Grid Middleware course (2004)
Content (1/4):
Course 1: Introduction to the Grid Technology Course 2: The Grid Information System Course 3: The Grid Resource Management Course 4: The Grid Security System
Course 1: Introduction to the Grid TechnologyDate: 05-01-2004 Description: This introductory course gives an overview of the Grid technology, it describes the previous and the current architecture of the Grid. It briefly introduce some equivalent Technology and tried to show that Grid technology complete rather than compete with them. Grid technology has been introduced in the mid-nineties, because there was a real need for coordinating and sharing resources that are becoming more and more geographically distributed. Besides that, the rapid progress of the networking technology and the Internet technology has open new ways for doing business and science as well. The scientific community has provided the potential applications for the Grid-technology. The industrial world has recently started to endorse the concepts of the Grid technology, companies like IBM, SUN, and Microsoft started sponsoring the research around the Grid technology which has lead to emergence of a new architecture of the Grid namely the Open Grid Service Architecture (OGSA). In essence, the Grid technology is aiming at coordinating the sharing of resources among dynamic institutions. In the context of Grid technology the word "resource" is used as a generic word to design computers, software, storage facilities, any devices that can accessed and controlled through the network (scientific instruments, tape robots, etc). Grid technology has thus strengthened the concept of Virtual Organization (VO); which is basically a collection of the independent organizations trying to pool together in order to achieve a predefined goal. When we consider a VO composed of independent organizations, the problem is always the lack of a central control. Every organization has its own security strategy, its own resource management policy etc. And it is quite hard to convince those organizations to give away there independence. This is why one of the working assumptions of the Grid Technology was and still is the absence of a central control, central location etc. Every thing in the Grid technology is based on a mutual trust and predefined relationships. Keywords: Grid Technology, OGSA, network-centric service technology Course material: Slides [PPT] (Course notes [DOC]) References: K. Czajkowski, S. Fitzgerald, I. Foster, C. Kesselman. "Grid Information Services for Distributed Resource Sharing." Proceedings of the Tenth IEEE Int. Symposium on High-Performance Distributed Computing (HPDC-10), August 2001 I. Foster, C. Kesselman, S. Tuecke. "The Anatomy of the Grid: Enabling Scalable Virtual Organizations." International J. Supercomputer Applications, 15(3), 2001. I. Foster, C. Kesselman, J. Nick, S. Tuecke "The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration." , Open Grid Service Infrastructure WG, Global Grid Forum, June 22, 2002. I. Foster, C. Kesselman "The Grid: Blueprint for a New Computing Infrastructure," Morgan-Kaufman, 1999. "Data Management and Transfer in High Performance Computational Grid Environments." B. Allcock, et al. Parallel Computing Journal, Vol. 28 (5), May 2002, pp. 749-771
Course 2: The Grid Information SystemDate: 06-01-2004 Description: This course focuses on the Grid information system. The information service is a considered a core service of the Grid infrastructure. Without the information service or information component, there is no Grid at all. The information service can be regarded as the memory of the Grid architecture. This component of the Grid architecture is needed by all the other components/services of the Grid infrastructure. For the simple reason that the Information service/component provides the fundamental mechanisms for discovery and monitoring, and thus for planning and adapting application behaviour The discovery, characterization, and monitoring of resources, services, and computations can be challenging due to the considerable diversity, large numbers, dynamic behaviour, and geographical distribution of the entities in which a user might be interested Keywords: Information Management, Directory Services, LDAP, Course material: Slides [PPT] (Course notes [DOC]) References: A Performance Study of Monitoring and Information Services for Distributed Systems. X. Chang, J. Freschl, and J. Schopf. Proceedings of HPDC, August 2003. Grid Information Services for Distributed Resource Sharing. K. Czajkowski, S. Fitzgerald, I. Foster, C. Kesselman. Proceedings of the Tenth IEEE International Symposium on High-Performance Distributed Computing (HPDC-10), IEEE Press, August 2001. A Fault Detection Service for Wide Area Distributed Computations. P. Stelling, I. Foster, C. Kesselman, C. Lee, G. von Laszewski. Proc. 7th IEEE Symposium on High Performance Distributed Computing, pp. 268-278, 1998. Describes a fault detection service based on unreliable fault detectors and its implementation as the Globus Heartbeat Monitor. Usage of LDAP in Globus. I. Foster, G. von Laszewski. This short note describes the use of LDAP in the Globus toolkit. It answers three questions: What is LDAP? Where is it used? and Why is it used in Globus? A Directory Service for Configuring High-Performance Distributed Computations. S. Fitzgerald, I. Foster, C. Kesselman, G. von Laszewski, W. Smith, S. Tuecke. Proc. 6th IEEE Symposium on High-Performance Distributed Computing, pp. 365-375, 1997. Describes the Meta-computing Directory Service used to maintain information about Globus components.
Course 3: The Grid Security SystemDate: 07-01-2004 Description: This course addresses the Security issues of the Grid Technology. For end-users, the primary requirement of the secure system is simplicity: Access to the virtual organization's resources should not be significantly different from access to the local organization's resources. There should be a single sign-on, where users need to log on only once to access all permitted resources. Programs running on a user's behalf should possess a subset of the user's rights and have access to the permitted resources. To support such a requirement the Grid security infrastructure must transparently interface with common remote access tools: remote login via Telnet and rlogin, file access via FTP, Web browsers, and programming libraries such as CORBA and MPI. It must also allow implementation of new inter site applications by providing standardized APIs for accessing security functions. For example, a group developing collaborative design tools should be able to easily integrate authentication and authorization mechanisms. The course introduces the basic mechanisms on which the Grid security infrastructure is based. The course does not extensively explains standards security mechanisms such as the public security infrastructure, it gives just a brief introduction, more details on some basic security mechanisms are explained during the lab. sessions. Keywords: Course material: Slides [PPT] (Course notes [DOC]) References: Randy Butler et al. "A National-Scale Authentication Infrastructure" Ian Foster et al. "A Security Architecture for Computational Grids" Jason Novotny et al. "An online Credential Repository for Grid: MyProxy Von Welch et al. "Security for Grid Services" Laura Pearlman et al. "A community Authorization Service for Group Collaboration" Ian Foster et al. "Managing Security in High-Performance Distributed Computations"
|
Workflow & Grid Middleware Group (WGM) |