Multi tasking environment, Computer Networking

Assignment Help:

Multi Tasking Environment

Multi tasking exploits parallelism by:

1)  Concurrently using the multiple functional units

2)  Pipelining functional units are pipe line together

3)  Overlapping CPU and I/O activities.

In multitasking environment, there should be a proper mix among task and data structures of a job, in order to make sure their proper parallel implementation.

In multitasking, the useful code of a programme can be use again. The property of allowing one copy of a programme module to be used by more than task in parallel is known as reentrancy.  Non-reentrant code can be used only once throughout lifetime of the programme. The reentrant codes, which may be called many times by dissimilar tasks, are assigned with local variables.

 


Related Discussions:- Multi tasking environment

Methods of reliability prediction, I NTRODUCTION Reliability  predicti...

I NTRODUCTION Reliability  prediction  is  an  important  method  for  evaluating  a  system design, right from its conceptual stage through development and manufacture and al

Compute shortest path, Compute the shortest path from t to all network node...

Compute the shortest path from t to all network nodes.

Explain persistence timer, Explain Persistence timer? To deal with ...

Explain Persistence timer? To deal with the zero-size windows What if a receiver advertises that the window size is 0 (by sending ACK) and this ACK is lost? - A

What are the compression protocols for ppp, The compression protocols for P...

The compression protocols for PPP are:- A. Stac   B. Predictor

Different technologies involved in establishing wan links, What are the dif...

What are the different technologies involved in establishing WAN links? Analog connections - using conventional telephone lines; Digital connections - using digital-grade telep

Command that shows traffic statistics on serial 0/1, Recognize the command ...

Recognize the command that shows traffic statistics on serial0/1? Ans) show interface serial 0/1

How can you manage a network using a router, How can you manage a network u...

How can you manage a network using a router? Routers have built in console that lets you configure dissimilar settings, like security and data logging. You can allocate restric

Difference between trigger and rule, What is the difference between trigger...

What is the difference between trigger and rule? Ans) The triggers are known as implicitly by database generated events, whereas stored procedures are known as explicitly by cli

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd