wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Multiprocessor

profile
Riya Singh
Jul 04, 2024
0 Likes
0 Discussions
65 Reads

Multiprocessor has many processors on one system . Like various parts of our brain which come together to execute instructions and carry out some program or work . These multiprocessors are efficient as its processors work in a collaboration this parallel programming is possible. What is parallel programming? Good question! It's like opening various applications all together like opening vs code and Adobe editor and browser simultaneously. So to run these all programs together they require parallel programming. Here's where the multiprocessor comes in frame and helps to execute all this together. 

There are 2 types of multiprocessor systems based on how they access memory and I/O devices. 

1. Shared memory....where main memory and peripherals are used by all the processors to execute instructions concurrently. Since the same bus is used to access main memory traffic is created and other processors have to idle (like on marines drive on 4th July ...cars are in traffic and idle..can't help roads that are not accessible).

2. Distributed memory...where each processor has its own memory to fetch from and when a remote program is needed they get to the main memory .....

Though it has various advantages like working in collaboration makes execution more efficient (unlike our group projects where everything is done by one person). It also requires complex configuration and it's expensive.There is also deadlock condition where one processor can't access an I/O device just because some other processor is using it .And it's complicated just like when a small is assigned to more than required people leading to no optimum utilisation of resources...


Comments ()


Sign in

Read Next

Raid

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

Harsh Rathod

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

Beautiful and stunning natural phenomena worth to see

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

GIS

Blog banner

Memory Management in an Operating System

Blog banner

Modern operating system

Blog banner

Virus

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

How Unstructured Play Helps Children Become Creative Thinkers

Blog banner

STARVATION

Blog banner

Friendship

Blog banner

Precision-Recall in Data Science

Blog banner

VIRUS

Blog banner

Theads

Blog banner

Cache memory

Blog banner

MAILFENCE

Blog banner

Service transistion under difficult conditions

Blog banner

Modern Operating Systems.

Blog banner

WHAT IS SNAPCHAT AND HOW DOES IT WORK?

Blog banner

EFT

Blog banner

Supervised and Unsupervised Learning

Blog banner

Process Description

Blog banner

File management

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

How to tie a Tie

Blog banner

KAHAWA TEA

Blog banner

Session Vulnerabilities

Blog banner

The Importance of Data Quality Management in Data Science

Blog banner

Why is online marketing is important in current scenario

Blog banner

Os(Computer security threats)

Blog banner

Smartsheet

Blog banner

Operation system

Blog banner

The Future of Patola Weaving in a Sustainable Fashion World

Blog banner

Consumer to consumer business mode

Blog banner

How to grow followers on Instagram business account?

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

Be you

Blog banner

Threads

Blog banner

How Cyber Forensics use in AI

Blog banner