By Topic

A numerically intensive computing environment: IBM 3090 and the PS/2 Model 80

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $31
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

6 Author(s)
Arnold, R.F. ; IBM Palo Alto Scientific Center, 1530 Page Mill Road, California 94304, USA ; Halpern, P. ; Hogsett, G.R. ; Straka, B.T.
more authors

Recent advances in personal computer workstations, such as the IBM Personal System/2® Model 80 with its increased memory and CPU speed, loosely coupled with a host IBM 3090™ Processor, can provide considerable computing advantages for executing and visualizing numerically intensive computing (NIC) applications. We have developed a prototype visualization environment which demonstrates effective use of this hardware. The user interface for the NIC application is written using Microsoft Windows® on the PS/2® Model 80 running DOS 3.3. The PS/2 Model 80 is connected to a host 3090 via a PC network. The user enters requests which are application parameters and selects graphic views for displaying the output results file. The entries are made through user dialog screens on the workstations. The user view of the system is such that it appears that it is running on the workstation. To achieve this transparency, caches are used on both the workstation and the host. The cache on the host is in the form of graphic metafiles and numeric data. The cache on the workstation contains metafiles. Requests are monitored on the workstation to determine whether the results are in the local cache. When they are not, a request file is transferred to the host and checked against the host cache. The NIC application is run only when the requested result is not in either cache. In order to reduce the file size, the results file is converted to a metafile before being transferred to the workstation.

Note: The Institute of Electrical and Electronics Engineers, Incorporated is distributing this Article with permission of the International Business Machines Corporation (IBM) who is the exclusive owner. The recipient of this Article may not assign, sublicense, lease, rent or otherwise transfer, reproduce, prepare derivative works, publicly display or perform, or distribute the Article.  

Published in:

IBM Journal of Research and Development  (Volume:35 ,  Issue: 1.2 )