Encoding data options in parallel virtual machine , Computer Networking

Assignment Help:

Encoding data options

PVM uses SUN's XDR library to generate a machine independent data format if you request it. Settings for the encoding option are:

PvmDataDefault: Use XDR by default, as the local library cannot know in advance where you are going to send the data.

PvmDataRaw: No encoding, so make sure you are sending to a same machine.

PvmDataInPlace: Not only is there no encoding, but the data is not still going to be physically copied into the buffer.

  • int info = pvm_freebuf( int bufid )

Disposes of a message buffer. bufid  message buffer identifier.

  • int pvm_getsbuf( void )

returns the active send buffer identifier.

  • int pvm_getrbuf( void )

returns the active receive buffer identifier.

  • int pvm_setsbuf( int bufid )

sets the active send  buffer to bufid, saves the state of the last buffer, and returns the last active buffer identifier.

  • int pvm_setrbuf( int bufid )

sets the active  receive buffer to bufid, saves the state of the last buffer, and returns the last active buffer identifier.

  • intpvm_initsend( int encoding )

 Clear default sends buffer and states the message encoding. Encoding states the next message's encoding scheme.

  • int pvm_send( int tid, int msgtag )

Instantaneously sends the data in the active message buffer.  tid Integer task identifier of destination process. msgtag Integer message tag provides by the user. msgtag should be nonnegative.

  • int pvm_recv( int tid, int msgtag )

Receive a message. tid is integer task identifier of sending process supplied by the user and msgtag is the message tag supplied by the user( should be non negative integer). The process returns the value of the new active receives buffer identifier. Values less than zero specify an error. It blocks the process until a message with label msgtag has arrived from tid. pvm_recv then places the message in a new active receive buffer, which also obvious the current receive buffer.


Related Discussions:- Encoding data options in parallel virtual machine

Checksum - transport layer, Checksum This 16 bits field contain  th...

Checksum This 16 bits field contain  the checksum. The  calculation of the   checksum for TCP follows  the same  procedure as the  described for  UDP. However the inclusion

Importance of implementing a fault tolerance system, What is the importance...

What is the importance of implementing a Fault Tolerance System? Are there limitations? A fault tolerance system makes sure continuous data availability. This is done by elimin

Command structure in distributed enrollment protocol , Command Structure: ...

Command Structure: Commands are all-upper-case strings, either 4 or 6 characters in length. Table 1 shows the commands, and (for method commands) the parameters, return values, ex

use dijkstras shortest-path algorithm compute short path, Consider the fol...

Consider the following network example. With the indicated link costs along each link in the figure, use Dijkstra's shortest-path algorithm to compute the shortest path from x to a

State the specification of high-end server, State the specification of high...

State the specification of high-end server A mid-range or high-end server with the following specifications would be sufficient for a medium to large organisation: A Pentiu

Two commands that copies the configuration in nvram to ram, Recognize the t...

Recognize the two commands that copies the configuration in NVRAM to RAM Ans) a) Copy startup-config running-config b)  Configure memory

Netware protocol provides link-state routing, Which NetWare protocol provid...

Which NetWare protocol provides link-state routing? Ans) NetWare Link Services Protocol (NLSP) gives link-state routing. SAP (Service Advertisement Protocol) advertises network

Undesirable sharing - fundamentals of networks, Undesirable Sharing ...

Undesirable Sharing With  the good  comes  the bad  while  networking  allow  the easy  sharing  of useful  information it also  the sharing  of undesirable  data. One sign

What is subnetting, Used in IP Networks to break up larger networks into sl...

Used in IP Networks to break up larger networks into slighter subnetworks. It is used to decrease network traffic, Optimized network performance, and make simpler management i.e. t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd