Dynamic configuration and signaling, Computer Networking

Assignment Help:

Dynamic Configuration

  • int pvm_addhosts( char **hosts, int nhost, int *infos )

Add hosts to the virtual machine. hosts is an array of strings naming the hosts to be added. nhost states the length of array hosts. infos is an array of length nhost which returns the status for every host. Values less than zero shows an error, while positive values are TIDs of the new hosts.

Signaling

  • int pvm_sendsig( int tid, int signum )

Sends a signal to one more PVM process. tid is task identifier of PVM process to receive the signal. The signum is the signal number.

  • int info = pvm_notify( int what, int msgtag, int cnt, int *tids )

Request notification of PVM event such as host failure. What states the type of event to trigger the notification. Some of them are:

PvmTaskExit

Task killed or is exits.

PvmHostDelete

Host is crashes or deleted.

PvmHostAdd

New host is added.

msgtag is message tag to be used in notification. cnt For PvmTaskExit and PvmHostDelete, states the length of the tids array. For PvmHostAdd states the number of times to notify.

tids for PvmTaskExit and PvmHostDelete is an array of length cnt of task or pvmd TIDs to be notified about. The array is not used by the PvmHostAdd option.


Related Discussions:- Dynamic configuration and signaling

Why routine security audits are essential, Why Routine security audits are ...

Why Routine security audits are essential It is essential that regular security audits are conducted to find out physically which computer is connected and permits access to

How does a switch use store and forward, The LAN switch copies the whole fr...

The LAN switch copies the whole frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and verifies the outgoing interface

What are three ways to give login access to router, The three ways to give ...

The three ways to give login access to the router are by the Console port, auxiliary port, and virtual terminal (Telnet)

Determine about the complete and proper security, Determine about the Compl...

Determine about the Complete and proper security Complete and proper security configuration and administration is indeed a complex issue. One should think carefully about the

Discuss about the similarity of intranets to the internet, Discuss about th...

Discuss about the similarity of Intranets to the Internet The ease of use of the end user would be the most noticeable because of the similarity of Intranets to the Internet. S

Explain about line coding, Q. Explain about line coding? Line Coding ...

Q. Explain about line coding? Line Coding  Procedure of converting binary data to a digital signal DC Components  Residual dc (direct-current) components or

Determine the connection to backbone lan, Connection to backbone LAN In...

Connection to backbone LAN In most cases, interconnection with stations on a wired backbone LAN is needed. For infrastructure wireless LANs, this is simply accomplished by the

Projecr assingment, I have a project that need to be submit as soon as poss...

I have a project that need to be submit as soon as possible

Define the term network throughput, Network throughput It is a symptoma...

Network throughput It is a symptomatic measure of the message carrying capability of a network. It is termed as the total number of messages network can send in per unit time.

Format of hardware address, FORMAT OF HARDWARE ADDRESS:    It have ...

FORMAT OF HARDWARE ADDRESS:    It have of a numeric value and its size is chosen for specific network technology. The length of the message format is one to six bytes.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd