Point-to-point message passing, Computer Networking

In point-to-point message passing, single process sends/receives message to/from another process. There are four communication modes for sending a message:

i)    Buffered mode: Send can be started whether or not matching receives has been initiated, and send may finish before matching accept is initiated.

ii)  Synchronous mode: Send can be started whether or not matching receives has been initiated, but send will finished only after matching receives has been initiated.

iii) Ready mode: Send can be started only if matching receives has already been started.

iv)  Standard mode: May behave like either synchronous mode or buffered mode, depending on specific execution of MPI and availability of memory for buffer space.

MPI gives both blocking and non-blocking send and takes operations for all modes.

 Functions for a variety of communication modes:

Mode

Blocking

Non blocking

Standard

MPI_Send

MPI_Isend

Buffered

MPI_Bsend

MPI_Ibsend

Synchronous

MPI_Ssend

MPI_Issend

 Ready

MPI_Rsend

MPI_Irsend

MPI_Irecv and MPI_Recv are blocking and nonblocking functions for regardless of mode and receiving messages.

Besides send and receive functions, MPI gives some more useful functions for communications. Some of them are being given here.

MPI_Buffer_attach used to give buffer space for buffered mode. Nonblocking functions contain request argument used subsequently to determine whether requested operation has finished.

MPI_Test and MPI_Wait wait or test for completion of nonblocking communication.

MPI_Probe and MPI_Iprobe probe for incoming message without really receiving it. Information about message determined by probing can be used to decide how to take it.

MPI_Cancel cancels outstanding message demand, useful for cleanup at the end of a program or after major state of computation.

Posted Date: 3/2/2013 7:10:57 AM | Location : United States







Related Discussions:- Point-to-point message passing, Assignment Help, Ask Question on Point-to-point message passing, Get Answer, Expert's Help, Point-to-point message passing Discussions

Write discussion on Point-to-point message passing
Your posts are moderated
Related Questions
Command Structure: Commands are all-upper-case strings, either 4 or 6 characters in length. Table 1 shows the commands, and (for method commands) the parameters, return values, ex

As the system administrator, you type "ppp authentication chap pap secret". Name the authentication method is used first in setting up a session? Ans)  the authentication method

State the statements about PPP and SLIP for WAN communications?  Ans)    a) PPP uses its Network Control Programs (NCPs) component to encapsulate many protocols.  b) SLIP

Let us firstly illustrate the idea of merging two sorted sequences using a odd-even merging circuit. The functioning of a merging circuit is as follows: 1)   Let there be two so

Q. Explain the Types of Security Service? Security Services fall into one of the subsequent categories - Confidentiality: Confirms that the info in a system and transm

Question: a) Compare Bluetooth and WIFI based networks over the following factors: Data rate, Range, Application Focus, Battery Power, Frequency Band, Security. b) Differe

Simulate extremely limited forms of IP and ICMP. You will simulate 6 computers, 4 hosts and 2 routers, that are connected in an imaginary network with the topology as shown belo

What is the major issue with routing by rumor?

Describe some common threats to the hardware Theft of a computer, printer, or other resources. Tampering by a disinterested or frustrated employee who takes every chan

Security models by giving striking analogies to the real world A classical case study: (With due acknowledgements to the security exponent who proposed this theory.) He has c