Explain fundamental models of inter process communication, Computer Engineering

Assignment Help:

Explain the two fundamental models of inter process communication.

Two kinds of message passing system are given as:

(a) Direct Communication: Along with direct communication, each process which needs to communicate should explicitly name the recipient or sender of the communication. In this way, the send and receive primitives are explained as:

  • send(P, message)- It send a message to process P.
  • receive(Q, message)- It receive a message from process Q. The communication link in this scheme has the subsequent properties:
  • A link is established automatically between every pair of processes that want to communicate. The processes require identifying only each other's know to communicate.
  • A link is connected with exactly two processes.
  • Certainly one link exists among each pair of processes.

(b) With indirect communication, the messages are sent to and received from mail-boxes or from ports. All mailboxes have a unique identification. In this method, a process can communicate with several other processes via a number of various mailboxes. Two processes can communicate only if they share a mailbox. The send and receive primitives are defined as given as below:

  • send (A, message)- it send a message to mailbox A
  • receive (A, message)- It receive a message from mailbox A. In this system, a communication link has the subsequent properties:
  • A link is established among a pair of processes only if both members of the pair have a shared mailbox.
  • A link may be connected with more than two processes.
  • A number of various links may exist between each pair of communicating processes, along with each link corresponding to one mailbox.

Related Discussions:- Explain fundamental models of inter process communication

Define the do while loop, The do while Loop This is very similar to the...

The do while Loop This is very similar to the while loop except that the test occurs at the end of the loop body. This guarantees that the loop is executed at least once before

Operation of micro-programmed control unit, Micro-instructions are stored i...

Micro-instructions are stored in control memory. Address register for control memory comprises the address of subsequent instruction which is to be read. Control memory Buffer Regi

Adding server-side include to the page, Step 1: Click on the icon in the ob...

Step 1: Click on the icon in the object tool bar Or Insert -> SSI Step 2: Select the file Step 3: Add the file Step 4: Provide the URL (where to be attached) Step

Describe characteristics needed for an e-commerce server, Describe the addi...

Describe the additional characteristics needed for an e-commerce server? E-commerce services need dynamic configuration abilities and seasonal and every day service configurat

What are the four factors of open source software, What are the four signif...

What are the four significant factors that led to the development of open source software? 1. To diminish the high control value of the Proprietary Software 2. To avoid disc

What do you mean by polynomial and exponential bounds, What do you mean by ...

What do you mean by polynomial and exponential bounds?   Bounds of the form nc for c greater than 0 .such a bound are known as polynomial bounds. Bounds of the form 2(n )  .suc

Explain lan topologies, Explain LAN Topologies and its basic topologies. ...

Explain LAN Topologies and its basic topologies. LAN Topologies: Network topology is a physical schematic that shows interconnection of the various users. There are four fund

How does computer know that overflow has happened, Q. How does computer kno...

Q. How does computer know that overflow has happened? Illustration: Add numbers 65 and 75 in 8 bit register in signed 2's complement notation.  Here expected result is

Explain the advantages of computer, Explain the advantages of computer ...

Explain the advantages of computer Computer is one of the main components of an Information Technology network and getting increasing popularity. Nowadays, computer technology

Explain the potential role of information technology, Question 1: Descr...

Question 1: Describe the five maturity levels of KM that an organization faces when adopting the Frid's KM framework. Question 2: (a) Describe three major issues that

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd