Christopher Cameron, Steve Lantz (original)
Cornell Center for Advanced Computing

Revisions: 5/2022, 4/2013 (original)

For any of these one-sided communication calls, we can choose among three different synchronization methods, each of which has its own syntax and requirements. This topic discusses the synchronization options in more detail.

Objectives

After you complete this topic, you should be able to:

  • List the three synchronization patterns
  • Explain the fence synchronization pattern
  • Explain the post-start-complete-wait pattern
  • Explain the lock-unlock pattern
Prerequisites
 
©  |   Cornell University    |   Center for Advanced Computing    |   Copyright Statement    |   Access Statement
CVW material development is supported by NSF OAC awards 1854828, 2321040, 2323116 (UT Austin) and 2005506 (Indiana University)