grid computing from Notebook: Word doc

Cloud Computing
Question: what is grid computing?
Figure 1 binding and bonding the internet
Internet
Computational grid systems
Cloud
The internet, as I see it, is: the world’s largest
defined digital communications framework. It
initiates with protocols, these develop into
standards, and this facilitates a rapid
[communications process]. So, as a start point we
have our data to which the first element we are
going to need from the framework is a wrapper in
the form of TCP from the protocol stack suite. After
that: we are going to bind IP; from this point
forwards it is routing and the addition of
computational mathematics and hay presto.
Computational grid systems
So from our diagram, we have, a framework called the internet, within in which are other
frameworks; some of the frameworks are stand alone, others interact and are notionally bound.
[layering]
Figure 2 the convergence of framework ideas
As an understanding: grid computing is: the application of
multiple networked computational resources to simultaneous
problem solving, often involving a single problem domain.
The process requires management software that is able to
divide and farm out elements of the programme to the farm. It can be considered as: distributed
large-scale cluster computing as forms of network distributed parallel and multi-parallel processing.
Therefore, at its simplest grid computing is a network of computing resources within which each
resource is shared with all resources.
Grid computing stems from distributed computing.
An ideal grid would be one where the networked resource represents one computer.
This grant access to:
 processing
 storage
Problem
Standards!
Most grid systems rely on proprietary software and tools.
Network Protocols
Standards
TCP/IP
Protocols
Internet
Cloud
Grid computers resources:
 central processing unit
 memory


storage
network access
Hardware
Abstraction
Layer
It boils down to
basic programming, together with the design of arrays to provide resolution. For example the Allen
array.
Entity Framework
SETI
SETI@home
Dialogue with the aliens
Object Model
SETIMessage = "00000010101010000000000
00101000001010000000100 10001000100010010110010
10101010101010100100100 00000000000000000000000
00000000000011000000000 00000000001101000000000
00000000001101000000000 00000000010101000000000
00000000011111000000000 00000000000000000000000
11000011100011000011000 10000000000000110010000
11010001100011000011010 11111011111011111011111
00000000000000000000000 00010000000000000000010
00000000000000000000000 00001000000000000000001
11111000000000000011111 00000000000000000000000
11000011000011100011000 10000000100000000010000
11010000110001110011010 11111011111011111011111
00000000000000000000000 00010000001100000000010
00000000001100000000000 00001000001100000000001
11111000001100000011111 00000000001100000000000
00100000000100000000100 00010000001100000001000
00001100001100000010000 00000011000100001100000
00000000001100110000000 00000011000100001100000
00001100001100000010000 00010000001000000001000
00100000001100000000100 01000000001100000000100
01000000000100000001000 00100000001000000010000
00010000000000001100000 00001100000000110000000
00100011101011000000000 00100000001000000000000
00100000111110000000000 00100001011101001011011
00000010011100100111111 10111000011100000110111
00000000010100000111011 00100000010100000111111
00100000010100000110000 00100000110110000000000
00000000000000000000000 00111000001000000000000
00111010100010101010101 00111000000000101010100
00000000000000101000000 00000000111110000000000
00000011111111100000000 00001110000000111000000
00011000000000001100000 00110100000000010110000
01100110000000110011000 01000101000001010001000
01000100100010010001000 00000100010100010000000
00000100001000010000000 00000100000000010000000
00000001001010000000000 01111001111101001111000
"
I have a way to communicate with the computer:
“grid commuting” becomes:
0110011101110010011010010110010000100000011
0001101101111011011010111000001110101011101
00011010010110111001100111
Computers, our third party intermediaries
SETI sent the above message from the Arecibo Observatory and the 16th of November 1974, it was
transmitted in the direction of: Coordinates:
16h 41m 41.44s, +36° 27′ 36.9″
Where a little bit away and happens to be Messier
object, the globular star cluster M13 [NGC 6205], which
according to best estimates is about 6,800 parsec away,
in the constellation Hercules.
Figure 3 Messier Object M13
It has an apparent dimension 20 arcmin, with an apparent magnitude of +5.8
Mass is estimated at 6x105 solar masses, it has a radius of 25.76 parsec with an age of 11.65x109
years
Figure 4 Constellation Hercules
Coordinates:
17h 00m 00s, +30° 00′ 00″
The constellation has an area 1225 square degrees,
and there are nine stars within 10 pc, it was one of the
48 constellations listened by listed by Ptolemy, and
remains as one of the current “modern” 88
constellations
The history of patterns in the sky that we as
constellations, has been one of enduring legacies with
these ideas passed generation to generation
civilisation to civilisation and then on through history
to the generations that follow.
This modern depiction of Hercules, is an amalgamation of previously described constellations, the
Babylonians had ideas and descriptions, described technically as: conflation: for the constellation.
These constellations have been developed through time as objects in space and in our history
through mankind’s most ancient civilisations. Amongst the first of these the Sumerians, had their
own extra ordinary and detailed descriptions, ideas, mythologies for the region in space that we
describe as the constellation Hercules.
N = R* fp ne fl fi fc L
Where,
N = The number of civilizations in The Milky Way Galaxy whose electromagnetic emissions are detectable.
SETI Arecibo broadcast
message
16th November
R* =The rate of formation of stars suitable for the development of intelligent life.
fp = The fraction of those stars with planetary systems.
ne = The number of planets, per solar system, with an environment suitable for life.
fl = The fraction of suitable planets on which life actually appears.
1974
Drake Equation 1961
fi = The fraction of life bearing planets on which intelligent life emerges.
fc = The fraction of civilizations that develop a technology that releases detectable signs of their existence into space.
1960 Frank D Drake
Fermi paradox
L = The length of time such civilizations release detectable signals into space.
Figure 5 a bit of rewind and fast forward
So we get to:
./<index>0« to »
︣ and apply this notational expression to grid computing algorithm.
So if we ask Charles Babbage, who originally created a difference engine.
Inflation theory
Given andy = ανδψ
Gaps in resolution, as a natural function have no specific
fixing, only our own demarcation, and then lack of
understanding in how to develop improvements in the
resolution or to use the data gathered to set off on our
journey of exploration in the opportunity of scale.
F = ma
Language and symbolic linking
E = mC2
Partical physics description
01
Sandboxing and a cat in the
box metaphor
General relativity
?what is an alien
CERN
= :-)
connected space-time
Charles Babbage
Difference Engine
ASCII
1962.1693
128 unique 7 bit string
Telnet and FTP
1971
Between 14 and 19 nodes
Verses todays.#nodeCount
@ proposed
It was not until the late 1980's that it
was adopted as a global standard
1972
Bell Labs start the C language
Bob Kahan and Vint Cerf develop TCP
1973
1975
the NASA seperation
March 1982. US military
adopt TCP/IP as standard.
suit configuration
The requirement for DNS.
port referencing
SMTP
So what I understand is the Internet, comprises:
Internet protocol suite
This is a set of communications protocols used for the Internet and similar networks; the most
common stack of which is TCP/IP. It provides: end to end connectivity. So we have:
Figure 6 point to point
It is used in specifying how data should be formatted together with addressing: transmitted, rooted
and received at the destination.
It is abstracted into four layers:
1
• link
• for local network
2
• Internet
• (IP)connectes local networks
3
• transport
• host to host comunication
4
• application
• provides for data services communication
This leads us to the OSI model:
1.
2.
3.
4.
5.
6.
7.
Application
Presentation
Session
Transport
Network
Data link
Physical
The addition of the physical layer.
IBM
The analysis of huge datasets together with the ability to run scenario analysis at
unprecedented rates, growing both their range; increasing granularity, resolution in the focus in
scope increasing their depth exponentially growing rate. (𝑥 𝑥 )
That detailed results require today.
Grid components










Mainframes
UNIX servers
Intel servers
Databases
Storage systems
Desktop PCs
Workstations
laptops
Tablets
Phones
Fundamentally this list is extensible into any computing device with network access.
Very large application
All resources become applied and the
system runs at full capacity, appearing
slow and unresponsive.
Figure 7 unused processor cycles non-grid
Grid
Some are:



Data
Storage
Processing
Huge dataset
grid
processing
scheduler
storage
data
Figure 8
Others are hybrid. This provides the opportunity for the creation of grid middleware.
Scheduler
Rules and priorities set
Figure 9 grid computing
Basics
Most of the time computers have a lot of available resources.
Grid software.
Note: the computational resources do not need to share the same physical location.
scheduler
Makes a grid
Without it, it is just a bunch
of computers or cloud.
Advantages
Lots of “little” computers used in simultaneous arrays turn into “super” computers.
Grid is different from cloud.
Virtualisation
A grid definition: co-ordinated resource sharing for problem domain solving in dynamic, mutiinstitutional virtual organisations.
Cluster computing
We just want to solve a problem.
Grid characteristics
 Distributed system
 Site autonomy
 Systems management
 Security
Key problems
 Security
 Resource management
 Data management
 Information services
Pool of computational resources and a “seeker” or user, wanting to solve a problem.
grid & cluster
Used for data mining, in
addition to science projects
and research
A replacement for super computers

Data nodes

Processing nodes

scheduler
grid fabric
Core middleware
User level middleware
sequential
Requires the introduction of parallelism
Grid level application, including protocols
For the creation of parallelism in applications
grid resource broker
(scheduler)
grid
Seeker
User
Create application for
problem description

grid market



processing units
memory
storage
network access
Director of grid resources
Time and the application of unused resources.
CERN Model
CERN model
Data
storage
transfer processing
HAL
hardware abstraction layer
software for
Single set of credentials
CERN account holder
Access to global distributed
system through integrated
suite
Figure 10 CERN representation
CERN is made up of multiple grids, the facility in Geneva, Switzerland is currently configured to
provide about 20% of grid functions for the analysis of LHC data, the remainder is provided by:



universities
laboratories
organisational contributors
eScience

cosmology

chemistry

biology

life sciences

social sciences and
humanities
EGI
petabytes of data
*instruments within the infrastructure
It’s working now!
The model basis is: national infrastructure supported by regional collaboration.
The ability to get
resources for self
Cloud
Public computing
The grid itself comprises of:
300,000 cores
hundreds of petabytes of storage
running a job rate of about 250,000
Scientific computing
Particle physicist created
grid computing to analyse
Cerner LHC data
LHC
Principal detectors:
 ATLAS
 ALICE
 CMS
 LHC(b)
node partners are in excess
of 150
600 million
collisions per
second
1 petabyte per second
25 petabytes per year
Astrophysics
Life sciences
Stored on hard disk drive
and magnetic tape
Cons
Although the system is up and running there are a few limiting elements, these comprise of:





need fast interconnection between computational resources
tweaking
licensing
administrative domains
politics of sharing
Security
An attack is equal to an assault on system deliberately avoiding security systems.
Grid security issues
Security in the computational science is principally information security. Computer security also
includes the fields of contingency planning and disaster recovery.
So from the ground up we may start with a design plan, fortunately for us, there is a recognised
structural template in place, and it includes the following techniques:







the principle of least privilege
automated theorem proving
code reviews and unit testing
defence in depth
failsafe and full-back positioning
audit trails
window of vulnerability minimisation, through full disclosure
This now implies that within our information technology architecture we now have a security layer
the artefacts of which describe management of the systems quality attributes.
Quality attributes
 confidentiality
 integrity
 availability
 accountability
 insurance services
hardware mechanisms
operating Systems
coding
Infrastructure
Architecture
Information Security
authorisation
services
Management



Credentials
trust
monitoring
Figure 11 grid security issues
Denial of service attack
A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an
attempt to make a machine or network resource unavailable to its intended users.
Attacks
 ICMP Flood
 (S)SYN flood
 Teardrop
 low rate denial of service
 peer-to-peer
 asymmetry of resource utilisation in starvation
 permanent denial of service
 application level floods
 nuke
 HTTP post denial of service
 RUDY
 slow read
 distributed
 reflective or spoofed



telephony denial of service
unintentional denial of service
denial of service level II
Defence
 firewalls
 switches
 routers
 application front end hardware
 IPS-based prevention
 DDS-based defence
 blackholing and sinkholing
 clean pipes
Defensive systems
DoS
Attack prevention
Detection and recovery
Attack source






Firewall
Microfirewall
antivirus
Access control
packet filtering
System Security
management
Anomaly-based IDS
Protocol security
mechanism
Proxy server
Figure 12 Example of a defensive system for denial of service attack
Signature-based IDS

deterministic packet
markers
problematic packet
marking
Smurf attack
smurf Attack
TO
1.1.1.2
TO
9.9.9.9
FROM
9.9.9.9
attacker
FROM
1.1.1.2
TO
1.1.1.3
FROM
9.9.9.9
TO
1.1.1.255
TO
1.1.1.4
FROM
9.9.9.9
FROM
9.9.9.9
TO
1.1.1.5
FROM
9.9.9.9
TO
1.1.1.6
FROM
9.9.9.9
TO
9.9.9.9
FROM
1.1.1.3
TO
9.9.9.9
FROM
1.1.1.4
TO
9.9.9.9
FROM
1.1.1.5
TO
9.9.9.9
FROM
1.1.1.6
TO
1.1.1.7
FROM
9.9.9.9
TO
9.9.9.9
FROM
1.1.1.7
victim