System Configuration
   HOME

TheInfoList



OR:

A system configuration (SC) in
systems engineering Systems engineering is an interdisciplinary field of engineering and engineering management that focuses on how to design, integrate, and manage complex systems over their enterprise life cycle, life cycles. At its core, systems engineering util ...
defines the computers, processes, and devices that compose the system and its boundary. More generally, the system configuration is the specific definition of the elements that define and/or prescribe what a system is composed of. Alternatively, the term "system configuration" can be used to relate to a ''model'' (declarative) for abstract generalized systems. In this sense, the usage of the configuration information is not tailored to any specific usage, but stands alone as a data set. A properly-configured system avoids resource-conflict problems, and makes it easier to upgrade a system with new equipment.....


Sample configuration

The following is a basic SC
XML Extensible Markup Language (XML) is a markup language and file format for storing, transmitting, and reconstructing arbitrary data. It defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. T ...
System Configuration: ''Description'': This provides information about a single "site" (MyHouse) and specifies that there is one host with ''user-setup'' and ''mysql-db'' components. The host must have an account on it for a user named ''mysql'', with appropriate parameters. Notice that the configuration ''schema'' requires no
XML Extensible Markup Language (XML) is a markup language and file format for storing, transmitting, and reconstructing arbitrary data. It defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. T ...
tags that are
Windows Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for serv ...
- or
UNIX Unix (; trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, whose development started in 1969 at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and ot ...
-specific. It simply presents ''data'' as standalone information – with no pretense for how the data is to be used. This is the hallmark for a good system configuration model.


Further extensions

The above model can be extended. For example, the ''user'' could have more attributes like "preferences" and "password". The components could depend on other components. Properties can be defined that are passed into sub-elements. The extensions can be endless (WATCHOUT: ''complexity'') and must be managed and well-thought-out to prevent "breaking" the idea of the system configuration.


Usage

The usage for the model in practical terms falls into several categories:
documentation Documentation is any communicable material that is used to describe, explain or instruct regarding some attributes of an object, system or procedure, such as its parts, assembly, installation, maintenance and use. As a form of knowledge manageme ...
,
deployment Deployment may refer to: Engineering and software Concepts * Blue-green deployment, a method of installing changes to a web, app, or database server by swapping alternating production and staging servers * Continuous deployment, a software en ...
& operations.


Documentation

One use of the configuration is to simply record what a system ''is''. This documentation could in turn become quite extensive, thus complicating the data model. It is important to distinguish between ''configuration'' data and ''descriptive'' data. Of course comments can be applied at any level, even in most tools, however the bloating of the data can reduce its usefulness. For example, the system configuration is not a place to record historical changes, or descriptions of design and intent for the various elements. The configuration data is simply to be "what it is" or "what we want it to be".


Deployment

Deployment involves interpreting a configuration data set and acting on that data to realize the configure the system accordingly. This may simply be a validation of what's there to confirm that the configuration is in effect. Examples include a Perl library launched from the command line to read the configuration and begin launching processes on the local or remote hosts to install components. Also while the system is running, there may be a ''SystemConfiguration'' service that provides an interface (i.e.
CORBA The Common Object Request Broker Architecture (CORBA) is a standard defined by the Object Management Group (OMG) designed to facilitate the communication of systems that are deployed on diverse platforms. CORBA enables collaboration between sys ...
IDL interfaces) for other system applications to use to access the configuration data, and perform deployment-like actions.


Operations

When the system is in operation, there may be uses for the configuration data by specific kinds of services in the system. For example, a ''Secnager'' may access the configuration to acquire the MD5 passwords for the user accounts that are allowed to log into hosts remotely. A ''system monitor'' service (see:
system monitoring A system monitor is a hardware or software component used to monitor system resources and performance in a computer system. Among the management issues regarding use of system monitoring tools are resource usage and privacy. Overview Software ...
) may use the data to determine "what to monitor" and "how to monitor" the system elements. A ''PresentationManager'' might use the data to access ''menu-items'' and ''views'' based on user access privileges.


References

{{Unreferenced, date=April 2009 Systems engineering