Redirigiendo al acceso original de articulo en 21 segundos...
ARTÍCULO
TITULO

Combined architecture of the configuration management system for computing infrastructure

Y.A. Vorontsov    
E.K. Mikhailova    

Resumen

Information systems and services of any computing infrastructure require configuration in accordance with the current tasks assigned to them. Currently, configuration management systems are used to configure infrastructure nodes, which make it possible to automate this process. One of the basic principles of these systems is the presence of a control node in the infrastructure, from which configuration management will be performed, on which the configuration files themselves will also be located. The main difference lies in the principle of interaction with managed nodes. In one case, the management node is responsible for initializing the node configuration, sending configuration files to managed machines, which will then be configured according to this configuration, this management model is called the push model. In another case, the pull model is used, which provides that the managed node is responsible for initializing the request. It independently polls the control node for changes in its configuration. Usually, all infrastructure nodes have different network access policies: some are constantly available and their status is known to the system administrator, while others are under the full control of their users and it is impossible to say with certainty when they will appear on the network and receive the configuration. In accordance with this, a system architecture is proposed that implements both management models, since in this case it will not be necessary to use several configuration management systems to configure all nodes in the infrastructure.

 Artículos similares

       
 
Wen-Chang Cheng, Hung-Chou Hsiao, Yung-Fa Huang and Li-Hua Li    
This research proposes a single network model architecture for mask face recognition using the FaceNet training method. Three pre-trained convolutional neural networks of different sizes are combined, namely InceptionResNetV2, InceptionV3, and MobileNetV... ver más
Revista: Information

 
Muhammed Yildirim    
Hydatid cysts are most commonly found in the liver, but they can also occur in other body parts such as the lungs, kidneys, bones, and brain. The growth of these cysts occurs through the division and proliferation of cells over time. Cysts usually grow s... ver más
Revista: Applied Sciences

 
Yingxiang Zhao, Lumei Zhou, Xiaoli Wang, Fan Wang and Gang Shi    
Cracks are a common type of road distress. However, the traditional manual and vehicle-borne methods of detecting road cracks are inefficient, with a high rate of missed inspections. The development of unmanned aerial vehicles (UAVs) and deep learning ha... ver más
Revista: Applied Sciences

 
Jesús Dassaef López-Barrios, Jesús Arturo Escobedo Cabello, Alfonso Gómez-Espinosa and Luis-Enrique Montoya-Cavero    
In this paper, a mask region-based convolutional neural network (Mask R-CNN) is used to improve the performance of machine vision in the challenging task of detecting peduncles and fruits of green sweet peppers (Capsicum annuum L.) in greenhouses. One of... ver más
Revista: Applied Sciences

 
Vangelis Malamas, George Palaiologos, Panayiotis Kotzanikolaou, Mike Burmester and Dimitris Glynos    
Although there are several access control systems in the literature for flexible policy management in multi-authority and multi-domain environments, achieving interoperability and scalability, without relying on strong trust assumptions, is still an open... ver más
Revista: Applied Sciences