Solved

Named Pipes in Unix

Posted on 1998-12-08
1
901 Views
Last Modified: 2013-12-23
Under NT I have written code to use named pipes for interprocess and network communication. In Unix I know about anonymous pipes between processes on the same machine. Can I use named pipes in Unix?  How?
0
Comment
Question by:gumby119
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 4

Accepted Solution

by:
davidmwilliams earned 80 total points
ID: 1582671
 Yes, named pipes exist in Unix and they are often called FIFOs.
  Create a named pipe using the mknod command or with the mkfifo function.  To create a named pipe called FRED do this,

mknod FRED p

You can modify the pipe's permissions like you do any other file.  The main advantage of named pipes is that they are bi-directional, either side canread or write.  You can manipulate the pipe like you do an anonymous pipe.  Note that the kernel does not distinguish between who is reading and who is writing so a process can actually read back what it wrote.
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses
Course of the Month7 days, 5 hours left to enroll

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question