Point-to-point message passing, Computer Networking

Assignment Help:

In point-to-point message passing, single process sends/receives message to/from another process. There are four communication modes for sending a message:

i)    Buffered mode: Send can be started whether or not matching receives has been initiated, and send may finish before matching accept is initiated.

ii)  Synchronous mode: Send can be started whether or not matching receives has been initiated, but send will finished only after matching receives has been initiated.

iii) Ready mode: Send can be started only if matching receives has already been started.

iv)  Standard mode: May behave like either synchronous mode or buffered mode, depending on specific execution of MPI and availability of memory for buffer space.

MPI gives both blocking and non-blocking send and takes operations for all modes.

 Functions for a variety of communication modes:

Mode

Blocking

Non blocking

Standard

MPI_Send

MPI_Isend

Buffered

MPI_Bsend

MPI_Ibsend

Synchronous

MPI_Ssend

MPI_Issend

 Ready

MPI_Rsend

MPI_Irsend

MPI_Irecv and MPI_Recv are blocking and nonblocking functions for regardless of mode and receiving messages.

Besides send and receive functions, MPI gives some more useful functions for communications. Some of them are being given here.

MPI_Buffer_attach used to give buffer space for buffered mode. Nonblocking functions contain request argument used subsequently to determine whether requested operation has finished.

MPI_Test and MPI_Wait wait or test for completion of nonblocking communication.

MPI_Probe and MPI_Iprobe probe for incoming message without really receiving it. Information about message determined by probing can be used to decide how to take it.

MPI_Cancel cancels outstanding message demand, useful for cleanup at the end of a program or after major state of computation.


Related Discussions:- Point-to-point message passing

Describe a basic communication model, NETWORK MANAGEMENT & SECURITY 1. ...

NETWORK MANAGEMENT & SECURITY 1. Describe a basic communication model. 2. State the following terms: a. Configuration Management b. Fault Management c. Security Management

Hacking, can u send me a hacking software of face book for free

can u send me a hacking software of face book for free

Physical addressing in a wan, PHYSICAL ADDRESSING IN A WAN:  The physi...

PHYSICAL ADDRESSING IN A WAN:  The physical addressing in a WAN is same as in LAN in the following way: The data is send in packets equivalent to frames. Every pack

Drawback of repeaters, Drawback of  Repeaters. Repeater  has no filte...

Drawback of  Repeaters. Repeater  has no filtering capability as it forwards  every frame. Repeater shell  be placed  at accurate distance  before  actual  signal becomes

LAN, what is man LAN wan

what is man LAN wan

Which type of switching is considered to be ''wire speed'', Cut-Through is ...

Cut-Through is the best mode of switching. Store and Forward reads in the whole frame, confirms the frame is valid, and then forwards the frame onto the wire. Cut-Through only chec

ILab 2: Office Network Expansion, #queiLab 2: Office Network Expansion Con...

#queiLab 2: Office Network Expansion Connect to the iLab here. Submit your assignment to the Dropbox located on the silver tab at the top of this page. (See "Due Dates for Assig

Determine the value of slow start threshold, Assuming that TCP Reno is used...

Assuming that TCP Reno is used, consider the following diagram illustrating the behaviour of congestion window, and answer the questions below. a)  What was the value of sl

System inheritance.., what is inheritance in computer systems special permi...

what is inheritance in computer systems special permissions?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd