Point-to-point message passing, Computer Networking

Assignment Help:

In point-to-point message passing, single process sends/receives message to/from another process. There are four communication modes for sending a message:

i)    Buffered mode: Send can be started whether or not matching receives has been initiated, and send may finish before matching accept is initiated.

ii)  Synchronous mode: Send can be started whether or not matching receives has been initiated, but send will finished only after matching receives has been initiated.

iii) Ready mode: Send can be started only if matching receives has already been started.

iv)  Standard mode: May behave like either synchronous mode or buffered mode, depending on specific execution of MPI and availability of memory for buffer space.

MPI gives both blocking and non-blocking send and takes operations for all modes.

 Functions for a variety of communication modes:

Mode

Blocking

Non blocking

Standard

MPI_Send

MPI_Isend

Buffered

MPI_Bsend

MPI_Ibsend

Synchronous

MPI_Ssend

MPI_Issend

 Ready

MPI_Rsend

MPI_Irsend

MPI_Irecv and MPI_Recv are blocking and nonblocking functions for regardless of mode and receiving messages.

Besides send and receive functions, MPI gives some more useful functions for communications. Some of them are being given here.

MPI_Buffer_attach used to give buffer space for buffered mode. Nonblocking functions contain request argument used subsequently to determine whether requested operation has finished.

MPI_Test and MPI_Wait wait or test for completion of nonblocking communication.

MPI_Probe and MPI_Iprobe probe for incoming message without really receiving it. Information about message determined by probing can be used to decide how to take it.

MPI_Cancel cancels outstanding message demand, useful for cleanup at the end of a program or after major state of computation.


Related Discussions:- Point-to-point message passing

What is cryptography, The science and art of manipulating messages in order...

The science and art of manipulating messages in order to create them secure is known as cryptography..... Two types are:- Symmetric key cryptography and Asymmetric key crypto

Determine the functioning of service support, Determine the functioning of ...

Determine the functioning of Service Support Service Support must be considered a strong point for hardware, especially for servers and should be available readily. Many brande

Networking, discuss the interdependence of workstation hardware with releva...

discuss the interdependence of workstation hardware with relevant software

Explain the technique- backpressure, Explain the technique- Backpressure ...

Explain the technique- Backpressure This technique produces an effect same to backpressure in fluids flowing down a pipe. It includes link-by-link use of flow control in a dire

Bluej programming, i have been given a question:- any 50 numbers are given ...

i have been given a question:- any 50 numbers are given and to find out the 1)frequency of odd and even numbers 2)frequency of positive and negative numbers

Request to a server, If a client gives a 4096-byte request to a server loca...

If a client gives a 4096-byte request to a server located 50 km away on a 1 Gbps fiber optic, then what is the efficiency of the line during this time? Suppose that the server give

The cut-through switching technique work, How does the cut-through switchin...

How does the cut-through switching technique work? Ans) Cut-Through switching copies only the destination address which is the first 6 bytes after the =frame preamble into its b

command saves the configuration stored in ram to nvram, Which command save...

Which command saves the configuration stored in RAM to NVRAM Ans) copy running-config startup-config is the command which saves the configuration stored in RAM to NVRAM

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd