Set up to use pvm run and complie, Computer Networking

PVM uses two environment variables when starting and running. Every PVM user needs to set these two variables to use PVM. The initial variable is PVM_ROOT, which is set to the location of the installed pvm3 directory. The second variable is PVM_ARCH , which notify PVM the architecture of this host. The simplest method is to set these two variables in your.cshrc file. Here is an example for setting PVM_ROOT:

setenv PVM_ROOT $HOME/pvm3

The user can set PVM_ARCH by concatenating to the file .cshrc, the content of file

$PVM_ROOT/lib/cshrc.stub.

Starting PVM

To start PVM, on any host on which PVM has been installed we can write

% pvm

The PVM console, called pvm, is stand-alone PVM tasks that let the user to interactively start, query, and change the virtual machine. Then we can add hosts to virtual machine by typing at the console prompt (got after last command)

pvm> add hostname

To delete hosts (excluding the one we are using ) from virtual machine we can write

pvm> delete hostname

We can see the configuration of the present virtual machine, we can write

pvm> conf

To see what PVM tasks are running on the virtual machine, we should write

pvm> ps -a

To close the virtual machine environment, we should write

pvm> halt

Multiple hosts can be added concurrently by typing the hostnames in a file one per line and then write

  % pvm hostfile

PVM will then add all the listed hosts concurrently before the console prompt appears.

Compiling and Running the PVM Program

Now, we shall study how to compile and run PVM programs.  To compile the program , modify to the directory pvm/lib/archname where archname is the architecture name of your computer. Then the following command are:

cc  program.c -lpvm3 -o program

will compile a program known as program.c. After compiling, we can put the executable file in the directory pvm3/bin/ARCH. Also, we require to compile the program separately for each architecture in virtual machine. In case we use dynamic groups, we should also add -lgpvm3 to the compile command. The executable file will be run. To do this, first run PVM. After PVM is running, executable file might be run from the unix command line, similar to any other program.

PVM supplies an architecture-independent make, aimk, that automatically decides PVM_ARCH and links any operating system definite libraries to your application. To compile the C example, type

% aimk master.c

Now, from one window, start PVM and configure some hosts. In another window change directory to $HOME/pvm3/bin/PVM_ARCH and type

% master

It will ask for a number of tasks to be implemented. Then type the number of tasks.

Posted Date: 3/2/2013 7:17:43 AM | Location : United States







Related Discussions:- Set up to use pvm run and complie, Assignment Help, Ask Question on Set up to use pvm run and complie, Get Answer, Expert's Help, Set up to use pvm run and complie Discussions

Write discussion on Set up to use pvm run and complie
Your posts are moderated
Related Questions
State some Security Models The first and foremost thing one needs to do is to chalk out a security plan and policy based on any security model. The term security policy shall

Application Layer The application layer provides  an  interface between  application  entities and the  users computer. This layer offers services to a variety of aspects of d

What do you mean by Beaconing and Auto-Reconfiguration? When a station does not receive a message from its nearest active upstream neighbor, it sends out a warning, otherwise c

#questionWrite a program to find the area under the curve y = f(x) between x = a and x = b, integrate y = f(x) between the limits of a and b. The area under a curve between two poi

Explain ISO's OSI Architecture The Open System Interconnection (OSI) is a standard reference model for communication among two end users in a network. It is used in developing

Recognize the command to view the configuration-register value Ans) show version is the command to view the configuration-register value

State the congestion avoidance process Notifies the source that congestion avoidance process should be initiated where applicable for traffic in the opposite direction of the r

What are different kinds of packets in EIGRP?

Advantage of IP sec  Tunnelling Mode IP Sec  tunnelling mode  has the  following  advantages: a.Security : Ts IP sec tunnelling mode  secure somewhat but  not the best. In a

Question: a) List three characteristics and two potential problems of a peer-to-peer environment. b) List three characteristics and two potential problems of a client/