Part V. Deployment And Virtualization

Table of Contents

Chapter 18. ProActive Basic Configuration
18.1. Overview
18.2. How does it work?
18.3. Where to access this file?
18.3.1. ProActive Default Configuration file
18.3.2. User-defined ProActive Configuration file
18.3.3. Alternate User Configuration file
18.4. ProActive properties
18.4.1. Required
18.4.2. Fault-tolerance properties
18.4.3. Peer-to-Peer properties
18.4.4. rmi ssh properties
18.4.5. Other properties
18.5. Configuration file example
Chapter 19. ProActive GCM Deployment
19.1. Introduction
19.2. ProActive Deployment API
19.2.1. Resources fixed by applications (SPMD)
19.2.2. Resources fixed by the deployer
19.2.3. On demand Scalability
19.3. GCM Deployment Descriptors
19.3.1. Host Information
19.3.2. Bridges
19.3.3. Groups
19.4. GCM Application descriptor
19.4.1. Executable
19.4.2. ProActive
19.5. FAQ
19.6. Tutorial
19.6.1. For the Grid Administrator : creating a deployment descriptor
19.6.2. For the Grid Application Developer : creating an application descriptor
19.6.3. For the Grid Application Developer : deploying your application on the grid
Chapter 20. XML Deployment Descriptors
20.1. Objectives
20.2. Principles
20.3. Different types of VirtualNodes
20.3.1. VirtualNodes Definition
20.3.2. VirtualNodes Acquisition
20.4. Different types of JVMs
20.4.1. Creation
20.4.2. Acquisition
20.5. Validation against XML Schema
20.6. Complete description and examples
20.7. Infrastructure and processes
20.7.1. Local JVMs
20.7.2. Remote JVMs
20.7.3. DependentListProcessDecorator
20.8. Infrastructure and services
20.9. How to terminate a ProActive application
20.9.1. Destroying active objects
20.9.2. Killing JVMs
20.10. Processes
Chapter 21. Variable Contracts for Descriptors
21.1. Variable Contracts for Descriptors
21.1.1. Principle
21.1.2. Variable Types
21.1.3. Variable Types User Guide
21.1.4. Variables Example
21.1.5. External Variable Definitions Files
21.1.6. Program Variable API
Chapter 22. ProActive File Transfer
22.1. Introduction and Concepts
22.2. File Transfer API
22.2.1. API Definition
22.2.2. How to use the API Example
22.3. Descriptor File Transfer
22.3.1. XML Descriptor File Transfer Tags
22.4. Advanced: FileTransfer Design
22.4.1. Abstract Definition (High level)
22.4.2. Concrete Definition (Low level)
22.4.3. How Deployment File Transfer Works
22.4.4. How File Transfer API Works
22.4.5. How Retrieve File Transfer Works
Chapter 23. Using SSH tunneling for RMI or HTTP communications
23.1. Overview
23.2. Configuration of the network
23.3. ProActive runtime communication patterns
23.4. ProActive application communication patterns.
23.5. ProActive communication protocols
23.6. The rmissh communication protocol.
Chapter 24. Technical Service
24.1. Context
24.2. Overview
24.3. Progamming Guide
24.3.1. A full XML Descriptor File
24.3.2. Nodes Properties
24.4. Further Information