Pvm communication model, Computer Engineering

Assignment Help:

Q. PVM communication model?

A nonblocking receive as soon as returns with either data or a flag that data hasn't arrived while a blocking receive returns only when data is in receive buffer. The model supports the multicast to a set of tasks too as well as broadcast to a user-defined group of tasks. There are functions to carry out global sum, global max etc too across user-defined group of tasks. Wildcards may be specified in receive for source and label allowing either or both of these contexts to be ignored. A routine may be called to return information about received messages. 

The PVM model assures that message order is preserved. If task 1 transmits message A to task 2 then task 1 transmits message B to task 2 and message A will arrive at task 2 before message B. Furthermore if both messages arrive before task 2 does a receive then a wildcard receive would always return message A.

  • int bufid = pvm_mkbuf( int encoding )

encoding specifying the buffer's encoding scheme. creates a new message buffer.


Related Discussions:- Pvm communication model

What are the advantages of segmentation, What are its advantages? How is se...

What are its advantages? How is segmentation implemented in typical microprocessors? The first benefit that memory segmentation has is that only 16 bit registers are necessary

Explain about the network security, Explain about the network security. ...

Explain about the network security. Network security implies the protection of networks and their services through unauthorized access, destruction or disclosure, modificati

Make your simulation run faster, Ameliorating the mechanical delays of seek...

Ameliorating the mechanical delays of seeks and rottion are usually regardeed as major aspects of device drivers for disks. The simplest way for a disk device driver to service dis

Advantages & disadvantages of public-key cryptography, Advantages & Disadva...

Advantages & Disadvantages Enhanced security and convenience: private keys never require be transmitting or revealing to anyone.  They can givce a method for digital signatu

Find 9''s compliment of bcd number using 4-bit binary adder, Design a circu...

Design a circuit for determining the 9's compliment of a BCD number by using 4-bit binary adder and some external logic gates? Compliment of a BCD number 9's co

Explain the term step-wise refinement, Explain the term step-wise refinemen...

Explain the term step-wise refinement. Ans:  Step Wise Refinement  Refinement is a method of elaboration. Here one starts with a statement of function that is described a

Define rotational latency and disk bandwidth, Define rotational latency and...

Define rotational latency and disk bandwidth. Rotational latency is the additional time waiting for the disk to rotate the desired sector to the disk head. The disk bandwidth i

What is the use of status command, What is the use of status command, data ...

What is the use of status command, data output command, and data input command. A status command is used to test a variety of status conditions in the interface and the periphe

What is control store, What is control store? The microroutines for all...

What is control store? The microroutines for all the instructions in the instruction set of a computer are kept in a special memory known as the control store.

Explain the optimization of data access paths, Explain the Optimization of ...

Explain the Optimization of data access paths Optimization is a very significant aspect of any design. The designer must do the followings for optimization: i) Add redundan

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd