Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Process Management

  • int pvm_mytid( void )

Returns the tid of the calling process.  tid values less than zero indicate an fault.

  • int pvm_exit( void )

Tells the local pvmd that this process is leaving PVM. info Integer status code returned by the routine. Values less than zero shows an error.

  • pvm_spawn( char *task, char **argv, int flag, char *where, int ntask, int

*tids )

start new PVM processes.  task, a character string is the implementable file name of the PVM process to be started. The implementable must already reside on the host on which it is to be in progress. Argv is a pointer to an array of arguments to task. If the implementable needs no arguments, then the second argument to pvm_spawn is NULL. flag Integer states spawn options. where , a characte r string describes where to start the PVM process. If flag is 0, then where is ignored and PVM will select the most appropriate host. ntask ,an integer, describes the number of copies of the implementable to start. tids ,Integer array of length ntask returns the tids of the PVM processes started by this pvm_spawn call. The function returns the real number of processes returned. Negative values shows error.

  • int pvm_kill( int tid )

Terminates a particular PVM process. tid Integer task identifier of the PVM process to be killed (not itself).  Return values less than zero shows an error.

  • int pvm_catchout( FILE *ff )

Catch output from child tasks. ff  is file descriptor on which we type the collected output. The default is to have the PVM type the stderr and stdout of spawned tasks.

Information

  • int pvm_parent( void )

Returns the tid of the process that spawned the calling process.

  • int pvm_tidtohost( tid )

Returns the host of the particular PVM process. Error if negative value is returned.

      int  pvm_config( int *nhost, int *narch, struct pvmhostinfo **hostp )

struct pvmhostinfo {

int hi_tid;

char *hi_name; char *hi_arch; int hi_speed;

};

Returns information about the current virtual machine configuration. nhost  is the number of hosts (pvmds) in the virtual machine. narch is the number of dissimilar data formats  is being used. hostp is pointer to an array of structures which have the information about every host including its pvmd task ID, architecture, name and relative speed(default is 1000).

  • int info = pvm_tasks( int where, int *ntask, struct pvmtaskinfo **taskp )

struct pvmtaskinfo {

 int ti_tid; int ti_ptid;

int ti_host;

int ti_flag; char *ti_a_out; } taskp;

Returns the information regarding the tasks running on the virtual machine. where states what tasks to return the information about. The options are:

0

 for every the tasks on the virtual machine

pvmd tid

for all tasks on a given host

 tid

 for a specific task

ntask returns the number of tasks being reported on.

taskp is a pointer to an array of structures which have the information about every task including its task ID, pvmd task ID, parent tid, status flag, and the name of this task's implementable file. The status flag values are: waiting for the pvmd, waiting for a message, and running.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9525779

Have any Question?


Related Questions in Computer Network & Security

Per capita income of winterfell is 15000 with a growth rate

Per capita income of Winterfell is $15,000 with a growth rate of 4%. Per capita income of King's Landing is $25,000 with a growth rate of 0%. How long until per capita income is the same in both locations?

Wireless sensor networks wsn let users to access servers

Wireless Sensor Networks (WSN) let users to access servers, printers, and other network resources regardless of their location, within the wireless reach. This flexibility means that, for example, a user's laptop stays c ...

Question in regards to encryption does the public key and

Question : In regards to encryption, does the public key and private key come from the sender or does the receiver already have the private and is given the public key by the sender? The response must be typed, single sp ...

1 a firms marginal rate of technical substitution at m p lm

1) A firm's marginal rate of technical substitution at M P L/M P = 3, and the ratio of prices of labor and capital ,w/r, is 4. a) Is the firm minimizing its cost? Why or Why not? b) What can it do to improve its situatio ...

Question a signal travels through an amplifier and its

Question : A signal travels through an amplifier, and its power increased and becomes doubled. Then calculate amplification for this condition 2 Discuss about the TCP/IP PROTOCOL SUITE and Principles of Protocol Layering ...

A certain device is used to determine the sex of an unborn

A certain device is used to determine the sex of an unborn baby, but the device is not very reliable. If the fetus is truly a boy, the device says BOY with probability 0:8 (but, mistakenly, GIRL with probability 0:2). If ...

Suppose that third national bank has reserves of 20000 and

Suppose that Third National Bank has reserves of $20,000 and check able deposits of $200,000. The reserve ratio is 10 percent. The bank sells $20,000 in securities to the Federal Reserve Bank in its district, receiving a ...

Recent tariff actions by president trump include raising

Recent tariff actions by President Trump include raising tariffs and quotas on imports of both manufactured goods like televisions and automobiles and intermediate goods like steel and aluminum sheets. How will the econo ...

Question what is active threat in terms of network security

Question: What is active threat in terms of network security? Provide an example. The response must be typed, single spaced, must be in times new roman font (size 12) and must follow the APA format. Note: minimum 300 wor ...

Assignment descriptionproject scope a typical

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As