Encoding data options in parallel virtual machine , Computer Networking

Assignment Help:

Encoding data options

PVM uses SUN's XDR library to generate a machine independent data format if you request it. Settings for the encoding option are:

PvmDataDefault: Use XDR by default, as the local library cannot know in advance where you are going to send the data.

PvmDataRaw: No encoding, so make sure you are sending to a same machine.

PvmDataInPlace: Not only is there no encoding, but the data is not still going to be physically copied into the buffer.

  • int info = pvm_freebuf( int bufid )

Disposes of a message buffer. bufid  message buffer identifier.

  • int pvm_getsbuf( void )

returns the active send buffer identifier.

  • int pvm_getrbuf( void )

returns the active receive buffer identifier.

  • int pvm_setsbuf( int bufid )

sets the active send  buffer to bufid, saves the state of the last buffer, and returns the last active buffer identifier.

  • int pvm_setrbuf( int bufid )

sets the active  receive buffer to bufid, saves the state of the last buffer, and returns the last active buffer identifier.

  • intpvm_initsend( int encoding )

 Clear default sends buffer and states the message encoding. Encoding states the next message's encoding scheme.

  • int pvm_send( int tid, int msgtag )

Instantaneously sends the data in the active message buffer.  tid Integer task identifier of destination process. msgtag Integer message tag provides by the user. msgtag should be nonnegative.

  • int pvm_recv( int tid, int msgtag )

Receive a message. tid is integer task identifier of sending process supplied by the user and msgtag is the message tag supplied by the user( should be non negative integer). The process returns the value of the new active receives buffer identifier. Values less than zero specify an error. It blocks the process until a message with label msgtag has arrived from tid. pvm_recv then places the message in a new active receive buffer, which also obvious the current receive buffer.


Related Discussions:- Encoding data options in parallel virtual machine

What are proxy server, What are proxy servers and how do they protect compu...

What are proxy servers and how do they protect computer networks? Proxy servers primarily stop external users who identifying the IP addresses of an internal network. Without i

Illustrate the bellman-ford algorithm, Illustrate the Bellman-Ford algorith...

Illustrate the Bellman-Ford algorithm The Bellman-Ford algorithm uses only on information from its neighbours and knowledge of its link costs, to update it costs and paths. Dij

What is the terminal emulation, What is the Terminal Emulation, in which la...

What is the Terminal Emulation, in which layer it comes? Ans) The use of software, installed on PC or LAN server, that permits the PC to function as if it were dumb terminal dir

Write the definition of ipx and udp, Write the definition of IPX and UDP ...

Write the definition of IPX and UDP IPX: Inter-network Packet Exchange supports the transport and network layers of the OSI network model. It provides fast, unreliable, communi

Example on multiplicative decrease, Q. Example on Multiplicative Decrease? ...

Q. Example on Multiplicative Decrease? w = 1 for (each new ACK received) w = w+1 until (loss detected or w >= ssthresh) Not so slow - Exponential increase

Fault tree construction rules, FAULT TREE CONSTRUCTION RULES (a)  Defi...

FAULT TREE CONSTRUCTION RULES (a)  Define the  undesired  fault  condition  as the  "Top"  event. The  fault  event describes the state of either the system or a component. (b

Features of fdm - fundamentals of networks, Features of FDM 1.The FDM ...

Features of FDM 1.The FDM channel carries  only  one phone  circuit  at a time. 2.If an FDM channel is not in sue then  it is  sits idle and cannot be   used by  other user

Asynchronous or statistical time division multiplexing, Asynchronous or Sta...

Asynchronous or Statistical Time Division Multiplexing As we  have seen  synchronous  TDM does not  guarantee that the full capacity of a link in sued. In fact it is more like

What are the routing techniques, Q. What are the Routing Techniques? R...

Q. What are the Routing Techniques? Routing Routing Techniques Static versus Dynamic Routing Routing Table for classful Addressing Routing Table for Cl

Analysis of parallel algorithms, A generic algorithm is mostly analyzed on ...

A generic algorithm is mostly analyzed on the basis of the following parameters: the time complexity (implementation time) and the space complexity (amount of space necessary). Usu

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd