?
Solved

Named Pipes in Unix

Posted on 1998-12-08
1
Medium Priority
?
922 Views
Last Modified: 2013-12-23
Under NT I have written code to use named pipes for interprocess and network communication. In Unix I know about anonymous pipes between processes on the same machine. Can I use named pipes in Unix?  How?
0
Comment
Question by:gumby119
1 Comment
 
LVL 4

Accepted Solution

by:
davidmwilliams earned 320 total points
ID: 1582671
 Yes, named pipes exist in Unix and they are often called FIFOs.
  Create a named pipe using the mknod command or with the mkfifo function.  To create a named pipe called FRED do this,

mknod FRED p

You can modify the pipe's permissions like you do any other file.  The main advantage of named pipes is that they are bi-directional, either side canread or write.  You can manipulate the pipe like you do an anonymous pipe.  Note that the kernel does not distinguish between who is reading and who is writing so a process can actually read back what it wrote.
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

WARNING:   If you follow the instructions here, you will wipe out your VTP and VLAN configurations.  Make sure you have backed up your switch!!! I recently had some issues with a few low-end Cisco routers (RV325) and I opened a case with Cisco TA…
This month, Experts Exchange’s free Course of the Month is focused on CompTIA IT Fundamentals.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…

609 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question