Prev
Part VI. Advanced
ProActive manual Table Of Contents
Next
Part VI. Advanced
Table of Contents
Chapter 35. ProActive Peer-to-Peer Infrastructure
35.1. Overview
35.2. The P2P Infrastructure Model
35.2.1. What is Peer-to-Peer?
35.2.2. The P2P Infrastructure in short
35.3. The P2P Infrastructure Implementation
35.3.1. Peers Implementation
35.3.2. Dynamic Shared ProActive Group
35.3.3. Sharing Node Mechanism
35.3.4. Monitoring: IC2D
35.4. Installing and Using the P2P Infrastructure
35.4.1. Create your P2P Network
35.4.2. Example of Acquiring Nodes by ProActive XML Deployment Descriptors
35.4.3. The P2P Infrastructure API Usage Example
35.5. Future Work
35.6. Research Work
Chapter 36. Load Balancing
36.1. Overview
36.2. Metrics
36.2.1. MetricFactory and Metric classes
36.3. Using Load Balancing
36.3.1. In the application code
36.3.2. Technical Service
36.4. Non Migratable Objects
Chapter 37. ProActive Security Mechanism
37.1. Overview
37.2. Security Architecture
37.2.1. Base model
37.2.2. Security is expressed at different levels
37.3. Detailed Security Architecture
37.3.1. Nodes and Virtual Nodes
37.3.2. Hierarchical Security Entities
37.3.3. Resource provider security features
37.3.4. Interactions, Security Attributes
37.3.5. Combining Policies
37.3.6. Dynamic Policy Negotiation
37.3.7. Migration and Negotiation
37.4. Activating security mechanism
37.4.1. Construction of an XML policy:
37.5. How to quickly generate certificate?
Chapter 38. Exporting Active Objects and components as Web Services
38.1. Overview
38.2. Principles
38.3. Pre-requisite: Installing the Web Server and the SOAP engine
38.4. Steps to expose an active object or a component as a web services
38.5. Undeploy the services
38.6. Accessing the services
38.7. Limitations
38.8. A simple example: Hello World
38.8.1. Hello World web service code
38.8.2. Access with Visual Studio
38.9. C# interoperability: an example with C3D
38.9.1. Overview
38.9.2. Access with a C# client
38.9.3. Dispatcher methods calls and callbacks
38.9.4. Download the C# example
Chapter 39. ProActive on top of OSGi
39.1. Overview of OSGi -- Open Services Gateway initiative
39.2. ProActive bundle and service
39.3. Yet another Hello World
39.4. Current and Future works
Chapter 40. An extended ProActive JMX Connector
40.1. Overview of JMX - Java Management eXtention
40.2. Asynchronous ProActive JMX connector
40.3. How to use the connector ?
40.4. Notifications JMX via ProActive
40.5. Example : a simple textual JMX Console
Chapter 41. Wrapping MPI Legacy code
41.1. Simple Wrapping
41.1.1. Principles
41.1.2. API For Deploying MPI Codes
41.1.3. How to write an application with the XML and the API
41.1.4. Using the Infrastructure
41.1.5. Example with several codes
41.2. Wrapping with control
41.2.1. One Active Object per MPI process
41.2.2. MPI to ProActive Communications
41.2.3. ProActive to MPI Communications
41.2.4. MPI to MPI Communications through ProActive
41.2.5. USER STEPS - The Jacobi Relaxation example
41.3. Design and Implementation
41.3.1. Simple wrapping
41.4. Summary of the API
41.4.1. Simple Wrapping and Deployment of MPI Code
41.4.2. Wrapping with Control
© 2001-2007
INRIA Sophia Antipolis
All Rights Reserved