Dynamic configuration and signaling, Computer Networking

Assignment Help:

Dynamic Configuration

  • int pvm_addhosts( char **hosts, int nhost, int *infos )

Add hosts to the virtual machine. hosts is an array of strings naming the hosts to be added. nhost states the length of array hosts. infos is an array of length nhost which returns the status for every host. Values less than zero shows an error, while positive values are TIDs of the new hosts.

Signaling

  • int pvm_sendsig( int tid, int signum )

Sends a signal to one more PVM process. tid is task identifier of PVM process to receive the signal. The signum is the signal number.

  • int info = pvm_notify( int what, int msgtag, int cnt, int *tids )

Request notification of PVM event such as host failure. What states the type of event to trigger the notification. Some of them are:

PvmTaskExit

Task killed or is exits.

PvmHostDelete

Host is crashes or deleted.

PvmHostAdd

New host is added.

msgtag is message tag to be used in notification. cnt For PvmTaskExit and PvmHostDelete, states the length of the tids array. For PvmHostAdd states the number of times to notify.

tids for PvmTaskExit and PvmHostDelete is an array of length cnt of task or pvmd TIDs to be notified about. The array is not used by the PvmHostAdd option.


Related Discussions:- Dynamic configuration and signaling

Define directed path, QUESTION (a) Define what you understand by the fo...

QUESTION (a) Define what you understand by the following terms in Network Flows: i) UnDirected Path ii) Directed Path iii) Directed Cycle. iv) Tree In each of th

Ppp authentication chap pap secret, As the system administrator, you type "...

As the system administrator, you type "ppp authentication chap pap secret". Name the authentication method is used first in setting up a session? Ans)  the authentication method

Advantages - point to point , Advantages There are  times when  using ...

Advantages There are  times when  using  packet filters makes  sense. If the  connections require high  throughput  or the protocols  has proprietary technology that makes  it

What are the major technologies to create client application, What are the ...

What are the five major technologies that can be used to create Client/Server applications? Database Servers Groupware TP Monitors Distributed Objects Intranets.

Name the twisted pairs cables, Name the Twisted pairs cables Twisted pa...

Name the Twisted pairs cables Twisted pairs cables (Shielded and Unshielded), Coaxial cable and Fiber optic cable. ?Testing of the points ?Testing of the entire network t

Issues to process of message passing, The following issues are decided by t...

The following issues are decided by the system in the process of message passing: 1) Whether the communication link is established or not 2) Whether the receiver is ready to

Designing an internet work, 1. Introduction This document describes t...

1. Introduction This document describes the research-based assignment for this module. This assignment consists of two parts: A formal report And a presentatio

What are the types of servers, There are many types of servers:- a) File...

There are many types of servers:- a) File servers b) Database servers c) Transaction servers d)  Groupware servers e) Object servers Web servers.

Describe the rpc and client server architecture, Can you describe the RPC a...

Can you describe the RPC and Client server Architecture?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd