Encoding data options in parallel virtual machine , Computer Networking

Assignment Help:

Encoding data options

PVM uses SUN's XDR library to generate a machine independent data format if you request it. Settings for the encoding option are:

PvmDataDefault: Use XDR by default, as the local library cannot know in advance where you are going to send the data.

PvmDataRaw: No encoding, so make sure you are sending to a same machine.

PvmDataInPlace: Not only is there no encoding, but the data is not still going to be physically copied into the buffer.

  • int info = pvm_freebuf( int bufid )

Disposes of a message buffer. bufid  message buffer identifier.

  • int pvm_getsbuf( void )

returns the active send buffer identifier.

  • int pvm_getrbuf( void )

returns the active receive buffer identifier.

  • int pvm_setsbuf( int bufid )

sets the active send  buffer to bufid, saves the state of the last buffer, and returns the last active buffer identifier.

  • int pvm_setrbuf( int bufid )

sets the active  receive buffer to bufid, saves the state of the last buffer, and returns the last active buffer identifier.

  • intpvm_initsend( int encoding )

 Clear default sends buffer and states the message encoding. Encoding states the next message's encoding scheme.

  • int pvm_send( int tid, int msgtag )

Instantaneously sends the data in the active message buffer.  tid Integer task identifier of destination process. msgtag Integer message tag provides by the user. msgtag should be nonnegative.

  • int pvm_recv( int tid, int msgtag )

Receive a message. tid is integer task identifier of sending process supplied by the user and msgtag is the message tag supplied by the user( should be non negative integer). The process returns the value of the new active receives buffer identifier. Values less than zero specify an error. It blocks the process until a message with label msgtag has arrived from tid. pvm_recv then places the message in a new active receive buffer, which also obvious the current receive buffer.


Related Discussions:- Encoding data options in parallel virtual machine

network consultant, Network Consultant, My name is Jason Long. I am th...

Network Consultant, My name is Jason Long. I am the CEO of IL Corporation. IL is an investment firm that performs financial services to many organizations. We currently have a

Banking industry, Will like to know what is the standard industrial practic...

Will like to know what is the standard industrial practice for a bank network design? Preferably with complete paper on the network design covering security, domain segregation, vi

Write a long note on internet and privacy, Question 1 Write a long note on...

Question 1 Write a long note on computers in television development Question 2 Write a long note on the ‘Steadicam' Question 3 Write a long note on Internet and pr

What is meant by asymmetric multiprocessing, What is meant by Asymmetric Mu...

What is meant by Asymmetric Multiprocessing (AMP)? It imposes hierarchy and a division of labor between processors. Only one designated processor, the master, controls (in a ti

osi layer performs code conversion, Name the OSI layer which performs code...

Name the OSI layer which performs code conversion, code formatting and encryption Ans) Presentation layer performs code conversion, code formatting and encryption

Connection to packet switches, CONNECTION TO PACKET SWITCHES:  A packe...

CONNECTION TO PACKET SWITCHES:  A packet switch many join to devices and to other packet switches. But the speeds are different in both parts. There are typically high-speed j

Repeater - network layer and routing, Repeater Repeater is  also named...

Repeater Repeater is  also named as active hub operates at physical  layer of OSI model. Repeater is an  electronic  device that simply regenerates the signal. Signals travell

Frequency division multiplexing, Frequency Division Multiplexing Frequ...

Frequency Division Multiplexing Frequency  division  multiplexing (FDM) is an analogy technique that can be applied when the bandwidth of a link is greater than the combined b

What is boundary level masking, Q. What is Boundary Level Masking? ...

Q. What is Boundary Level Masking? If mask numbers are either 255 or 0: Bytes in the IP address that correspond to 255 in the mask will be repeated in the subnet ma

Assignment, Name the three ways or wireless data to be propagated.

Name the three ways or wireless data to be propagated.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd