The privileged user has basically five options to consider in terms of the underlying communication mechanism used for active message transmission. Three of the five communication options are related in that they directly control the network device while the other two are abstracted from the hardware.