Process management in pvm, Computer Networking

Assignment Help:

Process Management

  • int pvm_mytid( void )

Returns the tid of the calling process.  tid values less than zero indicate an fault.

  • int pvm_exit( void )

Tells the local pvmd that this process is leaving PVM. info Integer status code returned by the routine. Values less than zero shows an error.

  • pvm_spawn( char *task, char **argv, int flag, char *where, int ntask, int

*tids )

start new PVM processes.  task, a character string is the implementable file name of the PVM process to be started. The implementable must already reside on the host on which it is to be in progress. Argv is a pointer to an array of arguments to task. If the implementable needs no arguments, then the second argument to pvm_spawn is NULL. flag Integer states spawn options. where , a characte r string describes where to start the PVM process. If flag is 0, then where is ignored and PVM will select the most appropriate host. ntask ,an integer, describes the number of copies of the implementable to start. tids ,Integer array of length ntask returns the tids of the PVM processes started by this pvm_spawn call. The function returns the real number of processes returned. Negative values shows error.

  • int pvm_kill( int tid )

Terminates a particular PVM process. tid Integer task identifier of the PVM process to be killed (not itself).  Return values less than zero shows an error.

  • int pvm_catchout( FILE *ff )

Catch output from child tasks. ff  is file descriptor on which we type the collected output. The default is to have the PVM type the stderr and stdout of spawned tasks.

Information

  • int pvm_parent( void )

Returns the tid of the process that spawned the calling process.

  • int pvm_tidtohost( tid )

Returns the host of the particular PVM process. Error if negative value is returned.

      int  pvm_config( int *nhost, int *narch, struct pvmhostinfo **hostp )

struct pvmhostinfo {

int hi_tid;

char *hi_name; char *hi_arch; int hi_speed;

};

Returns information about the current virtual machine configuration. nhost  is the number of hosts (pvmds) in the virtual machine. narch is the number of dissimilar data formats  is being used. hostp is pointer to an array of structures which have the information about every host including its pvmd task ID, architecture, name and relative speed(default is 1000).

  • int info = pvm_tasks( int where, int *ntask, struct pvmtaskinfo **taskp )

struct pvmtaskinfo {

 int ti_tid; int ti_ptid;

int ti_host;

int ti_flag; char *ti_a_out; } taskp;

Returns the information regarding the tasks running on the virtual machine. where states what tasks to return the information about. The options are:

0

 for every the tasks on the virtual machine

pvmd tid

for all tasks on a given host

 tid

 for a specific task

ntask returns the number of tasks being reported on.

taskp is a pointer to an array of structures which have the information about every task including its task ID, pvmd task ID, parent tid, status flag, and the name of this task's implementable file. The status flag values are: waiting for the pvmd, waiting for a message, and running.


Related Discussions:- Process management in pvm

Three main functions at layer three of the osi model, Identify the 3 major ...

Identify the 3 major functions at layer 3 of the OSI model Ans) Layer three explains the path, forwards the packet and executes software / logical addressing.

What is quantum computing, In quantum computing, we use the method of qubit...

In quantum computing, we use the method of qubits, superposition and coherence. A normal bit can be in only two states - 0 and 1. But a qubit it can be in 0, 1, or in the superposi

Describe smtp, a) Used for sending e-mail. b) Uses port 25.

a) Used for sending e-mail. b) Uses port 25.

Combine subtitution and transposition, how to own cipher to encrypt and dec...

how to own cipher to encrypt and decrypt message by combine both substitution ans transposition algorithm using c program

Give the description of security tools, Give the Description of security to...

Give the Description of security tools Software are coming up in which the user can select the kind of security measure required to be taken for encryption. One such example is

What is stateful multi-layer inspection, What is Stateful Multi-Layer Inspe...

What is Stateful Multi-Layer Inspection (SMLI) They are considered as the third generation of firewall technology and usually combine the facilities of the above two. They are

Discuss on basic services in gsm, Question 1 Explain the process of Compon...

Question 1 Explain the process of Components Identification and call establishment Question 2 Discuss on Basic services in GSM Question 3 Explain the Protocols Use

Connection oriented multiplexing and de multiplexing, Connection Oriented M...

Connection Oriented Multiplexing And De multiplexing TCP socket  identified by 4 tuple: a.Source IP address b.Source port number c.Destination IP address d.Destina

Illustrate the bellman-ford algorithm, Illustrate the Bellman-Ford algorith...

Illustrate the Bellman-Ford algorithm The Bellman-Ford algorithm uses only on information from its neighbours and knowledge of its link costs, to update it costs and paths. Dij

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd