Wait protocol in parallel programming , Computer Networking

Wait protocol

The wait protocol is used for resolving the conflicts, which arise due to number of multiprocessors demanding the same resource. There are two types of wait protocols: busy-wait and sleep-wait. In busy-wait protocol, process stays in the process context register, which continuously tries for processor availability. In sleep-wait protocol, wait protocol process is detached from the processor and is kept in the wait queue. The hardware complexity of this protocol is more than busy-wait in multiprocessor system; if locks are used for synchronization then busy-wait is used more than sleep-wait.

Implementation modes of a multiprocessor: Several modes of multiprocessing include parallel implementation  of programs at (i) Fine Grain Level  (Process Level), (ii) Medium Grain Level (Task Level), (iii) Coarse Grain Level (Program Level).

For implementing the programs in these modes, the following conditions / actions are required at OS level.

i) Context switching among multiple processes should be fast. In order to make context Switching simple multiple sets should be present.

i) The memory allocation to various processes should be quick and context free.

ii) The Synchronization mechanism among multiple processes should be effective.

iii) OS should give software tools for performance monitoring.

 

Posted Date: 3/4/2013 5:32:49 AM | Location : United States







Related Discussions:- Wait protocol in parallel programming , Assignment Help, Ask Question on Wait protocol in parallel programming , Get Answer, Expert's Help, Wait protocol in parallel programming Discussions

Write discussion on Wait protocol in parallel programming
Your posts are moderated
Related Questions
You are designing a network for a retail customer; they plan to have 5 locations initially with the main store acting as the warehousing depot.  Within the next year they are plann

Computer Networking 1. Explain different network structures in use. 2. Elaborate the architecture and usage of ISDN. 3. Discuss the concept of framing in Data Link Layer

Reliable Data Transfer Figure illustrate the  framework for reliable  transfer. The service  abstraction provided  to the upper  layer  entities is that  of a reliable channel

QUESTION (a) What are the problems with IPv4 on today's Internet and how does IPv6 solve these problems? (b) Describe at least three ways in which IPv6 is more efficient tha

Difference between synchronous tdm and statistical tdm

What is Redundancy? The method of including extra information in the transmission solely for the purpose of comparison. This technique is known as redundancy.

Source quench is the process where the destination router, or end internetworking device will "quench" the date from the "source", or the source router. This usually occurs when th

Problem: (a) Application Layer protocols can be classified as connection-oriented or connectionless-oriented. i. What do you understand by the term protocol? ii. Give an e

Ask Design private subnetworks (using Class A range for CIDR) for each domain as in the table below, and complete the table. Hints: Consider how many network bits are required to a

Prepare the Network  Step 1: Disable all ports by using the shutdown command. Ensure that the initial switch port states are inactive with the shutdown command. Use the inter