Issues to process of message passing, Computer Networking

The following issues are decided by the system in the process of message passing:

1) Whether the communication link is established or not

2) Whether the receiver is ready to receive the message

3)  One or more messages can be sent to the same destination node

 The message passing can be of two types: Synchronous and Asynchronous

In Synchronous, the message passing is executed on synchronous communication network.  In this case, the sender and receiver processes must be synchronized in time and space. Time synchronization means both processes must be ready before message transmission takes place. The space synchronization needs the availability of interconnection link.

In Asynchronous message passing, message-sending and receiving are not synchronized in time and space.  Now, the store and forward technology may be used. The blocked messages are buffered for later transmission.  Because of finite size buffer the system may be blocked even in buffered Asynchronous non-blocking system.



Posted Date: 3/4/2013 5:42:19 AM | Location : United States

Related Discussions:- Issues to process of message passing, Assignment Help, Ask Question on Issues to process of message passing, Get Answer, Expert's Help, Issues to process of message passing Discussions

Write discussion on Issues to process of message passing
Your posts are moderated
Related Questions
a) An Introduction/Overview of Network Security issues. b) A Risk Assessment  analysis- to include:             Assets                                                         T

Question 1 Describe any five different types of computers Question 2 Explain Bus Type LAN. Its advantages and disadvantages and examples Question 3 Explain the s

Define the term Socks- Network security As it is well known, each type of network security protects data at a different layer of the OSI model. Built-in at each layer lies the

Briefly write functionalities of different OSI layers? The OSI Reference Model includes seven layers. Basic functionality of each of them is as follows: 1. Physical Layer:

Write the layer on which layer does L2F, PPTP and L2TP operate?

Q1.  What  advantages  do  you  see  in  having  a  layered  concept  of  computer  networks?  Which layers or OSI structure deals with identification of a host? Explain the proces

Security models by giving striking analogies to the real world A classical case study: (With due acknowledgements to the security exponent who proposed this theory.) He has c