Introduction to Grid Computing

Introduction to Grid Computing

Front cover Introduction to Grid Computing Learn grid computing basics Understand architectural considerations Create and demonstrate a grid environment Bart Jacob Michael Brown Kentaro Fukui Nihar Trivedi ibm.com/redbooks International Technical Support Organization Introduction to Grid Computing December 2005 SG24-6778-00 Note: Before using this information, read the information in “Notices” on page ix. First Edition (December 2005) © Copyright International Business Machines Corporation 2005. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . x Preface . xi The team that wrote this redbook. xi Become a published author . xiii Comments welcome. xiii Part 1. Grid fundamentals . 1 Chapter 1. What grid Computing is . 3 Chapter 2. Benefits of grid computing . 7 2.1 Exploiting under utilized resources . 8 2.2 Parallel CPU capacity . 9 2.3 Virtual resources and virtual organizations for collaboration. 10 2.4 Access to additional resources . 11 2.5 Resource balancing. 12 2.6 Reliability . 14 2.7 Management . 15 2.8 Summary . 17 Chapter 3. Grid terms and concepts . 19 3.1 Types of resources . 20 3.1.1 Computation . 20 3.1.2 Storage . 20 3.1.3 Communications . 22 3.1.4 Software and licenses . 22 3.1.5 Special equipment, capacities, architectures, and policies . 23 3.2 Jobs and applications . 23 3.3 Scheduling, reservation, and scavenging . 24 3.4 Grid software components . 26 3.4.1 Management components. 26 3.4.2 Distributed grid management . 26 3.4.3 Donor software . 27 3.4.4 Submission software . 28 3.4.5 Schedulers . 28 3.4.6 Communications . 29 3.4.7 Observation and measurement. 29 © Copyright IBM Corp. 2005. All rights reserved. iii 3.5 Intragrid and intergrid . 30 3.6 Summary . 32 Chapter 4. Grid user roles . 33 4.1 Using a grid: A user’s perspective. 34 4.1.1 Enrolling and installing grid software. 34 4.1.2 Logging onto the grid . 34 4.1.3 Queries and submitting jobs . 35 4.1.4 Data configuration . 36 4.1.5 Monitoring progress and recovery. 36 4.1.6 Reserving resources . 37 4.2 Using a grid: An administrator’s perspective . 38 4.2.1 Planning . 38 4.2.2 Installation . 39 4.2.3 Managing enrollment of donors and users . 39 4.2.4 Certificate authority . 40 4.2.5 Resource management. 41 4.2.6 Data sharing . 41 4.3 Summary . 42 Part 2. Grid architecture considerations. 43 Chapter 5. Standards for grid environments . 45 5.1 Overview . 46 5.1.1 OGSA . 46 5.1.2 OGSI . 47 5.1.3 OGSA-DAI. 47 5.1.4 GridFTP. 48 5.1.5 WSRF . 48 5.1.6 Web services related standards . 49 Chapter 6. Application considerations . 51 6.1 General application considerations . 52 6.2 CPU-intensive application considerations . 53 6.3 Data considerations. 59 6.4 Summary . 62 Chapter 7. Security . 63 7.1 Introduction to grid security . 64 7.1.1 Grid security requirements . 64 7.1.2 Security fundamentals. 67 7.1.3 Important grid security terms. 68 7.1.4 Symmetric key encryption . 69 7.1.5 Asymmetric key encryption . 70 iv Introduction to Grid Computing 7.1.6 The Certificate Authority . 71 7.1.7 Digital certificates . 73 7.2 Grid security infrastructure . 76 7.2.1 Getting access to the grid . 76 7.2.2 Grid secure communication . 82 7.2.3 Grid security step-by-step . 84 7.3 Grid infrastructure security . 88 7.3.1 Physical security . 88 7.3.2 Operating system security. 88 7.3.3 Grid and firewalls . 89 7.3.4 Host intrusion detection. ..

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    268 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us