Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
How is process management done in multiprocessing systems?
There are two accost for the process management in multiprocessor systems.
In master-slave configuration one of the processor units is identified as the master processor, which implements the OS routines and performs all control functions in the system. So the master processor decides which process to execute on which processor. All other processors are slaves to the master they basically perform the tasks detailed to them by the master. The disadvantages and advantages of the master-slave configuration are:
In symmetrical multiprocessors, a processor is identical in their ability to perform control functions. A processor selection is stimulated whenever an interrupt is raised in the system. The chosen processor handles the interrupt. The remaining of the system can continue its operation. This provides improved reliability than master-slave configuration. A disadvantage of the system is that it doesn't fully exploit the potential of multiple processors in the system.
Explain the Exit (status) Function Exit function causes the calling process to be terminated. Actually, all file descriptors are immediately closed but the process is not
Explain the ExitThread Function used in the Windows NT ExitThread(ExitCode) The ExitThread( ) call is made to end the currently running thread. If the current thread is th
Ask question #Minimum 100 words accDefine Hashing System. Describe the Hashed page table with example and mapping figure.
As a group, you may need to make some enhancements to your development server (NOT your stable server!) It needs to be able to run the makepasswd program, which may require instal
Suppose we have 3 processes running at the same time as shown in the following table. Each resource only has one instance. Show a possible scenario of resource allocation that r
Deadlock Avoidance It's a method to evade deadlock by careful resource scheduling. This approach to the deadlock problem foresees deadlock before it actually occurs. This a
Explain Belady's Anomaly? Also called FIFO anomaly. Usually, on enhancing the number of frames allocated to a process virtual memory, the process implementation is faster, beca
Placement algorithms :calculate where in available real-memory to execute a program. Common functions are next-fit, first-fit, and best-fit. Replacement algorithms :are
Problem 1. What is kernel? What are the main components of a kernel? Defining Kernel Explaining Main components of Kernel 2. What is mutual exclusion? What are i
Q. In some systems a subdirectory is able to be read and written by an authorized user just as ordinary files can be. a. Explain the protection problems that could arise. b.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd