Professional Documents
Culture Documents
GRID COMPUTING
A seminar report submitted for the partial fulfilment of the requirements
of
MASTER OF TECHNOLOGY
In
By
Braja Gopal Patra
Anita Padhi
Asst. Professor
Department of Computer Sc. & Engg.
1
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
ABSTRACT
The last decade has seen a substantial increase in commodity computer and network
performance, mainly as a result of faster hardware and more sophisticated software.
Nevertheless, there are still problems, in the fields of science, engineering, and business,
which cannot be effectively dealt with using the current generation of supercomputers. In
fact, due to their size and complexity, these problems are often very numerically and/or data
intensive and consequently require a variety of heterogeneous resources that are not
available on a single machine. A number of teams have conducted experimental studies on
the cooperative use of geographically distributed resources unified to act as a single
powerful computer. This new approach is known by several names, such as metacomputing,
scalable computing, global computing, Internet computing, and more recently Grid
computing.
2
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
ACKNOWLEDGEMENT
I would like to take this opportunity to express my deepest gratitude to all the people,
who in various ways lent me their helping hands to achieve my dreams of successfully the
Seminar Report on “Grid Computing”.
I shall be always indebted to my parents & friends, who taught me to respect elders,
gave me a place to stand in this world for inception of very existence, always encouraged me
to do my best and provided necessary support of all kinds to achieve the power of
knowledge.
Last but not least, a special thanks to all of them who could not find a note of mention
in this Seminar Report.
3
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
CERTIFICATE
This is to certify that the Seminar entitled “Grid Computing” has been
submitted by Braja Gopal Patra under my guidance in partial fulfillment of
the degree of Master of Technology in Computer Engineering of NIT, Agartala
during the academic year 2010-2011.
4
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
CONTENTS
1. INTRODUCTION 1
1.1 Benefits of Grid Computing 3
1.2 Levels of Deployment 4
3 GRID ARCHITECTURE
3.1 Fabric: Interfaces to Local Control 9
3.2 Connectivity: Communicating Easily and Securely 10
3.3 Resource: Sharing Single Resources 11
3.4 Collective: Coordinating Multiple Resources 11
3.5 Applications 13
4 THREATS IN GRID 15
5 SECURITY MEASURES
5.1 PKI Infrastructure 15
5.2 Kerberos 16
5.3 SAML and Identity Federations 17
5.4 Passwords 18
5.5 Credential Transitions 18
6 GRID APPLICATIONS
6.1 Distributed Supercomputing 19
6.2 High-Throughput Computing 20
6.3 On-Demand Computing 20
6.4 Data-Intensive Computing 21
6.5 Collaborative Computing 21
7 CONCLUSIONS 23
8 REFERENCES 23
5
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
1. INTRODUCTION
The popularity of the Internet as well as the availability of powerful computers and
high-speed network technologies as low-cost commodity components is changing the way
we use computers today. These technology opportunities have led to the possibility of using
distributed computers as a single, unified computing resource, leading to what is popularly
known as Grid computing. The term Grid is chosen as an analogy to a power Grid that
provides consistent, pervasive, dependable, transparent access to electricity irrespective of
its source. A detailed analysis of this analogy can be found in. This new approach to
network computing is known by several names, such as metacomputing, scalable
computing, global computing, Internet computing, and more recently peer-to- peer (P2P)
computing.
6
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
Grids enable the sharing, selection, and aggregation of a wide variety of resources
including supercomputers, storage systems, data sources, and specialized devices (see
Figure 1)that are geographically distributed and owned by different organizations for
solving large-scale computational and data intensive problems in science, engineering, and
commerce. Thus creating virtual organizations and enterprises as a temporary alliance of
enterprises or organizations that come together to share resources and skills, core
competencies, or resources in order to better respond to business opportunities or large-scale
application processing requirements, and whose cooperation is supported by computer
networks.
Computational services: These are concerned with providing secure services for executing
application jobs on distributed computational resources individually or collectively.
Resources brokers provide the services for collective use of distributed resources. A Grid
providing computational services is often called a computational Grid. Some examples of
computational Grids are: NASA IPG, the World Wide Grid, and the NSF TeraGrid .
Data services: These are concerned with proving secure access to distributed datasets and
their management. To provide a scalable storage and access to the data sets, they may be
replicated, catalogued, and even different datasets stored in different locations to create an
illusion of mass storage. The processing of datasets is carried out using computational Grid
services and such a combination is commonly called data Grids. Sample applications that
need such services for management, sharing, and processing of large datasets are high-
energy physics and accessing distributed chemical databases for drug design.
Application services: These are concerned with application management and providing
access to remote software and libraries transparently. The emerging technologies such as
Web services are expected to play a leading role in defining application services. They build
on computational and data services provided by the Grid. An example system that can be
used to develop such services is NetSolve.
Information services: These are concerned with the extraction and presentation of data with
meaning by using the services of computational, data, and/or application services. The low-
7
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
level details handled by this are the way that information is represented, stored, accessed,
shared, and maintained. Given its key role in many scientific endeavors, the Web is the
obvious point of departure for this level.
Knowledge service:These are concerned with the way that knowledge is acquired, used,
retrieved, published, and maintained to assist users in achieving their particular goals and
objectives. Knowledge is understood as information applied to achieve a goal, solve a
problem, or execute a decision. An example of this is data mining for automatically building
a new knowledge.
Grid computing can provide many benefits not available with traditional computing
models:
Better utilization of resources— Grid computing uses distributed resources more efficiently
and delivers more usable computing power. This can decrease time-to-market, allow for
innovation, or enable additional testing and simulation for improved product quality. By
employing existing resources, grid computing helps protect IT investments, containing costs
while providing more capacity.
8
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
Scalability— Grids can grow seamlessly over time, allowing many thousands of processors
to be integrated into one cluster. Components can be updated independently and additional
resources can be added as needed, reducing large one-time expenses.
Flexibility— Grid computing provides computing power where it is needed most, helping to
better meet dynamically changing work loads. Grids can contain heterogeneous compute
nodes, allowing resources to be added and removed as needs dictate.
Grid computing can be divided into three logical levels of deployment: Cluster
Grids, Enterprise Grids, and Global Grids.
Figure 2 Three levels of grid computing: cluster, enterprise, and global grids.
9
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
1.2.2 Enterprise Grids
As capacity needs increase, multiple Cluster Grids can be combined into an
Enterprise Grid. Enterprise Grids enable multiple projects or departments to share
computing resources in a cooperative way. Enterprise Grids typically contain resources
from multiple administrative domains, but are located in the same geographic location.
This section briefly highlights some of the general principles that underlie the
construction of the Grid. In particular, the idealized design features that are required by a
Grid to provide users with a seamless computing environment are discussed. Four main
aspects characterize a Grid.
Scalability: A Grid might grow from a few integrated resources to millions. This raises the
problem of potential performance degradation as the size of Grids increases. Consequently,
applications that require a large number of geographically located resources must be
designed to be latency and bandwidth tolerant.
Dynamicity or adaptability: In a Grid, resource failure is the rule rather than the exception.
In fact, with so many resources in a Grid, the probability of some resource failing is high.
Resource managers or applications must tailor their behavior dynamically and use the
available resources and services efficiently and effectively.
10
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
The following are the main design features required by a Grid environment.
Information services A Grid is a dynamic environment where the location and types of
services available are constantly changing. A major goal is to make all resources accessible
to any process in the system, without regard to the relative location of the resource user. It is
necessary to provide mechanisms to enable a rich environment in which information is
readily obtained by requesting services. The Grid information (registration and directory)
services components provide the mechanisms for registering and obtaining information
about the Grid structure, resources, services, and status.
Naming services: In a Grid, like in any distributed system, names are used to refer to a wide
variety of objects such as computers, services, or data objects. The naming service provides
a uniform name space across the complete Grid environment. Typical naming services are
provided by the international X.500 naming scheme or DNS, the Internet’s scheme.
Distributed file systems and caching: Distributed applications, more often than not, require
access to files distributed among many servers. A distributed file system is therefore a key
component in a distributed system. From an applications point of view it is important that a
distributed file system can provide a uniform global namespace, support a range of file I/O
protocols, require little or no program modification, and provide means that enable
performance optimizations to be implemented, such as the usage of caches.
Security and authorization:Any distributed system involves all four aspects of security:
confidentiality, integrity, authentication, and accountability. Security within a Grid
environment is a complex issue requiring diverse resources autonomously administered to
interact in a manner that does not impact the usability of the resources or introduces security
holes/lapses in individual systems or the environments as a whole. A security infrastructure
is the key to the success or failure of a Grid environment.
11
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
System status and fault tolerance: To provide a reliable and robust environment it is
important that a means of monitoring resources and applications is provided. To accomplish
this task, tools that monitor resources and application need to be deployed.
User and administrative GUI: The interfaces to the services and resources available should
be intuitive and easy to use. In addition, they should work on a range of different platforms
and operating systems. They also need to take advantage of Web technologies to offer a
view of portal supercomputing. The Web-centric approach to access supercomputing
resources should enable users to access any resource from anywhere over any platform at
any time. That means, the users should be allowed to submit their jobs to computational
resources through a Web interface from any of the accessible platforms such as PCs, laptops,
or Personal Digital Assistant, thus supporting the ubiquitous access to the Grid. The
provision of access to scientific applications through the Web (e.g. RWCPs parallel protein
information analysis system) leads to the creation of science portals.
12
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
3. GRID ARCHITECTURE
In specifying the various layers of the Grid architecture, we follow the principles of
the “hourglass model”. The narrow neck of the hourglass defines a small set of core
abstractions and protocols (e.g., TCP and HTTP in the Internet), onto which many different
high-level behaviors can be mapped (the top of the hourglass), and which themselves can be
mapped onto many different underlying technologies (the base of the hourglass). By
definition, the number of protocols defined at the neck must be small. In our architecture,
the neck of the hourglass consists of Resource and Connectivity protocols, which facilitate
the sharing of individual resources. Protocols at these layers are designed so that they can be
implemented on top of a diverse range of resource types, defined at the Fabric layer, and
can in turn be used to construct a wide range of global services and application-specific
behaviors at the Collective layer—so called because they involve the coordinated
(“collective”) use of multiple resources.
Figure2. The layered Grid architecture and its relationship to the Internet
protocol architecture. Because the Internet protocol architecture extends
from network to application, there is a mapping from Grid layers into
Internet layers.
13
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
The Grid Fabric layer provides the resources to which shared access is mediated by
Grid protocols: for example, computational resources, storage systems, catalogs, network
resources, and sensors. A “resource” may be a logical entity, such as a distributed file
system, computer cluster, or distributed computer pool in such cases, a resource
implementation may involve internal protocols (e.g., the NFS storage access protocol or a
cluster resource management system’s process management protocol), but these are not the
concern of Grid architecture.
Computational resources: Mechanisms are required for starting programs and for
monitoring and controlling the execution of the resulting processes. Management
mechanisms that allow control over the resources allocated to processes are useful, as are
advance reservation mechanisms. Enquiry functions are needed for determining hardware
and software characteristics as well as relevant state information such as current load and
queue state in the case of scheduler-managed resources.
Storage resources: Mechanisms are required for putting and getting files. Third-party and
high-performance (e.g., striped) transfers are useful. So are mechanisms for reading and
writing subsets of a file and/or executing remote data selection or reduction functions.
Management mechanisms that allow control over the resources allocated to data transfers
(space, disk bandwidth, network bandwidth, CPU) are useful, as are advance reservation
14
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
mechanisms. Enquiry functions are needed for determining hardware and software
characteristics as well as relevant load information such as available space and bandwidth
utilization.
Network resources: Management mechanisms that provide control over the resources
allocated to network transfers (e.g., prioritization, reservation) can be useful. Enquiry
functions should be provided to determine network characteristics and load.
Code repositories: This specialized form of storage resource requires mechanisms for
managing versioned source and object code: for example, a control system such as CVS.
Catalogs: This specialized form of storage resource requires mechanisms for implementing
catalog query and update operations: for example, a relational database.
With respect to security aspects of the Connectivity layer, we observe that the
complexity of the security problem makes it important that any solutions be based on
existing standards whenever possible. As with communication, many of the security
standards developed within the context of the Internet protocol suite are applicable.
Single sign on: Users must be able to “log on” (authenticate) just once and then have
access to multiple Grid resources defined in the Fabric layer, without further user
intervention.
Delegation: A user must be able to endow a program with the ability to run on that user’s
behalf, so that the program is able to access the resources on which the user is authorized.
The program should (optionally) also be able to conditionally delegate a subset of its rights
to another program (sometimes referred to as restricted delegation).
15
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
Integration with various local security solutions: Each site or resource provider may
employ any of a variety of local security solutions, including Kerberos and UNIX security.
Grid security solutions must be able to interoperate with these various local solutions. They
cannot, realistically, require wholesale replacement of local security solutions but rather
must allow mapping into the local environment.
User-based trust relationships: In order for a user to use resources from multiple providers
together, the security system must not require each of the resource providers to cooperate or
interact with each other in configuring the security environment. For example, if a user has
the right to use sites A and B, the user should be able to use sites A and B together without
requiring that A’s and B’s security administrators interact.
Information protocolsare used to obtain information about the structure and state of a
resource, for example, its configuration, current load, and usage policy (e.g., cost).
While the Resource layer is focused on interactions with a single resource, the next
layer in the architecture contains protocols and services (and APIs and SDKs) that are not
associated with any one specific resource but rather are global in nature and capture
16
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
interactions across collections of resources. For this reason, we refer to the next layer of the
architecture as the Collective layer. Because Collective components build on the narrow
Resource and Connectivity layer “neck” in the protocol hourglass, they can implement a
wide variety of sharing behaviors without placing new requirements on the resources being
shared. For example:
Data replication servicessupport the management of VO storage (and perhaps also network
and computing) resources to maximize data access performance with respect to metrics such
as response time, reliability, and cost.
Grid-enabled programming systemsenable familiar programming models to be used in Grid
environments, using various Grid services to address resource discovery, security, resource
allocation, and other concerns. Examples include Grid-enabled implementations of the
Message Passing Interface and manager-worker frameworks.
Workload management systems and collaboration frameworks are also known as problem
solving environments (“PSEs”)—provide for the description, use, and management of multi-
step, asynchronous, multi-component workflows
Software discovery servicesdiscover and select the best software implementation and
execution platform based on the parameters of the problem being solved. Examples include
NetSolve and Ninf.
Community accounting and payment servicesgather resource usage information for the
purpose of accounting, payment, and/or limiting of resource usage by community members.
17
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
Collaboratory servicessupport the coordinated exchange of information within potentially
large user communities, whether synchronously or asynchronously. Examples are
CAVERNsoft, Access Grid, and commodity groupware systems.
These examples illustrate the wide variety of Collective layer protocols and services
that are encountered in practice. Notice that while Resource layer protocols must be general
in nature and are widely deployed, Collective layer protocols span the spectrum from
general purpose to highly application or domain specific, with the latter existing perhaps
only within specific VOs.
Figure3. Collective and Resource layer protocols, services, APIs, and SDKS
can be combined in a variety of ways to deliver functionality to applications.
3.5 Applications
The final layer in our Grid architecture comprises the user applications that operate
within a VO environment. Figure illustrates an application programmer’s view of Grid
architecture. Applications are constructed in terms of, and by calling upon, services defined
at any layer. At each layer, we have well-defined protocols that provide access to some
useful service: resource management, data access, resource discovery, and so forth. At each
layer, APIs may also be defined whose implementation (ideally provided by third-party
SDKs) exchange protocol messages with the appropriate service(s) to perform desired
actions.
Figure4. APIs are implemented by software development kits (SDKs), which in turn
use Grid protocols to interact with network services that provide capabilities to the
end user. Higher level SDKs can provide functionality that is not directly mapped to
a specific protocol, but may combine protocol operations with calls to additional
APIs as well as implement local functionality. Solid lines represent a direct call; dash
lines protocol interactions.
We emphasize that what we label “applications” and show in a single layer in Figure 4 may
in practice call upon sophisticated frameworks and libraries (e.g., the Common Component
Architecture , SciRun , CORBA , Cactus, workflow systems) and feature much internal
structure that would, if captured in our figure, expand it out to many times its current size.
These frameworks may themselves define protocols, services, and/or APIs. (E.g., the
Simple Workflow Access Protocol) However, these issues are beyond the scope of this
article, which addresses only the most fundamental protocols and services required in a
Grid.
19
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
4. THREATS IN GRID
Unlike traditional cluster computing in which only a small number of users work in a
closed system, Grid computing exposes local clusters to a large number of users via the
Internet using open Grid middlewares such as Globus, gLite and Unicore. Like most
complex IT systems, hence middleware solutions exhibit a number of security problems
opening the entire system to attack. As a consequence, Grids are an attractive target for
intruders, since the Grid offers standardized access to a large number of machines, which
can be misused in various ways. The considerable computing power of clusters exposed via
the Grid can be used to break passwords, and the large storage capacity is perfect for storing
and sharing illegal software and data. The generous bandwidth of the Internet is ideal for
launching Denial-of-Service (DoS) attacks or for hosting file sharing services, to name just
a few attacks.
5. SECURITY MEASURE
20
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
5.1.1 PKI in Grids
Even though both SPKI and PGP offer interesting features, to our best knowledge they
are not used in any current Grid environment. Contemporary Grids that are based on PKI
either use the standard X.509 KI or they use a special form of digital certificates derived
from X.509. The former approach is employed by the UNICORE grid middleware, where
jobs are signed by the owner’s private key before submission. In thebasic version, the
UNICORE infrastructure than uses the X.509 certificate to verify the signature during the
job processing. Other grid systems based on PKI use certificates in a different way. Instead
of creating long-lived digital signatures, they provide users with mechanism of single sign-
on (SSO) and credential delegation, which allows users to submit a job to or request an
operation at the infrastructure along with appropriate credentials. The credentials are used by
the job and middleware component to perform any operations that are necessary to complete
the job on the user’s behalf. Proxy certificates are very often used as the mechanism
providing SSO and delegation. A proxy certificate is a special kind of X.509 certificate that
is signed by an ordinary user, not by a dedicated CA. The generation of a proxy certificate is
performed during the login stage by the user. Lifetime of proxy certificates is very short,
usually ten hours. Proxy certificates provide an efficient mechanism for SSO, however they
also present new issues. One of the most severe one is a lack of revocation mechanism that
could be used to revoke existing proxy certificate. Another issue concerns support of long-
running jobs and other operations that last longer than is the proxy lifetime. Despite a
renewal mechanism has been designed and implemented, it is not an ideal solution since it
requires introduction of an additional trusted component. Proxy certificates are often
managed using MyProxy, which provides a repository where proxy certificates stored and
later retrieved using a password or another credential assigned during the storing step. In
addition to support of the repository mode, a MyProxy server can also be configured to act
as a CA issuing standard X.509 certificates. Regardless particular type of certificates or PKI,
one of the key drawbacks of the PKI is that current tools and producers for certificate
management are too complicated for users. This leads either to rejection of the PKI or to
insecure private-key management, which dis-empowers the entire Grid infrastructure.
5.2 Kerberos
21
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
authentication amongusers and services involves contacting KDC. This feature makes it hard
to deployKerberos in highly distributed environments since users must be registered with
KDCfirst. In order to make Kerberos more scalable, the users’ space can be divided
intoadministrative groups (realms), served by independent KDCs. The Kerberos cross-
realmauthentication mechanism allows seamless interoperability among different realms.
Federating institutions has becoming very popular recently, because it allows users toco-
operate in a secure manner. The concept of federation can be applied to
environmentoperating both Kerberos and PKI, but in this section we primarily focus on
system based on the Shibboleth infrastructure.An identity federation is an infrastructure
connecting user management systemsfrom different institutions to provide standardized
access to information about usersmaintained by their systems. Federations provide a
standardized platform to whichsystems for user management and end applications can
connect and share authenticationand authorization data. Every organization participating in a
federation manages itsusers by a local user management system. An Identity Provider (IdP)
service is builton the top of each local user management system, providing a standardized
interfaceto access authentication information and other attributes about the users. Any party
inthe federation can get this information by calling the IdP service using a
standardizedprotocol. End services (Service Providers—SP) are able to process the data
returned bythe user’s home IdP and use them to make access control decisions. Before users
areallowed to use a service, they have to present a set of attributes issued and signed bytheir
home IdP. These attributes are provided to users or to a service working on theirbehalf upon
proper authentication of the user with the IdP.The major advantage of using the federation
model lies in the fact that users use theirhome institution’s credentials to access any service
in a federation. Whenever users accessa service (SP) and do not have an authenticated
session activated, they are redirectedto their home IdP to authenticate. After successful
authentication they are sent back tothe SP along with additional information about their
identity added by the IdP. The SPaccepts this authentication assessment since it trusts the
IdP, and applies appropriateaccess control methods. Every SP in the federation uses this
mechanism transparentlyfrom the user’s point of view. There is no need to introduce new
credentials for every newservice or to synchronize existing credentials (like passwords)
among different services.Having no additional credentials also means there is no need to
distribute them among theusers. Such an arrangement not only eases credential management
but also makes it moresecure, as users are only required to maintain one piece of
22
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
authentication informationand always authenticate at the same (web) interface. Unlike PKI,
the federation model ismore acceptable to the users, as it is not tied to any particular
authentication method andinstitutions can select the most appropriate method for their users.
5.4 Passwords
Virtually all current grid systems support only a single authentication mechanism
anddo not provide any coordinated way how a user could smoothly change their
credentialtypes. Ideally such transitions would be also supported by the middleware that
couldobtain a credential type according to the needs of the end service or another
middlewarecomponent. Such a capability would ease integration of a Grid with other
systems thatrequire different authentication mechanisms. In this section we provide an
overviewof transition mechanisms that are available from current security components.
Wehave tested all the transition described and also contributed to development of
severalcomponents and mechanisms involved. A schema of transitions can be seen in Fig.
3.The main use-case we have in mind is to ease users’ work and allow them to use abroader
scale of authentication methods instead of dictating a particular one. Accordingto our
experience, if an infrastructure is sufficiently easy to use, it is also safer sinceusers do not
pass over barriers using insecure techniques (such as uncontrolled copyingof private keys,
etc.).
23
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
6. GRID APPLICATIONS
What types of applications will grids are used for? Building on experiences in
gigabittestbeds, the I-WAY network, and other experimental systems, we have identified
five major application classes for computational grids, and described briefly in this section.
More details about applications and their technical requirements are provided in the
referenced chapters.
Distributed interactive simulation (DIS) is a technique used for training and planning
in the military. Realistic scenarios may involve hundreds of thousands of entities, each with
potentially complex behavior patterns. Yet even the largest current supercomputers can
handle at most 20,000 entities. In recent work, researchers at the California Institute of
24
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
Technology have shown how multiple supercomputers can be coupled to achieve record-
breaking levels of performance.
The accurate simulation of complex physical processes can require high spatial and
temporal resolution in order to resolve fine-scale detail. Coupled supercomputers can be
used in such situations to overcome resolution barriers and hence to obtain qualitatively new
scientific results. Although high latencies can pose significant obstacles, coupled
supercomputers have been used successfully in cosmology, high-resolution abinitio
computational chemistry computations, and climate modeling.
Challenging issues from a grid architecture perspective include the need to co schedule
what are often scarce and expensive resources, the scalability of protocols and algorithms to
tens or hundreds of thousands of nodes, latency-tolerant algorithms, and achieving and
maintaining high levels of performance across heterogeneous systems.
The Condor system from the University of Wisconsin is used to manage pools of
hundreds of workstations at universities and laboratories around the world. These resources
have been used for studies as diverse as molecular simulations of liquid crystals, studies of
ground penetrating radar, and the design of diesel engines.More loosely organized efforts
have harnessed tens of thousands of computers distributed worldwide to tackle hard
cryptographic problems.
For example:
The NEOS and NetSolve network-enhanced numerical solver systems allow users to
couple remote software and resources into desktop applications, dispatching to remote
servers calculations that are computationally demanding or that require specialized software.
A computer-enhanced MRI machine and scanning tunneling microscope (STM) developed
at the National Center for Supercomputing Applications use supercomputers to achieve real
time image processing. The result is a significant enhancement in the ability to understand
what we are seeing and, in the case of the microscope, to steer the instrument.
A system developed at the Aerospace Corporation for processing of data from
meteorological satellites uses dynamically acquired supercomputer resources to deliver the
results of a cloud detection algorithm to remote meteorologists in quasi real time.
The challenging issues in on-demand applications derive primarily from the dynamic
nature of resource requirements and the potentially large populations of users and resources.
These issues include resource location, scheduling, code management, configuration, fault
tolerance, security, and payment mechanisms.
Future high-energy physics experiments will generate terabytes of data per day, or
around a peta byte per year. The complex queries used to detect “interesting" events may
need to access large fractions of this data. The scientific collaborators who will access this
data are widely distributed, and hence the data systems in which data is placed are likely to
be distributed as well.
The Digital Sky Survey will, ultimately, make many terabytes of astronomical
photographic data available in numerous network-accessible databases. This facility enables
new approaches to astronomical research based on distributed analysis, assuming that
appropriate computational grid facilities exist.
Modern meteorological forecasting systems make extensive use of data assimilation
to incorporate remote satellite observations. The complete process involves the movement
and processing of many gigabytes of data.
26
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
Challenging issues in data-intensive applications are the scheduling and configuration of
complex, high-volume data flows through multiple levels of hierarchy.
The NICE system developed at the University of Illinois at Chicago allows children
to participate in the creation and maintenance of realistic virtual worlds, for entertainment
and education.
We conclude this section with three general observations. First, we note that even in
this brief survey we see a tremendous variety of already successful applications. This rich
set has been developed despite the significant difficulties faced by programmers developing
grid applications in the absence of a mature grid infrastructure. As grids evolve, we expect
the range and sophistication of applications to increase dramatically. Second, we observe
that almost all of the applications demonstrate a tremendous appetite for computational
resources (CPU, memory, disk, etc.) that cannot be met in a timely fashion by expected
growth in single-system performance. This emphasizes the importance of grid technologies
as a means of sharing computation as well as a data access and communication medium.
Third, we see that many of the applications are interactive, or depend on tight
synchronization with computational components, and hence depend on the availability of a
grid infrastructure able to provide robust performance guarantees.
27
Dept. of Computer Science & Engineering, NIT Agartala
Grid Computing
7. CONCLUSIONS
There are currently a large number of projects and a diverse range of new and
emerging Grid developmental approaches being pursued. These systems range from Grid
frameworks to application testbeds, and from collaborative environments to batch
submission mechanisms.
Grid computing has many promises making today’s computing easier by managing
resources better and creating an environment for advanced apps of tomorrow making it this
applications portable.
8. REFERENCES
4. Shuai Zhang Shufen Zhang Xuebin Chen XiuzhenHuo.The Comparison Between Cloud
Computing and Grid Computing: 2010 International Conference on Computer
Application and System Modeling (ICCASM 2010).
5. http://www.wikipedia.com/gridcomputing/
28
Dept. of Computer Science & Engineering, NIT Agartala