Features of parallel virtual machine pvm, Computer Networking

Assignment Help:

Features

1. Simple to install;

2. Simple to configure;

3. Multiple applications from one user can implement;

4. Multiple users can each use PVM concurrently;

5. C, C++, and Fortran supported;

6. Package is minute;

7. Users can select the group of machines for a given run of a PVM program;

8. Process-based computation;

9. Heterogeneity support, and

10. Explicit message-passing model

When the PVM is begins it examines the virtual machine in which it is to function, and makes a process called the PVM demon, or simply pvmd on every machine. An example of a daemon program is the mail programs that runs in the background and take care all the incoming and outgoing electronic mail on a computer, pvmd gives inter-host point of contact, authenticates task and implements processes on machines. It also gives the fault detection, routes messages not from or intended for its host, transfer messages from its application to a destination, receives messages from some other pvmd's, and buffers it until the destination application can take care it.

PVM gives a library of functions, libpvm3.a that the application programmer calls. Every function has some particular effect in the PVM. Though, all this library really gives is a convenient way of asking the local pvmd to perform a few works. The pvmd then acts as the virtual machine. Both pvmd and PVM library considered the PVM system.

The PVM system supports data decomposition as well as functional model of parallel programming. It attached with C, C++, and FORTRAN. The C and C++ language attaching for the PVM user interface library are executed as functions (subroutines in case of FORTRAN) . User programs written in C and C++ can access PVM library by connecting the library libpvm3.a (libfpvm3.a in case of FORTRAN).

Every PVM tasks are uniquely identified by an integer known as task identifier (TID) assigned by local pvmd. Messages are sent to and received from tids. PVM haves several routines that return TID values so that the user application can classify other tasks in the system. PVM also supports sets of tasks. A task may belong to more than one set and one task from one set can communicate with the task in the other groups. To use one of the group functions, a program must be connected with libgpvm3.a.


Related Discussions:- Features of parallel virtual machine pvm

Building a http server, IMPORTANT: The web server should be able to serve H...

IMPORTANT: The web server should be able to serve HTTP files only. You will not need to implement the directory listing and CGI-bin. Purpose The objective is to implement a H

Byte number - transport layer, Byte Number TCP number all data  bytes ...

Byte Number TCP number all data  bytes that  are transmitted  in a connection. Numbering  is independent  in each direction when TCP receives bytes of data  a process. It stor

Time out - transport layer, Time out The  protocols  name Go Back  N i...

Time out The  protocols  name Go Back  N is  derived  from the  sender behaviour in the  presence  of lost or  overly  delayed packets. A timer will again  be used  to recover

Advantages, What are advantages of having e-commerce over extranets

What are advantages of having e-commerce over extranets

What is single-mode fiber, What is Single-mode fiber Single-mode fiber ...

What is Single-mode fiber Single-mode fiber is competent of higher bandwidth and greater cable run distances than multi-mode fiber. For the reason that of these characterist

Compute the hash - part of the packet, In this question, we study Nested ES...

In this question, we study Nested ESP in AH, that is, we combine ESP with AH. Let's look at the site-to-site VPN scenario shown again in Figure 1. Let's assume that Alice's desktop

Determine how many bits are used for the page number, 1.  A virtual memory ...

1.  A virtual memory system has a virtual address space of 4 Gigabytes and a page size of 8 Kilobytes.  Each page table entry occupies 4 bytes.   a)  How many bits remain unchanged

What is one basic requirement for establishing vlan, What is one basic requ...

What is one basic requirement for establishing VLANs? A VLAN needs dedicated equipment on each end of the connection that permits messages entering the Internet to be encrypted

State 802.11 DSSS , 802.11 DSSS a) Direct sequence spread spectrum in a...

802.11 DSSS a) Direct sequence spread spectrum in a 2.4 GHz band b) Each bit is replaced by a sequence of bits called a chip code, implemented at the physical layer c) Se

What is the importance of encryption on a network, What is the importance o...

What is the importance of Encryption on a network? Encryption is the process of translating information into a code that is unreadable by the user. It is then translated back o

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd