Dynamic configuration and signaling, Computer Networking

Dynamic Configuration

  • int pvm_addhosts( char **hosts, int nhost, int *infos )

Add hosts to the virtual machine. hosts is an array of strings naming the hosts to be added. nhost states the length of array hosts. infos is an array of length nhost which returns the status for every host. Values less than zero shows an error, while positive values are TIDs of the new hosts.

Signaling

  • int pvm_sendsig( int tid, int signum )

Sends a signal to one more PVM process. tid is task identifier of PVM process to receive the signal. The signum is the signal number.

  • int info = pvm_notify( int what, int msgtag, int cnt, int *tids )

Request notification of PVM event such as host failure. What states the type of event to trigger the notification. Some of them are:

PvmTaskExit

Task killed or is exits.

PvmHostDelete

Host is crashes or deleted.

PvmHostAdd

New host is added.

msgtag is message tag to be used in notification. cnt For PvmTaskExit and PvmHostDelete, states the length of the tids array. For PvmHostAdd states the number of times to notify.

tids for PvmTaskExit and PvmHostDelete is an array of length cnt of task or pvmd TIDs to be notified about. The array is not used by the PvmHostAdd option.

Posted Date: 3/2/2013 7:22:37 AM | Location : United States







Related Discussions:- Dynamic configuration and signaling, Assignment Help, Ask Question on Dynamic configuration and signaling, Get Answer, Expert's Help, Dynamic configuration and signaling Discussions

Write discussion on Dynamic configuration and signaling
Your posts are moderated
Related Questions
Ethernet Addressing Every station on the network must have a unique physical address Offered by a six-byte physical address encoded on the network interface card (NIC)

implementation of energy aided shortest path routing protocol???

Let's imagine that we have 2 TCP clients. A simple one (modTCPClient.c) like the one you wrote in the first part of project 2 and another one (modTCPClient1.c) that after it connec

What is the implication of increasing and decreasing subnet Bits?

Tunnelling To guarantee privacy for the  organization, VPN specifies that each IP datagram destined for private  use of the  organization, must  first be  encrypted and then en

When using access lists, it is important where those access lists are placed. Which Statement best defines access list placement Ans) Put standard access lists as near the desti

This new model of Client/Server having of thin, portable, "universal" clients those talks to super fat servers. In the easiest form, a web server returns documents when clients ask

Link State Packet When  a router floods  the network  with information about its  neighbourhood. It is said to  be advertising. The basis of this  advertising is  a short  pack

State in brief about the Local Area Network (LAN) LAN is an interconnection of computers and associated peripherals as well as to the communications system as shown in Figure

What are the basic LAN topologies? The three simple LAN topologies that are combined to shape any practical topology are called as basic LAN topologies. They are, Bus Topology