Exercise 1 basic use1unpack the unicore client package if

Assignment Help Data Structure & Algorithms
Reference no: EM13346625

Exercise 1: Basic Use

1. Unpack the Unicore client package (if you haven't done already)

Copy the UCC preferences file from .../ucc-distribution-6.5.1/conf/preferences to ~/.ucc/preferences ("~/" refers to your home directory; see section 2.4 of the client manual for where to put it on Windows).

2. Edit that copy of the preferences file's keystore entry to specify the full location of the user-keystore.jks file instead of using the default relative path. (That is a pre-configured digital identity that the installed Unicore server already recognizes.)

3. Edit that copy of the preferences file's registry entry to specify the location of the Unicore service you will be using. This should be set to (one line):

https://eric.rcs.manchester.ac.uk:8000/DEMO-SITE/services/Registry?res=default_registry

4. In a terminal, put the ucc command on your PATH. On Unix, this is done with:

PATH=$PATH:.../ucc-distribution-6.5.1/bin

5. Issue this command, which you need to give once per session (i.e., after each time the virtual machine is booted up). ucc connect

6. Now you can discover information about the virtual machine configuration. Report the output of the two commands:
ucc list-sites
ucc list-applications

The first command describes what Unicore server installations are known about to the client; it should be a single long line with "DEMO-SITE" as the first part. The second command lists all the applications known to the site. Successfully executing the two commands indicates that you have a correctly configured installation.

Exercise: A simple Date job

This is the simplest possible job that produces meaningful output.

1.

Save this job definition to a JSON file called date.u:
{

ApplicationName: Date,

ApplicationVersion: 1.0,
}

2. Run this job definition with:

ucc run -b -o datejob date.u

3. Look in the datejob directory, which will be created with a number of files. The file with a .properties extension is an XML description of the job . The output of the job will be in the file stdout.

Exercise 3: A raytracing job

This exercise uses a raytracer program (POV-Ray) to render a simple picture. Raytracing is a technique that can produce images of extremely high quality, and works by simulating the physics of light. The objects in the scene are described mathematically. The scene used here is especially simple in order to keep rendering times short.

1. Save this job definition to a JSON file called povray.u:
{
#
# application name as defined in server IDB
#
ApplicationName: POVRay,

#
# environment settings used to pass parameters
#
Environment: [
"OUTPUT_FORMAT=PNG",
"SOURCE=input.pov",
"TARGET=output.png",
"WIDTH=320",
"HEIGHT=200",
],

#
# Import local files; note rename
#
Imports: [{

From: "sphere.pov",
To: "input.pov"
}],

#
# Export result file
#
Exports: [{
From: "output.png",
To: "sphere.png"
}],
}

 

Exercise 4: A graph-plotting job

This exercise uses a graph-plotting program (gnuplot) to convert tabular data into an image. This is a technique that is very widely used to visualize scientific data; with appropriate instructions, gnuplot can produce significantly more complex graphs than almost all of its competitors.

Note that povray and gnuplot have quite substantially different ways of being controlled. The povray executable (from the previous example) has a complex command line interface that has been configured into the Unicore server. By comparison, gnuplot is extremely simple (so much so that it doesn't need explicit support at the server level) but it has to have the name of associated files placed in its control file: this increased coupling tends to make code more fragile.

1. Save this job definition to a JSON file called gnuplot.u:

{
Executable: "/bin/sh",
Arguments: ["control.sh"],
Imports: [
{From: "control.sh", To: "control.sh"},
{From: "data.csv", To: "data.csv"},
],
Exports: [
{From: "output.png", To: "plot.png"}
],
}

2. Save this control description in a file called control.sh (this is a shell script that runs gnuplot from within itself):

gnuplot << EOF
set term png
set output "output.png"
set datafile separator ","
plot "data.csv" using 1:2 with lines
EOF

3. Save this data in a file called data.csv (the CSV format can be produced by many tools, including most spreadsheets).

0.0,0.0
1.0,0.0
1.0,1.0
1.1,1.0
0.5,1.6
-0.1,1.0
0.0,1.0
0.0,0.0

4. Run this job definition with:
ucc run -b -o gnuplotjob gnuplot.u

Reference no: EM13346625

Questions Cloud

Complete the recursive method matchstring x string y in the : complete the recursive method matchstring x string y in the code below which will determine whether or not two strings
1 let tn be the nth chebyshev polynomialtnx cosn cos-1x : 1. let tn be the nth chebyshev polynomialtnx cosn cos-1x xisin2 -1 1 n 0 1......show that the polynomials dened
The article study for the demand supply and the market : the article study for the demand supply and the market equilibriumdemand supply and market equilibriumthe economic
Sampling variability and standard errorproblem 1people in a : sampling variability and standard errorproblem 1people in a large population average 60 inches tall.nbsp you will take
Exercise 1 basic use1unpack the unicore client package if : exercise 1 basic use1.unpack the unicore client package if you havent done alreadycopy the ucc preferences file from
Submit the table creation statements for the database model : submit the table creation statements for the database model. submit them all in a single script file.also submit a
1 differentiate between disaster recovery and business : 1. differentiate between disaster recovery and business continuity. in your answer provide examples of the processes
Corporate governance a board of directorsbest buys board is : corporate governance a. board of directorsbest buys board is elected by the shareholders to oversee the business and
The class is international relation1-what are the essential : the class is international relation.1-what are the essential elements of revolutions? please use some real world

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Describe why algorithm runs in linear time-adjacency matrix

Rreached from every other vertex. Describe why your algorithm runs in linear time (O(V2) on an adjacency matrix; O(E+V) on an adjacency list).

  Determine purpose of queue in breadth-first traversal

Following refer to breadth-first traversals of graphs and trees. a. Determine the purpose of queue in breadth-first traversal?

  Define an enumeration type called response

define an enumeration type called Response with the possible values Yes, No, and Maybe. Yes should be 1, No should be 0, and-1

  Creating sample spreadsheet for household budget

You do not need to put in personal data or actual values if you do not wish, but you must include some information for each of the various categories and income and expense line items.

  Determine expected number of collisions use hash function

Assume we use hash function h to hash n distinct keys into the array T of length m. Suppose simple uniform hashing, determine the expected number of collisions?

  Create algorithm which generates access control matrix

Create an algorithm which generates the access control matrix A for any given history matrix H of the Chinese Wall model.

  Algorithm to produce a list of customers

Draw an algorithm to produce a list of customers from the Glad Rags Clothing Company's customer master file.

  Finding the values of queuefront and queuerear

Assume that queue is a queue type object and the size of the array-implementing queue is 100. Also, assume that the value of the queueFront is 25 and the value of queueRear is twenty-five.

  Question about java programming

Define a class named Document that have an instance variable of type String named text that stores any textual content for the file. Design a technique named toString that returns the text field and also include a method to set this value.

  What is the worst case of avl tree?

the binary tree can look like a linked list in the worst case. What is the worst case of AVL tree? To get an idea, do the following: What is the minimum # of nodes in each of the AVL trees with heights 2, 3, 4, and 5?Explain please.

  Discussion on data mining techniques

The tax authorities working for many governments are often confronted with challenge of detecting tax evasion and fraud. Suppose you work at income tax department.

  Portfolio website containing thumbnail imagery

Explain in general terms what you think the role of good design is. Next, recognize 3-characteristics of an effective gallery website. Then find an example of a portfolio website containing thumbnail imagery.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd