wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Message Passing in OS

profile
Vaibhav Chauhan
Sep 09, 2024
0 Likes
0 Discussions
62 Reads

Message Passing


 When processes interact with one another, two fundamental requirements must be satisfied: synchronization and communication. Processes need to be synchronized to enforce mutual exclusion; cooperating processes may need to exchange information. One approach to providing both of these functions is message passing. Message passing has the further advantage that it lends itself to implementation in distributed systems as well as in shared-memory multiprocessor and uniprocessor systems.


Message-passing systems come in many forms. In this section, we provide a general introduction that discusses features typically found in such systems. The actual function of message passing is normally provided in the form of a pair of primitives:


send (destination, message)

` receive (source, message)


This is the minimum set of operations needed for processes to engage in message passing. A process sends information in the form of a message to another process designated by a destination . A process receives information by executing the receive primitive, indicating the source and the message . 


Synchronisation:


 The communication of a message between two processes implies some level of synchronization between the two: The receiver cannot receive a message until it has been sent by another process. In addition, we need to specify what happens to a process after it issues a send or receive primitive.


Consider the send primitive first. When a send primitive is executed in a process, there are two possibilities: Either the sending process is blocked until the message is received, or it is not. Similarly, when a process issues a receive primitive, there are two possibilities:


1. If a message has previously been sent, the message is received and execution continues.

2. If there is no waiting message, then either

(a) the process is blocked until a message arrives, or

(b) the process continues to execute, abandoning the attempt to receive. 


Comments ()


Sign in

Read Next

This is my first blog.

Blog banner

Article on team management software

Blog banner

Deadlock and Starvation

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Deadlock

Blog banner

Internet: The Vast Ocean Of Knowledge.

Blog banner

Riddhi Miyani 53003220140

Blog banner

Cache Memory

Blog banner

OS Assignment 1

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

Best password managers: Reviews of the top products

Blog banner

RAID

Blog banner

Steganography

Blog banner

GIS Topography

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

SQL Injection Techniques

Blog banner

Deadlock and Starvation

Blog banner

Time Series Analysis

Blog banner

Importance of Network Security Risk

Blog banner

Android Flashlight Application

Blog banner

Memory Management

Blog banner

10 Reasons why Monica and Chandler are the best couple ever.!!!

Blog banner

Operating system

Blog banner

Memory Management

Blog banner

Tracking Emails & Email Crimes

Blog banner

Memory Management Techniques

Blog banner

Different Types of Data

Blog banner

DBMS and various career options related to it.

Blog banner

Proof-of-Stake (PoS)

Blog banner

I/O Buffering

Blog banner

Trello ( management software)

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

A Deep Dive

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

PROCESS STATE:

Blog banner

Water Resources are about to exhaust...

Blog banner

Deadlock

Blog banner

What are NFT s?

Blog banner

Vulnerability Assessment

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner