Message passing libraries mpi and pvm, Computer Networking

In this part, we shall talk about about message passing libraries. In history, various message passing libraries have been available since the 1980s. These executions differed substantially from each other making it complex for programmers to develop portable applications. We shall talk about only two worldwide accepted message passing libraries namely; MPI and PVM.

Message Passing Interface (MPI)

The Message Passing Interface (MPI) is a universal standard for providing communication between the multiple concurrent processes on a distributed memory system. Mainly, if not all, of the popular parallel computing platforms present at least one execution of MPI. It was developed from the MPI forum consisting of numerous experts from academics and industry. MPI has been executed as the library of routines that can be called from languages like, C, C++, Fortran, and Ada programs. MPI was expanded in two stages, MPI-1 and MPI-2.  MPI-1 was organized in 1994.

Features of MPI-1

  • Collective communication,
  • Point-to-point communication,
  • Process groups and communication domains,
  • Binding for Fortran and C and
  • Virtual process topologies

Features added in MPI-2

  • Dynamic process management,
  • Input/output ,
  • Binding for C++.
  • One-sided operations used for remote memory access.

MPI's benefits over older message passing libraries is that it is both portable (because MPI has been executed for almost each distributed memory architecture) and fast (because each executions is optimized for the hardware it runs on).

Posted Date: 3/2/2013 7:05:50 AM | Location : United States







Related Discussions:- Message passing libraries mpi and pvm, Assignment Help, Ask Question on Message passing libraries mpi and pvm, Get Answer, Expert's Help, Message passing libraries mpi and pvm Discussions

Write discussion on Message passing libraries mpi and pvm
Your posts are moderated
Related Questions
CYCLE OF BRIDGES:  A bridges network can join several segments. One bridge is useded to connect every segment to the rest of the bridge network. This is given in the figure be

This assignment consists of both combinational logic circuit and analog counterpart to perform logical operations based on the given conditions. The first objective of this assignm

Undesirable Sharing With  the good  comes  the bad  while  networking  allow  the easy  sharing  of useful  information it also  the sharing  of undesirable  data. One sign

A fairly renowned approach in this area is OpenMP, a recently developed industry standard for shared memory programming on architectures with uniform memory access characteristics.

Data Distribution Data distribution directives tell the compiler how the program data is to be distributed between the memory areas associated with a set of processors. The log

QUESTION a) List the seven layers of the ISO-OSI model and briefly describe the role of each layer b) Describe the functions of the following intermediate systems- Rep

Q. Explain the Types of Security Service? Security Services fall into one of the subsequent categories - Confidentiality: Confirms that the info in a system and transm

Explain about star topology This topology, obviously, needs a great deal of cabling. This design gives an excellent platform for reconfiguration and trouble-shooting. Changes t

A carrier is frequency modulated with a sinusoidal signal of 2 kHz, resulting in a maximum frequency deviation of 5 kHz. (a) Find the bandwidth of the modulated signal (b) The ampl

What is NVT (Network Virtual Terminal) It is a set of rules explaining a very simple virtual terminal interaction. The NVT is used in the begin of a Telnet session.