Grid scheduling is a process of mapping Grid jobs to resources over multiple administrative domains.
A Grid job can be split into many small tasks.
The scheduler has the responsibility of selecting resources and scheduling jobs in such a way that the user and application requirements are met,in terms of overall execution time (throughput) and cost of the resources utilized.
This presentation will highlight the key legal issues associated with cloud computing and some implementation methods for minimizing or mitigating those risks.
There are numerous legal issues in cloud computing like operational, legislative or regulatory, security, third party contractual limitations, risk allocation or mitigation, and jurisdictional issues. Security, privacy and confidentiality remain the biggest concern for the data owner, as when the data is stored on the cloud the same might be accessible to multiple users. There is concern for its safety and protection of valuable data and trade secrets. Then there are intellectual property issues regarding ownership of and rights in information and services placed in the cloud.
Grid scheduling is a process of mapping Grid jobs to resources over multiple administrative domains.
A Grid job can be split into many small tasks.
The scheduler has the responsibility of selecting resources and scheduling jobs in such a way that the user and application requirements are met,in terms of overall execution time (throughput) and cost of the resources utilized.
This presentation will highlight the key legal issues associated with cloud computing and some implementation methods for minimizing or mitigating those risks.
There are numerous legal issues in cloud computing like operational, legislative or regulatory, security, third party contractual limitations, risk allocation or mitigation, and jurisdictional issues. Security, privacy and confidentiality remain the biggest concern for the data owner, as when the data is stored on the cloud the same might be accessible to multiple users. There is concern for its safety and protection of valuable data and trade secrets. Then there are intellectual property issues regarding ownership of and rights in information and services placed in the cloud.
Trust models for Grid security environment – Authentication and Authorization methods – Grid security infrastructure – Cloud Infrastructure security: network, host and application level – aspects of data security, provider data and its security, Identity and access management architecture, IAM practices in the cloud, SaaS, PaaS, IaaS availability in the cloud, Key privacy issues in the cloud.
Open source grid middleware packages – Globus Toolkit (GT4) Architecture , Configuration – Usage of Globus – Main components and Programming model - Introduction to Hadoop Framework - Mapreduce, Input splitting, map and reduce functions, specifying input and output parameters, configuring and running a job – Design of Hadoop file system, HDFS concepts, command line and java interface, dataflow of File read & File write.
Transactions and Concurrency Control in distributed systems. Transaction properties, classification, and transaction implementation. Flat, Nested, and Distributed transactions. Inconsistent Retrievals, Lost Update, Dirty Read, and Premature Writes Problem
Peer-to-peer Systems – Introduction – Napster and its legacy – Peer-to-peer – Middleware – Routing overlays. Overlay case studies: Pastry, Tapestry- Distributed File Systems –Introduction – File service architecture – Andrew File system. File System: Features-File model -File accessing models – File sharing semantics Naming: Identifiers, Addresses, Name Resolution – Name Space Implementation – Name Caches – LDAP.
Authentication
Authorization
Integrity and Confidentiality
Security Policy
A set of rules that define the security subjects, security objects, and relationships(security operations) among them.
CA(Certificate Authority)
The third party that does certification(the binding) and issuing certificate
Trust Domain
A logical, administrative structure where a single, consistent local security policy holds
comprehensive lecture on join odering fragments queries. it is the topic of DDBMS and the content are taken from multiple sources including google, book, class lecture.
prepared by IFZAL HUSSAIN student of CS in SHAHEED BENAZIR BHUTTO UNIVERSITY SHERINGAL DIR UPPER KPK, PAKISTAN.
Advance Database Management Systems -Object Oriented Principles In DatabaseSonali Parab
An OODBMS is the result of combining object oriented programming principles with database management principles. Object oriented programming concepts such as encapsulation, polymorphism and inheritance are enforced as well as database management concepts such as the ACID properties (Atomicity, Consistency, Isolation and Durability) which lead to system integrity, support for an ad hoc query language and secondary storage management systems which allow for managing very large amounts of data. The Object Oriented Database Manifesto specifically lists the following features as mandatory for a system to support before it can be called an OODBMS; Complex objects, Object identity, Encapsulation , Types and Classes , Class or Type Hierarchies, Overriding, overloading and late binding, Computational completeness , Extensibility,Persistence , Secondary storage management, Concurrency, Recovery and an Ad Hoc Query Facility.
Trust models for Grid security environment – Authentication and Authorization methods – Grid security infrastructure – Cloud Infrastructure security: network, host and application level – aspects of data security, provider data and its security, Identity and access management architecture, IAM practices in the cloud, SaaS, PaaS, IaaS availability in the cloud, Key privacy issues in the cloud.
Open source grid middleware packages – Globus Toolkit (GT4) Architecture , Configuration – Usage of Globus – Main components and Programming model - Introduction to Hadoop Framework - Mapreduce, Input splitting, map and reduce functions, specifying input and output parameters, configuring and running a job – Design of Hadoop file system, HDFS concepts, command line and java interface, dataflow of File read & File write.
Transactions and Concurrency Control in distributed systems. Transaction properties, classification, and transaction implementation. Flat, Nested, and Distributed transactions. Inconsistent Retrievals, Lost Update, Dirty Read, and Premature Writes Problem
Peer-to-peer Systems – Introduction – Napster and its legacy – Peer-to-peer – Middleware – Routing overlays. Overlay case studies: Pastry, Tapestry- Distributed File Systems –Introduction – File service architecture – Andrew File system. File System: Features-File model -File accessing models – File sharing semantics Naming: Identifiers, Addresses, Name Resolution – Name Space Implementation – Name Caches – LDAP.
Authentication
Authorization
Integrity and Confidentiality
Security Policy
A set of rules that define the security subjects, security objects, and relationships(security operations) among them.
CA(Certificate Authority)
The third party that does certification(the binding) and issuing certificate
Trust Domain
A logical, administrative structure where a single, consistent local security policy holds
comprehensive lecture on join odering fragments queries. it is the topic of DDBMS and the content are taken from multiple sources including google, book, class lecture.
prepared by IFZAL HUSSAIN student of CS in SHAHEED BENAZIR BHUTTO UNIVERSITY SHERINGAL DIR UPPER KPK, PAKISTAN.
Advance Database Management Systems -Object Oriented Principles In DatabaseSonali Parab
An OODBMS is the result of combining object oriented programming principles with database management principles. Object oriented programming concepts such as encapsulation, polymorphism and inheritance are enforced as well as database management concepts such as the ACID properties (Atomicity, Consistency, Isolation and Durability) which lead to system integrity, support for an ad hoc query language and secondary storage management systems which allow for managing very large amounts of data. The Object Oriented Database Manifesto specifically lists the following features as mandatory for a system to support before it can be called an OODBMS; Complex objects, Object identity, Encapsulation , Types and Classes , Class or Type Hierarchies, Overriding, overloading and late binding, Computational completeness , Extensibility,Persistence , Secondary storage management, Concurrency, Recovery and an Ad Hoc Query Facility.
Internet is the networking infrastructure which helps in connecting many users through interconnected networks through which users can communicate to each other. The World Wide Web is built on top of the internet to share information. The grid is again a service that is built on top of internet but is able to share computational power, databases, disk storage and software applications. The paper mainly focuses on significance Grid computing, its architecture, the grid middleware Globus toolkit and wireless grid computing.
‘Grids’areanapproachforbuildingdynamicallyconstructedproblem-solvingenvironmentsusing
geographically and organizationally dispersed,
high-performance computing and
data handling resources.
Gridsalsoprovideimportantinfrastructuresupportingmulti-institutionalcollaboration.
INOVA GIS Platform represents centralized Enterprise GIS (Geographical Information System) that enables seamless data access for any number of different departments within business organization and beyond. Data can be accessed for viewing, analyzing, editing, etc. Apart from that, data can be presented to wider audience with the possibility to control what type of data and to what extent it will be presented.
A data center centralizes a company’s shared IT operations as well as equipment for processing, storing and disseminating applications and data. It is essential to have knowledge about the terms that are used frequently in the context of data centers.
Locality Sim : Cloud Simulator with Data Localityneirew J
Cloud Computing (CC) is a model for enabling on-demand access to a shared pool of configurable
computing resources. Testing and evaluating the performance of the cloud environment for allocating,
provisioning, scheduling, and data allocation policy have great attention to be achieved. Therefore, using
cloud simulator would save time and money, and provide a flexible environment to evaluate new research
work. Unfortunately, the current simulators (e.g., CloudSim, NetworkCloudSim, GreenCloud, etc..) deal
with the data as for size only without any consideration about the data allocation policy and locality. On
the other hand, the NetworkCloudSim simulator is considered one of the most common used simulators
because it includes different modules which support needed functions to a simulated cloud environment,
and it could be extended to include new extra modules. According to work in this paper, the
NetworkCloudSim simulator has been extended and modified to support data locality. The modified
simulator is called LocalitySim. The accuracy of the proposed LocalitySim simulator has been proved by
building a mathematical model. Also, the proposed simulator has been used to test the performance of the
three-tire data center as a case study with considering the data locality feature.
LOCALITY SIM: CLOUD SIMULATOR WITH DATA LOCALITY ijccsa
Cloud Computing (CC) is a model for enabling on-demand access to a shared pool of configurable computing resources. Testing and evaluating the performance of the cloud environment for allocating, provisioning, scheduling, and data allocation policy have great attention to be achieved. Therefore, using cloud simulator would save time and money, and provide a flexible environment to evaluate new research
work. Unfortunately, the current simulators (e.g., CloudSim, NetworkCloudSim, GreenCloud, etc..) deal with the data as for size only without any consideration about the data allocation policy and locality. On the other hand, the NetworkCloudSim simulator is considered one of the most common used simulators because it includes different modules which support needed functions to a simulated cloud environment,
and it could be extended to include new extra modules. According to work in this paper, the NetworkCloudSim simulator has been extended and modified to support data locality. The modified simulator is called LocalitySim. The accuracy of the proposed LocalitySim simulator has been proved by building a mathematical model. Also, the proposed simulator has been used to test the performance of the
three-tire data center as a case study with considering the data locality feature
This educational PPT provides Primary Goals of Network Security, The Security Trinity, Information Security, Risk Assessment, Security Models, Basic Security Terminologies, Threats, Vulnerabilities, and Attacks, Know Yourself - The Threat and Vulnerability Landscape, Privacy, Anonymity and Pseudo-anonymity, Security, Vulnerabilities, Threats and Adversaries, Know Your Enemy - the Current Threat and Vulnerability Landscape, Security Bugs and Vulnerabilities - The Vulnerability Landscape, Malware, viruses, rootkits and RATs
Spyware, Adware, Scareware, PUPs & Browser hijacking, Phishing, Vishing and SMShing, Spamming & Doxing, Security services, Policy, Mechanism, and Standards, and the basic principles and steps of System development. Besides, because of covering the most basic and advanced network and computer security issues, policies, and principles in easy way, it can help you to create an awareness how to use an internet and how to protect your physical as well as logical assets.
This educational power point helps to introduce you about the basic concepts, structures, and functions of Virtual Private Network(VPN) and Internet Protocol security (IPsec).
In this educational power point, networking standard organizations, a brief introduction to local area network technologies, summary of OSI layer modeling and Ethernet standards,... are provided.
This PPT focuses on the basic concepts of routing protocols including the executive summary of basic computer networks.
Regarding to the routing protocol concepts, it gives us a brief information of routing, protocol, routing protocol, types of routing protocol, metrics of a routing protocol algorithms...
VHDL (VHSIC Hardware Description Language) is becoming increasingly popular as a way to capture complex digital electronic circuits for both simulation and synthesis. Digital circuits captured using VHDL can be easily simulated, are more likely to be synthesizable into multiple target technologies, and can be archived for later modification and reuse.
An application-specific IC (ASIC) can be either a digital or an analog circuit. As their name implies, ASICs are not reconfigurable; they perform only one specific function. For example, a speed controller IC for a remote control car is hard-wired to do one job and could never become a microprocessor. An ASIC does not contain any ability to follow alternate instructions.
Basic Computer Organization and Design
.....................................................................
The basic computer design represents all of the major concepts in CPU design without overwhelming students with the complexity of a modern commercial CPU.
Weather forecasting is the application of science and technology to predict the state of the atmosphere for a future time and a given location. Now days, forecasting of accurate atmospheric conditions is the major challenge for the meteorologist and poor forecasting has significant impact on our daily lives. This brings the necessity to make research works on forecasting of the weather events with respect to Ethiopia.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
3. Background
Globus its self a community for open source software development
(OGSI) and relate documentation for the creation of grid technologies
In 1998 first version of Globus Toolkit (GT) released, and version 2.0 was
released in 2002. It was developed by using C programming language, first
it was useful for LINUX platforms and it was not fully supported for
Microsoft platforms. (Lock, R 2002) (Russell Lock. 11 February 2002 "An
introduction to the Globus toolkit"). Globus Toolkit 2 consist of
components Grid Resource Allocation Management (GRAM), Grid File
Transfer Protocol (GridFTP) and Monitoring and Discovery Service
(MDS).
3AOS
4. Globus architecture
The Globus project provides open source software toolkit that
can be used to build computational grids and grid based
applications. It allows sharing of computing power, databases,
and other resources securely across corporate, institutional and
geographical boundaries without sacrificing local autonomy.
The core services, interfaces and protocols in the Globus toolkit
allow users to access remote resources seamlessly while
simultaneously preserving local control over who can use
resources and when.
4AOS
6. Globus architecture…
The Globus Architecture has three main groups of services
accessible through a security layer.
Resource management,
Data Management ,and
Information services.
Resource management: The resource management supports for:
Resource allocation, Submitting jobs, and Managing job status and
progress .
Information services: provides support for collecting information in the
grid and for querying this information, based on the Lightweight
Directory Access Protocol (LDAP).
Data management: provides support to transfer files among machines in
the grid and for the management of these transfers.
5AOS
7. Globus architecture…
The local services layer contains the operating system services,
network services like TCP / IP , cluster scheduling services provided
by Load Leveler, job-submission, query of queues, and soon. The
higher layers of the Globus model enable the integration of multiple
or heterogeneous clusters. The core services layer contains the
Globus toolkit building blocks for security, job submission, data
management and resource information management. The high level
services and tools layer contains tools that integrate the lower level
services or implement missing functionality.
7AOS
8. Globus architecture…
GSI Security Layer
The GSI uses public key cryptography (also known as
asymmetric cryptography) as the basis for its functionality. Many
of the terms and concepts used in this description of the GSI
come from its use of public key cryptography.
The primary motivations behind the GSI are:
The need for secure communication between elements of a
computational Grid.
The need to support security across organizational boundaries
The need to support "single sign-on" for users of the Grid
8AOS
9. Globus architecture…
GSI Security Layer …
Public Key Cryptography
Digital Signatures
Certificate
Mutual Authentication
Confidential Communication
Securing Private Keys
Delegation and Single Sign-On
9AOS
10. Globus architecture…
GSI Security Layer …
Public Key Cryptography: is cryptography in which a pair of keys is used to encrypt
and decrypt a message so that it arrives securely.
Digital Signatures: Digital signatures are the public-key primitives of message
authentication.
Certificate: is a user's Public Key, which has been signed and encrypted using the
private key of a well-known Certificate Authority.
Mutual Authentication: Mutual authentication, also called two-way authentication, is a
process or technology in which both entities in a communications link authenticate each
other.
Confidential Communication: protecting the information from disclosure to
unauthorized parties.
10AOS
11. Globus architecture…
Globus Toolkit
Three pyramids: Globus Toolkit has three pyramids of support built on
top of a security infrastructure, as illustrated in Figure. They are:
Resource management
Data management
Information services
11AOS
Fig: Globus
toolkit three pyramid
12. Globus architecture…
Globus Toolkit…
Resource management: The resource management pyramid provides support
for:
Resource allocation
Submitting jobs: Remotely running executable files and receiving results
Managing job status and progress
Information services: provides support for collecting information in the grid
and for querying this information, based on the Lightweight Directory Access
Protocol (LDAP).
Data management: provides support to transfer files among machines in the
grid and for the management of these transfers.
12AOS
13. Globus architecture…
Components of Globus Toolkit
Globus provides a component to implement resource management, data
management, and information services
13AOS
14. Globus architecture…
Components of Globus Toolkit…
GRAM/GASS : The primary components of the resource management
pyramid are the Grid Resource Allocation Manager (GRAM) and the Global
Access to Secondary Storage (GASS).
MDS: Based on the Lightweight Directory Access Protocol (LDAP), the Grid
Resource Information Service (GRIS) and Grid Index Information Service
(GIIS) components can be configured in a hierarchy to collect the information
and distribute it.
Grid FTP : is a key component for the secure and high-performance data
transfer. The Globus Replica Catalog and Management is used to register and
manage both complete and partial copies of data sets.
14AOS
15. Globus architecture…
Components of Globus Toolkit…
Grid Resource Allocation Manager (GRAM): is the module that provides the
remote execution and status management of the execution. When a job is submitted
by a client, the request is sent to the remote host and handled by the gatekeeper
daemon located in the remote host. Then the gatekeeper creates a job manager to
start and monitor the job. When the job is finished, the job manager sends the status
information back to the client and terminates. It contains the following elements:
The globusrun command
Resource Specification Language (RSL)
The gatekeeper daemon
The job manager
15AOS
16. Globus architecture…
Components of Globus Toolkit…
Monitoring and Discovery Service (MDS): provides access to static and
dynamic information of resources. Basically, it contains the following
components: DS):
16AOS
17. Globus architecture…
Monitoring and Discovery Service (MDS)…
Resource information: Resource information contains the objects managed by
MDS, which represent components resources .
Grid Resource Information Service (GRIS): is the repository of local resource
information derived from information providers.
Grid Index Information Service (GIIS): GIIS is the repository that contains
indexes of resource information registered by the GRIS and other GIISs.
Information providers: The information providers translate the properties and
status of local resources to the format defined in the schema and configuration files.
MDS client: The MDS client is based on the LDAP client command, ldapsearch. A
search for resource information that you want in your grid environment is initially
performed by the MDS client.
17AOS
18. Gridbus Architecture
Grid technologies such as Globus provide capabilities and services required for
secure access and execution of a job on resources. However, to achieve the
complete vision of Grid as a utility computing environment, a number of challenges
need to be addressed.
They include composition of analysis software as a distributed application, resource
brokering methodologies and strategies for scheduling data-driven applications,
data grid economy for data management, application service specification, and
accounting of resource consumption.
The application development and deployment services need to scale from desktop
environment to global grids and need to support both scientific and business
applications
Grid bus emphasizes the end-to-end qulaity-of-sevices driven by computational
economy at various levels – clusters, peer-to-peer networks, and the grid for the
management of distributed computational, data and application services.
18AOS