Loading in 2 Seconds...
Loading in 2 Seconds...
Grids, utility computing and a perspective on the future of IT infrastructure. Washington Area CTO Forum March 31, 2006 Nirav Kapadia firstname.lastname@example.org. Outline. Characterizing computing grids Grids as intended versus what we see today Common types of grids today
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Washington Area CTO Forum
March 31, 2006
Strict definition of computing gridSystems for large scale, collaborative computing must meet key criteria
Scalable with users and resources
Support for heterogeneity
Support for interoperability
Scalable with geographical distances
Fully distributed (federated) architecture
Ability to compartmentalize along
Cluster management systems work best with dedicated resources
Condor – from the U of Wisconsin – is a notable exception, but not commercially available
As the name implies, resources are shared – and typically involve desktops
A custom screen saver is the most common vehicle for running the grid applicationResources on the grid –should they be dedicated or shared?
Option #1: jobs run in a guest account
Shared access across jobs
Option #2: accounts for everyone on all machines
Homogeneous uid pool highly recommended
Logins typically disabled
Option #1: jobs run with user’s privileges
If downloaded by user
Option #2: jobs run in guest account
If set up by administrator
No direct remote user access to desktopAccess management –who needs (gets) access to what?
Transfer user specified files via ftp, scp, etc
File staging for large data
On demand file transfer (system call traps)
Shared file systems
Data embedded within application or retrieved via HTTP/Java call-backs
Limited data, typically no filesData management –how does data get to the apps?
Opportunities for subversion
LSF, PBS, SGE
Ideal GridSecurity model –user accountability is key today
Basic system and kernel safeguards
© Harvard Business Review
Real users and real usage
ClusternanoHUB.org – remote access to simulators and compute power
Remote desktop (VNC)
Slide courtesy of Gerhard Klimeck, Network for Computational Nanotechnology