Unix for multiprocessor system, Computer Networking

Assignment Help:

UNIX For Multiprocessor System:-

The UNIX operating system for a multiprocessor system has a number of additional features as compared to the normal UNIX operating system.  Let us first talk about the design goals of the multiprocessor UNIX.  The original UNIX developed by Dennis Ritchie and Brian Kernighan was developed as general purpose, portable,time-sharing uniprocessor operating system.

The OS functions including virtual memory management, processor scheduling,I/O devices etc, are executed with a large amount of system software. Normally the size of the OS is larger than the size of the main memory.  The portion of OS that resides in the main memory is known as kernel. For a multiprocessor, OS is developed on three models viz: floating executive model, Master slave model, multithreaded kernel. These UNIX kernels are executed with locks semaphores and monitors.

Let us discuss these models in short.

1)  Master slave kernel: In this model, just one of the processors is designated as Master.

The master is responsible for the activities given below:

i) Running the kernel code

ii) Handling the system calls

iii) Handling the interrupts.

The rest of the processors in the method run only the user code and are known as slaves.

2)  Floating-Executive model: The master-slave kernel model is too restrictive in the sense that only one of the processors viz the designated master can run the kernel. This restriction may be relaxed by containing more than one processor capable of running the kernel and let additional capability by which the master may float between the various processors capable of running the kernel.

3)   Multi-threaded UNIX kernel: We know that threads are light-weight processors needs minimal state information comprising the processor state and contents of relevant registers. A thread being a (light weight) process is capable of implementing alone. In a multiprocessor system, more than one processor may implement simultaneously with each processor possibly implementing more than one threads, with the restriction that those threads which share resources must be allotted to single processor. Though, the threads which do not share resources may be allotted to dissimilar processors. In this model, in order to divide multiple threads requiring different sets of kernel resources spin locks or semaphores are used.


Related Discussions:- Unix for multiprocessor system

Error correction in burst error correction, Q. Error Correction in Burst Er...

Q. Error Correction in Burst Error Correction? Error Correction-Burst Error Correction In its place of sending all the bits in a data unit together we can organize "N

Undesirable sharing - fundamentals of networks, Undesirable Sharing ...

Undesirable Sharing With  the good  comes  the bad  while  networking  allow  the easy  sharing  of useful  information it also  the sharing  of undesirable  data. One sign

Telecommunication switching system, if the signal input to an amplifier is ...

if the signal input to an amplifier is 0 dBm what is the power output in mW if the gain of the amplifier is 20 dB ?

What are the two types of transmission technologies, What are the two types...

What are the two types of Transmission technologies, basis on which computer networks can be categorized? Broadly there are two types of transmission technology: 1. Broadc

Cipher password guess-cryptography, a. If a password to a cipher is exactly...

a. If a password to a cipher is exactly 8 characters long, and each character can be selected from [0-9], [a-z], and [A-Z], how many different passwords are possible? b. Suppose

E-NRZ, A modified NRZ code known as enhanced-NRZ (E-NRZ) operates on 7-bit ...

A modified NRZ code known as enhanced-NRZ (E-NRZ) operates on 7-bit words; inverting bits 2,3,6 and 7; and adding one parity bit to each word. The parity bit is chosen to make the

What is data storage technology, Normally, we think of communications scien...

Normally, we think of communications science as dealing with the contemporaneous exchange of information among distant parties. Though, many of the same techniques employed in data

Command that shows traffic statistics on serial 0/1, Recognize the command ...

Recognize the command that shows traffic statistics on serial0/1? Ans) show interface serial 0/1

Define the method of encryption and decryption using by ssl, Encryption/dec...

Encryption/decryption using by SSL Once a session is established, the SSL generates a session key using public-key encryption to exchange information between the client and ser

Parts count method calculation, M E T HOD OF CALCULATION It involves...

M E T HOD OF CALCULATION It involves counting the number of each part type and multiplying with the generic failure rate of each part. On summing up the product, we obtain t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd