Part III. Deploying
Prev
Next
Deploying
Table of Contents
9. ProActive Basic Configuration
9.1. Overview
9.2. How does it work ?
9.3. Where to access this file ?
9.4. ProActive properties
9.5. Example
10. Variable Contracts for Descriptors
10.1. Variable Contracts for Descriptors
10.1.1. Principle
10.1.2. Variable Types
10.1.3. Variable Types User Guide
10.1.4. Variables Example
10.1.5. Variable Types User Guide
10.1.6. Variables Example
10.1.7. External Variable Definitions Files
10.1.8. Program Variable API
10.1.9. External Variable Definitions Files
10.1.10. Program Variable API
11. ProActive File Transfer Model
11.1. Introduction and Concepts
11.2. Objectives
11.2.1. Main objective
11.2.2. Specific Objectives
11.3. Supported Protocols
11.4. FileTransfer Design
11.4.1. Abstract Definition
11.4.2. Concrete Definition
11.4.3. How it works
11.5. Descriptor FileTransfer XML Tags
12. Using SSH tunneling for RMI or HTTP communications
12.1. Overview
12.2. Configuration of the network
12.3. ProActive runtime communication patterns
12.4. ProActive application communication patterns.
12.5. ProActive communication protocols
12.6. The rmissh communication protocol.
13. Fault-Tolerance
13.1. Overview
13.1.1. Communication Induced Checkpointing (CIC)
13.1.2. Pessimistic message logging (PML)
13.2. Making a ProActive application fault-tolerant
13.2.1. Resource Server
13.2.2. Fault-Tolerance servers
13.2.3. Configure fault-tolerance for a ProActive application
13.2.4. A deployment descriptor example
13.3. Programming rules
13.3.1. Serializable
13.3.2. Standard Java main method
13.3.3. Checkpointing occurrence
13.3.4. Activity Determinism
13.3.5. Limitations
13.4. A complete example
13.4.1. Description
13.4.2. Running NBody example
© 2001-2005
INRIA Sophia Antipolis
All Rights Reserved