Part V. Deployment And Virtualization

Table of Contents

Chapter 17. ProActive Basic Configuration
17.1. Overview
17.2. How does it work?
17.3. Where to access this file?
17.3.1. ProActive Default Configuration file
17.3.2. User-defined ProActive Configuration file
17.3.3. Alternate User Configuration file
17.4. ProActive properties
17.4.1. Required
17.4.2. Fault-tolerance properties
17.4.3. Peer-to-Peer properties
17.4.4. rmi ssh properties
17.4.5. Other properties
17.5. Configuration file example
Chapter 18. ProActive Grid Component Model Deployment
18.1. Introduction
18.2. ProActive Deployment API
18.2.1. Resources fixed by the application (SPMD)
18.2.2. Resources fixed by the application deployer
18.2.3. On demand Scalability
18.3. GCM Deployment Descriptors
18.3.1. Host Information
18.3.2. Bridges
18.3.3. Groups
18.4. GCM Application descriptor
18.4.1. Executable
18.4.2. ProActive
18.5. FAQ
18.6. Tutorial
18.6.1. For the Grid Administrator : creating a deployment descriptor
18.6.2. For the Grid Application Developer : creating an application descriptor
18.6.3. For the Grid Application Developer : deploying your application on the grid
Chapter 19. XML Deployment Descriptors
19.1. Objectives
19.2. Principles
19.3. Different types of VirtualNodes
19.3.1. VirtualNodes Definition
19.3.2. VirtualNodes Acquisition
19.4. Different types of JVMs
19.4.1. Creation
19.4.2. Acquisition
19.5. Validation against XML Schema
19.6. Complete description and examples
19.7. Infrastructure and processes
19.7.1. Local JVMs
19.7.2. Remote JVMs
19.7.3. DependentListProcessDecorator
19.8. Infrastructure and services
19.9. How to terminate a ProActive application
19.9.1. Destroying active objects
19.9.2. Killing JVMs
19.10. Processes
Chapter 20. Variable Contracts for Descriptors
20.1. Variable Contracts for Descriptors
20.1.1. Principle
20.1.2. Variable Types
20.1.3. Variable Types User Guide
20.1.4. Variables Example
20.1.5. External Variable Definitions Files
20.1.6. Program Variable API
Chapter 21. ProActive File Transfer
21.1. Introduction and Concepts
21.2. File Transfer API
21.2.1. API Definition
21.2.2. How to use the API Example
21.3. Descriptor File Transfer
21.3.1. XML Descriptor File Transfer Tags
21.4. Advanced: FileTransfer Design
21.4.1. Abstract Definition (High level)
21.4.2. Concrete Definition (Low level)
21.4.3. How Deployment File Transfer Works
21.4.4. How File Transfer API Works
21.4.5. How Retrieve File Transfer Works
Chapter 22. Using SSH tunneling for RMI or HTTP communications
22.1. Overview
22.2. Configuration of the network
22.3. ProActive runtime communication patterns
22.4. ProActive application communication patterns.
22.5. ProActive communication protocols
22.6. The rmissh communication protocol.
Chapter 23. Technical Service
23.1. Context
23.2. Overview
23.3. Progamming Guide
23.3.1. A full XML Descriptor File
23.3.2. Nodes Properties
23.4. Further Information