wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Synchronization

profile
23 B Titiksha Shah
Aug 16, 2024
0 Likes
0 Discussions
116 Reads

Synchronization

The communication of a message between two processes implies some level of synchronization

between the two: The receiver cannot receive a message until it has

been sent by another process. In addition, we need to specify what happens to a

process after it issues a send or receive primitive.

Consider the send primitive first. When a send primitive is executed in a

process, there are two possibilities: Either the sending process is blocked until the

message is received, or it is not. Similarly, when a process issues a receive primitive,

there are two possibilities:

1. If a message has previously been sent, the message is received and execution

continues.

2. If there is no waiting message, then either (a) the process is blocked until

a message arrives, or (b) the process continues to execute, abandoning the

attempt to receive.

Thus, both the sender and receiver can be blocking or nonblocking. Three

combinations are common, although any particular system will usually have only

one or two combinations implemented:

• Blocking send, blocking receive: Both the sender and receiver are blocked until

the message is delivered; this is sometimes referred to as a rendezvous . This

combination allows for tight synchronization between processes.

• Nonblocking send, blocking receive: Although the sender may continue on,

the receiver is blocked until the requested message arrives. This is probably

the most useful combination. It allows a process to send one or more messages

to a variety of destinations as quickly as possible. A process that must receive

a message before it can do useful work needs to be blocked until such a message

arrives. An example is a server process that exists to provide a service or

resource to other processes.

• Nonblocking send, nonblocking receive: Neither party is required to wait.

The nonblocking send is more natural for many concurrent programming

tasks. For example, if it is used to request an output operation, such as printing, it

allows the requesting process to issue the request in the form of a message and then

carry on. One potential danger of the nonblocking send is that an error could lead

to a situation in which a process repeatedly generates messages. Because there is no

blocking to discipline the process, these messages could consume system resources,

including processor time and buffer space, to the detriment of other processes and

the OS. Also, the nonblocking send places the burden on the programmer to determine

that a message has been received


Comments ()


Sign in

Read Next

File Management system

Blog banner

Impact of social media on the human life

Blog banner

VIDEO INTERVIEWS : A NEW ECOSYSTEM TO GET DREAM JOBS

Blog banner

Paid Email

Blog banner

Memory Management in Operating System

Blog banner

What is thread and multithreading ?

Blog banner

geographic information system (GIS)

Blog banner

Deadlock

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

File management -disha parekh

Blog banner

Go Daddy

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Session Hijacking

Blog banner

MY FIRST BLOG?

Blog banner

Honeypot in cyber security

Blog banner

Digital Marketing Ethics Transparency Trust And Brand Reputation digital

Blog banner

Hash password! Is it really secured?

Blog banner

Ethical Hacking

Blog banner

GIS REMOTE SENSING

Blog banner

BharatPe

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Severe landslides continue to cause concern in Joshimath, Uttarakhand

Blog banner

What is Amazon?

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

The most common internet security threats

Blog banner

Beatbox

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner

Music is life

Blog banner

Discover The Top 3 Places To Stay in London

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

Why Data Security Is Important

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

Uniprocessor scheduling

Blog banner

Introduction to Solidity Programming for Blockchain Development

Blog banner

What is service level Agreement?

Blog banner

Embaded operating system

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

virtual machine

Blog banner

Evolution of Operating system.

Blog banner

Cybersecurity Standards for Automotive

Blog banner

AI and cyber Security

Blog banner