes the execution model, processor registers, address and data formats among other things. The Intel Core microarchitecture microarchitecture includes the constituent parts of the processor and how these interconnect and interoperate to implement the ISA. The microarchitecture of a machine is usually represented as (more or less detailed) diagrams that describe the interconnections of the various microarchitectural elements of the machine, which may be everything from single gates and registers, to complete arithmetic logic units (ALU)s and even larger elements.
    [Show full text]
  • Some Performance Comparisons for a Fluid Dynamics Code
    NBSIR 87-3638 Some Performance Comparisons for a Fluid Dynamics Code Daniel W. Lozier Ronald G. Rehm U.S. DEPARTMENT OF COMMERCE National Bureau of Standards National Engineering Laboratory Center for Applied Mathematics Gaithersburg, MD 20899 September 1987 U.S. DEPARTMENT OF COMMERCE NATIONAL BUREAU OF STANDARDS NBSIR 87-3638 SOME PERFORMANCE COMPARISONS FOR A FLUID DYNAMICS CODE Daniel W. Lozier Ronald G. Rehm U.S. DEPARTMENT OF COMMERCE National Bureau of Standards National Engineering Laboratory Center for Applied Mathematics Gaithersburg, MD 20899 September 1987 U.S. DEPARTMENT OF COMMERCE, Clarence J. Brown, Acting Secretary NATIONAL BUREAU OF STANDARDS, Ernest Ambler, Director - 2 - 2. BENCHMARK PROBLEM In this section we describe briefly the source of the benchmark problem, the major logical structure of the Fortran program, and the parameters of three different specific instances of the benchmark problem that vary widely in the amount of time and memory required for execution. Research Background As stated in the introduction, our purpose in benchmarking computers is solely in the interest of further- ing our investigations into fundamental problems of fire science. Over a decade ago, stimulated by federal recognition of very large losses of fife and property by fires each year throughout the nation, NBS became actively involved in a national effort to reduce such losses. The work at NBS ranges from very practical to quite theoretical; our approach, which proceeds directly from basic principles, is at the theoretical end of this spectrum. Early work was concentrated on developing a mathematical model of convection arising from a prescribed source of heat in an enclosure, e.g.
    [Show full text]
  • View of This Work
    INFORMATION TO USERS The most advanced technology has been used to photo­ graph and reproduce this manuscript from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are re­ produced by sectioning the original, beginning at the upper left-hand corner and continuing from left to right in equal sections with small overlaps. Each original is also photographed in one exposure and is included in reduced form at the back of the book. These are also available as one exposure on a standard 35mm slide or as a 17" x 23" black and white photographic print for an additional charge. Photographs included in the original manuscript have been reproduced xerographically in this copy. Higher quality 6" x 9" black and white photographic prints are available for any photographs or illustrations appearing in this copy for an additional charge. Contact UMI directly to order. University Microfilms International A Bell & Howell Information Company 300 North Zeeb Road, Ann Arbor, Ml 48106-1346 USA 313/761-4700 800/521-0600 Order Number 8824450 Performance evaluation of RISC-based architectures for image processing Al-Ghitany, Nashat El-Khameesy, Ph.D.
    [Show full text]
  • View Article(3467)
    Problems of information technology, 2018, №1, 92–97 Kamran E. Jafarzade DOI: 10.25045/jpit.v09.i1.10 Institute of Information Technology of ANAS, Baku, Azerbaijan [email protected] COMPARATIVE ANALYSIS OF THE SOFTWARE USED IN SUPERCOMPUTER TECHNOLOGIES The article considers the classification of the types of supercomputer architectures, such as MPP, SMP and cluster, including software and application programming interfaces: MPI and PVM. It also offers a comparative analysis of software in the study of the dynamics of the distribution of operating systems (OS) for the last year of use in supercomputer technologies. In addition, the effectiveness of the use of CentOS software on the scientific network "AzScienceNet" is analyzed. Keywords: supercomputer, operating system, software, cluster, SMP-architecture, MPP-architecture, MPI, PVM, CentOS. Introduction Supercomputer is a computer with high computing performance compared to a regular computer. Supercomputers are often used for scientific and engineering applications that need to process very large databases or perform a large number of calculations. The performance of a supercomputer is measured in floating-point operations per second (FLOPS) instead of millions of instructions per second (MIPS). Since 2015, the supercomputers performing up to quadrillion FLOPS have started to be developed. Modern supercomputers represent a large number of high performance server computers, which are interconnected via a local high-speed backbone to achieve the highest performance [1]. Supercomputers were originally introduced in the 1960s and bearing the name or monogram of the companies such as Seymour Cray of Control Data Corporation (CDC), Cray Research over the next decades. By the end of the 20th century, massively parallel supercomputers with tens of thousands of available processors started to be manufactured.
    [Show full text]
  • System Programmer Reference (Cray SV1™ Series)
    ® System Programmer Reference (Cray SV1™ Series) 108-0245-003 Cray Proprietary (c) Cray Inc. All Rights Reserved. Unpublished Proprietary Information. This unpublished work is protected by trade secret, copyright, and other laws. Except as permitted by contract or express written permission of Cray Inc., no part of this work or its content may be used, reproduced, or disclosed in any form. U.S. GOVERNMENT RESTRICTED RIGHTS NOTICE: The Computer Software is delivered as "Commercial Computer Software" as defined in DFARS 48 CFR 252.227-7014. All Computer Software and Computer Software Documentation acquired by or for the U.S. Government is provided with Restricted Rights. Use, duplication or disclosure by the U.S. Government is subject to the restrictions described in FAR 48 CFR 52.227-14 or DFARS 48 CFR 252.227-7014, as applicable. Technical Data acquired by or for the U.S. Government, if any, is provided with Limited Rights. Use, duplication or disclosure by the U.S. Government is subject to the restrictions described in FAR 48 CFR 52.227-14 or DFARS 48 CFR 252.227-7013, as applicable. Autotasking, CF77, Cray, Cray Ada, Cray Channels, Cray Chips, CraySoft, Cray Y-MP, Cray-1, CRInform, CRI/TurboKiva, HSX, LibSci, MPP Apprentice, SSD, SuperCluster, UNICOS, UNICOS/mk, and X-MP EA are federally registered trademarks and Because no workstation is an island, CCI, CCMT, CF90, CFT, CFT2, CFT77, ConCurrent Maintenance Tools, COS, Cray Animation Theater, Cray APP, Cray C90, Cray C90D, Cray CF90, Cray C++ Compiling System, CrayDoc, Cray EL, CrayLink,
    [Show full text]