Académique Documents
Professionnel Documents
Culture Documents
*
This research is supported by 863 Project of China (Grant No. 2006AA01A109),
National Natural Science Foundation of China (Grant No. 60773118) and
Program for Changjiang Scholars and Innovative Research Team in University.
329
deployment of grid monitoring service components on maintenance cost and human errors happened in the
newly joined resources. deployment process can be reduced.
z Transparent deployment. The scale and complexity z Fault tolerant. In the automated deployment or update
of today′s grid systems make them increasingly process, with the help of the peer-to-peer networks, our
difficult and time-consuming to deploy. As grid nodes proposed system can automatically adapt to failures in
join and leave quickly, automated resource and service network connections or nodes, as well as to a transient
monitoring must be performed and launched at a population of nodes [11]. And the deployment can
frequency compatible with the dynamic of grid carry on as long as there is one complete copy of the
elements [10]. Further more, automated approaches to monitoring system components, which decreases the
deployment prevent human errors and make the dependence on the central server.
deployment process easier [4].
z Transparent update. The grid is an evolutionary 4. MSRAD
system in which new types of resources and
applications will join at anytime, in this case, an 4.1. Monitoring Architecture
update on the monitoring system is necessary. An
update might require changes to all the nodes which Many sites or institutions participating in the grids
are the potential customers for the new types of comprise multiple clusters or supercomputers. Different
resources and applications. Automated approaches to clusters or supercomputers work independently from each
update should also be employed to facilitate the other. A hierarchical structure is employed to transfer the
massive update of monitoring systems. large amount of monitoring data from the computing
Besides the above requirements, distribution and nodes to the interaction interface hosted at the monitor
deployment of the monitoring system can benefit from the center, see Fig. 2.
following characters of MSRAD. There are three roles in the monitoring architecture: the
z Rapid deployment. Since the deployment and update computing node, the front-end node and the monitor
of the monitoring system involve all the nodes in grid, center. Nodes in different layer are required to deploy
it is important to delivery and deploy all the different modules. To the computing nodes, which locate
components in an efficient way. Our proposed system at the bottom layer, deployment agent, update agent,
can provide rapid deployment of monitoring services controller and sensors have to be installed on them.
to the nodes in a large scale grid. Time consumption Deployment agent has to be installed at the beginning
grows very slowly with the number of target nodes, phase of the deployment. Technically, it can be
which achieves better scalability. implemented using the peer-to-peer client, such as
z Self-organizing. The nodes in our proposed system are BitTorrent. After the transfer of the deployment agent is
able to self-organize into a peer-to-peer overlay to complete, the other modules can be treated as the content
facilitate the distribution and deployment of the delivered by the deployment agent. Sensors are
components. The deployment of monitoring service for responsible for collecting the status of the target
the newly joined node and the update of the deployed resources. Monitoring data are processed into a standard
components can be initiated by the nodes within the format, such as XML file. Update agent executes the
system to reduce the administrator′s participation. The update actions. The controller module is listening to the
network
Monitor Center
Front-End Node
Computing Node
Interaction Interface Database
Communication Module
Update Agent
...
Sensor
Sensor
Sensor
Cluster Supercomputer Cluster
Figure 2. Monitoring architecture of MSRAD
330
to receive instructions from upper layer. Instructions are sends a deployment request to the registration center to
then dispatched to corresponding modules. require the deployment of monitoring service (1).
Besides deployment agent, update agent and controller, b. According to the role of the target node, registration
data aggregator is running on the front-end node of a center replies the request with a source node which
cluster or supercomputer. The data aggregator is in charge contains the required part of the monitoring system.
of aggregating the monitoring data collected from the Meanwhile, registration center will send a notification
individual nodes within clusters or supercomputers. to the source node (2).
Monitor center holds all the monitoring data and users c. Communications between the target node and the
or other grid services can access the data through the source node are established through handshaking.
interaction interface. Communication module is in charge Then, deployment agent module is transferred from the
of the transferring of the instructions and monitoring data. source node to the target node (3). An auxiliary
All the monitoring data is gathered by the global protocol such as the GridFTP is needed to distribute
aggregator and processed by the archiver. Historical the deployment agent.
records can be retrieved within the database. d. The registration center could act as a tracker, which
helps target nodes downloading the same files to find
4.2. Automated Deployment and Update each other in the BitTorrent networks. The target node
contacts the registration center periodically to show it
In MSRAD, the monitoring system images are hosted has which pieces of the deployment files. Then the
in a central repository on a server, called the source node. registration center returns a list of nodes that require
The nodes to deploy the monitoring system are referred to the same deployment file but have different file pieces
as the target nodes. A registration center is needed to (4).
provide the registration services for the source node and e. The target node then establishes a connection to other
the target nodes. Administrator can customize the target nodes and finds out which pieces reside in each
monitoring system′s configuration according to the needs other node [12]. Other modules are distributed via the
for efficiently monitoring, and be assured that the BitTorrent protocol (5).
monitoring system, once deployed, will behave correctly Since the target nodes attempting to deploy the same
in different nodes. The content can be distributed among part of monitoring system could contact to each other
the target nodes using the BitTorrent protocol. simultaneously and download different pieces of the
The MSRAD architecture supports two interactions for deployment file from different nodes, the distribution and
transferring data between source nodes and target nodes: deployment process can be accelerated. The nodes
subscription and push, which correspond to the involved in the deployment form a peer-to-peer overlay,
deployment and update process respectively. Fig. 3 the deployment of the monitoring system is voluntary and
illustrates the subscription and push mode, where solid self-organized, without the administrator′s participation.
lines represent the interactions happened in the With the help of the reliability brought by the BitTorrent
subscription mode and dashed lines represent the ones in protocol, the deployment can continue even under
the push mode. temporary failure of some nodes. In a worst case, the
deployment can carry on as long as there is a complete
Source Node Registration Center
copy in the network, even if the source node is down.
In the push mode, interactions happen in the following
②
⑥ sequence.
⑦ ⑦ a. When a new update is available, the push mode is
⑦ ③ ⑦ ④ enabled by the source node, which sends a notification
⑦ ① to the registration center, and the registration center
Node1 ⑤ ⑤ ② Node5
⑤ will reply with a list contains the IDs of the target
⑤ ⑤ nodes need to deploy the update component (6).
Node2 Node4
Node3 b. The target nodes can download the new update from
the source nodes, or they can download the file blocks
Figure 3. Subscription mode and push mode
for update from other target nodes with the help of the
registration center and the update agent (7).
In the subscription mode, the interaction is initiated by
the target nodes, as shown in Fig. 3. Suppose that node 3
is a newly joined node (target node). Interactions happen 4.3. Interaction Interface
in the following sequence.
a. At first, the target node contacts the registration center We provide a web based interface to administrator and
to notify its arrival and register itself. After that, it users, as shown in Fig. 4. Through the interface they can
query the load on the target nodes and browse the status
331
Figure 4. Web based interface
of the target resources. The web based interface is easy to node is referred to as a client. In this case, the bandwidth
use and barrier to first use is low. u between a provider and a client is fully utilized. This
ideal transferring process is called as one-to-one service,
5. Service Capacity as shown in Fig. 5.
In this section, we will analyze the service capacity of Source Node ...
our proposed system. To simplify the demonstration, we
consider a deployment process in a cluster, the involved ...
nodes are homogeneous. Suppose that there are y target
nodes, and only one source node. Since the BitTorrent ...
protocol divides the file into equal-sized blocks (pieces) Target Nodes
...
[13], we assume that the whole deployment files are
devided into n pieces. ...
In a cluster, the bandwidth between nodes is
represented by u. The size of the file to deploy is I. Then one-to-one service
t
to each node, I = ∫t c( t )dt , where t0 is the starting time,
1
0
Figure 5. Examples of one-to-one service
and t1 is the finish time, c(t) is the download rate.
The optimal model for the whole deployment is as During the beginning phase of the deployment, the
follows. According to the BitTorrent protocol, the bandwidth of the source node is a bottleneck. To
contents are divided into pieces (file blocks), as shown in accelerate the deployment process, an optimal scheme is
Fig. 5, a block stands for a piece of data, a blank block that the source node sends a block to a different target
means that the target node has not the corresponding node within each round, and each target node sends a
piece yet, a grained block means that the target node has block to another node. Fig. 6 illustrates this process, for
received the corresponding piece already. example, in round one, the source node sends one block to
To explain our analysis, we give the following the first target node, in round two, the source node sends
assumptions. Since the distribution is carried out within one block to the second target node, at the same time, the
the clusters, and the nodes in the clusters are always first node shares its piece with the third node. Note that,
organized by a switch, then assume that, blocks are the number in the figure indicates the round number.
delivered synchronously, which means in every round, x Suppose that, in round r, pr pieces of files are delivered,
then during the beginning phase of the deployment, pr =
(1 ≤ x ≤ ) blocks, each of which is held by one node
y 2
2 1 + ∑ 2 r−i = 2 r−1 , where 1 refers to the piece transferred by
i=r
are transferred to the other x nodes. Every round, a
sending node is referred to as a provider, and a receiving the source node, 2 ≤ i ≤ r.
332
During the steady phase of the deployment, an ideal 2
re = rs + rt = 2 n − 2 + log 2 y + (1)
situation is that + 1 (1 refers to the source node)
y y
2 I /n I
Every round, the time consumption is tr = = .
u n×u
nodes upload pieces for the other nodes in each
y
2 Therefore, the total time consumption is
round, which means that in every round, at most 2 I
T = re × tr = (2n − 2 + log 2 y + ) × (2)
y n ×u
y
2 pieces are replicated. Note that, during the steady The approximate result is T ≈ 2n ×
I
=
2×I
. The
n×u u
phase of the deployment, the maximal number of pieces
could be transferred in each round remains at a certain formula shows an important feature of our system, i.e. our
proposed system can be deployed in a rapid way and the
value ( ), contrasts to the value of the beginning phase
y
total time remains at a certain level. In practice, we can
2
revise Formula 2 to Tt = T + Ta, where Tt represents the
(exponential growth). Suppose that the deployment total time and Ta represents the additional time caused by
process steps into the steady phase at round rs, let pr = extra communications.
2
y y Reference [5] proposed a linear deployment method,
2 , i.e. 2 = 1 + ∑ 2 rs −i , solve this equation, we can get
which means the target nodes are deployed one by one.
i = rs
rs = log 2 y . I
The time consumption can be calculated as Ts = n × ,
u
i.e. the time grows linearly with the number of target
Source Node ... nodes, contrasts to the value of our proposed system.
① ② ③
Target Node 1 ... 6. Simulation Results
Target Node 2 ② ...
... To verify the efficiency of our proposed method, we
Target Node 3
adopted a simulation based test. Using a simulator can
③ ③ benefit the experiments for the sake of providing the
flexibility of precisely controlling the parameters for the
networks and the target nodes. For our proposed system,
...
remaining number of round can be calculated as follows. Figure 7. Analysis results and simulation results
y × n − ( y − 1) 2
rt = = 2( n − 1) + , the entire number of round
y y
2
is
333
Figure 8. Deployment time with respect to bandwidth and number of target nodes
To simulate a real scenario, we set the join rate The bandwidth of the network varies from 100Mb/s to
(request rate) to 2, 4, 6, 8 and 10 respectively, and the join 1000Mb/s, and the numbers of target nodes are set to 20,
time lasts for 10 seconds. The network bandwidth of each 40, 60, 80 and 100 respectively. The results are shown in
node is set to 100Mb/s, and there is only one source node Fig. 8. The upper surface represents the results got by
in the network, the results are shown in Fig. 7. The simulating the linear manner used by [5] and the lower
analysis results are calculated by Formula 2. The surface represents the results of our system. As illustrated
simulation results are got by running the simulator with by Fig. 8, our proposed method works more efficiently
corresponding input parameters. As observed from the and can support a rapid deployment to a large scale grid.
figure, there are differences between the analysis results
and the simulation results. This is because the Formula 2 7. Conclusion
is got under an ideal situation without considering the
additional communications among nodes, moreover, the In this paper, we have summarized the objectives and
simulation is carried out with the assumption that the requirements for the grid monitoring system. To cope
target nodes send requests to the source node in a certain with the dynamic and large-scale nature of the grid, a
rate, as is usually the case in real-world situations. scalable distributed monitoring system is proposed. The
However, each curve remains at a certain value. The monitoring system can support rapid and automated
trends of the two curves remain the same, from which we deployment. The monitoring architecture and deployment
can see that the number of the target nodes has little process of our proposed system have been introduced.
impact on the deployment time. This feature can The BitTorrent protocol is adopted to facilitate easy and
guarantee that our proposed system can be deployed rapid deployment of monitoring services in the grid
efficiently in a large scale grid. environments. Nodes in our proposed system can self
In the second test, comparison methodology is organized into a peer-to-peer overlay to automate the
adopted. We compare our method with the one presented deployment of the monitoring service. Also, this system
in [5], in which the number of target nodes and the can automatically adapt to failures in network connections
network bandwidth are two factors for determining the or nodes.
time consumption caused by the deployment process.
334
Service capacity has been analyzed. Comparison [7] M.L. Massie, B.N. Chun, D.E. Culler, ″The Ganglia
methodology is adopted. Simulation results in the Distributed Monitoring System: Design, Implementation, and
framework of the Constellation Model can support our Experience″, Parallel Computing, Vol 30, June 2004, pp. 817-
analysis. From the results, we can see that our proposed 840.
system supports efficient and rapid deployment to a large [8] H. Jin, ″ChinaGrid: Making Grid Computing a Reality″,
scale grid and provides a robust platform to efficiently ICADL 2004, Springer-Verlag, Berlin Heidelberg, LNCS 3334,
2004, pp. 13-24.
monitor the grid resources.
[9] S. Di, H. Jin, S. Li, et al, ″GlobalWatch: A Distributed
Service Grid Monitoring Platform with High Flexibility and
References Usability″, Proceedings of the 2006 IEEE Asia-Pacific
Conference on Services Computing (APSCC'06), IEEE Press,
[1] S. Hastings, S. Oster, S. Langella, et al, ″Introduce: An Open 2006, pp. 440-446
Source Toolkit for Rapid Development of Strongly Typed Grid [10] F. Bonnassieux, R. Harakaly, P. Primet, ″Automatic
Services″, Journal of Grid Computing, Springer Netherlands, Services Discovery, Monitoring and Visualization of Grid
available online, Environments: The MapCenter Approach″, Across Grids 2003,
http://www.springerlink.com/content/u301u225wg5356w3 Springer-Verlag Berlin Heidelberg, LNCS 2970, 2004, pp. 222-
[2] W. Zheng, L. Liu, M. Hu, et al, ″CGSV: An Adaptable 229.
Stream-Integrated Grid Monitoring System″, NPC 2005, [11] S. Androutsellis-Theotokis, D. Spinellis, ″A Survey of
Springer-Verlag, Berlin Heidelberg, LNCS 3779, 2005, pp. 22- Peer-to-Peer Content Distribution Technologies″, ACM
31. Computing Surveys, ACM Press, 2004, 36(4), pp. 335-371.
[3] B. Tierney, R. Aydt, D. Gunter, et al, ″A Grid Monitoring [12] D. Qiu, R. Srikant, ″Modeling and Performance Analysis of
Architecture″, Tech. Rep. GWD-Perf-16-3, Global Grid Forum BitTorrent-Like Peer-to-Peer Networks″, SIGCOMM’04, ACM
(GGF), 2002, http://www-didc.lbl.gov/GGF-PERF/GMA- Press, 2004, Portland, Oregon, USA, pp. 367-377.
WG/papers/GWD-GP-16-3.pdf [13] A.R. Bharambe, C. Herley, V.N. Padmanabhan, ″Analyzing
[4] V. Talwar, D. Milojicic, Q. Wu, et al, ″Approaches for and Improving a BitTorrent Networks Performance
Service Deployment″, IEEE Internet Computing, IEEE Press, Mechanisms″, Proceedings of 25th IEEE International
March /April 2005, pp. 70-80. Conference on Computer Communications(INFOCOM 2006),
[5] X. Dong, Y. Wang, Z. Qin, et al, ″Research on an Automatic IEEE Press, 2006, Barcelona, Spain, pp. 1-12.
Deployment Mechanism of Monitor Service in Grid [14] Y. Wang, X. Dong, X. He, et al, ″A Constellation Model
Environment″, Proceedings of the Fifth International for Grid Resource Management″, The Sixth International
Conference on Grid and Cooperative Computing Workshops Workshop on Advanced Parallel Processing Technologies
(GCCW′06), IEEE Press, 2006, pp. 63-70. (APPT 2005), Springer-Verlag, Berlin Heidelberg, LNCS 3756,
[6] A. Cooke, W. Nutt, J. Magowan, et al, ″Relational Grid 2005, pp. 263-272.
Monitoring Architecture (R-GMA)″, http://www.r- [15] http://wiki.systemimager.org/index.php/Main_Page
gma.org/pub/Cracow-2003-rgma.pdf
335