Dynamic configuration and signaling, Computer Networking

Dynamic Configuration

  • int pvm_addhosts( char **hosts, int nhost, int *infos )

Add hosts to the virtual machine. hosts is an array of strings naming the hosts to be added. nhost states the length of array hosts. infos is an array of length nhost which returns the status for every host. Values less than zero shows an error, while positive values are TIDs of the new hosts.

Signaling

  • int pvm_sendsig( int tid, int signum )

Sends a signal to one more PVM process. tid is task identifier of PVM process to receive the signal. The signum is the signal number.

  • int info = pvm_notify( int what, int msgtag, int cnt, int *tids )

Request notification of PVM event such as host failure. What states the type of event to trigger the notification. Some of them are:

PvmTaskExit

Task killed or is exits.

PvmHostDelete

Host is crashes or deleted.

PvmHostAdd

New host is added.

msgtag is message tag to be used in notification. cnt For PvmTaskExit and PvmHostDelete, states the length of the tids array. For PvmHostAdd states the number of times to notify.

tids for PvmTaskExit and PvmHostDelete is an array of length cnt of task or pvmd TIDs to be notified about. The array is not used by the PvmHostAdd option.

Posted Date: 3/2/2013 7:22:37 AM | Location : United States







Related Discussions:- Dynamic configuration and signaling, Assignment Help, Ask Question on Dynamic configuration and signaling, Get Answer, Expert's Help, Dynamic configuration and signaling Discussions

Write discussion on Dynamic configuration and signaling
Your posts are moderated
Related Questions
Determine the concept of placing antenna on hieght First, starting deployment simply placed cells in regions where there was high density of vehicle or human population. Once t


ACME Corp is located in Toledo, Ohio. They would like to create a network and divide it into 3 subnets, each subnet has 150 computers. The IT plan calls for connecting the LAN to t

Shared variable programme structures  In this section, we talk about some more concepts related to the shared programme. Concept of Lock Locks are used for protected a

Network throughput It is a symptomatic measure of the message carrying capability of a network. It is termed as the total number of messages network can send in per unit time.

What are the five major technologies that can be used to create Client/Server applications? Database Servers Groupware TP Monitors Distributed Objects Intranets.

Intrinsic Functions HPF introduces some new intrinsic functions in addition to those defined in F90. The two most regularly used in parallel programming are the system inquiry

Explain the technique- Backpressure This technique produces an effect same to backpressure in fluids flowing down a pipe. It includes link-by-link use of flow control in a dire

how to implement chord connection as the network management system ?

Q. Explain the Public-Key Cryptography? Public-Key Cryptography - Each user has the same encryption algorithm and key - Decryption algorithm also key are kept secret