Features of parallel virtual machine pvm, Computer Networking

Features

1. Simple to install;

2. Simple to configure;

3. Multiple applications from one user can implement;

4. Multiple users can each use PVM concurrently;

5. C, C++, and Fortran supported;

6. Package is minute;

7. Users can select the group of machines for a given run of a PVM program;

8. Process-based computation;

9. Heterogeneity support, and

10. Explicit message-passing model

When the PVM is begins it examines the virtual machine in which it is to function, and makes a process called the PVM demon, or simply pvmd on every machine. An example of a daemon program is the mail programs that runs in the background and take care all the incoming and outgoing electronic mail on a computer, pvmd gives inter-host point of contact, authenticates task and implements processes on machines. It also gives the fault detection, routes messages not from or intended for its host, transfer messages from its application to a destination, receives messages from some other pvmd's, and buffers it until the destination application can take care it.

PVM gives a library of functions, libpvm3.a that the application programmer calls. Every function has some particular effect in the PVM. Though, all this library really gives is a convenient way of asking the local pvmd to perform a few works. The pvmd then acts as the virtual machine. Both pvmd and PVM library considered the PVM system.

The PVM system supports data decomposition as well as functional model of parallel programming. It attached with C, C++, and FORTRAN. The C and C++ language attaching for the PVM user interface library are executed as functions (subroutines in case of FORTRAN) . User programs written in C and C++ can access PVM library by connecting the library libpvm3.a (libfpvm3.a in case of FORTRAN).

Every PVM tasks are uniquely identified by an integer known as task identifier (TID) assigned by local pvmd. Messages are sent to and received from tids. PVM haves several routines that return TID values so that the user application can classify other tasks in the system. PVM also supports sets of tasks. A task may belong to more than one set and one task from one set can communicate with the task in the other groups. To use one of the group functions, a program must be connected with libgpvm3.a.

Posted Date: 3/2/2013 7:16:26 AM | Location : United States







Related Discussions:- Features of parallel virtual machine pvm, Assignment Help, Ask Question on Features of parallel virtual machine pvm, Get Answer, Expert's Help, Features of parallel virtual machine pvm Discussions

Write discussion on Features of parallel virtual machine pvm
Your posts are moderated
Related Questions
CHARACTERIZATION OF NETWORKS:  There are three kinds of characterization of networks. LOCAL AREA NETWORK (LAN):  It is needed for a single building. METROPOLOTAN AREA

The Physical layer deals with the definite physical medium and the method of transporting 1s and 0s.

#queiLab 2: Office Network Expansion Connect to the iLab here. Submit your assignment to the Dropbox located on the silver tab at the top of this page. (See "Due Dates for Assig

What does a Standard IP Access-list use as test criteria Ans) Standard IP access list use only source address.


FDDI Media Class B or SAS (single-attachment stations) attach to one ring Class A or DAS (dual attachment stations) attach to both rings. SASs is attached to the primary rin

Facts about  Fiber Optic Cables 1. Outer insulating jacket is made  of Teflon or PVC. 2. Kevler fiber  helps  to strengthen  the cable and prevent breakage. 3. A plas

What is anonymous FTP and why would you use it Anonymous FTP enables users to join to a host without using a valid login and password. Generally, anonymous FTP uses a login kno

Explain in brief about the Throughput The medium access control protocol should make as well-organized use as possible of the wireless medium to maximize capacity. Number of

Define about the term - hackers Every time technology updates itself, new techniques evolve. At the same time thieves or intruders (in the information technology line, they are