Features of parallel virtual machine pvm, Computer Networking

Assignment Help:

Features

1. Simple to install;

2. Simple to configure;

3. Multiple applications from one user can implement;

4. Multiple users can each use PVM concurrently;

5. C, C++, and Fortran supported;

6. Package is minute;

7. Users can select the group of machines for a given run of a PVM program;

8. Process-based computation;

9. Heterogeneity support, and

10. Explicit message-passing model

When the PVM is begins it examines the virtual machine in which it is to function, and makes a process called the PVM demon, or simply pvmd on every machine. An example of a daemon program is the mail programs that runs in the background and take care all the incoming and outgoing electronic mail on a computer, pvmd gives inter-host point of contact, authenticates task and implements processes on machines. It also gives the fault detection, routes messages not from or intended for its host, transfer messages from its application to a destination, receives messages from some other pvmd's, and buffers it until the destination application can take care it.

PVM gives a library of functions, libpvm3.a that the application programmer calls. Every function has some particular effect in the PVM. Though, all this library really gives is a convenient way of asking the local pvmd to perform a few works. The pvmd then acts as the virtual machine. Both pvmd and PVM library considered the PVM system.

The PVM system supports data decomposition as well as functional model of parallel programming. It attached with C, C++, and FORTRAN. The C and C++ language attaching for the PVM user interface library are executed as functions (subroutines in case of FORTRAN) . User programs written in C and C++ can access PVM library by connecting the library libpvm3.a (libfpvm3.a in case of FORTRAN).

Every PVM tasks are uniquely identified by an integer known as task identifier (TID) assigned by local pvmd. Messages are sent to and received from tids. PVM haves several routines that return TID values so that the user application can classify other tasks in the system. PVM also supports sets of tasks. A task may belong to more than one set and one task from one set can communicate with the task in the other groups. To use one of the group functions, a program must be connected with libgpvm3.a.


Related Discussions:- Features of parallel virtual machine pvm

Show the parity check - performance, Q. Show the Parity Check - Performance...

Q. Show the Parity Check - Performance? Parity Check - Performance Is able to detect all single-bit errors Can as well detect burst errors if the total number of

Define some solutions of security, What is Security solutions Though t...

What is Security solutions Though there are a number of security solutions available due to sophistication in technology, there are a number of risks and difficulties attached

What is a file server, What is a File server? File servers are helpful ...

What is a File server? File servers are helpful for sharing files across a network. With a file server, the client passes requests for file records over system to file server.

Describe the term disaster management as security threats, Describe the ter...

Describe the term Disaster Management as security threats Making and testing backups regularly could be the simplest and easiest of all the security measures. But a new questio

State the list of protocols supported by the intranet, State the list of pr...

State the list of protocols supported by the Intranet The following is the list of protocols supported by the Intranet: ARP: Address resolution Protocol is used to resol

Command that forces the router to load into ROM, Determine the command that...

Determine the command that forces the router to load into ROM mode upon a reload?  Ans) boot system rom ia the command that forces the router to load into ROM mode upon a reload

Show the need for network layer, Q. Show the Need for Network Layer? N...

Q. Show the Need for Network Layer? Need for Network Layer - To solve the problem of delivery of data through several links. - Accountable for Host to Host delivery

What are the five major network services, What are the five major network s...

What are the five major network services? Major Network Services are: a. File Services b. Message Services c.  Print Services  d.  Application Services e.  Datab

Distinguish between network devices computers and servers, The School of Co...

The School of Computing is planning to deploy a new network structure to accommodate the following scenario. Please make suggestions on how this LAN can be designed based on the fl

Distributed Algorithms, can we solve the problem using bounded buffer space...

can we solve the problem using bounded buffer space if the propagation delay is arbitrarily large ?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd