Programming based on message passing, Computer Networking

Programming Based on Message Passing

As we know, the programming model based on message passing uses high level programming languages like C/C++ along with a number of message passing libraries like PVM and MPI. Here, given an example program of message passing.

Example 1: Addition of array elements using two processors.

In this problem, we have to search the sum of all the elements of an array A of size n. We shall separate n elements into two groups of roughly equal size. The first [n/2] elements are added by the first processor, P0, and last [n/2] elements the by second processor, P1. The two sums then are added to get the final result. The program is given below:

Program for P0

#include

#define n 100

int main(int argc, char **argv) {

int A[n];

int sum0 =0, sum1=0,sum; MPI_Init(&argc, &argv);

for( int i=0;i

scanf("%d", &A[i]);

MPI_Send( &n/2, n/2, MPI_INT,1, 0, MPI_COMM_WORLD);

for(i=1; i

sum0+=A[i];

sum1=MPI_Recv(&n/2, n/2, MPI_INT,1, 0, MPI_COMM_WORLD);

sum=sum0+sum1; printf("%d",sum); MPI_Finalize();

}

Program for P1,

int func( int B[int n])

{

MPI_Recv(&n/2, n/2, MPI_INT,0, 0, MPI_COMM_WORLD);

int sum1=0 ;

for (i=0; i

sum1+=B[i];

MPI_Send( 0, n/2, MPI_INT,0, 0, MPI_COMM_WORLD);

}

Posted Date: 3/2/2013 7:51:49 AM | Location : United States







Related Discussions:- Programming based on message passing, Assignment Help, Ask Question on Programming based on message passing, Get Answer, Expert's Help, Programming based on message passing Discussions

Write discussion on Programming based on message passing
Your posts are moderated
Related Questions
Verify VLANs and trunking. Use the show ip interface trunk command on S1 and the show vlan command on S2 to determine that the switches are trunking correctly and the proper VL

The auxiliary port is used to link a modem to for dial backups.

What is uniform delivery time A uniform delivery time is required for voice, so amount of jitter in net- work is significant. This could be expressed as standard deviation of d

There are various computational models for representing the parallel computers. In this part, we discuss various models. These models would give a platform for the designing as wel

Explain about the Gopher The ghoper is a protocol designed to search, retrieve and display documents from remote sites on theĀ  Internet. The Ghoper was formed as a piece of sof


Enumerate about the server modules WebDAV is one of the best-used server modules and many companies developing Intranet software or groupware as well as various publishing and

Determine the Types of intranet Intranets have been broadly classified into three types based on their functionality, viz., The Bulletin Board, Database Management and

I need help in designing a network for a fictional company.

Question: a) The cpio utility has three operating modes. What are they? b) The characters of the permission string are broken up into three groups of three characters. Ex