wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Message Passing in OS

profile
Vaibhav Chauhan
Sep 09, 2024
0 Likes
0 Discussions
62 Reads

Message Passing


 When processes interact with one another, two fundamental requirements must be satisfied: synchronization and communication. Processes need to be synchronized to enforce mutual exclusion; cooperating processes may need to exchange information. One approach to providing both of these functions is message passing. Message passing has the further advantage that it lends itself to implementation in distributed systems as well as in shared-memory multiprocessor and uniprocessor systems.


Message-passing systems come in many forms. In this section, we provide a general introduction that discusses features typically found in such systems. The actual function of message passing is normally provided in the form of a pair of primitives:


send (destination, message)

` receive (source, message)


This is the minimum set of operations needed for processes to engage in message passing. A process sends information in the form of a message to another process designated by a destination . A process receives information by executing the receive primitive, indicating the source and the message . 


Synchronisation:


 The communication of a message between two processes implies some level of synchronization between the two: The receiver cannot receive a message until it has been sent by another process. In addition, we need to specify what happens to a process after it issues a send or receive primitive.


Consider the send primitive first. When a send primitive is executed in a process, there are two possibilities: Either the sending process is blocked until the message is received, or it is not. Similarly, when a process issues a receive primitive, there are two possibilities:


1. If a message has previously been sent, the message is received and execution continues.

2. If there is no waiting message, then either

(a) the process is blocked until a message arrives, or

(b) the process continues to execute, abandoning the attempt to receive. 


Comments ()


Sign in

Read Next

Capacity management in ITSM

Blog banner

FREE VERSION OF G-MAIL

Blog banner

Virtual Memory

Blog banner

How To Secure Operating Systems ?

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner

SQL Injection Techniques

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner

Marvel Cinematic Universe

Blog banner

Data Warehousing

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

Digital Marketing Ethics Transparency Trust And Brand Reputation digital

Blog banner

Mumbai Metro 3

Blog banner

Constrains in service design

Blog banner

Deadlock

Blog banner

Women Empowerment

Blog banner

E-security systems | CCTV

Blog banner

INTERRUPTS

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

DURGA POOJA

Blog banner

New Horizon Europe project ‘EvoLand’ sets off to develop new prototype services.

Blog banner

Product Discount Calculator

Blog banner

Types of Threads

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

MODERN OPERATING SYSTEM

Blog banner

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

10 Interesting Facts about Death Note

Blog banner

Data Structures

Blog banner

Virus

Blog banner

memory managment

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

Interrupts in OS

Blog banner

I/O buffer and its techniques

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

This too shall pass

Blog banner

RAID

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner