GRID COMPUTING Techniques and Applications BARRY WILKINSON



Similar documents
An approach to grid scheduling by using Condor-G Matchmaking mechanism

Concepts and Architecture of the Grid. Summary of Grid 2, Chapter 4

GT 6.0 GSI C Security: Key Concepts

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

Analyses on functional capabilities of BizTalk Server, Oracle BPEL Process Manger and WebSphere Process Server for applications in Grid middleware

THE CCLRC DATA PORTAL

XSEDE Service Provider Software and Services Baseline. September 24, 2015 Version 1.2

Abstract. 1. Introduction. Ohio State University Columbus, OH

Chapter 12 GRID SECURITY ARCHITECTURE: Requirements,fundamentals, standards, and models

DISTRIBUTED SYSTEMS SECURITY

IGI Portal architecture and interaction with a CA- online

Entrust IdentityGuard Comprehensive

Contents at a Glance. 1 Introduction Basic Principles of IT Security Authentication and Authorization in

Certificates in a Nutshell. Jens Jensen, STFC Leader of EUDAT AAI TF

2 Transport-level and Message-level Security

Grid Security : Authentication and Authorization

CS 356 Lecture 28 Internet Authentication. Spring 2013

HPC and Grid Concepts

Cluster, Grid, Cloud Concepts

CSF4:A WSRF Compliant Meta-Scheduler

GridWay: Open Source Meta-scheduling Technology for Grid Computing

Globus Toolkit: Authentication and Credential Translation

GSI Credential Management with MyProxy

Grid Computing With FreeBSD

MOBILE VIDEO WITH MOBILE IPv6

An Online Credential Repository for the Grid: MyProxy

Using the MyProxy Online Credential Repository

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, p i.

Network Security Protocols

Architectures, and. Service-Oriented. Cloud Computing. Web Services, The Savvy Manager's Guide. Second Edition. Douglas K. Barry. with.

Angel Dichev RIG, SAP Labs

IBM Solutions Grid for Business Partners Helping IBM Business Partners to Grid-enable applications for the next phase of e-business on demand

TRUST RELATIONSHIPS AND SINGLE SIGN-ON IN GRID BASED DATA WAREHOUSES

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

e-science Technologies in Synchrotron Radiation Beamline - Remote Access and Automation (A Case Study for High Throughput Protein Crystallography)

The Lattice Project: A Multi-Model Grid Computing System. Center for Bioinformatics and Computational Biology University of Maryland

Praseeda Manoj Department of Computer Science Muscat College, Sultanate of Oman

An IDL for Web Services

Cloud Platform for VPH Applications

Integration strategy

Inca User-level Grid Monitoring

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

TUTORIAL. Rebecca Breu, Bastian Demuth, André Giesler, Bastian Tweddell (FZ Jülich) {r.breu, b.demuth, a.giesler,

Grid Sun Carlo Nardone. Technical Systems Ambassador GSO Client Solutions

Securing Web Services with WS-Security

Using WS-Federation and WS-Security for Identity Management in Virtual Organisations

Module 1: e- Learning

The OMII Software Distribution

LBSEC.

GridSpeed: A Web-based Grid Portal Generation Server

Introduction. MCSN N. Tonellotto Complements of Distributed Enabling Platforms

Cloud Computing. Implementation, Management, and Security. John W. Rittinghouse James F. Ransome

Grid Scheduling Architectures with Globus GridWay and Sun Grid Engine

A Federated Authorization and Authentication Infrastructure for Unified Single Sign On

Rights Management Services

IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0

SSDG Operational Manual Draft version: 0.1. Operational Manual For SSDG

RFP 95200, City-Wide Electronic/Digital Signature Solution. Vendor Questions (AFTER Pre-Proposal Conference on March 17, 2015) and Answers (in bold)

Lukasz Pater CMMS Administrator and Developer

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Management. Oracle Fusion Middleware. 11 g Architecture and. Oracle Press ORACLE. Stephen Lee Gangadhar Konduri. Mc Grauu Hill.

Strategic Information Security. Attacking and Defending Web Services

/ Preparing to Manage a VMware Environment Page 1

OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH

TIBCO Runtime Agent Domain Utility User s Guide Software Release November 2012

GSiB: PSE Infrastructure for Dynamic Service-oriented Grid Applications

Smart Card Application Development Using Java

Tim Bovles WILEY. Wiley Publishing, Inc.

e-gov Architecture Architectural Blueprint

Contents. Part 1 SSH Basics 1. Acknowledgments About the Author Introduction

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

An Introduction to Globus Toolkit 3

GT 6.0 GRAM5 Key Concepts

SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact

SAS 9.3 Intelligence Platform

Transcription:

GRID COMPUTING Techniques and Applications BARRY WILKINSON

Contents Preface About the Author CHAPTER 1 INTRODUCTION TO GRID COMPUTING 1 1.1 Grid Computing Concept 1 1.2 History of Distributed Computing 4 1.3 Computational Grid Applications 12 1.4 Grid Computing Infrastructure Development 14 Large-Scale U.S. Grids 14 National Grids 16 Multi-National Grids 17 Campus Grids 18 1.5 Grid Computing Courses 18 1.6 Grid Computing Software Interface 19 1.7 Summary 27 Further Reading 28 Bibliography 29 Self-Assessment Questions 31 Programming Assignments 32 vii

viii CONTENTS CHAPTER 2 JOB SUBMISSION 35 2.1 Introduction 35 2.2 Globus Job Submission 38 Components 38 Job Specification 41 Submitting a Job 48 2.3 Transferring Files 55 Command-Line File Transfers 55 Staging 57 2.4 Summary 59 Further Reading 59 Bibliography 59 Self-Assessment Questions 60 Programming Assignments 62 CHAPTER 3 SCHEDULERS 65 3.1 Scheduler Features 65 Scheduling 65 Monitoring Job Progress 69 Additional Scheduler Features 70 3.2 Scheduler Examples 75 Sun Grid Engine 75 Condor 81 3.3 Grid Computing Meta-Schedulers 100 Condor-G 100 GridWay 102 3.4 Distributed Resource Management Application (DRMAA) 107 3.5 Summary 110 Further Reading 111 Bibliography 111 Self-Assessment Questions 112 Programming Assignments 114 CHAPTER 4 SECURITY CONCEPTS 117 4.1 Introduction 117 Secure Connection 117 Password Authentication 118 Encryption and Decryption 119

CONTENTS ix 4.2 Symmetric Key Cryptography 120 4.3 Asymmetric Key Cryptography (Public Key Cryptography) 122 4.4 Public Key Infrastructure 128 Data Integrity 128 Digital Signatures 129 Certificates and Certificate Authorities 130 4.5 Systems/Protocols Using Security Mechanisms 140 Mutual Authentication and Single-Sided Authentication 140 Secure Shell (SSH) 141 Secure Sockets Layer (SSL) Protocol 142 4.6 Summary 144 Further Reading 144 Bibliography 144 Self-Assessment Questions 145 Programming Assignments 148 CHAPTER 5 GRID SECURITY 149 5.1 Introduction 149 Grid Environment 149 Authentication and Authorization Aspects for a Grid 151 5.2 Grid Security Infrastructure (GSI) 153 Component Parts 153 GSI Communication Protocols 154 GSI Authentication 156 GSI Authorization 162 5.3 Delegation 164 The Need for Delegation 164 Proxy Certificates 165 MyProxy Grid Credential Repository 167 5.4 Higher-Level Authorization Tools 170 Security Assertion Markup Language (SAML) 171 Using Certificates for Authorization 172 5.5 Summary 174 Further Reading 175 Bibliography 175 Self-Assessment Questions 176 Programming Assignments 177

x CONTENTS CHAPTER 6 SYSTEM INFRASTRUCTURE I: WEB SERVICES 179 6.1 Service-Oriented Architecture 179 6.2 Web Services 181 Concept 181 Communication Protocols for Web Services 183 Defining a Web Service Interface WSDL 184 Service Registry 190 6.3 Web Service Implementation 192 Web Service Containers 192 Building and Deploying a Service 193 6.4 Summary 196 Further Reading 196 Bibliography 197 Self-Assessment Questions 197 Programming Assignments 199 CHAPTER 7 SYSTEM INFRASTRUCTURE II: GRID COMPUTING SERVICES 201 7.1 Grid Computing and Standardization Bodies 201 7.2 Interacting Grid Computing Components 202 Development of a Service-Oriented Approach 202 Stateful Web Services 203 Transient Services 204 7.3 Open Grid Services Architecture (OGSA) 205 Purpose 205 Open Grid Services Infrastructure (OGSI) 205 WS-Resource Framework 206 Generic Stateful WSRF Service 209 Additional Features of WSRF/GT4 Services 213 Information Services 215 7.4 Summary 219 Further Reading 219 Bibliography 219 Self-Assessment Questions 220 Programming Assignments 222

CONTENTS xi CHAPTER 8 USER-FRIENDLY INTERFACES 223 8.1 Introduction 223 8.2 Grid Computing Workflow Editors 224 Workflows 224 Workflow Editor Features 225 GridNexus 226 8.3 Grid Portals 234 General Features 234 Available Technologies 236 Early Grid Portals 239 Development of Grid Portals with Portlets 241 8.4 Summary 250 Further Reading 250 Bibliography 251 Self-Assessment Questions 252 Programming Assignments 255 CHAPTER 9 GRID-ENABLING APPLICATIONS 259 9.1 Introduction 259 Definition of Grid Enabling 259 Types of Jobs to Grid Enable 260 9.2 Parameter Sweep 261 Parameter Sweep Applications 261 Implementing Parameter Sweep 261 9.3 Using an Existing Program on Multiple Grid Computers 265 Data Partitioning 265 Deploying Legacy Code 267 Exposing an Application as a Service 267 9.4 Writing an Application Specifically for a Grid 269 Using Grid Middleware APIs 269 Higher Level Middleware-Independent APIs 270 9.5 Using Multiple Grid Computers to Solve a Single Problem 271 Parallel Programming 271 Message-Passing Approach 272 Message-Passing Interface (MPI) 273 Grid-Enabled MPI 282 Grid Enabling MPI Programs 286 9.6 Summary 288 Further Reading 288

xii CONTENTS Bibliography 288 Self-Assessment Questions 290 Programming Assignments 291 APPENDIX A INTERNET AND NETWORKING BASICS 293 APPENDIX B LINUX AND WINDOWS COMMAND-LINE INTERFACES 303 APPENDIX C XML MARKUP LANGUAGE 315 APPENDIX D GLOBUS INSTALLATION TUTORIAL 331 GLOSSARY 345 ANSWERS TO SELF-ASSESSMENT QUESTIONS 357 INDEX 359