wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Message Passing in OS

profile
Vaibhav Chauhan
Sep 09, 2024
0 Likes
0 Discussions
62 Reads

Message Passing


 When processes interact with one another, two fundamental requirements must be satisfied: synchronization and communication. Processes need to be synchronized to enforce mutual exclusion; cooperating processes may need to exchange information. One approach to providing both of these functions is message passing. Message passing has the further advantage that it lends itself to implementation in distributed systems as well as in shared-memory multiprocessor and uniprocessor systems.


Message-passing systems come in many forms. In this section, we provide a general introduction that discusses features typically found in such systems. The actual function of message passing is normally provided in the form of a pair of primitives:


send (destination, message)

` receive (source, message)


This is the minimum set of operations needed for processes to engage in message passing. A process sends information in the form of a message to another process designated by a destination . A process receives information by executing the receive primitive, indicating the source and the message . 


Synchronisation:


 The communication of a message between two processes implies some level of synchronization between the two: The receiver cannot receive a message until it has been sent by another process. In addition, we need to specify what happens to a process after it issues a send or receive primitive.


Consider the send primitive first. When a send primitive is executed in a process, there are two possibilities: Either the sending process is blocked until the message is received, or it is not. Similarly, when a process issues a receive primitive, there are two possibilities:


1. If a message has previously been sent, the message is received and execution continues.

2. If there is no waiting message, then either

(a) the process is blocked until a message arrives, or

(b) the process continues to execute, abandoning the attempt to receive. 


Comments ()


Sign in

Read Next

File management

Blog banner

The IT Service Lifecycle

Blog banner

OS ASSIGNMENT

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

Uniprocessor Scheduling

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

Data Mining

Blog banner

Cyber Forensics

Blog banner

Modern Operating system

Blog banner

STARVATION

Blog banner

TRAIN TRAVELING

Blog banner

Importance Of Yoga.

Blog banner

"Mahakali cave"

Blog banner

COMMUNICATION

Blog banner

Rain

Blog banner

Hacking Mobile Platforms

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

Types of Malware in Cyber Security

Blog banner

Music is life

Blog banner

Deadlock

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

Health and fitness

Blog banner

Disk scheduling

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

Jira service Management

Blog banner

Operating System Objectives and Functions

Blog banner

Service Catalogue Management

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

Kafka - A Framework

Blog banner

Security in Operating Systems

Blog banner

Types Of scheduling

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

Data Analytics in Data Science

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

Deadlock

Blog banner

Access management

Blog banner

Traveling

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

Bharat Maps

Blog banner

The art of being alone

Blog banner

Deadlock in Operating System

Blog banner

K-means use cases

Blog banner