One form of multiprocessing, a situation in which two or more processors operate in unison
parallel processing
There are two primary benefits to parallel processing systems: _________________ and ________________.
increased reliability and faster processing
Increased flexibility brings increased complexity, however, and two major challenges remain: _________________________
Three typical configurations are:
master/slave configuration
loosely coupled configuration
symmetric configuration
a single-processor system with additional slave processors, each of which is managed by the primary master processor
master/slave configuration
advantage and disadvantage of master/slave configuration
advantage: simplicity
disadvantage:
each processor controls its own resources—its own files, access to memory, and its own I/O devices—and that means that each processor maintains its own commands and I/O management tables.
loosely coupled configuration
advantage and disadvantage of loosely coupled configuration
advantage: not prone to catastrophic system failures because even when a single processor fails, the others can continue to work independently
disadvantage: difficult to detect when a processor has failed
The symmetric configuration has four advantages over loosely coupled configuration:
disadvantage of symmetric configuration
the most difficult configuration to implement because the processes must be well synchronized to avoid the problems of races and deadlocks
other term for symmetric configuration
tightly coupled
In a __________________, processor scheduling is decentralized.
symmetric configuration
algorithms to resolve conflicts between processors
process synchronization
What steps must each processor perform when Processor 1 and Processor 2 finish their current jobs at the same time?
it is a critical section and its execution must be handled as a unit.
critical region
explain lock-andkey arrangement
Before a process can work on a critical region, it must get the key. And once it has the key, all other processes are locked out until it finishes, unlocks the entry to the critical region, and returns the key so that another process can get the key and begin work.
lock-and-key arrangement consists of two actions
(1) the process must first see if the key is available
(2) if it is available, the process must pick it up and put it in the lock to make it unavailable to all other processes.
Several locking mechanisms have been developed, including:
test-and-set
WAIT and SIGNAL
semaphores
_______ is a single, indivisible machine instruction known simply as TS and was introduced by IBM for its multiprocessing System 360/370 computers.
Test-and-set
two drawbacks of test and set
is a modification of test-and-set that’s designed to remove busy waiting.
WAIT and SIGNAL
two operations added in WAIT and SIGNAL
WAIT and SIGNAL
A _______ is a non-negative integer variable that’s used as a binary signal, a flag.
semaphore
In an operating system, a semaphore performs a similar function: It signals if and when a resource is free and can be used by a process. Dijkstra (1965) introduced two operations to overcome the process synchronization problem we’ve discussed. Dijkstra called them P and V, and that’s how they’re known today.
what does P and V stand for
The P stands for the Dutch word proberen (to test)
The V stands for verhogen (to increment).
The P and V operations do just that: They test and increment.