Features of parallel virtual machine pvm, Computer Networking

Assignment Help:

Features

1. Simple to install;

2. Simple to configure;

3. Multiple applications from one user can implement;

4. Multiple users can each use PVM concurrently;

5. C, C++, and Fortran supported;

6. Package is minute;

7. Users can select the group of machines for a given run of a PVM program;

8. Process-based computation;

9. Heterogeneity support, and

10. Explicit message-passing model

When the PVM is begins it examines the virtual machine in which it is to function, and makes a process called the PVM demon, or simply pvmd on every machine. An example of a daemon program is the mail programs that runs in the background and take care all the incoming and outgoing electronic mail on a computer, pvmd gives inter-host point of contact, authenticates task and implements processes on machines. It also gives the fault detection, routes messages not from or intended for its host, transfer messages from its application to a destination, receives messages from some other pvmd's, and buffers it until the destination application can take care it.

PVM gives a library of functions, libpvm3.a that the application programmer calls. Every function has some particular effect in the PVM. Though, all this library really gives is a convenient way of asking the local pvmd to perform a few works. The pvmd then acts as the virtual machine. Both pvmd and PVM library considered the PVM system.

The PVM system supports data decomposition as well as functional model of parallel programming. It attached with C, C++, and FORTRAN. The C and C++ language attaching for the PVM user interface library are executed as functions (subroutines in case of FORTRAN) . User programs written in C and C++ can access PVM library by connecting the library libpvm3.a (libfpvm3.a in case of FORTRAN).

Every PVM tasks are uniquely identified by an integer known as task identifier (TID) assigned by local pvmd. Messages are sent to and received from tids. PVM haves several routines that return TID values so that the user application can classify other tasks in the system. PVM also supports sets of tasks. A task may belong to more than one set and one task from one set can communicate with the task in the other groups. To use one of the group functions, a program must be connected with libgpvm3.a.


Related Discussions:- Features of parallel virtual machine pvm

What is unbound transmission media, Unbound Transmission Media Unbound ...

Unbound Transmission Media Unbound transmission media extend beyond the limiting confines of cabling. They give a good communication alternative for WANS. The lack of physical

Illustrate return to zero encoding, Q Illustrate Return to Zero encoding? ...

Q Illustrate Return to Zero encoding? - In NRZ-I long strings of 0s may still be a problem - May comprise synchronization as part of the signal for both 1s and 0s - How?

What is meant by asymmetric multiprocessing, What is meant by Asymmetric Mu...

What is meant by Asymmetric Multiprocessing (AMP)? It imposes hierarchy and a division of labor between processors. Only one designated processor, the master, controls (in a ti

Explain about bandwidth – delay product, Q. Explain about Bandwidth – delay...

Q. Explain about Bandwidth – delay product? Bandwidth - delay product - A measure of competence of ARQ system = bandwidth (bits per second) * round-trip delay (in seco

Explain in brief about the throughput, Explain in brief about the Throughpu...

Explain in brief about the Throughput The medium access control protocol should make as well-organized use as possible of the wireless medium to maximize capacity. Number of

Illustrate TCP – bytes and segments, Q. Illustrate TCP – bytes and segments...

Q. Illustrate TCP – bytes and segments? TCP - bytes & segments TCP at the sending site collects bytes into a packet called a segment TCP adds a header to each se

Merits of a network based ids and a host based ids, Question: (a) Descr...

Question: (a) Describe the following biometric techniques:- (i) Retina scan, (ii) Fingerprint, (iii) Iris Scan. Your answer should consider the following: the data storage requ

operational amplifier and peak detector circuit, Question The operatio...

Question The operational amplifier in the peak detector circuit shown in the figure below is powered from plus and minus 15 V. If Vout is at 1V and Vin is at 0.5V, at approxima

Sorting using combinational circuit, Now, let us suppose a famous sequence ...

Now, let us suppose a famous sequence called as bitonic sequence and sort out the elements using a combinational circuit consisting of a set of comparators. The property of bitonic

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd