Parallel virtual machine (pvm), Computer Networking

PVM (Parallel Virtual Machine) is a portable message-passing programming system, designed to link divide heterogeneous host machines to form a "virtual machine" which is a one, manageable parallel computing resource. Large computational troubles such as, superconductivity studies, molecular dynamics simulations, distributed fractal computations, matrix algorithms, can therefore be solved more cost effectively by using the memory of many computers and aggregate power.

PVM was developed by the University of Tennessee, The Oak Ridge National Laboratory and Emory University. The first version was released in 1989, version 2 was released in 1991 and finally version 3 was released in 1993. The PVM software allows a collection of heterogeneous computer systems to be viewed as a one parallel virtual machine. It transparently handles data conversion, all message routing and task scheduling across a network of incompatible computer architectures. The programming interface of PVM is extremely easy .The user writes his application as a collection of cooperating tasks. Tasks access PVM resources by a library of standard interface routines. These routines let the initiation and termination of tasks across the communication as well as network and synchronisation among the tasks. Communication constructs consist of those for sending and receiving data structures as well as high-level primitives such as barrier synchronization and broadcast.

 

Posted Date: 3/2/2013 7:14:49 AM | Location : United States







Related Discussions:- Parallel virtual machine (pvm), Assignment Help, Ask Question on Parallel virtual machine (pvm), Get Answer, Expert's Help, Parallel virtual machine (pvm) Discussions

Write discussion on Parallel virtual machine (pvm)
Your posts are moderated
Related Questions
LEASED SATELLITE CHANNEL: It may span arbitrarily big distance. It is given in the figure below.   Figure Satellite connections are low bandwidth to protect cost

Question: a) (i) Describe the entire process of credit card processing, identifying the different steps and parties involved. (ii) What are the roles of the acquiring ban

Q. Categories of Encryption - Decryption ? Categories of Encryption/Decryption - Symmetric-key - encryption key (Ke) and the decryption key (Kd) are the same and secret

UDP is connectionless, and does not give error checking. But remember, error checking can happen at other layers too.

Router Components As noted in the  previous  a router consists of a of input  interfaces at which  packets arrive and a set  of output interfaces from  which  packets depart. T

Determine the uses of firewalls The firewalls available today do all the things, viz., like filter the data packets, provide proxy services and do stateful inspection of packet


QUESTION 1 (a) Draw a use-case model for the above system. You must identify all possible actors and use-cases. (b) Assume you are using the Rational Unified Process a

TCP/IP Protocol Suite 1. What is the concept of Multi-protocol encapsulation in ATM networks? 2. Differentiate between RARP and ARP. 3. Differentiate TDP and UDP. 4. D

what are the applications of different encoding schemes