Configuring highly available clusters using HACMP 4.5 [[electronic resource] /] / [Adrian Demeter ... et al.] |
Autore | Demeter Adrian |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | San Jose, CA, : IBM, International Technical Support Organization, 2002 |
Descrizione fisica | 1 online resource (308 p.) |
Disciplina | 004/.35 |
Altri autori (Persone) | DemeterAdrian |
Collana | IBM redbooks |
Soggetto topico |
Parallel computers
Beowulf clusters (Computer systems) IBM software |
Soggetto genere / forma | Electronic books. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910449981503321 |
Demeter Adrian | ||
San Jose, CA, : IBM, International Technical Support Organization, 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Configuring highly available clusters using HACMP 4.5 [[electronic resource] /] / [Adrian Demeter ... et al.] |
Autore | Demeter Adrian |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | San Jose, CA, : IBM, International Technical Support Organization, 2002 |
Descrizione fisica | 1 online resource (308 p.) |
Disciplina | 004/.35 |
Altri autori (Persone) | DemeterAdrian |
Collana | IBM redbooks |
Soggetto topico |
Parallel computers
Beowulf clusters (Computer systems) IBM software |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910783397603321 |
Demeter Adrian | ||
San Jose, CA, : IBM, International Technical Support Organization, 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Configuring highly available clusters using HACMP 4.5 / / [Adrian Demeter ... et al.] |
Autore | Demeter Adrian |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | San Jose, CA, : IBM, International Technical Support Organization, 2002 |
Descrizione fisica | 1 online resource (308 p.) |
Disciplina | 004/.35 |
Altri autori (Persone) | DemeterAdrian |
Collana | IBM redbooks |
Soggetto topico |
Parallel computers
Beowulf clusters (Computer systems) IBM software |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover -- Contents -- Figures -- Tables -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Summary of changes -- October 2002, Second Edition -- Chapter 1. HACMP 4.5 overview -- 1.1 Introduction to HACMP -- 1.2 Requirements and prerequisites -- 1.2.1 Supported hardware -- 1.2.2 Required software levels -- 1.3 New features and functions -- 1.3.1 Usability enhancements -- 1.3.2 Administrative enhancements -- 1.3.3 Network enhancements -- 1.3.4 Device support -- 1.3.5 Application support -- 1.4 Installation and migration considerations -- Chapter 2. Configuring highly available p690 clusters -- 2.1 LPAR -- 2.2 Hardware Management Console (HMC) -- 2.3 Planning considerations -- 2.3.1 System configuration -- 2.3.2 HMC high availability -- 2.3.3 Network -- 2.3.4 Storage -- 2.3.5 Software -- 2.4 Clustering with HACMP -- 2.4.1 Lab environment -- 2.4.2 System configuration -- 2.4.3 Preparing the cluster for high availability -- 2.4.4 Define the LPARs configuration on both p690s -- 2.4.5 Configure the nodes -- 2.4.6 Installing HACMP -- 2.4.7 Scenario 1: Cluster with 2 Ethernet and SSA storage -- 2.4.8 Scenario 2: Using SP Switch/SP Switch2 adapter -- 2.4.9 Scenario 3: Dual SP Switch2 network -- 2.4.10 Scenario 4: IP Aliasing -- 2.4.11 Scenario 5: Integrating ESS storage into HACMP -- Chapter 3. HACWS: An HACMP Application for Cluster 1600 -- 3.1 HACWS -- 3.2 Definitions -- 3.3 Requirements -- 3.3.1 Hardware requirements -- 3.3.2 Software requirements -- 3.4 Operation of HACWS -- 3.4.1 Components of HACWS -- Rotating resource group - hacws_group1 -- The hacws_apps application server -- Custom cluster events -- 3.4.2 Planning the HACMP configuration -- Planning networks -- The /spdata file system -- 3.4.3 Requirements imposed on the logical definitions -- Network design.
HACMP startup design -- 3.5 Configurations used in this document -- 3.5.1 SP frame only with no standby adapters on the CWS -- 3.5.2 SP frame only with standby adapters on the primary CWS -- 3.5.3 SP Frame and p690 with the CWS and HMC on same SPLAN -- 3.5.4 CWS and HMC on a private network other than SPLAN -- 3.5.5 CWS and HMC on a private network with standby adapters -- 3.5.6 IP labels and networks -- 3.6 Installing and configuring HACWS -- 3.6.1 Preparation -- Install the SP system -- Install AIX on the backup control workstation -- Configure shared storage -- Configure RS-232 control lines -- Configure non-IP network -- 3.6.2 Configuration of the backup control workstation -- Install PSSP on the backup control workstation -- Tune parameters on the backup control workstation -- Configure authentication on the backup control workstation -- 3.6.3 Kerberos configuration on the backup control workstation -- Add the boot address(es) of the primary control workstation -- Add the Kerberos Version 4 rcmd service(s) key -- Configure the secondary authentication server -- Copy the Kerberos Version 4 keys to the backup CWS -- Verify the Kerberos Version 4 database -- 3.6.4 Install HACMP/ES on both control workstations -- 3.6.5 Install HACWS -- 3.6.6 Configure HACWS -- Stop the SP services on the primary CWS -- Configure boot adapters on boot IP labels -- Configure shared storage -- Additional administrative steps -- 3.6.7 Configure HACMP topology -- Define the cluster ID and name -- Define the nodes to HACMP -- Define the adapters to HACMP -- Boot IP labels -- Standby IP labels (optional) -- Discover network topology -- Service IP labels -- Persistent IP label (optional) -- Check the subnet -- Synchronize the cluster topology -- Configure the non-IP network -- Add adapters for the serial network -- Avoiding false adapter failures. Configure HACWS application server -- Configure HACWS resource group -- Synchronize cluster resources -- 3.6.8 Set up the HACWS configuration -- Make control workstations addressable by their host name -- Install and configure HACWS -- Customize cluster event processing -- Add IP Alias -- 3.6.9 Verify HACWS and hardware configuration -- 3.6.10 Reboot primary and start cluster services -- 3.6.11 Verify operation of the primary control workstation -- 3.6.12 Start the backup control workstation -- 3.6.13 Starting of cluster services on the primary workstation -- 3.6.14 Backups -- 3.6.15 Testing HACWS -- Testing failover and the operation of the backup CWS -- Testing adapter failure (optional) -- Testing failure of the private network for CWS and HMC -- 3.7 Considerations -- Configuration changes -- Chapter 4. HAGEO integration with HACMP cluster -- 4.1 HAGEO integration with HACMP -- 4.1.1 History -- 4.2 Planning -- 4.2.1 Hardware requirements -- 4.2.2 Software requirements -- 4.2.3 Configuration examples -- 4.3 New features of HAGEO 2.4 -- 4.3.1 Integration with HACMP -- 4.3.2 TCP option for remote mirroring -- 4.3.3 Selection of temporal ordering policies -- 4.3.4 Support for 64-bit kernel environment -- 4.4 Clustering with HAGEO -- 4.4.1 Configure geographic topology -- 4.4.2 Configure GeoMirror devices -- 4.4.3 Managing the Geo Cluster -- 4.4.4 Performance considerations -- 4.4.5 Migration considerations -- 4.4.6 Troubleshooting -- 4.4.7 Maintenance considerations -- Abbreviations and acronyms -- Related publications -- IBM Redbooks -- Other resources -- Referenced Web sites -- How to get IBM Redbooks -- IBM Redbooks collections -- Index -- Back cover. |
Record Nr. | UNINA-9910810046803321 |
Demeter Adrian | ||
San Jose, CA, : IBM, International Technical Support Organization, 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Creating and deploying solutions with IBM Integrated Runtime V1.1 [[electronic resource] /] / Shih-in Bick ... [et al.] |
Autore | Bick Shih-in |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Rochester, MN, : IBM, c2004 |
Descrizione fisica | xiv, 326 p. : ill |
Collana | Redbooks |
Soggetto topico |
IBM software
Application software - Development Middleware |
Soggetto genere / forma | Electronic books. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910450136703321 |
Bick Shih-in | ||
Rochester, MN, : IBM, c2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Creating and deploying solutions with IBM Integrated Runtime V1.1 [[electronic resource] /] / Shih-in Bick ... [et al.] |
Autore | Bick Shih-in |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Rochester, MN, : IBM, c2004 |
Descrizione fisica | xiv, 326 p. : ill |
Disciplina | 005.3 |
Collana | Redbooks |
Soggetto topico |
IBM software
Application software - Development Middleware |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910783524903321 |
Bick Shih-in | ||
Rochester, MN, : IBM, c2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Creating and deploying solutions with IBM Integrated Runtime V1.1 / / Shih-in Bick ... [et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Rochester, MN, : IBM, c2004 |
Descrizione fisica | xiv, 326 p. : ill |
Disciplina | 005.3 |
Collana | Redbooks |
Soggetto topico |
IBM software
Application software - Development Middleware |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team who wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Integrated Runtime V1.1 -- Chapter 1. Why and how to use Integrated Runtime V1.1 -- 1.1 Benefits of Integrated Runtime -- 1.2 An overview of the Integrated Runtime components -- 1.2.1 Solution Developer -- 1.2.2 Solution Deployer -- 1.2.3 Installation Agent -- 1.3 Integrated Runtime development and deployment process -- 1.3.1 The development process -- 1.3.2 The deployment process -- Chapter 2. Deploying HelloWorld on Windows and Linux -- 2.1 Preparing for solution deployment -- 2.1.1 Creating the HelloWorld application -- 2.1.2 Creating the HelloWorld application component -- 2.1.3 Creating the HelloWorld solution -- 2.1.4 Exporting the HelloWorld solution -- 2.2 Deploying the solution to localhost -- 2.3 Running and verifying the HelloWorld application -- 2.4 Troubleshooting -- 2.5 Summary -- Chapter 3. Information roadmap -- 3.1 Organization -- 3.2 Learning aids -- 3.2.1 Examples -- 3.2.2 Quizzes -- 3.2.3 Separate treatment of Windows and Linux -- 3.3 Audience -- Part 2 Using Integrated Runtime V1.1 to create and deploy solutions: Windows -- Chapter 4. Introducing the Document Management sample on Windows -- 4.1 Assumptions -- 4.1.1 Installation type -- 4.1.2 Referencing directory paths -- 4.1.3 Navigator view in Solution Developer -- 4.1.4 Application and solution project wrapper naming conventions -- 4.2 Preliminary tasks -- 4.2.1 Rename files -- 4.2.2 Download the runtimedoc.zip file -- 4.3 Location of directories and files -- 4.3.1 Installation directory -- 4.3.2 Location of projects -- 4.3.3 Location of exported .ser and .jar files for the projects -- 4.3.4 Location of .ser and .jar files after package creation -- 4.3.5 Log files for projects.
4.4 Overview of the RuntimeDocumentMgmt Web application -- 4.4.1 The projects for the sample -- 4.5 Testing your knowledge -- Chapter 5. Solution Developer -- 5.1 Solution Developer plug-in -- 5.2 The solution project -- 5.3 Translation files -- 5.4 The sample application project -- 5.5 Testing your knowledge -- Chapter 6. Deciphering the applicationdef.axml file in Windows -- 6.1 Understanding the applicationdef.axml file -- 6.1.1 Part 1 of the applicationdef.axml file -- 6.1.2 Part 2 of the applicationdef.axml file -- 6.1.3 Part 3 of the applicationdef.axml file -- 6.1.4 Part 4 of the applicationdef.axml file -- 6.1.5 Part 5 of the applicationdef.axml file -- 6.1.6 Part 6 of the applicationdef.axml file -- 6.1.7 Part 7 of the applicationdef.axml file -- 6.1.8 Part 8 of the applicationdef.axml file -- 6.1.9 Part 9 of the applicationdef.axml file -- 6.1.10 Part 10 of the applicationdef.axml file -- 6.1.11 Part 11 of the applicationdef.axml file -- 6.1.12 Part 12 of the applicationdef.axml file -- 6.1.13 Part 13 of the applicationdef.axml file -- 6.1.14 Part 14 of the applicationdef.axml file -- 6.2 Specifying the software image root for a project -- 6.2.1 Setting the software image root -- 6.2.2 Sample: includeAllFilesInSoftwareImageRoot="true -- 6.3 Testing your knowledge -- Chapter 7. Deciphering the solution.sxml file in Windows -- 7.1 Location of the solution.sxml file -- 7.2 Understanding the solution.sxml file -- 7.2.1 Part 1 of the solution.sxml file -- 7.2.2 Part 2 of the solution.sxml file -- 7.2.3 Part 3 of the solution.sxml file -- 7.2.4 Part 4 of the solution.sxml file -- 7.2.5 Part 5 of the solution.sxml file -- 7.3 Testing your knowledge -- Chapter 8. The IRU_SampleWin user programs in Windows -- 8.1 Understanding the user programs -- 8.1.1 The SampleWinVC.java program -- 8.1.2 The SampleWinMain.java program. 8.1.3 The SampleWinExit.java program -- 8.1.4 The NLSKeys.java program -- 8.2 Additional media files that are part of the solution -- 8.3 Testing your knowledge -- Chapter 9. Building and exporting the solution in Windows -- 9.1 Building the projects -- 9.2 Exporting the solution to Solution Deployer -- 9.3 Testing your knowledge -- Chapter 10. Creating the solution package on Windows -- 10.1 Creating the package -- 10.2 Testing your knowledge -- Chapter 11. Deploying the sample locally on Windows -- 11.1 Deploying the sample locally -- 11.2 Testing your knowledge -- Chapter 12. Deploying a solution across a network to Windows -- 12.1 Using Key Manager for a secure network connection -- 12.1.1 Setting the security string -- 12.2 Configuring the network address -- 12.3 Deploying the solution -- 12.4 Testing your knowledge -- Chapter 13. Deploying a solution from a CD on Windows -- 13.1 Solution Deployer Launcher -- 13.1.1 The DJT_setup.exe and DJT_setup.iss files -- 13.1.2 Directories needed on the CD -- 13.2 Creating an installable CD for the solution -- 13.3 Running Solution Deployer from the CD -- 13.4 Testing your knowledge -- Chapter 14. Testing the RuntimeDocumentMgmt Application on Windows -- 14.1 Testing the RuntimeDocumentMgmt application -- 14.2 About the Document Management authorities -- 14.3 Testing your knowledge -- Chapter 15. Troubleshooting Integrated Runtime on Windows -- 15.1 Fix packs for Integrated Runtime -- 15.2 Log files for projects -- 15.3 Integrated Runtime install -- 15.3.1 Checklist if Integrated Runtime install fails -- 15.3.2 Manual cleanup of Integrated Runtime if uninstall fails -- 15.4 Solution development -- 15.5 Solution deployment -- 15.5.1 Four types of log files created during deployment -- 15.6 Known issues -- 15.6.1 Specific Windows known issues -- 15.6.2 Other known issues -- 15.7 Tips, tricks, and traps. Chapter 16. Cleaning up the development system on Windows -- 16.1 Cleaning up the development system -- 16.2 Summary -- Part 3 Using Integrated Runtime V1.1 to create and deploy solutions: Linux -- Chapter 17. Introducing the Document Management sample application on Linux -- 17.1 Assumptions -- 17.1.1 Installation type -- 17.1.2 Referencing directory paths -- 17.1.3 Navigator view in Solution Developer -- 17.1.4 Application and Solution project wrapper naming conventions -- 17.2 Preliminary tasks -- 17.2.1 Rename files -- 17.2.2 Download the runtimedoc.zip file -- 17.3 Location of directories and files -- 17.3.1 Installation directory -- 17.3.2 Location of projects -- 17.3.3 Location of exported .ser and .jar files for the projects -- 17.3.4 Location of .ser and .jar files after package creation -- 17.3.5 Log files for projects -- 17.4 Overview of the RuntimeDocumentMgmt Web application -- 17.4.1 The projects for the sample -- 17.5 Testing your knowledge -- Chapter 18. Solution Developer -- 18.1 Solution Developer plug-in -- 18.2 The solution project -- 18.3 Translation files -- 18.4 The sample application project -- 18.5 Testing your knowledge -- Chapter 19. Deciphering the applicationdef.axml file in Linux -- 19.1 Understanding applicationdef.axml -- 19.1.1 Part 1 of the applicationdef.axml file -- 19.1.2 Part 2 of the applicationdef.axml file -- 19.1.3 Part 3 of the applicationdef.axml file -- 19.1.4 Part 4 of the applicationdef.axml file -- 19.1.5 Part 5 of the applicationdef.axml file -- 19.1.6 Part 6 of the applicationdef.axml file -- 19.1.7 Part 7 of the applicationdef.axml file -- 19.1.8 Part 8 of the applicationdef.axml file -- 19.1.9 Part 9 of the applicationdef.axml file -- 19.1.10 Part 10 of the applicationdef.axml file -- 19.1.11 Part 11 of the applicationdef.axml file -- 19.1.12 Part 12 of the applicationdef.axml file. 19.1.13 Part 13 of the applicationdef.axml file -- 19.1.14 Part 14 of the applicationdef.axml file -- 19.1.15 Part 15 of the applicationdef.axml file -- 19.1.16 Part 16 of the applicationdef.axml file -- 19.2 Specifying software image root for a project -- 19.2.1 Setting the software image root -- 19.2.2 Sample: includeAllFilesInSoftwareImageRoot="true -- 19.2.3 Testing your knowledge -- Chapter 20. Deciphering the solution.sxml file in Linux -- 20.1 Location of the solution.sxml file -- 20.2 Understanding the solution.sxml file -- 20.2.1 Part 1 of the solution.sxml file -- 20.2.2 Part 2 of the solution.sxml file -- 20.2.3 Part 3 of the solution.sxml file -- 20.2.4 Part 4 of the solution.sxml file -- 20.2.5 Part 5 of the solution.sxml file -- 20.3 Testing your knowledge -- Chapter 21. The IRU_SampleLnx user programs in Linux -- 21.1 Understanding the user programs -- 21.1.1 The SampleLnxVC.java program -- 21.1.2 The SampleLnxMain.java program -- 21.1.3 The SampleLnxExit.java program -- 21.1.4 The NLSKeys.java program -- 21.2 Sample scripts -- 21.3 Additional media files that are part of the sample solution -- 21.4 Testing your knowledge -- Chapter 22. Building and exporting the solution in Linux -- 22.1 Building the projects -- 22.2 Exporting the solution to Solution Deployer -- 22.3 Testing your knowledge -- Chapter 23. Creating the solution package on Linux -- 23.1 Creating the package -- 23.2 Testing your knowledge -- Chapter 24. Deploying the sample locally on Linux -- 24.1 Deploying the sample locally -- 24.2 Testing your knowledge -- Chapter 25. Deploying a solution across a network to Linux -- 25.1 Using Key Manager for a secure network connection -- 25.1.1 Setting the security string -- 25.2 Configuring the network address -- 25.3 Deploying the solution -- 25.4 Testing your knowledge -- Chapter 26. Deploying a solution from a CD on Linux. 26.1 Solution Deployer Launcher. |
Record Nr. | UNINA-9910824230103321 |
Rochester, MN, : IBM, c2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
DCE replacement strategies [[electronic resource] /] / [Heinz Johner ... et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | [S.l.], : IBM, International Technical Support Organization, c2003 |
Descrizione fisica | xxii, 432 p. : ill |
Disciplina | 005.1 |
Altri autori (Persone) | JohnerHeinz |
Collana | IBM redbooks |
Soggetto topico |
Electronic data processing - Distributed processing
Application software - Development IBM software |
Soggetto genere / forma | Electronic books. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910450155403321 |
[S.l.], : IBM, International Technical Support Organization, c2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
DCE replacement strategies [[electronic resource] /] / [Heinz Johner ... et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | [S.l.], : IBM, International Technical Support Organization, c2003 |
Descrizione fisica | xxii, 432 p. : ill |
Disciplina | 005.1 |
Altri autori (Persone) | JohnerHeinz |
Collana | IBM redbooks |
Soggetto topico |
Electronic data processing - Distributed processing
Application software - Development IBM software |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910783527003321 |
[S.l.], : IBM, International Technical Support Organization, c2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
DCE replacement strategies / / [Heinz Johner ... et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | [S.l.], : IBM, International Technical Support Organization, c2003 |
Descrizione fisica | xxii, 432 p. : ill |
Disciplina | 005.1 |
Altri autori (Persone) | JohnerHeinz |
Collana | IBM redbooks |
Soggetto topico |
Electronic data processing - Distributed processing
Application software - Development IBM software |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover -- Contents -- Tables -- Figures -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Description of the DCE replacement strategies -- Chapter 1. DCE review -- 1.1 Defining DCE -- 1.2 Who uses DCE -- 1.3 What DCE does -- 1.3.1 Threads -- 1.3.2 RPC -- 1.3.3 Security core -- 1.3.4 GSS-API -- 1.3.5 Directory -- 1.3.6 Time -- 1.3.7 Cross component -- 1.4 The DCE environment -- 1.5 Application dependencies on DCE -- 1.5.1 Direct dependencies -- 1.5.2 Indirect dependencies -- 1.5.3 No dependencies -- 1.6 Summary of DCE review -- Chapter 2. Replacement technologies -- 2.1 Criteria for selecting the technologies -- 2.1.1 Compliance with industry standards -- 2.1.2 Coverage of predominant DCE services -- 2.1.3 Ease of migration -- 2.1.4 Similarity to DCE services -- 2.1.5 Technologies considered strategic -- 2.1.6 Support of predominant platforms -- 2.1.7 Support of predominant programming languages -- 2.1.8 Availability of IBM implementations -- 2.2 Technologies for C/C++ applications -- 2.2.1 aznAPI -- 2.2.2 CORBA -- 2.2.3 DCE RPC -- 2.2.4 DCE UUID -- 2.2.5 Kerberos -- 2.2.6 LDAP -- 2.2.7 Network Time Protocol -- 2.2.8 Platform auditing -- 2.2.9 Platform logging and messaging -- 2.2.10 POSIX 1003.1c threads -- 2.2.11 Web services -- 2.3 Technologies for Java applications -- 2.3.1 J2EE application environment -- 2.3.2 Standards for the J2EE -- 2.3.3 DCE services that can be replaced by J2EE -- 2.3.4 IBM implementation of J2EE: WebSphere Application Server -- 2.3.5 Additional information on IBM WebSphere Application Server -- 2.4 Summary -- Chapter 3. Replacement strategies -- 3.1 Replacement strategies for C/C++ applications -- 3.1.1 Auditing -- 3.1.2 Authentication -- 3.1.3 Authorization, PAC, and UUID -- 3.1.4 Backing store -- 3.1.5 Configuration.
3.1.6 Delegation, GSS-API, and login -- 3.1.7 Directory -- 3.1.8 Extended Registry Attributes -- 3.1.9 Event management -- 3.1.10 GSS-API -- 3.1.11 Host management -- 3.1.12 Integrated login -- 3.1.13 Login -- 3.1.14 Messaging -- 3.1.15 PAC -- 3.1.16 Password strength -- 3.1.17 Protection -- 3.1.18 Registry -- 3.1.19 RPC services -- 3.1.20 Serviceability -- 3.1.21 Threads -- 3.1.22 Time -- 3.1.23 UUID -- 3.2 Replacement strategy for Java applications -- 3.2.1 Determining a new architecture -- 3.2.2 Revising the application environment for the new architecture -- 3.2.3 Rewriting the DCE applications to the new architecture -- 3.3 Replacement strategies for mixed applications -- 3.3.1 CORBA interoperability -- 3.3.2 Java Native Interface -- 3.3.3 JCA and JNI -- Chapter 4. Using DCE data with IBM Network Authentication Service -- 4.1 Introduction -- 4.2 Migrating DCE data to an LDAP directory -- 4.3 Configuring IBM Network Authentication Service -- 4.4 Managing the data in a shared environment -- 4.5 Removing DCE-specific data -- 4.6 Details about shared data -- 4.7 Details about non-shared data -- Chapter 5. Using DCE objects with IBM Tivoli Access Manager -- 5.1 Introduction -- 5.2 Data representation -- 5.3 Configuration scenarios -- 5.3.1 Scenario 1 -- 5.3.2 Scenario 2 -- 5.3.3 Scenario 3 -- 5.4 Managing objects in a shared environment -- 5.4.1 Creating a user with IBM Tivoli Access Manager -- 5.4.2 Creating a group with IBM Tivoli Access Manager -- 5.4.3 Adding a member to a group using IBM Tivoli Access Manager -- 5.4.4 Deleting a user using IBM Tivoli Access Manager -- 5.4.5 Deleting a group using IBM Tivoli Access Manager -- 5.4.6 Removing a member from an IBM Tivoli Access Manager group -- 5.4.7 Creating a principal with DCE -- 5.4.8 Creating a DCE group -- 5.4.9 Adding a member to a group using DCE -- 5.4.10 Deleting a user using DCE. 5.4.11 Deleting a group using DCE commands -- 5.4.12 Removing a member from a group with DCE commands -- 5.4.13 Sharing policies -- 5.4.14 Attaching a DCE policy -- 5.4.15 Deleting a shared DCE policy -- Chapter 6. Binary structure of DCE ERA data in LDAP -- 6.1 Recap: The DCE to LDAP migration process -- 6.2 Reading binary DCE ERA data in LDAP -- Part 2 Replacement sample scenarios -- Chapter 7. Common replacement considerations -- 7.1 How to read the example scenarios -- 7.2 Common assumptions in the sample scenarios -- 7.3 Simplifications in the sample scenarios -- 7.4 Security considerations -- 7.5 Performance considerations -- 7.6 Using an LDAP directory -- 7.6.1 LDAP security considerations -- 7.6.2 Availability and performance considerations -- 7.7 SSL implementation hints -- 7.7.1 SSL and TLS overview -- 7.7.2 Uses of SSL -- 7.7.3 Using SSL in the replacement scenarios -- 7.7.4 IBM GSKit -- 7.7.5 Authentication with certificates -- 7.7.6 Using self-signed certificates -- 7.7.7 Using certificates from a Certificate Authority (CA) -- 7.7.8 Additional hints and considerations -- Chapter 8. Scenario 1: GSS-API application -- 8.1 Scenario description -- 8.1.1 Initial application with DCE dependencies -- 8.1.2 Revised application without DCE dependencies -- 8.2 DCE application -- 8.2.1 Configuring and running the DCE application -- 8.2.2 Application client -- 8.2.3 Application server -- 8.3 Replacement roadmap -- 8.3.1 Software requirements -- 8.3.2 Migration of DCE security registry to IBM Directory Server -- 8.3.3 Configuring IBM Network Authentication Service -- 8.3.4 Configuring IBM Tivoli Access Manager -- 8.3.5 Configuring the Windows Kerberos client -- 8.3.6 Revising the application -- 8.3.7 Cleaning up the DCE related information in the IBM Directory -- 8.4 Revised application discussion. 8.4.1 Configuring and running the revised application -- 8.4.2 Application client -- 8.4.3 Application server -- 8.5 Administration considerations and interfaces -- 8.5.1 Administration during the migration process -- 8.5.2 Administration after the migration process -- 8.5.3 IBM Network Authentication Service administration interface -- 8.5.4 IBM Tivoli Access Manager administration interface -- 8.6 Discussion and conclusions -- Chapter 9. Scenario 2: Non-secure RPC application -- 9.1 Scenario description -- 9.1.1 Initial application with DCE dependencies -- 9.1.2 Revised application without DCE dependencies -- 9.2 DCE application -- 9.2.1 Configuring and running the DCE application -- 9.2.2 Application client -- 9.2.3 Application server -- 9.3 Replacement roadmap -- 9.3.1 Software requirements -- 9.3.2 Installing and configuring WebSphere Application Server -- 9.3.3 Revising the application -- 9.3.4 Removing DCE -- 9.4 Revised application discussion -- 9.4.1 Building, configuring, and running the revised application -- 9.4.2 CORBA IDL file -- 9.4.3 Application client -- 9.4.4 Application server -- 9.5 Administration considerations and interfaces -- 9.6 Discussion and conclusions -- Chapter 10. Scenario 3: Secure RPC application #1 -- 10.1 Scenario description -- 10.1.1 Initial application with DCE dependencies -- 10.1.2 Revised application without DCE dependencies -- 10.2 DCE application -- 10.2.1 Configuring and running the DCE application -- 10.2.2 Application interface definition -- 10.2.3 Application client -- 10.2.4 Application server -- 10.3 Replacement roadmap -- 10.3.1 Software requirements -- 10.3.2 Installing and configuring IBM WebSphere Application Server -- 10.3.3 Configuring WebSphere Application Server security -- 10.3.4 Configuring the application client -- 10.3.5 Developing the application -- 10.3.6 Configuring IBM Directory Server. 10.3.7 Assembling the scenario application -- 10.3.8 Deploying and starting the application -- 10.3.9 Running the application client -- 10.4 Revised application discussion -- 10.4.1 Enterprise bean wrappers -- 10.4.2 CORBA IDL file -- 10.4.3 Application client -- 10.4.4 Application server -- 10.4.5 Java Native Interface -- 10.4.6 J2EE Connector Architecture -- 10.5 Administration considerations and interfaces -- 10.6 Discussion and conclusions -- Chapter 11. Scenario 4: Secure RPC application #2 -- 11.1 Scenario description -- 11.1.1 Initial application with DCE dependencies -- 11.1.2 Revised application without DCE dependencies -- 11.2 DCE application -- 11.3 Replacement roadmap -- 11.3.1 Software requirements -- 11.3.2 Installing and configuring IBM WebSphere Application Server -- 11.3.3 Configuring WebSphere Application Server security -- 11.3.4 Configuring the application client -- 11.3.5 Developing the application -- 11.3.6 Configuring IBM Directory Server -- 11.3.7 Assembling the scenario application -- 11.3.8 Deploying and starting the application -- 11.3.9 Running the application client -- 11.4 Revised application discussion -- 11.4.1 Application client -- 11.4.2 Application server -- 11.5 Administration considerations and interfaces -- 11.6 Discussion and conclusions -- Part 3 Appendixes -- Appendix A. Scenario 1: Source code listings -- Application with DCE dependencies -- Makefile for application client -- Makefile for application server -- DCE dependent application client -- DCE dependent application server -- Authorization module with DCE dependencies -- Utility source of the DCE dependent application -- Header file for utility source -- Revised application without DCE dependencies -- Makefile for application client -- Makefile for application server -- Revised application client -- Revised application server. Authorization module using aznAPI. |
Record Nr. | UNINA-9910810925103321 |
[S.l.], : IBM, International Technical Support Organization, c2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Enabling applications for grid computing with Globus [[electronic resource] /] / [Bart Jacob ... et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | [United States?], : IBM, c2003 |
Descrizione fisica | xvi, 378 p. : ill |
Disciplina | 004.3/6 |
Altri autori (Persone) | JacobBart |
Collana | Redbooks |
Soggetto topico |
Computational grids (Computer systems)
Application software - Development IBM software |
Soggetto genere / forma | Electronic books. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910456236903321 |
[United States?], : IBM, c2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|