wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Multiprocessor

profile
Riya Singh
Jul 04, 2024
0 Likes
0 Discussions
65 Reads

Multiprocessor has many processors on one system . Like various parts of our brain which come together to execute instructions and carry out some program or work . These multiprocessors are efficient as its processors work in a collaboration this parallel programming is possible. What is parallel programming? Good question! It's like opening various applications all together like opening vs code and Adobe editor and browser simultaneously. So to run these all programs together they require parallel programming. Here's where the multiprocessor comes in frame and helps to execute all this together. 

There are 2 types of multiprocessor systems based on how they access memory and I/O devices. 

1. Shared memory....where main memory and peripherals are used by all the processors to execute instructions concurrently. Since the same bus is used to access main memory traffic is created and other processors have to idle (like on marines drive on 4th July ...cars are in traffic and idle..can't help roads that are not accessible).

2. Distributed memory...where each processor has its own memory to fetch from and when a remote program is needed they get to the main memory .....

Though it has various advantages like working in collaboration makes execution more efficient (unlike our group projects where everything is done by one person). It also requires complex configuration and it's expensive.There is also deadlock condition where one processor can't access an I/O device just because some other processor is using it .And it's complicated just like when a small is assigned to more than required people leading to no optimum utilisation of resources...


Comments ()


Sign in

Read Next

Blockchain Security Technique

Blog banner

Random Forests

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Memory Management

Blog banner

Types Of scheduling

Blog banner

5 Powerful Mindset Shifts To Make 2026 Your Breakthrough Year

Blog banner

VPN

Blog banner

INTERNET

Blog banner

Proton mail

Blog banner

5 Common Faults In Construction Tenders

Blog banner

Memory Management

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

TRELLO

Blog banner

Why we fail after giving 100% ?

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

John Titor: The Time Traveler

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

Design Considerations for Disk Cache Management

Blog banner

5 Stages of Digital Marketing

Blog banner

Linux Threads:

Blog banner

INTERNET

Blog banner

Digital Forensics Challenges and Tools

Blog banner

I/O Buffering

Blog banner

Severe landslides continue to cause concern in Joshimath, Uttarakhand

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

The IT Service Lifecycle

Blog banner

Perfect Moments to Wear a Rich Patola Design Outfit

Blog banner

AI and Cyber Security

Blog banner

Go Daddy

Blog banner

Strengthening Active Directory Security

Blog banner

What is service level Agreement?

Blog banner

Music

Blog banner

semaphores in os

Blog banner

Virtual Memory

Blog banner

Cyber Forensic in the Banking sector

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Steganography and Steganalysis

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner