wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Multiprocessor

profile
Riya Singh
Jul 04, 2024
0 Likes
0 Discussions
65 Reads

Multiprocessor has many processors on one system . Like various parts of our brain which come together to execute instructions and carry out some program or work . These multiprocessors are efficient as its processors work in a collaboration this parallel programming is possible. What is parallel programming? Good question! It's like opening various applications all together like opening vs code and Adobe editor and browser simultaneously. So to run these all programs together they require parallel programming. Here's where the multiprocessor comes in frame and helps to execute all this together. 

There are 2 types of multiprocessor systems based on how they access memory and I/O devices. 

1. Shared memory....where main memory and peripherals are used by all the processors to execute instructions concurrently. Since the same bus is used to access main memory traffic is created and other processors have to idle (like on marines drive on 4th July ...cars are in traffic and idle..can't help roads that are not accessible).

2. Distributed memory...where each processor has its own memory to fetch from and when a remote program is needed they get to the main memory .....

Though it has various advantages like working in collaboration makes execution more efficient (unlike our group projects where everything is done by one person). It also requires complex configuration and it's expensive.There is also deadlock condition where one processor can't access an I/O device just because some other processor is using it .And it's complicated just like when a small is assigned to more than required people leading to no optimum utilisation of resources...


Comments ()


Sign in

Read Next

MODERN OPERATING SYSTEM

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Cyber Forensic in the Banking sector

Blog banner

IO Buffers

Blog banner

Why we fail after giving 100% ?

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

Evolution of OS

Blog banner

Photography

Blog banner

WomenEmpowerment

Blog banner

1 Dentist in Maroubra, Sydney and her 10 obsessions

Blog banner

GIS in Disaster Management

Blog banner

Perfect Moments to Wear a Rich Patola Design Outfit

Blog banner

Interrupts in OS

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

Operating system and overviews

Blog banner

Ubiquitous Computing

Blog banner

Oracle Corporation

Blog banner

Threads

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

All you need to know about “Off-page SEO”

Blog banner

Cache memory

Blog banner

Disk cache

Blog banner

RAID

Blog banner

Deming’s Process

Blog banner

Hypothesis Testing in Data Science

Blog banner

Memory management and virtual memory

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

Patola Outfits for the Modern Wardrobe: Reviving Indian Handloom in Style

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

Direct Memory Access

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

BrainGate Technology

Blog banner

Virtual memory

Blog banner

Google classroom

Blog banner

Deadlock and Starvation

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Windows Operating System

Blog banner

Creating Digitally Signed Document

Blog banner

THE INPACT OF SOCIAL MEDIA!

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner