Component Deployment: Second International Working by Marija Mikic-Rakic, Sam Malek, Nels Beckman, Nenad

By Marija Mikic-Rakic, Sam Malek, Nels Beckman, Nenad Medvidovic (auth.), Wolfgang Emmerich, Alexander L. Wolf (eds.)

This booklet constitutes the refereed lawsuits of the second one overseas operating convention on part Deployment, CD 2004, held in Edinburgh, united kingdom in may possibly 2004.

The sixteen revised complete papers offered have been conscientiously reviewed and chosen from 34 submissions. The papers tackle all proper matters on part deployment, as soon as a software program part has been constructed, specifically part customization, part structures configuration, part integration, part activation, part de-activation, and de-commissioning.

Show description

Read or Download Component Deployment: Second International Working Conference, CD 2004, Edinburgh, UK, May 20-21, 2004. Proceedings PDF

Similar computers books

Computer Vision – ACCV 2007: 8th Asian Conference on Computer Vision, Tokyo, Japan, November 18-22, 2007, Proceedings, Part II

The 2 quantity set LNCS 4843 and LNCS 4844 constitutes the refereed complaints of the eighth Asian convention on machine imaginative and prescient, ACCV 2007, held in Tokyo, Japan, in November 2007. The forty six revised complete papers, three planary and invited talks, and a hundred thirty revised poster papers of the 2 volumes have been rigorously reviewed and seleceted from 551 submissions.

Additional resources for Component Deployment: Second International Working Conference, CD 2004, Edinburgh, UK, May 20-21, 2004. Proceedings

Sample text

When this value fits again in the preferred range, the establishment of the Smaint service is again negotiated. Similarly, if any property of the involved profiles is invalidated during operation, a new negotiation can be initiated. In the worst case, when the Sadd (or Smaint) service is selected, and no configuration of replicas can fulfill the contract profiles, an out-of-service state is reached and the application is terminated. In the next section we discuss how the described configurations could be deployed using our framework.

509 certificates) and the Secure Sockets Layer (SSL) communication protocol. Globus users can initialize proxies, which are certificates signed by the user: proxies provide a convenient alternative to constantly entering passwords when submitting many jobs. The resource management module of the Globus Toolkit relies on GRAM (Globus Resource Allocation Manager) and GASS (Global Access to Secondary Storage). GRAM [18] supports remote job submission and control using GSI for mutual authentication of both users and remote resources: GRAM’s authorization mechanism is based on GSI identities and a mechanism to map GSI identities to local user accounts (see the grid-mapfile configuration file of the Globus Toolkit).

Here again, we see that we have a conversation-like operation mode, where the deployment client launches a process on a compute node, this process answers with an IOR, and this answer triggers another action on the deployment client’s side. The location of the name service would be completely up to the deployment tool, but a reasonable strategy would choose a compute node close to as many compute nodes hosting the application components as possible. 5 Configuration and Start of Execution The last phase of deployment consists in connecting together the components of an assembly and configuring the components.

Download PDF sample

Rated 4.83 of 5 – based on 17 votes