wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Synchronization

profile
23 B Titiksha Shah
Aug 16, 2024
0 Likes
0 Discussions
116 Reads

Synchronization

The communication of a message between two processes implies some level of synchronization

between the two: The receiver cannot receive a message until it has

been sent by another process. In addition, we need to specify what happens to a

process after it issues a send or receive primitive.

Consider the send primitive first. When a send primitive is executed in a

process, there are two possibilities: Either the sending process is blocked until the

message is received, or it is not. Similarly, when a process issues a receive primitive,

there are two possibilities:

1. If a message has previously been sent, the message is received and execution

continues.

2. If there is no waiting message, then either (a) the process is blocked until

a message arrives, or (b) the process continues to execute, abandoning the

attempt to receive.

Thus, both the sender and receiver can be blocking or nonblocking. Three

combinations are common, although any particular system will usually have only

one or two combinations implemented:

• Blocking send, blocking receive: Both the sender and receiver are blocked until

the message is delivered; this is sometimes referred to as a rendezvous . This

combination allows for tight synchronization between processes.

• Nonblocking send, blocking receive: Although the sender may continue on,

the receiver is blocked until the requested message arrives. This is probably

the most useful combination. It allows a process to send one or more messages

to a variety of destinations as quickly as possible. A process that must receive

a message before it can do useful work needs to be blocked until such a message

arrives. An example is a server process that exists to provide a service or

resource to other processes.

• Nonblocking send, nonblocking receive: Neither party is required to wait.

The nonblocking send is more natural for many concurrent programming

tasks. For example, if it is used to request an output operation, such as printing, it

allows the requesting process to issue the request in the form of a message and then

carry on. One potential danger of the nonblocking send is that an error could lead

to a situation in which a process repeatedly generates messages. Because there is no

blocking to discipline the process, these messages could consume system resources,

including processor time and buffer space, to the detriment of other processes and

the OS. Also, the nonblocking send places the burden on the programmer to determine

that a message has been received


Comments ()


Sign in

Read Next

Race Condition

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

Street foods

Blog banner

Fault Tolerance

Blog banner

I/O buffer and its techniques

Blog banner

Building Confidence in Children Through Daily Routines and Play

Blog banner

Platonic Solids

Blog banner

Session Hijacking

Blog banner

Types of Malware in Cyber Security

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

Service Strategy In ITSM

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

Jira service Management

Blog banner

LIMITED EDITION

Blog banner

Virtual memory

Blog banner

Memory

Blog banner

"Audit" In Data Science

Blog banner

IO Buffers

Blog banner

Defining youtubr

Blog banner

Race Condition in Operating Theatre

Blog banner

Virtual Machine

Blog banner

Deadlock and Starvation

Blog banner

Consumer to consumer Business model

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

Deadlock

Blog banner

operating system

Blog banner

1.1 basic elements

Blog banner

Heart Fulness Meditation

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

Direct memory access (DMA)

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

Synchronization

Blog banner

I/O Management and Disk Scheduling

Blog banner

Concurrency and memory

Blog banner

Design Considerations for Disk Cache Management

Blog banner

Four Stalls Every Vegetarian Needs To Eat At Outside Vile Parle Station

Blog banner

Race Condition in Operating Theatre

Blog banner

The Golden Temple , Amritsar

Blog banner

Uniprocessor Scheduling

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner