Parallel virtual machine (pvm), Computer Networking

PVM (Parallel Virtual Machine) is a portable message-passing programming system, designed to link divide heterogeneous host machines to form a "virtual machine" which is a one, manageable parallel computing resource. Large computational troubles such as, superconductivity studies, molecular dynamics simulations, distributed fractal computations, matrix algorithms, can therefore be solved more cost effectively by using the memory of many computers and aggregate power.

PVM was developed by the University of Tennessee, The Oak Ridge National Laboratory and Emory University. The first version was released in 1989, version 2 was released in 1991 and finally version 3 was released in 1993. The PVM software allows a collection of heterogeneous computer systems to be viewed as a one parallel virtual machine. It transparently handles data conversion, all message routing and task scheduling across a network of incompatible computer architectures. The programming interface of PVM is extremely easy .The user writes his application as a collection of cooperating tasks. Tasks access PVM resources by a library of standard interface routines. These routines let the initiation and termination of tasks across the communication as well as network and synchronisation among the tasks. Communication constructs consist of those for sending and receiving data structures as well as high-level primitives such as barrier synchronization and broadcast.

 

Posted Date: 3/2/2013 7:14:49 AM | Location : United States







Related Discussions:- Parallel virtual machine (pvm), Assignment Help, Ask Question on Parallel virtual machine (pvm), Get Answer, Expert's Help, Parallel virtual machine (pvm) Discussions

Write discussion on Parallel virtual machine (pvm)
Your posts are moderated
Related Questions
As in PRAM, there was no direct communication medium among the processors, therefore another model called as interconnection networks have been designed. In the interconnection net


What is Security solutions Though there are a number of security solutions available due to sophistication in technology, there are a number of risks and difficulties attached

Efficiency :- The other main metric used for performance measurement is efficiency of parallel computer system i.e. how the resources of the parallel systems are being utilized

Challenge Handshake Authentication Protocols (CHAP) CHAP as its an implies implements  a form of authentication that  requires a challenge  and a response. A CHAP authenticator

i need the job to be done within 3days

Groupware addresses the management of semi-structured information like text, image, mail, bulletin boards and the flow of work. These Client/Server systems have people in direct co

What is inference? Ans) The principle of "inference" is fairly a simple one: being capable to derive new data from data that you already know. In a mathematical sense, querying

You are designing a network for a retail customer; they plan to have 5 locations initially with the main store acting as the warehousing depot.  Within the next year they are plann

This example illustrate the use of lastprivate clause void for_loop (int n, float *a, float *b) { int i; #pragma omp parallel { #pragma omp for lastprivate(i) for