A Review Paper on Grid Computing| ISSN: 2321-9939
A Review Paper on Grid Computing
Mr.Ramesh Prajapati
Dr.Samrat Khanna
Dept. of Computer Science Engineering
Rai University, Center for Research & Development
Saroda, Dholka, India
[email protected]
Dept. of Information Technology
Istar, Sardar patel centre for science & Tech.
V.Vnagar, India
[email protected]
Grid computing is enabled by relatively high-performance
computers, robust computer networks, grid management
software, and the divisibility of difficult scientific problems.
Together these allow a job to be subdivided and distributed to
thousands or even millions of computers to calculate a
solution.
A grid [2] is a distributed platform which is the
aggregation of heterogeneous resources. They do an analogy
with the electrical power grid. The computing power provided
by a grid should be transparently made available from
everywhere, and for everyone. Given the fact that an average
computer is idle 90% of the time and that 99% of its
capabilities are never tapped, as measured by the
computational stress on the CPU, there is a huge opportunity
to apply this power in a beneficial manner. The grid
technologies originally developed for global distributed
computing are also being applied in centralized computing
centers to create high-performance resources that can be
rented to Companies that need such power very infrequently,
or who do not wish to manage the computing environment
necessary to maintain their own hardware. The ultimate
purpose is to provide to scientific communities, governments
and industries an unlimited computing power, in a transparent
manner. This raised lots of research challenges, due to the
complexity of the Infrastructure. One of the main strategies of
grid computing is to use middleware to divide and apportion
pieces of a program among several computers. Grid
computing Involves computation in a distributed fashion,
which may also involve the aggregation of large-scale cluster
computing based systems. The size of a grid may vary from
small a network of computer workstations within a
corporation to large collaborations across many companies
and networks. Heterogeneity is present at all levels, from the
hardware
(computing
power,
available
memory,
interconnection network), to the software (operating system,
available libraries and software), via the administration
policies. Grid computing has the potential to reduce
computation time on complex problems from a period of
months to hours. This presents a significant business
opportunity if there are enough customers who need such a
capability. The name “grid computing” refers to the goal of
providing computer services to users in the same way that
water and electricity are provided. Customers need not own
the means to produce their own water or electricity; instead,
they outsource that capability to a utility and purchase only as
much as they need Grid computing will allow dynamic sharing
of resources among participants, organizations and businesses
in order to be able to pool, and thus run compute-intensive
applications or treatment of very large volumes of data. Since
the failure probability increases with a rising number of
components.
Section II describes the Layered Grid Architecture. In
Section III, we talk about Types of Grid. Challenges are
Abstract-- Grid is a generalized network computing system that
is supposed to scale to Internet levels and handle data and
computation seamlessly. Grid computing an extension of
distributed computing supports computation across multiple
administrative domains which enable it to be distributed over a
local, metropolitan or wide area network. Grid infrastructure is a
large set of nodes geographically distributed and connected by a
communication. As, the users can access the resources simply
and transparently without knowing where they are physically
located, there are many challenges involved for constructing the
grid environment. This paper gives a detailed survey on the
challenges and characteristics of the grid and how to manage the
resources in the grid environment. This paper also deals with the
security issues related to grid.
Keywords-- Grid computing, Grid Architecture, Grid
Security
I. INTRODUCTION
Grid computing is a powerful and efficient computational
technology which represented as an advanced step for the
previous distributing computing. Grid Computing concentrates
on fundamental aspects, including three key core technologies:
grid security, data management, and scheduling. Grid
computing [6] combines computers from multiple
administrative domains to reach a common goal, to solve a
single task, and may then disappear just as quickly. It is
analogous to the power grid [7]. All Grid is a system which
coordinates resources that are not subject to centralized
control, using standard, open, general purpose protocols and
interfaces to deliver nontrivial qualities of service [1].With the
increased popularity of internet and availability of high
performance computers and high speed networks as low cost
commodity, it has become possible to use networks of
computers as a single unified computing resource. Grid
technology allows organizations to use numerous computers to
solve problems by sharing computing resources. The
problems to be solved might involve data processing, network
bandwidth, or data storage. The systems tied together by a grid
might be in the same room, or distributed across the globe;
running on multiple hardware platforms; running different
operating systems; and owned by different organizations. The
idea is to grant users one place where they can go to undertake
a particular task; the grid leverages its vast IT capabilities and
completes the task. All the grid user experiences, essentially,
is a very large virtual computer doing work.
The seamless integration of geographically distributed
resources forms what is termed as Computational Grid and it
can be described as a distributed network computing system
where networked set of heterogeneous resources agree to
share their local resources to form a unified virtual computer
[7].
IJEDR1302013
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH | IJEDR
Website: www.ijedr.org | Email ID:
[email protected]
63
Fly Ash Concrete - A comparative Study| ISSN: 2321-9939
presented in Section IV. In section V, we present the Grid
Characteristics. Resource management describe in section VI,
we present the grid security in section VII.we present the
conclusion in section VIII.
II. LAYERED GRID ARCHITECTURE
Figure 2 Grid Types
Figure 1 Grid Layers Architecture
Fabric Layer- A diverse mix of resources that may be shared
Individual computers, Condor pools, file systems, archives,
metadata catalogs, networks, sensors, etc.Few constraints on
low-level technology: connectivity and resource level
protocols form the “neck in the hourglass” Defined by
interfaces not physical characteristics
Connectivity Layer - Communication. Internet protocols: IP,
DNS, routing, etc.Security: Grid Security Infrastructure (GSI)
Uniform authentication & authorization mechanisms in multiinstitutional setting Single sign-on, delegation, identity
mapping Public key technology, SSL, X.509, GSS-API
Supporting infrastructure: Certificate Authorities, key
management, etc.
Resource Layer - Grid Resource Allocation Mgmt (GRAM)
Remote allocation, reservation, monitoring, control of
compute resources. GridFTP protocol (FTP extensions) Highperformance data access & transport Grid Resource
Information Service (GRIS) Access to structure & state
information Network reservation, monitoring, control All
integrated with GSI: authentication, Authorization, policy,
delegation.
Computational Grid: – denotes a system that has a higher
aggregate capacity than any of its Constituent machine. It can
be further categorized based on how the overall capacity is
used.
Distributed Supercomputing Grid:–executes the application in
parallel on multiple machines to reduce the completion time of
a job Grand challenge problems typically require a distributed
supercomputing Grid one of the motivating factors of early
Grid research still driving in some quarters
High throughput Grid:– increases the completion rate of a
stream of jobs arriving in real time ASIC or processor design
verifications tests would be run on a high throughput Grid.
Data Grid: – systems that provide an infrastructure for
synthesizing new information from data repositories such as
digital libraries or data warehouses applications for these
systems would be special purpose data mining that correlates
information from multiple different high volume data sources.
Service Grid: systems that provide services that are not
provided by any single machine subdivided based on the type
of service they provide
Collaborative Grid: connects users and applications into
collaborative workgroups enable real time interaction between
humans and applications via a virtual workspace.
Collective Layer - Index servers aka Meta directory services
Custom views on dynamic resource collections assembled by
a community Resource brokers (e.g., Condor Matchmaker)
Resource discovery and allocation Replica catalogs Coreservation and co-allocation services.
Multimedia Grid: – provides an infrastructure for real time
multimedia applications requires the support quality of service
across multiple different machines whereas a multimedia
application on a single dedicated machine can be deployed
without QoS.synchronization between network and end-point
QoS.
III. TYPES OF GRID
Demand Grid: – category dynamically aggregates Different
resources to provide new services data visualization
workbench that allows a scientist to dynamically increase the
fidelity of a simulation by allocating more machines to a
Simulation would be an example.
Grid systems can be classified depending on their usage.
There are different types [6] of grid which can occur in RealTime Grid System. These grids can be classified on several
factors such as:
IV. CHALLENGES IN GRID
IJEDR1302013
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH | IJEDR
Website: www.ijedr.org | Email ID:
[email protected]
64
Fly Ash Concrete - A comparative Study| ISSN: 2321-9939
Grid Computing has made significant landmarks in field of
high-performance computing, there are still a number of
challenges that need to be addressed to provide seamless
computing environment. One of the main challenges is the
heterogeneity that results from the vast range of technologies,
both software and hardware, encompassed by the Grid.
In short, we can collect some of the expectations in the
following list:
Enabling efficient and optimal resource usage.
Share inter-organization resources efficiently.
Secure user authentication and authorization.
Security of stored data and programs.
Secure Communication.
Centralized or semi-centralized control.
Auditing.
Enforcement of Quality of Service (QoS) and Service
Level Agreements (SLA)
Interoperability of different grids.
Support for transactional processes.
This is not an exhaustive list of challenges that the grids are
expected to meet. There are a number of other concerns that
daunt the grids but have not been included in this paper some
of the Challenges are given below,
Security
Uniform access
Computational economy
Resource discovery
Resource allocation and scheduling
Data locality
Application construction
Network management
System management
There is no clear standard to follow Still lots of debate on
what grid computing is, and what is not Grid application
development is still difficult Application area is limited and
significant applications are lacked Lots of efforts should be
done to make a software package or a service useable over
grid
Centralized management of grid computing Business model of
grid is ambiguous Management and administration of grid is
the most challenged one secure access to resources and
computations
(identification,
authentication,
and
computational delegation) is provided by low level
middleware systems like Globus. Resource discovery involves
discovering appropriate resources and their properties that
match with users t We maintain resource listings for Globus,
Legion, and Condor and their static and dynamic properties
are discovered using grid information services. For example,
in case of Globus resources, we query Globus LDAP-based
GRIS server for resource information.
V. GRID CHARACTERISTICS
IJEDR1302013
A grid is a large-scale geographically distributed hardware and
software infrastructure composed of heterogeneous networked
resources owned and shared by multiple administrative
organizations which are coordinated to provide transparent,
dependable, pervasive and consistent computing support to a
wide range of applications. These applications can perform
their distributed computing, high throughput computing, ondemand computing, data-intensive computing, collaborative
computing or multimedia computing. The most incredible
characteristics that make Grid a more usable system that all its
predecessors are listed below:
A. Heterogeneity:
Grids involve heterogeneity. It allows incorporating varying
software and hardware resources spread across different
administrative domains.
B. A wide spectrum of Resources:
The grid is an all-compassing in context of the resources that
constitute it. Broadly speaking, the grid resources incorporate
computational resources, data storage, communication links,
software, licenses, special equipment, supercomputers, and
clusters. The Grids promise to provide consistent, dependable,
transparent access to these resources despite their source.
C. User-Centric:
Grids lay the entire focus on the end-user. This means that the
specific machines are that are used to execute an application
are chosen from user's point of view, maximizing the
performance of that application, regardless of the effect on the
system as a whole. Since one of the major drives behind grid
computing has been the collaborative research, so grid
computing has played a marvelous role in:
A. Improving distributed management while retaining full
control over locally managed resources.
B. Improving the availability of data and identifying problems
and solutions to data access patterns.
C. Providing researchers with a uniform user-friendly
environment that enables access to a wider range of physically
distributed facilities improving quality.
A high-performance system capable of performing the
necessary responses to load and generation trends and
perturbations will normally have the following characteristics:
1.
2.
Adequate grid interconnection, involving multiple parallel
lines Adequate reserve margins, especially spinning
reserves Modern load dispatching centers in operation.
A reliable high-speed protective system continually in
operation.With the above capabilities, the grid maintains
narrow limits of frequency and voltage fluctuations does
not permit prolonged off-nominal frequency and voltage
operation Keeps disturbances and transients to short
duration, and prevents their propagation throughout the
system.
VI. GRID RESOURCE MANAGEMENT
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH | IJEDR
Website: www.ijedr.org | Email ID:
[email protected]
65
Fly Ash Concrete - A comparative Study| ISSN: 2321-9939
A grid must optimize the resources under its disposal to
achieve maximum possible throughput. Resource management
includes submission of a job remotely, checking its status
while it is in progress and obtaining the output when it has
finished execution. When a job is submitted, the available
resources are discovered through a directory service. Then, the
resources are selected to run the individual job. This decision
is made by another resource management component of the
grid, namely, the grid scheduler. The scheduling decision can
be based on a number of factors. For example, if an
application consists of some jobs that need sequential
execution because the result of one job is needed by another
job, then the scheduler can schedule these jobs sequentially.
The grid resource broker is responsible for resource
discovery, deciding allocation of a job to a particular grid
node, binding of user applications (files), hardware resources,
initiate computations, adapt to the changes in grid resources
and present the grid to the user as a single, unified resource.
The resource broker acts as a mediator between the user
and grid resources using middleware services. It is responsible
for resource discovery, resource selection, binding of software
(application), data, and hardware resources, initiating
computations, adapting to the changes in grid resources and
presenting the grid to the user as a single, unified resource.
The components of resource broker are the following:
JOB CONTROL AGENT (JCA): This component is a
persistent central component responsible for shepherding a job
through the system. It takes care of schedule generation, the
actual creation of jobs, and maintenance of job status,
interacting with clients/users, schedule advisor, and
dispatcher.
SCHEDULE ADVISOR (SCHEDULER): This component is
responsible for resource discovery (using grid explorer),
resource selection, and job assignment (schedule generation).
Its key function is to select those resources that meet user
requirements such as meet the deadline and minimize the cost
of computation while assigning jobs to resources.
VII.SECURITY IN GRID
Security forms the vital aspect of grid computing. We look
at the three most desirable security features a grid should
provide. These are single sign-on, authentication and
authorization. Single sign-on means that the user is able to
login once using his security credentials and can then access
the service of the grid for certain duration. Authentication
refers to providing the necessary proof to establish one's
identity. So, when you login to your email account, you
authenticate to the server by providing your username and
password. Authorization is the process that checks the
privileges assigned to a user.
Security in grids differs from the Internet security due to
the challenges that arise when we seek to build scalable virtual
organizations (VOs). Security requirements within the Grid
environment are driven by the need to support scalable,
dynamic, distributed virtual organizations (VOs) collections of
diverse and distributed individuals that seek to share and use
diverse resources in a coordinated fashion. From a security
perspective, a key attribute of VOs is that participants and
IJEDR1302013
resources are governed by the rules and policies of the
classical organizations of which they are members.
Furthermore, while some VOs, such as multiyear scientific
collaborations, may be large and long-lived (in which case
explicit negotiations with resource providers are acceptable),
others will be short-lived created, perhaps, to support a single
task, for example, two individuals sharing documents and data
as they write a proposal in which case overheads associated
with VO creation and operation have to be small. A
fundamental requirement is thus to enable VO access to
resources that exist within classical organizations and that,
from the perspective of those classical organizations, have
policies in place that speak only about local users.
This VO access must be established and coordinated only
through binary trust relationships that exist between (a) the
local user and their organization and (b) the VO and the user.
We cannot, in general, assume trust relationships between the
classical organization and the VO or its external members.
A. Existing Security Technologies
In this section we cover those security technologies that
have been successfully deployed in various existing security
systems. All of these technologies are based on open standards
and form an integral part of grid security. Of these
technologies, Kerberos is not explicitly the part of existing
grid security architecture, but can be used as an authentication
mechanism to provide security in client/server architecture. As
we shall see, Kerberos also provides some of the
functionalities desirable in grids like single sign-on and
delegation of privileges using Ticket Granting Ticket (TGT).
The same functionality is provided by X.509 proxy certificate,
which is a part of the Grid Security Infrastructure (GSI).
However, the creation and delegation of Kerberos TGTs
require involvement of a trusted third party (KDC). On the
other hand an X.509 proxy certificate can be created without
the involvement of a third party. We start our discussion with
Public Key Infrastructure (PKI), which forms an integral part
of GSI. In PKI we talk about the X.509 digital certificates,
which form an integral part of PKI. Next in this section, we
cover the Kerberos network authentication protocol explaining
the key components of Kerberos and the steps involved in the
authentication mechanism. In the end we discuss GSI, the
existing security infrastructure used in the grids today.
PUBLIC KEY INFRASTRUCTURE - Public Key
Infrastructure (PKI) provides users a way to do secure
communication in insecure public network using
public/private key pair.
KERBEROS - Kerberos is a network authentication protocol
developed by MIT. It is a distributed authentication protocol
that provides mutual authentication to client and server using
symmetric-key cryptography. Symmetric-key cryptography
means that the same key is used for both encryption and
decryption of the message.
GRID SECURITY INFRASTRUCTURE - Grid Security
Infrastructure (GSI) is part of the Globus Toolkit. As the name
suggests it defines the complete architecture that provides the
necessary functionalities for the implementation of security in
grids.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH | IJEDR
Website: www.ijedr.org | Email ID:
[email protected]
66
Fly Ash Concrete - A comparative Study| ISSN: 2321-9939
VIII. CONCLUSION
We are in the world of complex computational power and very
high speed machine processing capabilities with complex data
storage methods. But these advancements are not enough for
the complex and challenging demands placed by home users,
businesses and industries. In this perspective, this paper has
given a survey on grid computing which is the solution for the
above said problem. This paper has detailed on the
architecture of grid, types of grid, characteristics, challenges,
Resource Management and security issue of the grid that has
to be considered while creating a grid environment. Also, it
has given a brief account on how to manage the resources and
the security issues.
RERERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
R. Al-Khannak, B. Bitzer, “Modifying Modern Power Systems
Quality by Integrating Grid Computing Technology”
Book - “Introduction to Grid Computing (Hardcover - 2009)” (url
http://www.flipkart.com/introduction-grid-computingmagoules-frederic/1420074067-eox3f9kfvb)
Sanjay P. Ahuja, Jack R. Myers Department of Computer and
Information Sciences, University of North Florida, Jacksonville,
“A Survey on Wireless Grid Computing”, The Journal of
Supercomputing, 37, 3-21, 2006.
Manish Parashar, A.Lee, “Grid Computing:
Introduction and
Overview”.
Gurleen Kaur, Inderpreet Chopra Department of Computer
Applications, PCTE, Ludhiana Department of Computer
Applications, PCTE, Ludhiana Software Engineer, AmSoft
Systems, Gurgaon, “Grid Computing- Challenges Confronted and
Opportunities Offered”.
Hai Jin, W. Fan, Z. Wu, and J. Yang ,“Challenges of Grid
Computing*”, (Eds.): WAIM 2005, LNCS 3739, pp. 25 - 31,
2005
Miguel L. Bote-Lorenzo, Yannis A. Dimitriadis and Eduardo
Gómez-Sánchez, “Grid Characteristics and Uses: a Grid
Definition”
von Welch, frank siebenlist, ian foster, john bresnahan, “Security
for Grid Services”.
Rajkumar Buyya, Steve Chapin, and David DiNucci
“Architectural Models for Resource Management in the Grid”.
Marty Humphrey, member, IEEE, Mary R. Thompson, Member,
IEEE and Keith R. Jackson “Security for grids”.
Frederic Magoules, Jie pan, Kiat-An Tan, Abhinit Kumar,
“Introduction to Grid Computing”, CRC Press, A chapman and
hall Book.
David Abramson , Rajkumar Buyya , and Jonathan Giddy, “A
Computational Economy Grid Computingand its Implementation
in the Nimrod-G Resource Broker”.
“Globus project”, http://www.globus.org/demogrid/.
I. Foster, C. Kesselman, S. Tuecke, “The Grid: Blueprint for a
New Computing Infrastructure”, Intl. Jr. of Supercomputer
Applications, 15(3),2001.
IJEDR1302013
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH | IJEDR
Website: www.ijedr.org | Email ID:
[email protected]
67