Point-to-point message passing, Computer Networking

Assignment Help:

In point-to-point message passing, single process sends/receives message to/from another process. There are four communication modes for sending a message:

i)    Buffered mode: Send can be started whether or not matching receives has been initiated, and send may finish before matching accept is initiated.

ii)  Synchronous mode: Send can be started whether or not matching receives has been initiated, but send will finished only after matching receives has been initiated.

iii) Ready mode: Send can be started only if matching receives has already been started.

iv)  Standard mode: May behave like either synchronous mode or buffered mode, depending on specific execution of MPI and availability of memory for buffer space.

MPI gives both blocking and non-blocking send and takes operations for all modes.

 Functions for a variety of communication modes:

Mode

Blocking

Non blocking

Standard

MPI_Send

MPI_Isend

Buffered

MPI_Bsend

MPI_Ibsend

Synchronous

MPI_Ssend

MPI_Issend

 Ready

MPI_Rsend

MPI_Irsend

MPI_Irecv and MPI_Recv are blocking and nonblocking functions for regardless of mode and receiving messages.

Besides send and receive functions, MPI gives some more useful functions for communications. Some of them are being given here.

MPI_Buffer_attach used to give buffer space for buffered mode. Nonblocking functions contain request argument used subsequently to determine whether requested operation has finished.

MPI_Test and MPI_Wait wait or test for completion of nonblocking communication.

MPI_Probe and MPI_Iprobe probe for incoming message without really receiving it. Information about message determined by probing can be used to decide how to take it.

MPI_Cancel cancels outstanding message demand, useful for cleanup at the end of a program or after major state of computation.


Related Discussions:- Point-to-point message passing

What is forest, The term "forest" is used to explain a collection of AD dom...

The term "forest" is used to explain a collection of AD domains that share a one schema for the AD. All DC's in the forest share this schema and it is replicated in a hierarchical

Describe ethernet, Describe Ethernet. Ethernet is one of the well-liked...

Describe Ethernet. Ethernet is one of the well-liked networking technologies used these days. It was developed during the early 1970s and is based on specifications as stated i

What are the access methods used in lan, What are the Access methods used i...

What are the Access methods used in LAN: i. Switched access: It is used in LANs which are assigned around CBXs. Electronic switching is techniques are used to provide access

Example of the datalink layer, MAC (media access control) and LLC (logical ...

MAC (media access control) and LLC (logical link control) are both layer 2 protocols.

Tcp connection management , TCP Connection Management TCP connection ...

TCP Connection Management TCP connection management encompasses the procedures for establishing and  terminating connection (FTCP is  connection oriented protocols). In TCP c

State the term - lot of care required while programming, State the term - L...

State the term - Lot of care required while programming It is a common and well-known saying that many developers of "secure systems" leave a "back door" way for themselves so

Show the error correction by hamming code, Q. Show the Error Correction by ...

Q. Show the Error Correction by Hamming Code? Hamming Code is able to be applied to data units of any length and uses the relationship between data and redundancy bits For i

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd