Message passing programming, Computer Networking

Assignment Help:

Message passing is probably the most extensively used parallel programming paradigm today. It is the mainly natural, portable and efficient approach for distributed memory systems. It gives natural synchronization between the processes so that explicit synchronization of Parallel Programming & Parallel Algorithms memory access is redundant. The programmer is dependable for determining all parallelism. In this programming model, multiple processes across the arbitrary number of machines, each with its own local memory, replace data through send and receive communication among processes. This model can be best understood by the diagram shown in Figure:

1770_Message passage model.png

                                                                                        Message passage model

As the diagram specify, each processor has its own local memory. Processors perform computations with the data in their own memories and interact with the other processors, as and when needed, by communication network using message-passing libraries. The messages have the data being sent. But data is not only the constituent of the message. The other components in the message are:

  • The address / identity of the processor that sending the message;
  • Initial address of the data on the sending processor;
  • The type of data being sent;
  • The size of data;
  • The address / identity of processor(s) are receiving the message, and
  • Initial address of storage for the data on the receiving processor.

Once the message has been produced it is sent by the communication network. The communication can be in the following two forms:

i) Point-to-point Communication

The easiest form of message is a point-to- point communication and message is sent from the sending processor to a receiving processor. Message passing in point-to-point communication can be in two modes: synchronous and asynchronous. In synchronous transfer mode, the next message is sent only after the acknowledgement of delivery of the last message. In this mode the series of the messages is maintained. In asynchronous transfer mode, no acknowledgement for delivery is needed.

ii) Collective Communications

Some message-passing systems allow communication involving more than two processors. This type of communication may be called collective communication. Collective communication can be in one of these modes:

Barrier: In this mode no real transfer of data takes place unless all the processors involved in the communication implement a particular block, called barrier block, in their message passing program.

Broadcast: Broadcasting may be one-to-all or all-to-all. In one-to-all broadcasting, one processor sends the similar message to numerous destinations with a one operation whereas in all-to-all broadcasting, communication takes place in many-to-many fashion. The messages might be personalised or non-personalized. In a personalized broadcasting, unique messages are being sent to each destination processor.

Reduction: In this, one member of the group takes data from the other members, decreases them to a one data item which is usually made available to all of the participating processors.


Related Discussions:- Message passing programming

Explain the following: cdma and fdma, Question 1 Explain GSM digital cellu...

Question 1 Explain GSM digital cellular System model Question 2 Explain cellular Digital Packet Data(CDPD) system with the help of CDPD network reference model Question 3

Wireless access - computer network, Wireless Access Wireless access co...

Wireless Access Wireless access connecting end  systems ( that are often  mobile) into the network. Today there are two broad types  of wireless internet access(1) wireless an

What is bit stuffing, What is Bit Stuffing? Bit stuffing is the process...

What is Bit Stuffing? Bit stuffing is the process of adding one extra 0 whenever five consecutive is follow a 0 in the data, so that the receiver does not mistake the pattern 0

What are the fundamentals of intranet, Fundamentals of intranet Introd...

Fundamentals of intranet Introduction The history of the Intranet starts right from the days when computer networks came in. However, it could find a name and place for it

Advantages, What are advantages of having e-commerce over extranets

What are advantages of having e-commerce over extranets

How big can an intranet be, How big can an Intranet be? An Intranet ca...

How big can an Intranet be? An Intranet can be as big as a community of interest. Scale is an important factor in web implementation, but it has no bearing on the logical asso

Evaluate error detection in crc polynomials, Q. Evaluate Error Detection in...

Q. Evaluate Error Detection in CRC Polynomials? The divisor in the CRC generator is most habitually represented as an algebraic Polynomial. Reasons: It is short

How does a token-passing protocol works, How does a Token-Passing Protocol ...

How does a Token-Passing Protocol works? The token-passing protocol relies on a control signal known as the token. A token is a 24-bit packet that circulates throughout the net

One basic component is the network device, QUESTION 1. A system analyst...

QUESTION 1. A system analyst has to install a particular type of topology in a textile industry. (a) Describe using diagrams the three most common topologies in terms of nod

Explain how a cdma system works, (a) Explain how a CDMA system works? (b...

(a) Explain how a CDMA system works? (b) Explain howWelsh-Hadamard codes are generated. Explain why orthogonality between different spreading codes is important. (c) Consider

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd