Set up to use pvm run and complie, Computer Networking

Assignment Help:

PVM uses two environment variables when starting and running. Every PVM user needs to set these two variables to use PVM. The initial variable is PVM_ROOT, which is set to the location of the installed pvm3 directory. The second variable is PVM_ARCH , which notify PVM the architecture of this host. The simplest method is to set these two variables in your.cshrc file. Here is an example for setting PVM_ROOT:

setenv PVM_ROOT $HOME/pvm3

The user can set PVM_ARCH by concatenating to the file .cshrc, the content of file

$PVM_ROOT/lib/cshrc.stub.

Starting PVM

To start PVM, on any host on which PVM has been installed we can write

% pvm

The PVM console, called pvm, is stand-alone PVM tasks that let the user to interactively start, query, and change the virtual machine. Then we can add hosts to virtual machine by typing at the console prompt (got after last command)

pvm> add hostname

To delete hosts (excluding the one we are using ) from virtual machine we can write

pvm> delete hostname

We can see the configuration of the present virtual machine, we can write

pvm> conf

To see what PVM tasks are running on the virtual machine, we should write

pvm> ps -a

To close the virtual machine environment, we should write

pvm> halt

Multiple hosts can be added concurrently by typing the hostnames in a file one per line and then write

  % pvm hostfile

PVM will then add all the listed hosts concurrently before the console prompt appears.

Compiling and Running the PVM Program

Now, we shall study how to compile and run PVM programs.  To compile the program , modify to the directory pvm/lib/archname where archname is the architecture name of your computer. Then the following command are:

cc  program.c -lpvm3 -o program

will compile a program known as program.c. After compiling, we can put the executable file in the directory pvm3/bin/ARCH. Also, we require to compile the program separately for each architecture in virtual machine. In case we use dynamic groups, we should also add -lgpvm3 to the compile command. The executable file will be run. To do this, first run PVM. After PVM is running, executable file might be run from the unix command line, similar to any other program.

PVM supplies an architecture-independent make, aimk, that automatically decides PVM_ARCH and links any operating system definite libraries to your application. To compile the C example, type

% aimk master.c

Now, from one window, start PVM and configure some hosts. In another window change directory to $HOME/pvm3/bin/PVM_ARCH and type

% master

It will ask for a number of tasks to be implemented. Then type the number of tasks.


Related Discussions:- Set up to use pvm run and complie

Transmission robustness and security, Transmission robustness and security ...

Transmission robustness and security Unless properly designed, a wireless LAN might be interference prone and simply eavesdropped. The design of a wireless LAN must allow relia

State the nonselective fading and selective fading, Nonselective fading and...

Nonselective fading and Selective fading Nonselective fading, is a fading in which all frequency methods of the received signal fluctuate in the similar proportions simultaneo

Define post office and lightweight directory access protocol, Post Office P...

Post Office Protocol and Lightweight Directory Access Protocol POP: Post Office Protocol is a used by mail clients to download messages from a mail server on the Internet. L

Troubleshooting vtp configuration -ccna, Prepare the Network Step 1: Ca...

Prepare the Network Step 1: Cable a network that is similar to the one in the topology diagram.  You can use any current switch in your lab as long as it has the needed inte

Determine the types of intranet, Determine the Types of intranet Intran...

Determine the Types of intranet Intranets have been broadly classified into three types based on their functionality, viz., The Bulletin Board, Database Management and

Layer responsible for putting 1s and 0s into a logical group, Name the laye...

Name the layer responsible for putting 1s and 0s into a logical group? Ans) Frames are broken down into 1s and 0s and placed onto the physical medium by the Data Lin layer.

Give the description of security tools, Give the Description of security to...

Give the Description of security tools Software are coming up in which the user can select the kind of security measure required to be taken for encryption. One such example is

Internet service provider (isp), Internet  Service Provider (ISP) Thi...

Internet  Service Provider (ISP) This  supper fast  network  spanning  the world  from  one major  metropolitan area to another  is provided  by a handful of national internet

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd