SlideShare a Scribd company logo
1 of 2
Download to read offline
International Indexed & Refereed Research Journal, January, 2013 ISSN 0975-3486, RNI- RAJBIL- 2009-30097, VOL- IV * ISSUE- 40
                                   Research Paper—Computer Science
                         TCP/IP Security Protocols for High Performance
                                  Grid Computing Architecture
 January,2013                        * Abdur Rakib
        * University: Cmj University, Meghalaya
A B S T R A C T
 Grid computing is a term referring to the combination of computer resources from multiple administrative domains to attain
 a common goal. The grid can be thought of as a distributed system with non-interactive workloads that involve a large
 number of files. In this paper, we propose a solution for various security issues found in High Performance Grid Computing
 Architecture. We analyze different network layers available in Grid Protocol Architecture and identify various security
 disciplines at its different layers. We also analyze various Security Suites available for TCP/IP Internet Protocol Architecture.
 The paper intends to achieve two major tasks.
Keywords: Reliability, Performance, Grid Computing, Resources, Security, Modeling.
Introduction:                                                      detection is an important component of any modern
           Grid computing began in the academic                    security system because it is considered as a second
research community and the national defense industry,              line of defense against bugs and security holes as well
where researchers needed to process large amounts of               as providing protection against insiders. This thesis
data as quickly as possible for data intensive projects.           studies the problem of intrusion detection in Grid
It is an innovative approach that leverages existing IT            environments since it is considered as an important
infrastructure to optimize compute resources and                   security issue. It introduces flexible cooperative
manage data and computing workloads. Using the                     distributed intrusion detection architecture for
original concept of grid computing, arrays of compu-               computational Grids. This work is based on the study
tational power are constructed from a network of many              of latest Grid projects and intrusion detection systems
small and widespread computers and used to perform                 to deliver architecture that suits and benefits form the
large calculations and operations that can be decom-               underlying computational Grid evironment.A prototype
posed into independent units of work. This approach                implementation of the proposed architecture for the
allows massive computational projects to achieve re-               purposes of validation and verification is also
sults that otherwise could not be completed even on                introduces.
today's largest computers. As the concept has evolved,                       According to Foster and Kesselman a grid is
grid computing gained rapid acceptance in the com-                 a system that conforms to three specific categories: it
mercial marketplace in a manner similar to the emer-               coordinates resources that are not subject to centralized
gence of the Internet. Organizations with both large               control, it uses standard, open, general-purpose
and small networks have been adopting grid techniques              protocols and interfaces, and it delivers nontrivial
in order to reduce execution time as well as to enable             quality of service. Next generation scientific exploration
resource sharing. With the rapid advance in science,               requires computing power and storage that no single
engineering, and business; people seek more compu-                 institution alone is able to afford. Additionally, easy
tational power and resources to solve their problems               access to distributed data is required to improve the
more efficiently in terms of accuracy, time, secure and            sharing of results by scientific communities spread
money.                                                             around the world. The proposed solution to these
           The field of Grid computing was born to fill the        challenges is to enable different institutions, working
gap between available technology and increasing                    in the same scientific field, to put their computing,
demand for computational power. The Grid provides a                storage and data resources together in order to achieve
powerful computational environment by coupling                     the required performance and scale. Grid is a type of
distributed resources to enable seamless aggregation               parallel and distributed system that enables the sharing,
and sharing to create more powerful resource. The term             selection, and aggregation of services of heterogeneous
distributed here does not refer only to geographical               resources distributed across "multiple" administrative
locations but also to administration that may span                 domains based on their availability, capability, perfor-
multiple organizations. Security issues were addressed             mance, cost, and users' quality-of-service requirements.
from the beginning of the Grid computing because of                As Network performance has outpaced computational
their importance to the success of such field. Intrusion           power and storage capacity, this new paradigm has

   40               RESEARCH ANALYSIS AND EVALUATION
International Indexed & Refereed Research Journal, January, 2013 ISSN 0975-3486, RNI- RAJBIL- 2009-30097, VOL- IV * ISSUE- 40
evolved to enable the sharing and coordinated use of           unused CPU capacity in all participating machines to
geographically distributed resources. This chapter             be allocated to one application that is extremely com-
presents an introduction to Grid giving focus to the           putation intensive.
main requirements and challenges that must be ad-                        Our purpose in this article is to argue that the
dressed in setting up this new paradigm of distributed         Grid concept is indeed motivated by a real and specific
computing.                                                     problem and that there is an emerging, well-defined
          The ancestor of the Grid is Metacomputing.           Grid technology base that addresses significant aspects
This term was coined in the early eighties. The idea of        of this problem. In the process, we develop a detailed
Metacomputing was to interconnect a collection of              architecture and roadmap for current and future Grid
computers held together by state-of-the-art technol-           technologies. Furthermore, we assert that while Grid
ogy and "balanced" so that, to the individual user, it         technologies are currently distinct from other major
looks and acts like a single computer. The constituent         technology trends, such as Internet, enterprise,
parts of the resulting "metacomputer" could be housed          distributed, and peer-to-peer computing, these other
locally, or distributed between buildings, even conti-         trends can benefit significantly from growing into the
nents. There are new economic as well as business              problem space addressed by Grid technologies. The
factors that are contributing to the heightened interest       real and specific problem that underlies the Grid concept
in the development and implementation of grid com-             is coordinated resource sharing and problem solving
puting. Because of the Internet and the way business           in dynamic, multi-institutional virtual
is conducted today, we are inundated with data. As the         organizations. The sharing that we are concerned with
data flood gates open wider, the window of opportu-            is not primarily file exchange but rather direct access to
nity for capturing and turning this data into informa-         computers, software, data, and other resources, as is
tion grows shorter and shorter.                                required by a range of collaborative problem-solving
          Computing applications in many industries            and resource brokering strategies emerging in industry,
involve processing large volumes of data and/or per-           science, and engineering. This sharing is, necessarily,
forming repetitive computations that exceed existing           highly controlled, with resource providers and
server platform capabilities. In order to use data analy-      consumers defining clearly and carefully just what is
sis to achieve business intelligence and improve deci-         shared, who is allowed to share, and the conditions
sion making, data must be analyzed in a timely manner.         under which sharing occurs.
Today's business requirements often demand a much              Conclusion:
larger sample size for analysis or perhaps use of the                    A computer cluster is a group of linked
entire data source for maximum accuracy. Thechallenges         computers, working together closely so that in many
that IT shops face today, including budget cuts, server        respects they form a single computer. The components
consolidation, hardware provisioning and overall               of a cluster are connected to each other through fast
administration, are all factors driving interest in and        local area networks. Cluster computing is the technique
implementation of grid computing.                              of linking two or more computers into a local area
          The convergence of recent hardware and               network in order to take the advantage of parallel pro-
software advances has made resource virtualization             cessing. In this paper, we propose a solution for various
possible and made it easier to construct a grid. On the        security issues found in Cluster Computing Architec-
hardware side, these advances include networked                ture. We analyze various Security Suites available in
storage devices and low-cost, modular hardware com-            TCP/IP Security Protocol Suite. The paper intends to
ponents (such as blades); on the software side, they           achieve two major tasks. First, it defines variousSecurity
include improvements in networking, Web services,              Disciplines on different levels of Cluster Computing
databases, application servers and management                  Architecture. Second, it proposes different Security
frameworks. A parallel processing architecture in which        Suites available in different layers of TCP/IP Security
CPU resources are shared across a network, and all             Protocol Suite applicable for different Security
machines function as one large supercomputer. It allows        Disciplines defined in different levels of Cluster
                                                               Computing Architecture.
R E F E R E N C E
[1] http://www.cloudbus.org/~raj/papers/gridtech.pdf pg 1-30
 [2] http://www.uhd.edu/academic/colleges/sciences/ccsds/pdf/7_Things_About_Grid_Computing.pdf pg 1-2
[3] http://www.cs.kent.edu/~farrell/grid06/lectures/grid01.pdf pg 1-11
[4] http://www.redbooks.ibm.com/redbooks/pdfs/sg246778.pdf 1-268
[5]http://www.nature.com/nature/webmatters/grid/
[6] Steven M. Bellovin et. al. "Probable Plaintext Cryptanalysis of the IP Security Protocols", In Advances in
   Cryptology:Proceedings of CRYPTO 96 , pages 1-15.
        RESEARCH ANALYSIS AND EVALUATION                                                                         41

More Related Content

What's hot

Grid Computing - Collection of computer resources from multiple locations
Grid Computing - Collection of computer resources from multiple locationsGrid Computing - Collection of computer resources from multiple locations
Grid Computing - Collection of computer resources from multiple locationsDibyadip Das
 
Grid computing ppt 2003(done)
Grid computing ppt 2003(done)Grid computing ppt 2003(done)
Grid computing ppt 2003(done)TASNEEM88
 
GRID COMPUTING PRESENTATION
GRID COMPUTING PRESENTATION GRID COMPUTING PRESENTATION
GRID COMPUTING PRESENTATION Ashok Mannai
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
 
A Literature Survey on Resource Management Techniques, Issues and Challenges ...
A Literature Survey on Resource Management Techniques, Issues and Challenges ...A Literature Survey on Resource Management Techniques, Issues and Challenges ...
A Literature Survey on Resource Management Techniques, Issues and Challenges ...TELKOMNIKA JOURNAL
 
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Souvik Pal
 
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUESBIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUESijwmn
 
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUESBIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUESijwmn
 
Grid computing by vaishali sahare [katkar]
Grid computing by vaishali sahare [katkar]Grid computing by vaishali sahare [katkar]
Grid computing by vaishali sahare [katkar]vaishalisahare123
 
A Comparative Study: Taxonomy of High Performance Computing (HPC)
A Comparative Study: Taxonomy of High Performance Computing (HPC) A Comparative Study: Taxonomy of High Performance Computing (HPC)
A Comparative Study: Taxonomy of High Performance Computing (HPC) IJECEIAES
 
Agent based Aggregation of Cloud Services- A Research Agenda
Agent based Aggregation of Cloud Services- A Research AgendaAgent based Aggregation of Cloud Services- A Research Agenda
Agent based Aggregation of Cloud Services- A Research Agendaidescitation
 
Grid computing [2005]
Grid computing [2005]Grid computing [2005]
Grid computing [2005]Raul Soto
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPTUpender Upr
 

What's hot (20)

Grid Computing - Collection of computer resources from multiple locations
Grid Computing - Collection of computer resources from multiple locationsGrid Computing - Collection of computer resources from multiple locations
Grid Computing - Collection of computer resources from multiple locations
 
Grid computing ppt 2003(done)
Grid computing ppt 2003(done)Grid computing ppt 2003(done)
Grid computing ppt 2003(done)
 
Grid computing
Grid computingGrid computing
Grid computing
 
Grid computing
Grid computingGrid computing
Grid computing
 
GRID COMPUTING PRESENTATION
GRID COMPUTING PRESENTATION GRID COMPUTING PRESENTATION
GRID COMPUTING PRESENTATION
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
 
A Literature Survey on Resource Management Techniques, Issues and Challenges ...
A Literature Survey on Resource Management Techniques, Issues and Challenges ...A Literature Survey on Resource Management Techniques, Issues and Challenges ...
A Literature Survey on Resource Management Techniques, Issues and Challenges ...
 
1. GRID COMPUTING
1. GRID COMPUTING1. GRID COMPUTING
1. GRID COMPUTING
 
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing
 
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUESBIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
 
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUESBIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
 
Grid Computing
Grid ComputingGrid Computing
Grid Computing
 
Grid computing
Grid computingGrid computing
Grid computing
 
Grid computing by vaishali sahare [katkar]
Grid computing by vaishali sahare [katkar]Grid computing by vaishali sahare [katkar]
Grid computing by vaishali sahare [katkar]
 
A Comparative Study: Taxonomy of High Performance Computing (HPC)
A Comparative Study: Taxonomy of High Performance Computing (HPC) A Comparative Study: Taxonomy of High Performance Computing (HPC)
A Comparative Study: Taxonomy of High Performance Computing (HPC)
 
Grid computing
Grid computingGrid computing
Grid computing
 
Agent based Aggregation of Cloud Services- A Research Agenda
Agent based Aggregation of Cloud Services- A Research AgendaAgent based Aggregation of Cloud Services- A Research Agenda
Agent based Aggregation of Cloud Services- A Research Agenda
 
Grid computing [2005]
Grid computing [2005]Grid computing [2005]
Grid computing [2005]
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPT
 
Grid computing
Grid computingGrid computing
Grid computing
 

Viewers also liked

Comunidad viatoriana de jutiapa (honduras) nº 1
Comunidad viatoriana de jutiapa (honduras)   nº 1Comunidad viatoriana de jutiapa (honduras)   nº 1
Comunidad viatoriana de jutiapa (honduras) nº 1SERSO San Viator
 
Планирование агентской деятельности. Соловьев А.А., ген.директор ООО «РЕСПЕКТ».
Планирование агентской деятельности. Соловьев А.А., ген.директор ООО «РЕСПЕКТ».Планирование агентской деятельности. Соловьев А.А., ген.директор ООО «РЕСПЕКТ».
Планирование агентской деятельности. Соловьев А.А., ген.директор ООО «РЕСПЕКТ».metrosphera
 
Comunidad viatoriana de jutiapa (honduras) nº 3
Comunidad viatoriana de jutiapa (honduras)   nº 3Comunidad viatoriana de jutiapa (honduras)   nº 3
Comunidad viatoriana de jutiapa (honduras) nº 3SERSO San Viator
 
La prueba de software, los métodos formales y los computer languages
La prueba de software, los métodos formales y los computer languagesLa prueba de software, los métodos formales y los computer languages
La prueba de software, los métodos formales y los computer languagesSoftware Guru
 
Mi biografía (Angie garcía)
Mi biografía (Angie garcía)Mi biografía (Angie garcía)
Mi biografía (Angie garcía)3015588175
 
Cirikepimpinanpelajar 130912220738-phpapp01
Cirikepimpinanpelajar 130912220738-phpapp01Cirikepimpinanpelajar 130912220738-phpapp01
Cirikepimpinanpelajar 130912220738-phpapp01Ustajah ILa AzieLa
 
Northampton libraries
Northampton libraries Northampton libraries
Northampton libraries NLIS
 
Doorway from Heaven and Windows into Heaven
Doorway from Heaven and Windows into HeavenDoorway from Heaven and Windows into Heaven
Doorway from Heaven and Windows into HeavenChristopher Heren
 
Comunidad viatoriana de jutiapa (honduras) nº 5
Comunidad viatoriana de jutiapa (honduras)   nº 5Comunidad viatoriana de jutiapa (honduras)   nº 5
Comunidad viatoriana de jutiapa (honduras) nº 5SERSO San Viator
 
01 preparation english (1)
01 preparation english (1)01 preparation english (1)
01 preparation english (1)Dinesh Venkat
 

Viewers also liked (20)

Comunidad viatoriana de jutiapa (honduras) nº 1
Comunidad viatoriana de jutiapa (honduras)   nº 1Comunidad viatoriana de jutiapa (honduras)   nº 1
Comunidad viatoriana de jutiapa (honduras) nº 1
 
Планирование агентской деятельности. Соловьев А.А., ген.директор ООО «РЕСПЕКТ».
Планирование агентской деятельности. Соловьев А.А., ген.директор ООО «РЕСПЕКТ».Планирование агентской деятельности. Соловьев А.А., ген.директор ООО «РЕСПЕКТ».
Планирование агентской деятельности. Соловьев А.А., ген.директор ООО «РЕСПЕКТ».
 
33 37
33 3733 37
33 37
 
Comunidad viatoriana de jutiapa (honduras) nº 3
Comunidad viatoriana de jutiapa (honduras)   nº 3Comunidad viatoriana de jutiapa (honduras)   nº 3
Comunidad viatoriana de jutiapa (honduras) nº 3
 
47 48
47 4847 48
47 48
 
La prueba de software, los métodos formales y los computer languages
La prueba de software, los métodos formales y los computer languagesLa prueba de software, los métodos formales y los computer languages
La prueba de software, los métodos formales y los computer languages
 
Mi biografía (Angie garcía)
Mi biografía (Angie garcía)Mi biografía (Angie garcía)
Mi biografía (Angie garcía)
 
28 30
28 3028 30
28 30
 
Cirikepimpinanpelajar 130912220738-phpapp01
Cirikepimpinanpelajar 130912220738-phpapp01Cirikepimpinanpelajar 130912220738-phpapp01
Cirikepimpinanpelajar 130912220738-phpapp01
 
Northampton libraries
Northampton libraries Northampton libraries
Northampton libraries
 
Doorway from Heaven and Windows into Heaven
Doorway from Heaven and Windows into HeavenDoorway from Heaven and Windows into Heaven
Doorway from Heaven and Windows into Heaven
 
LKS PKN
LKS PKNLKS PKN
LKS PKN
 
Ibm
IbmIbm
Ibm
 
Case study on xxl (1)
Case study on xxl (1)Case study on xxl (1)
Case study on xxl (1)
 
45 46
45 4645 46
45 46
 
4. asamblea
4. asamblea4. asamblea
4. asamblea
 
42 44
42 4442 44
42 44
 
Orientación profesional
Orientación profesionalOrientación profesional
Orientación profesional
 
Comunidad viatoriana de jutiapa (honduras) nº 5
Comunidad viatoriana de jutiapa (honduras)   nº 5Comunidad viatoriana de jutiapa (honduras)   nº 5
Comunidad viatoriana de jutiapa (honduras) nº 5
 
01 preparation english (1)
01 preparation english (1)01 preparation english (1)
01 preparation english (1)
 

Similar to 40 41

A Review Paper On Grid Computing
A Review Paper On Grid ComputingA Review Paper On Grid Computing
A Review Paper On Grid ComputingFiona Phillips
 
Grid and cluster_computing_chapter1
Grid and cluster_computing_chapter1Grid and cluster_computing_chapter1
Grid and cluster_computing_chapter1Bharath Kumar
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IRJET- Cost Effective Workflow Scheduling in Bigdata
IRJET-  	  Cost Effective Workflow Scheduling in BigdataIRJET-  	  Cost Effective Workflow Scheduling in Bigdata
IRJET- Cost Effective Workflow Scheduling in BigdataIRJET Journal
 
Computation grid as a connected world
Computation grid as a connected worldComputation grid as a connected world
Computation grid as a connected worldijcsa
 
A Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic InstitutionA Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic InstitutionArlene Smith
 
A Review Grid Computing
A Review  Grid ComputingA Review  Grid Computing
A Review Grid ComputingBecky Gilbert
 
Grid computing assiment
Grid computing assimentGrid computing assiment
Grid computing assimentHuma Tariq
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagedbpublications
 
Gridcomputingppt
GridcomputingpptGridcomputingppt
Gridcomputingpptnavjasser
 
Cloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsCloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsIJEEE
 
Unit i cloud computing
Unit i  cloud computingUnit i  cloud computing
Unit i cloud computingMGkaran
 

Similar to 40 41 (20)

A Review Paper On Grid Computing
A Review Paper On Grid ComputingA Review Paper On Grid Computing
A Review Paper On Grid Computing
 
Grid and cluster_computing_chapter1
Grid and cluster_computing_chapter1Grid and cluster_computing_chapter1
Grid and cluster_computing_chapter1
 
Grid computing
Grid computingGrid computing
Grid computing
 
Grid computing
Grid computingGrid computing
Grid computing
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IRJET- Cost Effective Workflow Scheduling in Bigdata
IRJET-  	  Cost Effective Workflow Scheduling in BigdataIRJET-  	  Cost Effective Workflow Scheduling in Bigdata
IRJET- Cost Effective Workflow Scheduling in Bigdata
 
Computation grid as a connected world
Computation grid as a connected worldComputation grid as a connected world
Computation grid as a connected world
 
Grid computing
Grid computingGrid computing
Grid computing
 
A Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic InstitutionA Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic Institution
 
Grid computing
Grid computingGrid computing
Grid computing
 
A Review Grid Computing
A Review  Grid ComputingA Review  Grid Computing
A Review Grid Computing
 
Grid computing assiment
Grid computing assimentGrid computing assiment
Grid computing assiment
 
Grid computing
Grid computingGrid computing
Grid computing
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storage
 
A01260104
A01260104A01260104
A01260104
 
Grid computing ppt
Grid computing pptGrid computing ppt
Grid computing ppt
 
Gridcomputingppt
GridcomputingpptGridcomputingppt
Gridcomputingppt
 
Cloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsCloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithms
 
Unit i cloud computing
Unit i  cloud computingUnit i  cloud computing
Unit i cloud computing
 
Grid computing ppt
Grid computing pptGrid computing ppt
Grid computing ppt
 

More from INTERNATIONAL INDEXED,REFERRED,MULTILINGUAL,INTERDISCIPLINARY, MONTHLY RESEARCH JOURNAL

More from INTERNATIONAL INDEXED,REFERRED,MULTILINGUAL,INTERDISCIPLINARY, MONTHLY RESEARCH JOURNAL (20)

Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...
Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...
Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...
 
The Geo-Strategic Significance of Afghanistan : From The Past to The Present...
The Geo-Strategic Significance of Afghanistan :  From The Past to The Present...The Geo-Strategic Significance of Afghanistan :  From The Past to The Present...
The Geo-Strategic Significance of Afghanistan : From The Past to The Present...
 
Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...
Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...
Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...
 
Goel-INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
Goel-INTERNATIONAL INDEXED REFEREED RESEARCH PAPERGoel-INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
Goel-INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 

40 41

  • 1. International Indexed & Refereed Research Journal, January, 2013 ISSN 0975-3486, RNI- RAJBIL- 2009-30097, VOL- IV * ISSUE- 40 Research Paper—Computer Science TCP/IP Security Protocols for High Performance Grid Computing Architecture January,2013 * Abdur Rakib * University: Cmj University, Meghalaya A B S T R A C T Grid computing is a term referring to the combination of computer resources from multiple administrative domains to attain a common goal. The grid can be thought of as a distributed system with non-interactive workloads that involve a large number of files. In this paper, we propose a solution for various security issues found in High Performance Grid Computing Architecture. We analyze different network layers available in Grid Protocol Architecture and identify various security disciplines at its different layers. We also analyze various Security Suites available for TCP/IP Internet Protocol Architecture. The paper intends to achieve two major tasks. Keywords: Reliability, Performance, Grid Computing, Resources, Security, Modeling. Introduction: detection is an important component of any modern Grid computing began in the academic security system because it is considered as a second research community and the national defense industry, line of defense against bugs and security holes as well where researchers needed to process large amounts of as providing protection against insiders. This thesis data as quickly as possible for data intensive projects. studies the problem of intrusion detection in Grid It is an innovative approach that leverages existing IT environments since it is considered as an important infrastructure to optimize compute resources and security issue. It introduces flexible cooperative manage data and computing workloads. Using the distributed intrusion detection architecture for original concept of grid computing, arrays of compu- computational Grids. This work is based on the study tational power are constructed from a network of many of latest Grid projects and intrusion detection systems small and widespread computers and used to perform to deliver architecture that suits and benefits form the large calculations and operations that can be decom- underlying computational Grid evironment.A prototype posed into independent units of work. This approach implementation of the proposed architecture for the allows massive computational projects to achieve re- purposes of validation and verification is also sults that otherwise could not be completed even on introduces. today's largest computers. As the concept has evolved, According to Foster and Kesselman a grid is grid computing gained rapid acceptance in the com- a system that conforms to three specific categories: it mercial marketplace in a manner similar to the emer- coordinates resources that are not subject to centralized gence of the Internet. Organizations with both large control, it uses standard, open, general-purpose and small networks have been adopting grid techniques protocols and interfaces, and it delivers nontrivial in order to reduce execution time as well as to enable quality of service. Next generation scientific exploration resource sharing. With the rapid advance in science, requires computing power and storage that no single engineering, and business; people seek more compu- institution alone is able to afford. Additionally, easy tational power and resources to solve their problems access to distributed data is required to improve the more efficiently in terms of accuracy, time, secure and sharing of results by scientific communities spread money. around the world. The proposed solution to these The field of Grid computing was born to fill the challenges is to enable different institutions, working gap between available technology and increasing in the same scientific field, to put their computing, demand for computational power. The Grid provides a storage and data resources together in order to achieve powerful computational environment by coupling the required performance and scale. Grid is a type of distributed resources to enable seamless aggregation parallel and distributed system that enables the sharing, and sharing to create more powerful resource. The term selection, and aggregation of services of heterogeneous distributed here does not refer only to geographical resources distributed across "multiple" administrative locations but also to administration that may span domains based on their availability, capability, perfor- multiple organizations. Security issues were addressed mance, cost, and users' quality-of-service requirements. from the beginning of the Grid computing because of As Network performance has outpaced computational their importance to the success of such field. Intrusion power and storage capacity, this new paradigm has 40 RESEARCH ANALYSIS AND EVALUATION
  • 2. International Indexed & Refereed Research Journal, January, 2013 ISSN 0975-3486, RNI- RAJBIL- 2009-30097, VOL- IV * ISSUE- 40 evolved to enable the sharing and coordinated use of unused CPU capacity in all participating machines to geographically distributed resources. This chapter be allocated to one application that is extremely com- presents an introduction to Grid giving focus to the putation intensive. main requirements and challenges that must be ad- Our purpose in this article is to argue that the dressed in setting up this new paradigm of distributed Grid concept is indeed motivated by a real and specific computing. problem and that there is an emerging, well-defined The ancestor of the Grid is Metacomputing. Grid technology base that addresses significant aspects This term was coined in the early eighties. The idea of of this problem. In the process, we develop a detailed Metacomputing was to interconnect a collection of architecture and roadmap for current and future Grid computers held together by state-of-the-art technol- technologies. Furthermore, we assert that while Grid ogy and "balanced" so that, to the individual user, it technologies are currently distinct from other major looks and acts like a single computer. The constituent technology trends, such as Internet, enterprise, parts of the resulting "metacomputer" could be housed distributed, and peer-to-peer computing, these other locally, or distributed between buildings, even conti- trends can benefit significantly from growing into the nents. There are new economic as well as business problem space addressed by Grid technologies. The factors that are contributing to the heightened interest real and specific problem that underlies the Grid concept in the development and implementation of grid com- is coordinated resource sharing and problem solving puting. Because of the Internet and the way business in dynamic, multi-institutional virtual is conducted today, we are inundated with data. As the organizations. The sharing that we are concerned with data flood gates open wider, the window of opportu- is not primarily file exchange but rather direct access to nity for capturing and turning this data into informa- computers, software, data, and other resources, as is tion grows shorter and shorter. required by a range of collaborative problem-solving Computing applications in many industries and resource brokering strategies emerging in industry, involve processing large volumes of data and/or per- science, and engineering. This sharing is, necessarily, forming repetitive computations that exceed existing highly controlled, with resource providers and server platform capabilities. In order to use data analy- consumers defining clearly and carefully just what is sis to achieve business intelligence and improve deci- shared, who is allowed to share, and the conditions sion making, data must be analyzed in a timely manner. under which sharing occurs. Today's business requirements often demand a much Conclusion: larger sample size for analysis or perhaps use of the A computer cluster is a group of linked entire data source for maximum accuracy. Thechallenges computers, working together closely so that in many that IT shops face today, including budget cuts, server respects they form a single computer. The components consolidation, hardware provisioning and overall of a cluster are connected to each other through fast administration, are all factors driving interest in and local area networks. Cluster computing is the technique implementation of grid computing. of linking two or more computers into a local area The convergence of recent hardware and network in order to take the advantage of parallel pro- software advances has made resource virtualization cessing. In this paper, we propose a solution for various possible and made it easier to construct a grid. On the security issues found in Cluster Computing Architec- hardware side, these advances include networked ture. We analyze various Security Suites available in storage devices and low-cost, modular hardware com- TCP/IP Security Protocol Suite. The paper intends to ponents (such as blades); on the software side, they achieve two major tasks. First, it defines variousSecurity include improvements in networking, Web services, Disciplines on different levels of Cluster Computing databases, application servers and management Architecture. Second, it proposes different Security frameworks. A parallel processing architecture in which Suites available in different layers of TCP/IP Security CPU resources are shared across a network, and all Protocol Suite applicable for different Security machines function as one large supercomputer. It allows Disciplines defined in different levels of Cluster Computing Architecture. R E F E R E N C E [1] http://www.cloudbus.org/~raj/papers/gridtech.pdf pg 1-30 [2] http://www.uhd.edu/academic/colleges/sciences/ccsds/pdf/7_Things_About_Grid_Computing.pdf pg 1-2 [3] http://www.cs.kent.edu/~farrell/grid06/lectures/grid01.pdf pg 1-11 [4] http://www.redbooks.ibm.com/redbooks/pdfs/sg246778.pdf 1-268 [5]http://www.nature.com/nature/webmatters/grid/ [6] Steven M. Bellovin et. al. "Probable Plaintext Cryptanalysis of the IP Security Protocols", In Advances in Cryptology:Proceedings of CRYPTO 96 , pages 1-15. RESEARCH ANALYSIS AND EVALUATION 41