Explain fundamental models of inter process communication, Computer Engineering

Assignment Help:

Explain the two fundamental models of inter process communication.

Two kinds of message passing system are given as:

(a) Direct Communication: Along with direct communication, each process which needs to communicate should explicitly name the recipient or sender of the communication. In this way, the send and receive primitives are explained as:

  • send(P, message)- It send a message to process P.
  • receive(Q, message)- It receive a message from process Q. The communication link in this scheme has the subsequent properties:
  • A link is established automatically between every pair of processes that want to communicate. The processes require identifying only each other's know to communicate.
  • A link is connected with exactly two processes.
  • Certainly one link exists among each pair of processes.

(b) With indirect communication, the messages are sent to and received from mail-boxes or from ports. All mailboxes have a unique identification. In this method, a process can communicate with several other processes via a number of various mailboxes. Two processes can communicate only if they share a mailbox. The send and receive primitives are defined as given as below:

  • send (A, message)- it send a message to mailbox A
  • receive (A, message)- It receive a message from mailbox A. In this system, a communication link has the subsequent properties:
  • A link is established among a pair of processes only if both members of the pair have a shared mailbox.
  • A link may be connected with more than two processes.
  • A number of various links may exist between each pair of communicating processes, along with each link corresponding to one mailbox.

Related Discussions:- Explain fundamental models of inter process communication

Performance of computer system, Performance of computer system: Comput...

Performance of computer system: Computer performance is frequently described in terms of clock speed (usually in MHz or GHz). It refers to the cycles per second of the main cl

Input device used in computer system, Input device used in computer system:...

Input device used in computer system: An input device is typically a mouse or keyboard, the input device is the conduit through which data and instructions enter a computer. A

Explain data rates in public switched telephone network, Explain data rates...

Explain data rates in public switched telephone network. Data rates in PSTNs : A voice channel in a public switched telephone network is band restricted with a nominal bandwid

the bias and standard error , A random variable (X) is modelled as an expo...

A random variable (X) is modelled as an exponentially distributed with mean 30 units. Simulate N = 50 samples from this distribution, and every sample must have m = 20 simulated va

Prolog programming language, Prolog Programming Language : Probably pr...

Prolog Programming Language : Probably programming languages are procedural: than the programmer specifies exactly the right instructions (algorithms) required to get an agent

What is the cih, CIH, also known  as Chernobyl or Spacefiller, is a Microso...

CIH, also known  as Chernobyl or Spacefiller, is a Microsoft Windows computer virus which first emerged in 1998. It is one of the most damaging viruses, overwriting critical inform

Process of minimax algorithm, Process of Minimax algorithm: Our aim is...

Process of Minimax algorithm: Our aim is just to write the best of best score on the top branches of the tree that player one can guarantee to score if he chooses that move.

Existential elimination, Existential Elimination : Now we have a sente...

Existential Elimination : Now we have a sentence, A, is with an  existentially quantified variable, v, so then just for every constant symbol k, that it does not appear anywhe

Compare excess 3 codes and gray code, Compare excess 3 codes and gray cod...

Compare excess 3 codes and gray code. Ans. Excess 3 Codes 1. This is the other form of BCD code. All decimal digits are coded in 4 bit binary code. 2. The code

Ellipse follows the perimeter of the window, A) Execute a program where an ...

A) Execute a program where an ellipse follows the perimeter of the window. B)  Execute a program that can draw graphs, possibly following your plan from last week. Have it graph

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd