Set up to use pvm run and complie, Computer Networking

Assignment Help:

PVM uses two environment variables when starting and running. Every PVM user needs to set these two variables to use PVM. The initial variable is PVM_ROOT, which is set to the location of the installed pvm3 directory. The second variable is PVM_ARCH , which notify PVM the architecture of this host. The simplest method is to set these two variables in your.cshrc file. Here is an example for setting PVM_ROOT:

setenv PVM_ROOT $HOME/pvm3

The user can set PVM_ARCH by concatenating to the file .cshrc, the content of file

$PVM_ROOT/lib/cshrc.stub.

Starting PVM

To start PVM, on any host on which PVM has been installed we can write

% pvm

The PVM console, called pvm, is stand-alone PVM tasks that let the user to interactively start, query, and change the virtual machine. Then we can add hosts to virtual machine by typing at the console prompt (got after last command)

pvm> add hostname

To delete hosts (excluding the one we are using ) from virtual machine we can write

pvm> delete hostname

We can see the configuration of the present virtual machine, we can write

pvm> conf

To see what PVM tasks are running on the virtual machine, we should write

pvm> ps -a

To close the virtual machine environment, we should write

pvm> halt

Multiple hosts can be added concurrently by typing the hostnames in a file one per line and then write

  % pvm hostfile

PVM will then add all the listed hosts concurrently before the console prompt appears.

Compiling and Running the PVM Program

Now, we shall study how to compile and run PVM programs.  To compile the program , modify to the directory pvm/lib/archname where archname is the architecture name of your computer. Then the following command are:

cc  program.c -lpvm3 -o program

will compile a program known as program.c. After compiling, we can put the executable file in the directory pvm3/bin/ARCH. Also, we require to compile the program separately for each architecture in virtual machine. In case we use dynamic groups, we should also add -lgpvm3 to the compile command. The executable file will be run. To do this, first run PVM. After PVM is running, executable file might be run from the unix command line, similar to any other program.

PVM supplies an architecture-independent make, aimk, that automatically decides PVM_ARCH and links any operating system definite libraries to your application. To compile the C example, type

% aimk master.c

Now, from one window, start PVM and configure some hosts. In another window change directory to $HOME/pvm3/bin/PVM_ARCH and type

% master

It will ask for a number of tasks to be implemented. Then type the number of tasks.


Related Discussions:- Set up to use pvm run and complie

What are called transactions, The grouped SQL statements are known as Trans...

The grouped SQL statements are known as Transactions (or) A transaction is a collection of actions embused with ACID properties.

Explain client and server networking model, Explain Client/Server Networkin...

Explain Client/Server Networking Model. A networking model where one or more powerful  computers (servers) give the dissimilar network services and all other user's computers (

Comparison of distance-vector and link-state algorithm, DISTANCE-VECTOR ROU...

DISTANCE-VECTOR ROUTING: It is easy to implement. Packet switch modifies its own routing table first. It is used in RIP. LINK-STATE ALGORITHM: It is ve

Latency and scalability, Latency : In interconnection networks a variety of...

Latency : In interconnection networks a variety of nodes may be at dissimilar distances depending upon the topology. The network latency differs to the worst-case time wait for a u

Packet processing on vpn router, Consider the site-to-site VPN scenario sho...

Consider the site-to-site VPN scenario shown in Figure 2. Let's deploy the AH protocol on the two VPN routers so that no desktop on the two sites need to do any AH operations. Assu

Explain what a digital signature is and how it works, Question: a) Out...

Question: a) Outline the concept of the Real Time Gross Settlement (RTGS) system in Mauritius and name the three main system components of the MACSS. b) Differentiate bet

Determine about the proxy servers, Determine about the proxy servers T...

Determine about the proxy servers There are proxy servers that act as good firewall protection for the entire Intranet system. In some cases, firewall comes as a separate serv

Example of the datalink layer, MAC (media access control) and LLC (logical ...

MAC (media access control) and LLC (logical link control) are both layer 2 protocols.

What command do we use to disable domain lookup, no ip domain-lookupcommand...

no ip domain-lookupcommand is use to disable domain lookup

What are called fat clients and fat servers, If the amount of the applicati...

If the amount of the application runs on the Client side, then it is Fat clients. It is mostly used for decision support and personal software. If the amount of the application

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd