SlideShare a Scribd company logo
1 of 23
Download to read offline
GRID COMPUTING
Sandeep Kumar Poonia
Head Of Dept. CS/IT
B.E., M.Tech., UGC-NET
LM-IAENG, LM-IACSIT,LM-CSTA, LM-AIRCC, LM-SCIEI, AM-UACEE
SandeepKumarPoonia
The Grid: A new Infrastructure
for 21st century science
As computer networks become cheaper and more powerful, a new computing
paradigm is poised to transform the practice of science and engineering.
A pc in 2001 is as fast as a supercomputer of 1990.
But 10 years ago, biologists were happy to compute a single
molecular structure. Now, they want to calculate the structures
of complex assemblies of macromolecules and screen
thousands of drug candidates.
Personal computers now ship with up to 100 gigabytes (GB)
of storage – as much as an entire 1990 supercomputer center.
Some wide area networks now operate at 155 Mbps, three
orders of magnitude faster than the state-of-the art 56 Kbps that
connected U.S. supercomputer centers in 1985.
SandeepKumarPoonia
TECHNOLOGY TRENDS
Storage, Networks, and Computing power, doubles or,
more or less equivalently, halves in price in around 12, 9,
and 18 months, respectively
SandeepKumarPoonia
INFRASTRUCTURE AND TOOLS
The road system enables us to travel by car; the international banking
system allows us to transfer funds across borders; and the Internet
allows us to communicate with virtually any electronic device
A Grid infrastructure needs to provide more functionality than the
Internet on which it rests, but it must also remain simple. And of
course, the need remains for supporting the resources that power
the Grid, such as high-speed data movement, caching of large
datasets, and on-demand access to computing.
Tools make use of infrastructure services. Internet and Web
tools include browsers for accessing remote Web sites, e-mail
programs for handling electronic messages, and search engines
for locating Web pages.
Grid tools are concerned with resource discovery, data
management, scheduling of computation, security, and so forth.
SandeepKumarPoonia
INFRASTRUCTURE AND TOOLS
Science portals:
Science portals make advanced problem-solving
methods easier to use by invoking sophisticated
packages remotely from Web browsers or other
simple, easily downloaded ‘thin clients.’
The packages themselves can also run remotely on
suitable computers within a Grid.
Such portals are currently being developed in
biology, fusion, computational chemistry, and other
disciplines.
SandeepKumarPoonia
INFRASTRUCTURE AND TOOLS
Distributed computing:
High-speed workstations and networks can yoke together an
organization’s PCs to form a substantial computational resource.
Entropia Inc’s Fight-AIDSAtHome system harnesses more than
30 000 computers to analyze AIDS drug candidates.
And in 2001, mathematicians across the U.S. and Italy pooled
their computational resources to solve a particular instance,
dubbed ‘Nug30,’ of an optimization problem.
For a week, the collaboration brought an average of 630 – and a
maximum of 1006 – computers to bear on Nug30, delivering a
total of 42 000 CPU-days.
Future improvements in network performance and Grid
technologies will increase the range of problems that aggregated
computing resources can tackle.
SandeepKumarPoonia
INFRASTRUCTURE AND TOOLS
Large-scale data analysis:
Many interesting scientific problems require the analysis of large
amounts of data.
For such problems, harnessing distributed computing and
storage resources is clearly of great value.
Furthermore, the natural parallelism inherent in many data
analysis procedures makes it feasible to use distributed resources
efficiently.
For various technical and political reasons, assembling these
resources at a single location appears impractical. Yet the
collective institutional and national resources of the hundreds of
institutions participating in those experiments can provide these
resources. These communities can, furthermore, share more than
just computers and storage. They can also share analysis
procedures and computational results.
SandeepKumarPoonia
INFRASTRUCTURE AND TOOLS
Computer-in-the-loop instrumentation:
Scientific instruments such as telescopes, synchrotrons, and
electron microscopes generate raw data streams that are archived
for subsequent batch processing.
But quasi-real-time analysis can greatly enhance an instrument’s
capabilities.
For example, consider an astronomer studying solar flares with a
radio telescope array. The deconvolution and analysis algorithms
used to process the data and detect flares are computationally
demanding. Running the algorithms continuously would be
inefficient for studying flares that are brief and sporadic.
But if the astronomer could call on substantial computing
resources (and sophisticated software) in an on-demand fashion, he
or she could use automated detection techniques to zoom in on
solar flares as they occurred.
SandeepKumarPoonia
INFRASTRUCTURE AND TOOLS
Collaborative work:
Researchers often want to aggregate not only
data and computing power but also human
expertise.
Collaborative problem formulation, data analysis,
and the like are important Grid applications.
For example, an astrophysicist who has
performed a large, multiterabyte simulation might
want colleagues around the world to visualize the
results in the same way and at the same time so
that the group can discuss the results in real time.
SandeepKumarPoonia
GRID ARCHITECTURE
SandeepKumarPoonia
GRID ARCHITECTURE ……….
At the lowest level, the fabric, we have the physical
devices or resources that Grid users want to share
and access, including computers, storage systems,
catalogs, networks, and various forms of sensors.
SandeepKumarPoonia
The resource layer contains protocols that exploit communication
and authentication protocols to enable the secure initiation,
monitoring, and control of resource-sharing operations.
Running the same program on different computer systems
depends on resource layer protocols.
The Globus Toolkit is a commonly used source of connectivity
and resource protocols and APIs.
SandeepKumarPoonia
The collective layer contains protocols, services, and APIs that
implement interactions across collections of resources.
Because they combine and exploit components from the
relatively narrower resource and connectivity layers, the
components of the collective layer can implement a wide variety
of tasks without requiring new resource-layer components.
Examples of collective services include
directory and brokering services for resource discovery and
allocation;
monitoring and diagnostic services;
data replication services; and
membership and policy services for keeping track of who in
a community is allowed to access resources.
SandeepKumarPoonia
At the top of any Grid system are the user applications, which are
constructed in terms of, and call on, the components in any other
layer.
For example, a high-energy physics analysis application that needs
to execute several thousands of independent tasks, each taking as
input some set of files containing events, might proceed by
obtaining necessary authentication credentials ;
querying an information system and replica catalog to determine
availability of services;
submitting requests to appropriate computers, storage systems, and
networks to initiate computations, move data, and so forth (resource
protocols); and
monitoring the progress of the various computations and data
transfers, notifying the user when all are completed, and detecting and
responding to failure conditions (resource protocols).
SandeepKumarPoonia
AUTHENTICATION, AUTHORIZATION
AND POLICY
In Grid environments, the situation is more complex. The distinction
between client and server tends to disappear, because an individual
resource can act as a server one moment (as it receives a request)
and as a client at another (as it issues requests to other resources).
Managing that kind of transaction turns out to have a number of interesting
requirements, such as:
Single sign-on
Mapping to local security mechanisms
Delegation
Community authorization and policy
SandeepKumarPoonia
AUTHENTICATION, AUTHORIZATION
AND POLICY
SandeepKumarPoonia
AUTHENTICATION, AUTHORIZATION
AND POLICY
Single sign-on:
A single computation may entail access to many resources, but
requiring a user to re-authenticate on each occasion (by, e.g., typing
in a password) is impractical and generally unacceptable.
Instead, a user should be able to authenticate once and then
assign to the computation the right to operate on his or her behalf,
typically for a specified period.
This capability is achieved through the creation of a proxy
credential.
SandeepKumarPoonia
In Figure, the program run by the user (the user proxy)
uses a proxy credential to authenticate at two different
sites.
These services handle requests to create new processes.
SandeepKumarPoonia
AUTHENTICATION, AUTHORIZATION
AND POLICY
Mapping to local security mechanisms:
Different sites may use different local security solutions, such as
Kerberos and Unix.
A Grid security infrastructure needs to map to these local solutions at
each site, so that local operations can proceed with appropriate
privileges.
In Figure, processes execute under a local ID and, at site A, are assigned a
Kerberos ‘ticket,’ a credential used by the Kerberos authentication system to
keep track of requests.
SandeepKumarPoonia
AUTHENTICATION, AUTHORIZATION
AND POLICY
Delegation:
The creation of a proxy credential is a form of delegation, an
operation of fundamental importance in Grid environments.
A computation that spans many resources creates sub-computations
(subsidiary computations) that may themselves generate requests to
other resources and services, perhaps creating additional sub-
computations, and so on.
SandeepKumarPoonia
AUTHENTICATION, AUTHORIZATION
AND POLICY
In Figure, the two sub-computations created at sites A and B both
communicate with each other and access files at site C.
Authentication operations – and hence further delegated credentials
– are involved at each stage, as resources determine whether to grant
requests and computations determine whether resources are
trustworthy.
The further these delegated credentials are disseminated, the
greater the risk that they will be acquired and misused by an
adversary. These delegation operations and the credentials that enable
them must be carefully managed.
SandeepKumarPoonia
Community authorization and policy:
In a large community, the policies that govern who can use which
resources for what purpose cannot be based directly on individual
identity.
It is infeasible for each resource to keep track of community
membership and privileges.
Instead, resources (and users) need to be able to express policies in
terms of other criteria, such as group membership, which can be
identified with a cryptographic credential issued by a trusted third
party.
AUTHENTICATION, AUTHORIZATION
AND POLICY
SandeepKumarPoonia
In the scenario depicted in Figure, the file server at site C must know
explicitly whether the user is allowed to access a particular file. A
community authorization system allows this policy decision to be
delegated to a community representative.

More Related Content

What's hot

Grid computing [2005]
Grid computing [2005]Grid computing [2005]
Grid computing [2005]Raul Soto
 
Computing Outside The Box
Computing Outside The BoxComputing Outside The Box
Computing Outside The BoxIan Foster
 
Grid Computing (An Up-Coming Technology)
Grid Computing (An Up-Coming Technology)Grid Computing (An Up-Coming Technology)
Grid Computing (An Up-Coming Technology)LJ PROJECTS
 
Grid computing
Grid computingGrid computing
Grid computingWipro
 
Grid Computing - Collection of computer resources from multiple locations
Grid Computing - Collection of computer resources from multiple locationsGrid Computing - Collection of computer resources from multiple locations
Grid Computing - Collection of computer resources from multiple locationsDibyadip Das
 
Grid Computing Frameworks
Grid Computing FrameworksGrid Computing Frameworks
Grid Computing FrameworksSabbir Ahmmed
 
Grid protocol architecture
Grid protocol architectureGrid protocol architecture
Grid protocol architecturePooja Dixit
 
Grid computing by vaishali sahare [katkar]
Grid computing by vaishali sahare [katkar]Grid computing by vaishali sahare [katkar]
Grid computing by vaishali sahare [katkar]vaishalisahare123
 
Grid computing the grid
Grid computing the gridGrid computing the grid
Grid computing the gridJivan Nepali
 
Grid computing: An Emerging Technology
Grid computing: An Emerging TechnologyGrid computing: An Emerging Technology
Grid computing: An Emerging Technologyijsrd.com
 
F233842
F233842F233842
F233842irjes
 
Disambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities ResearchersDisambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities ResearchersBaden Hughes
 

What's hot (20)

Grid computing
Grid computingGrid computing
Grid computing
 
Grid computing
Grid computingGrid computing
Grid computing
 
Grid computing
Grid computingGrid computing
Grid computing
 
Grid computing [2005]
Grid computing [2005]Grid computing [2005]
Grid computing [2005]
 
Computing Outside The Box
Computing Outside The BoxComputing Outside The Box
Computing Outside The Box
 
Grid Computing (An Up-Coming Technology)
Grid Computing (An Up-Coming Technology)Grid Computing (An Up-Coming Technology)
Grid Computing (An Up-Coming Technology)
 
Grid computing
Grid computingGrid computing
Grid computing
 
Grid Computing - Collection of computer resources from multiple locations
Grid Computing - Collection of computer resources from multiple locationsGrid Computing - Collection of computer resources from multiple locations
Grid Computing - Collection of computer resources from multiple locations
 
Grid Computing Frameworks
Grid Computing FrameworksGrid Computing Frameworks
Grid Computing Frameworks
 
Grid protocol architecture
Grid protocol architectureGrid protocol architecture
Grid protocol architecture
 
Grid computing
Grid computingGrid computing
Grid computing
 
Grid computing by vaishali sahare [katkar]
Grid computing by vaishali sahare [katkar]Grid computing by vaishali sahare [katkar]
Grid computing by vaishali sahare [katkar]
 
Grid Computing
Grid ComputingGrid Computing
Grid Computing
 
Grid computing
Grid computingGrid computing
Grid computing
 
Grid computing the grid
Grid computing the gridGrid computing the grid
Grid computing the grid
 
Grid computing: An Emerging Technology
Grid computing: An Emerging TechnologyGrid computing: An Emerging Technology
Grid computing: An Emerging Technology
 
F233842
F233842F233842
F233842
 
Disambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities ResearchersDisambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities Researchers
 
Grid computing ppt
Grid computing pptGrid computing ppt
Grid computing ppt
 
grid computing
grid computinggrid computing
grid computing
 

Similar to 3. the grid new infrastructure

Grid computing assiment
Grid computing assimentGrid computing assiment
Grid computing assimentHuma Tariq
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingAnimesh Chaturvedi
 
Iaetsd survey on big data analytics for sdn (software defined networks)
Iaetsd survey on big data analytics for sdn (software defined networks)Iaetsd survey on big data analytics for sdn (software defined networks)
Iaetsd survey on big data analytics for sdn (software defined networks)Iaetsd Iaetsd
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
F233842
F233842F233842
F233842irjes
 
GridComputing-an introduction.ppt
GridComputing-an introduction.pptGridComputing-an introduction.ppt
GridComputing-an introduction.pptNileshkuGiri
 
A Survey on Neural Network Based Minimization of Data Center in Power Consump...
A Survey on Neural Network Based Minimization of Data Center in Power Consump...A Survey on Neural Network Based Minimization of Data Center in Power Consump...
A Survey on Neural Network Based Minimization of Data Center in Power Consump...IJSTA
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagedbpublications
 
Grid and cluster_computing_chapter1
Grid and cluster_computing_chapter1Grid and cluster_computing_chapter1
Grid and cluster_computing_chapter1Bharath Kumar
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
A Review: Metaheuristic Technique in Cloud Computing
A Review: Metaheuristic Technique in Cloud ComputingA Review: Metaheuristic Technique in Cloud Computing
A Review: Metaheuristic Technique in Cloud ComputingIRJET Journal
 
Ieee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementIeee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementtsysglobalsolutions
 
Cloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsCloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsIJEEE
 
Scheduling in Virtual Infrastructure for High-Throughput Computing
Scheduling in Virtual Infrastructure for High-Throughput Computing Scheduling in Virtual Infrastructure for High-Throughput Computing
Scheduling in Virtual Infrastructure for High-Throughput Computing IJCSEA Journal
 

Similar to 3. the grid new infrastructure (20)

Grid computing assiment
Grid computing assimentGrid computing assiment
Grid computing assiment
 
GRID COMPUTING.ppt
GRID COMPUTING.pptGRID COMPUTING.ppt
GRID COMPUTING.ppt
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
1. GRID COMPUTING
1. GRID COMPUTING1. GRID COMPUTING
1. GRID COMPUTING
 
Grid computing
Grid computingGrid computing
Grid computing
 
Iaetsd survey on big data analytics for sdn (software defined networks)
Iaetsd survey on big data analytics for sdn (software defined networks)Iaetsd survey on big data analytics for sdn (software defined networks)
Iaetsd survey on big data analytics for sdn (software defined networks)
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
F233842
F233842F233842
F233842
 
GridComputing-an introduction.ppt
GridComputing-an introduction.pptGridComputing-an introduction.ppt
GridComputing-an introduction.ppt
 
7- Grid Computing.Pdf
7- Grid Computing.Pdf7- Grid Computing.Pdf
7- Grid Computing.Pdf
 
A Survey on Neural Network Based Minimization of Data Center in Power Consump...
A Survey on Neural Network Based Minimization of Data Center in Power Consump...A Survey on Neural Network Based Minimization of Data Center in Power Consump...
A Survey on Neural Network Based Minimization of Data Center in Power Consump...
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
40 41
40 4140 41
40 41
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storage
 
Grid and cluster_computing_chapter1
Grid and cluster_computing_chapter1Grid and cluster_computing_chapter1
Grid and cluster_computing_chapter1
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A Review: Metaheuristic Technique in Cloud Computing
A Review: Metaheuristic Technique in Cloud ComputingA Review: Metaheuristic Technique in Cloud Computing
A Review: Metaheuristic Technique in Cloud Computing
 
Ieee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementIeee transactions on 2018 network and service management
Ieee transactions on 2018 network and service management
 
Cloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsCloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithms
 
Scheduling in Virtual Infrastructure for High-Throughput Computing
Scheduling in Virtual Infrastructure for High-Throughput Computing Scheduling in Virtual Infrastructure for High-Throughput Computing
Scheduling in Virtual Infrastructure for High-Throughput Computing
 

More from Dr Sandeep Kumar Poonia

An improved memetic search in artificial bee colony algorithm
An improved memetic search in artificial bee colony algorithmAn improved memetic search in artificial bee colony algorithm
An improved memetic search in artificial bee colony algorithmDr Sandeep Kumar Poonia
 
Modified position update in spider monkey optimization algorithm
Modified position update in spider monkey optimization algorithmModified position update in spider monkey optimization algorithm
Modified position update in spider monkey optimization algorithmDr Sandeep Kumar Poonia
 
Enhanced local search in artificial bee colony algorithm
Enhanced local search in artificial bee colony algorithmEnhanced local search in artificial bee colony algorithm
Enhanced local search in artificial bee colony algorithmDr Sandeep Kumar Poonia
 
Memetic search in differential evolution algorithm
Memetic search in differential evolution algorithmMemetic search in differential evolution algorithm
Memetic search in differential evolution algorithmDr Sandeep Kumar Poonia
 
Improved onlooker bee phase in artificial bee colony algorithm
Improved onlooker bee phase in artificial bee colony algorithmImproved onlooker bee phase in artificial bee colony algorithm
Improved onlooker bee phase in artificial bee colony algorithmDr Sandeep Kumar Poonia
 
Comparative study of_hybrids_of_artificial_bee_colony_algorithm
Comparative study of_hybrids_of_artificial_bee_colony_algorithmComparative study of_hybrids_of_artificial_bee_colony_algorithm
Comparative study of_hybrids_of_artificial_bee_colony_algorithmDr Sandeep Kumar Poonia
 
A novel hybrid crossover based abc algorithm
A novel hybrid crossover based abc algorithmA novel hybrid crossover based abc algorithm
A novel hybrid crossover based abc algorithmDr Sandeep Kumar Poonia
 
Multiplication of two 3 d sparse matrices using 1d arrays and linked lists
Multiplication of two 3 d sparse matrices using 1d arrays and linked listsMultiplication of two 3 d sparse matrices using 1d arrays and linked lists
Multiplication of two 3 d sparse matrices using 1d arrays and linked listsDr Sandeep Kumar Poonia
 
Sunzip user tool for data reduction using huffman algorithm
Sunzip user tool for data reduction using huffman algorithmSunzip user tool for data reduction using huffman algorithm
Sunzip user tool for data reduction using huffman algorithmDr Sandeep Kumar Poonia
 
New Local Search Strategy in Artificial Bee Colony Algorithm
New Local Search Strategy in Artificial Bee Colony Algorithm New Local Search Strategy in Artificial Bee Colony Algorithm
New Local Search Strategy in Artificial Bee Colony Algorithm Dr Sandeep Kumar Poonia
 
Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Dr Sandeep Kumar Poonia
 
Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...Dr Sandeep Kumar Poonia
 

More from Dr Sandeep Kumar Poonia (20)

Soft computing
Soft computingSoft computing
Soft computing
 
An improved memetic search in artificial bee colony algorithm
An improved memetic search in artificial bee colony algorithmAn improved memetic search in artificial bee colony algorithm
An improved memetic search in artificial bee colony algorithm
 
Modified position update in spider monkey optimization algorithm
Modified position update in spider monkey optimization algorithmModified position update in spider monkey optimization algorithm
Modified position update in spider monkey optimization algorithm
 
Enhanced local search in artificial bee colony algorithm
Enhanced local search in artificial bee colony algorithmEnhanced local search in artificial bee colony algorithm
Enhanced local search in artificial bee colony algorithm
 
RMABC
RMABCRMABC
RMABC
 
Memetic search in differential evolution algorithm
Memetic search in differential evolution algorithmMemetic search in differential evolution algorithm
Memetic search in differential evolution algorithm
 
Improved onlooker bee phase in artificial bee colony algorithm
Improved onlooker bee phase in artificial bee colony algorithmImproved onlooker bee phase in artificial bee colony algorithm
Improved onlooker bee phase in artificial bee colony algorithm
 
Comparative study of_hybrids_of_artificial_bee_colony_algorithm
Comparative study of_hybrids_of_artificial_bee_colony_algorithmComparative study of_hybrids_of_artificial_bee_colony_algorithm
Comparative study of_hybrids_of_artificial_bee_colony_algorithm
 
A novel hybrid crossover based abc algorithm
A novel hybrid crossover based abc algorithmA novel hybrid crossover based abc algorithm
A novel hybrid crossover based abc algorithm
 
Multiplication of two 3 d sparse matrices using 1d arrays and linked lists
Multiplication of two 3 d sparse matrices using 1d arrays and linked listsMultiplication of two 3 d sparse matrices using 1d arrays and linked lists
Multiplication of two 3 d sparse matrices using 1d arrays and linked lists
 
Sunzip user tool for data reduction using huffman algorithm
Sunzip user tool for data reduction using huffman algorithmSunzip user tool for data reduction using huffman algorithm
Sunzip user tool for data reduction using huffman algorithm
 
New Local Search Strategy in Artificial Bee Colony Algorithm
New Local Search Strategy in Artificial Bee Colony Algorithm New Local Search Strategy in Artificial Bee Colony Algorithm
New Local Search Strategy in Artificial Bee Colony Algorithm
 
A new approach of program slicing
A new approach of program slicingA new approach of program slicing
A new approach of program slicing
 
Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...
 
Enhanced abc algo for tsp
Enhanced abc algo for tspEnhanced abc algo for tsp
Enhanced abc algo for tsp
 
Database aggregation using metadata
Database aggregation using metadataDatabase aggregation using metadata
Database aggregation using metadata
 
Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...
 
Lecture28 tsp
Lecture28 tspLecture28 tsp
Lecture28 tsp
 
Lecture27 linear programming
Lecture27 linear programmingLecture27 linear programming
Lecture27 linear programming
 
Lecture26
Lecture26Lecture26
Lecture26
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

3. the grid new infrastructure

  • 1. GRID COMPUTING Sandeep Kumar Poonia Head Of Dept. CS/IT B.E., M.Tech., UGC-NET LM-IAENG, LM-IACSIT,LM-CSTA, LM-AIRCC, LM-SCIEI, AM-UACEE
  • 2. SandeepKumarPoonia The Grid: A new Infrastructure for 21st century science As computer networks become cheaper and more powerful, a new computing paradigm is poised to transform the practice of science and engineering. A pc in 2001 is as fast as a supercomputer of 1990. But 10 years ago, biologists were happy to compute a single molecular structure. Now, they want to calculate the structures of complex assemblies of macromolecules and screen thousands of drug candidates. Personal computers now ship with up to 100 gigabytes (GB) of storage – as much as an entire 1990 supercomputer center. Some wide area networks now operate at 155 Mbps, three orders of magnitude faster than the state-of-the art 56 Kbps that connected U.S. supercomputer centers in 1985.
  • 3. SandeepKumarPoonia TECHNOLOGY TRENDS Storage, Networks, and Computing power, doubles or, more or less equivalently, halves in price in around 12, 9, and 18 months, respectively
  • 4. SandeepKumarPoonia INFRASTRUCTURE AND TOOLS The road system enables us to travel by car; the international banking system allows us to transfer funds across borders; and the Internet allows us to communicate with virtually any electronic device A Grid infrastructure needs to provide more functionality than the Internet on which it rests, but it must also remain simple. And of course, the need remains for supporting the resources that power the Grid, such as high-speed data movement, caching of large datasets, and on-demand access to computing. Tools make use of infrastructure services. Internet and Web tools include browsers for accessing remote Web sites, e-mail programs for handling electronic messages, and search engines for locating Web pages. Grid tools are concerned with resource discovery, data management, scheduling of computation, security, and so forth.
  • 5. SandeepKumarPoonia INFRASTRUCTURE AND TOOLS Science portals: Science portals make advanced problem-solving methods easier to use by invoking sophisticated packages remotely from Web browsers or other simple, easily downloaded ‘thin clients.’ The packages themselves can also run remotely on suitable computers within a Grid. Such portals are currently being developed in biology, fusion, computational chemistry, and other disciplines.
  • 6. SandeepKumarPoonia INFRASTRUCTURE AND TOOLS Distributed computing: High-speed workstations and networks can yoke together an organization’s PCs to form a substantial computational resource. Entropia Inc’s Fight-AIDSAtHome system harnesses more than 30 000 computers to analyze AIDS drug candidates. And in 2001, mathematicians across the U.S. and Italy pooled their computational resources to solve a particular instance, dubbed ‘Nug30,’ of an optimization problem. For a week, the collaboration brought an average of 630 – and a maximum of 1006 – computers to bear on Nug30, delivering a total of 42 000 CPU-days. Future improvements in network performance and Grid technologies will increase the range of problems that aggregated computing resources can tackle.
  • 7. SandeepKumarPoonia INFRASTRUCTURE AND TOOLS Large-scale data analysis: Many interesting scientific problems require the analysis of large amounts of data. For such problems, harnessing distributed computing and storage resources is clearly of great value. Furthermore, the natural parallelism inherent in many data analysis procedures makes it feasible to use distributed resources efficiently. For various technical and political reasons, assembling these resources at a single location appears impractical. Yet the collective institutional and national resources of the hundreds of institutions participating in those experiments can provide these resources. These communities can, furthermore, share more than just computers and storage. They can also share analysis procedures and computational results.
  • 8. SandeepKumarPoonia INFRASTRUCTURE AND TOOLS Computer-in-the-loop instrumentation: Scientific instruments such as telescopes, synchrotrons, and electron microscopes generate raw data streams that are archived for subsequent batch processing. But quasi-real-time analysis can greatly enhance an instrument’s capabilities. For example, consider an astronomer studying solar flares with a radio telescope array. The deconvolution and analysis algorithms used to process the data and detect flares are computationally demanding. Running the algorithms continuously would be inefficient for studying flares that are brief and sporadic. But if the astronomer could call on substantial computing resources (and sophisticated software) in an on-demand fashion, he or she could use automated detection techniques to zoom in on solar flares as they occurred.
  • 9. SandeepKumarPoonia INFRASTRUCTURE AND TOOLS Collaborative work: Researchers often want to aggregate not only data and computing power but also human expertise. Collaborative problem formulation, data analysis, and the like are important Grid applications. For example, an astrophysicist who has performed a large, multiterabyte simulation might want colleagues around the world to visualize the results in the same way and at the same time so that the group can discuss the results in real time.
  • 11. SandeepKumarPoonia GRID ARCHITECTURE ………. At the lowest level, the fabric, we have the physical devices or resources that Grid users want to share and access, including computers, storage systems, catalogs, networks, and various forms of sensors.
  • 12. SandeepKumarPoonia The resource layer contains protocols that exploit communication and authentication protocols to enable the secure initiation, monitoring, and control of resource-sharing operations. Running the same program on different computer systems depends on resource layer protocols. The Globus Toolkit is a commonly used source of connectivity and resource protocols and APIs.
  • 13. SandeepKumarPoonia The collective layer contains protocols, services, and APIs that implement interactions across collections of resources. Because they combine and exploit components from the relatively narrower resource and connectivity layers, the components of the collective layer can implement a wide variety of tasks without requiring new resource-layer components. Examples of collective services include directory and brokering services for resource discovery and allocation; monitoring and diagnostic services; data replication services; and membership and policy services for keeping track of who in a community is allowed to access resources.
  • 14. SandeepKumarPoonia At the top of any Grid system are the user applications, which are constructed in terms of, and call on, the components in any other layer. For example, a high-energy physics analysis application that needs to execute several thousands of independent tasks, each taking as input some set of files containing events, might proceed by obtaining necessary authentication credentials ; querying an information system and replica catalog to determine availability of services; submitting requests to appropriate computers, storage systems, and networks to initiate computations, move data, and so forth (resource protocols); and monitoring the progress of the various computations and data transfers, notifying the user when all are completed, and detecting and responding to failure conditions (resource protocols).
  • 15. SandeepKumarPoonia AUTHENTICATION, AUTHORIZATION AND POLICY In Grid environments, the situation is more complex. The distinction between client and server tends to disappear, because an individual resource can act as a server one moment (as it receives a request) and as a client at another (as it issues requests to other resources). Managing that kind of transaction turns out to have a number of interesting requirements, such as: Single sign-on Mapping to local security mechanisms Delegation Community authorization and policy
  • 17. SandeepKumarPoonia AUTHENTICATION, AUTHORIZATION AND POLICY Single sign-on: A single computation may entail access to many resources, but requiring a user to re-authenticate on each occasion (by, e.g., typing in a password) is impractical and generally unacceptable. Instead, a user should be able to authenticate once and then assign to the computation the right to operate on his or her behalf, typically for a specified period. This capability is achieved through the creation of a proxy credential.
  • 18. SandeepKumarPoonia In Figure, the program run by the user (the user proxy) uses a proxy credential to authenticate at two different sites. These services handle requests to create new processes.
  • 19. SandeepKumarPoonia AUTHENTICATION, AUTHORIZATION AND POLICY Mapping to local security mechanisms: Different sites may use different local security solutions, such as Kerberos and Unix. A Grid security infrastructure needs to map to these local solutions at each site, so that local operations can proceed with appropriate privileges. In Figure, processes execute under a local ID and, at site A, are assigned a Kerberos ‘ticket,’ a credential used by the Kerberos authentication system to keep track of requests.
  • 20. SandeepKumarPoonia AUTHENTICATION, AUTHORIZATION AND POLICY Delegation: The creation of a proxy credential is a form of delegation, an operation of fundamental importance in Grid environments. A computation that spans many resources creates sub-computations (subsidiary computations) that may themselves generate requests to other resources and services, perhaps creating additional sub- computations, and so on.
  • 21. SandeepKumarPoonia AUTHENTICATION, AUTHORIZATION AND POLICY In Figure, the two sub-computations created at sites A and B both communicate with each other and access files at site C. Authentication operations – and hence further delegated credentials – are involved at each stage, as resources determine whether to grant requests and computations determine whether resources are trustworthy. The further these delegated credentials are disseminated, the greater the risk that they will be acquired and misused by an adversary. These delegation operations and the credentials that enable them must be carefully managed.
  • 22. SandeepKumarPoonia Community authorization and policy: In a large community, the policies that govern who can use which resources for what purpose cannot be based directly on individual identity. It is infeasible for each resource to keep track of community membership and privileges. Instead, resources (and users) need to be able to express policies in terms of other criteria, such as group membership, which can be identified with a cryptographic credential issued by a trusted third party. AUTHENTICATION, AUTHORIZATION AND POLICY
  • 23. SandeepKumarPoonia In the scenario depicted in Figure, the file server at site C must know explicitly whether the user is allowed to access a particular file. A community authorization system allows this policy decision to be delegated to a community representative.