Message passing in pvm, Computer Networking

Message Passing

The PVM communication model gives asynchronous blocking receive, asynchronous blocking send and nonblocking receive functions. In our methodology, a blocking send returns as early as the send buffer is free for use again, and an asynchronous send does not depend on the receiver calling a matching receive before the send can return. There are options in PVM 3 that request that data be transmitted directly from task to task. In this case, if the message is big, the sender may block until the receiver has called a matching receive.

A nonblocking receive instantaneously returns with both the data and a flag that the data has not arrived, whereas a blocking receive returns only when the data is in the receive buffer. In adding to these point-to-point communication functions, the model supports the multicast to a place of tasks and the broadcast to a user-defined group of tasks. There are also functions to present global max, global sum, etc. across a user-defined set of tasks. Wildcards can be specified in the receive for the label and the source, allowing either or both of these contexts to be ignored. A routine can be called to return the information about the received messages.

The PVM model assuring that the message order is conserved. If task 1 sends message A to task 2, then after task 1 sends message B to task 2, message A will arrive at task 2 earlier than message B. Furthermore, if both the messages arrive earlier than task 2 does a receive, then a wildcard receive will the entire time return message A.

  • int bufid = pvm_mkbuf( int encoding )

Generates a new message buffer. encoding states the buffer's encoding scheme.

Posted Date: 3/2/2013 7:23:29 AM | Location : United States







Related Discussions:- Message passing in pvm, Assignment Help, Ask Question on Message passing in pvm, Get Answer, Expert's Help, Message passing in pvm Discussions

Write discussion on Message passing in pvm
Your posts are moderated
Related Questions
Q. What is Virtual LANs? Virtual LANs - LAN (Local area network) configured by software not by physical wiring Virtual LANs - Divides a LAN into logical, in

Suppose that frames are 1250 bytes long including 25 bytes of overhead. Also assume that ACK frames are 25 bytes long. Calculate the efficiency of stop-and-wait ARQ (a) Transmits a

What is Proxy ARP? Is using a router to give answer ARP requests. This will be completed when the originating host believes that a destination is local, when in fact is lies be


Solve the following CPM/PERT Network Analysis problem: Given the following network and activity time estimates, determine earliest and latest activity times, slack, the expecte

Q. Mechanical Characteristics of RS232 interface? - 9-pin connector - 9-pin connector is more usually found in IBM-PC but it covers signals for asynchronous serial com

Q. Show the Use of flow control? Flow control denotes to a set of procedures used to restrict the amount of data that the sender can send before waiting for Error Control

Q. Illustrate Stop-and-Wait Automatic Repeat request? - Simplest flow as well as error control mechanism - The sending device keeps a duplicate copy of the last frame transm

Network Layer and Routing As discussed in previous  chapters the physical  layer  provides   connection sand services to the  data link  layer while the  data link layer is

DNS cache poisoning The DNA cache poisoning generally refers to the process of maintaining or developing the false information, in the cache of DNS server. This process refers