Free Essay

Sfa - Slice Based Facility

In:

Submitted By nodkrot
Words 1349
Pages 6
Charles Yang

CS370

Second Assignment

11/14/2011

Slice-Based Facility Architecture

After first time reading of SFA (Slice-Based Facility Architecture), I still can’t understand SFA. This is a hard topic, but I got some of ideas after reading over few times. Also I think SFA is a great system to work on when we try to do programming and it gives covers everything of basic concept we need to know. Those concepts also can become more complex when we move to next level, but it gives general ideas that show functional part of SFA. In addition, SFA is something like UML and RMI that we did in the class. In conclusion, the SFA is taking about its principle, usages and users to run the SFA systems.

The SFA has four users, owners, operators, researchers (and developers) and principle investigators. Owners are like an owner of a website who has creates the rule of its website and force all website visitors to follow the rule, so it is the top user in the system. For example, to create a network that connects different people from all over the world together. Operators are playing the role of the owner’s worker who helps to keep website updated and running well. Because the limit of workers, the owner also the play the role of operators. Researchers are kinds of complicate in it role because its can do jobs from operators and other’s job. There are simple ways to explain which it is likes a forum manager who keep the forum running well and he also can add/delete some function by higher-level’s permit. Then the investigators are using for verifying the researchers.

The most important two key abstractions defined by SFA are components and slices. A component is uses to collect resources like CPU or memory and controlled by component manager which defines the functions for users and manages the allocation of resources to different users. A slice is distributed set of virtual machines resources, and working in a combined mode continuously. Also each slices, there only run a service or an application. The slice is only work in the name that bound to a group user, which means those services will be runnable by calling the name of those slices. The slice must be registered and connect to the users before it instantiated and instantiated be running. We one have to register the slice once and the set of user can change anytime. This is kind of like the RMI registry that we have to open and put it available for user once, and the users can be acceptable to the RMI server and running the code. In addition, there are two different respective. The way of showing the services operation is available on the researchers. Second, the consumers of the service (operator) have to show what services run on here. In general, the slice is like the function or the method in the java that we can call it by its name.

The SFA defines three principals which are management authority, slice authority and user. A management authority is the service provider that has to be stable and acceptable by the policies. A slice authority is the response of the service in each slice and behaves appropriate. A user is playing in one or more role to run in the server. For example, a researcher wants to test the service in a slice. Or an operator wants to manage some services under a slice.

The SFA defines global identifiers (GID) are the set of objects that makes up the system. GIDs form a basis for a correct and secure system that conform the GID is acceptable to process. For example, it is like a method caller with the parameters in java language.

GID = (PublicKey ABC, Lifetime)

This is a simple GID that holds the private key corresponding to PublicKey in the GID. ABC is Universally Unique Identifier and it stays the same as PublicKey and it will change as PublicKey change. The Lifetime tells people how long do this GID valid, because GID needs to refresh periodically. In this case, we can use PublicKey and ABC in different functionalities. We can change PublicKey rather than ABC to imply that all objects under PublicKey change. In details, if we change ABC, other PublicKey wont changes but others change when we change PublicKey.

. A registry maps human-readable names (HRN) to GIDs, and others to reach specific object. Furthermore, a registry is like a website address that can call the website and the link to access the method. Also it can use with different level of that website like an administrator or a user. The global registry is the entire of the registry information. The authority registry is just one level of the global registry corresponding to a slice. And a registry severs who insert the new authority register.

The registry of SFA is “kind of similar” to the registry of RMI. They both have registry. In the SFA proposed, a resource could be a Java functional method exposed for an external call via Java RMI (Remote Method Invocation), a software/hardware interface, a software/hardware processing unit for signal processing. Therefore to access the Java RMI server registered through the Java RMI client stub and Java rmiregistry. RMI allows the RMI server side resource be called by the RMI client side stub. As the RMI client stub can be repeated and the distribution of different locations, which is equivalent to a presence in different locations of resources point. Also the Java Socket added security feature which make RMI more secure. BioAPI architecture framework is basically a resource as services which can be found mostly rely on a registry registration services.

The SFA defines four key data types in addition to GIDs

• A resource specification (RSpec): it tells us what the resource is clearly.

• Registry Record: it uses the facts about the object of system.

An example from SFA PDF:

Record = (HRN, GID, Type, Info)

Where HRN and GID are as defined in Section 4,

Type = SA | MA | Component | Slice | User

And

Info = (PI [ ], Organization), if Type = SA

Info = (Owner [ ], Operator [ ], Organization), if Type = MA

Info = (URI, LatLong, IP, DNS), if Type = Component

Info = (URI, Researcher [ ], InitScript), if Type = Slice

Info = (PostalAddr, Phone, Email, AuthTokens[ ]), if Type = User

• Ticket: is “issued” by component to bind resource to ticket holder at some point in time. Also it may change back or split (passing resource to another).

• Credentials: a credentials allow user to give more specification in a slice

The interface is the main function in the SFA and we have three different term:

• Registry Interface: Has six operations. Those are uses to pass the message from different actors with return of credential.

Register (Credential, Record)

Remove(Credential, Record)

Update(Credential, Record)

Record = Resolve(Credential, HRN, Type)

Record[ ] = List(Credential, HRN, Type)

Credential = GetCredential(Credential, HRN, Type)

• Slice Interface: After the slice register, every user will have right to use the operation on components to instantiate and provision the slice

> Instantiating a Slice: four operations: we can create and delete a slice of ticket.

GetTicket(Credential, RSpec)

RedeemTicket(Ticket)

ReleaseTicket(Ticket)

CreateSlice(Credential, RSpec)

> Provisioning a Slice: we can split ticket without being encapsulated in a ticket and update a slice.

NewTicket = SplitTicket(Ticket, GID, RSpec)

LoanResources(Credential, GID, RSpec)

UpdateSlice(Credential, RSpec)

• Controlling a Slice (four control operations): all four operations are with the credential as the parameter. The stopslice is to delete the slice and stop all running threads. Startslice is to reboot a slice. And Resetslice is just deleting and re-create the slice. Last Deleteslice is for delete a slice.

StopSlice(Credential)

StartSlice(Credential)

ResetSlice(Credential)

DeleteSlice(Credential)

• Slice Information (three informational operations): three operations to get the information of a slice.

SlicesNames[ ] = ListSlices(Credential)

RSpec = ListComponents(Credential)

RSpec = GetSliceResources(Credential)

• Component Management Interface is use to configure component and support the interface.

SFA is an open and worldwide to allow users to easily access the resource over the network. Also access the local components and facility.

Similar Documents

Premium Essay

Customer Relationship Management

...Customer Relationship Management VSF This book is dedicated to my children Emma and Lewis of whom I am enormously proud. Customer Relationship Management Concepts and Technologies Second edition Francis Buttle AMSTERDAM • BOSTON • HEIDELBERG • LONDON • NEW YORK • OXFORD PARIS • SAN DIEGO • SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO Butterworth-Heinemann is an imprint of Elsevier Butterworth-Heinemann is an imprint of Elsevier Linacre House, Jordan Hill, Oxford OX2 8DP 30 Corporate Drive, Suite 400, Burlington, MA 01803, USA First edition 2009 Copyright © 2009, Francis Buttle Published by Elsevier Ltd. All rights reserved. The right of Francis Buttle to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988 No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means electronic, mechanical, photocopying, recording or otherwise without the prior written permission of the publisher. Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone ( 44) (0) 1865 843830; fax: ( 44) (0) 1865 853333; email: permissions@elsevier.com. Alternatively you can submit your request online by visiting the Elsevier web site at http://elsevier.com/locate/ permissions, and selecting Obtaining permission to use Elsevier material. Notice No responsibility is assumed by the publisher for any injury and/or damage...

Words: 171161 - Pages: 685

Premium Essay

Crm Top 40

...TOP 40 2011 Edition CRM SOFTWARE VENDORS REVEALED Profiles of the Leading CRM Software Vendors For more information, visit Business-Software.com/CRM CRM Solutions For businesses of all sizes, acquiring, retaining, and supporting customers is more challenging than ever before. Activities that were already complex have become highlycomplicated, multi-faceted workflows and procedures that are difficult to coordinate, track and manage. Marketing teams must plan and develop an increasing number of sophisticated campaigns, and deliver them through multiple mediums. Sales reps must follow-up on hundreds of new leads, while juggling existing sales cycles. Support staff must rapidly resolve a growing volume of customer problems and issues. And, management must oversee customer-facing operations across all departments, and ensure that all client interactions are handled in a responsive and professional manner. Customer relationship management (CRM) systems has emerged as a way for businesses to streamline customer-related processes across functional areas, increase the efficiency and effectiveness of customer transactions at all levels, and optimize service quality at each touch-point. Within the CRM world, there are many types of solutions, each having their own flavor, and each meeting different business needs. What is Enterprise CRM? Enterprise customer relationship management is a family of tightly-integrated applications that span both front- and back-office operations...

Words: 24494 - Pages: 98

Premium Essay

Bunge Case Study

...BUNGE LTD. Analysis Team Shelby Bentley Nicolas King Jon Murphy Colby Norris Georgia Sanchez shelby.bently@ttu.edu nick.king@ttu.edu jon.murphy@ttu.edu colby.norris@ttu.edu georgia.sanchez@ttu.edu 1 Table of Contents Executive Summary ………………………………………………………………………..8 Company Overview ……………………………………………………………………….14 Industry Overview …………………………………………………………….............15 Five Forces Model …………………………………………………………………………16 Rivalry among Existing Firms ………………………………………………..18 Industry Growth …………………………………………………………………………18 Concentration …………………………………………………………………………….20 Differentiation ……………………………………………………………………………21 Switching Costs ………………………………………………………………………….22 Economies of Scale …………………………………………………………………….22 Learning Economies of Scale ……………………………………………………….23 Fixed Variable Cost ……………………………………………………………………..24 Threat of New Entrants ………………………………………………………..25 Economies of Scale ………………………………………………………..……………25 First Mover Advantage ………………………………………………………………..26 Distribution Access and Relationships …………………………………………..26 Legal Barriers …………………………………………………………………………….27 Threat of Substitute Products ……………………………………………….28 Relative Price and Performance ……………………………………………………28 Customers Willingness to Switch ………………………………………………….29 Bargaining Power of Customers …………………………………………….30 2 Switching Costs ……………………………………………………………………….…30 Differentiation ……………………………………………………………………………31 Cost and Strategy Importance …………………………………………………….31 Number of Customers …………………………………………………………………32...

Words: 54435 - Pages: 218

Premium Essay

E-Book Supply Chain Management

...Introduction to Supply Chain Management Technologies Second Edition Introduction to Supply Chain Management Technologies Second Edition David Frederick Ross CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2011 by Taylor and Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed in the United States of America on acid-free paper 10 9 8 7 6 5 4 3 2 1 International Standard Book Number-13: 978-1-4398-3753-5 (Ebook-PDF) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval...

Words: 158845 - Pages: 636

Free Essay

Ebusiness

...Introduction to E-business To Debbie and Richard Introduction to E-business Management and strategy Colin Combe AMSTERDAM  BOSTON  HEIDELBERG  LONDON  NEW YORK PARIS  SAN DIEGO  SAN FRANCISCO  SINGAPORE  SYDNEY Butterworth-Heinemann is an imprint of Elsevier   OXFORD TOKYO Butterworth-Heinemann is an imprint of Elsevier Linacre House, Jordan Hill, Oxford OX2 8DP 30 Corporate Drive, Suite 400, Burlington, MA 01803 First edition 2006 Copyright ß 2006, Elsevier Ltd. All rights reserved No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means electronic, mechanical, photocopying, recording or otherwise without the prior written permission of the publisher Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone: (þ44) (0) 1865 843830; fax: (þ44) (0) 1865 853333; email: permissions@elsevier.com. Alternatively you can submit your request online by visiting the Elsevier website at http://www.elsevier.com/locate/ permissions, and selecting Obtaining permission to use Elsevier material British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library Library of Congress Cataloguing in Publication Data Control Number: 2005938727 ISBN–13: 978-0-7506-6731-9 ISBN–10: 0-7506-6731-1 For information on all Butterworth-Heinemann publications visit our website at http:/ /books.elsevier.com Printed and bound in...

Words: 142464 - Pages: 570

Premium Essay

Manager

...Learning with Cases INTRODUCTION The case study method of teaching used in management education is quite different from most of the methods of teaching used at the school and undergraduate course levels. Unlike traditional lecture-based teaching where student participation in the classroom is minimal, the case method is an active learning method, which requires participation and involvement from the student in the classroom. For students who have been exposed only to the traditional teaching methods, this calls for a major change in their approach to learning. This introduction is intended to provide students with some basic information about the case method, and guidelines about what they must do to gain the maximum benefit from the method. We begin by taking a brief look at what case studies are, and how they are used in the classroom. Then we discuss what the student needs to do to prepare for a class, and what she can expect during the case discussion. We also explain how student performance is evaluated in a case study based course. Finally, we describe the benefits a student of management can expect to gain through the use of the case method. WHAT IS A CASE STUDY? There is no universally accepted definition for a case study, and the case method means different things to different people. Consequently, all case studies are not structured similarly, and variations abound in terms of style, structure and approach. Case material ranges from small caselets (a few paragraphs...

Words: 239776 - Pages: 960

Premium Essay

Accounting Dictionary

...cover next page > title author publisher isbn10 | asin print isbn13 ebook isbn13 language subject publication date lcc ddc subject : : : : : : : : : : : cover next page > < previous page page_i next page > Page i Dictionary of Accounting Terms Third Edition Joel G. Siegel, PhD, CPA Professor of Accounting Queens College of the City University of New York Jae K. Shim, PhD Professor of Accounting College of Business Administration California State University, Long Beach < previous page page_i next page > < previous page ACKNOWLEDGMENTS page_ii next page > Page ii The authors would like to acknowledge the contributions made by reviewers John Downes, formerly of the New York City Office of Economic Development, and Dr. G. Thomas Friedlob, Professor of Accounting at Clemson University. Their in-depth evaluations have been of great importance to the technical accuracy of the manuscript. Gerald J. Barry suggested many meaningful insertions and deletions that greatly enhanced the authors' prose. Thanks also go to Roberta Siegel and Cher Ragge for their assistance with the computer terms, graphics, and word processing. Anna Damaskos, Don Reis, Sally Strauss, and Eileen Prigge of Barron's have been invaluable during the many stages of editing the manuscript into its bound book form. © Copyright 2000 by Barron's Educational Series, Inc. Prior editions © 1995, 1987 by Barron's Educational Series, Inc. All rights reserved. No part of this...

Words: 195124 - Pages: 781

Premium Essay

Philip Kotler Book

...Marketing Management, Millenium Edition Philip Kotler Custom Edition for University of Phoenix Excerpts taken from: A Framework for Marketing Management, by Philip Kotler Copyright © 2001by Prentice-Hall, Inc. A Pearson Education Company Upper Saddle River, New Jersey 07458 Marketing Management Millenium Edition, Tenth Edition, by Philip Kotler Copyright © 2000 by Prentice-Hall, Inc. All rights reserved. No part of this book may be reproduced, in any form or by any means, without permission in writing from the publisher. Compilation Copyright © 2002 by Pearson Custom Publishing. This copyright covers material written expressly for this volume by the editor/s as well as the compilation itself. It does not cover the individual selections herein that first appeared elsewhere. Permission to reprint these has been obtained by Pearson Custom Publishing for this edition only. Further reproduction by any means, electronic or mechanical, including photocopying and recording, or by any information storage or retrieval system, must be arranged with the individual copyright holders noted. This special edition published in cooperation with Pearson Custom Publishing Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 Please visit our web site at www.pearsoncustom.com ISBN 0–536–63099-2 BA 993095 PEARSON CUSTOM PUBLISHING 75 Arlington Street, Suite 300, Boston, MA 02116 A Pearson Education Company SECTION ONE Understanding Marketing Management Marketing in...

Words: 231198 - Pages: 925

Free Essay

Internship

...Business and management terms dictionary 21-Gun Salute - Traditional honour given to royalty and heads of state, derived from the old signal of peaceful intent, when multiple firing practically removed capability for immediate threat due to re-loading time. 24-Carat/Karat - The purest form of gold (karat is US-English spelling, too soft for jewellery, hence gold jewellery is made of 22-carat, 18-carat, or 9-carat gold, etc., in which other metals such as copper are mixed. Carat is a measure of purity in which 24 parts equate (virtually) to 100% gold. 18-carat is therefore 75% gold. Less than 10-carat gold is generally not sold as gold. The carat measure of diamonds is different, for which carat is a measure of weight (1 carat = 200mg). 24-hour Society - Refers to a way of life available to many in the modern world in which people can work socialize, shop, bank, etc., 24 hours a day. The phenomenon has caused significant new thinking in business, management, marketing, etc., and continues to do so. ...

Words: 64727 - Pages: 259

Premium Essay

Ethics

...ETHICS IN INFORMATION TECHNOLOGY Third Edition This page intentionally left blank ETHICS IN INFORMATION TECHNOLOGY Third Edition George W. Reynolds Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Ethics in Information Technology, Third Edition by George W. Reynolds VP/Editorial Director: Jack Calhoun Publisher: Joe Sabatino Senior Acquisitions Editor: Charles McCormick Jr. Senior Product Manager: Kate Hennessy Mason Development Editor: Mary Pat Shaffer Editorial Assistant: Nora Heink Marketing Manager: Bryant Chrzan Marketing Coordinator: Suellen Ruttkay Content Product Manager: Jennifer Feltri Senior Art Director: Stacy Jenkins Shirley Cover Designer: Itzhack Shelomi Cover Image: iStock Images Technology Project Manager: Chris Valentine Manufacturing Coordinator: Julio Esperas Copyeditor: Green Pen Quality Assurance Proofreader: Suzanne Huizenga Indexer: Alexandra Nickerson Composition: Pre-Press PMG © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission...

Words: 204343 - Pages: 818