wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Message Passing in OS

profile
Vaibhav Chauhan
Sep 09, 2024
0 Likes
0 Discussions
62 Reads

Message Passing


 When processes interact with one another, two fundamental requirements must be satisfied: synchronization and communication. Processes need to be synchronized to enforce mutual exclusion; cooperating processes may need to exchange information. One approach to providing both of these functions is message passing. Message passing has the further advantage that it lends itself to implementation in distributed systems as well as in shared-memory multiprocessor and uniprocessor systems.


Message-passing systems come in many forms. In this section, we provide a general introduction that discusses features typically found in such systems. The actual function of message passing is normally provided in the form of a pair of primitives:


send (destination, message)

` receive (source, message)


This is the minimum set of operations needed for processes to engage in message passing. A process sends information in the form of a message to another process designated by a destination . A process receives information by executing the receive primitive, indicating the source and the message . 


Synchronisation:


 The communication of a message between two processes implies some level of synchronization between the two: The receiver cannot receive a message until it has been sent by another process. In addition, we need to specify what happens to a process after it issues a send or receive primitive.


Consider the send primitive first. When a send primitive is executed in a process, there are two possibilities: Either the sending process is blocked until the message is received, or it is not. Similarly, when a process issues a receive primitive, there are two possibilities:


1. If a message has previously been sent, the message is received and execution continues.

2. If there is no waiting message, then either

(a) the process is blocked until a message arrives, or

(b) the process continues to execute, abandoning the attempt to receive. 


Comments ()


Sign in

Read Next

The IT Service Lifecycle

Blog banner

FRIENDSHIP

Blog banner

Deadlock in Operating System

Blog banner

E-BUSINESS RISK MANAGEMENT

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

Europe Through My Lens

Blog banner

Getting to Kashmir: Alternative to the Jammu-Srinagar highway

Blog banner

Security requirements for Safe E-Payments

Blog banner

Real time scheduling

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

10 Problems you face if you are an Otaku

Blog banner

Embedded Operating System

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

Virtual memory

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner

Way to make your meal healthier.

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

How to write a cover letter

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

Broken Authentication Attacks

Blog banner

Dekkers Algorithm

Blog banner

Decrypting Cryptocurrency: Tracing Transactions in Cyber Investigations

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

Starvation and Deadlock.

Blog banner

Phishing

Blog banner

computer security

Blog banner

VPN

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

Short note on expert system

Blog banner

Concurrency and Deadlocks

Blog banner

Memory Management

Blog banner

Deadlock and Starvation

Blog banner

Virtual Machine

Blog banner

WHAT IS SNAPCHAT AND HOW DOES IT WORK?

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

Have You Explored India Yet?

Blog banner

Not anti-social, but pro-solitude

Blog banner

Malware Detection Techniques for Mobile Devices

Blog banner

Thumb Sucking: When It’s Normal and When It Becomes a Dental Problem

Blog banner

Open Source Project By Google

Blog banner

AI and cyber Security

Blog banner