Message passing libraries mpi and pvm, Computer Networking

In this part, we shall talk about about message passing libraries. In history, various message passing libraries have been available since the 1980s. These executions differed substantially from each other making it complex for programmers to develop portable applications. We shall talk about only two worldwide accepted message passing libraries namely; MPI and PVM.

Message Passing Interface (MPI)

The Message Passing Interface (MPI) is a universal standard for providing communication between the multiple concurrent processes on a distributed memory system. Mainly, if not all, of the popular parallel computing platforms present at least one execution of MPI. It was developed from the MPI forum consisting of numerous experts from academics and industry. MPI has been executed as the library of routines that can be called from languages like, C, C++, Fortran, and Ada programs. MPI was expanded in two stages, MPI-1 and MPI-2.  MPI-1 was organized in 1994.

Features of MPI-1

  • Collective communication,
  • Point-to-point communication,
  • Process groups and communication domains,
  • Binding for Fortran and C and
  • Virtual process topologies

Features added in MPI-2

  • Dynamic process management,
  • Input/output ,
  • Binding for C++.
  • One-sided operations used for remote memory access.

MPI's benefits over older message passing libraries is that it is both portable (because MPI has been executed for almost each distributed memory architecture) and fast (because each executions is optimized for the hardware it runs on).

Posted Date: 3/2/2013 7:05:50 AM | Location : United States

Related Discussions:- Message passing libraries mpi and pvm, Assignment Help, Ask Question on Message passing libraries mpi and pvm, Get Answer, Expert's Help, Message passing libraries mpi and pvm Discussions

Write discussion on Message passing libraries mpi and pvm
Your posts are moderated
Related Questions
What is use of Carrier sense multiple access Carrier sense multiple access with collision detection (CSMA/CD) is a form of medium access control in which a station listens to

How to protect computer Hardware by threats The first component in the computer system vulnerable to attacks or threats, and most important to be protected, is the hardware.

State the term - Lot of care required while programming It is a common and well-known saying that many developers of "secure systems" leave a "back door" way for themselves so

different framing methods

On a LAN where are IP Datagram transported?

implementation of energy aided shortest path routing protocol???

Skype is a web-based service which offers cheap and free phone calls. Explain step by step (in terms of networking technology) what really happens from the point when you initiate

It treats all processors as equivalent. Any processor can do the work of any other processor. Applications are separated into threads that can run simultaneously on any available p

You are the network administrator for the City of Joshua Texas. The city government offices are located in five buildings separated by a State Highway controlled by the State of Te