Parallel virtual machine (pvm), Computer Networking

PVM (Parallel Virtual Machine) is a portable message-passing programming system, designed to link divide heterogeneous host machines to form a "virtual machine" which is a one, manageable parallel computing resource. Large computational troubles such as, superconductivity studies, molecular dynamics simulations, distributed fractal computations, matrix algorithms, can therefore be solved more cost effectively by using the memory of many computers and aggregate power.

PVM was developed by the University of Tennessee, The Oak Ridge National Laboratory and Emory University. The first version was released in 1989, version 2 was released in 1991 and finally version 3 was released in 1993. The PVM software allows a collection of heterogeneous computer systems to be viewed as a one parallel virtual machine. It transparently handles data conversion, all message routing and task scheduling across a network of incompatible computer architectures. The programming interface of PVM is extremely easy .The user writes his application as a collection of cooperating tasks. Tasks access PVM resources by a library of standard interface routines. These routines let the initiation and termination of tasks across the communication as well as network and synchronisation among the tasks. Communication constructs consist of those for sending and receiving data structures as well as high-level primitives such as barrier synchronization and broadcast.

 

Posted Date: 3/2/2013 7:14:49 AM | Location : United States







Related Discussions:- Parallel virtual machine (pvm), Assignment Help, Ask Question on Parallel virtual machine (pvm), Get Answer, Expert's Help, Parallel virtual machine (pvm) Discussions

Write discussion on Parallel virtual machine (pvm)
Your posts are moderated
Related Questions
What are the important topologies for networks? BUS topology: In this every computer is directly linked to primary network cable in a single line. Advantages: Inexpensive,

explain the appropriateness of economic and behavioral feasibility

What is LRC? In LRC, a block of bits is separated into rows and a redundant row of bits is added to the whole block. It can detect burst errors. If two bits in one data unit ar

Post Office  Protocols Version In computing  the post office protocol  version 3 (POP3) is an  application layer internet standard  protocols  used by  local e mail  clients

Data Parallel Programming In the data parallel programming model, main focus is on performing simultaneous operations on a data set. The data set is typically prepared into a c

This assignment will assess parts of objectives 2-6 from the subject outline: 1 Explain the principles of logical design 2 Discuss the strengths and weaknesses of various net

What are the main categories based on which applications of computer network can be categorized? The major areas under which the applications for computer network can be divide

Q. Explain about Error Detection? Data can be corrupted during transmission because of accidents, Storms, sudden increase in electricity and voltage / decrease in signal power

The are various limitations of employing Wireless LAN technology in any multistory building in middle of Melbourne or any other big city are: • Range: The main problem of Wire

Internet Client Control Task A distributed system is to be implemented using networked PCs. The role of the system in this task is to implement an environmental control sys