Parallel virtual machine (pvm), Computer Networking

PVM (Parallel Virtual Machine) is a portable message-passing programming system, designed to link divide heterogeneous host machines to form a "virtual machine" which is a one, manageable parallel computing resource. Large computational troubles such as, superconductivity studies, molecular dynamics simulations, distributed fractal computations, matrix algorithms, can therefore be solved more cost effectively by using the memory of many computers and aggregate power.

PVM was developed by the University of Tennessee, The Oak Ridge National Laboratory and Emory University. The first version was released in 1989, version 2 was released in 1991 and finally version 3 was released in 1993. The PVM software allows a collection of heterogeneous computer systems to be viewed as a one parallel virtual machine. It transparently handles data conversion, all message routing and task scheduling across a network of incompatible computer architectures. The programming interface of PVM is extremely easy .The user writes his application as a collection of cooperating tasks. Tasks access PVM resources by a library of standard interface routines. These routines let the initiation and termination of tasks across the communication as well as network and synchronisation among the tasks. Communication constructs consist of those for sending and receiving data structures as well as high-level primitives such as barrier synchronization and broadcast.

 

Posted Date: 3/2/2013 7:14:49 AM | Location : United States







Related Discussions:- Parallel virtual machine (pvm), Assignment Help, Ask Question on Parallel virtual machine (pvm), Get Answer, Expert's Help, Parallel virtual machine (pvm) Discussions

Write discussion on Parallel virtual machine (pvm)
Your posts are moderated
Related Questions
What are firewalls? Firewalls serve to protect an internal network from external attacks. These external threats can be hackers who need to steal data or computer viruses that

Question 1 requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption t


Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Firewall is a device or a component that restricts access between a protected or an internal network from an external or untrustworthy network .A firewall basically limits unautho

Routers The network  layer (also  called layer3) manages device  addressing  tracks the location  of devices on the network  and determines  the best  way to  move data. Which

Uneven Load Distribution In the parallel computer, the problem is dividing into sub-problems and is assigned for computation to various processors. But sometimes the sub-probl

Explain about the Digital traffic channels The most notable difference among the two generations is that first generation systems are almost purely analog, while second generat

What is use of Carrier sense multiple access Carrier sense multiple access with collision detection (CSMA/CD) is a form of medium access control in which a station listens to

To monitor ipx traffic on a network, what command would we use? Ans) show ipx traffic