Set up to use pvm run and complie, Computer Networking

Assignment Help:

PVM uses two environment variables when starting and running. Every PVM user needs to set these two variables to use PVM. The initial variable is PVM_ROOT, which is set to the location of the installed pvm3 directory. The second variable is PVM_ARCH , which notify PVM the architecture of this host. The simplest method is to set these two variables in your.cshrc file. Here is an example for setting PVM_ROOT:

setenv PVM_ROOT $HOME/pvm3

The user can set PVM_ARCH by concatenating to the file .cshrc, the content of file

$PVM_ROOT/lib/cshrc.stub.

Starting PVM

To start PVM, on any host on which PVM has been installed we can write

% pvm

The PVM console, called pvm, is stand-alone PVM tasks that let the user to interactively start, query, and change the virtual machine. Then we can add hosts to virtual machine by typing at the console prompt (got after last command)

pvm> add hostname

To delete hosts (excluding the one we are using ) from virtual machine we can write

pvm> delete hostname

We can see the configuration of the present virtual machine, we can write

pvm> conf

To see what PVM tasks are running on the virtual machine, we should write

pvm> ps -a

To close the virtual machine environment, we should write

pvm> halt

Multiple hosts can be added concurrently by typing the hostnames in a file one per line and then write

  % pvm hostfile

PVM will then add all the listed hosts concurrently before the console prompt appears.

Compiling and Running the PVM Program

Now, we shall study how to compile and run PVM programs.  To compile the program , modify to the directory pvm/lib/archname where archname is the architecture name of your computer. Then the following command are:

cc  program.c -lpvm3 -o program

will compile a program known as program.c. After compiling, we can put the executable file in the directory pvm3/bin/ARCH. Also, we require to compile the program separately for each architecture in virtual machine. In case we use dynamic groups, we should also add -lgpvm3 to the compile command. The executable file will be run. To do this, first run PVM. After PVM is running, executable file might be run from the unix command line, similar to any other program.

PVM supplies an architecture-independent make, aimk, that automatically decides PVM_ARCH and links any operating system definite libraries to your application. To compile the C example, type

% aimk master.c

Now, from one window, start PVM and configure some hosts. In another window change directory to $HOME/pvm3/bin/PVM_ARCH and type

% master

It will ask for a number of tasks to be implemented. Then type the number of tasks.


Related Discussions:- Set up to use pvm run and complie

Distributed Algorithms, can we solve the problem using bounded buffer space...

can we solve the problem using bounded buffer space if the propagation delay is arbitrarily large ?

Chord, how to implement chord connection as the network management system ?...

how to implement chord connection as the network management system ?

The application layer - fundamentals of networks, The application layer ...

The application layer This  layer enables users  to access the  network  by providing  a few  services to the user some of the protocols and services available to the  user ar

State token bus frame format, Token Bus Frame Format No length fiel...

Token Bus Frame Format No length field Data is able to be much larger (timers prevent hogs) Frame control Ack required? Data vs Control frame and how is

Media, explain history of internet?

explain history of internet?

Modeling a wan, To model a WAN, we need a graph in which the nodes model sw...

To model a WAN, we need a graph in which the nodes model switches and the edges model direct join between switches. The modeling saves essence of network, and it ignores attached d

What is beaconing, What is Beaconing? The process that permits a networ...

What is Beaconing? The process that permits a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not rece

Error detection in lrc - performance, LRC - Performance Detects ev...

LRC - Performance Detects every burst errors up to length n (number of columns) If two bits in one data unit are damaged as well as two bits in exactly same positions

Describe mail access protocols, Q. Describe Mail Access Protocols? Mai...

Q. Describe Mail Access Protocols? Mail Access Protocols - Used by receiver to retrieve mail when desired - Post Office Protocol, version 3 (POP3) is a simple limited

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd