16 research outputs found

    Automated deployment of enterprise systems in large-scale environments

    Get PDF
    International audienceThe deployment of multi-tiered applications in large-scale environments remains a difficult task: the architecture of these applications are complex and the target environment is heterogeneous, open and dynamic. In this paper, we show how the component-based approach simplifies the design, the deployment and the reconfiguration of a J2EE system. We propose an architecture description language that allows specifying the resources and location constraints and a deployment solution that handles failures

    JGroups evaluation in J2EE cluster environments

    Get PDF
    Clusters have become the de facto platform to scale J2EE application servers. Each tier of the server uses group communication to maintain consistency between replicated nodes. JGroups is the most commonly used Java middleware for group communications in J2EE open source implementations. No evaluation has been done yet to evaluate the scalability of this middleware and its impact on application server scalability. We present an evaluation of JGroups performance and scalability in the context of clustered J2EE application servers. We evaluate the JGroups configuration used by popular software such as the Tomcat JSP server or JBoss J2EE server. We benchmark JGroups with different network technologies, protocol stacks and cluster sizes. We show, using the default protocol stack, that group communication performance using UDP/IP depends on the switch capability to handle multicast packets. With UDP, Fast Ethernet can give better results than Gigabit Ethernet. We experiment with another configuration using TCP/IP and show that current J2EE application server clusters up to 16 nodes (the largest configuration we tested) can scale much better with this configuration. We attribute the superiority of TCP/IP based group communications over UDP/IP multicast to a better flow control management and a better usage of the network switches available in cluster environments. Finally, we discuss architectural improvements for a better modularity and resource usage of JGroups channels

    Apport des architectures Ă  composants pour l'administration des intergiciels. Etude de cas : JonasALaCarte, un serveur d'applications J2EE administrable

    No full text
    The management of modern IT systems is increasingly costly and complex. Indeed, the architecture of these systems is generally monolithic and does not allow for dynamic adaptation to external changes (failures, performance variation, security attacks, etc). In this thesis, we are interested in the management of Middleware, subject of less work than hardware and operating systems management.First, we propose an approach transforming legacy Middleware to administrable (easily configurable and adpatable) ones. This approach consists in changing their architecture to an explicit component-based one. Second, we propose a management system automating the deployment, the dynamic code update and the recovery from failure operations.As a use case, we considered a legacy J2EE application server, JOnAS. JonasALaCarte is the name of the obtained J2EE server. We show that our approach to the administration simplifies the server configuration and deployment in distributed environments. Furthermore, we introduced new management features to the server such as the dynamic code update and the self-recovery from failures.L'administration des systèmes informatiques modernes est une tâche de plus en plus complexe et coûteuse. En effet, l'architecture de ces systèmes n'est pas en géneral suffisamment modulaire pour permettre l'adaptation aux événements extérieurs (pannes, variation des performances, attaques de sécurité, etc.). Dans cette thèse, nous nous intéressons à l'administration des intergiciels qui a fait l'objet de moins de travail que l'administration des couches physiques et des systèmes d'exploitation.Nous proposons, d'abord, une démarche pour rendre les intergiciels patrimoniaux administrables, c'est à dire facilement configurables, déployables et adaptables à l'exécution. Cette approche consiste à transformer l'architetcure des intergiciels en une architecture explicite à base de composants. Ensuite, nous proposons un système d'administration automatisant certaines fonctions de l'administration, telles que le déploiement, la mise à jour de code et la réparation des pannes.Nous avons appliqué notre approche à l'administration d'un serveur d'applications J2EE patrimonial, JOnAS. JonasALaCarte est le nom du serveur J2EE administrable obtenu. Nous montrons que la configuration et le déploiement du serveur dans des environnements distribués sont simplifiés. De plus, de nouvelles propriétés de reconfiguration dynamique sont introduites comme la mise à jour dynamique de code et l'auto-réparation des pannes

    Apport des architectures Ă  composants pour l'administration des intergiciels (Ă©tude de cas : JonasALaCarte, un serveur d'applications J2EE administrable)

    No full text
    L'administration des systèmes informatiques modernes est une tâche de plus en plus complexe et coûteuse. En effet, l'architecture de ces systèmes n'est pas en géneral suffisamment modulaire pour permettre l'adaptation aux événements extérieurs (pannes, variation des performances, attaques de sécurité, etc.). Dans cette thèse, nous nous intéressons à l'administration des intergiciels qui a fait l'objet de moins de travail que l'administration des couches physiques et des systèmes d'exploitation. Nous proposons, d'abord, une démarche pour rendre les intergiciels patrimoniaux administrables, c'est à dire facilement configurables, déployables et adaptables à l'exécution. Cette approche consiste à transformer l'architetcure des intergiciels en une architecture explicite à base de composants. Ensuite, nous proposons un système d'administration automatisant certaines fonctions de l'administration, telles que le déploiement, la mise à jour de code et la réparation des pannes. Nous avons appliqué notre approche à l'administration d'un serveur d'applications J2EE patrimonial, JOnAS. JonasALaCarte est le nom du serveur J2EE administrable obtenu. Nous montrons que la configuration et le déploiement du serveur dans des environnements distribués sont simplifiés. De plus, de nouvelles propriétés de reconfiguration dynamique sont introduites comme la mise à jour dynamique de code et l'auto-réparation des pannes.GRENOBLE1-BU Sciences (384212103) / SudocSudocFranceF

    Automated Deployment of Enterprise Systems in Large-Scale Environments

    No full text
    International audienceThe deployment of multi-tiered applications in large-scale environments remains a difficult task: the architecture of these applications are complex and the target environment is heterogeneous, open and dynamic. In this paper, we show how the component-based approach simplifies the design, the deployment and the reconfiguration of a J2EE system. We propose an architecture description language that allows specifying the resources and location constraints and a deployment solution that handles failures

    Architecture-Based Autonomic Deployment of J2EE Systems in Grids

    Get PDF
    Abstract. The deployment of J2EE systems in Grid environments remains a difficult task: the architecture of these applications are complex and the target environment is heterogeneous, open and dynamic. In this paper, we show how the component-based approach simplifies the design, the deployment and the reconfiguration of a J2EE system. We propose an extended architecture description language that allows specifying the deployment of enterprise systems in enterprise Grids, driven by resources and location constraints. With respect to these constraints we present a deployment process that instantiates propagatively the application, taking into account resources and hosts availability. Finally, we present an autonomic solution for recovery from failures.

    Evaluation of a group communication middleware for clustered J2EE application servers

    No full text
    Abstract. Clusters have become the de facto platform to scale J2EE application servers. Each tier of the server uses group communication to maintain consistency between replicated nodes. JGroups is the most commonly used Java middleware for group communications in J2EE open source implementations. No evaluation has been done yet to evaluate the scalability of this middleware and its impact on application server scalability. We present an evaluation of JGroups performance and scalability in the context of clustered J2EE application servers. We evaluate the JGroups configuration used by popular software such as the Tomcat JSP server or JBoss J2EE server. We benchmark JGroups with different network technologies, protocol stacks and cluster sizes. We show, using the default protocol stack, that group communication performance using UDP/IP depends on the switch capability to handle multicast packets. Fast Ethernet can give better results than Gigabit Ethernet. We experiment with another configuration using TCP/IP and show that current J2EE application server clusters up to 16 nodes (the largest configuration we tested) can scale much better with this configuration. We attribute the superiority of TCP/IP based group communications over UDP/IP multicast to a better flow control management and a better usage of the network switches available in cluster environments. Finally, we discuss architectural improvements for a better modularity and resource usage of JGroups channels

    READ-IoT: Reliable Event and Anomaly Detection Framework for the Internet of Things

    No full text
    International audienceInternet of Things (IoT) enables a myriad of applications by interconnecting software to physical objects. The objects range from wireless sensors to robots and include surveillance cameras. The applications are often critical (e.g. physical intrusion detection, fire fighting) and latency-sensitive. On the one hand, such applications rely on specific protocols (e.g. MQTT, COAP) and the network to communicate with the objects under very tight timeframe. On the other hand, anomalies (e.g. communication noise, sensors' failures, security attacks) are likely to occur in open IoT systems and can result by sending false alerts or the failure to properly detect critical events. To address that, IoT systems have to be equipped with anomaly detection processing in addition to the required event detection capability. This is a key feature that enables reliability and efficiency in IoT. However, anomaly detection systems can be themselves object of failures and attacks, and then can easily fall short to accomplish their mission. This paper introduces a Reliable Event and Anomaly Detection Framework for the Internet of Things (READ-IoT for short). The designed framework integrates events and anomalies detection into a single and common system that centralizes the management of both concepts. To enforce its reliability, the system relies on a reputationaware provisioning of detection capabilities that takes into account the vulnerability of the deployment hosts. As for validation, READ-IoT was implemented and evaluated using two real life applications, i.e. a fire detection and an unauthorized person detection applications. Several scenarios of anomalies and events were conducted using NSL-KDD public dataset, as well as, generated data to simulate routing attacks. The obtained results and performance measurements show the efficiency of READ-IoT in terms of event detection accuracy and real-time processing

    A Model-Based Approach to Secure Multiparty Distributed Systems

    No full text
    International audienceWithin distributed systems with completely distributed interactions between parties with mutual distrust, it is hard to control the (illicit) flowing of private information to unintended parties. Unlike existing methods dealing with verification of low-level cryptographic protocols, we propose a novel model-based approach based on model transformations to build a secure-by-construction multiparty distributed system. First, starting from a component-based model of the system, the designer annotates different parts of it in order to define the security policy. Then, the security is checked and when valid, a secure distributed model, consistent with the desired security policy, is automatically generated. To illustrate the approach, we present a framework that implements our method and use it to secure an online social network application
    corecore