Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

PVM uses two environment variables when starting and running. Every PVM user needs to set these two variables to use PVM. The initial variable is PVM_ROOT, which is set to the location of the installed pvm3 directory. The second variable is PVM_ARCH , which notify PVM the architecture of this host. The simplest method is to set these two variables in your.cshrc file. Here is an example for setting PVM_ROOT:

setenv PVM_ROOT $HOME/pvm3

The user can set PVM_ARCH by concatenating to the file .cshrc, the content of file

$PVM_ROOT/lib/cshrc.stub.

Starting PVM

To start PVM, on any host on which PVM has been installed we can write

% pvm

The PVM console, called pvm, is stand-alone PVM tasks that let the user to interactively start, query, and change the virtual machine. Then we can add hosts to virtual machine by typing at the console prompt (got after last command)

pvm> add hostname

To delete hosts (excluding the one we are using ) from virtual machine we can write

pvm> delete hostname

We can see the configuration of the present virtual machine, we can write

pvm> conf

To see what PVM tasks are running on the virtual machine, we should write

pvm> ps -a

To close the virtual machine environment, we should write

pvm> halt

Multiple hosts can be added concurrently by typing the hostnames in a file one per line and then write

  % pvm hostfile

PVM will then add all the listed hosts concurrently before the console prompt appears.

Compiling and Running the PVM Program

Now, we shall study how to compile and run PVM programs.  To compile the program , modify to the directory pvm/lib/archname where archname is the architecture name of your computer. Then the following command are:

cc  program.c -lpvm3 -o program

will compile a program known as program.c. After compiling, we can put the executable file in the directory pvm3/bin/ARCH. Also, we require to compile the program separately for each architecture in virtual machine. In case we use dynamic groups, we should also add -lgpvm3 to the compile command. The executable file will be run. To do this, first run PVM. After PVM is running, executable file might be run from the unix command line, similar to any other program.

PVM supplies an architecture-independent make, aimk, that automatically decides PVM_ARCH and links any operating system definite libraries to your application. To compile the C example, type

% aimk master.c

Now, from one window, start PVM and configure some hosts. In another window change directory to $HOME/pvm3/bin/PVM_ARCH and type

% master

It will ask for a number of tasks to be implemented. Then type the number of tasks.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9525776

Have any Question?


Related Questions in Computer Network & Security

Sip encodingwhy does the session initiation protocol sip

SIP, ENCODING Why does the session initiation protocol SIP allow the sender and receiver to choose two different multimedia encoding schemes? Describe a scenario where it makes sense to use different protocols for sender ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Part - athe assignmentwrite a critique review of the

Part - A The assignment Write a critique / review of the following paper: Mark Pollitt Eoghan Casey David-Olivier Jaquet-Chiffelle Pavel Gladyshev, "A Framework for Harmonizing Forensic Science Practices and Digital/Mult ...

Overview of network security assessment - security

Overview of Network Security Assessment - Security Challenges in Emerging Networks Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be ab ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

Assignment - network implementationbackgroundwidgets and

Assignment - Network Implementation Background Widgets and Gadgets (WaG) have recently acquired a business, We Make Stuff (WMS), in another city. Before work can commence on integrating WMS's network into WaG's, WMS actu ...

Part ian attacker seeks to view the contents of a specific

Part I An attacker seeks to view the contents of a specific Microsoft Word document file to which they do not have any kind of access. You may assume that: - no exploitable vulnerabilities of any kind exist; - the attack ...

Advanced wireless networks assignment -wlan design project

Advanced Wireless Networks Assignment - WLAN Design Project - Description: You need to form a group of at most four students, and select one of the case studies provided in Assessment module on VU Collaborate. In this pr ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment wireless applications advances advantages and

Assignment : Wireless Applications, Advances, Advantages, and Disadvantages The adoption of wireless technologies varies from one industry to another, and is often based on the benefits provided versus the challenges, im ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As