Issues to process of message passing, Computer Networking

Assignment Help:

The following issues are decided by the system in the process of message passing:

1) Whether the communication link is established or not

2) Whether the receiver is ready to receive the message

3)  One or more messages can be sent to the same destination node

 The message passing can be of two types: Synchronous and Asynchronous

In Synchronous, the message passing is executed on synchronous communication network.  In this case, the sender and receiver processes must be synchronized in time and space. Time synchronization means both processes must be ready before message transmission takes place. The space synchronization needs the availability of interconnection link.

In Asynchronous message passing, message-sending and receiving are not synchronized in time and space.  Now, the store and forward technology may be used. The blocked messages are buffered for later transmission.  Because of finite size buffer the system may be blocked even in buffered Asynchronous non-blocking system.

 

 


Related Discussions:- Issues to process of message passing

Network layer in osi model, The Network layer is used to route physical dat...

The Network layer is used to route physical data to the destination point, it decides the actual path from where data travels to destination point. The network layer supports both

Different models of computation-parallel algorithms, There are various comp...

There are various computational models for representing the parallel computers. In this part, we discuss various models. These models would give a platform for the designing as wel

Transport layer , Transport Layer In computer networking it the transp...

Transport Layer In computer networking it the transport  layer is where  sessions are  exchanged between  hosts. This layer resides  between  the application layer and  networ

State some security models, State some Security Models The first and f...

State some Security Models The first and foremost thing one needs to do is to chalk out a security plan and policy based on any security model. The term security policy shall

What are major types of networks and explain, What are major types of netwo...

What are major types of networks and explain? Server-based network: Give centralized control of network resources and depend on server computers to give security and network

Systolic array, Systolic Array This interconnection network is a kind o...

Systolic Array This interconnection network is a kind of pipelined array architecture and it is designed for multidimensional flow of data. It is used for executing fixed algor

Encryption authentication - point to point , Encryption Authentication ...

Encryption Authentication One common  technique  used to encrypt and authenticate in VPNs is IP security. IP sec  is a collection of protocols designed by the IETF( Internet En

Explain about bridges, Bridges The bridge function is to attach separat...

Bridges The bridge function is to attach separate homogeneous networks. Bridges map the Ethernet address of the nodes residing on each network segment and allow only essential

Des key, Assume the following 64-bit DES key (expressed in hexadecimal): FE...

Assume the following 64-bit DES key (expressed in hexadecimal): FEFE FEFE FEFE FEFE (a) What is the term for such a key? (b) State the value of each of the 48-bit round keys

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd