Wait protocol in parallel programming , Computer Networking

Wait protocol

The wait protocol is used for resolving the conflicts, which arise due to number of multiprocessors demanding the same resource. There are two types of wait protocols: busy-wait and sleep-wait. In busy-wait protocol, process stays in the process context register, which continuously tries for processor availability. In sleep-wait protocol, wait protocol process is detached from the processor and is kept in the wait queue. The hardware complexity of this protocol is more than busy-wait in multiprocessor system; if locks are used for synchronization then busy-wait is used more than sleep-wait.

Implementation modes of a multiprocessor: Several modes of multiprocessing include parallel implementation  of programs at (i) Fine Grain Level  (Process Level), (ii) Medium Grain Level (Task Level), (iii) Coarse Grain Level (Program Level).

For implementing the programs in these modes, the following conditions / actions are required at OS level.

i) Context switching among multiple processes should be fast. In order to make context Switching simple multiple sets should be present.

i) The memory allocation to various processes should be quick and context free.

ii) The Synchronization mechanism among multiple processes should be effective.

iii) OS should give software tools for performance monitoring.

 

Posted Date: 3/4/2013 5:32:49 AM | Location : United States







Related Discussions:- Wait protocol in parallel programming , Assignment Help, Ask Question on Wait protocol in parallel programming , Get Answer, Expert's Help, Wait protocol in parallel programming Discussions

Write discussion on Wait protocol in parallel programming
Your posts are moderated
Related Questions
State about the communications network 1) The communications network may only accept blocks of data up to a specific size.   (2) Error control might be more effective with a

Difference between synchronous tdm and statistical tdm

I NTRODUCTION Reliability  prediction  is  an  important  method  for  evaluating  a  system design, right from its conceptual stage through development and manufacture and al

Define the Bulletin Board Intranet This type of Intranet in an organisation extends to everyone the capability to review or update information that would normally be placed

DNS cache poisoning The DNA cache poisoning generally refers to the process of maintaining or developing the false information, in the cache of DNS server. This process refers

1.  What does RIP stand for? 2.  What metric does RIP use for Path Selection? 3.  If the metric used by RIP exceeds this value for a route it is considered unreachable, effec

S t d "B" 9 m C-BAND EARTH STATION (2001)   This  Earth  Station  is  aligned  with  INTEL  SAT  IOR  66°  and  provide domestic connectivity. R-Sat (Regional Satellite) i

network diagram which must include at least 2router,2bridge and 4 switches and must have different protocols and different cable...?

i have been given a question:- any 50 numbers are given and to find out the 1)frequency of odd and even numbers 2)frequency of positive and negative numbers

Q. Illustrate about RSA Encryption? RSA Encryption - Public key encryption technique - Encryption steps: - Encode data to be encrypted as a number to create the pla