Mastering Cloud Computing by Rajkumar Buyya & Christian Vecchiola & S. Thamarai Selvi
Author:Rajkumar Buyya & Christian Vecchiola & S. Thamarai Selvi
Language: eng
Format: epub
ISBN: 9780124095397
Publisher: Elsevier Inc.
Published: 2013-04-07T16:00:00+00:00
All these commands can operate with parameters that are substituted with their actual values for each task instance.
Figures 7.2 and 7.3 provide examples of two possible task templates, the former as defined according to the notation used by Nimrod/G, and the latter as required by Aneka.
Figure 7.2 Nimrod/G task template definition.
Figure 7.3 Aneka parameter sweep file.
The template file has two sections: a header for the definition of the parameters, and a task definition section that includes shell commands mixed with Nimrod/G commands. The prefix node: identifies the remote location where the task is executed. Parameters are identified with the ${…} notation. The example shown remotely executes the echo command and copies to the local user directory the output of the command by saving it into a file named according to the values of the parameters x and y.
The Aneka Parameter Sweep file defines the template task for executing the BLAST application. The file is an XML document containing several sections, the most important of which are sharedFiles, parameters, and task. parameters contains the definition of the parameters that will customize the template task. Two different types of parameters are defined: a single value and a range parameter. The sharedFiles section contains the files that are required to execute the task; task specifies the operations that characterize the template task. The task has a collection of input and output files for which local and remote paths are defined, as well as a collection of commands. In the case presented, a simple execute command is shown. With respect to the previous example there is no need to explicitly move the files to the remote destination, but this operation is automatically performed by Aneka.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Deep Learning with Python by François Chollet(12590)
Hello! Python by Anthony Briggs(9926)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9802)
The Mikado Method by Ola Ellnestam Daniel Brolund(9787)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(9358)
Dependency Injection in .NET by Mark Seemann(9348)
Hit Refresh by Satya Nadella(8831)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8309)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7789)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7771)
The Kubernetes Operator Framework Book by Michael Dame(7709)
Grails in Action by Glen Smith Peter Ledbrook(7705)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(7566)
Exploring Deepfakes by Bryan Lyon and Matt Tora(7507)
Practical Computer Architecture with Python and ARM by Alan Clements(7425)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(7403)
Robo-Advisor with Python by Aki Ranin(7380)
Building Low Latency Applications with C++ by Sourav Ghosh(7282)
Svelte with Test-Driven Development by Daniel Irvine(7251)
