Table of Contents Previous Next
Logo
The Ice Run Time in Detail : 32.18 Location Services
Copyright © 2003-2009 ZeroC, Inc.

32.18 Location Services

In Section 2.2.2 we described briefly how the Ice run time uses an intermediary, known as a location service, to convert the symbolic information in an indirect proxy into an endpoint that it can use to communicate with a server. This section expands on that introduction to explain in more detail how the Ice run time interacts with a location service. You can create your own location service or you can use IceGrid, which is an implementation of a location service and provides many other useful features as well (see Chapter 39). Describing how to implement a location service is outside the scope of this book.

32.18.1 Locators

A locator is an Ice object that is implemented by a location service. A locator object must support the Slice interface Ice::Locator, which defines operations that satisfy the location requirements of the Ice run time. Applications do not normally use these operations directly, but the locator object may support an implementation-specific interface derived from Ice::Locator that provides additional functionality. For example, IceGrid’s locator object implements the derived interface IceGrid::Query (see Section 39.6.5).

32.18.2 Client Semantics

On the first use of an indirect proxy in an application, the Ice run time may issue a remote invocation on the locator object. This activity is transparent to the application, as shown in Figure 32.6.
Figure 32.6. Locating an object.
1. The client invokes the operation initialOp on an indirect proxy.
2. The Ice run time checks an internal cache (called the locator cache) to determine whether a query has already been issued for the symbolic information in the proxy. If so, the cached endpoint is used and an invocation on the locator object is avoided. Otherwise, the Ice run time issues a locate request to the locator.
3. If the object is successfully located, the locator returns its current endpoints. The Ice run time in the client caches this information, establishes a connection to one of the endpoints according to the rules described in Section 37.3.1, and proceeds to send the invocation as usual.
4. If the object’s endpoints cannot be determined, the client receives an exception. NotRegisteredException is raised when an identity, object adapter identifier or replica group identifier is not known. A client may also receive NoEndpointException if the location service failed to determine the current endpoints.
As far as the Ice run time is concerned, the locator simply converts the information in an indirect proxy into usable endpoints. Whether the locator’s implementation is more sophisticated than a simple lookup table is irrelevant to the Ice run time. However, the act of performing this conversion may have additional semantics that the application must be prepared to accept.
For example, when using IceGrid as your location service, the target server may be launched automatically if it is not currently running, and the locate request does not complete until that server is started and ready to receive requests. As a result, the initial request on an indirect proxy may incur additional overhead as all of this activity occurs.

Replication

An indirect proxy may substitute a replica group identifier (see page 17) in place of the object adapter identifier. In fact, the Ice run time does not distinguish between these two cases and considers a replica group identifier as equivalent to an object adapter identifier for the purposes of resolving the proxy. The location service implementation must be able to distinguish between replica groups and object adapters using only this identifier.
The location service may return multiple endpoints in response to a locate request for an adapter or replica group identifier. These endpoints might all correspond to a single object adapter that is available at several addresses, or to multiple object adapters each listening at a single address, or some combination thereof. The Ice run time attaches no semantics to the collection of endpoints, but the application can make assumptions based on its knowledge of the location service’s behavior.
When a location service returns more than one endpoint, the Ice run time behaves exactly as if the proxy had contained several endpoints (see Section 37.3.1). As always, the goal of the Ice run time is to establish a connection to one of the endpoints and deliver the client’s request. By default, all requests made via the proxy that initiated the connection are sent to the same server until that connection is closed.
After the connection is closed, such as by active connection management (see Section 37.4), subsequent use of the proxy causes the Ice run time to obtain another connection. Whether that connection uses a different endpoint than previous connections depends on a number of factors, but it is possible for the client to connect to a different server than for previous requests.

Locator Cache

After successfully resolving an indirect proxy, the location service must return at least one endpoint. How the service derives the list of endpoints that corresponds to the proxy is entirely implementation dependent. For example, IceGrid’s location service can be configured to respond in a variety of ways; one possibility uses a simple round-robin scheme, while another considers the system load of the target hosts when selecting endpoints.
A locate request has the potential to significantly increase the latency of the application’s invocation with a proxy, and this is especially true if the locate request triggers additional implicit actions such as starting a new server process. Fortunately, this overhead is normally incurred only during the application’s initial invocation on the proxy, but this impact is influenced by the Ice run time’s caching behavior.
To minimize the number of locate requests, the Ice run time caches the results of previous requests. By default, the results are cached indefinitely, so that once the Ice run time has obtained the endpoints associated with an indirect proxy, it never issues another locate request for that proxy. Furthermore, the default behavior of a proxy is to cache its connection, that is, once a proxy has obtained a connection, it continues to use that connection indefinitely.
Taken together, these two caching characteristics represent the Ice run time’s best efforts to optimize an application’s use of a location service: after a proxy is associated with a connection, all future invocations on that proxy are sent on the same connection without any need for cache lookups, locate requests, or new connections.
If a proxy’s connection is closed, the next invocation on the proxy prompts the Ice run time to consult its locator cache to obtain the endpoints from the prior locate request. Next, the Ice run time searches for an existing connection to any of those endpoints and uses that if possible, otherwise it attempts to establish a new connection to each of the endpoints until one succeeds. Only if that process fails does the Ice run time clear the entry from its cache and issue a new locate request with the expectation that a usable endpoint is returned.
The Ice run time’s default behavior is optimized for applications that require minimal interaction with the location service, but some applications can benefit from more frequent locate requests. Normally this is desirable when implementing a load-balancing strategy, as we discuss in more detail below. In order to increase the frequency of locate requests, an application must configure a timeout for the locator cache and manipulate the connections of its proxies.

Locator Cache Timeout

An application can define a timeout to control the lifetime of entries in the locator cache. This timeout can be specified globally using the Ice.Default.LocatorCacheTimeout property (see Section C.8) and for individual proxies using the proxy method ice_locatorCacheTimeout (see Section 32.11.2). The Ice run time’s default behavior is equivalent to a timeout value of -1, meaning the cache entries never expire. Using a timeout value greater than zero causes the cache entries to expire after the specified number of seconds. Finally, a timeout value of zero disables the locator cache altogether.
The previous section explained the circumstances in which the Ice run time consults the locator cache. Briefly, this occurs only when the application has invoked an operation on a proxy and the proxy is not currently associated with a connection. If the timeout is set to zero, the Ice run time issues a new locate request immediately. Otherwise, for a non-zero timeout, the Ice run time examines the locator cache to determine whether the endpoints from the previous locate request have expired. If so, the Ice run time discards them and issues a new locate request.
Given this behavior, if your goal is to force a proxy invocation to issue locate requests more frequently, you can do so only when the proxy has no connection. You can accomplish that in several ways:
• create a new proxy, which is inherently not connected by default
• explicitly close the proxy’s existing connection (see Chapter 37)
• disabling the proxy’s connection caching behavior
Of these choices, the last is the most common.

Proxy Connection Caching

By default a proxy remembers its connection and uses it for all invocations until that connection is closed. You can prevent a proxy from caching its connection by calling the ice_connectionCached proxy method with an argument of false (see Section 32.11.2). Once connection caching is disabled, each invocation on a proxy causes the Ice run time to execute its connection establishment process.
Note that each invocation on such a proxy does not necessarily cause the Ice run time to establish a new connection. It only means that the Ice run time does not assume that it can reuse the connection of the proxy’s previous invocation. Whether the Ice run time actually needs to establish a new connection for the next invocation depends on several factors, as explained in Section 37.3.
As with any feature, you should only use it when the benefits outweigh the risks. With respect to a proxy’s connection caching behavior, there is certainly a small amount of computational overhead associated with executing the connection establishment process for each invocation, as well as the risk of significant overhead each time a new connection is actually created.

Simple Load Balancing

Several forms of load balancing are available to Ice applications. The simplest form uses only the endpoints contained in a direct proxy and does not require a location service. In this configuration, the application can configure the proxy to use the desired endpoint selection type (see Section 37.3.1) and connection caching behavior to achieve the desired results.
For example, suppose that a proxy contains several endpoints. In its default configuration, it uses the Random endpoint selection type and caches its connection. Upon the first invocation, the Ice run time selects one of the proxy’s endpoints at random and uses that connection for all subsequent invocations until the connection is closed. For some applications, this form of load balancing may be sufficient.
Suppose now that we use the Ordered endpoint selection type instead. In this case, the Ice run time always attempts to establish connections using the endpoints in the order they appear in the proxy. Normally an application uses this configuration when there is a preferred order to the servers. Again, once connected, the application uses whichever connection was chosen indefinitely.
By disabling the proxy’s connection caching behavior, the semantics undergo a significant change. Using the Random endpoint selection type, the Ice run time selects one of the endpoints at random and establishes a connection to it if one is not already established, and this process is repeated prior to each subsequent invocation. This is called per-request load balancing because each request can be directed to a different server. Using the Ordered endpoint selection type is not as common in this scenario; its main purpose would be to fall back on a secondary server if the primary server is not available, but it causes the Ice run time to attempt to contact the primary server during each request.

Load Balancing with a Location Service

A disadvantage of relying solely on the simple form of load balancing described in the previous section is that the client cannot make any intelligent decisions based on the status of the servers. If you want to distribute your requests in a more sophisticated way, you must either modify your clients to query the servers directly, or use a location service that can transparently direct a client to an appropriate server. For example, the IceGrid location service can monitor the system load on each server host and use that information when responding to locate requests.
The location service may return only one endpoint, which presumably represents the best server (at that moment) for the client to use. With only one endpoint available, changing the proxy’s endpoint selection type makes no difference. However, by disabling connection caching and modifying the locator cache timeout, the application can force the Ice run time to periodically retrieve an updated endpoint from the location service. For example, an application can set a locator cache timeout of thirty seconds and communicate with the selected server for that period. After the timeout has expired, the next invocation prompts the Ice run time to issue a new locate request, at which point the client might be directed to a different server.
If the location service returns multiple endpoints, the application must be designed with knowledge of how to interpret them. For instance, the location service may attach semantics to the order of the endpoints (such as least-loaded to most-loaded) and intend that the application use the endpoints in the order provided. Alternatively, the client may be free to select any of the endpoints. As a result, the application and the location service must cooperate to achieve the desired results.
You can combine the simple form of load balancing described in the previous section with an intelligent location service to gain even more flexibility. For example, suppose an application expects to receive multiple endpoints from the location service and has configured its proxy to disable connection caching and set a locator cache timeout. For each invocation, Ice run time selects one of the endpoints provided by the location service. When the timeout expires, the Ice run time issues a new locate request and obtains a fresh set of endpoints from which to choose.

32.18.3 Configuring a Client

An Ice client application must supply a proxy for the locator object, which it can do in several ways:
• by explicitly configuring an indirect proxy using the ice_locator proxy method (see Section 32.11.2)
• by calling setDefaultLocator on a communicator, after which all proxies use the given locator by default
• by defining the Ice.Default.Locator configuration property, which causes all proxies to use the given locator by default
The Ice run time’s efforts to resolve an indirect proxy can be traced by setting the following configuration properties:
Ice.Trace.Network=2
Ice.Trace.Protocol=1
Ice.Trace.Locator=2
See Appendix C for more information on these properties.

32.18.4 Server Semantics

A location service must know the endpoints of any object adapter whose identifier can be used in an indirect proxy. For example, suppose a client uses the following proxy:
Object1@PublicAdapter
The Ice run time in the client sends the identifier PublicAdapter to the locator, as described in Section 32.18.2, and expects to receive the associated endpoints. The only way the location service can know these endpoints is if it is given them. When you consider that an object adapter’s endpoints may not specify fixed ports, and therefore the endpoint addresses may change each time the object adapter is activated, it is clear that the best source of endpoint information is the object adapter itself. As a result, an object adapter that is properly configured (see Section 32.18.5) contacts the locator during activation to supply its identifier and current endpoints. More specifically, the object adapter registers itself with an object implementing the Ice::LocatorRegistry interface, whose proxy the object adapter obtains from the locator.

Registration Requirements

A location service may require that all object adapters be pre-registered via some implementation-specific mechanism. (IceGrid behaves this way by default.) This implies that activation can fail if the object adapter supplies an identifier that is unknown to the location service. In such a situation, the object adapter’s activate operation raises NotRegisteredException.
In a similar manner, an object adapter that participates in a replica group (see page 17) includes the group’s identifier in the locator request that is sent during activation. If the location service requires replica group members to be configured in advance, activate raises NotRegisteredException if the object adapter’s identifier is not one of the group’s registered participants (see Section 39.9.2).

32.18.5 Configuring a Server

An object adapter must be able to obtain a locator proxy in order to register itself with a location service. Each object adapter can be configured with its own locator proxy by defining its Locator property, as shown in the example below for the object adapter named SampleAdapter:
SampleAdapter.Locator=IceGrid/Locator:tcp ‑h locatorhost ‑p 10000
Alternatively, a server may call setLocator on the object adapter prior to activation. If the object adapter is not explicitly configured with a locator proxy, it uses the default locator as provided by its communicator (see Section 32.18.3).
Two other configuration properties influence an object adapter’s interactions with a location service during activation:
• AdapterId
Configuring a non-empty identifier for the AdapterId property causes the object adapter to register itself with the location service. A locator proxy must also be configured.
• ReplicaGroupId
Configuring a non-empty identifier for the ReplicaGroupId property indicates that the object adapter is a member of a replica group (see page 17). For this property to have an effect, AdapterId must also be configured with a non-empty value.
We can use these properties as shown below:
SampleAdapter.AdapterId=SampleAdapterId
SampleAdapter.ReplicaGroupId=SampleGroupId
SampleAdapter.Locator=IceGrid/Locator:tcp ‑h locatorhost ‑p 10000
Refer to Section 32.18.4 for information on the pre-registration requirements a location service may enforce.

32.18.6 Process Registration

An activation service, such as an IceGrid node (see Chapter 39), needs a reliable way to gracefully deactivate a server. One approach is to use a platform-specific mechanism, such as POSIX signals. This works well on POSIX platforms when the server is prepared to intercept signals and react appropriately (see Section 31.12). On Windows platforms, it works less reliably for C++ servers, and not at all for Java servers. For these reasons, Ice provides an alternative that is both portable and reliable:
module Ice {
interface Process {
    ["ami"] void shutdown();
    void writeMessage(string message, int fd);
};
};
The Slice interface Ice::Process allows an activation service to request a graceful shutdown of the server. When shutdown is invoked, the object implementing this interface is expected to initiate the termination of its server process. The activation service may expect the server to terminate within a certain period of time, after which it may terminate the server abruptly.
One of the benefits of the Ice administrative facility (see Section 32.19) is that it creates an implementation of Ice::Process and makes it available via an administrative object adapter. Furthermore, IceGrid automatically enables this facility on the servers that it activates.
Table of Contents Previous Next
Logo