Message passing programming, Computer Networking

Assignment Help:

Message passing is probably the most extensively used parallel programming paradigm today. It is the mainly natural, portable and efficient approach for distributed memory systems. It gives natural synchronization between the processes so that explicit synchronization of Parallel Programming & Parallel Algorithms memory access is redundant. The programmer is dependable for determining all parallelism. In this programming model, multiple processes across the arbitrary number of machines, each with its own local memory, replace data through send and receive communication among processes. This model can be best understood by the diagram shown in Figure:

1770_Message passage model.png

                                                                                        Message passage model

As the diagram specify, each processor has its own local memory. Processors perform computations with the data in their own memories and interact with the other processors, as and when needed, by communication network using message-passing libraries. The messages have the data being sent. But data is not only the constituent of the message. The other components in the message are:

  • The address / identity of the processor that sending the message;
  • Initial address of the data on the sending processor;
  • The type of data being sent;
  • The size of data;
  • The address / identity of processor(s) are receiving the message, and
  • Initial address of storage for the data on the receiving processor.

Once the message has been produced it is sent by the communication network. The communication can be in the following two forms:

i) Point-to-point Communication

The easiest form of message is a point-to- point communication and message is sent from the sending processor to a receiving processor. Message passing in point-to-point communication can be in two modes: synchronous and asynchronous. In synchronous transfer mode, the next message is sent only after the acknowledgement of delivery of the last message. In this mode the series of the messages is maintained. In asynchronous transfer mode, no acknowledgement for delivery is needed.

ii) Collective Communications

Some message-passing systems allow communication involving more than two processors. This type of communication may be called collective communication. Collective communication can be in one of these modes:

Barrier: In this mode no real transfer of data takes place unless all the processors involved in the communication implement a particular block, called barrier block, in their message passing program.

Broadcast: Broadcasting may be one-to-all or all-to-all. In one-to-all broadcasting, one processor sends the similar message to numerous destinations with a one operation whereas in all-to-all broadcasting, communication takes place in many-to-many fashion. The messages might be personalised or non-personalized. In a personalized broadcasting, unique messages are being sent to each destination processor.

Reduction: In this, one member of the group takes data from the other members, decreases them to a one data item which is usually made available to all of the participating processors.


Related Discussions:- Message passing programming

What is data representation, Q. What is Data Representation? Informatio...

Q. What is Data Representation? Information Today arrives in different forms such as numbers, text, images, audio and video. Text: Represented like a bit pattern a sequence

Selective repeat (sr) - transport layer, Selective Repeat (SR) Select...

Selective Repeat (SR) Selective repeats is a connection oriented protocols  in which  transmitter and receiver have a window  of sequence numbers. SR scheme  avoids  the  unne

Discuss network designs, This assignment will assess parts of objectives 2-...

This assignment will assess parts of objectives 2-6 from the subject outline: 1 Explain the principles of logical design 2 Discuss the strengths and weaknesses of various net

Give the solutions to the threats, Give the solutions to the threats In...

Give the solutions to the threats In order to implement solutions to the threats, it is advisable that the company should maintain proper password protected hardware. Wherever

Switched virtual circuits, Most networks give dynamic connections, which la...

Most networks give dynamic connections, which last for a relatively short period. To operate this, ATM can dynamically join a switched virtual circuit (SVC), allow it last as long

Define the non-blocking and blocking network, Non-Blocking and Blocking net...

Non-Blocking and Blocking network In Non-blocking networks, route from a free input node to another free output node can forever be provided. Crossbar is an illustration of non

Explain the types of security threats, Q. Explain the types of Security Thr...

Q. Explain the types of Security Threats? (a) Normal Flow (b) Interruption: An asset of a system develops into unavailable or unusable. (c) Interception: A few unaut

What is meant by asymmetrical protocols, What is meant by Asymmetrical prot...

What is meant by Asymmetrical protocols? There is a many-to-one relationship among clients and server. Clients always initiate the dialog by requesting a service. Servers are p

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd