Unix for multiprocessor system, Computer Networking

Assignment Help:

UNIX For Multiprocessor System:-

The UNIX operating system for a multiprocessor system has a number of additional features as compared to the normal UNIX operating system.  Let us first talk about the design goals of the multiprocessor UNIX.  The original UNIX developed by Dennis Ritchie and Brian Kernighan was developed as general purpose, portable,time-sharing uniprocessor operating system.

The OS functions including virtual memory management, processor scheduling,I/O devices etc, are executed with a large amount of system software. Normally the size of the OS is larger than the size of the main memory.  The portion of OS that resides in the main memory is known as kernel. For a multiprocessor, OS is developed on three models viz: floating executive model, Master slave model, multithreaded kernel. These UNIX kernels are executed with locks semaphores and monitors.

Let us discuss these models in short.

1)  Master slave kernel: In this model, just one of the processors is designated as Master.

The master is responsible for the activities given below:

i) Running the kernel code

ii) Handling the system calls

iii) Handling the interrupts.

The rest of the processors in the method run only the user code and are known as slaves.

2)  Floating-Executive model: The master-slave kernel model is too restrictive in the sense that only one of the processors viz the designated master can run the kernel. This restriction may be relaxed by containing more than one processor capable of running the kernel and let additional capability by which the master may float between the various processors capable of running the kernel.

3)   Multi-threaded UNIX kernel: We know that threads are light-weight processors needs minimal state information comprising the processor state and contents of relevant registers. A thread being a (light weight) process is capable of implementing alone. In a multiprocessor system, more than one processor may implement simultaneously with each processor possibly implementing more than one threads, with the restriction that those threads which share resources must be allotted to single processor. Though, the threads which do not share resources may be allotted to dissimilar processors. In this model, in order to divide multiple threads requiring different sets of kernel resources spin locks or semaphores are used.


Related Discussions:- Unix for multiprocessor system

Explain fully connected interconnection networks, Fully connected : It is t...

Fully connected : It is the most powerful interconnection topology.  In this every node is directly associated to all other nodes. The limitation of this network is that it needs t

Network interface hardware, NETWORK INTERFACE HARDWARE:  CPU can't ope...

NETWORK INTERFACE HARDWARE:  CPU can't operate data at network speeds. So in order to connect to the network device systems use special purpose hardware for network connection

Explain session layer in osi model, Q. Explain Session Layer in osi model? ...

Q. Explain Session Layer in osi model? - The session layer defines how to control, start and end conversations (called sessions) between applications. - This includes the c

What are main types of networks and explain, a)  Peer-to-Peer Network Co...

a)  Peer-to-Peer Network Computers can act as both servers sharing resources and as clients using the resources. b)  Server-based Network Give centralized control of netwo

Calculate bandwidth needed for voice traffic, The second point to consider ...

The second point to consider is that from each location, some calls are internal to that site and some are going to outside locations. Again, as an approximation, MyCo telecom peop

How to configure a wireless mac filter - ccna, Configure a Wireless MAC Fil...

Configure a Wireless MAC Filter Step: Add a Mac filter. Navigate back to the web utility page of the router (http://172.17.30.1). Navigate to the Wireless section a

Nfs, what is this ?

what is this ?

Explain what are the external threats, Explain what are the External Threat...

Explain what are the External Threats External security threats are the most problematic ones. Till date the greatest threat was the virus menace. Now, with the sophisticated

Bootrom and memory layout, Memory Memory Layout   BOOT...

Memory Memory Layout   BOOTROM This device stores the information of  the startup diagnostic  code in permanently. It performs diagnostics of  hardware  wh

Explain about the switches, Explain about the Switches LAN switches are...

Explain about the Switches LAN switches are an expansion of the method in LAN bridging, which controls data flow, handles transmission errors, gives physical addressing, and ma

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd