Searching for "i"

Q:

Explain the popular multiprocessor thread-scheduling strategies.

Answer

  1. Load Sharing: Processes are not assigned to a particular processor. A global queue of threads is maintained. Each processor, when idle, selects a thread from this queue. Note that load balancing refers to a scheme where work is allocated to processors on a more permanent basis.

  2. Gang Scheduling: A set of related threads is scheduled to run on a set of processors at the same time, on a 1-to-1 basis. Closely related threads / processes may be scheduled this way to reduce synchronization blocking, and minimize process switching. Group scheduling predated this strategy.

  3. Dedicated processor assignment: Provides implicit scheduling defined by assignment of threads to processors. For the duration of program execution, each program is allocated a set of processors equal in number to the number of threads in the program. Processors are chosen from the available pool.

  4. Dynamic scheduling: The number of thread in a program can be altered during the course of execution.

Report Error

View answer Workspace Report Error Discuss

Q:

What is busy waiting?

Answer

The repeated execution of a loop of code while waiting for an event to occur is called busy-waiting. The CPU is not engaged in any real productive activity during this period, and the process does not progress toward completion.

Report Error

View answer Workspace Report Error Discuss

Q:

What is virtual channel?

Answer

Virtual channel is normally a connection from one source to one destination, although multicast connections are also permitted. The other name for virtual channel is virtual circuit.

Report Error

View answer Workspace Report Error Discuss

Subject: Networking
Job Role: Network Engineer

Q:

What are the stipulations of C2 level security?

Answer

C2 level security provides for:


 


1.Discretionary Access Control


2.Identification and Authentication


3.Auditing


4.Resource reuse

Report Error

View answer Workspace Report Error Discuss

Q:

What is cycle stealing?

Answer

We encounter cycle stealing in the context of Direct Memory Access (DMA). Either the DMA controller can use the data bus when the CPU does not need it, or it may force the CPU to temporarily suspend operation. The latter technique is called cycle stealing. Note that cycle stealing can be done only at specific break points in an instruction cycle.

Report Error

View answer Workspace Report Error Discuss

Q:

When is a system in safe state?

Answer

The set of dispatchable processes is in a safe state if there exists at least one temporal order in which all processes can be run to completion without resulting in a deadlock.

Report Error

View answer Workspace Report Error Discuss

Q:

What is the resident set and working set of a process?

Answer

Resident set is that portion of the process image that is actually in real-memory at a particular instant. Working set is that subset of resident set that is actually needed for execution. (Relate this to the variable-window size method for swapping techniques.)

Report Error

View answer Workspace Report Error Discuss

Q:

What is virtual path?

Answer

Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is called path.

Report Error

View answer Workspace Report Error Discuss

Subject: Networking
Job Role: Network Engineer