Dynamic configuration and signaling, Computer Networking

Assignment Help:

Dynamic Configuration

  • int pvm_addhosts( char **hosts, int nhost, int *infos )

Add hosts to the virtual machine. hosts is an array of strings naming the hosts to be added. nhost states the length of array hosts. infos is an array of length nhost which returns the status for every host. Values less than zero shows an error, while positive values are TIDs of the new hosts.

Signaling

  • int pvm_sendsig( int tid, int signum )

Sends a signal to one more PVM process. tid is task identifier of PVM process to receive the signal. The signum is the signal number.

  • int info = pvm_notify( int what, int msgtag, int cnt, int *tids )

Request notification of PVM event such as host failure. What states the type of event to trigger the notification. Some of them are:

PvmTaskExit

Task killed or is exits.

PvmHostDelete

Host is crashes or deleted.

PvmHostAdd

New host is added.

msgtag is message tag to be used in notification. cnt For PvmTaskExit and PvmHostDelete, states the length of the tids array. For PvmHostAdd states the number of times to notify.

tids for PvmTaskExit and PvmHostDelete is an array of length cnt of task or pvmd TIDs to be notified about. The array is not used by the PvmHostAdd option.


Related Discussions:- Dynamic configuration and signaling

What security risks present on the networks, Security risks present on the ...

Security risks present on the networks Lots of risks are present everywhere on Internet as well as on Intranet, if it is not known what is being done. Every day a number of

Describe the static routing process, Describe the static routing process ...

Describe the static routing process A static routing method does not adapt to changing conditions on the network but uses a fixed method developed ahead of time. With alternat

Root, Originally Linux/UNIX systems had one all-powerful user called root t...

Originally Linux/UNIX systems had one all-powerful user called root that managed systems. Discuss the risks of having a single root user and how more limited management abilities c

Networks classification - point to point network , Normal 0 fal...

Normal 0 false false false EN-IN X-NONE X-NONE Networks classification

Show coaxial cable connectors, Q. Show Coaxial Cable Connectors? - A mo...

Q. Show Coaxial Cable Connectors? - A most common is barrel connector (BNC) - T-connectors are utilized to branch off to secondary cables - Terminators are necessary for

Explain the two modes of ip security, Question 1 Describe the architecture...

Question 1 Describe the architecture and usage of ISDN Question 2 Write about different network structures in use Question 3 Explain the concept of framing in Data Li

Explain about error detection, Q. Explain about Error Detection? Data c...

Q. Explain about Error Detection? Data can be corrupted during transmission because of accidents, Storms, sudden increase in electricity and voltage / decrease in signal power

Write down short note on frame-relay dlci, DLCI- Data Link Connection Iden...

DLCI- Data Link Connection Identifier. A frame-relay service provider usually assigns DLCI values that are used by frame-relay to distinguish among different virtual circuits on th

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd