SlideShare a Scribd company logo
1 of 19
Download to read offline
Message Passing
 Architecture
Introduction

• The architecture is used to communicate
  data among a set of processors without the
  need for a global memory.
• Each PE has its own local memory and
  communicates with other PEs using
  message.
Message Passing Systems
104     MESSAGE PASSING ARCHITECTURE



            P1        M1           P2          M2             Pn        Mn


                      Link 1                Link 2
                                                                   Link n

                                  Interconnection Network


                           Figure 5.1   Message passing systems.


networks have received considerable attention over the years. As shown in Chapter 2,
two important factors must be considered in designing message passing interconnec-
tion networks: link bandwidth and the network latency. The link bandwidth is defined
as the number of bits that can be transmitted per unit of time (bits/s). Network latency
is defined as the time to complete a message transfer through the network.
Message Passing Systems
104     MESSAGE PASSING ARCHITECTURE



            P1        M1           P2          M2             Pn        Mn


                      Link 1                Link 2
                                                                   Link n

                                  Interconnection Network


                           Figure 5.1   Message passing systems.


networks have received considerable attention over the years. As shown in Chapter 2,
two important factors must be considered in designing message passing interconnec-
                                                               external channel
tion networks: link bandwidth and the network latency. The link bandwidth is defined
as the number of bits that can be transmitted per unit of time (bits/s). Network latency
is defined as the time to complete a message transfer through the network.
MP Network
•   Normally, a static-type network

    •   hypercubes

    •   nearest-neighbor 2D & 3D mesh

•   Two important factors must be considered:

    •   link bandwidth - the number of bits that can
        be transmitted per unit of times (bits/s)

    •   network latency - the time to complete a
        message transfer through the network
Executing Program
•   The program is divided into concurrent
    processes; each is executed on a separate
    processor.

•   If the no. of processes is larger than the
    number of processors, then more than one
    process will have to be executed on a
    processor in a time-shared fashion.
              104     MESSAGE PASSING ARCHITECTURE



                          P1        M1           P2          M2             Pn        Mn


                                    Link 1                Link 2
                                                                                 Link n

                                                Interconnection Network


                                         Figure 5.1   Message passing systems.


              networks have received considerable attention over the years. As shown in Chapter 2,
              two important factors must be considered in designing message passing interconnec-
              tion networks: link bandwidth and the network latency. The link bandwidth is defined
              as the number of bits that can be transmitted per unit of time (bits/s). Network latency
Process Communication

• Processes running on a given processor
  use what is called internal channels to
  exchange messages among themselves.
• Processes running on different processors
  use the external channels to exchange
  messages.
Data Exchanged
• Data exchanged among processors cannot
  be shared; it is rather copied (using send/
  receive messages).
• An important advantage of this form of
  data exchange is the elimination of the
  need for synchronization constructs, such
  as semaphores, which results in
  performance improvement.
More advantages

• A message passing scheme offers flexibility
  in accommodating a large number of
  processors in addition to being readily
  scalable.
• A given node can execute more than one
  process, each at a given time.
5.2    ROUTING IN MESSAGE PASSING NETWORKS    105



                                     Outside World




        P1

                     m1
        P2

                                                                       m4
       P3

                                 m2                  m3

        P4

                Figure 5.2   An example of a message passing system.



Three types of granularity can be distinguished. These are:

  1. Coarse granularity: Each process holds a large number of sequential instruc-
Process Granularity

• It’s a parameter which describes the size of
  a process in a message passing system.

                        computation time
 Process Granularity =
                       communication time
Granularity Types
•   There are 3 types of granularity:

    •   Coarse - each process holds a large number
        of sequential instructions and takes a
        substantial amount of time to execute.

    •   Medium - a middle ground where
        communication overhead is reduced

    •   Fine - each process contains a few sequential
        instructions

•   Use mostly medium or coarse granularity
Routing in MP Networks

• Involves the identification of a set of
  permissible paths that may be used by a
  message to reach its destination, and a
  function (η) that selects one path from the
  set of permissible paths.
Routing Techniques
•   Adaptive

    •   the path taken by the message depends on
        network conditions for a given source and
        destination pair

•   Deterministic (oblivious)

    •   determines the path using only the source
        and destination regardless of the network
        conditions - simple but bandwidth inefficient
Routing for Broadcasting
     & Multicasting
• Communication operations: unicast and
  collective
 • Unicast - communicate to only a single
    destination
 • Collective - several routing operations
    are defined, broadcast & multicast are the
    most widely used.
Broadcast                     Multicast

one-to-all operation        one-to-many operation

distribute data during
                              uses in large-scale
  computation of a
                             multiprocessors, inc.
 distributed memory
                           parallel search algorithm
        program

    routing algorithms must be deadlock-free

      little time and short path is desirable
of these resources in a strict monotonic order. This restricted way for using network
resources prevents the occurrence of circular wait, and hence prevents the occur-
rence of deadlock. The channel dependency graph (CDG) is a technique used
to develop a deadlock-free routing algorithm. A CDG is a directed graph
D ¼ G(C, E ), where the vertex set C consists of all the unidirectional channels in
the network and the set of edges E includes all the pairs of connected channels,


                                                                             000

        110             111                    001                     010                             100

                                        011                 101 110      011             101     110


 100             101
                                  111    010         100         111         100           111     001
         010            011                                                  001
                                  110                      101                     011                 010



  000             001


               Figure 5.3     Hypercube broadcast tree-based communication.
Routing Potential Problems
•   Deadlock

    •   When two messages each hold the resources
        required by the other in order to move, both
        message will be blocked.

•   Livelock

    •   A situation in which a message keeps going around
        the network and never reaches its destination.

•   Starvation

    •   A node is said to suffer from starvation if it has a
        message to inject into the network but is never
        allowed to do so.
Message Passing vs
      Shared Memory
•   Shared memory systems may be easier to
    program, but the difficult to scale up to a large
    number of processors.

•   If scalability to larger and larger systems was to
    continue, systems had to use message passing
    techniques.

•   However, a number of problems associated with
    message passing systems: communication
    overhead and difficulty of programming.

More Related Content

What's hot

CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bankpkaviya
 
Distributed shred memory architecture
Distributed shred memory architectureDistributed shred memory architecture
Distributed shred memory architectureMaulik Togadiya
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network securitybabak danyal
 
CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSKathirvel Ayyaswamy
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualizationDr.Neeraj Kumar Pandey
 
Implementation levels of virtualization
Implementation levels of virtualizationImplementation levels of virtualization
Implementation levels of virtualizationGokulnath S
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanismsRajapriya82
 
Packet switching
Packet switchingPacket switching
Packet switchingasimnawaz54
 
Distributed & parallel system
Distributed & parallel systemDistributed & parallel system
Distributed & parallel systemManish Singh
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
Distributed computing
Distributed computingDistributed computing
Distributed computingshivli0769
 
Data Parallel and Object Oriented Model
Data Parallel and Object Oriented ModelData Parallel and Object Oriented Model
Data Parallel and Object Oriented ModelNikhil Sharma
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed SystemSunita Sahu
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureThanakrit Lersmethasakul
 
8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating SystemsDr Sandeep Kumar Poonia
 

What's hot (20)

CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bank
 
Distributed shred memory architecture
Distributed shred memory architectureDistributed shred memory architecture
Distributed shred memory architecture
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMS
 
TinyOS
TinyOSTinyOS
TinyOS
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
Implementation levels of virtualization
Implementation levels of virtualizationImplementation levels of virtualization
Implementation levels of virtualization
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Cluster Computing
Cluster ComputingCluster Computing
Cluster Computing
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Lecture 3 threads
Lecture 3   threadsLecture 3   threads
Lecture 3 threads
 
Distributed & parallel system
Distributed & parallel systemDistributed & parallel system
Distributed & parallel system
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
Data Parallel and Object Oriented Model
Data Parallel and Object Oriented ModelData Parallel and Object Oriented Model
Data Parallel and Object Oriented Model
 
Scope of parallelism
Scope of parallelismScope of parallelism
Scope of parallelism
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
 
8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems
 

Similar to Slide05 Message Passing Architecture

Computer networks unit i
Computer networks    unit iComputer networks    unit i
Computer networks unit iJAIGANESH SEKAR
 
OSI reference model
OSI reference modelOSI reference model
OSI reference modelshanthishyam
 
Dc lec-02 (networks)
Dc lec-02 (networks)Dc lec-02 (networks)
Dc lec-02 (networks)diaryinc
 
basics of computer network
basics of computer networkbasics of computer network
basics of computer networkProf Ansari
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network ComponentsJyoti Akhter
 
Distributed Systems - Information Technology
Distributed Systems - Information TechnologyDistributed Systems - Information Technology
Distributed Systems - Information TechnologySagar Mehta
 
Chapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBChapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBdhanashrisabale1
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...revathiyadavb
 

Similar to Slide05 Message Passing Architecture (20)

Computer networks unit i
Computer networks    unit iComputer networks    unit i
Computer networks unit i
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
7Multiplexing.pdf
7Multiplexing.pdf7Multiplexing.pdf
7Multiplexing.pdf
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Dc lec-02 (networks)
Dc lec-02 (networks)Dc lec-02 (networks)
Dc lec-02 (networks)
 
Computer network
Computer networkComputer network
Computer network
 
Computer network
Computer networkComputer network
Computer network
 
Introduction to Computer Networks.
Introduction to Computer Networks.Introduction to Computer Networks.
Introduction to Computer Networks.
 
basics of computer network
basics of computer networkbasics of computer network
basics of computer network
 
Dos unit1
Dos unit1Dos unit1
Dos unit1
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network Components
 
Distributed Systems - Information Technology
Distributed Systems - Information TechnologyDistributed Systems - Information Technology
Distributed Systems - Information Technology
 
Chapter4
Chapter4Chapter4
Chapter4
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Chapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBChapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMB
 
Chapter 1 ppt by dmb
Chapter 1 ppt by dmbChapter 1 ppt by dmb
Chapter 1 ppt by dmb
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
 
Internet
InternetInternet
Internet
 
3
33
3
 

More from อภิเษก หงษ์วิทยากร

More from อภิเษก หงษ์วิทยากร (18)

Slide03 Number System and Operations Part 1
Slide03 Number System and Operations Part 1Slide03 Number System and Operations Part 1
Slide03 Number System and Operations Part 1
 
Slide02 digital logic operations and functions
Slide02 digital logic operations and functionsSlide02 digital logic operations and functions
Slide02 digital logic operations and functions
 
Slide01 digital fundamental
Slide01 digital fundamentalSlide01 digital fundamental
Slide01 digital fundamental
 
00 course intro
00 course intro00 course intro
00 course intro
 
08 multimedia delivering
08 multimedia delivering08 multimedia delivering
08 multimedia delivering
 
07 animation
07 animation07 animation
07 animation
 
06 vdo
06 vdo06 vdo
06 vdo
 
05 audio
05 audio05 audio
05 audio
 
04 image andgraphics
04 image andgraphics04 image andgraphics
04 image andgraphics
 
02 multimedia andinteractivity
02 multimedia andinteractivity02 multimedia andinteractivity
02 multimedia andinteractivity
 
01 fundamental of multimedia
01 fundamental of multimedia01 fundamental of multimedia
01 fundamental of multimedia
 
00 welcome slide
00 welcome slide00 welcome slide
00 welcome slide
 
03 digital mediafundamental
03 digital mediafundamental03 digital mediafundamental
03 digital mediafundamental
 
Slide06 Networked Computing
Slide06 Networked ComputingSlide06 Networked Computing
Slide06 Networked Computing
 
03 digital mediafundamental
03 digital mediafundamental03 digital mediafundamental
03 digital mediafundamental
 
03 digital media fundamental
03 digital media fundamental03 digital media fundamental
03 digital media fundamental
 
02 multimedia andinteractivity
02 multimedia andinteractivity02 multimedia andinteractivity
02 multimedia andinteractivity
 
01 fundamental of multimedia
01 fundamental of multimedia01 fundamental of multimedia
01 fundamental of multimedia
 

Recently uploaded

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Recently uploaded (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

Slide05 Message Passing Architecture

  • 2. Introduction • The architecture is used to communicate data among a set of processors without the need for a global memory. • Each PE has its own local memory and communicates with other PEs using message.
  • 3. Message Passing Systems 104 MESSAGE PASSING ARCHITECTURE P1 M1 P2 M2 Pn Mn Link 1 Link 2 Link n Interconnection Network Figure 5.1 Message passing systems. networks have received considerable attention over the years. As shown in Chapter 2, two important factors must be considered in designing message passing interconnec- tion networks: link bandwidth and the network latency. The link bandwidth is defined as the number of bits that can be transmitted per unit of time (bits/s). Network latency is defined as the time to complete a message transfer through the network.
  • 4. Message Passing Systems 104 MESSAGE PASSING ARCHITECTURE P1 M1 P2 M2 Pn Mn Link 1 Link 2 Link n Interconnection Network Figure 5.1 Message passing systems. networks have received considerable attention over the years. As shown in Chapter 2, two important factors must be considered in designing message passing interconnec- external channel tion networks: link bandwidth and the network latency. The link bandwidth is defined as the number of bits that can be transmitted per unit of time (bits/s). Network latency is defined as the time to complete a message transfer through the network.
  • 5. MP Network • Normally, a static-type network • hypercubes • nearest-neighbor 2D & 3D mesh • Two important factors must be considered: • link bandwidth - the number of bits that can be transmitted per unit of times (bits/s) • network latency - the time to complete a message transfer through the network
  • 6. Executing Program • The program is divided into concurrent processes; each is executed on a separate processor. • If the no. of processes is larger than the number of processors, then more than one process will have to be executed on a processor in a time-shared fashion. 104 MESSAGE PASSING ARCHITECTURE P1 M1 P2 M2 Pn Mn Link 1 Link 2 Link n Interconnection Network Figure 5.1 Message passing systems. networks have received considerable attention over the years. As shown in Chapter 2, two important factors must be considered in designing message passing interconnec- tion networks: link bandwidth and the network latency. The link bandwidth is defined as the number of bits that can be transmitted per unit of time (bits/s). Network latency
  • 7. Process Communication • Processes running on a given processor use what is called internal channels to exchange messages among themselves. • Processes running on different processors use the external channels to exchange messages.
  • 8. Data Exchanged • Data exchanged among processors cannot be shared; it is rather copied (using send/ receive messages). • An important advantage of this form of data exchange is the elimination of the need for synchronization constructs, such as semaphores, which results in performance improvement.
  • 9. More advantages • A message passing scheme offers flexibility in accommodating a large number of processors in addition to being readily scalable. • A given node can execute more than one process, each at a given time.
  • 10. 5.2 ROUTING IN MESSAGE PASSING NETWORKS 105 Outside World P1 m1 P2 m4 P3 m2 m3 P4 Figure 5.2 An example of a message passing system. Three types of granularity can be distinguished. These are: 1. Coarse granularity: Each process holds a large number of sequential instruc-
  • 11. Process Granularity • It’s a parameter which describes the size of a process in a message passing system. computation time Process Granularity = communication time
  • 12. Granularity Types • There are 3 types of granularity: • Coarse - each process holds a large number of sequential instructions and takes a substantial amount of time to execute. • Medium - a middle ground where communication overhead is reduced • Fine - each process contains a few sequential instructions • Use mostly medium or coarse granularity
  • 13. Routing in MP Networks • Involves the identification of a set of permissible paths that may be used by a message to reach its destination, and a function (η) that selects one path from the set of permissible paths.
  • 14. Routing Techniques • Adaptive • the path taken by the message depends on network conditions for a given source and destination pair • Deterministic (oblivious) • determines the path using only the source and destination regardless of the network conditions - simple but bandwidth inefficient
  • 15. Routing for Broadcasting & Multicasting • Communication operations: unicast and collective • Unicast - communicate to only a single destination • Collective - several routing operations are defined, broadcast & multicast are the most widely used.
  • 16. Broadcast Multicast one-to-all operation one-to-many operation distribute data during uses in large-scale computation of a multiprocessors, inc. distributed memory parallel search algorithm program routing algorithms must be deadlock-free little time and short path is desirable
  • 17. of these resources in a strict monotonic order. This restricted way for using network resources prevents the occurrence of circular wait, and hence prevents the occur- rence of deadlock. The channel dependency graph (CDG) is a technique used to develop a deadlock-free routing algorithm. A CDG is a directed graph D ¼ G(C, E ), where the vertex set C consists of all the unidirectional channels in the network and the set of edges E includes all the pairs of connected channels, 000 110 111 001 010 100 011 101 110 011 101 110 100 101 111 010 100 111 100 111 001 010 011 001 110 101 011 010 000 001 Figure 5.3 Hypercube broadcast tree-based communication.
  • 18. Routing Potential Problems • Deadlock • When two messages each hold the resources required by the other in order to move, both message will be blocked. • Livelock • A situation in which a message keeps going around the network and never reaches its destination. • Starvation • A node is said to suffer from starvation if it has a message to inject into the network but is never allowed to do so.
  • 19. Message Passing vs Shared Memory • Shared memory systems may be easier to program, but the difficult to scale up to a large number of processors. • If scalability to larger and larger systems was to continue, systems had to use message passing techniques. • However, a number of problems associated with message passing systems: communication overhead and difficulty of programming.