Multi tasking environment, Computer Networking

Multi Tasking Environment

Multi tasking exploits parallelism by:

1)  Concurrently using the multiple functional units

2)  Pipelining functional units are pipe line together

3)  Overlapping CPU and I/O activities.

In multitasking environment, there should be a proper mix among task and data structures of a job, in order to make sure their proper parallel implementation.

In multitasking, the useful code of a programme can be use again. The property of allowing one copy of a programme module to be used by more than task in parallel is known as reentrancy.  Non-reentrant code can be used only once throughout lifetime of the programme. The reentrant codes, which may be called many times by dissimilar tasks, are assigned with local variables.

 

Posted Date: 3/4/2013 5:36:02 AM | Location : United States







Related Discussions:- Multi tasking environment, Assignment Help, Ask Question on Multi tasking environment, Get Answer, Expert's Help, Multi tasking environment Discussions

Write discussion on Multi tasking environment
Your posts are moderated
Related Questions
Q. Example on TCP numbering? Envision a TCP connection is transferring a file of 6000 bytes. The first byte is numbered 10010. What are the sequence numbers for every seg

what parameters should i have for the best nfs v4 performance?

IGP= Interior gateway routing protocol and EIGRP= Enhanced Interior Gateway routing protocol IGP = use in one Autonomous and EIGRP = use with many autonomous

IEEE 802.3-Ethernet Introduction LAN (Local Area Network) - network connecting devices in a limited geographic area usually privately owned and limited to a single o

What is the client side of applications To build the client side of applications, developers use various tools. Some of the popular software development environments include Vi

Most protocol suites have dissimilar OSI layer protocols within them. At layer 3, IP is for TCP/IP. TCP is layer 4. IPX is for IPX/SPX. SPX is layer 4. DDP is for Appletal

Question : a) Give three examples of vulnerable services which are among the overwhelming majority of successful attacks. b) Name the five outside sources which can be the

What is horizontal and vertical parity A single error can cause both horizontal and vertical parity checks to be wrong. Two errors can also be easily detected. If they are not

What do you meant by "triple X" in Networks? The function of PAD (Packet Assembler Disassembler) is defined in a document known as X.3. The standard protocol has been explaine

Layered Architecture The best  way to  understand  any complex system is to break  it into  pieces  and then analyze what they  do and  how they interact. The most logical app