SlideShare a Scribd company logo
1 of 20
GRID COMPUTING
DEFINITION
• Grid Computing is a type of distributed computing that
combines the resources of interconnected groups of
several independent computers that communicate
through the use of a network in a way that makes them
look and act like a single computing entity. Each
computing task is broken down into smaller pieces and
distributed throughout the available computing
resources for execution.
BENEFITS OF GRID COMPUTING
 Making use of underutilized Resources
 Resource Balancing
 Parallel CPU Capacity
 Management
 Access to additional resources
Reliability
VIRTUAL ORGANISATIONS
 Group of individuals or institutions
defined by sharing rules to share
the resources of “Grid” for a
common goal.e.g. Applications on
service providers, storage service
providers management team.
GRID ARCHITECTURE
FABRIC LAYER :-
• Fabric : Interfaces to local control
• Provides resources.
• Fabric components implement resource specific
operations
• Resources should implement Enquiry, resource
management mechanisms…
CONNECTIVITY LAYER :-
• Connectivity: Communicating Easily and Securely.
• Defines core communication and authentication protocols.
• Communication requirements: transport, routing, naming
• Authentication solutions :
• Single sign on, delegation, integration with various local
security solutions, user-based trust relationships.
RESOURCE LAYER :-
• Resource: Sharing Single Resources
• Defines protocols for secure negotiation, initiation,
monitoring, control, accounting, payment of sharing
operations on individual resources.
• Two primary classes of Resource layer protocols are
• Information protocols, Management protocols.
• Management protocol – “ policy application point”.
COLLECTIVE LAYER :-
• Collective: Coordinating Multiple Resources
• Defines protocols that capture interactions across collections of resources.
• Directory services – GRRP, GRIP
• Co-allocation, scheduling, brokering services – Condor-G, Nimrod-G, DRM broker.
• Monitoring and diagnostic
• Data Replication
• Grid enabled programming
• Workload management and collaboration frameworks
• Software discovery - NetSolve, Ninf
• Community authorization
• Community accounting and payment
• Collaboratory services – Access Grid.
APPLICATION LAYER :-
• Application: implement business logic over fabric,
connectivity, resources and collective layers
RELATIONSHIP WITH OTHERS
TECHNOLOGIES
DCE (Open Group) - inflexible
• DCE supports secure resource sharing across sites,
but inflexible.
•
WWW and Internet :-
• World Wide Web and Internet – support client
server interactions. Also Web browsers do not
support single sign_, delegation.
•
P2P Weak Security,
• P2P- Weak security, strong anonymity ( there is no
trace back if any intrusion detected)

More Related Content

What's hot

What's hot (16)

Cloud computing for Smart City
Cloud computing for Smart CityCloud computing for Smart City
Cloud computing for Smart City
 
FEATURES OF CLOUD COMPUTING BY SAIKIRAN PANJALA
FEATURES OF CLOUD COMPUTING BY SAIKIRAN PANJALAFEATURES OF CLOUD COMPUTING BY SAIKIRAN PANJALA
FEATURES OF CLOUD COMPUTING BY SAIKIRAN PANJALA
 
Definition of cloud computing
Definition of cloud computingDefinition of cloud computing
Definition of cloud computing
 
8 secure distributed data storage in cloud computing
8 secure distributed data storage in cloud computing8 secure distributed data storage in cloud computing
8 secure distributed data storage in cloud computing
 
Cloud Deployment Model
Cloud Deployment ModelCloud Deployment Model
Cloud Deployment Model
 
Cloud Technology Ecosystems
Cloud Technology EcosystemsCloud Technology Ecosystems
Cloud Technology Ecosystems
 
Group 4
Group 4Group 4
Group 4
 
Modularity by Microservices
Modularity by MicroservicesModularity by Microservices
Modularity by Microservices
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Final Cloud Presentation
Final Cloud PresentationFinal Cloud Presentation
Final Cloud Presentation
 
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
 
Shashank saxena
Shashank saxenaShashank saxena
Shashank saxena
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Similar to Grid computing 2 (1)

Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptJagriti Rai
 
Cloudcomputingit703 130915004442-phpapp01
Cloudcomputingit703 130915004442-phpapp01Cloudcomputingit703 130915004442-phpapp01
Cloudcomputingit703 130915004442-phpapp01Aravindharamanan S
 
OE Unvjgugugugjjjjjigugiigugigiggit1.pptx
OE Unvjgugugugjjjjjigugiigugigiggit1.pptxOE Unvjgugugugjjjjjigugiigugigiggit1.pptx
OE Unvjgugugugjjjjjigugiigugigiggit1.pptxabhispal122
 
Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...Tim Harvey
 
Cloud computing explained
Cloud computing explained Cloud computing explained
Cloud computing explained Juan Pablo
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxsarahabbas40
 
IT4651w-CC-1b-Introduction.pptx
IT4651w-CC-1b-Introduction.pptxIT4651w-CC-1b-Introduction.pptx
IT4651w-CC-1b-Introduction.pptxnada542773
 
OIT552 Cloud Computing Material
OIT552 Cloud Computing MaterialOIT552 Cloud Computing Material
OIT552 Cloud Computing Materialpkaviya
 
Cloud-mod1-chap1.pptx
Cloud-mod1-chap1.pptxCloud-mod1-chap1.pptx
Cloud-mod1-chap1.pptxchayashree12
 
Data Tactics dhs introduction to cloud technologies wtc
Data Tactics dhs introduction to cloud technologies wtcData Tactics dhs introduction to cloud technologies wtc
Data Tactics dhs introduction to cloud technologies wtcDataTactics
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basicsRahul Gurnani
 
cloudintro-lec018.1.ppt
cloudintro-lec018.1.pptcloudintro-lec018.1.ppt
cloudintro-lec018.1.pptgunvinit931
 

Similar to Grid computing 2 (1) (20)

Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloudcomputing basics
Cloudcomputing basicsCloudcomputing basics
Cloudcomputing basics
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloudcomputingit703 130915004442-phpapp01
Cloudcomputingit703 130915004442-phpapp01Cloudcomputingit703 130915004442-phpapp01
Cloudcomputingit703 130915004442-phpapp01
 
OE Unvjgugugugjjjjjigugiigugigiggit1.pptx
OE Unvjgugugugjjjjjigugiigugigiggit1.pptxOE Unvjgugugugjjjjjigugiigugigiggit1.pptx
OE Unvjgugugugjjjjjigugiigugigiggit1.pptx
 
UNIT 1.pdf
UNIT 1.pdfUNIT 1.pdf
UNIT 1.pdf
 
Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...
 
Cloud computing explained
Cloud computing explained Cloud computing explained
Cloud computing explained
 
The cloud ecosystem
The cloud ecosystemThe cloud ecosystem
The cloud ecosystem
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Grid computing
Grid computingGrid computing
Grid computing
 
Grid computing
Grid computingGrid computing
Grid computing
 
IT4651w-CC-1b-Introduction.pptx
IT4651w-CC-1b-Introduction.pptxIT4651w-CC-1b-Introduction.pptx
IT4651w-CC-1b-Introduction.pptx
 
OIT552 Cloud Computing Material
OIT552 Cloud Computing MaterialOIT552 Cloud Computing Material
OIT552 Cloud Computing Material
 
Cloud-mod1-chap1.pptx
Cloud-mod1-chap1.pptxCloud-mod1-chap1.pptx
Cloud-mod1-chap1.pptx
 
Data Tactics dhs introduction to cloud technologies wtc
Data Tactics dhs introduction to cloud technologies wtcData Tactics dhs introduction to cloud technologies wtc
Data Tactics dhs introduction to cloud technologies wtc
 
12458003.ppt
12458003.ppt12458003.ppt
12458003.ppt
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
 
cloudintro-lec018.1.ppt
cloudintro-lec018.1.pptcloudintro-lec018.1.ppt
cloudintro-lec018.1.ppt
 

Recently uploaded

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 

Recently uploaded (20)

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 

Grid computing 2 (1)

  • 2. DEFINITION • Grid Computing is a type of distributed computing that combines the resources of interconnected groups of several independent computers that communicate through the use of a network in a way that makes them look and act like a single computing entity. Each computing task is broken down into smaller pieces and distributed throughout the available computing resources for execution.
  • 3.
  • 4.
  • 5. BENEFITS OF GRID COMPUTING  Making use of underutilized Resources  Resource Balancing  Parallel CPU Capacity  Management  Access to additional resources Reliability
  • 7.  Group of individuals or institutions defined by sharing rules to share the resources of “Grid” for a common goal.e.g. Applications on service providers, storage service providers management team.
  • 8.
  • 10.
  • 11. FABRIC LAYER :- • Fabric : Interfaces to local control • Provides resources. • Fabric components implement resource specific operations • Resources should implement Enquiry, resource management mechanisms…
  • 12. CONNECTIVITY LAYER :- • Connectivity: Communicating Easily and Securely. • Defines core communication and authentication protocols. • Communication requirements: transport, routing, naming • Authentication solutions : • Single sign on, delegation, integration with various local security solutions, user-based trust relationships.
  • 13. RESOURCE LAYER :- • Resource: Sharing Single Resources • Defines protocols for secure negotiation, initiation, monitoring, control, accounting, payment of sharing operations on individual resources. • Two primary classes of Resource layer protocols are • Information protocols, Management protocols. • Management protocol – “ policy application point”.
  • 14. COLLECTIVE LAYER :- • Collective: Coordinating Multiple Resources • Defines protocols that capture interactions across collections of resources. • Directory services – GRRP, GRIP • Co-allocation, scheduling, brokering services – Condor-G, Nimrod-G, DRM broker. • Monitoring and diagnostic • Data Replication • Grid enabled programming • Workload management and collaboration frameworks • Software discovery - NetSolve, Ninf • Community authorization • Community accounting and payment • Collaboratory services – Access Grid.
  • 15. APPLICATION LAYER :- • Application: implement business logic over fabric, connectivity, resources and collective layers
  • 16.
  • 18. DCE (Open Group) - inflexible • DCE supports secure resource sharing across sites, but inflexible. •
  • 19. WWW and Internet :- • World Wide Web and Internet – support client server interactions. Also Web browsers do not support single sign_, delegation. •
  • 20. P2P Weak Security, • P2P- Weak security, strong anonymity ( there is no trace back if any intrusion detected)