Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Explain Direct or Indirect Communication in Inter-process communication.

Several types of message passing system in Direct or Indirect Communication are given below:

With direct communication, each process which wants to communicate should explicitly name the recipient or sender of the communication. In such scheme, the send and receive primitives are explained as:

a. send(P, message)- Send a message to process P.

b. receive(Q, message)- Receive a message from process Q.

A communication link in this scheme has the subsequent properties:

a. A link is established automatically in between every pair of processes which want to communicate. The processes need knowing only each other's identity to communicate.

b. A link is connected with exactly two processes.

c. Exactly one link exists in between each pair of processes.

With indirect communication, the messages are sent to and received from ports or mailboxes. All mailboxes have identification of uniqueness. In such scheme, a process can communicate along with some other process via numerous type mailboxes. There are two processes can communicate only if they share a mailbox. Both send and receive primitives are explained as follows:

a. send (A, message)- Send a message to mailbox A

b. receive (A, message)- Receive a message from mailbox A.

In such scheme, a communication link has the subsequent properties

a. A link is established in between a pair of processes only if both members of the pair have a shared mailbox.

b. A link may be connected with more than two processes.

c. A number of different links may exist in between each pair of communicating processes, along with each link corresponding to one mailbox.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9544465

Have any Question?


Related Questions in Computer Engineering

Submit a report in which you plan a strategy for

Submit a report in which you plan a strategy for introducing or improving a mobile Web site in your organisation (or an organisation with which you are familiar). Your report must outline how your choice of strategy will ...

Suppose you are given a connected graph g with edge costs

Suppose you are given a connected graph G, with edge costs that are all distinct. Prove that G has a unique minimum spanning tree.

Explain a business process you are familiar with describe

Explain a business process you are familiar with. Describe how a computer-based information system is related (or used) in this business process. Explain how a computer-based information systems can improve the efficienc ...

Question add referenceswrite 1 page that respond to the

Question: Add References Write 1 page that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and ...

This is in reference to cshort answer questions1 what is

This is in reference to C++ Short Answer Questions: 1) What is the definition of Big-O? What do we use Big-O notation to show? 2) Define recursion. Can every recursive algorithm be written as an iterative algorithm? 3) H ...

Question physical security provides various forms of

Question: Physical security provides various forms of deterrents. Using proper APA formatting write 4-6 pages, not including your title or reference pages addressing the following. 1. What are some of the physical barrie ...

String cyclic leftshift string s int k that creates and

String cyclic LeftShift (String s, int k) that creates and returns a string in which character of s has been moved left k steps, so that the characters that would "fall off' the left end are appended to the right. For ex ...

Subject digital securityprovide an fidm authentication

subject : Digital Security Provide an FIdM authentication system that you have used (being subjet to). Tell the name of the organizations acted as the IdP (Identity Provider) and SP (Service Provider)?

What is unified threat management utm and the services it

What is Unified Threat Management (UTM) and the services it combines into one device. Does UTM holds true to the principle of defense-in-depth

The contents of a particular bottle of shampoo marked as

The contents of a particular bottle of shampoo marked as 150 ml are found to be 153 ml at an average, with a standard deviation of 2.5 ml. What proportion of shampoo bottles contain less than the marked quantity? Assume ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As