wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Synchronization

profile
23 B Titiksha Shah
Aug 16, 2024
0 Likes
0 Discussions
116 Reads

Synchronization

The communication of a message between two processes implies some level of synchronization

between the two: The receiver cannot receive a message until it has

been sent by another process. In addition, we need to specify what happens to a

process after it issues a send or receive primitive.

Consider the send primitive first. When a send primitive is executed in a

process, there are two possibilities: Either the sending process is blocked until the

message is received, or it is not. Similarly, when a process issues a receive primitive,

there are two possibilities:

1. If a message has previously been sent, the message is received and execution

continues.

2. If there is no waiting message, then either (a) the process is blocked until

a message arrives, or (b) the process continues to execute, abandoning the

attempt to receive.

Thus, both the sender and receiver can be blocking or nonblocking. Three

combinations are common, although any particular system will usually have only

one or two combinations implemented:

• Blocking send, blocking receive: Both the sender and receiver are blocked until

the message is delivered; this is sometimes referred to as a rendezvous . This

combination allows for tight synchronization between processes.

• Nonblocking send, blocking receive: Although the sender may continue on,

the receiver is blocked until the requested message arrives. This is probably

the most useful combination. It allows a process to send one or more messages

to a variety of destinations as quickly as possible. A process that must receive

a message before it can do useful work needs to be blocked until such a message

arrives. An example is a server process that exists to provide a service or

resource to other processes.

• Nonblocking send, nonblocking receive: Neither party is required to wait.

The nonblocking send is more natural for many concurrent programming

tasks. For example, if it is used to request an output operation, such as printing, it

allows the requesting process to issue the request in the form of a message and then

carry on. One potential danger of the nonblocking send is that an error could lead

to a situation in which a process repeatedly generates messages. Because there is no

blocking to discipline the process, these messages could consume system resources,

including processor time and buffer space, to the detriment of other processes and

the OS. Also, the nonblocking send places the burden on the programmer to determine

that a message has been received


Comments ()


Sign in

Read Next

File management

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

File Systems in OS.

Blog banner

About myself

Blog banner

PERT Overview

Blog banner

How to feel Happy everyday day

Blog banner

The Five Steps of Data Science

Blog banner

Concurrency:Deadlock and Starvation

Blog banner

RAID and It's Levels

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

Discover The Top 3 Places To Stay in London

Blog banner

INTERNET SECURITY

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

BENIFITS OF YOGA

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

RAID

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

Cyber Security in Data Breaching

Blog banner

Deadlock and Starvation

Blog banner

Importance of internet

Blog banner

I/O Buffering

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

Dekkers Algorithm

Blog banner

Evolution of OS

Blog banner

VIRTUAL MACHINE

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

DURGA POOJA

Blog banner

Objectives and Functions of Operating System

Blog banner

Memory heirchy

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner

Difference Between Classification And Clustering

Blog banner

Some facts about Technology

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

What is Segmentation?

Blog banner

What are the different types of E-mail crime and process of email forensic?

Blog banner

Mumbai local ......

Blog banner

note taker app

Blog banner

Key to success in Sports

Blog banner

Linux 94

Blog banner