Framework for restricting resources consumed by ghost agents
First Claim
1. A method for restricting resources consumed by ghost agents within a domain of a grid computing environment comprising the steps of:
- identifying a host, wherein the host is a software object operating within the grid environment and movable from one grid to another grid within the grid environment;
associating a ghost agent with the host, wherein the ghost agent is configured to replicate and record at least one action of the host, wherein the ghost agent follows the movement of the associated host;
registering the ghost agent with a ghost registry of the domain, wherein the ghost agent is de-registered when the ghost agent leaves the domain;
responsive to said registering, conveying a containment policy to said ghost agent from the ghost registry, wherein the containment policy is dynamically altered when a ghost agent is registered or de-registered with the ghost registry and a update of the containment policy is broadcasted to registered ghost agents;
determining a resource utilization value for the ghost agent;
comparing the resource utilization value to a limit established by the containment policy; and
if said limit is exceeded, preventing the ghost agent from executing at least one operation.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for restricting resources consumed by a ghost agent can include the step of identifying a host, which is a software object operating within the grid environment and movable from one grid to another grid within the grid environment. The method also can include the step of associating a ghost agent with the host. The ghost agent is configured to replicate and record at least one action of the host and follows the movement of the associated host. Additionally, the ghost agent can be registered with a ghost registry of the domain in which it is disposed. Once registered, a containment policy for the domain can be received by the ghost agent. The ghost agent can be configured according to the received containment policy. The containment policy can be utilized to restrict resources that are available to the ghost agent.
26 Citations
6 Claims
-
1. A method for restricting resources consumed by ghost agents within a domain of a grid computing environment comprising the steps of:
-
identifying a host, wherein the host is a software object operating within the grid environment and movable from one grid to another grid within the grid environment; associating a ghost agent with the host, wherein the ghost agent is configured to replicate and record at least one action of the host, wherein the ghost agent follows the movement of the associated host; registering the ghost agent with a ghost registry of the domain, wherein the ghost agent is de-registered when the ghost agent leaves the domain; responsive to said registering, conveying a containment policy to said ghost agent from the ghost registry, wherein the containment policy is dynamically altered when a ghost agent is registered or de-registered with the ghost registry and a update of the containment policy is broadcasted to registered ghost agents; determining a resource utilization value for the ghost agent; comparing the resource utilization value to a limit established by the containment policy; and if said limit is exceeded, preventing the ghost agent from executing at least one operation. - View Dependent Claims (2)
-
-
3. A system for restricting resources consumed by ghost agents within a domain of a grid environment, the system comprising:
-
a host, wherein the host is a software object operating within the grid environment and movable from one grid to another grid within the grid environment; a ghost agent associated with the host, wherein the ghost agent is configured to replicate and record at least one action of the host, wherein the ghost agent follows the movement of the associated host; means for registering the ghost agent with a ghost registry of the domain, wherein the ghost agent is de-registered when the ghost agent leaves the domain; means for conveying, responsive to the registering, a containment policy to the ghost agent from the ghost registry, wherein the containment policy is dynamically altered when a ghost agent is registered or de-registered with the ghost registry and a update of the containment policy is broadcasted to registered ghost agents; means for determining a resource utilization value for the ghost agent; means for comparing the resource utilization value to a limit established by the containment policy; and means for, preventing the ghost agent from executing at least one operation, if the limit is exceeded.
-
-
4. A machine-readable storage having stored thereon, a computer program having a plurality of code sections, said code sections executable by a computer for causing the computer to perform a method for restricting resources consumed by ghost agents within a domain of a grid computing environment comprising the steps of:
-
identifying a host, wherein the host is a software object operating within the grid environment and movable from one grid to another grid within the grid environment; associating a ghost agent with the host, wherein the ghost agent is configured to replicate and record at least one action of the host, wherein the ghost agent follows the movement of the associated host; registering the ghost agent with a ghost registry of the domain, wherein the ghost agent is de-registered when the ghost agent leaves the domain; responsive to said registering, conveying a containment policy to said ghost agent from the ghost registry, wherein the containment policy is dynamically altered when a ghost agent is registered or de-registered with the ghost registry and a update of the containment policy is broadcasted to registered ghost agents; determining a resource utilization value for the ghost agent; comparing the resource utilization value to a limit established by the containment policy; and if said limit is exceeded, preventing the ghost agent from executing at least one operation. - View Dependent Claims (5)
-
-
6. A system for restricting resources consumed by a ghost agent comprising:
-
a processing element of a computing resource within a grid environment, wherein the processing element is associated with a domain of the grid environment, and wherein the processing element is configured for; identifying a host, wherein the host is a software object operating within the grid environment and movable from one grid to another grid within the grid environment; associating a ghost agent with the host, wherein the ghost agent is configured to replicate and record at least one action of the host, wherein the ghost agent follows the movement of the associated host; registering the ghost agent with a ghost registry of the domain, wherein the ghost agent is de-registered when the ghost agent leaves the domain; responsive to said registering, conveying a containment policy to said ghost agent from the ghost registry, wherein the containment policy is dynamically altered when a ghost agent is registered or de-registered with the ghost registry and a update of the containment policy is broadcasted to registered ghost agents; determining a resource utilization value for the ghost agent; comparing the resource utilization value to a limit established by the containment policy; and if said limit is exceeded, preventing the ghost agent from executing at least one operation.
-
Specification