Cloud Computing Solutions. Группа авторов

Читать онлайн книгу.

Cloud Computing Solutions - Группа авторов


Скачать книгу
high-performance computing (HPC), compute farms, and networks of workstations (NOW).

       Enterprise Grids: Enterprise grids may be formed by combining multiple cluster grids. Multiple projects or departments can be enabled by enterprise grids to distribute computing and physical resources in a supportive way. Enterprise grids generally may have the resources from multiple domains situated in a similar region.

       Global Grids: Global grids are a group of enterprise grids, each having different agreed upon protocols and universal usage policies, but not necessarily a similar manner of execution. Computing and physical resources might be geographically distributed, and they are used for connecting different sites throughout the globe. Global grids give the intensity of appropriated resources to users anywhere on the planet.

Schematic illustration of scenario of global grid consisting of cluster and enterprise grid.

       1.3.3 Architecture of Grid Computing Environment

      This subsection describes the layered grid architecture used to distinguish prerequisites for general classes of parts. Parts inside each layer share regular qualities yet can expand upon the capacities and practices given by any lower layer.

Schematic illustration of layered grid architecture.

       1.3.3.1 Fabric: Interfaces to Local Control

       Computational resources: Techniques are fundamental for initializing projects and for observing and governing the implementation of the subsequent processes. Administration instruments which permit screening and taking over the physical and computational resources designated for processes are required, as are time components approved ahead of time. Inquiry capacities are attractive for deciding equipment and programming qualities and pertinent state data; for example, current load and queue state due to scheduler-managed artifacts.

       Storage resources: Methods are necessary for using and taking over files. Management methods that permit taking over the physical resources distributed and provisioned for information exchanges (network bandwidth, space, disk bandwidth, CPU) are very functional, and are an advanced reservation policy. For determining software and hardware characteristics, inquiry functions are required and an applicable load of data like bandwidth utilization and available storage is also needed for those reasons.

       Network resources: Management methods that confer the authority of the resources which are assigned to network transfers (e.g., reservation, prioritization) might be fruitful. Inquiry functions are required for resolving network features and load.

       Code repositories: This method for managing source and object coding is used by the specialized form of storage resource, e.g., a control system.

       Catalogs: They are a particular type of repository that store resources and require a method for executing catalog query and update operations, e.g., a relational database.

       1.3.3.2 Connectivity: Communicating Easily and Securely

      Connectivity layer has validation and approval protocols which are required for grid specific network exchanges and furthermore characterizes center correspondence strategies. Correspondence protocols are required for the trading of information between texture layer assets. Correspondence necessities incorporate routing, transport and naming. Confirmation protocols are required for correspondence administrations for giving secure instruments to approve the validation of clients and assets. Connectivity layer gives validation administrations which have the accompanying qualities:

       Single sign on: Clients must have the capacity to approve themselves (“sign on”) just once and after that they simply approach numerous grid assets depicted in texture layer.

       Delegation: The user should have the ability to run a program for its own benefit, with the goal of finding out whether the program is fit to get the grid resources which the verified user is entitled to.

       Integration with various local security solutions: All sites and resource suppliers ought to be incorporated with different nearby security arrangements. Grid security arrangements must have the capacity to consolidate with different nearby security arrangements and enable mapping to the local condition.

       User-based trust relationships: In the event that the user has the privilege to utilize the artifacts from unmistakable locales or resource suppliers, the user ought to have the capability of using destinations together without requiring connection with the overseers of suppliers.

       1.3.3.3 Resource: Sharing Single Resources

      The resource layer lies above the connectivity layer correspondence and verification conventions to recognize conventions for the inception, checking, secure negotiation, accounting, control and payment of distributed operations of singular resources. Resource layer executes these conventions in the texture layer for controlling neighborhood resources. Two key classes of resource layer conventions could be striking:

       Information protocol: These conventions are used in getting information of the structure and states of assets like the use governing policy, current load and its outline.

       Management protocols: These protocols are used in negotiating access to shared physical resources, specifying resource requirements and monitoring tasks to be executed. A protocol might hold up monitoring the current state of an operation and while executing controlling operations.

       1.3.3.4 Collective: Coordinating Multiple Resources


Скачать книгу