Implementing Ipsec Using the Five-Layer Security Framework and Fpgas

Total Page:16

File Type:pdf, Size:1020Kb

Implementing Ipsec Using the Five-Layer Security Framework and Fpgas University of Windsor Scholarship at UWindsor Electronic Theses and Dissertations Theses, Dissertations, and Major Papers 1-1-2007 Implementing IPsec using the Five-layer security framework and FPGAs. James Wiebe University of Windsor Follow this and additional works at: https://scholar.uwindsor.ca/etd Recommended Citation Wiebe, James, "Implementing IPsec using the Five-layer security framework and FPGAs." (2007). Electronic Theses and Dissertations. 6985. https://scholar.uwindsor.ca/etd/6985 This online database contains the full-text of PhD dissertations and Masters’ theses of University of Windsor students from 1954 forward. These documents are made available for personal study and research purposes only, in accordance with the Canadian Copyright Act and the Creative Commons license—CC BY-NC-ND (Attribution, Non-Commercial, No Derivative Works). Under this license, works must always be attributed to the copyright holder (original author), cannot be used for any commercial purposes, and may not be altered. Any other use would require the permission of the copyright holder. Students may inquire about withdrawing their dissertation and/or thesis from this database. For additional inquiries, please contact the repository administrator via email ([email protected]) or by telephone at 519-253-3000ext. 3208. Implementing IPsec using the Five-Layer Security Framework and FPGAs by James Wiebe A Thesis Submitted to the Faculty of Graduate Studies through Electrical and Computer Engineering in Partial Fulfillment of the Requirements for the Degree of Master of Applied Science at the University of Windsor Windsor, Ontario, Canada 2007 © 2007 James Wiebe Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. Library and Bibliotheque et Archives Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington Ottawa ON K1A 0N4 Ottawa ON K1A 0N4 Canada Canada Your file Votre reference ISBN: 978-0-494-35010-2 Our file Notre reference ISBN: 978-0-494-35010-2 NOTICE: AVIS: The author has granted a non­ L'auteur a accorde une licence non exclusive exclusive license allowing Library permettant a la Bibliotheque et Archives and Archives Canada to reproduce, Canada de reproduire, publier, archiver, publish, archive, preserve, conserve, sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par I'lnternet, preter, telecommunication or on the Internet,distribuer et vendre des theses partout dans loan, distribute and sell theses le monde, a des fins commerciales ou autres, worldwide, for commercial or non­ sur support microforme, papier, electronique commercial purposes, in microform, et/ou autres formats. paper, electronic and/or any other formats. The author retains copyright L'auteur conserve la propriete du droit d'auteur ownership and moral rights in et des droits moraux qui protege cette these. this thesis. Neither the thesis Ni la these ni des extraits substantiels de nor substantial extracts from it celle-ci ne doivent etre imprimes ou autrement may be printed or otherwise reproduits sans son autorisation. reproduced without the author's permission. In compliance with the Canadian Conformement a la loi canadienne Privacy Act some supporting sur la protection de la vie privee, forms may have been removed quelques formulaires secondaires from this thesis. ont ete enleves de cette these. While these forms may be included Bien que ces formulaires in the document page count, aient inclus dans la pagination, their removal does not represent il n'y aura aucun contenu manquant. any loss of content from the thesis. i * i Canada Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. ABSTRACT ( A VHDL implementation of 128-bit AES on a Xilinx Virtex-4 FPGA (lowest speed grade) and ML403 development board is developed from a Verilog design that adheres to the FIPS-197 standard, adding innovative features: automatic start of transform, CBC mode, key permutation value readout and store, and output of each intermediate state value. Core processing rate achieves 640 Mbps; 27 Mbps is achieved in practice, via peripheral register access. A non-linear, cryptographically secure LFSR- CASR pseudo-random number generator with a cycle length of 280-243-237+l is translated into C and C++ from Verilog and evaluated. A C design and implementation of IPsec, based on the Five-layer security framework, using these primitives, is presented. The rate of IPsec packet processing achieved is 2 Mbps, determined by direct pulse measurement. A PC-based GUI drives the IPsec implementation and serves it policies, with a framework for flexibly choosing services, mechanisms and primitives using the SMIB. Index Terms: IPsec, Virtex-4, FPGA, AES, pseudo-random number generator, Software Design, Cryptography iii Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. DEDICATION To my mother, for a staggering amount of love, that is so great, that it is as difficult to comprehend as the most involved scientific theory. IV Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. ACKNOWLEDGEMENTS I would like to thank the members of my thesis committee, Dr. Shervin Erfani, Dr. Huapeng Wu, and Dr. Arunita Jaekel, for their support, advice and encouragement and patience in arranging the times of my seminars! My advisor, Dr. Erfani, also provided funding and printed and read all of my published and presented work done during the time of my Master’s project work; as well, he helped me bum my seminar CDs on a last-minute basis. Dr. Wu also kindly printed a copy of my thesis for me. I gratefully acknowledge the assistance of the department technologists, Mr. Frank Cicchello and Mr. Don Tersigni, for support in ordering and providing equipment and tools, and setting up presentations. The University of Windsor ECE (Electrical and Computer Engineering) department secretary, Andria Turner, was absolutely wonderful in chairing my defence, in providing other support during the time of my defence that I needed due to an extensive power failure that occurred that day, and in providing much other support during the time of my Master’s work. Also, Dr. Roberto Muscedere provided equipment. Liviu Danaila, and George Granata, the FAEs (Field Applications Engineers) employed by the ML403 development board vendor, Nu Horizons, were invaluable. Liviu was the local FAE, and helped me considerably. Jennie, the Nu Horizons sales representative, made sure that I received the ML403 board by keeping track of the order. The following Xilinx technical support personnel were helpful with “webcases”: Jonney Zhao, James Broadhead, Enda Behan, Yolanda Xu, Ricky Su and Zhaojin (“Michael”) Ye. “KJ” on the comp.arch.fpga Usenet “newsgroup” helped me set simulation timing values so that the “post-map” simulation of my AES encryptor succeeded. Some of my initial training was done on the Xilinx “Microblaze” boards using Xilinx training “lab” exercises from Xilinx and also as hosted by Dr. Paul Chow on his website at the University of Toronto [UTXILT]. The various tutorial documents provided by Xilinx were very useful - see the “Books, General Papers and other Resources” sub­ section in the References section: the reference codes beginning with “XIL”, particularly the “EDK 8.2 PowerPC Tutorial in Virtex-4” [XILML403T]. v Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. Thanks are due to my fellow students, Nima Bayan, Fang Chen, Amir Yazdanshenas, Raymond Lee, Kevin Banovic, Ian Anderson, Mohammed Tarique and Wenying Zheng, for technical assistance and advice and encouragement. Dr. Mohammed Khalid also provided advice and support, and his course, “Reconfigurable Computing,” provided some useful background. Dr. Xiang Chen provided advice and encouragement that helped lead me to pursue this area of study. This work is largely based on the Five-Layer framework for designing security systems, patented by Dr. S. Erfani. The AES implementation presented is based on the design by Rudolf Usselmann on the “Open Cores” website [USS2002], [OPENCORES]. The module hierarchy figure, used in section 3.1.7., “AES Design Done in this Work,” was modified from Figures 6 and 7 in [USS2002], The pseudo-random number generator implementation presented is a translation from the Verilog design by Javier Villar on the “Open Cores” website [VILL2005]. This material found on the “Open Cores” website is in the public domain. The serial communication package used with MSVC++ V 6.0 (Microsoft Visual C++ Version 6.0) is from “The Code Project” website, is by Ramon de Klein, and is used under the terms of the LGPL (Lesser GNU Public License) [KLE2003]. The “E-Business Security” figure used in section 2.3.1., “Other Management Proposals”, is redrawn from [TRC2003] with permission from Elsevier. The “C-ISCAP” figure used in section 2.3.1. is reproduced (redrawn) with kind permission of Springer Science and Business Media ([PAR2002], Figure 1, pg. 383, © Springer-Verlag Berlin Heidelberg 2002). The figure illustrating the Xilinx system architecture in section 3.1.4., “Architecture Provided by Xilinx” ([XILUT2003] pg 21), was published by Xilinx in order that it “may be used in any form that would benefit the professor and students,” [XILTMAT]. The figures illustrating AES in section 3.1.1.1., “Overview
Recommended publications
  • An Introduction to Security in a CSM 1.3 for AIX 5L Environment
    Front cover An Introduction to Security in a CSM 1.3 for AIX 5L Environment Peek at the latest security mechanisms for pSeries clusters Practical security considerations included Security concepts and components explained Octavian Lascu Rashid Sayed Stuart Carroll Teresa Coleman Maik Haehnel Petr Klabenes Dino Quintero Rogelio Reyes, Jr. Mizuho Tanaka David Duy Truong ibm.com/redbooks International Technical Support Organization An Introduction to Security in a CSM 1.3 for AIX 5L Environment December 2002 SG24-6873-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition (December 2002) This edition applies to Version 1, Release 3, of IBM Cluster Systems Management for use with the AIX operating system Version 5, Release 2. © Copyright International Business Machines Corporation 2002. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures . vii Notices . .ix Trademarks . x Preface . .xi The team that wrote this redbook. .xi Become a published author . xiii Comments welcome. xiii Chapter 1. Introduction . 1 1.1 Security overview . 2 1.1.1 System security. 2 1.1.2 Network security basics . 3 1.1.3 Data transmission security . 4 1.2 Cluster Systems Management security basics . 5 1.2.1 Reliable Scalable Cluster Technology (RSCT) . 6 1.2.2 Resource Monitoring and Control (RMC) . 6 1.2.3 Resource managers (RM). 7 1.2.4 Cluster Security Services (CtSec). 7 1.2.5 Group Services and Topology Services . 8 Chapter 2.
    [Show full text]
  • Université De Montréal Low-Impact Operating
    UNIVERSITE´ DE MONTREAL´ LOW-IMPACT OPERATING SYSTEM TRACING MATHIEU DESNOYERS DEPARTEMENT´ DE GENIE´ INFORMATIQUE ET GENIE´ LOGICIEL ECOLE´ POLYTECHNIQUE DE MONTREAL´ THESE` PRESENT´ EE´ EN VUE DE L’OBTENTION DU DIPLOMEˆ DE PHILOSOPHIÆ DOCTOR (Ph.D.) (GENIE´ INFORMATIQUE) DECEMBRE´ 2009 c Mathieu Desnoyers, 2009. UNIVERSITE´ DE MONTREAL´ ECOL´ E POLYTECHNIQUE DE MONTREAL´ Cette th`ese intitul´ee : LOW-IMPACT OPERATING SYSTEM TRACING pr´esent´ee par : DESNOYERS Mathieu en vue de l’obtention du diplˆome de : Philosophiæ Doctor a ´et´edˆument accept´ee par le jury constitu´ede : Mme. BOUCHENEB Hanifa, Doctorat, pr´esidente M. DAGENAIS Michel, Ph.D., membre et directeur de recherche M. BOYER Fran¸cois-Raymond, Ph.D., membre M. STUMM Michael, Ph.D., membre iii I dedicate this thesis to my family, to my friends, who help me keeping balance between the joy of sharing my work, my quest for knowledge and life. Je d´edie cette th`ese `ama famille, `ames amis, qui m’aident `aconserver l’´equilibre entre la joie de partager mon travail, ma quˆete de connaissance et la vie. iv Acknowledgements I would like to thank Michel Dagenais, my advisor, for believing in my poten- tial and letting me explore the field of operating systems since the beginning of my undergraduate studies. I would also like to thank my mentors, Robert Wisniewski from IBM Research and Martin Bligh, from Google, who have been guiding me through the internships I have done in the industry. I keep a good memory of these experiences and am honored to have worked with them. A special thanks to Paul E.
    [Show full text]
  • Installing Conserver
    Installing Conserver version 1.0 David K. Z. Harris [email protected] Bryan Stansell [email protected] http://www.certaintysolutions.com/consoles/LISA2K-2.zip http://www.conserver.com/consoles/LISA2K-2.zip © 2000 Certainty Solutions, Inc. Pg. 1 This presentation is a supplement to my console services web pages located at http://www.certaintysolutions.com/consoles/LISA2K-2.zip. These pages have a substantial amount of information noted below each slide. We do this to help minimize the amount of note-taking that you need to do in class, and this should give you more time to listen to the instructors. If you feel that you learn better by taking notes, please feel free to do so. This presentation is meant to be a follow-up to a Basic Serial presentation. While this presentation can stand on its own, there is only a small amount of review of the earlier topic. During this tutorial, we will be discussing the topic of Console Servers as a generic application, but our technical emphasis will be on the Conserver application, which is freely available from http://www.conserver.com/. For most purposes in this tutorial, “Console Server” and “Conserver” can be used interchangeably. ©2000, David K. Z. Harris Certainty Solutions: Certainty in an uncertain world M12-2 v1.0 1 Pertinent Job History Ø Network Equipment Technologies ² (Comdesign, Bridge Communications) Ø Telebit Corp. Ø Cisco Systems, Inc. Ø Apple Computer, Inc. Ø Synopsys, Inc. Ø Global Networking & Computing ² (We’re now Certainty Solutions.) © 2000 Certainty Solutions, Inc. Pg. 2 Before moving into networking, David Harris was a hardware hacker, working in repair and R&D roles.
    [Show full text]
  • IBM Platform Computing Solutions Reference Architectures and Best Practices
    Front cover IBM Platform Computing Solutions Reference Architectures and Best Practices Helps with the foundation to manage enterprise environments Delivers reference architectures and best practices guides Provides case scenarios Dino Quintero Luis Carlos Cruz Ricardo Machado Picone Dusan Smolej Daniel de Souza Casali Gheorghe Tudor Joanna Wong ibm.com/redbooks International Technical Support Organization IBM Platform Computing Solutions Reference Architectures and Best Practices April 2014 SG24-8169-00 Note: Before using this information and the product it supports, read the information in “Notices” on page v. First Edition (April 2014) This edition applies to RedHat 6.4, IBM Platform Cluster Manager Standard Edition (PCM-SE) 4.1.1, IBM Platform Symphony Advanced Edition 6.1.1, GPFS FPO 3.5.0.13, Hadoop 1.1.1. © Copyright International Business Machines Corporation 2014. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . .v Trademarks . vi Preface . vii Authors. vii Now you can become a published author, too! . ix Comments welcome. ix Stay connected to IBM Redbooks . .x Chapter 1. Introduction. 1 1.1 Why IBM Platform Computing?. 2 1.2 High performance clusters . 2 1.3 IBM Platform HPC implementation scenario. 3 1.4 Big Data implementation on an IBM high performance computing cluster . 3 1.5 IBM Platform Computing solutions and products . 5 Intel . 7 Chapter 2. High performance clusters . 9 2.1 Cluster management. 10 2.1.1 IBM Platform HPC. 12 2.1.2 IBM Platform Cluster Manager Standard Edition . 19 2.1.3 IBM Platform Cluster Manager Advanced Edition.
    [Show full text]
  • An Empirical Study of the Effects of Open Source
    AN EMPIRICAL STUDY OF THE EFFECTS OF OPEN SOURCE ADOPTION ON SOFTWARE DEVELOPMENT ECONOMICS by Di Wu A thesis submitted to the Faculty of Graduate Studies and Research in partial fulfillment of the requirements for the degree of Master of Applied Science in Technology Innovation Management Department of Systems and Computer Engineering, Carleton University Ottawa, Canada, K1S 5B6 March 2007 © Copyright 2007 Di Wu Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. Library and Bibliotheque et Archives Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington Ottawa ON K1A 0N4 Ottawa ON K1A 0N4 Canada Canada Your file Votre reference ISBN: 978-0-494-27005-9 Our file Notre reference ISBN: 978-0-494-27005-9 NOTICE: AVIS: The author has granted a non­ L'auteur a accorde une licence non exclusive exclusive license allowing Library permettant a la Bibliotheque et Archives and Archives Canada to reproduce,Canada de reproduire, publier, archiver, publish, archive, preserve, conserve,sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par I'lnternet, preter, telecommunication or on the Internet,distribuer et vendre des theses partout dans loan, distribute and sell theses le monde, a des fins commerciales ou autres, worldwide, for commercial or non­ sur support microforme, papier, electronique commercial purposes, in microform,et/ou autres formats. paper, electronic and/or any other formats. The author retains copyright L'auteur conserve la propriete du droit d'auteur ownership and moral rights in et des droits moraux qui protege cette these.
    [Show full text]
  • Remote-Serial-Console-HOWTO.Pdf
    Remote Serial Console HOWTO Glen Turner Australian Academic and Research Network <[email protected]> Mark F. Komarinski <mkomarinskiATwayga.org> v2.6 2003−03−31 Revision History Revision 2.6 2003−03−31 Revised by: gdt Correct opposing CTS/RTS explanations. Use <quote> in markup. TLDP PDF is now good, so remove instructions for rendering PostScript to PDF. Typo in GRUB configuration. Revision 2.5 2003−01−20 Revised by: gdt Only one console per technology type. Setting timezone. Use off parameter rather than comments in inittab. Cable lengths. Revision 2.4 2002−10−03 Revised by: gdt Kernel flow control bug, more cabling, Debian, Livingston Portmaster, typos (especially those found during translation to Japanese). Revision 2.3 2002−07−11 Revised by: gdt Updates for Red Hat Linux 7.3, corrections to serial port speeds and UARTs, ioctlsave. Revision 2.2 2002−05−22 Revised by: gdt Minor changes Revision 2.1 2002−05−16 Revised by: gdt Corrections to kernel console syntax. Addition of USB and devfs. Revision 2.0 2002−02−02 Revised by: gdt Second edition. Revision d1.0 2001−03−20 Revised by: mfk First edition. An RS−232 serial console allows Linux to be controlled from a terminal or modem attached to an asynchronous serial port. The monitor, mouse and keyboard are no longer required for system administration. Serial consoles are useful where Linux systems are deployed at remote sites or are deployed in high−density racks. This HOWTO describes how to configure Linux to attach a serial console. Dedication Glen Turner would like to thank his family for allowing him to work on this project for the surprisingly large number of evenings which it took to write this HOWTO.
    [Show full text]
  • Kit Microsoft Dell Software Group
    Kit Microsoft Dell Software Group Kit de terrain Dell Software À propos de Dell Guide des solutions visant à accélérer l’adoption de la plateforme Microsoft Fonctionnalités Dell Software Processus de déploiements Microsoft avec Dell Plateformes technologiques Microsoft prises en charge Optimisation des grands enjeux Microsoft • Plateforme Cloud • Productivité Cloud et enterprise social • Informations métiers et mission critical Accélération de l’adoption de la plateforme Microsoft • Migration Windows Server • Migration de la messagerie électronique • SQL Server® • SharePoint® Notre engagement envers Microsoft Récompenses Contacts Partenaires - Confidentiel À propos de Dell Dell rend la technologie plus accessible et économique, améliorant ainsi la vie des individus, le fonctionnement des entreprises et la marche du monde. Aujourd’hui, nous exploitons la puissance du Cloud, de la technologie mobile, des Big Data et de la sécurité pour permettre à davantage d’individus d’en faire plus. Connexion des Intégration et Simplification Accélération de UTILISATEURS optimisation de et sécurisation via l’innovation via FINAUX l’ENTREPRISE les LOGICIELS les SERVICES Partenaires - Confidentiel Fonctionnalités Dell Software Gestion du Cloud Gestion de Gestion du et des datacenters l’information personnel mobile • Gestion des serveurs et des • Gestion des bases de données • Gestion des appareils mobiles systèmes clients • Business Intelligence / analytique • Virtualisation des postes de • Surveillance des performances • Intégration des données et des
    [Show full text]
  • Linux HPC Cluster Installation
    Front cover Acrobat bookmark Draft Document for Review June 15, 2001 6:30 pm SG24-6041-00 Linux HPC Cluster Installation xCAT - xCluster Administration Tools Developed by Egan Ford IBM ^ xSeries Intel-based Linux® Installing Red Hat® with Kickstart and xCAT Luis Ferreira, Gregory Kettmann Andreas Thomasch, Eillen Silcocks Jacob Chen, Jean-Claude Daunois Jens Ihamo, Makoto Harada Steve Hill and Walter Bernocchi ibm.com/redbooks Draft Document for Review June 15, 2001 6:29 pm 6041edno.fm International Technical Support Organization Linux High Performance Cluster Installation May 2001 SG24-6041-00 6041edno.fm Draft Document for Review June 15, 2001 6:29 pm Take Note! Before using this information and the product it supports, be sure to read the general information in “Special notices” on page 239. First Edition (May 2001) This edition applies to Red Hat® Linux® Version 6.2 for Intel® Architecture. This document created or updated on June 15, 2001. Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. JN9B Building 003 Internal Zip 2834 11400 Burnet Road Austin, Texas 78758-3493 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 2001. All rights reserved. Note to U.S Government Users – Documentation related to restricted rights – Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Draft Document for Review June 15, 2001 6:29 pm 6041TOC.fm Contents Figures .
    [Show full text]
  • SGI® Management Centertm (SMC) Administration Guide for Clusters
    SGI® Management CenterTM (SMC) Administration Guide for Clusters 007–6358–001 COPYRIGHT © 2014 SGI. All rights reserved; provided portions may be copyright in third parties, as indicated elsewhere herein. No permission is granted to copy, distribute, or create derivative works from the contents of this electronic documentation in any manner, in whole or in part, without the prior written permission of SGI. The SGI Management Center software stack depends on several open source packages which require attribution. They are as follows: c3: C3 version 3.1.2: Cluster Command & Control Suite Oak Ridge National Laboratory, Oak Ridge, TN, Authors: M.Brim, R.Flanery, G.A.Geist, B.Luethke, S.L.Scott (C) 2001 All Rights Reserved NOTICE Permission to use, copy, modify, and distribute this software and # its documentation for any purpose and without fee is hereby granted provided that the above copyright notice appear in all copies and that both the copyright notice and this permission notice appear in supporting documentation. Neither the Oak Ridge National Laboratory nor the Authors make any # representations about the suitability of this software for any purpose. This software is provided "as is" without express or implied warranty. The C3 tools were funded by the U.S. Department of Energy. conserver: Copyright (c) 2000, conserver.com All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:- Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. - Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
    [Show full text]
  • Setting up and Running a Production Linux Cluster at PNNL
    Case Study: Setting up and running a production Linux cluster at Pacific Northwest National Laboratory Gary Skouson, Molecular Science Computing Facility, William R. Wiley Environmental Molecular Sciences Laboratory, Pacific Northwest National Laboratory Ryan Braby*, Molecular Science Computing Facility, William R. Wiley Environmental Molecular Sciences Laboratory, Pacific Northwest National Laboratory Abstract With the low price and increasing performance of commodity computer hardware, it is important to study the viability of using clusters of relatively inexpensive computers to produce a stable system, capable of the current demands for high performance massively parallel computing. A 192-processor cluster was installed to test and develop methods that would make the PC cluster a workable alternative to using other commercial systems for use in scientific research. By comparing PC clusters with the cluster systems sold commercially, it became apparent that the tools to manage the PC cluster as a single system were not as robust or as well integrated as in many commercial systems. This paper is focused on the problems encountered and solutions used to stabilize this cluster for both production and development use. This included the use of extra hardware such as remote power control units and multi-port adapters to provide remote access to both the system console and system power. A Giganet cLAN fabric was also used to provide a high-speed, low-latency interconnect. Software solutions were used for resource management, job scheduling and accounting, parallel filesystems, remote network installation and system monitoring. Although there are still some tools missing for debugging hardware problems, the PC cluster continues to be very stable and useful for users.
    [Show full text]
  • IBM Spectrum Computing Solutions
    Front cover IBM Spectrum Computing Solutions Dino Quintero Daniel de Souza Casali Eduardo Luis Cerdas Moya Federico Fros Maciej Olejniczak Redbooks International Technical Support Organization IBM Spectrum Computing Solutions May 2017 SG24-8373-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (May 2017) This edition applies to: Red Hat Linux ppc64 Little Endian version 7.2 IBM Spectrum Scale version 4.2.1 IBM Cluster Foundation version v4.2.2 IBM Spectrum Conductor with Spark version 2.2 IBM Spectrum MPI version 10 © Copyright International Business Machines Corporation 2017. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix Authors. ix Now you can become a published author, too . .x Comments welcome. xi Stay connected to IBM Redbooks . xi Chapter 1. Introduction to IBM Spectrum Computing . 1 1.1 Overview . 2 1.2 Big data and resource management . 2 1.3 The new era for high-performance computing (HPC) . 2 1.4 Hybrid cloud bursting . 3 1.5 The big data challenge . 4 1.5.1 Hadoop . 4 1.5.2 Apache Spark . 5 1.5.3 Hadoop Distributed File System (HDFS) . 5 1.5.4 Multi-tenancy. 5 1.6 IBM Spectrum Cluster Foundation . 6 1.7 IBM Spectrum Computing . 6 1.7.1 IBM Spectrum Conductor with Spark . 7 1.7.2 IBM Spectrum LSF . 7 1.7.3 IBM Spectrum Symphony . 7 Chapter 2.
    [Show full text]
  • IBM Power Systems 775 HPC Solution
    Front cover IBM Power Systems 775 for AIX and Linux HPC Solution Unleashes computing power for HPC workloads Provides architectural solution overview Contains sample scenarios Dino Quintero Kerry Bosworth Puneet Chaudhary Rodrigo Garcia da Silva ByungUn Ha Jose Higino Marc-Eric Kahle Tsuyoshi Kamenoue James Pearson Mark Perez Fernando Pizzano Robert Simon Kai Sun ibm.com/redbooks International Technical Support Organization IBM Power Systems 775 for AIX and Linux HPC Solution October 2012 SG24-8003-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (October 2012) This edition applies to IBM AIX 7.1, xCAT 2.6.6, IBM GPFS 3.4, IBM LoadLelever, Parallel Environment Runtime Edition for AIX V1.1. © Copyright International Business Machines Corporation 2012. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures . vii Tables . xi Examples . xiii Notices . xvii Trademarks . xviii Preface . xix The team who wrote this book . xix Now you can become a published author, too! . xxi Comments welcome. xxii Stay connected to IBM Redbooks . xxii Chapter 1. Understanding the IBM Power Systems 775 Cluster. 1 1.1 Overview of the IBM Power System 775 Supercomputer . 2 1.2 Advantages and new features of the IBM Power 775 . 3 1.3 Hardware information . 4 1.3.1 POWER7 chip. 4 1.3.2 I/O hub chip. 10 1.3.3 Collective acceleration unit (CAU) . 12 1.3.4 Nest memory management unit (NMMU) .
    [Show full text]