Encoding data options in parallel virtual machine , Computer Networking

Assignment Help:

Encoding data options

PVM uses SUN's XDR library to generate a machine independent data format if you request it. Settings for the encoding option are:

PvmDataDefault: Use XDR by default, as the local library cannot know in advance where you are going to send the data.

PvmDataRaw: No encoding, so make sure you are sending to a same machine.

PvmDataInPlace: Not only is there no encoding, but the data is not still going to be physically copied into the buffer.

  • int info = pvm_freebuf( int bufid )

Disposes of a message buffer. bufid  message buffer identifier.

  • int pvm_getsbuf( void )

returns the active send buffer identifier.

  • int pvm_getrbuf( void )

returns the active receive buffer identifier.

  • int pvm_setsbuf( int bufid )

sets the active send  buffer to bufid, saves the state of the last buffer, and returns the last active buffer identifier.

  • int pvm_setrbuf( int bufid )

sets the active  receive buffer to bufid, saves the state of the last buffer, and returns the last active buffer identifier.

  • intpvm_initsend( int encoding )

 Clear default sends buffer and states the message encoding. Encoding states the next message's encoding scheme.

  • int pvm_send( int tid, int msgtag )

Instantaneously sends the data in the active message buffer.  tid Integer task identifier of destination process. msgtag Integer message tag provides by the user. msgtag should be nonnegative.

  • int pvm_recv( int tid, int msgtag )

Receive a message. tid is integer task identifier of sending process supplied by the user and msgtag is the message tag supplied by the user( should be non negative integer). The process returns the value of the new active receives buffer identifier. Values less than zero specify an error. It blocks the process until a message with label msgtag has arrived from tid. pvm_recv then places the message in a new active receive buffer, which also obvious the current receive buffer.


Related Discussions:- Encoding data options in parallel virtual machine

Describe the architecture of the tcp/ip protocol suite, Problem 1 Descr...

Problem 1 Describe the architecture of the TCP/IP protocol suite Problem 2 Describe the principle of operation of REXEC protocol Problem 3 Describe the concept

What is stateful multi-layer inspection, What is Stateful Multi-Layer Inspe...

What is Stateful Multi-Layer Inspection (SMLI) They are considered as the third generation of firewall technology and usually combine the facilities of the above two. They are

Use of infrared, Q. Use of Infrared? - Frequencies among 300 GHz and 4...

Q. Use of Infrared? - Frequencies among 300 GHz and 400 THz - Short-range communication - High frequencies can't penetrate walls - Necessitate line-of-sight propagati

Explain the concept of token passing, Token Passing S...

Token Passing Station is able to send only when it receives a special frame called a token Token circulates around the ring If station wishes to sen

Explain the different signal propagation behaviours, Question : (a) Lis...

Question : (a) List down and explain the different signal propagation behaviours that radio waves exhibit. (b) Explain the term Delay Spread with reference to signal propaga

Explain types of redundancy checks, Q. Explain Types of Redundancy Checks? ...

Q. Explain Types of Redundancy Checks? Parity Check Simple Parity Check Two Dimensional Parity Check / Longitudinal Redundancy Check (LRC) CRC (Cyclic Redund

ILab 2: Office Network Expansion, iLab 2: Office Network Expansion ...

iLab 2: Office Network Expansion Connect to the iLab here. Submit your assignment to the Dropbox located on the silver tab at the top of this page. (See "Due Da

Dns working - domain name server, DNS Working While discussing about t...

DNS Working While discussing about the working of the DNS, there are many things which need to consider and play Avery significant role. This can the type of communication bet

State about data and data files - information, State about data and data fi...

State about data and data files - Information The third and major component of the system liable to be attacked is the data and data files used by the company. It is the most s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd