Message passing programming, Computer Networking

Assignment Help:

Message passing is probably the most extensively used parallel programming paradigm today. It is the mainly natural, portable and efficient approach for distributed memory systems. It gives natural synchronization between the processes so that explicit synchronization of Parallel Programming & Parallel Algorithms memory access is redundant. The programmer is dependable for determining all parallelism. In this programming model, multiple processes across the arbitrary number of machines, each with its own local memory, replace data through send and receive communication among processes. This model can be best understood by the diagram shown in Figure:

1770_Message passage model.png

                                                                                        Message passage model

As the diagram specify, each processor has its own local memory. Processors perform computations with the data in their own memories and interact with the other processors, as and when needed, by communication network using message-passing libraries. The messages have the data being sent. But data is not only the constituent of the message. The other components in the message are:

  • The address / identity of the processor that sending the message;
  • Initial address of the data on the sending processor;
  • The type of data being sent;
  • The size of data;
  • The address / identity of processor(s) are receiving the message, and
  • Initial address of storage for the data on the receiving processor.

Once the message has been produced it is sent by the communication network. The communication can be in the following two forms:

i) Point-to-point Communication

The easiest form of message is a point-to- point communication and message is sent from the sending processor to a receiving processor. Message passing in point-to-point communication can be in two modes: synchronous and asynchronous. In synchronous transfer mode, the next message is sent only after the acknowledgement of delivery of the last message. In this mode the series of the messages is maintained. In asynchronous transfer mode, no acknowledgement for delivery is needed.

ii) Collective Communications

Some message-passing systems allow communication involving more than two processors. This type of communication may be called collective communication. Collective communication can be in one of these modes:

Barrier: In this mode no real transfer of data takes place unless all the processors involved in the communication implement a particular block, called barrier block, in their message passing program.

Broadcast: Broadcasting may be one-to-all or all-to-all. In one-to-all broadcasting, one processor sends the similar message to numerous destinations with a one operation whereas in all-to-all broadcasting, communication takes place in many-to-many fashion. The messages might be personalised or non-personalized. In a personalized broadcasting, unique messages are being sent to each destination processor.

Reduction: In this, one member of the group takes data from the other members, decreases them to a one data item which is usually made available to all of the participating processors.


Related Discussions:- Message passing programming

Explain repeaters, Repeaters - Operate only in physical layer - Conn...

Repeaters - Operate only in physical layer - Connects two segments of the same LAN - Both segments must be of the same protocol - Only forwards frames; does not filter

Advanced interface module and system bus, Advanced Interface Module (AIM) s...

Advanced Interface Module (AIM) socket This is an 100 pin internal socket. It is provide for plug in the Advance interface module card. Purpose of AIM card is concentrate in th

What is the network router, It's a Hybrid device that joins the features of...

It's a Hybrid device that joins the features of both bridges and routers.

What is a pseudo TTY, What is a pseudo tty? A pseudo tty or false termi...

What is a pseudo tty? A pseudo tty or false terminal enables external machines to connect by Telnet or rlogin. Without a pseudo tty, no connection can take place.

Determine the method to protect the web servers, Determine the method to pr...

Determine the method to protect the Web servers The company should install additional levels of security measures since it is possible for hackers to generate and send data wit

Explain the layer which is closer to the user, There is only an applicatio...

There is only an application layer which is closer to user and also gives many application which user directly linked.for ex:- web browser

What is topology, Q. What is Topology? - Physical/logical arrangement ...

Q. What is Topology? - Physical/logical arrangement - Topology of a network is the geometric depiction of the relationship of all the links and linking devices to one anothe

Describe network security and internetworking security, Q. Describe Network...

Q. Describe Network security and Internetworking security? Network Security - Layers 5-7 - Securing the localized private domain. Network Administration, File Permissions

Why we use filter option, When we specifically block, single router update ...

When we specifically block, single router update for other routers

Synchronous tdm and statistical tdm, Difference between synchronous tdm and...

Difference between synchronous tdm and statistical tdm

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd