29.12.2014 Views

Recent Advances in Internet, Cluster, Grid, and Pervasive Computing

Recent Advances in Internet, Cluster, Grid, and Pervasive Computing

Recent Advances in Internet, Cluster, Grid, and Pervasive Computing

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Recent</strong> <strong>Advances</strong> <strong>in</strong><br />

<strong>Internet</strong>, <strong>Cluster</strong>, <strong>Grid</strong>,<br />

<strong>and</strong> <strong>Pervasive</strong> Comput<strong>in</strong>g<br />

Kai Hwang<br />

<strong>Internet</strong> <strong>and</strong> <strong>Pervasive</strong> Comput<strong>in</strong>g Laboratory<br />

University of Southern California<br />

Email: kaihwang@usc<br />

usc.edu<br />

Web site: http://ceng<br />

ceng.usc.edu/~<br />

/~kaihwang<br />

May 20, 2003 K. Hwang at USC 1


Information Technology:<br />

Today <strong>and</strong> the Future<br />

g What are hot <strong>in</strong> Year 2001 <br />

1.5 GHz microprocessors, 256 Mb RAM,<br />

Gigabit Ethernet, Unix/L<strong>in</strong>ux,W<strong>in</strong>dows NT,<br />

<strong>Cluster</strong>s, Java, <strong>Internet</strong>, digital TV, Smart<br />

Network Devices, <strong>Pervasive</strong> Comput<strong>in</strong>g, etc.<br />

g How about 3 years from now <br />

2-4 GHz microprocessors, 1-4 Gb RAM,<br />

flash memory (NVSM), 1 Tbps LAN, Satellitebased<br />

WWW, Petaflops Supercomputers,<br />

<strong>Cluster</strong> OS, <strong>Grid</strong> Metacomput<strong>in</strong>g, etc.<br />

May 20, 2003<br />

K. Hwang at USC<br />

2


….. a billion people <strong>in</strong>teract<strong>in</strong>g<br />

with a million E-Bus<strong>in</strong>esses<br />

E<br />

with a trillion <strong>in</strong>telligent<br />

devices <strong>in</strong>terconnected ..…<br />

Lou Gerstner,<br />

IBM Chairman <strong>and</strong> CEO<br />

Ma<strong>in</strong>frame Comput<strong>in</strong>g (50 -70’s)<br />

Personal Comput<strong>in</strong>g (80 - 90’s)<br />

<strong>Cluster</strong> Comput<strong>in</strong>g (90 - 00’s)<br />

<strong>Pervasive</strong> Comput<strong>in</strong>g (00 - )<br />

<strong>Grid</strong> Metacomput<strong>in</strong>g (10 - )<br />

May 20, 2003<br />

K. Hwang at USC<br />

3


Attributes<br />

Network<strong>in</strong>g<br />

Network-Based<br />

Comput<strong>in</strong>g Paradigms<br />

<strong>Cluster</strong><br />

Comput<strong>in</strong>g<br />

System Area<br />

Network<br />

<strong>Grid</strong><br />

Comput<strong>in</strong>g<br />

<strong>Internet</strong> or Wide<br />

Area Network<br />

<strong>Pervasive</strong><br />

comput<strong>in</strong>g<br />

Wireless LAN,<br />

IrDA<br />

Communication<br />

Protocols<br />

Mostly<br />

TCP/IP<br />

IP/ATM, DNS<br />

IP/HiPPi<br />

HiPPi,<br />

rout<strong>in</strong>g<br />

WAP: Wireless<br />

Application<br />

Protocol<br />

Operat<strong>in</strong>g<br />

system support<br />

Environment<br />

<strong>and</strong> tool sets<br />

Most UNIX<br />

<strong>and</strong> W<strong>in</strong>dows<br />

variants<br />

MPI, PVM,<br />

Score, Cod<strong>in</strong>e<br />

Most UNIX,<br />

W<strong>in</strong>dows<br />

variants<br />

GLOBUS, GSI,<br />

LEGION,<br />

CONDOR<br />

Pocket PC (CE),<br />

Palm OS, Inferno,<br />

Chorus OS<br />

JINI, UPnP,<br />

Bluetooth,<br />

May 20, 2003<br />

K. Hwang at USC<br />

4


Scalable clusters provid<strong>in</strong>g SSI<br />

services are gradually replac<strong>in</strong>g the<br />

SMP, cc-NUMA, <strong>and</strong> MPP <strong>in</strong> Servers,<br />

Web Sites, <strong>and</strong> Database Centers<br />

May 20, 2003<br />

K. Hwang at USC<br />

5


Issues <strong>in</strong> <strong>Cluster</strong> Design<br />

g Size Scalability (physical & application)<br />

g Enhanced Availability (failure management)<br />

g S<strong>in</strong>gle System Image (Middleware, OS extensions)<br />

g Fast Communication (networks & protocols)<br />

g Load Balanc<strong>in</strong>g (CPU, Net, Memory, Disk)<br />

g Security <strong>and</strong> Encryption (clusters <strong>and</strong> <strong>Grid</strong>s)<br />

g Distributed Environment (User friendly)<br />

g Manageability (Jobs <strong>and</strong> resources )<br />

g Programmability (simple API required)<br />

g Applicability (cluster- <strong>and</strong> grid-awareness)<br />

May 20, 2003<br />

K. Hwang at USC<br />

6


Trojans L<strong>in</strong>ux <strong>Cluster</strong><br />

with Middleware for Security<br />

<strong>and</strong> Checkpo<strong>in</strong>t Recovery<br />

Programm<strong>in</strong>g Environments<br />

(Java, EDI, HTML, XML)<br />

Web W<strong>in</strong>dows<br />

User Interface<br />

Other Subsystems<br />

(Database, OLTP, etc.)<br />

S<strong>in</strong>gle-System Image <strong>and</strong> Availability Infrastructure<br />

Security <strong>and</strong> Checkpo<strong>in</strong>t<strong>in</strong>g Middleware<br />

L<strong>in</strong>ux L<strong>in</strong>ux L<strong>in</strong>ux<br />

Pentium<br />

PC<br />

Pentium<br />

PC<br />

Pentium<br />

PC<br />

Gigabit Network Interconnect<br />

May 20, 2003<br />

K. Hwang at USC<br />

7


Scaled Workload leads to L<strong>in</strong>ear<br />

Speedup on The Trojan <strong>Cluster</strong><br />

May 20, 2003<br />

K. Hwang at USC<br />

8


Distributed RAID Embedded <strong>in</strong> a<br />

<strong>Cluster</strong> or <strong>in</strong> a Storage-Area Network:<br />

g I/O Bottleneck <strong>in</strong> <strong>Cluster</strong> Comput<strong>in</strong>g<br />

n CPU/Memory <strong>and</strong> disk-IO speed gap widens<br />

as µP P doubles <strong>in</strong> speed every year<br />

n <strong>Pervasive</strong> applications are often I/O-bound<br />

g Disks connected to hosts are often subject to<br />

failure by hosts themselves. Distributed RAID has<br />

much higher availability by fault isolation,<br />

rollback recovery, <strong>and</strong> automatic file migration.<br />

Source: K. Hwang, H. J<strong>in</strong>, <strong>and</strong> R. S. Ho, “Orthogonal Strip<strong>in</strong>g <strong>and</strong> Mirror<strong>in</strong>g<br />

<strong>in</strong> Distributed RAID for I/O-Centric <strong>Cluster</strong> Comput<strong>in</strong>g”, IEEE-Trans. on<br />

Parallel <strong>and</strong> Distributed Systems, accepted July 13, 2001. (<strong>in</strong> press)<br />

May 20, 2003<br />

K. Hwang at USC<br />

9


Distributed RAID-x x Architecture<br />

<strong>Cluster</strong> Network<br />

Node 0 Node 1 Node 2<br />

Node 3<br />

P/M<br />

P/M<br />

CDD<br />

P/M<br />

CDD<br />

P/M<br />

CDD<br />

CDD<br />

B0<br />

B12<br />

B24<br />

B25’<br />

B26’<br />

B27’<br />

D0 D1 D2 D3<br />

B1<br />

B13<br />

B25<br />

B14’<br />

B15’<br />

B24’<br />

B2<br />

B14<br />

B26<br />

B3’<br />

B12’<br />

B13’<br />

B3<br />

B15<br />

B27<br />

B0’<br />

B1’<br />

B2’<br />

D4 D5 D6<br />

D7<br />

B4<br />

B16<br />

B28<br />

B29’<br />

B30’<br />

B31’<br />

B5<br />

B17<br />

B29<br />

B18’<br />

B19’<br />

B28’<br />

B6<br />

B18<br />

B30<br />

B7’<br />

B16’<br />

B17’<br />

B7<br />

B19<br />

B31<br />

B4’<br />

B5’<br />

B6’<br />

B8<br />

B20<br />

B32<br />

B33’<br />

B34’<br />

B35’<br />

D8 D9 D10 D11<br />

B9<br />

B21<br />

B33<br />

B22’<br />

B23’<br />

B32’<br />

CCD: Cooperative Disk Drivers<br />

B10<br />

B22<br />

B34<br />

B11’<br />

B20’<br />

B21’<br />

B11<br />

B23<br />

B35<br />

B8’<br />

B9’<br />

B10’


User<br />

Level<br />

Remote Disk Access us<strong>in</strong>g a Central<br />

NFS vs. . us<strong>in</strong>g Cooperative Disk<br />

Drivers <strong>in</strong> a Distributed RAID<br />

User<br />

Application<br />

NFS Server<br />

User<br />

Level<br />

Kernel<br />

Level<br />

1<br />

NFS Client<br />

6<br />

5<br />

2<br />

3<br />

Traditional<br />

Device Driver<br />

4<br />

Kernel<br />

Level<br />

Client side<br />

Server side<br />

(a) Parallel disk I/O us<strong>in</strong>g the NFS <strong>in</strong> a server/client cluster.<br />

User<br />

Level<br />

Kernel<br />

Level<br />

1<br />

(b) Us<strong>in</strong>g CDDs to achieve a SIOS <strong>in</strong> a serverless cluster.<br />

May 20, 2003<br />

User<br />

Application<br />

CDD<br />

Client side<br />

6<br />

5<br />

2<br />

K. Hwang at USC<br />

NFS Server<br />

is bypassed<br />

CDD<br />

Server side<br />

4<br />

3<br />

User<br />

Level<br />

Kernel<br />

Level<br />

11


Parallel Write Performance of four<br />

Distributed RAIDs on USC L<strong>in</strong>ux <strong>Cluster</strong><br />

18<br />

Aggregate B<strong>and</strong>width (MB/s)<br />

16<br />

14<br />

12<br />

10<br />

8<br />

6<br />

4<br />

2<br />

0<br />

RAID-x<br />

Cha<strong>in</strong>ed Decluster<strong>in</strong>g<br />

RAID-10<br />

RAID-5<br />

2 4 8 12 16<br />

Disk Numbers<br />

May 20, 2003<br />

K. Hwang at USC<br />

12


with Adaptive Supersampl<strong>in</strong>g<br />

•<br />

Scene<br />

Description<br />

Parallel Polygon Render<strong>in</strong>g<br />

root<br />

PU 1<br />

PU 1<br />

PU 1 PU 1<br />

PU 2 PU 2 Data PU 2 PU 2<br />

redistribution<br />

PU n<br />

root<br />

Display<br />

Geometric<br />

database<br />

Decompose<br />

dataset by object<br />

Pre-process<strong>in</strong>g phase<br />

Simplify Model<br />

(Object-parallelism)<br />

Transformation<br />

phase<br />

Transform<br />

Model<br />

Rasterization phase<br />

Rasterize Model<br />

Render<strong>in</strong>g Loop<strong>in</strong>g<br />

Collect partial<br />

images<br />

(Image parallelism)<br />

3D objects 2D polygons pixels<br />

Display<br />

Source: S. W. L<strong>in</strong>, R. W. Lau, K. Hwang, X. L<strong>in</strong>, <strong>and</strong> P. Y. Cheung,<br />

“Adaptive Parallel Render<strong>in</strong>g on Multiprocessors <strong>and</strong> Workstation <strong>Cluster</strong>s “,<br />

IEEE Trans. on Parallel <strong>and</strong> Distributed Systems, Vol.11, No.3, March 2001.<br />

May 20, 2003<br />

K. Hwang at USC<br />

13


Speedup Performance of Two Parallel Renderer on the<br />

SGI SMP Server <strong>and</strong> Unix WS <strong>Cluster</strong> at HKU<br />

High-Performance Comput<strong>in</strong>g Research Lab.<br />

Speedup, S<br />

7<br />

6<br />

5<br />

4<br />

3<br />

2<br />

1<br />

0<br />

Our renderer onSMP<br />

Crow's renderer on SMP<br />

Our renderer on <strong>Cluster</strong><br />

Crow's renderer on <strong>Cluster</strong><br />

2 4 6 8 10 12<br />

Mach<strong>in</strong>e Size, n<br />

May 20, 2003<br />

K. Hwang at USC<br />

14


Secur<strong>in</strong>g <strong>Cluster</strong>s, LANs, Intranets,<br />

WANs, , <strong>Grid</strong>s, <strong>and</strong> <strong>Internet</strong> Resources<br />

with <strong>in</strong>trusion detection <strong>and</strong> automatic<br />

recovery from malicious attacks<br />

Fully<br />

secured<br />

Increas<strong>in</strong>g<br />

Security<br />

No<br />

protection<br />

Design Goals: A distributed network architecture<br />

with Dynamic Security <strong>and</strong> Privacy (DSP)<br />

support<strong>in</strong>g f<strong>in</strong>e-gra<strong>in</strong> resources access<br />

with automatic <strong>in</strong>trusion prevention,<br />

Intranets or WANs<br />

protected by gateway<br />

firewalls under a<br />

Server<br />

<strong>Cluster</strong>s<br />

or Web sites<br />

with no security<br />

protection<br />

static policy, fixed<br />

cryptography<br />

<strong>and</strong> limited<br />

scalability<br />

detection <strong>and</strong> responses, based on<br />

dynamic security policies,<br />

multicast protocols, <strong>and</strong><br />

adaptive cryptographic<br />

eng<strong>in</strong>es <strong>in</strong> a scalable<br />

network environment<br />

<strong>Cluster</strong>/LANs Intranet/WANs <strong>Grid</strong>/<strong>Internet</strong><br />

Increas<strong>in</strong>g scalability<br />

May 20, 2003<br />

K. Hwang at USC<br />

15


Security Threats<br />

<strong>in</strong> Mobile Agent-Based Systems<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Masquerad<strong>in</strong>g - Identity misuse<br />

Denial of Service - Resource occupation<br />

Unauthorized Access - Intrusions<br />

Repudiation - Dispute services provided<br />

Eavesdropp<strong>in</strong>g - Secrecy <strong>in</strong>terception<br />

Alteration - Data/code <strong>in</strong>tegrity<br />

Copy <strong>and</strong> Reply - Clone of agents<br />

May 20, 2003<br />

K. Hwang at USC<br />

16


Security Component<br />

Technologies<br />

Firewalls <strong>and</strong> Cryptography<br />

<br />

<br />

<br />

<br />

<br />

<strong>Cluster</strong> Middleware for Security<br />

Anti-virus <strong>and</strong> Immune Systems<br />

Intrusion Detection <strong>and</strong> Response<br />

Distributed Software RAIDs<br />

Security & Assurance Policies<br />

May 20, 2003<br />

K. Hwang at USC<br />

17


Distributed Micro-Firewalls<br />

Firewalls for Dynamic<br />

Security supported by IPCha<strong>in</strong>s, , Mobile Agents, RMI, or CORBA.<br />

M. Gangadharan <strong>and</strong> K. Hwang, “ Intranet Security with Micro Firewalls <strong>and</strong><br />

Mobile Agents for Proactive Intrusion Response”, IEEE International Conference<br />

on Computer Networks <strong>and</strong> Mobile Comput<strong>in</strong>g, Beij<strong>in</strong>g, Ch<strong>in</strong>a October 16-19, 2001.<br />

May 20, 2003<br />

K. Hwang at USC<br />

18


Adaptive Security Control<br />

Agents detect threats, learn from <strong>in</strong>trusion<br />

patterns, <strong>and</strong> update security safeguards<br />

Adaptive<br />

Security<br />

=<br />

Security<br />

Safeguards<br />

• Micro-Firewalls<br />

•Authentication<br />

•Access control<br />

•Cryptography<br />

Detect network <strong>and</strong><br />

threat conditions<br />

+ +<br />

Detect software<br />

vulnerabilities<br />

Adaptive Responses<br />

May 20, 2003<br />

K. Hwang at USC<br />

19


Distributed Firewall Architecture<br />

built <strong>in</strong> Trojans <strong>Cluster</strong> at USC<br />

Nodes with Micro-Firewall<br />

Policy Manager<br />

Gatewa y Fire wa ll<br />

Switch<br />

Network<br />

Router<br />

Router<br />

Demilitarized<br />

Zone<br />

<strong>Internet</strong><br />

Nodes with Micro-Firewall<br />

May 20, 2003<br />

K. Hwang at USC<br />

20


Implement<strong>in</strong>g Micro-Firewall<br />

<strong>in</strong> The L<strong>in</strong>ux Kernel<br />

User<br />

Programs<br />

User<br />

Programs<br />

User<br />

Programs<br />

User<br />

Programs<br />

User Space<br />

Kernel Space<br />

System call <strong>in</strong>terface<br />

Packet Filter<br />

Memory, file <strong>and</strong> Process<br />

Managers<br />

Micro-firewall<br />

TCP/IP Stack<br />

Anomaly<br />

Detection<br />

Access<br />

Logg<strong>in</strong>g<br />

Disk Drives<br />

Ma<strong>in</strong> Memory<br />

Network Cards<br />

Hardware<br />

K. Hwang <strong>and</strong> M. Gangadharan, “Micro-Firewalls for Dynamic Security with<br />

Distributed Intrusion Detection”, IEEE International Symposium of Network<br />

Comput<strong>in</strong>g <strong>and</strong> Applications, Cambridge, MA. Oct. 8-12, 2001<br />

May 20, 2003<br />

K. Hwang at USC<br />

21


Adaptive Crytographic Eng<strong>in</strong>e for IPSec<br />

A. D<strong>and</strong>alis <strong>and</strong> V. K. Pransanna, “ An Adaptive Cryptographic Eng<strong>in</strong>e<br />

for <strong>Internet</strong> Protocol Security Architectures”, submitted to IEEE Trans. on<br />

VLSI Systems, March 2001, USC High-Performance Comput<strong>in</strong>g Lab.<br />

ACE<br />

REQUEST<br />

Rijndael: NIST selection for AES St<strong>and</strong>ard<br />

State-of-the-art software-based implementation<br />

Algorithm A<br />

Configuration 1<br />

Configuration 2<br />

Configuration<br />

Controller<br />

Our FPGA-based implementation<br />

µsec<br />

Mbits/sec<br />

400<br />

…<br />

Algorithm B<br />

Configuration 1<br />

2<br />

300<br />

Configuration 2<br />

…<br />

…<br />

…<br />

…<br />

FPGA<br />

1<br />

200<br />

…<br />

Cryptographic<br />

Library<br />

100<br />

INPUT<br />

(Data, Key)<br />

OUTPUT<br />

(Data)<br />

0<br />

Key-Setup Latency<br />

Throughput<br />

0


Comparison of Agents, CORBA,<br />

<strong>and</strong> RMI for Security-Policy<br />

Update on Intranets or <strong>Cluster</strong>s<br />

Capabilities Mobile Agents CORBA Middleware RMI Middleware<br />

Central policy<br />

coord<strong>in</strong>ation<br />

Reaction time<br />

to policy<br />

change<br />

Hosts fortified<br />

with microfirewalls<br />

Security<br />

Mechanisms<br />

Update Process<br />

Term<strong>in</strong>ation<br />

Autonomous <strong>and</strong> require<br />

no coord<strong>in</strong>ation once<br />

dispatched<br />

The time <strong>in</strong>creases with<br />

the number of agents<br />

dispatched.<br />

Agents carry most<br />

mechanisms required to<br />

update security policy<br />

Use authentication <strong>and</strong><br />

encryption. Still prone to<br />

attacks from hosts/agents.<br />

Multiple agents used<br />

autonomously, Policy<br />

update always completes<br />

The policy manager<br />

coord<strong>in</strong>ates all<br />

communications<br />

Faster than agents or<br />

RMI to react to a<br />

policy change<br />

Requires the ORB<br />

middleware support on<br />

all hosts <strong>in</strong> the Intranet<br />

Security implemented<br />

with the CORBASec.<br />

Implemented at<br />

application level us<strong>in</strong>g<br />

RPC-like semantics<br />

The policy manager acts as<br />

the RMI registry to<br />

coord<strong>in</strong>ate among all nodes<br />

RMI slower than CORBA<br />

<strong>and</strong> faster than agent based<br />

system for policy update<br />

Requires JVM to be present<br />

on all the hosts.<br />

Security is the best among all<br />

three, implemented with the<br />

Java s<strong>and</strong>box model.<br />

Implemented at application<br />

level us<strong>in</strong>g RPC-like<br />

semantics<br />

May 20, 2003<br />

K. Hwang at USC<br />

23


Distributed Agent-Based<br />

Intrusion Detection System<br />

Def<strong>in</strong>ed<br />

Security Policy<br />

Decision Mak<strong>in</strong>g<br />

System<br />

Agent<br />

Controller<br />

Data-<br />

M<strong>in</strong><strong>in</strong>g<br />

Agents<br />

Intrusion<br />

Database<br />

Agent Security<br />

Infrastructure<br />

Agent PKI<br />

Agent Name Service<br />

Communication Agents<br />

May 20, 2003<br />

K. Hwang at USC<br />

24


Distributed Intrusion Detection<br />

<strong>and</strong> Response <strong>in</strong> a L<strong>in</strong>ux <strong>Cluster</strong><br />

3<br />

3<br />

May 20, 2003<br />

K. Hwang at USC<br />

25


<strong>Pervasive</strong> Comput<strong>in</strong>g<br />

<br />

<br />

<br />

<br />

Small <strong>in</strong>expensive computers <strong>and</strong> sensors <strong>in</strong> every<br />

device <strong>and</strong> appliance - h<strong>and</strong>held or portable <strong>in</strong> offices,<br />

homes, cars, stores, classrooms, <strong>and</strong> factories, etc.<br />

These smart devices are networked to each other <strong>and</strong><br />

the <strong>Internet</strong> (3 trillion devices). They can sense <strong>and</strong><br />

react <strong>in</strong>telligently to the environment changes.<br />

Information appliances, <strong>in</strong>tegration <strong>in</strong>to <strong>Internet</strong><br />

through phone l<strong>in</strong>es, cables, or wireless LANs<br />

(HomeRF, Bluetooth) ) us<strong>in</strong>g protocols J<strong>in</strong>i, , Inferno, etc.<br />

Neworked household, automobile, personal assistants,<br />

smart spaces (offices, classrooms, etc), <strong>and</strong> express<br />

delivery (BodyLAN(<br />

BodyLAN) ) services, etc.<br />

May 20, 2003<br />

K. Hwang at USC<br />

26


Information Appliances<br />

vs Personal Computers<br />

US Shipments, Consumer Devices, In Millions<br />

25<br />

20<br />

PCs<br />

IAs<br />

15<br />

10<br />

5<br />

0<br />

1997 1998 1999 2000 2001 2002<br />

Source: US/NIST Information Technology Lab.


Invest<strong>in</strong>g <strong>in</strong> Infrastructure Today for Tomorrow<br />

Active badges<br />

Smart<br />

phones<br />

13 million <strong>in</strong> 2006<br />

palm-size<br />

computers<br />

28 million <strong>in</strong> 2006<br />

Screen<br />

phones<br />

E-Commerce<br />

$300 billion <strong>in</strong> 2001<br />

Forget-Me-Not<br />

May 20, 2003<br />

K. Hwang at USC<br />

Source: NIST/IT Lab.<br />

28


The Rome Architecture for <strong>Pervasive</strong><br />

Job Schedul<strong>in</strong>g at Stanford University<br />

Scanner<br />

Web Form<br />

Frontend<br />

Frontend<br />

Frontend<br />

Semantic Translator<br />

Trigger Manager<br />

<strong>Internet</strong><br />

Unit<br />

Manager<br />

Auto PC<br />

Unit<br />

Manager<br />

PDA<br />

Unit<br />

Manager<br />

n n n


Comput<strong>in</strong>g <strong>and</strong> Information<br />

<strong>Grid</strong> for The Future <br />

A metacomput<strong>in</strong>g <strong>in</strong>frastructure that couples<br />

n computers, <strong>in</strong>formation appliances,<br />

(PCs, WSs, , servers, clusters,supers,<br />

laptops, notebooks, PDA, etc,)<br />

n mobile software (e.g., rent<strong>in</strong>g expensive<br />

applications on dem<strong>and</strong>),<br />

n distributed databases (e.g., transparent<br />

access to human genome database),<br />

n smart network devices (e.g., <strong>Internet</strong><br />

cars, express services, etc.),<br />

n <strong>and</strong> People ( You, me, <strong>and</strong> every one ).<br />

May 20, 2003<br />

K. Hwang at USC<br />

30


Basic Concept of <strong>Grid</strong> Comput<strong>in</strong>g<br />

(Courtesy of Foster <strong>and</strong> Kesselman, , 2000)<br />

May 20, 2003<br />

K. Hwang at USC<br />

31


<strong>Grid</strong> Application-Drivers<br />

<br />

<br />

New applications enabled by coupl<strong>in</strong>g<br />

computers, databases, people, etc.<br />

n (distributed) Supercomput<strong>in</strong>g<br />

n Collaborative eng<strong>in</strong>eer<strong>in</strong>g<br />

n Data-mim<strong>in</strong>g <strong>in</strong> E-commerceE<br />

Comput<strong>in</strong>g Power as an Utility Industry<br />

n Rent<strong>in</strong>g Software<br />

n Rent<strong>in</strong>g CPU Cycles<br />

n On-dem<strong>and</strong> comput<strong>in</strong>g<br />

May 20, 2003<br />

K. Hwang at USC<br />

32


Security Issues <strong>in</strong> Computational <strong>Grid</strong>s<br />

<br />

<strong>Grid</strong> components can <strong>in</strong>sulate themselves from<br />

security breaches elsewhere<br />

<br />

<br />

<br />

<br />

Only authorized pr<strong>in</strong>cipals are allowed to use the<br />

available resources<br />

Detection <strong>and</strong> Recovery from <strong>in</strong>trusions that occur<br />

from outsiders <strong>and</strong> compromised <strong>in</strong>siders.<br />

All communications among grid components<br />

should be immune to tamper<strong>in</strong>g <strong>and</strong> tapp<strong>in</strong>g.<br />

The grid should establish the identity of a pr<strong>in</strong>cipal<br />

us<strong>in</strong>g the resources reliably across the system.<br />

May 20, 2003<br />

K. Hwang at USC<br />

33


Underly<strong>in</strong>g Technologies for E-Commerce,<br />

E<br />

Digital Government, <strong>and</strong> E-Everyth<strong>in</strong>gE<br />

Everyth<strong>in</strong>g<br />

RAS<br />

Personalization<br />

Enabl<strong>in</strong>g Technologies<br />

Core Technologies<br />

Data Warehous<strong>in</strong>g<br />

Performance<br />

Measurement<br />

Relationship<br />

Management<br />

Decision-Support Technologies<br />

OLAP<br />

HTML/XML<br />

Unix/L<strong>in</strong>ux/NT Security Fast Messag<strong>in</strong>g<br />

Network<strong>in</strong>g RDBMS<br />

Scalability<br />

Open St<strong>and</strong>ards<br />

COM/DCOM/DNA<br />

CORBA/IIOP<br />

Knowledge<br />

Management<br />

Bill<strong>in</strong>g/<br />

Payment Systems<br />

Advertis<strong>in</strong>g/<br />

Promotions<br />

Data M<strong>in</strong><strong>in</strong>g<br />

Supply Cha<strong>in</strong><br />

Management<br />

May 20, 2003<br />

K. Hwang at USC<br />

(Source: Kalakota <strong>and</strong> Rob<strong>in</strong>son, e-Bus<strong>in</strong>ess:<br />

Roadmap for Success, Addison-Wesley, 1999)<br />

34


Increas<strong>in</strong>g Dem<strong>and</strong> of Secure <strong>Cluster</strong>,<br />

<strong>Grid</strong>, <strong>and</strong> <strong>Pervasive</strong> Applications:<br />

LANs, clusters, Intranets, WANs, <strong>Grid</strong>s, <strong>and</strong> the<br />

<strong>Internet</strong> all dem<strong>and</strong> security protection, faulttolerance,<br />

<strong>and</strong> hacker-proof operations, which are<br />

crucial to a digital society <strong>and</strong> economy.<br />

Distributed storage-area networks dem<strong>and</strong>s<br />

HW/SW support of a s<strong>in</strong>gle I/O space <strong>and</strong> global file<br />

<strong>and</strong> database management <strong>in</strong> all network-based<br />

comput<strong>in</strong>g applications.<br />

Many <strong>in</strong>novative applications exist <strong>in</strong> remote<br />

network services, E-commerce, telemedic<strong>in</strong>e,<br />

distance education, collaborative design, pervasive<br />

comput<strong>in</strong>g, digital enterta<strong>in</strong>ment, etc.


Charles Darw<strong>in</strong> (1809 - 1882)<br />

“It is not the<br />

strongest of<br />

species that<br />

survive, nor the<br />

most <strong>in</strong>telligent,<br />

but the one<br />

most adaptable<br />

to change.”<br />

May 20, 2003 K. Hwang at USC 36

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!