Académique Documents
Professionnel Documents
Culture Documents
PROFILE
E - Mail : alekhya_kk7@yahoo.com
1
CONTENTS
PG NO
ABSTRACT 4
1. INTRODUCTION 5
2. THE GRID 5
3. BEGINNING OF GRID 5
6. TYPES OF GRID 8
8. GRID COMPONENTS 9
9. ADVANTAGES 14
11. CONCLUSION 14
12. BIBLIOGRAPHY 15
2
LIST OF FIGURES
FIG NO NAME PG NO
4 Broker Service 11
5 Scheduler 12
6 Data Management 13
7 Gram 13
3
Abstract
geneous resources for solving large-scale problems in science, engineering, and com-
merce. The resources in the Grid are heterogeneous and geographically distributed.
Availability, usage and cost policies vary depending on the particular user, time, prior-
ities and goals. It enables the regulation of supply and demand for resources.
motivates the users to trade-off between deadline, budget, and the required level of
This paper focuses on introduction, grid definition and its evolution. It covers
about grid characteristics, types of grids and an example describing a community grid
4
1. INTRODUC- to provide a virtual plat-
5
3. BEGINNINGS systems. However, in
6
different focus than dis- t
tributed computing re- r
search. Grid research a
focuses on addressing l
the problems of integra- i
tion and management of z
software. I-WAY a
opened the door for t
considerable activity in i
the development of Grid o
software. n
4. GRID COMPUT- ;
ING CHARAC-
a
TERSTICS
n
An enterprise-comput-
d
ing grid is characterized
by three primary fea-
• D
tures -
y
• D
n
i
a
v
m
e
i
r
s
s
m
i
Diversity:
t
A typical com-
y
puting grid consists of
;
many hundreds of man-
• D
aged resources of vari-
e
ous kinds including
c
servers, storage, Data-
e
base Servers, Applica-
n
7
tion Servers, Enterprise however, the systems
Applications, and sys- and applications need to
tem services like Direct- be able to flexibly adapt
ory Services, Security to changing demand.
and Identity Manage- For instance, with the
ment Services, and oth- late binding nature and
ers. Managing these re- cross-platform proper-
sources and their life ties of web services, an
cycle is a complex chal- application deployed on
lenge. the grid may consist of a
Decentralization: constantly changing set
Traditional dis- of components. At dif-
tributed systems have ferent points in time,
typically been managed these components can
from a central adminis- be hosted on different
tration point. A comput- nodes in the network.
ing grid further com- Managing an applica-
pounds these challenges tion in such a dynamic
since the resources can environment can be a
be even more decentral- challenging undertak-
ized and may be geo- ing.
graphically distributed 5. A COMMUNITY
across many different OF GRID MODEL
data centers within an
Over the last
enterprise.
decade, the Grid com-
Dynamism:
munity has begun to
Components of a
converge on a layered
traditional application
model that allows devel-
typically run in a static
opment of the complex
environment without the
system of services and
needing to address rap-
software required to in-
idly changing demands.
tegrate Grid resources.
In a computing grid,
The Community Grid
8
Model (a layered ab-
straction of the grid) be-
ing developed in a
loosely coordinated
manner throughout aca-
demia and the commer-
cial sector.
The bottom hori-
Figure 1: Layered archi-
zontal layer of the Com-
tecture of the Com-
munity Grid Model con-
munity Grid Model.
sists of the hardware re-
The next hori-
sources that underlie the
zontal layer (common
Grid. Such resources in-
infrastructure) consists
clude computers, net-
of the software services
works, data archives, in-
and systems, which vir-
struments, visualization
tualized the Grid. The
devices and so on.
key concept at the com-
Moreover, the resource
mon infrastructure layer
pool represented by this
is community agree-
layer is highly dynamic,
ment on software,
both as a result of new
which will represent the
resources being added
Grid as a unified virtual
to the mix and old re-
platform and provide
sources being retired,
the target for more fo-
and as a result of vary-
cused software and ap-
ing observable perform-
plications.
ance of the resources in
The next hori-
the shared, multi-user
zontal layer (user and
environment of the
application-focused
Grid.
Grid middleware, tools
and services) contains
software packages built
atop the common infra-
9
structure. This software grid is most commonly
serves to enable applica- used with large numbers
tions to more product- of desktop machines.
ively use Grid resources Machines are scavenged
by masking some of the for available CPU
complexity involved in cycles and other re-
system activities such as sources. Owners of the
authentication, file desktop machines are
transfer. usually given control
6. TYPES OF over when their re-
10
Another com- topology in or-
mon distributed com- der to share and
puting model that is of- collaborate.
ten associated with or Many Grid dir-
confused with Grid ectory services
computing is peer-to- implementations
peer computing. In fact, are based on past
some consider this is successful mod-
another form of Grid els, such as
computing. LDAP, DNS,
7. THE KIND OF network man-
11
tribute tasks and resources -- but
data manage- it can mean a lot
ment across sys- more. For in-
tems to decrease stance, message
the chance of integrity and
bottlenecks. message confid-
• Developer tools. entiality are cru-
Every arena of cial to financial
computing en- and healthcare
deavor requires environments
tools that allow 8.GRID COMPON-
developers to ENTS:A HIGH
succeed. Tools
LEVEL PER-
for grid de-
SPECTIVE
velopers focus
Depending on
on different
the grid design and its
niches (file
expected use, some of
transfer, commu-
these components may
nications, envir-
or may not be required,
onment control),
and in some cases they
and range from
may be combined to
utilities to full-
form a hybrid compon-
blown APIs.
ent.
• Security. Secur-
8.1. Portal/user inter-
ity in a grid en-
face
vironment can
Just as a con-
mean authentica-
sumer sees the power
tion and author-
grid as a receptacle in
ization -- in oth-
the wall, a grid user
er words, con-
should not see all of the
trolling
complexities of the
who/what can
computing grid. Al-
access a grid’s
though the user inter-
12
face can come in many security, including au-
forms and be applica- thentication, authoriza-
tion-specific. A grid tion, data encryption,
portal provides the in- and so on. The Grid Se-
terface for a user to curity Infrastructure
launch applications that (GSI) component of the
will use the resources Globus Toolkit provides
and services provided robust security mechan-
by the grid. From this isms. The GSI includes
perspective, the user an OpenSSL imple-
sees the grid as a virtual mentation. It also
computing resource just provides a single sign-
as the consumer of on mechanism, so that
power sees the recept- once a user is authentic-
acle as an. interface to a ated, a proxy certificate
virtual generator. is created and used
when performing ac-
tions within the grid.
When designing your
grid environment, you
may use the GSI sign-in
to grant access to the
portal, or you may have
your own security for
the portal. The portal
Figure 2: Pos-
will then be responsible
sible user view of a grid
for signing in to the
8.2. Security
grid, either using the
A major require-
user's credentials or us-
ment for Grid comput-
ing a generic set of cre-
ing is security. At the
dentials for all author-
base of any grid envir-
ized users of the portal.
onment, there must be
mechanisms to provide
13
This service is called
the Grid Information
Service (GIS), or more
commonly the Monitor-
ing and Discovery Ser-
vice (MDS). This ser-
vice provides informa-
tion about the available
resources within the
Figure 3: grid and their status. A
Security in a broker service could be
grid environ- developed that utilizes
ment MDS.
8.3. Broker
Once authentic-
ated, the user will be
launching an applica-
tion. Based on the ap-
plication, and possibly
on other parameters
provided by the user, the Figure 4: Broker service
next step is to identify 8.4. Scheduler
the available and appro- Once the resources
priate resources to use have been identified, the
within the grid. This next logical step is to
task could be carried out schedule the individual
by a broker function. jobs to run on them. If
Although there is no sets of stand-alone jobs
broker implementation are to be executed with
provided by Globus, no interdependencies,
there is an LDAP-based then a specialized
information service. scheduler may not be
14
required. However, if might be used to sched-
you want to reserve a ule work to be done on
specific resource or en- a cluster, while the
sure that different jobs cluster's scheduler
within the application would handle the actual
run concurrently (for in- scheduling of work on
stance, if they require the cluster's individual
inter-process commu- nodes.
nication), then a job
scheduler should be
used to coordinate the
execution of the jobs.
The Globus Toolkit
does not include such a
scheduler, but there are
several schedulers avail-
able that have been
tested with and can be
used in a Globus grid Figure 5:
environment. It should Scheduler
also be noted that there
could be different levels
of schedulers within a 8.5. Data management
grid environment. For
instance, a cluster could If any data -- in-
be represented as a cluding application
single resource. The modules -- must be
cluster may have its moved or made access-
own scheduler to help ible to the nodes where
manage the nodes it an application's jobs
contains. A higher-level will execute, then there
scheduler (sometimes needs to be a secure and
called a meta scheduler) reliable method for
15
moving files and data to
various nodes within the
grid. The Globus
Toolkit contains a data
management component
that provides such ser-
vices. This component,
know as Grid Access to
Secondary Storage
Figure 6:
(GASS), includes facil-
Data manage-
ities such as GridFTP.
ment
GridFTP is built on top
8.6. Job and resource
of the standard FTP pro-
management
tocol, but adds addition-
With all the oth-
al functions and utilizes
er facilities we have just
the GSI for user authen-
discussed in place, we
tication and authoriza-
now get to the core set
tion. Therefore, once a
of services that help
user has an authentic-
perform actual work in
ated proxy certificate,
a grid environment. The
he can use the GridFTP
Grid Resource Alloca-
facility to move files
tion Manager (GRAM)
without having to go
provides the services to
through a login process
actually launch a job on
to every node involved.
a particular resource,
This facility provides
check its status, and re-
third-party file transfer
trieve its results when it
so that one node can ini-
is complete.
tiate a file transfer
between two other
nodes.
16
9. ADVANTAGES
Grid computing
is about getting com-
puters to work together.
Almost every organiza-
tion is sitting on top of
enormous, unused com-
puting capacity, widely
distributed. Mainframes
are idle 40% of the time
With Grid computing,
businesses can optimize
Figure 7: computing and data re-
Gram sources, pool them for
large capacity work-
8.7 Job flow in a grid loads, share them across
environment networks, and enable
Enabling an ap- collaboration. Many
plication for a grid en- consider Grid comput-
vironment, it is import- ing the next logical step
ant to keep in mind in the evolution of the
these components and Internet, and maturing
how they relate and in- standards and a drop in
teract with one another. the cost of bandwidth
Depending on your grid are fueling the mo-
implementation and ap- mentum we're experien-
plication requirements, cing today. Virtualiza-
there are many ways in tion of the computing
which these pieces can environment .
be put together to create
10. CHAN-
a solution.
LLANGES OF
GRID
17
A word of cau- 11. CONCLUSION
tion should be given to Grid computing in-
the overly enthusiastic. troduces a new concept
The grid is not a silver to IT infrastructures be-
bullet that can take any cause it supports distrib-
application and run it a uted computing over a
1000 times faster network of heterogen-
without the need for eous resources and is
buying any more ma- enabled by open stand-
chines or software. Not ards. Grid computing
every application is suit- works to optimize un-
able or enabled for run- derutilized resources,
ning on a grid. Some decrease capital ex-
kinds of applications penditures, and reduce
simply cannot be paral- the total cost of owner-
lelized. For others, it ship. This solution ex-
can take a large amount tends beyond data pro-
of work to modify them cessing and into inform-
to achieve faster ation management as
throughput. The config- well. Information in this
uration of a grid can context covers data in
greatly affect the per- databases, files, and
formance, reliability, storage devices. In this
and security of an or- article, we outline po-
ganization's computing tential problems and the
infrastructure. For all of means of solving them
these reasons, it is im- in a distributed environ-
portant for us to under- ment. .
stand how far the grid
has evolved today and
12. BIBLIO-
which features are com-
GRAPHY
ing tomorrow or in the
[1] www.ibm.-
distant future
com/grid/index.html
18
[2] Foster, I. and
Kesselman, C.
(eds) (1999) The
Grid: Blueprint
for a New Com-
puting Infra-
structure.. San
Francisco, CA:
Morgan
Kaufmann
[3] Berman, F.,
Fox, G. and Hey,
T. (2003) Grid
Computing:
Making the
Global Infra-
structure a Real-
ity. Chichester:
John Wiley &
Sons.
[4] Web Site as-
sociated with
book, Grid
Computing:
Making the
Global Infra-
structure a Real-
ity,
http://www.-
grid2002.org.
19