Multi tasking environment, Computer Networking

Multi Tasking Environment

Multi tasking exploits parallelism by:

1)  Concurrently using the multiple functional units

2)  Pipelining functional units are pipe line together

3)  Overlapping CPU and I/O activities.

In multitasking environment, there should be a proper mix among task and data structures of a job, in order to make sure their proper parallel implementation.

In multitasking, the useful code of a programme can be use again. The property of allowing one copy of a programme module to be used by more than task in parallel is known as reentrancy.  Non-reentrant code can be used only once throughout lifetime of the programme. The reentrant codes, which may be called many times by dissimilar tasks, are assigned with local variables.

 

Posted Date: 3/4/2013 5:36:02 AM | Location : United States







Related Discussions:- Multi tasking environment, Assignment Help, Ask Question on Multi tasking environment, Get Answer, Expert's Help, Multi tasking environment Discussions

Write discussion on Multi tasking environment
Your posts are moderated
Related Questions
Facts about  Fiber Optic Cables 1. Outer insulating jacket is made  of Teflon or PVC. 2. Kevler fiber  helps  to strengthen  the cable and prevent breakage. 3. A plas

Question: (a) Show the main elements of the GSM system architecture and describe their functions. (b) Looking at the HLR/VLR database approach used in GSM-how does this arc

What is Network Architecture? When two or more computer are linked with one another for the purpose of communicating data electronically, besides physical connection of comput

Configure VTP Pruning on the Switche s VTP pruning allows a VTP server to suppress IP broadcast traffic for particular VLANs to switches that do not have any ports in that VLAN.

There are two kinds of characteristics in case of network performance. Delay Throughput

Describe the concept of internetwork and intranetwork routing protocols?

Determine the concept of placing antenna on hieght First, starting deployment simply placed cells in regions where there was high density of vehicle or human population. Once t

Firewalls After several  security  related internet  newsgroups  started overflowing  with posts it becomes  clear something  hand to done to help  secure  networks. The first

How many types of twisted pair cable are there We can find two types of twisted pair cables, namely: Unshielded Twisted Pair Cable (UTP) and Shielded Twisted Pair Cable (STP).

The term signaling is used to define communication about the network, as opposed to interaction that just uses the network. A computer uses signaling with reserved VCI/VPI numbe