\documentstyle{report}

\begin{document}

\begin{enumerate}
  \item{Think of a point-to-point communication as a relation between 
        local memory
        addresses and remote addresses}
    \begin{enumerate}
     \item{Local addresses are bound early (at send time or before)}
     \item{Remote address may be bound late (at the receiver, either at
           receive time or before) or early (at the sender, at send time
           or before, as in deposit model)}
    \end{enumerate}
  \item{Notice that we at least have a gather map on the sender, so
        we should be able to DMA directly out of the application space}
    \begin{enumerate}
     \item{Making the ``continguous buffer'' notion explicit in the MPI
           means throwing away information about the map and forcing
           add additional copy on the part of the application}
     \item{``I/O vector'' interfaces such as socket writev or PVM pack
           force the application to find contiguity as it generates the
           I/O vector, or requires this be done at send or receive
           time (ie, on the critical path)}
     \item{No mechanism for amortizing the cost of generating a
           gather/scatter map, especially for keeping the map
           {\em on the network interface}}
    \end{enumerate}
  \item{Profile of an interface for deposit model - note that we want
        the application generator to be able to perform steps up to
        the mapping phase}
    \begin{enumerate}
     \item{Sender computes the relation between local and remote addresses,
           describing it to the MPS in an on-line manner}
     \item{MPS finds contiguity and other attributes in the relation}
     \item{Sender explicitly informs MPS he is finished with relation}
     \item{\em Sender combines relation with relations describing 
           point-to-point communications with other processors}
     \item{MPS maps internal representation of relation to the hardware}
     \item{Sender executes the communication, perhaps repeatedly}
     \item{Sender discards the communication}
    
    \end{enumerate}
  \item{Research Questions}
    \begin{enumerate}
     \item{What intefaces are needed for describing the relation?}
     \item{When should the relation be mapped to network?}
     \item{Given a limited amount of space on the network adapter
           for gather/scatter maps, what kind of caching strategy
           will work best?}
     \item{What can the compiler do when there is insufficient information
           to form the relation, but {\em some} information is available?}
     \item{How can we allow alternative tools to be used to perform
           some of the steps?}
    \end{enumerate}
\end{enumerate}



\end{document}

