Message passing in pvm, Computer Networking

Message Passing

The PVM communication model gives asynchronous blocking receive, asynchronous blocking send and nonblocking receive functions. In our methodology, a blocking send returns as early as the send buffer is free for use again, and an asynchronous send does not depend on the receiver calling a matching receive before the send can return. There are options in PVM 3 that request that data be transmitted directly from task to task. In this case, if the message is big, the sender may block until the receiver has called a matching receive.

A nonblocking receive instantaneously returns with both the data and a flag that the data has not arrived, whereas a blocking receive returns only when the data is in the receive buffer. In adding to these point-to-point communication functions, the model supports the multicast to a place of tasks and the broadcast to a user-defined group of tasks. There are also functions to present global max, global sum, etc. across a user-defined set of tasks. Wildcards can be specified in the receive for the label and the source, allowing either or both of these contexts to be ignored. A routine can be called to return the information about the received messages.

The PVM model assuring that the message order is conserved. If task 1 sends message A to task 2, then after task 1 sends message B to task 2, message A will arrive at task 2 earlier than message B. Furthermore, if both the messages arrive earlier than task 2 does a receive, then a wildcard receive will the entire time return message A.

  • int bufid = pvm_mkbuf( int encoding )

Generates a new message buffer. encoding states the buffer's encoding scheme.

Posted Date: 3/2/2013 7:23:29 AM | Location : United States







Related Discussions:- Message passing in pvm, Assignment Help, Ask Question on Message passing in pvm, Get Answer, Expert's Help, Message passing in pvm Discussions

Write discussion on Message passing in pvm
Your posts are moderated
Related Questions
What is DoS? A do, or Denial-of-Service attack, is an attempt to stop users from being able to access the internet or any other network services. Such attacks might be come in

Hardware difficulty It refers to the price of hardware logic like connectors, wires, switches, arbiter etc. that are required for execution of interconnection network.



Determine the term - Mobility Mobility refers to the types of physical transitions that can be done by a mobile node within an 802.11 environment (no transition, movement from

1.  What does RIP stand for? 2.  What metric does RIP use for Path Selection? 3.  If the metric used by RIP exceeds this value for a route it is considered unreachable, effec


Illustrate a traffic light is an example of what type of mechanism Ans) A Traffic light is an example of flow control.

Describe about the noiseless channel A noiseless channel can transmit an arbitrarily large amount of information, no matter how frequently it is sampled. Just send a lot of dat

Cube: It's a 3 dimensional interconnection network.  In Cube PE s   are organised in a cube structure.  Figure 11: Cube interconnection network