ТОП просматриваемых книг сайта:
Cloud Computing Solutions. Группа авторов
Читать онлайн.Название Cloud Computing Solutions
Год выпуска 0
isbn 9781119682028
Автор произведения Группа авторов
Жанр Базы данных
Издательство John Wiley & Sons Limited
Enterprise Grids: Enterprise grids may be formed by combining multiple cluster grids. Multiple projects or departments can be enabled by enterprise grids to distribute computing and physical resources in a supportive way. Enterprise grids generally may have the resources from multiple domains situated in a similar region.
Global Grids: Global grids are a group of enterprise grids, each having different agreed upon protocols and universal usage policies, but not necessarily a similar manner of execution. Computing and physical resources might be geographically distributed, and they are used for connecting different sites throughout the globe. Global grids give the intensity of appropriated resources to users anywhere on the planet.
Figure 1.5 deals with cluster grids, enterprise grids and global grids. Cluster grids consist of multiple systems denoted as Node 1...., with Node N interconnected via the network.
Figure 1.5: Scenario of global grid consisting of cluster and enterprise grid.
This kind of grid may contain servers, workstations, and data centers. All the components are acquired and used by a single department or administrative domain. When the need for resources increases, multiple cluster grids work together to make an enterprise grid. Multiple administrative domains may share the resources when they are in enterprise grids located in the same geographic location. Meanwhile, in contrast to enterprise grids, global grids are a compilation of enterprise grids. Each of them agree upon universal usage policies and protocols but it is not mandatory that executions will be the same. Users have the authority to use the distributed resources anywhere in the world.
1.3.3 Architecture of Grid Computing Environment
This subsection describes the layered grid architecture used to distinguish prerequisites for general classes of parts. Parts inside each layer share regular qualities yet can expand upon the capacities and practices given by any lower layer.
Figure 1.6 depicts the layered framework, namely the fabric layer (interfacing local control), connectivity layer (communicating layer), resource layer (sharing single resources), collective layer (coordinates several resources), and application and protocol layer [11-18]. Each of the layers is discussed below.
Figure 1.6: Schematic diagram of layered grid architecture.
1.3.3.1 Fabric: Interfaces to Local Control
Fabric interface and local control provide the physical resources that are distributed and are the intermediate layer of grid protocols such as storage systems, computable artifacts, network resources, catalogs and sensors. A “resource” is defined as a logical part, like a computer cluster, distributed file system, or distributed computing pool; particularly in some areas, a resource execution might include internal protocol. In any case, these are not the concern of the grid framework.
Computational resources: Techniques are fundamental for initializing projects and for observing and governing the implementation of the subsequent processes. Administration instruments which permit screening and taking over the physical and computational resources designated for processes are required, as are time components approved ahead of time. Inquiry capacities are attractive for deciding equipment and programming qualities and pertinent state data; for example, current load and queue state due to scheduler-managed artifacts.
Storage resources: Methods are necessary for using and taking over files. Management methods that permit taking over the physical resources distributed and provisioned for information exchanges (network bandwidth, space, disk bandwidth, CPU) are very functional, and are an advanced reservation policy. For determining software and hardware characteristics, inquiry functions are required and an applicable load of data like bandwidth utilization and available storage is also needed for those reasons.
Network resources: Management methods that confer the authority of the resources which are assigned to network transfers (e.g., reservation, prioritization) might be fruitful. Inquiry functions are required for resolving network features and load.
Code repositories: This method for managing source and object coding is used by the specialized form of storage resource, e.g., a control system.
Catalogs: They are a particular type of repository that store resources and require a method for executing catalog query and update operations, e.g., a relational database.
1.3.3.2 Connectivity: Communicating Easily and Securely
Connectivity layer has validation and approval protocols which are required for grid specific network exchanges and furthermore characterizes center correspondence strategies. Correspondence protocols are required for the trading of information between texture layer assets. Correspondence necessities incorporate routing, transport and naming. Confirmation protocols are required for correspondence administrations for giving secure instruments to approve the validation of clients and assets. Connectivity layer gives validation administrations which have the accompanying qualities:
Single sign on: Clients must have the capacity to approve themselves (“sign on”) just once and after that they simply approach numerous grid assets depicted in texture layer.
Delegation: The user should have the ability to run a program for its own benefit, with the goal of finding out whether the program is fit to get the grid resources which the verified user is entitled to.
Integration with various local security solutions: All sites and resource suppliers ought to be incorporated with different nearby security arrangements. Grid security arrangements must have the capacity to consolidate with different nearby security arrangements and enable mapping to the local condition.
User-based trust relationships: In the event that the user has the privilege to utilize the artifacts from unmistakable locales or resource suppliers, the user ought to have the capability of using destinations together without requiring connection with the overseers of suppliers.
1.3.3.3 Resource: Sharing Single Resources
The resource layer lies above the connectivity layer correspondence and verification conventions to recognize conventions for the inception, checking, secure negotiation, accounting, control and payment of distributed operations of singular resources. Resource layer executes these conventions in the texture layer for controlling neighborhood resources. Two key classes of resource layer conventions could be striking:
Information protocol: These conventions are used in getting information of the structure and states of assets like the use governing policy, current load and its outline.
Management protocols: These protocols are used in negotiating access to shared physical resources, specifying resource requirements and monitoring tasks to be executed. A protocol might hold up monitoring the current state of an operation and while executing controlling operations.
1.3.3.4 Collective: Coordinating Multiple Resources