首页 > 最新文献

The 6th IEEE/ACM International Workshop on Grid Computing, 2005.最新文献

英文 中文
Web-enabled grid authentication in a non-Kerberos environment 在非kerberos环境中启用web的网格身份验证
Pub Date : 2005-11-13 DOI: 10.1109/GRID.2005.1542763
John-Paul Robinson, J. Gemmill, Pravin Joshi, P. Bangalore, Yiyi Chen, Silbia Peechakara, Song Zhou, Prahalad Achutharao
UABgrid is a collaboration between academic and administrative IT units at the University of Alabama at Birmingham (UAB). UABgrid provides a Web-based grid client environment, access to shared campus computational resources, and user identities defined by the authoritative campus identity provider. A Weblogin service leveraging UAB's authoritative identity directory is provided for grid authentication. Previous integrations of institutional identity management and grid authentication depended on a Kerberos environment and use of KX.509. We accomplish similar functionality in a non-Kerberos environment by leveraging our Weblogin service to drive applications which require grid credentials. The UABgrid registration process employs the Weblogin service to generate certificates and keys signed by our UABgridCA and automatically provisions accounts for UABgrid users based on resource center policies. After successful registration, UABgrid leverages the Weblogin service to allow users to access resources and to submit jobs using only a Web browser and their familiar username and password.
UABgrid是阿拉巴马大学伯明翰分校(UAB)学术和行政IT部门之间的合作项目。UABgrid提供基于web的网格客户端环境,访问共享的校园计算资源,以及由权威校园身份提供者定义的用户身份。利用UAB的权威身份目录的Weblogin服务用于网格身份验证。以前机构身份管理和网格身份验证的集成依赖于Kerberos环境和KX.509的使用。通过利用Weblogin服务驱动需要网格凭据的应用程序,我们在非kerberos环境中实现了类似的功能。UABgrid注册过程使用Weblogin服务生成由UABgridCA签名的证书和密钥,并根据资源中心策略自动为UABgrid用户提供帐户。注册成功后,UABgrid利用Weblogin服务允许用户仅使用Web浏览器和他们熟悉的用户名和密码访问资源并提交作业。
{"title":"Web-enabled grid authentication in a non-Kerberos environment","authors":"John-Paul Robinson, J. Gemmill, Pravin Joshi, P. Bangalore, Yiyi Chen, Silbia Peechakara, Song Zhou, Prahalad Achutharao","doi":"10.1109/GRID.2005.1542763","DOIUrl":"https://doi.org/10.1109/GRID.2005.1542763","url":null,"abstract":"UABgrid is a collaboration between academic and administrative IT units at the University of Alabama at Birmingham (UAB). UABgrid provides a Web-based grid client environment, access to shared campus computational resources, and user identities defined by the authoritative campus identity provider. A Weblogin service leveraging UAB's authoritative identity directory is provided for grid authentication. Previous integrations of institutional identity management and grid authentication depended on a Kerberos environment and use of KX.509. We accomplish similar functionality in a non-Kerberos environment by leveraging our Weblogin service to drive applications which require grid credentials. The UABgrid registration process employs the Weblogin service to generate certificates and keys signed by our UABgridCA and automatically provisions accounts for UABgrid users based on resource center policies. After successful registration, UABgrid leverages the Weblogin service to allow users to access resources and to submit jobs using only a Web browser and their familiar username and password.","PeriodicalId":347929,"journal":{"name":"The 6th IEEE/ACM International Workshop on Grid Computing, 2005.","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124403642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Adaptive trust negotiation and access control for grids 网格自适应信任协商与访问控制
Pub Date : 2005-11-13 DOI: 10.1109/GRID.2005.1542724
T. Ryutov, Li Zhou, B. C. Neuman, N. Foukia, Travis Leithead, K. Seamons
Access control in computational grids is typically provided by a combination of identity certificates and local accounts. This approach does not scale as the number of users and resources increase. Moreover, identity-based access control is not sufficient because users and resources may reside in different security domains and may not have pre-existing knowledge about one another. Trust negotiation is well-suited for grid computing because it allows participants to establish mutual trust based on attributes other than identity. The adaptive trust negotiation and access control (ATNAC) framework addresses the problem of access control in open systems by protecting itself from adversaries who may want to misuse, exhaust or deny service to resources. ATNAC is based on the GAA-API, which provides adaptive access control capturing dynamically changing system security requirements. The GAA-API utilizes TrustBuilder to establish a sufficient level of trust between the negotiating participants, based on the sensitivity of the access request and a suspicion level associated with the requester. A federated security context allows Grid participants to communicate their security appraisal and make judgments based on collective wisdom and the level of trust among them. We plan to apply ATNAC techniques to negotiation agreements in virtual organizations and P2P environments.
计算网格中的访问控制通常由身份证书和本地帐户的组合提供。这种方法不能随着用户和资源数量的增加而扩展。此外,基于身份的访问控制是不够的,因为用户和资源可能位于不同的安全域中,并且可能没有关于彼此的预先存在的知识。信任协商非常适合网格计算,因为它允许参与者基于身份以外的属性建立相互信任。自适应信任协商和访问控制(ATNAC)框架解决了开放系统中的访问控制问题,保护自己免受可能想要滥用、耗尽或拒绝为资源提供服务的对手的攻击。ATNAC基于GAA-API,提供自适应访问控制,捕获动态变化的系统安全需求。GAA-API基于访问请求的敏感性和与请求者相关的怀疑级别,利用TrustBuilder在协商参与者之间建立足够的信任级别。联合安全上下文允许网格参与者交流他们的安全评估,并根据集体智慧和他们之间的信任水平做出判断。我们计划将ATNAC技术应用于虚拟组织和P2P环境中的协商协议。
{"title":"Adaptive trust negotiation and access control for grids","authors":"T. Ryutov, Li Zhou, B. C. Neuman, N. Foukia, Travis Leithead, K. Seamons","doi":"10.1109/GRID.2005.1542724","DOIUrl":"https://doi.org/10.1109/GRID.2005.1542724","url":null,"abstract":"Access control in computational grids is typically provided by a combination of identity certificates and local accounts. This approach does not scale as the number of users and resources increase. Moreover, identity-based access control is not sufficient because users and resources may reside in different security domains and may not have pre-existing knowledge about one another. Trust negotiation is well-suited for grid computing because it allows participants to establish mutual trust based on attributes other than identity. The adaptive trust negotiation and access control (ATNAC) framework addresses the problem of access control in open systems by protecting itself from adversaries who may want to misuse, exhaust or deny service to resources. ATNAC is based on the GAA-API, which provides adaptive access control capturing dynamically changing system security requirements. The GAA-API utilizes TrustBuilder to establish a sufficient level of trust between the negotiating participants, based on the sensitivity of the access request and a suspicion level associated with the requester. A federated security context allows Grid participants to communicate their security appraisal and make judgments based on collective wisdom and the level of trust among them. We plan to apply ATNAC techniques to negotiation agreements in virtual organizations and P2P environments.","PeriodicalId":347929,"journal":{"name":"The 6th IEEE/ACM International Workshop on Grid Computing, 2005.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129709465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Legacy code support for production grids 对生产网格的遗留代码支持
Pub Date : 2005-11-13 DOI: 10.1109/GRID.2005.1542754
T. Kiss, G. Terstyánszky, G. Kecskeméti, S. Illes, T. Delaittre, S. Winter, P. Kacsuk, G. Sipos
In order to improve reliability and to deal with the high complexity of existing middleware solutions, today's production grid systems restrict the services to be deployed on their resources. On the other hand end-users require a wide range of value added services to fully utilize these resources. This paper describes a solution how legacy code support is offered as third party service for production grids. The introduced solution, based on the grid execution management for legacy code architecture (GEMLCA), do not require the deployment of additional applications on the grid resources, or any extra effort from grid system administrators. The implemented solution was successfully connected to and demonstrated on the UK National Grid Service.
为了提高可靠性并处理现有中间件解决方案的高度复杂性,今天的生产网格系统限制了服务只能部署在其资源上。另一方面,终端用户需要广泛的增值服务,以充分利用这些资源。本文描述了一种解决方案,如何将遗留代码支持作为第三方服务提供给生产网格。所介绍的解决方案基于遗留代码体系结构的网格执行管理(GEMLCA),不需要在网格资源上部署额外的应用程序,也不需要网格系统管理员进行任何额外的工作。实现的解决方案已成功连接到英国国家电网服务并在其上进行了演示。
{"title":"Legacy code support for production grids","authors":"T. Kiss, G. Terstyánszky, G. Kecskeméti, S. Illes, T. Delaittre, S. Winter, P. Kacsuk, G. Sipos","doi":"10.1109/GRID.2005.1542754","DOIUrl":"https://doi.org/10.1109/GRID.2005.1542754","url":null,"abstract":"In order to improve reliability and to deal with the high complexity of existing middleware solutions, today's production grid systems restrict the services to be deployed on their resources. On the other hand end-users require a wide range of value added services to fully utilize these resources. This paper describes a solution how legacy code support is offered as third party service for production grids. The introduced solution, based on the grid execution management for legacy code architecture (GEMLCA), do not require the deployment of additional applications on the grid resources, or any extra effort from grid system administrators. The implemented solution was successfully connected to and demonstrated on the UK National Grid Service.","PeriodicalId":347929,"journal":{"name":"The 6th IEEE/ACM International Workshop on Grid Computing, 2005.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122111013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
HIPernet: a decentralized security infrastructure for large scale grid environments HIPernet:用于大规模网格环境的分散安全基础设施
Pub Date : 2005-11-13 DOI: 10.1109/GRID.2005.1542735
J. Laganier, P. Primet
Security in grid environments appeals for fundamental primitives like the secure establishment of dynamic and isolated virtual trust domains. The security mechanisms currently used are generally based on a public key infrastructure global to the grid environment, and a mix of global and local access control policies used to make an authorization decision. Such approaches do not scale well with the number of participating domains and entities. In this paper, we propose a decentralized approach for securing grid environments that better cope with their inherently distributed nature. The combination of network and operating system visualization (supernets) with the host identity protocol (HIP) and simple public key infrastructure (SPKI) delegation/authorization certificates allows to create virtual trust domains onto multiple shared computer nodes connected by an untrusted network. We analyze how this approach adapts the vast diversity of trust relationships in the real world and has a better scalability with respect to the number of entities involved.
网格环境中的安全性需要基本的原语,例如安全建立动态和隔离的虚拟信任域。当前使用的安全机制通常基于对网格环境全局的公钥基础设施,以及用于做出授权决策的全局和本地访问控制策略的混合。这种方法不能很好地扩展参与域和实体的数量。在本文中,我们提出了一种分散的方法来保护网格环境,以更好地应对其固有的分布式特性。网络和操作系统可视化(超级网络)与主机身份协议(HIP)和简单公钥基础设施(SPKI)授权/授权证书的组合允许在由不受信任的网络连接的多个共享计算机节点上创建虚拟信任域。我们分析了这种方法如何适应现实世界中各种各样的信任关系,并且在涉及的实体数量方面具有更好的可扩展性。
{"title":"HIPernet: a decentralized security infrastructure for large scale grid environments","authors":"J. Laganier, P. Primet","doi":"10.1109/GRID.2005.1542735","DOIUrl":"https://doi.org/10.1109/GRID.2005.1542735","url":null,"abstract":"Security in grid environments appeals for fundamental primitives like the secure establishment of dynamic and isolated virtual trust domains. The security mechanisms currently used are generally based on a public key infrastructure global to the grid environment, and a mix of global and local access control policies used to make an authorization decision. Such approaches do not scale well with the number of participating domains and entities. In this paper, we propose a decentralized approach for securing grid environments that better cope with their inherently distributed nature. The combination of network and operating system visualization (supernets) with the host identity protocol (HIP) and simple public key infrastructure (SPKI) delegation/authorization certificates allows to create virtual trust domains onto multiple shared computer nodes connected by an untrusted network. We analyze how this approach adapts the vast diversity of trust relationships in the real world and has a better scalability with respect to the number of entities involved.","PeriodicalId":347929,"journal":{"name":"The 6th IEEE/ACM International Workshop on Grid Computing, 2005.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132488244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A language-driven tool for fault injection in distributed systems 分布式系统中故障注入的语言驱动工具
Pub Date : 2005-11-13 DOI: 10.1109/GRID.2005.1542742
William Hoarau, S. Tixeuil
In a network consisting of several thousands computers, the occurrence of faults is unavoidable. Being able to test the behavior of a distributed program in an environment where we can control the faults (such as the crash of a process) is an important feature that matters in the deployment of reliable programs. In this paper, we present FAIL (for FAult Injection Language), a language that permits to elaborate complex fault scenarios in a simple way, while relieving the user from writing low level code. Besides, it is possible to construct probabilistic scenarios (for average quantitative tests) or deterministic and reproducible scenarios (for studying the application's behavior in particular cases). We also present FCI, the FAIL cluster implementation, that consists of a compiler, a runtime library and a middleware platform for software fault injection in distributed applications. FCI is able to interface with numerous programming languages without requiring the modification of their source code, and the preliminary tests that we conducted show that its effective impact at runtime is low.
在一个由几千台计算机组成的网络中,故障的发生是不可避免的。能够在我们可以控制故障(例如进程崩溃)的环境中测试分布式程序的行为是部署可靠程序的重要特性。在本文中,我们提出了FAIL(故障注入语言),一种允许以简单的方式阐述复杂故障场景的语言,同时将用户从编写低级代码中解脱出来。此外,还可以构建概率场景(用于平均定量测试)或确定性和可重复的场景(用于研究特定情况下应用程序的行为)。我们还介绍了FCI, FAIL集群实现,它由编译器、运行时库和中间件平台组成,用于分布式应用程序中的软件故障注入。FCI能够与许多编程语言进行交互,而不需要修改它们的源代码,我们进行的初步测试表明,它在运行时的有效影响很低。
{"title":"A language-driven tool for fault injection in distributed systems","authors":"William Hoarau, S. Tixeuil","doi":"10.1109/GRID.2005.1542742","DOIUrl":"https://doi.org/10.1109/GRID.2005.1542742","url":null,"abstract":"In a network consisting of several thousands computers, the occurrence of faults is unavoidable. Being able to test the behavior of a distributed program in an environment where we can control the faults (such as the crash of a process) is an important feature that matters in the deployment of reliable programs. In this paper, we present FAIL (for FAult Injection Language), a language that permits to elaborate complex fault scenarios in a simple way, while relieving the user from writing low level code. Besides, it is possible to construct probabilistic scenarios (for average quantitative tests) or deterministic and reproducible scenarios (for studying the application's behavior in particular cases). We also present FCI, the FAIL cluster implementation, that consists of a compiler, a runtime library and a middleware platform for software fault injection in distributed applications. FCI is able to interface with numerous programming languages without requiring the modification of their source code, and the preliminary tests that we conducted show that its effective impact at runtime is low.","PeriodicalId":347929,"journal":{"name":"The 6th IEEE/ACM International Workshop on Grid Computing, 2005.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121231316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Web services and grid security vulnerabilities and threats analysis and model Web服务和网格安全漏洞和威胁分析和建模
Pub Date : 2005-11-13 DOI: 10.1109/GRID.2005.1542751
Y. Demchenko, L. Gommans, C. D. Laat, B. V. Oudenaarde
The paper provides an overview of available Web services security vulnerability models and proposes a classification of the potential grid and Web services attacks and vulnerabilities. This is further used to introduce a security model for interacting grid and Web services that illustrates how basic security services should interact to provide an attack-resilient multilayer protection in a typical service-oriented architecture. The analysis and the model can be used as a basis for developing countermeasures against known vulnerabilities and security services design recommendations. The paper refers to the ongoing work on middleware and operational security in the framework of the European grid infrastructure deployment project EGEE and related coordination groups.
本文概述了现有的Web服务安全漏洞模型,并对潜在的网格和Web服务攻击和漏洞进行了分类。这进一步用于引入用于交互网格和Web服务的安全模型,该模型说明了基本安全服务应该如何交互,以在典型的面向服务的体系结构中提供抗攻击的多层保护。分析和模型可以用作开发针对已知漏洞的对策和安全服务设计建议的基础。本文参考了欧洲电网基础设施部署项目EGEE框架下正在进行的中间件和运行安全工作以及相关协调小组。
{"title":"Web services and grid security vulnerabilities and threats analysis and model","authors":"Y. Demchenko, L. Gommans, C. D. Laat, B. V. Oudenaarde","doi":"10.1109/GRID.2005.1542751","DOIUrl":"https://doi.org/10.1109/GRID.2005.1542751","url":null,"abstract":"The paper provides an overview of available Web services security vulnerability models and proposes a classification of the potential grid and Web services attacks and vulnerabilities. This is further used to introduce a security model for interacting grid and Web services that illustrates how basic security services should interact to provide an attack-resilient multilayer protection in a typical service-oriented architecture. The analysis and the model can be used as a basis for developing countermeasures against known vulnerabilities and security services design recommendations. The paper refers to the ongoing work on middleware and operational security in the framework of the European grid infrastructure deployment project EGEE and related coordination groups.","PeriodicalId":347929,"journal":{"name":"The 6th IEEE/ACM International Workshop on Grid Computing, 2005.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114818359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
A credential renewal service for long-running jobs 用于长时间运行的作业的凭据续订服务
Pub Date : 2005-11-13 DOI: 10.1109/GRID.2005.1542725
D. Kouril, J. Basney
Jobs on the Grid require security credentials throughout their run for accessing secure Grid resources, such as GridFTP data repositories. However, delegating long-lived credentials to long-running jobs brings an increased risk that a credential will be compromised and misused. Additionally, it is often difficult to predict the run-time of jobs on the Grid, due to changes in application performance and resource load, making it difficult to set the lifetime of the delegated credential in advance. We have developed a solution to this problem for the EU DataGrid project using the MyProxy online credential repository and have further evolved it during the EGEE project. Users store their long-lived credentials in a dedicated MyProxy server and delegate short-lived credentials to their jobs. When a job's credential nears expiration, the workload management system retrieves a new short-lived credential from the MyProxy server on the user's behalf and uses it to refresh the job's credential. The MyProxy server's policy specifies which services may obtain credentials on the user's behalf, and all operations are logged at the MyProxy server, where access to credentials may be restricted if a compromise is detected or suspected. This system has been used for credential renewal in Grids in Europe for over three years. In this paper, we present the system design, describe our experiences, and discuss the security implications of this approach.
网格上的作业在整个运行过程中都需要安全凭证来访问安全的网格资源,比如GridFTP数据存储库。但是,将长时间的凭据委托给长时间运行的作业会增加凭据被泄露和滥用的风险。此外,由于应用程序性能和资源负载的变化,通常很难预测网格上作业的运行时,因此很难预先设置委托凭据的生命周期。我们已经为EU DataGrid项目开发了一个使用MyProxy在线凭证存储库的解决方案,并在EGEE项目中进一步改进了它。用户将长期有效的凭据存储在专用的MyProxy服务器中,并将短期有效的凭据委托给他们的作业。当作业的凭据接近到期时,工作负载管理系统代表用户从MyProxy服务器检索一个新的短期凭据,并用它来刷新作业的凭据。MyProxy服务器的策略指定哪些服务可以代表用户获取凭据,并且所有操作都记录在MyProxy服务器上,如果检测到或怀疑存在泄漏,则可以限制对凭据的访问。该系统已用于欧洲电网的证书更新超过三年。在本文中,我们介绍了系统设计,描述了我们的经验,并讨论了这种方法的安全含义。
{"title":"A credential renewal service for long-running jobs","authors":"D. Kouril, J. Basney","doi":"10.1109/GRID.2005.1542725","DOIUrl":"https://doi.org/10.1109/GRID.2005.1542725","url":null,"abstract":"Jobs on the Grid require security credentials throughout their run for accessing secure Grid resources, such as GridFTP data repositories. However, delegating long-lived credentials to long-running jobs brings an increased risk that a credential will be compromised and misused. Additionally, it is often difficult to predict the run-time of jobs on the Grid, due to changes in application performance and resource load, making it difficult to set the lifetime of the delegated credential in advance. We have developed a solution to this problem for the EU DataGrid project using the MyProxy online credential repository and have further evolved it during the EGEE project. Users store their long-lived credentials in a dedicated MyProxy server and delegate short-lived credentials to their jobs. When a job's credential nears expiration, the workload management system retrieves a new short-lived credential from the MyProxy server on the user's behalf and uses it to refresh the job's credential. The MyProxy server's policy specifies which services may obtain credentials on the user's behalf, and all operations are logged at the MyProxy server, where access to credentials may be restricted if a compromise is detected or suspected. This system has been used for credential renewal in Grids in Europe for over three years. In this paper, we present the system design, describe our experiences, and discuss the security implications of this approach.","PeriodicalId":347929,"journal":{"name":"The 6th IEEE/ACM International Workshop on Grid Computing, 2005.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130838864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Auto-adaptive distributed hash tables 自适应分布式哈希表
Pub Date : 2005-11-13 DOI: 10.1109/GRID.2005.1542752
A. Dury
In this paper we propose a new distributed hash table model called auto-adaptive distributed hash table (AA-DHT). This model uses a distributed profiling of the nodes of the DHT to dynamically adapt the size of the index tables in order to reduce both the message cost and the request latency. This work is an evolution of the architecture for a P2P computing model described by Dury (2004), We detail the auto-adaptive model, the protocols we implemented and tested and we give experimental results of the architecture in simulated networks of up to 640 nodes.
本文提出了一种新的分布式哈希表模型,称为自适应分布式哈希表(AA-DHT)。该模型使用DHT节点的分布式概要来动态调整索引表的大小,以减少消息成本和请求延迟。这项工作是Dury(2004)所描述的P2P计算模型架构的演变,我们详细介绍了自适应模型、我们实现和测试的协议,并给出了该架构在多达640个节点的模拟网络中的实验结果。
{"title":"Auto-adaptive distributed hash tables","authors":"A. Dury","doi":"10.1109/GRID.2005.1542752","DOIUrl":"https://doi.org/10.1109/GRID.2005.1542752","url":null,"abstract":"In this paper we propose a new distributed hash table model called auto-adaptive distributed hash table (AA-DHT). This model uses a distributed profiling of the nodes of the DHT to dynamically adapt the size of the index tables in order to reduce both the message cost and the request latency. This work is an evolution of the architecture for a P2P computing model described by Dury (2004), We detail the auto-adaptive model, the protocols we implemented and tested and we give experimental results of the architecture in simulated networks of up to 640 nodes.","PeriodicalId":347929,"journal":{"name":"The 6th IEEE/ACM International Workshop on Grid Computing, 2005.","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116150847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Grid'5000: a large scale and highly reconfigurable grid experimental testbed Grid’5000:一个大规模和高度可重构的网格实验试验台
Pub Date : 2005-11-13 DOI: 10.1109/grid.2005.1542730
F. Cappello, E. Caron, M. Daydé, F. Desprez, Y. Jégou, P. Primet, E. Jeannot, S. Lanteri, J. Leduc, N. Melab, Guillaume Mornet, R. Namyst, Benjamin Quétier, Olivier Richard
Large scale distributed systems like Grids are difficult to study only from theoretical models and simulators. Most Grids deployed at large scale are production platforms that are inappropriate research tools because of their limited reconfiguration, control and monitoring capabilities. In this paper, we present Grid'5000, a 5000 CPUs nation-wide infrastructure for research in Grid computing. Grid'5000 is designed to provide a scientific tool for computer scientists similar to the large-scale instruments used by physicists, astronomers and biologists. We describe the motivations, design, architecture, configuration examples of Grid'5000 and performance results for the reconfiguration subsystem.
像网格这样的大规模分布式系统很难仅从理论模型和模拟器中进行研究。大多数大规模部署的网格都是生产平台,不适合作为研究工具,因为它们的重构、控制和监控能力有限。在本文中,我们提出了Grid’5000,一个用于网格计算研究的5000个cpu的全国性基础设施。Grid’5000旨在为计算机科学家提供一种类似于物理学家、天文学家和生物学家使用的大型仪器的科学工具。我们描述了Grid’5000的动机、设计、体系结构、配置示例以及重构子系统的性能结果。
{"title":"Grid'5000: a large scale and highly reconfigurable grid experimental testbed","authors":"F. Cappello, E. Caron, M. Daydé, F. Desprez, Y. Jégou, P. Primet, E. Jeannot, S. Lanteri, J. Leduc, N. Melab, Guillaume Mornet, R. Namyst, Benjamin Quétier, Olivier Richard","doi":"10.1109/grid.2005.1542730","DOIUrl":"https://doi.org/10.1109/grid.2005.1542730","url":null,"abstract":"Large scale distributed systems like Grids are difficult to study only from theoretical models and simulators. Most Grids deployed at large scale are production platforms that are inappropriate research tools because of their limited reconfiguration, control and monitoring capabilities. In this paper, we present Grid'5000, a 5000 CPUs nation-wide infrastructure for research in Grid computing. Grid'5000 is designed to provide a scientific tool for computer scientists similar to the large-scale instruments used by physicists, astronomers and biologists. We describe the motivations, design, architecture, configuration examples of Grid'5000 and performance results for the reconfiguration subsystem.","PeriodicalId":347929,"journal":{"name":"The 6th IEEE/ACM International Workshop on Grid Computing, 2005.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127453908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 280
Comparison of end-to-end bandwidth measurement tools on the 10GigE TeraGrid backbone 10GigE TeraGrid骨干网端到端带宽测量工具的比较
Pub Date : 2005-11-13 DOI: 10.1109/GRID.2005.1542759
M. Murray, Shava Smallen, Omid Khalili, D. M. Swany
Both network managers and grid application users need to maximize the bandwidth utilization of distributed applications in the face of complex interactions between network and system hardware and software along the end-to-end paths. Several software tools exist that attempt to measure end-to-end available bandwidth unobtrusively. Our poster presents results of the first study to compare these tools on a 10GigE network backbone. We use the Inca test harness deployed on the NSF TeraGrid to collect periodic measurements from a fully connected mesh of node pairs on end-to-end paths between eight TeraGrid sites. We compare bandwidth measurements from (1) network weather service (NWS); (2) pathchirp; and (3) pathload. Our poster analyzes collected data to determine tool accuracy and efficiency.
面对端到端路径上网络和系统软硬件之间的复杂交互,网络管理者和网格应用程序用户都需要最大限度地利用分布式应用程序的带宽。有几个软件工具试图不显眼地测量端到端可用带宽。我们的海报展示了在10GigE网络骨干网上比较这些工具的第一项研究的结果。我们使用部署在NSF TeraGrid上的印加测试工具,从8个TeraGrid站点之间端到端路径上的节点对的完全连接的网格中收集周期性测量数据。我们比较了来自(1)网络气象服务(NWS)的带宽测量;(2) pathchirp;(3)路径负载。我们的海报分析收集的数据,以确定工具的精度和效率。
{"title":"Comparison of end-to-end bandwidth measurement tools on the 10GigE TeraGrid backbone","authors":"M. Murray, Shava Smallen, Omid Khalili, D. M. Swany","doi":"10.1109/GRID.2005.1542759","DOIUrl":"https://doi.org/10.1109/GRID.2005.1542759","url":null,"abstract":"Both network managers and grid application users need to maximize the bandwidth utilization of distributed applications in the face of complex interactions between network and system hardware and software along the end-to-end paths. Several software tools exist that attempt to measure end-to-end available bandwidth unobtrusively. Our poster presents results of the first study to compare these tools on a 10GigE network backbone. We use the Inca test harness deployed on the NSF TeraGrid to collect periodic measurements from a fully connected mesh of node pairs on end-to-end paths between eight TeraGrid sites. We compare bandwidth measurements from (1) network weather service (NWS); (2) pathchirp; and (3) pathload. Our poster analyzes collected data to determine tool accuracy and efficiency.","PeriodicalId":347929,"journal":{"name":"The 6th IEEE/ACM International Workshop on Grid Computing, 2005.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126048356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
The 6th IEEE/ACM International Workshop on Grid Computing, 2005.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1