Cloud Computing Question: what is grid computing? Figure 1 binding and bonding the internet Internet Computational grid systems Cloud The internet, as I see it, is: the world’s largest defined digital communications framework. It initiates with protocols, these develop into standards, and this facilitates a rapid [communications process]. So, as a start point we have our data to which the first element we are going to need from the framework is a wrapper in the form of TCP from the protocol stack suite. After that: we are going to bind IP; from this point forwards it is routing and the addition of computational mathematics and hay presto. Computational grid systems So from our diagram, we have, a framework called the internet, within in which are other frameworks; some of the frameworks are stand alone, others interact and are notionally bound. [layering] Figure 2 the convergence of framework ideas As an understanding: grid computing is: the application of multiple networked computational resources to simultaneous problem solving, often involving a single problem domain. The process requires management software that is able to divide and farm out elements of the programme to the farm. It can be considered as: distributed large-scale cluster computing as forms of network distributed parallel and multi-parallel processing. Therefore, at its simplest grid computing is a network of computing resources within which each resource is shared with all resources. Grid computing stems from distributed computing. An ideal grid would be one where the networked resource represents one computer. This grant access to: processing storage Problem Standards! Most grid systems rely on proprietary software and tools. Network Protocols Standards TCP/IP Protocols Internet Cloud Grid computers resources: central processing unit memory storage network access Hardware Abstraction Layer It boils down to basic programming, together with the design of arrays to provide resolution. For example the Allen array. Entity Framework SETI SETI@home Dialogue with the aliens Object Model SETIMessage = "00000010101010000000000 00101000001010000000100 10001000100010010110010 10101010101010100100100 00000000000000000000000 00000000000011000000000 00000000001101000000000 00000000001101000000000 00000000010101000000000 00000000011111000000000 00000000000000000000000 11000011100011000011000 10000000000000110010000 11010001100011000011010 11111011111011111011111 00000000000000000000000 00010000000000000000010 00000000000000000000000 00001000000000000000001 11111000000000000011111 00000000000000000000000 11000011000011100011000 10000000100000000010000 11010000110001110011010 11111011111011111011111 00000000000000000000000 00010000001100000000010 00000000001100000000000 00001000001100000000001 11111000001100000011111 00000000001100000000000 00100000000100000000100 00010000001100000001000 00001100001100000010000 00000011000100001100000 00000000001100110000000 00000011000100001100000 00001100001100000010000 00010000001000000001000 00100000001100000000100 01000000001100000000100 01000000000100000001000 00100000001000000010000 00010000000000001100000 00001100000000110000000 00100011101011000000000 00100000001000000000000 00100000111110000000000 00100001011101001011011 00000010011100100111111 10111000011100000110111 00000000010100000111011 00100000010100000111111 00100000010100000110000 00100000110110000000000 00000000000000000000000 00111000001000000000000 00111010100010101010101 00111000000000101010100 00000000000000101000000 00000000111110000000000 00000011111111100000000 00001110000000111000000 00011000000000001100000 00110100000000010110000 01100110000000110011000 01000101000001010001000 01000100100010010001000 00000100010100010000000 00000100001000010000000 00000100000000010000000 00000001001010000000000 01111001111101001111000 " I have a way to communicate with the computer: “grid commuting” becomes: 0110011101110010011010010110010000100000011 0001101101111011011010111000001110101011101 00011010010110111001100111 Computers, our third party intermediaries SETI sent the above message from the Arecibo Observatory and the 16th of November 1974, it was transmitted in the direction of: Coordinates: 16h 41m 41.44s, +36° 27′ 36.9″ Where a little bit away and happens to be Messier object, the globular star cluster M13 [NGC 6205], which according to best estimates is about 6,800 parsec away, in the constellation Hercules. Figure 3 Messier Object M13 It has an apparent dimension 20 arcmin, with an apparent magnitude of +5.8 Mass is estimated at 6x105 solar masses, it has a radius of 25.76 parsec with an age of 11.65x109 years Figure 4 Constellation Hercules Coordinates: 17h 00m 00s, +30° 00′ 00″ The constellation has an area 1225 square degrees, and there are nine stars within 10 pc, it was one of the 48 constellations listened by listed by Ptolemy, and remains as one of the current “modern” 88 constellations The history of patterns in the sky that we as constellations, has been one of enduring legacies with these ideas passed generation to generation civilisation to civilisation and then on through history to the generations that follow. This modern depiction of Hercules, is an amalgamation of previously described constellations, the Babylonians had ideas and descriptions, described technically as: conflation: for the constellation. These constellations have been developed through time as objects in space and in our history through mankind’s most ancient civilisations. Amongst the first of these the Sumerians, had their own extra ordinary and detailed descriptions, ideas, mythologies for the region in space that we describe as the constellation Hercules. N = R* fp ne fl fi fc L Where, N = The number of civilizations in The Milky Way Galaxy whose electromagnetic emissions are detectable. SETI Arecibo broadcast message 16th November R* =The rate of formation of stars suitable for the development of intelligent life. fp = The fraction of those stars with planetary systems. ne = The number of planets, per solar system, with an environment suitable for life. fl = The fraction of suitable planets on which life actually appears. 1974 Drake Equation 1961 fi = The fraction of life bearing planets on which intelligent life emerges. fc = The fraction of civilizations that develop a technology that releases detectable signs of their existence into space. 1960 Frank D Drake Fermi paradox L = The length of time such civilizations release detectable signals into space. Figure 5 a bit of rewind and fast forward So we get to: ./<index>0« to » ︣ and apply this notational expression to grid computing algorithm. So if we ask Charles Babbage, who originally created a difference engine. Inflation theory Given andy = ανδψ Gaps in resolution, as a natural function have no specific fixing, only our own demarcation, and then lack of understanding in how to develop improvements in the resolution or to use the data gathered to set off on our journey of exploration in the opportunity of scale. F = ma Language and symbolic linking E = mC2 Partical physics description 01 Sandboxing and a cat in the box metaphor General relativity ?what is an alien CERN = :-) connected space-time Charles Babbage Difference Engine ASCII 1962.1693 128 unique 7 bit string Telnet and FTP 1971 Between 14 and 19 nodes Verses todays.#nodeCount @ proposed It was not until the late 1980's that it was adopted as a global standard 1972 Bell Labs start the C language Bob Kahan and Vint Cerf develop TCP 1973 1975 the NASA seperation March 1982. US military adopt TCP/IP as standard. suit configuration The requirement for DNS. port referencing SMTP So what I understand is the Internet, comprises: Internet protocol suite This is a set of communications protocols used for the Internet and similar networks; the most common stack of which is TCP/IP. It provides: end to end connectivity. So we have: Figure 6 point to point It is used in specifying how data should be formatted together with addressing: transmitted, rooted and received at the destination. It is abstracted into four layers: 1 • link • for local network 2 • Internet • (IP)connectes local networks 3 • transport • host to host comunication 4 • application • provides for data services communication This leads us to the OSI model: 1. 2. 3. 4. 5. 6. 7. Application Presentation Session Transport Network Data link Physical The addition of the physical layer. IBM The analysis of huge datasets together with the ability to run scenario analysis at unprecedented rates, growing both their range; increasing granularity, resolution in the focus in scope increasing their depth exponentially growing rate. (𝑥 𝑥 ) That detailed results require today. Grid components Mainframes UNIX servers Intel servers Databases Storage systems Desktop PCs Workstations laptops Tablets Phones Fundamentally this list is extensible into any computing device with network access. Very large application All resources become applied and the system runs at full capacity, appearing slow and unresponsive. Figure 7 unused processor cycles non-grid Grid Some are: Data Storage Processing Huge dataset grid processing scheduler storage data Figure 8 Others are hybrid. This provides the opportunity for the creation of grid middleware. Scheduler Rules and priorities set Figure 9 grid computing Basics Most of the time computers have a lot of available resources. Grid software. Note: the computational resources do not need to share the same physical location. scheduler Makes a grid Without it, it is just a bunch of computers or cloud. Advantages Lots of “little” computers used in simultaneous arrays turn into “super” computers. Grid is different from cloud. Virtualisation A grid definition: co-ordinated resource sharing for problem domain solving in dynamic, mutiinstitutional virtual organisations. Cluster computing We just want to solve a problem. Grid characteristics Distributed system Site autonomy Systems management Security Key problems Security Resource management Data management Information services Pool of computational resources and a “seeker” or user, wanting to solve a problem. grid & cluster Used for data mining, in addition to science projects and research A replacement for super computers Data nodes Processing nodes scheduler grid fabric Core middleware User level middleware sequential Requires the introduction of parallelism Grid level application, including protocols For the creation of parallelism in applications grid resource broker (scheduler) grid Seeker User Create application for problem description grid market processing units memory storage network access Director of grid resources Time and the application of unused resources. CERN Model CERN model Data storage transfer processing HAL hardware abstraction layer software for Single set of credentials CERN account holder Access to global distributed system through integrated suite Figure 10 CERN representation CERN is made up of multiple grids, the facility in Geneva, Switzerland is currently configured to provide about 20% of grid functions for the analysis of LHC data, the remainder is provided by: universities laboratories organisational contributors eScience cosmology chemistry biology life sciences social sciences and humanities EGI petabytes of data *instruments within the infrastructure It’s working now! The model basis is: national infrastructure supported by regional collaboration. The ability to get resources for self Cloud Public computing The grid itself comprises of: 300,000 cores hundreds of petabytes of storage running a job rate of about 250,000 Scientific computing Particle physicist created grid computing to analyse Cerner LHC data LHC Principal detectors: ATLAS ALICE CMS LHC(b) node partners are in excess of 150 600 million collisions per second 1 petabyte per second 25 petabytes per year Astrophysics Life sciences Stored on hard disk drive and magnetic tape Cons Although the system is up and running there are a few limiting elements, these comprise of: need fast interconnection between computational resources tweaking licensing administrative domains politics of sharing Security An attack is equal to an assault on system deliberately avoiding security systems. Grid security issues Security in the computational science is principally information security. Computer security also includes the fields of contingency planning and disaster recovery. So from the ground up we may start with a design plan, fortunately for us, there is a recognised structural template in place, and it includes the following techniques: the principle of least privilege automated theorem proving code reviews and unit testing defence in depth failsafe and full-back positioning audit trails window of vulnerability minimisation, through full disclosure This now implies that within our information technology architecture we now have a security layer the artefacts of which describe management of the systems quality attributes. Quality attributes confidentiality integrity availability accountability insurance services hardware mechanisms operating Systems coding Infrastructure Architecture Information Security authorisation services Management Credentials trust monitoring Figure 11 grid security issues Denial of service attack A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Attacks ICMP Flood (S)SYN flood Teardrop low rate denial of service peer-to-peer asymmetry of resource utilisation in starvation permanent denial of service application level floods nuke HTTP post denial of service RUDY slow read distributed reflective or spoofed telephony denial of service unintentional denial of service denial of service level II Defence firewalls switches routers application front end hardware IPS-based prevention DDS-based defence blackholing and sinkholing clean pipes Defensive systems DoS Attack prevention Detection and recovery Attack source Firewall Microfirewall antivirus Access control packet filtering System Security management Anomaly-based IDS Protocol security mechanism Proxy server Figure 12 Example of a defensive system for denial of service attack Signature-based IDS deterministic packet markers problematic packet marking Smurf attack smurf Attack TO 1.1.1.2 TO 9.9.9.9 FROM 9.9.9.9 attacker FROM 1.1.1.2 TO 1.1.1.3 FROM 9.9.9.9 TO 1.1.1.255 TO 1.1.1.4 FROM 9.9.9.9 FROM 9.9.9.9 TO 1.1.1.5 FROM 9.9.9.9 TO 1.1.1.6 FROM 9.9.9.9 TO 9.9.9.9 FROM 1.1.1.3 TO 9.9.9.9 FROM 1.1.1.4 TO 9.9.9.9 FROM 1.1.1.5 TO 9.9.9.9 FROM 1.1.1.6 TO 1.1.1.7 FROM 9.9.9.9 TO 9.9.9.9 FROM 1.1.1.7 victim
© Copyright 2026 Paperzz