CIT 470: Advanced Network and System Administration Remote Administration

Total Page:16

File Type:pdf, Size:1020Kb

CIT 470: Advanced Network and System Administration Remote Administration CIT 470: Advanced Network and System Administration Remote Administration CIT 470: Advanced Network and System Administration Slide #1 Topics 1. Network Access 2. SSH 3. Key-based Authentication 4. Console Access 5. X-Windows 6. VNC and NX 7. SSH tunneling CIT 470: Advanced Network and System Administration Slide #2 Network Access Most tasks can be done from the shell. File management. Disk/volume management. Troubleshooting and viewing logs. Installing/removing software. Start/stop network services. Reboot/shutdown. All we need is a way to invoke a shell across the network. CIT 470: Advanced Network and System Administration Slide #3 1 telnet Ubiquitous network terminal protocol telnet hostname Similar protocols rlogin –l user hostname rsh –l user hostname command Insecure Data, including passwords, sent in the clear. rlogin/rsh use ~/.rhosts for access w/o passwords. CIT 470: Advanced Network and System Administration Slide #4 ssh Secure Shell Replaces telnet ftp rlogin rsh rcp CIT 470: Advanced Network and System Administration Slide #5 SSH Security Features CIT 470: Advanced Network and System Administration Slide #6 2 SSH: Protocols and Products • SSH v1 • OpenSSH – Insecure, obsolete. • SSH Tectia – Do not use. • F-secure SSH • SSH v2 • Putty – Current version. • WinSCP CIT 470: Advanced Network and System Administration Slide #7 SSH Features Secure login ssh –l user host Secure remote command execution ssh –l user host command Secure file transfer sftp –l user host scp file user@host:/tmp/myfile Port forwarding ssh –L 110:localhost:110 mailhost CIT 470: Advanced Network and System Administration Slide #8 The Problem of Passwords 1. Good passwords are hard to remember. 2. Password transferred to remote system. 3. Automating remote access with passwords is difficult. CIT 470: Advanced Network and System Administration Slide #9 3 Public Key Cryptography Two keys – Private key known only to owner. – Public key available to anyone. Applications – Confidentiality: • Sender enciphers using recipient’s public key, • Receiver deciphers using their private key. – Integrity/authentication: • Sender enciphers using own private key, • Recipient deciphers using sender’s public key. CIT 470: Advanced Network and System Administration Slide #10 Key-based Authentication SSH uses public-key authentication Private key stored in your machine. Public key stored on remote machines. Public-key login protocol 1. Client sends server a login request. 2. Server issues a challenge. 3. Client responds with computation based on challenge and private key. 4. Server checks response with public key. CIT 470: Advanced Network and System Administration Slide #11 Using key-based authentication 1. Generate a public/private key pair. ssh-keygen Encrypted key files: id_rsa, id_rsa.pub 2. Copy public key to remote host Copy to ~/.ssh/authorized_keys. 3. Login to remote host ssh –l user remote CIT 470: Advanced Network and System Administration Slide #12 4 Keys are more secure than Passwords 1. Need to have two items to login: key file and passphrase. 2. Neither key nor passphrase is sent to remote host. 3. Machine-generated cryptographic keys are infeasible to guess, unlike passwords. CIT 470: Advanced Network and System Administration Slide #13 SSH Agent Problem: you have to enter passphrase to decrypt the key each time you use ssh. Solution: SSH Agent > ssh-agent $SHELL > ssh-add Enter passphrase for /home/jw/.ssh/id_dsa: ******** Identity added: /home/you/.ssh/id_dsa (/home/jw/.ssh/id_dsa) > ssh –l jw host CIT 470: Advanced Network and System Administration Slide #14 SSH Agent Features Agent support for entire session. Start ssh-agent on initial shell. X: ~/.xsession (Often enabled by default.) Multiple keys ssh-add keyfile ssh-add –l Remove keys ssh-add –d keyfile ssh-add –D CIT 470: Advanced Network and System Administration Slide #15 5 Remote Access when Server is Down Problem: No network access to host. Solutions: – Go to computer room and bring host up. – Specialized hardware (network boot / power). – Virtual machines. – Console servers. CIT 470: Advanced Network and System Administration Slide #16 Console Servers Console – Main I/O device for computer. – Historically: serial terminal. – Typically: keyboard/mouse/screen. Server allows access to multiple consoles. – Console access: BIOS, Bootloader, Kernel – Eliminates need for keyboards, mice, monitors. – Serial line to each machine from server. – One user has R/W, other users have R access. CIT 470: Advanced Network and System Administration Slide #17 Console Hardware Console servers solution – Commercial: Cisco, Cyclades, Xyplex – Open source: Conserver + serial expander card Hardware issues – Connectors: DB-9, DB-25, RJ-45 – Encoding: 8N1, 7E1 – Speeds: 9600 – 230k CIT 470: Advanced Network and System Administration Slide #18 6 X-Windows Server – Handles user input and graphical display. – Runs on the machine with display unit. Clients (applications) – Can run on a different machine than server. • Set DISPLAY env var. • Use –display option. CIT 470: Advanced Network and System Administration Slide #19 Window Manager X client that provides features like: – Move, resize, iconify, and kill windows. – Window title bars. – Popup menus. Example window managers – twm: Tab, primitive early window manager – mwm: Motif, found on commercial UNIXes – fvwm: Free, fast, very customizable. – WindowMaker: NeXT-like, see also AfterStep. CIT 470: Advanced Network and System Administration Slide #20 TWM Screenshot CIT 470: Advanced Network and System Administration Slide #21 7 FVWM Screenshot CIT 470: Advanced Network and System Administration Slide #22 WindowMaker CIT 470: Advanced Network and System Administration Slide #23 Desktops CDE Common desktop env for commercial UNIXes. Gnome Standard Linux desktop based on GTK+. KDE Windows-like free desktop based on QT. Xfce Lightweight desktop, also based on GTK+. CIT 470: Advanced Network and System Administration Slide #24 8 X-Windows Security Why do we need security? An evil client can capture/create any X events. Even if you’re not using any network clients! Host authentication Limit who can start clients by IP address. Set by xhost + or xhost - commands. Token authentication Only clients with token can access server. Set by the xauth command. CIT 470: Advanced Network and System Administration Slide #25 X-Windows Security Tunneling + host authentication. All clients appear to be from localhost. Therefore disable remote clients with xhost – Use ssh client to tunnel X: ssh –X host Server must have X11Forwarding set to yes. Use echo DISPLAY to test if X forwarding is on. Note that local users can still attack X session. CIT 470: Advanced Network and System Administration Slide #26 VNC: Virtual Network Computing CIT 470: Advanced Network and System Administration Slide #27 9 Why VNC? 1. Remote desktop access. 2. Helpdesk: control a remote desktop. 3. Persistent desktop. 4. Use same desktop from multiple clients. 5. Need Linux access from Windows. 6. Need Windows access from Linux. CIT 470: Advanced Network and System Administration Slide #28 What is VNC? • Open remote desktop protocol. • Many implementations – RealVNC: VNC from original researchers. – TightVNC: VNC with high compression. – VNCj: Java VNC, can run within web browser. – PalmVNC: VNC for Palm Pilots. – UltraVNC: enhanced VNC, only for Windows. CIT 470: Advanced Network and System Administration Slide #29 Using VNC 1. Start VNC server UNIX: vncserver Win: Start menu>Programs>RealVNC>VNCServer 2. Write down server name and display number. It will look something like unix3:1 3. Start VNC client UNIX: vncviewer Win: Start menu>Programs>RealVNC>VNCViewer 4. Enter server and display to connect to (from step 2). 5. A VNC remote desktop should appear. CIT 470: Advanced Network and System Administration Slide #30 10 Configuring and Troubleshooting • On UNIX, VNC stores files under ~/.vnc • Configuration: xstartup – Indicates which X clients to start with server. – Typically includes vncconfig application. • Configuration: passwd – Contains VNC server session password. • Log files: host:display#.log – Any errors should appear in these logs. CIT 470: Advanced Network and System Administration Slide #31 Securing VNC VNC does not provide encryption. Use ssh tunneling to encrypt login + data: ssh –L 5901:remotehost:5901 remotehost vncviewer localhost:1 CIT 470: Advanced Network and System Administration Slide #32 Tunneling Tunneling: Encapsulation of one network protocol in another protocol – Carrier Protocol: protocol used by network through which the information is travelling – Encapsulating Protocol: protocol (GRE, IPsec, L2TP) that is wrapped around original data – Passenger Protocol: protocol that carries original data CIT 470: Advanced Network and System Administration Slide #33 11 ssh Tunneling SSH can tunnel TCP connections – Carrier Protocol: IP – Encapsulating Protocol: ssh – Passenger Protocol: TCP on a specific port POP-3 forwarding ssh -L 110:pop3host:110 -l user pop3host – Uses ssh to login to pop3host as user – Creates tunnel from port 110 (leftmost port #) on localhost to port 110 (rightmost post #)of pop3host – User configures mail client to use localhost as POP3 server, then proceeds as normal CIT 470: Advanced Network and System Administration Slide #34 NX Advantages over VNC: Speed: fast enough to use over dialup. Built-in ssh encryption. Disadvantages Immature code; hard to install + set up. GPL client/server for Linux only. Free Windows client; commercial server. CIT 470: Advanced Network
Recommended publications
  • An Introduction to Security in a CSM 1.3 for AIX 5L Environment
    Front cover An Introduction to Security in a CSM 1.3 for AIX 5L Environment Peek at the latest security mechanisms for pSeries clusters Practical security considerations included Security concepts and components explained Octavian Lascu Rashid Sayed Stuart Carroll Teresa Coleman Maik Haehnel Petr Klabenes Dino Quintero Rogelio Reyes, Jr. Mizuho Tanaka David Duy Truong ibm.com/redbooks International Technical Support Organization An Introduction to Security in a CSM 1.3 for AIX 5L Environment December 2002 SG24-6873-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition (December 2002) This edition applies to Version 1, Release 3, of IBM Cluster Systems Management for use with the AIX operating system Version 5, Release 2. © Copyright International Business Machines Corporation 2002. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures . vii Notices . .ix Trademarks . x Preface . .xi The team that wrote this redbook. .xi Become a published author . xiii Comments welcome. xiii Chapter 1. Introduction . 1 1.1 Security overview . 2 1.1.1 System security. 2 1.1.2 Network security basics . 3 1.1.3 Data transmission security . 4 1.2 Cluster Systems Management security basics . 5 1.2.1 Reliable Scalable Cluster Technology (RSCT) . 6 1.2.2 Resource Monitoring and Control (RMC) . 6 1.2.3 Resource managers (RM). 7 1.2.4 Cluster Security Services (CtSec). 7 1.2.5 Group Services and Topology Services . 8 Chapter 2.
    [Show full text]
  • Université De Montréal Low-Impact Operating
    UNIVERSITE´ DE MONTREAL´ LOW-IMPACT OPERATING SYSTEM TRACING MATHIEU DESNOYERS DEPARTEMENT´ DE GENIE´ INFORMATIQUE ET GENIE´ LOGICIEL ECOLE´ POLYTECHNIQUE DE MONTREAL´ THESE` PRESENT´ EE´ EN VUE DE L’OBTENTION DU DIPLOMEˆ DE PHILOSOPHIÆ DOCTOR (Ph.D.) (GENIE´ INFORMATIQUE) DECEMBRE´ 2009 c Mathieu Desnoyers, 2009. UNIVERSITE´ DE MONTREAL´ ECOL´ E POLYTECHNIQUE DE MONTREAL´ Cette th`ese intitul´ee : LOW-IMPACT OPERATING SYSTEM TRACING pr´esent´ee par : DESNOYERS Mathieu en vue de l’obtention du diplˆome de : Philosophiæ Doctor a ´et´edˆument accept´ee par le jury constitu´ede : Mme. BOUCHENEB Hanifa, Doctorat, pr´esidente M. DAGENAIS Michel, Ph.D., membre et directeur de recherche M. BOYER Fran¸cois-Raymond, Ph.D., membre M. STUMM Michael, Ph.D., membre iii I dedicate this thesis to my family, to my friends, who help me keeping balance between the joy of sharing my work, my quest for knowledge and life. Je d´edie cette th`ese `ama famille, `ames amis, qui m’aident `aconserver l’´equilibre entre la joie de partager mon travail, ma quˆete de connaissance et la vie. iv Acknowledgements I would like to thank Michel Dagenais, my advisor, for believing in my poten- tial and letting me explore the field of operating systems since the beginning of my undergraduate studies. I would also like to thank my mentors, Robert Wisniewski from IBM Research and Martin Bligh, from Google, who have been guiding me through the internships I have done in the industry. I keep a good memory of these experiences and am honored to have worked with them. A special thanks to Paul E.
    [Show full text]
  • Installing Conserver
    Installing Conserver version 1.0 David K. Z. Harris [email protected] Bryan Stansell [email protected] http://www.certaintysolutions.com/consoles/LISA2K-2.zip http://www.conserver.com/consoles/LISA2K-2.zip © 2000 Certainty Solutions, Inc. Pg. 1 This presentation is a supplement to my console services web pages located at http://www.certaintysolutions.com/consoles/LISA2K-2.zip. These pages have a substantial amount of information noted below each slide. We do this to help minimize the amount of note-taking that you need to do in class, and this should give you more time to listen to the instructors. If you feel that you learn better by taking notes, please feel free to do so. This presentation is meant to be a follow-up to a Basic Serial presentation. While this presentation can stand on its own, there is only a small amount of review of the earlier topic. During this tutorial, we will be discussing the topic of Console Servers as a generic application, but our technical emphasis will be on the Conserver application, which is freely available from http://www.conserver.com/. For most purposes in this tutorial, “Console Server” and “Conserver” can be used interchangeably. ©2000, David K. Z. Harris Certainty Solutions: Certainty in an uncertain world M12-2 v1.0 1 Pertinent Job History Ø Network Equipment Technologies ² (Comdesign, Bridge Communications) Ø Telebit Corp. Ø Cisco Systems, Inc. Ø Apple Computer, Inc. Ø Synopsys, Inc. Ø Global Networking & Computing ² (We’re now Certainty Solutions.) © 2000 Certainty Solutions, Inc. Pg. 2 Before moving into networking, David Harris was a hardware hacker, working in repair and R&D roles.
    [Show full text]
  • IBM Platform Computing Solutions Reference Architectures and Best Practices
    Front cover IBM Platform Computing Solutions Reference Architectures and Best Practices Helps with the foundation to manage enterprise environments Delivers reference architectures and best practices guides Provides case scenarios Dino Quintero Luis Carlos Cruz Ricardo Machado Picone Dusan Smolej Daniel de Souza Casali Gheorghe Tudor Joanna Wong ibm.com/redbooks International Technical Support Organization IBM Platform Computing Solutions Reference Architectures and Best Practices April 2014 SG24-8169-00 Note: Before using this information and the product it supports, read the information in “Notices” on page v. First Edition (April 2014) This edition applies to RedHat 6.4, IBM Platform Cluster Manager Standard Edition (PCM-SE) 4.1.1, IBM Platform Symphony Advanced Edition 6.1.1, GPFS FPO 3.5.0.13, Hadoop 1.1.1. © Copyright International Business Machines Corporation 2014. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . .v Trademarks . vi Preface . vii Authors. vii Now you can become a published author, too! . ix Comments welcome. ix Stay connected to IBM Redbooks . .x Chapter 1. Introduction. 1 1.1 Why IBM Platform Computing?. 2 1.2 High performance clusters . 2 1.3 IBM Platform HPC implementation scenario. 3 1.4 Big Data implementation on an IBM high performance computing cluster . 3 1.5 IBM Platform Computing solutions and products . 5 Intel . 7 Chapter 2. High performance clusters . 9 2.1 Cluster management. 10 2.1.1 IBM Platform HPC. 12 2.1.2 IBM Platform Cluster Manager Standard Edition . 19 2.1.3 IBM Platform Cluster Manager Advanced Edition.
    [Show full text]
  • An Empirical Study of the Effects of Open Source
    AN EMPIRICAL STUDY OF THE EFFECTS OF OPEN SOURCE ADOPTION ON SOFTWARE DEVELOPMENT ECONOMICS by Di Wu A thesis submitted to the Faculty of Graduate Studies and Research in partial fulfillment of the requirements for the degree of Master of Applied Science in Technology Innovation Management Department of Systems and Computer Engineering, Carleton University Ottawa, Canada, K1S 5B6 March 2007 © Copyright 2007 Di Wu Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. Library and Bibliotheque et Archives Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington Ottawa ON K1A 0N4 Ottawa ON K1A 0N4 Canada Canada Your file Votre reference ISBN: 978-0-494-27005-9 Our file Notre reference ISBN: 978-0-494-27005-9 NOTICE: AVIS: The author has granted a non­ L'auteur a accorde une licence non exclusive exclusive license allowing Library permettant a la Bibliotheque et Archives and Archives Canada to reproduce,Canada de reproduire, publier, archiver, publish, archive, preserve, conserve,sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par I'lnternet, preter, telecommunication or on the Internet,distribuer et vendre des theses partout dans loan, distribute and sell theses le monde, a des fins commerciales ou autres, worldwide, for commercial or non­ sur support microforme, papier, electronique commercial purposes, in microform,et/ou autres formats. paper, electronic and/or any other formats. The author retains copyright L'auteur conserve la propriete du droit d'auteur ownership and moral rights in et des droits moraux qui protege cette these.
    [Show full text]
  • Remote-Serial-Console-HOWTO.Pdf
    Remote Serial Console HOWTO Glen Turner Australian Academic and Research Network <[email protected]> Mark F. Komarinski <mkomarinskiATwayga.org> v2.6 2003−03−31 Revision History Revision 2.6 2003−03−31 Revised by: gdt Correct opposing CTS/RTS explanations. Use <quote> in markup. TLDP PDF is now good, so remove instructions for rendering PostScript to PDF. Typo in GRUB configuration. Revision 2.5 2003−01−20 Revised by: gdt Only one console per technology type. Setting timezone. Use off parameter rather than comments in inittab. Cable lengths. Revision 2.4 2002−10−03 Revised by: gdt Kernel flow control bug, more cabling, Debian, Livingston Portmaster, typos (especially those found during translation to Japanese). Revision 2.3 2002−07−11 Revised by: gdt Updates for Red Hat Linux 7.3, corrections to serial port speeds and UARTs, ioctlsave. Revision 2.2 2002−05−22 Revised by: gdt Minor changes Revision 2.1 2002−05−16 Revised by: gdt Corrections to kernel console syntax. Addition of USB and devfs. Revision 2.0 2002−02−02 Revised by: gdt Second edition. Revision d1.0 2001−03−20 Revised by: mfk First edition. An RS−232 serial console allows Linux to be controlled from a terminal or modem attached to an asynchronous serial port. The monitor, mouse and keyboard are no longer required for system administration. Serial consoles are useful where Linux systems are deployed at remote sites or are deployed in high−density racks. This HOWTO describes how to configure Linux to attach a serial console. Dedication Glen Turner would like to thank his family for allowing him to work on this project for the surprisingly large number of evenings which it took to write this HOWTO.
    [Show full text]
  • Kit Microsoft Dell Software Group
    Kit Microsoft Dell Software Group Kit de terrain Dell Software À propos de Dell Guide des solutions visant à accélérer l’adoption de la plateforme Microsoft Fonctionnalités Dell Software Processus de déploiements Microsoft avec Dell Plateformes technologiques Microsoft prises en charge Optimisation des grands enjeux Microsoft • Plateforme Cloud • Productivité Cloud et enterprise social • Informations métiers et mission critical Accélération de l’adoption de la plateforme Microsoft • Migration Windows Server • Migration de la messagerie électronique • SQL Server® • SharePoint® Notre engagement envers Microsoft Récompenses Contacts Partenaires - Confidentiel À propos de Dell Dell rend la technologie plus accessible et économique, améliorant ainsi la vie des individus, le fonctionnement des entreprises et la marche du monde. Aujourd’hui, nous exploitons la puissance du Cloud, de la technologie mobile, des Big Data et de la sécurité pour permettre à davantage d’individus d’en faire plus. Connexion des Intégration et Simplification Accélération de UTILISATEURS optimisation de et sécurisation via l’innovation via FINAUX l’ENTREPRISE les LOGICIELS les SERVICES Partenaires - Confidentiel Fonctionnalités Dell Software Gestion du Cloud Gestion de Gestion du et des datacenters l’information personnel mobile • Gestion des serveurs et des • Gestion des bases de données • Gestion des appareils mobiles systèmes clients • Business Intelligence / analytique • Virtualisation des postes de • Surveillance des performances • Intégration des données et des
    [Show full text]
  • Linux HPC Cluster Installation
    Front cover Acrobat bookmark Draft Document for Review June 15, 2001 6:30 pm SG24-6041-00 Linux HPC Cluster Installation xCAT - xCluster Administration Tools Developed by Egan Ford IBM ^ xSeries Intel-based Linux® Installing Red Hat® with Kickstart and xCAT Luis Ferreira, Gregory Kettmann Andreas Thomasch, Eillen Silcocks Jacob Chen, Jean-Claude Daunois Jens Ihamo, Makoto Harada Steve Hill and Walter Bernocchi ibm.com/redbooks Draft Document for Review June 15, 2001 6:29 pm 6041edno.fm International Technical Support Organization Linux High Performance Cluster Installation May 2001 SG24-6041-00 6041edno.fm Draft Document for Review June 15, 2001 6:29 pm Take Note! Before using this information and the product it supports, be sure to read the general information in “Special notices” on page 239. First Edition (May 2001) This edition applies to Red Hat® Linux® Version 6.2 for Intel® Architecture. This document created or updated on June 15, 2001. Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. JN9B Building 003 Internal Zip 2834 11400 Burnet Road Austin, Texas 78758-3493 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 2001. All rights reserved. Note to U.S Government Users – Documentation related to restricted rights – Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Draft Document for Review June 15, 2001 6:29 pm 6041TOC.fm Contents Figures .
    [Show full text]
  • SGI® Management Centertm (SMC) Administration Guide for Clusters
    SGI® Management CenterTM (SMC) Administration Guide for Clusters 007–6358–001 COPYRIGHT © 2014 SGI. All rights reserved; provided portions may be copyright in third parties, as indicated elsewhere herein. No permission is granted to copy, distribute, or create derivative works from the contents of this electronic documentation in any manner, in whole or in part, without the prior written permission of SGI. The SGI Management Center software stack depends on several open source packages which require attribution. They are as follows: c3: C3 version 3.1.2: Cluster Command & Control Suite Oak Ridge National Laboratory, Oak Ridge, TN, Authors: M.Brim, R.Flanery, G.A.Geist, B.Luethke, S.L.Scott (C) 2001 All Rights Reserved NOTICE Permission to use, copy, modify, and distribute this software and # its documentation for any purpose and without fee is hereby granted provided that the above copyright notice appear in all copies and that both the copyright notice and this permission notice appear in supporting documentation. Neither the Oak Ridge National Laboratory nor the Authors make any # representations about the suitability of this software for any purpose. This software is provided "as is" without express or implied warranty. The C3 tools were funded by the U.S. Department of Energy. conserver: Copyright (c) 2000, conserver.com All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:- Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. - Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
    [Show full text]
  • Setting up and Running a Production Linux Cluster at PNNL
    Case Study: Setting up and running a production Linux cluster at Pacific Northwest National Laboratory Gary Skouson, Molecular Science Computing Facility, William R. Wiley Environmental Molecular Sciences Laboratory, Pacific Northwest National Laboratory Ryan Braby*, Molecular Science Computing Facility, William R. Wiley Environmental Molecular Sciences Laboratory, Pacific Northwest National Laboratory Abstract With the low price and increasing performance of commodity computer hardware, it is important to study the viability of using clusters of relatively inexpensive computers to produce a stable system, capable of the current demands for high performance massively parallel computing. A 192-processor cluster was installed to test and develop methods that would make the PC cluster a workable alternative to using other commercial systems for use in scientific research. By comparing PC clusters with the cluster systems sold commercially, it became apparent that the tools to manage the PC cluster as a single system were not as robust or as well integrated as in many commercial systems. This paper is focused on the problems encountered and solutions used to stabilize this cluster for both production and development use. This included the use of extra hardware such as remote power control units and multi-port adapters to provide remote access to both the system console and system power. A Giganet cLAN fabric was also used to provide a high-speed, low-latency interconnect. Software solutions were used for resource management, job scheduling and accounting, parallel filesystems, remote network installation and system monitoring. Although there are still some tools missing for debugging hardware problems, the PC cluster continues to be very stable and useful for users.
    [Show full text]
  • IBM Spectrum Computing Solutions
    Front cover IBM Spectrum Computing Solutions Dino Quintero Daniel de Souza Casali Eduardo Luis Cerdas Moya Federico Fros Maciej Olejniczak Redbooks International Technical Support Organization IBM Spectrum Computing Solutions May 2017 SG24-8373-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (May 2017) This edition applies to: Red Hat Linux ppc64 Little Endian version 7.2 IBM Spectrum Scale version 4.2.1 IBM Cluster Foundation version v4.2.2 IBM Spectrum Conductor with Spark version 2.2 IBM Spectrum MPI version 10 © Copyright International Business Machines Corporation 2017. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix Authors. ix Now you can become a published author, too . .x Comments welcome. xi Stay connected to IBM Redbooks . xi Chapter 1. Introduction to IBM Spectrum Computing . 1 1.1 Overview . 2 1.2 Big data and resource management . 2 1.3 The new era for high-performance computing (HPC) . 2 1.4 Hybrid cloud bursting . 3 1.5 The big data challenge . 4 1.5.1 Hadoop . 4 1.5.2 Apache Spark . 5 1.5.3 Hadoop Distributed File System (HDFS) . 5 1.5.4 Multi-tenancy. 5 1.6 IBM Spectrum Cluster Foundation . 6 1.7 IBM Spectrum Computing . 6 1.7.1 IBM Spectrum Conductor with Spark . 7 1.7.2 IBM Spectrum LSF . 7 1.7.3 IBM Spectrum Symphony . 7 Chapter 2.
    [Show full text]
  • IBM Power Systems 775 HPC Solution
    Front cover IBM Power Systems 775 for AIX and Linux HPC Solution Unleashes computing power for HPC workloads Provides architectural solution overview Contains sample scenarios Dino Quintero Kerry Bosworth Puneet Chaudhary Rodrigo Garcia da Silva ByungUn Ha Jose Higino Marc-Eric Kahle Tsuyoshi Kamenoue James Pearson Mark Perez Fernando Pizzano Robert Simon Kai Sun ibm.com/redbooks International Technical Support Organization IBM Power Systems 775 for AIX and Linux HPC Solution October 2012 SG24-8003-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (October 2012) This edition applies to IBM AIX 7.1, xCAT 2.6.6, IBM GPFS 3.4, IBM LoadLelever, Parallel Environment Runtime Edition for AIX V1.1. © Copyright International Business Machines Corporation 2012. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures . vii Tables . xi Examples . xiii Notices . xvii Trademarks . xviii Preface . xix The team who wrote this book . xix Now you can become a published author, too! . xxi Comments welcome. xxii Stay connected to IBM Redbooks . xxii Chapter 1. Understanding the IBM Power Systems 775 Cluster. 1 1.1 Overview of the IBM Power System 775 Supercomputer . 2 1.2 Advantages and new features of the IBM Power 775 . 3 1.3 Hardware information . 4 1.3.1 POWER7 chip. 4 1.3.2 I/O hub chip. 10 1.3.3 Collective acceleration unit (CAU) . 12 1.3.4 Nest memory management unit (NMMU) .
    [Show full text]