Prev
Part IV. Deploying
ProActive manual Table Of Contents
Next
Part IV. Deploying
Table of Contents
Chapter 20. ProActive Basic Configuration
20.1. Overview
20.2. How does it work?
20.3. Where to access this file?
20.4. ProActive properties
20.4.1. Required
20.4.2. Fault-tolerance properties
20.4.3. Peer-to-Peer properties
20.4.4. rmi ssh properties
20.4.5. Other properties
20.5. Configuration file example
Chapter 21. XML Deployment Descriptors
21.1. Objectives
21.2. Principles
21.3. Different types of VirtualNodes
21.3.1. VirtualNodes Definition
21.3.2. VirtualNodes Acquisition
21.4. Different types of JVMs
21.4.1. Creation
21.4.2. Acquisition
21.5. Validation against XML Schema
21.6. Complete description and examples
21.7. Infrastructure and processes
21.7.1. Local JVMs
21.7.2. Remote JVMs
21.7.3. DependentListProcessDecorator
21.8. Infrastructure and services
21.9. Killing the application
21.10. Processes
Chapter 22. Variable Contracts for Descriptors
22.1. Variable Contracts for Descriptors
22.1.1. Principle
22.1.2. Variable Types
22.1.3. Variable Types User Guide
22.1.4. Variables Example
22.1.5. External Variable Definitions Files
22.1.6. Program Variable API
Chapter 23. ProActive File Transfer Model
23.1. Introduction and Concepts
23.2. File Transfer API
23.2.1. API Definition
23.2.2. How to use the API
23.3. Descriptor File Transfer
23.3.1. XML Descriptor File Transfer Tags
23.4. Advanced: FileTransfer Design
23.4.1. Abstract Definition (High level)
23.4.2. Concrete Definition (Low level)
23.4.3. How Deployment File Transfer Works
23.4.4. How File Transfer API Works
23.4.5. How Retrieve File Transfer Works
Chapter 24. Using SSH tunneling for RMI or HTTP communications
24.1. Overview
24.2. Configuration of the network
24.3. ProActive runtime communication patterns
24.4. ProActive application communication patterns.
24.5. ProActive communication protocols
24.6. The rmissh communication protocol.
Chapter 25. Fault-Tolerance
25.1. Overview
25.1.1. Communication Induced Checkpointing (CIC)
25.1.2. Pessimistic message logging (PML)
25.2. Making a ProActive application fault-tolerant
25.2.1. Resource Server
25.2.2. Fault-Tolerance servers
25.2.3. Configure fault-tolerance for a ProActive application
25.2.4. A deployment descriptor example
25.3. Programming rules
25.3.1. Serializable
25.3.2. Standard Java main method
25.3.3. Checkpointing occurrence
25.3.4. Activity Determinism
25.3.5. Limitations
25.4. A complete example
25.4.1. Description
25.4.2. Running NBody example
Chapter 26. Technical Service
26.1. Context
26.2. Overview
26.3. Progamming Guide
26.3.1. A full XML Descriptor File
26.3.2. Nodes Properties
26.4. Further Information
Chapter 27. ProActive Grid Scheduler
27.1. The scheduler design:
27.2. The scheduler manual:
27.2.1. Job creation
27.2.2. Interaction with the scheduler
27.3. The Scheduler API
27.3.1. Classes
27.3.2. How to extend the scheduler
© 2001-2007
INRIA Sophia Antipolis
All Rights Reserved