Explain fundamental models of inter process communication, Computer Engineering

Assignment Help:

Explain the two fundamental models of inter process communication.

Two kinds of message passing system are given as:

(a) Direct Communication: Along with direct communication, each process which needs to communicate should explicitly name the recipient or sender of the communication. In this way, the send and receive primitives are explained as:

  • send(P, message)- It send a message to process P.
  • receive(Q, message)- It receive a message from process Q. The communication link in this scheme has the subsequent properties:
  • A link is established automatically between every pair of processes that want to communicate. The processes require identifying only each other's know to communicate.
  • A link is connected with exactly two processes.
  • Certainly one link exists among each pair of processes.

(b) With indirect communication, the messages are sent to and received from mail-boxes or from ports. All mailboxes have a unique identification. In this method, a process can communicate with several other processes via a number of various mailboxes. Two processes can communicate only if they share a mailbox. The send and receive primitives are defined as given as below:

  • send (A, message)- it send a message to mailbox A
  • receive (A, message)- It receive a message from mailbox A. In this system, a communication link has the subsequent properties:
  • A link is established among a pair of processes only if both members of the pair have a shared mailbox.
  • A link may be connected with more than two processes.
  • A number of various links may exist between each pair of communicating processes, along with each link corresponding to one mailbox.

Related Discussions:- Explain fundamental models of inter process communication

Does weblogic jms support clustering, WebLogic JMS handles cluster-wide, tr...

WebLogic JMS handles cluster-wide, transparent access to destinations from any server in the cluster. A system administrator can set up cluster-wide, transparent access to destinat

How a java program compiles, How a Java program compiles? First sou...

How a Java program compiles? First source file name should be extended with .java extension. For example Myprog.java Execute javac compiler. javac compiler creates

Why process scheduling algorithm favour i/o bound processes, Suppose that a...

Suppose that a process scheduling algorithm favors those processes that have used the least processor time in the recent past. Why will this algorithm favour I/O- bound processes,

Explain mdr and mar, Explain MDR and MAR. The data and address lines of...

Explain MDR and MAR. The data and address lines of the external memory bus linked to the internal processor bus by the memory data register, MDR and the memory address register

Explain about cseg segment, CSEG SEGMENT  ASSUME CS:CSEG, DS:CSEG, SS:CS...

CSEG SEGMENT  ASSUME CS:CSEG, DS:CSEG, SS:CSEG  ORG 100h START:MOV AX, CSEG; Initialise data segment  MOV DS, AX; register using AX  MOV AL, NUM1; Take the first num

Why is translation look-aside buffers important, Why is Translation Look-as...

Why is Translation Look-aside Buffers (TLBs) important? The implementation of page-table is completed in the following manner: Page table is maintained in main memory.

Define underflow and overflow, Define underflow and overflow. Underflow...

Define underflow and overflow. Underflow: If the result the arithmetic operation including n-bit numbers is too small to show by n-bits, underflow is said to occur. Overflow

Illustrate role of world wide web in field of e-commerce, Illustrate the ro...

Illustrate the role of World Wide Web into the field of e-commerce. In the 1990 year, the advent of the World Wide Web upon the Internet represented a turning point into e-com

Can 8259 be interfaced with 8085 via the trap pin, I think yes...so if 8259...

I think yes...so if 8259 gives interrupt then it will be serviced instantly but since into pin is left hanging the insr bit will never be set...and so whenever any interrupt occurs

Advantage of wrapping database calls into mts transactions, Advantage of wr...

Advantage of wrapping database calls into MTS transaction If database calls are complete within the context of a transaction, aborting the transaction will undo and changes that

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd