Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Typos

...

  1. Configuration of the Fragments - i.e. the protocol, connection and authentication methods to be used for the source and target parts of the operation.
  2. Configuration of the Profile - i.e.
    • the operation to be carried out (e.g. copy or move),
    • the fragments specified in Step 1 that are to be used for the source and target parts of the transfer and
    • any specific directories that are to be used.
    • Note that the Profile can also be used to specify other elements such as any notifications to be made or preprocessing that is to be carried out. These will be described later onin other parts of this manual.
  3. Calling the Configuration and Profile from the command line, a batch file or via the JADE API.

...

The first step in the configuration is to configure the ProtocolFragments to be used for the transfer from the source. Other fragments are not required for this example.

These Fragments are  XML elements that specify how transfers are to be carried out. Protocol fragments can be thought of as predefined connection specifications. They are protocol-specific - the FTP protocol, for example, brings a different set of features and constraints than WebDAV protocol.

Fragments are not operation-specific - a fragment could be used as the target for one operation and then as a source for a subsequent one or in a Copy operation and then in a Remove.

Any number of Fragments can be predefined in a Configuration.

Fragments are given name attributes, with which they will be referenced from the file transfer profile as shown in the next step.

...