SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 3 Pages: 2291-2299 (2014) ISSN : 0975-0290
2291
An Exploration of Grid Computing to be
Utilized in Teaching and Research at TU
Dr. Mohammed A.M. Ibrahim & Group of Grid Computing
Department of Information Technology, Faculty of Engineering and Information Technology, Taiz University
Email: sabri1966@yahoo.com
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
Taiz University (TU) has a hundreds of computing resources on different campuses for use in areas from offices
work to general access student labs. However, these resources are not used to their full potential. Grid computing
is a technology that is capable to unify these resources and utilize them in very significant way. The difficulties
of funding a complete grid computing environment and also, the difficulties of grid tools makes teachers and
researchers in TU unable to involve in teaching and research in grid computing or in distributed computing.
These problems raised up our awareness to mitigate this problem by build a simple environment for Grid
computing from resources are available in TU and the built environment we can use it for teaching and research.
The objective of this paper is to build, implement and testing a grid computing environment (Globus Toolkit). To
achieving this objective we built the hardware and software parts, and configured several basic grid services
commands line and web portal. The test result for basic grid services have been indicated that our proposed grid
computing model is promising and can use in teaching and research in TU. The paper takes a look at how grid
computing is realizing this aim and have created unbelievable opportunities for students, teachers and
researchers at TU in addition the result of this paper will make TU a pilot to the other universities in whole
Yemen in field of Grid and distributing computing.
Keywords - Grid Computing, Network Computing, Software and Hardware of Grid Computing,
Grid Evaluation.
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: October 20, 2014 Date of Acceptance: November 20, 2014
--------------------------------------------------------------------------------------------------------------------------------------------------
1. INTRODUCTION
Grid computing is an approach where the end user can
be offered any of the services that provide by a grid or a
network of computer system located either in a Locally or
in geographical area. in grid computing user can
dynamically select and locate any recourses such as
(processing power, disk storage, applications, etc). In
another hand grid computing integrate hardware and
software by network , for multiple different organizations
to be available to any of the users of any of these multiple
organizations. Grid computing has many goals such as :
providing remote access to IT assets, and aggregating
processing power more detail in [1]. huge number of
research have studied the grid computing in different areas
and also, many researchers have defined the grid
computing, Foster and Kesselman [2] Define a
computational Grid “as a hardware and software
infrastructure that provides dependable, consistent,
pervasive, and inexpensive access to high-end
computational capabilities.” Grid computing is concerned
with coordinated resource sharing and problem solving in
dynamic, multi-institutional virtual organizations. TU
saver a shortages in funding and also in skills for grid
computing technology for mitigating these shortages we
come up with this paper which is maiming to implement a
grid computing environment (Globus Toolkit).We choose
to implement grid and its tools because Grids can more
easily deal with the enormous increasing amounts of data
and provide tools to access, securely share data between
trusted sources, storage and to solve other problems. To
achieving this objective we built the hardware and
software parts, and configured several basic grid services
of a grid, this grid not be targeted to specific domain, we
followed a general simplified architecture that leads to
general practical results and build a wide skills knowledge
in grid computing technology, we separated out the group
of the different components and functionalities of the grid
into smaller groups or parts distributed over different
machines.
2. TYPES OF GRID
Grid computing address various kinds of applications
used in many areas, grid computing are categorized by
the type which are summarized below [3]:
• Computational: A computational grid is
focused on setting aside resources specifically for
compute power. In this type of grid most of the
machines are high-performance servers.
• Scavenging: A scavenging grid is most
commonly used with large numbers of desktop
machines. In [4,5] machines are scavenged for
available CPU cycles and other resources.
Owners of the desktop machines are usually
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 3 Pages: 2291-2299 (2014) ISSN : 0975-0290
2292
given control of when their resources are
available to participate in the grid.
• Data grid: The main task of data grid is storing
and providing access to data across multiple
organizations. an example, that if multiple
organizations using an application, each
organization has unique data. A data grid would
allow these organizations to share their data,
manage the data, and manage security issues such
as who has access to what data[6].
3. GRID ARCHITECTURE
Grid computing should has number of characteristics
and features that are required by a grid to provide
users with a computing environment and the detail of
these characteristics can be find in [7, 8]. Foster,
Kesselman, & Tuecke, proposed a new grid
architecture exploration can be seen in [9] this
architecture, identifies the basic components of a grid
system, defines the purpose and functions of such
components and indicates how each of these
components interacts with one another, the new
architectures shown in Figure 1.
Figure 1. Grid Architecture
4. Grid Components
The major components that are necessary to form a
grid computing and the detail of those components
can be find in [10].
5. Implementation Requirements
To implement a grid computing model (Globus Toolkit)
the hardware requirements and software requirements
should be introduce as follows:
1. Hardware
The implementation test bad of grid computing model
consisted of three machines each machine can be
regarded as a source of computing power and data
storage capacity and all machines are identical in
specification, which is listed below.
Intel® Core ® 2 Due Processor (2CPUs)
2.40GHz, 2M cache
Integrated Broadcom 802.11a/b/g/n Wi-Fi
Adapter
2MB DDR2 Memory
250GB Serial ATA Hard Drive
These three machines will play the roles as servers as
follow:
a). CA Server: Is the Digital certification authority
server Used for issuing digital certificates (X.509
certificates) to grid users, resources and services.
b). MyProxy Server: is An online credential repository
used to store X.509 proxy credentials, protected by a
passphrase, for later retrieval over the network so you
and other applications can access your credentials
remotely. This eliminates the need for manually
copying private key and certificate files between
machines. MyProxy-Server can also be used for
authentication to grid portals and credential renewal
with job managers.
c). Portal Server: is a portal-server where the grid
portal resides, the Grid portal is the access point to a
web system; it provides an environment where the user
can access the resources and services of the Grid,
implement and monitor network applications and
collaborate with other users.
2. Software Requirements
The basic software requirements that must be
satisfied by any grid
implementation are :
• Ubuntu Desktop Edition 11.04
We use Ubuntu as the main platform. Development
tools and various other packages were installed as
needed on each of the machine. Globus Toolkit
Version 4.2.1 (GT4)
The open source Globus® Toolkit is a fundamental
enabling technology for the "Grid," letting people
share computing power, databases, and other tools
securely online across corporate, institutional, and
geographic boundaries without sacrificing local
autonomy. The toolkit includes software services
and libraries for resource monitoring, discovery,
and management, plus security and file
management[11,12].
• Grid Portal
we used the OGCE portal v2.5, it includes
everything you need to get started building a Java-
based Grid portal, including Tomcat 5.5 web
server, GridSphere 2.1 portlet container, and
OGCE Grid portlets.
• Apache Tomcat 5.5
Apache Tomcat is an open source web server and
servlet container developed by the Apache
Software Foundation (ASF). Tomcat implements
Application
Collective
Resource
Connectivity
Fabric
Int. J. Advanced Networking and Applicatio
Volume: 6 Issue: 3 Pages: 2291-2299 (20
the Java Servlet and the JavaServe
specifications from Sun Micro
provides a "pure Java" HTTP
environment for Java code to run in.
• MyProxy v 4.2
MyProxy is an open source software
X.509 Public Key Infrastructure
credentials (certificates and private k
• GridSphere 2.1 portlet cont
The GridSphere portal framework
open-source portlet bas
portal. GridSphere enables develope
develop and package third-party
applications that can be run and
within the GridSphere portlet contain
• OGCE Portal v2.5
OGCE portal v2.5 includes everythin
get started building a Java-based
including Tomcat 5.5 web server, G
portlet container, and OGCE Grid portle
6. GRID COMPUTING MODEL DE
ARCHITECTURE
The main focus of this section is
hardware and software parts, and con
basic grid services of a grid in w
implement and test them. Our pr
computing model will not be target
domain, we will follow a gene
architecture that leads to general practi
are going to separate out the group o
components and functionalities of
smaller groups or parts distributed
machines so we can examine and get a
each one functionalities. Figure 2
proposed architecture.
Figure 2. Proposed Grid Architecture Mode
ons
14) ISSN : 0975-0290
er Pages (JSP)
osystems, and
web server
e for managing
(PKI) security
keys).
tainer
provides an
sed Web
ers to quickly
y portlet web
d administered
ner.
ng you need to
Grid portal,
GridSphere 2.1
ets
ESIGN AND
s building the
nfigure several
which we will
roposed grid
ted to specific
ral simplified
ical results, we
of the different
the grid into
over different
a clear view of
2. shows our
el
7. ACCESSING THE GRID
In order for the accessing the propos
computing, user should create a se
key cryptography and request his
Certificate Authority and a copy o
the CA.
1. Obtaining signed certificate
Before users be able to request th
a specific CA, they first should c
to trust that CA by coping CA’s
GSI in their hosts, Figure 3.
procedure describe the steps to
communication [13]:
1. Copy the Certificate Author
our grid host with which we s
2. Creating private key and a ce
3. after that we send the certif
by e-mail or another more se
running a production sys
positively identify the sender
Figure 3. Obtaining Signed Certificat
When that procedure has been co
digital certificate should to be re
user will have three important fil
host and these files are:
• The CA’s public key
• The grid host’s private key
• The grid host’s digital cert
Mapping Global name of a Grid
name in each resource of the gri
user is going to use.
2. Accessing the grid through the g
A certain things should be done firs
access and use the grid resources a
the grid portal from any machine th
portal web server, before anythin
2293
sed architecture grid
et of keys for public
certificate from the
of the public key of
s from CA server:
heir certificates from
configure their hosts
public key to setup
and the following
o establish the GSI
rity’s public key to
setup GSI.
ertificate request.
ficate request to CA
ecure way if you are
stem and need to
r.
tes from CA Server
ompleted the signed
eceived, at that time
les on his own grid
y
tificate
user to a local user
id resources that the
grid portal
st before the user can
and services through
hat has access to the
ng a kind of trust
Int. J. Advanced Networking and Applicatio
Volume: 6 Issue: 3 Pages: 2291-2299 (20
relationship between portal web ser
underling grid architecture should exist. I
to access the grid through the portal the p
able to access the grid on that user beha
achieved with the help of Myproxy
manages grid users credentials and dele
privileges to the portal server or any othe
has access to the grid. The followin
describe all the process in order.
a). Delegation of Credential to MyP
After the user has acquired his Grid cr
use this credential to delegate his pr
grid portal. To delegate (store) a prox
the MyProxy server, the user would run
client program (contained in the M
package) on the machine (or logge
manner - e.g. an encrypted Secure
where he can access his X.509 creden
passphrase that encrypts the private
with this credential) and delegate a pr
to the MyProxy server repository
authentication information.
Figure 4. Delegation of Privileges to MyPro
b). Retrieval of Credential from My
To obtain a proxy credential from
server, the user must provide a user
passphrase then user delegated a prox
the MyProxy server. Figure 5. shows
retrieval of proxy credential from
server.
ons
14) ISSN : 0975-0290
rver and the
If a user wants
portal should be
alf, this can be
Server which
egation of user
er machine that
ng subsections
Proxy server:
edential he can
rivileges to the
xy credential in
n myproxy-init
MyProxy server
d in a secure
Shell session)
ntial (using the
key associated
roxy credential
y along with
oxy server.
yProxy server:
the MyProxy
rname and the
xy credential in
s the steps for
the MyProxy
Figure 5. Retrieval Proxy Credent
server.
2. Data Management
GridFTP: GridFTP is a high-pe
reliable data transfer protocol o
bandwidth wide-area networks. Th
is based on FTP [14].One of the
GridFTP is that it enables third-pa
party transfer is suitable for an envir
is a large file in remote storage and
copy it to another remote server our
is similar to that in [15] , as illustrate
Figure 6. GridFTP third-part
• Reliable File Transfer Se
web service that provid
controlling and monitoring
transfers using GridFTP ser
controlling the transfer which
Grid service so it can be man
state model and queried usin
interfaces available to all Gri
shows the RST and GridFTP1
2294
tial from MyProxy
erformance, secure,
ptimized for high-
he GridFTP protocol
e major features of
arty transfer. Third-
ronment where there
d the client wants to
r work in this section
ed in Figure 6.
y transfer .
ervice (RFT): is a
des interfaces for
g third party file
rvers. The client
h hosted inside of a
naged using the soft
ng the Service Data
id services figure 7.
16].
56
Int. J. Advanced Networking and Applicatio
Volume: 6 Issue: 3 Pages: 2291-2299 (20
Figure 7. RST and GridFTP
8. INSTALLATION
CONFIGURATION STEPS O
COMPUTING MODEL
step 1:
Install and configure the software require
grid computing in all machines and s
software are as follows:
• Globus Toolkit installer, from G
Java J2SE 1.5.0+ SDK from Sun
BEA (do not use GCJ). IOD
requirement for RLS) ,Tomcat
WebMDS, optional for other servic
VOMS parsing
•Setting up the Resource or Ma
This Settings applies to all node ma
considered as a resource donor, in our
these machines are:
node1.grid.local
node2.grid.local
node3.grid.local
step 2: Install Portal Server
Step 3: Setup Certificate Authority Serve
include the following:
1) 1. Create users: user account, A g
account.
2) Run the setup script.
3) Configure the Subject Name:
• CA Name components:
• Identifies the particular certifica
certificate.
• Identifies the CA from other CA
SimpleCA.
4. Configure the CA's email
5. Configure the expiration date
6. Enter a passphrase
7. Confirm generated certificate
8. Complete setup of GSI
Step 4:
ons
14) ISSN : 0975-0290
AND
OF GRID
ed for build our
some of these
Globus Toolkit,
n, IBM, HP, or
DBC (compile
(required by
ces), gLite Java
achine
achines that is
r infrastructure
er and this step
generic globus
ate as the CA
As created by
1. Configure MyProxy version
server can be configured
the myproxy-server-setup comman
2. Manage User Credentials
A. Initialize Credentials
B. Retrieve Credentials
Step5:
1. Distribute Service Credentials
A. Initialize Credentials
B. Retrieve Credentials
9. RESULT OVERVIEW.
1). After finished the Installation
steps to the proposed model for gr
8. shown the result or the work ha
Figure 8. System after Insta
Configuration
2). Testing Grid Nodes
a). Testing Java WS Core
after setup, install and configure ou
started testing if it is work properl
promised and encouragement resul
grid model can be used as a
environment for research and for tea
9. shown promised result In each
configured to run the Globus contain
run all commands which used for g
as:
globus-start-container this com
security requirements has been set
requirements has not yet been set
following command: globus-start-co
2295
4.0 and Myproxy-
automatically by
nd
n and Configuration
rid computing, figure
as been done:
allation and
ur model of Grid we
y we have found a
lts that indicate our
an grid computing
aching in TU , figure
grid's nodes that is
ner, globus user can
grid computing such
mmand use only if
up , but if security
up user can run the
ontainer –nosec
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 3 Pages: 2291-2299 (2014) ISSN : 0975-0290
2296
Figure 9. Starting the Java WS Core Container
3. Testing GridFTP
To testing GridFTP user should get a user
credentials from MyProxy Server than he can
use myproxy client tools- by typing: myproxy-
logon -l griduser3 -s myproxy-server.grid.local.
figure 10. illustrated the following result
which is the affection of pervious command
which also indicted the capability of high
performance and transfer secure data between
grid's nodes
Figure 10.Ttransfer with Globus-url-copy Command
4. Testing Reliable File Transfer Service (RFT)
Figure 11. shows the result of testing RFT by
Submitting a transfer to the Reliable File Transfer
Service and prints out the status of the transfer on the
console.
Figure 11. RFT File Transfer Result
5. Testing WS GRAM: Services provide secure job
submission in grid computing. WS GRAM enables the
client to add a self-generated resource Figure 12. shows
the result of running simple WS GRAM command.
Figure 12. Running Simple WS GRAM Command
6. Testing Grid Servers
1. Testing MyProxy Server:
in this test we have testing MyProxy server for two
processes these are:
• First process is storing users credentials to
MyProxy server – through command line :
myproxy-server.grid.local. Figure 13. shows the
process of storing user credentials of user griduser3
to myproxy server and this result is powerful
indication for our grid model that can be used for
different applications such as cultural heritage
available in digital form which will be test bed on
the proposed grid model.
Figure 13. Storing Users Credentials to MyProxy Server
• second process is retrieving users credentials
from MyProxy server – through command line:
myproxy-server.grid.local, Here Figure 14. shows
the process of retrieving user’s credentials of user
griduser3 from MyProxy server.
Figure 14. Retrieving Users Credentials
2. Testing grid Portal Server
Web portal provides a pool of services and information
that users can access. A Grid portal is a web server that
provides the framework in which grid services are
housed and accessed and user can submit compute jobs,
transfer files, and query Grid information services from
a standard web browser. we have Configured and
installed Open Grid Computing Environment
(OGCE) Portal , we have previously shown how we can
access our grid computing model using the commands
line now we are going to access the proposed grid
computing model using grid web portal and Figure 15.
shows the login page, we can access it from any
machine by pointing the browser to http://portal-
server.grid.local:8080/gridsphere,this is myproxy
server address, we have already registered a portal user
with login name gridadmin which we will get any grid
user credentials from myproxy server and start using the
grid with that credentials
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 3 Pages: 2291-2299 (2014) ISSN : 0975-0290
2297
Figure 15. Login page of the grid portal
At the time we login, all basic deployed portals will be
displayed in taps as in shown in figure 16. deployed
portlets are the following:
Figure 16. Taps of Deployed Portal.
3. Using Grid Portal to Get User proxy Credentials
from Myproxy server:
Figure 17 shows the File Management Portal. Files can
be uploaded or downloaded through the browser.
Myproxy-portlet provides us with the credentials to use
the grid due to after logging to the grid portal the user is
not able to use the grid services until getting a proxy
credentials of an already registered grid user from
myproxy server, using a grid user name and password
via the following address: myproxy-server.grid.local
address.
Figure 17. File Management Portal
4.Grid Security Infrastructure GSI: is responsible for
providing APIs and tools for authentication, authorization
and certificate management to our proposed grid model
figure 18. shows the GSI proxy credentials loaded into an
account and will be valid for two hours.
Figure 18. GSI Proxy Credentials Loaded from Myproxy
Server
5. File Transfer and Job Submission Through the
Grid Portal:
Figure 19 shows the Job Submission Portal, Information
of fields available and resources of sending and
receiving the job must be entered as a GRAM resource
in a configuration file in order to show up in the Host list
as once can see in the figure 19,20.
Figure 19. Job Submission Portlet
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 3 Pages: 2291-2299 (2014) ISSN : 0975-0290
2298
Figure 20.File Transfer Portlet not Connected
10. CONCLUSION & FUTURE WORKS
TU's campuses have more one thousand computing
resources in computer labs and offices most of them
connecting to networks and almost their time are idle time
. Grid computing is mechanism to integrate or unify all of
these resources and harness their computing power
effectively, all these features of grid motivated us to
brought TU into the grid computing field. Globus Toolkit
provide the necessary features such as the ability of utilize
idle time on any machines around campuses and this will
give TU powerful high performance computing resources
without any additional cost, in addition the results we have
gained them from the Adoption and testing the proposed
grid computing model in two ways commands line and
web portal interfaces which are mitigate the complexity of
the shortage of using grid computing fields in TU. After
the successes of this work which was as starting point to
get the grid computing technology work in place and the
skills and knowledge in grid computing that we have
gained, we about to start scale up our grid model to
integrate all computing resources in labs and offices to
built large-scale grid computing and make it available to
students, faculty, and researchers. we have built our grid
model and installed Globus Toolkit Version 4.2.1on three
machines including security components, Apon
GridPortal, Ubuntu Desktop Edition 11.04, OGCE portal
v2.5, Apache Tomcat 5.5, MyProxy v 4.2, GridSphere 2.1,
portlet container and others grid software need.
Many tasks involved in effective use of the grid were
discussed with example executions in section 6. Among
these were credential management by requesting
credentials with gridcert-request, creating proxy
credentials with grid proxyinit, and using the MyProxy
Server. result gained from commands line and portal
interfaces ware shown , Java WS Core, GridFTP, RFT,
WS GRAM, MyProxy Server, Portal Server, Grid Portal to
Get User proxy Credentials, GSI, Transfer and Job
Submission Through the Grid Portal using command-line
and portal interfaces both mechanisms were works
correctly. Results with the final deployment of GridSphere
and GridPort , proxy management, file management, and
the resource monitoring services work without a problem.
After a successful testing period for the proposed grid
computing and gained the promising and encouragement
results which motivated us to start integrating the
computing resources at TU into what we plan to called it
the campus grid and we believe our future large-scale
campus grid computing will help to further unite the
campus' computing power and give students, faculty and
researchers a stronger system with which to work.
REFRENCES
[1] R. Al-Khannak, B. Bitzer. Load Balancing for
Distributed and Integrated Power Systems using Grid
Computing”. ICCEP 07, Capri, Italy, 23 November
2009, from IEEE database..
[2] S. Tarun and N. Sharma, "Grid Computing: A
Collaborative Approach in Distributed Environment
for Achieving Parallel Performance and Better
Resource Utilization": International Journal on
Computer Science and Engineering (IJCSE), January
2011Vol. 3, Issue.01, 0975–3397
[3] B. Jacob, L. Ferreira, N. Bieberstein, C. Gilzean.
Enabling Applications for Grid Computing with
Globus, Springer, CSA2011&WCC2011 Proceeding.
[4] J. Xiao, D. Lin Survey of Security in Grid Services
The Fourth International Conference on Electronic
Business ICEB, Beijing, May,1st
200.
[5] P. Dabas A. Arya Grid Computing: An Introduction ,
International Journal of Advanced Research in
Computer Science and Software Engineering, Volume
3, Issue 3, ISSN: 2277 128X , March 2013.
[6] N. Thenmozhi1 , M. Madheswaran2 Content Based
Data Tarnsfer Mechanism for Efficient Bulk Data
Transfer in Grid Computing Environment"
International Journal of Grid Computing &
Applications (IJGCA) Vol.2, No.4, December 2011
[7] X. Shi · H. Jin · S. Wu · W. Zhu · L. Qi Adapting grid
computing environments dependable with virtual
machines: design, implementation, and evaluations,
The Journal of Supercomputing An International
Journal of High-Performance Computer Design,
Analysis, and Use ISSN 0920-8542 J Supercomput
DOI 10.1007/ s11227-011-0664-7.
[8] M.A. Baker, R. Buyya, and D. Laforenza, The Grid:
International Efforts in Global Computing, SSGRR
2000 The Computer & eBusiness Conference,
l`Aquila, Italy July 31. 2000 - August 6. 2000.
[9] C. Germain, V. Néri,..,. Building an experimental
platform for global computing Grid2000 December
2000, IEEE Press.
[10]Chervenak, I.Foster, C.Kesselman Salisbury, “The
Data Grid: Towards an Architecture for the
Distributed Management and Analysis of Large
Scientific Data Sets”, J. Network and Computer
Applications (23). 187-200, (2001),
[11] GlobusToolkit4.2.1 Download:
https://www.globus.org/toolkit/downloads/4.
2.1/.
[12]GlobusToolkit4.2.1Release Manuals:https://www.glob
us.org/toolkit/docs/4.2/4.2.1/
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 3 Pages: 2291-2299 (2014) ISSN : 0975-0290
2299
[13] S. Tarkoma Efficient Content-based Routing,
Mobility-aware Topologies and Temporal Subspace
Matching “, Report A-2, ISBN 952-10-3055-0, 2006.
[14] H. Subramoni, P. Lai, R. Ketti, High Performance
Data transfer in grid Environment using GridFTP over
InfiniBand, Preceedings of the 10th IEEE/ACM
International Symposium on Cluster, Cloud and Grid
Computing (CCGrid), (May 2010).
[15] Introduction to Grid Computing:
http://www.redbooks.ibm.com/redbooks/pdfs/sg24677
8.pdf
[16] J. .Jacob1, R. E. Blessing, J. R. I. Ballasting. Impact
of arrival rate of job / resource and Dual queues in the
Matchmaking process in Grid Environment"
International Journal of Innovation and Applied
Studies ISSN 2028-9324 Vol. 2 No. 4 Apr. 2013, pp.
484-487 ©nnovative Space of Scientific Research
Journals ttp://www.issr-journals.org/ijias
[17] S. K. Patel; A. Seetha, A. K. Sharma, Grid
Computing: Status of Technology In Current
Perspective, International Journal of software and
hardware research in engineering, ISSN NO. 234-
4890,Volum 2 issue 6 June 2014
Authors Biography
Mohammed A.M. Ibrahim born in Taiz
city, Yemen, received his BSc degree in
computer science from Baghdad University,
Iraq , in 1991, also he received his MSc in
computer science &engineering from
Shanghai University China,1996, and his
PhD degree in computer science and engineering from
Shanghai Jiaotong University, China ,2003, his research
interests include grid computing, cloud computing
,distributing computing ,network computing, network
security.

Más contenido relacionado

La actualidad más candente

Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...INFOGAIN PUBLICATION
 
Ijarcce9 b a anjan a comparative analysis grid cluster and cloud computing
Ijarcce9 b  a  anjan a comparative analysis grid cluster and cloud computingIjarcce9 b  a  anjan a comparative analysis grid cluster and cloud computing
Ijarcce9 b a anjan a comparative analysis grid cluster and cloud computingHarsh Parashar
 
Performing initiative data prefetching
Performing initiative data prefetchingPerforming initiative data prefetching
Performing initiative data prefetchingKamal Spring
 
Service oriented cloud architecture for improved
Service oriented cloud architecture for improvedService oriented cloud architecture for improved
Service oriented cloud architecture for improvedeSAT Publishing House
 
Service oriented cloud architecture for improved performance of smart grid ap...
Service oriented cloud architecture for improved performance of smart grid ap...Service oriented cloud architecture for improved performance of smart grid ap...
Service oriented cloud architecture for improved performance of smart grid ap...eSAT Journals
 
Load balancing in public cloud by division of cloud based on the geographical...
Load balancing in public cloud by division of cloud based on the geographical...Load balancing in public cloud by division of cloud based on the geographical...
Load balancing in public cloud by division of cloud based on the geographical...eSAT Publishing House
 
Computing Outside The Box
Computing Outside The BoxComputing Outside The Box
Computing Outside The BoxIan Foster
 
Open Source Grid Middleware Packages
Open Source Grid Middleware  PackagesOpen Source Grid Middleware  Packages
Open Source Grid Middleware PackagesShivaramBose
 
Bt9002 grid computing 1
Bt9002 grid computing 1Bt9002 grid computing 1
Bt9002 grid computing 1Techglyphs
 
Improving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing ApproachImproving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing ApproachIRJET Journal
 
Distributed computing file
Distributed computing fileDistributed computing file
Distributed computing fileberasrujana
 
IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED
 
Grid computing [2005]
Grid computing [2005]Grid computing [2005]
Grid computing [2005]Raul Soto
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Editor IJARCET
 
Grid Computing - Collection of computer resources from multiple locations
Grid Computing - Collection of computer resources from multiple locationsGrid Computing - Collection of computer resources from multiple locations
Grid Computing - Collection of computer resources from multiple locationsDibyadip Das
 

La actualidad más candente (20)

Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
 
Ijarcce9 b a anjan a comparative analysis grid cluster and cloud computing
Ijarcce9 b  a  anjan a comparative analysis grid cluster and cloud computingIjarcce9 b  a  anjan a comparative analysis grid cluster and cloud computing
Ijarcce9 b a anjan a comparative analysis grid cluster and cloud computing
 
Performing initiative data prefetching
Performing initiative data prefetchingPerforming initiative data prefetching
Performing initiative data prefetching
 
Service oriented cloud architecture for improved
Service oriented cloud architecture for improvedService oriented cloud architecture for improved
Service oriented cloud architecture for improved
 
Service oriented cloud architecture for improved performance of smart grid ap...
Service oriented cloud architecture for improved performance of smart grid ap...Service oriented cloud architecture for improved performance of smart grid ap...
Service oriented cloud architecture for improved performance of smart grid ap...
 
A STUDY OF GRID COMPUTING AND CLOUD COMPUTING
A STUDY OF GRID COMPUTING AND CLOUD COMPUTING A STUDY OF GRID COMPUTING AND CLOUD COMPUTING
A STUDY OF GRID COMPUTING AND CLOUD COMPUTING
 
Load balancing in public cloud by division of cloud based on the geographical...
Load balancing in public cloud by division of cloud based on the geographical...Load balancing in public cloud by division of cloud based on the geographical...
Load balancing in public cloud by division of cloud based on the geographical...
 
Computing Outside The Box
Computing Outside The BoxComputing Outside The Box
Computing Outside The Box
 
Open Source Grid Middleware Packages
Open Source Grid Middleware  PackagesOpen Source Grid Middleware  Packages
Open Source Grid Middleware Packages
 
Bt9002 grid computing 1
Bt9002 grid computing 1Bt9002 grid computing 1
Bt9002 grid computing 1
 
Cs6703 grid and cloud computing unit 4
Cs6703 grid and cloud computing unit 4Cs6703 grid and cloud computing unit 4
Cs6703 grid and cloud computing unit 4
 
Improving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing ApproachImproving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing Approach
 
"Volunteer Computing with BOINC Client-Server side" por Diamantino Cruz e Ric...
"Volunteer Computing with BOINC Client-Server side" por Diamantino Cruz e Ric..."Volunteer Computing with BOINC Client-Server side" por Diamantino Cruz e Ric...
"Volunteer Computing with BOINC Client-Server side" por Diamantino Cruz e Ric...
 
Distributed computing file
Distributed computing fileDistributed computing file
Distributed computing file
 
IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED-V1I1P1
IJSRED-V1I1P1
 
Rep on grid computing
Rep on grid computingRep on grid computing
Rep on grid computing
 
Grid computing [2005]
Grid computing [2005]Grid computing [2005]
Grid computing [2005]
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
Grid Computing - Collection of computer resources from multiple locations
Grid Computing - Collection of computer resources from multiple locationsGrid Computing - Collection of computer resources from multiple locations
Grid Computing - Collection of computer resources from multiple locations
 

Destacado

Authentic-Leadership
Authentic-LeadershipAuthentic-Leadership
Authentic-LeadershipRoger Wolter
 
G教育川村未来、板垣雄三
G教育川村未来、板垣雄三 G教育川村未来、板垣雄三
G教育川村未来、板垣雄三 Kazuhiko Kawasaki
 
Rebusurimuzicale
RebusurimuzicaleRebusurimuzicale
Rebusurimuzicalettpuica
 
Descripción casa de chocolate Victor
Descripción casa de chocolate VictorDescripción casa de chocolate Victor
Descripción casa de chocolate Victormaestrojuanavila
 
HOTEL13-Pocketmarketing Herman Konings
HOTEL13-Pocketmarketing Herman KoningsHOTEL13-Pocketmarketing Herman Konings
HOTEL13-Pocketmarketing Herman KoningsTravel 360°
 
2 san.acuic.elpez y su medioambiente
2  san.acuic.elpez y su medioambiente2  san.acuic.elpez y su medioambiente
2 san.acuic.elpez y su medioambienteuaeh
 
มะเร็งปากมดลูก by swd57
มะเร็งปากมดลูก by swd57มะเร็งปากมดลูก by swd57
มะเร็งปากมดลูก by swd57Wassana Srisawat
 
"1С:ERP Управление предприятием 2"
"1С:ERP Управление предприятием 2""1С:ERP Управление предприятием 2"
"1С:ERP Управление предприятием 2"sorokinats
 
Architectural figures of urban metabolism. A research and a project | Seminar...
Architectural figures of urban metabolism. A research and a project | Seminar...Architectural figures of urban metabolism. A research and a project | Seminar...
Architectural figures of urban metabolism. A research and a project | Seminar...Saverio Massaro
 
Zukunftspotential, Human Centered Design - Erdmann
Zukunftspotential, Human Centered Design - ErdmannZukunftspotential, Human Centered Design - Erdmann
Zukunftspotential, Human Centered Design - Erdmanntecom
 

Destacado (18)

Drogas
DrogasDrogas
Drogas
 
Tarea 27 marzo
Tarea 27 marzoTarea 27 marzo
Tarea 27 marzo
 
Resume
ResumeResume
Resume
 
Pub janvier 2015
Pub janvier 2015Pub janvier 2015
Pub janvier 2015
 
Authentic-Leadership
Authentic-LeadershipAuthentic-Leadership
Authentic-Leadership
 
Herpes zóster
Herpes zósterHerpes zóster
Herpes zóster
 
G教育川村未来、板垣雄三
G教育川村未来、板垣雄三 G教育川村未来、板垣雄三
G教育川村未来、板垣雄三
 
Rebusurimuzicale
RebusurimuzicaleRebusurimuzicale
Rebusurimuzicale
 
Descripción casa de chocolate Victor
Descripción casa de chocolate VictorDescripción casa de chocolate Victor
Descripción casa de chocolate Victor
 
Poster 1 y 2, justin bieber y nick jonas
Poster 1 y 2, justin bieber y nick jonasPoster 1 y 2, justin bieber y nick jonas
Poster 1 y 2, justin bieber y nick jonas
 
HOTEL13-Pocketmarketing Herman Konings
HOTEL13-Pocketmarketing Herman KoningsHOTEL13-Pocketmarketing Herman Konings
HOTEL13-Pocketmarketing Herman Konings
 
Letra caminando
Letra caminandoLetra caminando
Letra caminando
 
2 san.acuic.elpez y su medioambiente
2  san.acuic.elpez y su medioambiente2  san.acuic.elpez y su medioambiente
2 san.acuic.elpez y su medioambiente
 
มะเร็งปากมดลูก by swd57
มะเร็งปากมดลูก by swd57มะเร็งปากมดลูก by swd57
มะเร็งปากมดลูก by swd57
 
"1С:ERP Управление предприятием 2"
"1С:ERP Управление предприятием 2""1С:ERP Управление предприятием 2"
"1С:ERP Управление предприятием 2"
 
População brasileira
População brasileiraPopulação brasileira
População brasileira
 
Architectural figures of urban metabolism. A research and a project | Seminar...
Architectural figures of urban metabolism. A research and a project | Seminar...Architectural figures of urban metabolism. A research and a project | Seminar...
Architectural figures of urban metabolism. A research and a project | Seminar...
 
Zukunftspotential, Human Centered Design - Erdmann
Zukunftspotential, Human Centered Design - ErdmannZukunftspotential, Human Centered Design - Erdmann
Zukunftspotential, Human Centered Design - Erdmann
 

Similar a TU Explores Grid Computing for Teaching and Research

A Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic InstitutionA Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic InstitutionArlene Smith
 
A Review Paper On Grid Computing
A Review Paper On Grid ComputingA Review Paper On Grid Computing
A Review Paper On Grid ComputingFiona Phillips
 
Grid and cluster_computing_chapter1
Grid and cluster_computing_chapter1Grid and cluster_computing_chapter1
Grid and cluster_computing_chapter1Bharath Kumar
 
IRJET- Cost Effective Workflow Scheduling in Bigdata
IRJET-  	  Cost Effective Workflow Scheduling in BigdataIRJET-  	  Cost Effective Workflow Scheduling in Bigdata
IRJET- Cost Effective Workflow Scheduling in BigdataIRJET Journal
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud ComputingIRJET Journal
 
Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161Kamal Jyoti
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  dannyijwest
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 
Tiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of ComputingTiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of ComputingIJECEIAES
 
IRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing FrameworkIRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing FrameworkIRJET Journal
 
Inroduction to grid computing by gargi shankar verma
Inroduction to grid computing by gargi shankar vermaInroduction to grid computing by gargi shankar verma
Inroduction to grid computing by gargi shankar vermagargishankar1981
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesIRJET Journal
 
IRJET - Torcloud - An Energy-Efficient Public Cloud for Imparting Files
IRJET -  	  Torcloud - An Energy-Efficient Public Cloud for Imparting FilesIRJET -  	  Torcloud - An Energy-Efficient Public Cloud for Imparting Files
IRJET - Torcloud - An Energy-Efficient Public Cloud for Imparting FilesIRJET Journal
 
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONSECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONIRJET Journal
 
Computation grid as a connected world
Computation grid as a connected worldComputation grid as a connected world
Computation grid as a connected worldijcsa
 
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingAnalyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingIOSRjournaljce
 
Grid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptxGrid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptxDrAdeelAkram2
 
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Souvik Pal
 

Similar a TU Explores Grid Computing for Teaching and Research (20)

A Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic InstitutionA Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic Institution
 
A Review Paper On Grid Computing
A Review Paper On Grid ComputingA Review Paper On Grid Computing
A Review Paper On Grid Computing
 
Grid and cluster_computing_chapter1
Grid and cluster_computing_chapter1Grid and cluster_computing_chapter1
Grid and cluster_computing_chapter1
 
IRJET- Cost Effective Workflow Scheduling in Bigdata
IRJET-  	  Cost Effective Workflow Scheduling in BigdataIRJET-  	  Cost Effective Workflow Scheduling in Bigdata
IRJET- Cost Effective Workflow Scheduling in Bigdata
 
8. 9590 1-pb
8. 9590 1-pb8. 9590 1-pb
8. 9590 1-pb
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 
Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
Tiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of ComputingTiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of Computing
 
IRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing FrameworkIRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing Framework
 
Inroduction to grid computing by gargi shankar verma
Inroduction to grid computing by gargi shankar vermaInroduction to grid computing by gargi shankar verma
Inroduction to grid computing by gargi shankar verma
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
 
IRJET - Torcloud - An Energy-Efficient Public Cloud for Imparting Files
IRJET -  	  Torcloud - An Energy-Efficient Public Cloud for Imparting FilesIRJET -  	  Torcloud - An Energy-Efficient Public Cloud for Imparting Files
IRJET - Torcloud - An Energy-Efficient Public Cloud for Imparting Files
 
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONSECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
 
Computation grid as a connected world
Computation grid as a connected worldComputation grid as a connected world
Computation grid as a connected world
 
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingAnalyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
 
Grid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptxGrid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptx
 
Grid Presentation
Grid PresentationGrid Presentation
Grid Presentation
 
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing
 

Más de Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasEswar Publications
 

Más de Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

TU Explores Grid Computing for Teaching and Research

  • 1. Int. J. Advanced Networking and Applications Volume: 6 Issue: 3 Pages: 2291-2299 (2014) ISSN : 0975-0290 2291 An Exploration of Grid Computing to be Utilized in Teaching and Research at TU Dr. Mohammed A.M. Ibrahim & Group of Grid Computing Department of Information Technology, Faculty of Engineering and Information Technology, Taiz University Email: sabri1966@yahoo.com -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------- Taiz University (TU) has a hundreds of computing resources on different campuses for use in areas from offices work to general access student labs. However, these resources are not used to their full potential. Grid computing is a technology that is capable to unify these resources and utilize them in very significant way. The difficulties of funding a complete grid computing environment and also, the difficulties of grid tools makes teachers and researchers in TU unable to involve in teaching and research in grid computing or in distributed computing. These problems raised up our awareness to mitigate this problem by build a simple environment for Grid computing from resources are available in TU and the built environment we can use it for teaching and research. The objective of this paper is to build, implement and testing a grid computing environment (Globus Toolkit). To achieving this objective we built the hardware and software parts, and configured several basic grid services commands line and web portal. The test result for basic grid services have been indicated that our proposed grid computing model is promising and can use in teaching and research in TU. The paper takes a look at how grid computing is realizing this aim and have created unbelievable opportunities for students, teachers and researchers at TU in addition the result of this paper will make TU a pilot to the other universities in whole Yemen in field of Grid and distributing computing. Keywords - Grid Computing, Network Computing, Software and Hardware of Grid Computing, Grid Evaluation. -------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: October 20, 2014 Date of Acceptance: November 20, 2014 -------------------------------------------------------------------------------------------------------------------------------------------------- 1. INTRODUCTION Grid computing is an approach where the end user can be offered any of the services that provide by a grid or a network of computer system located either in a Locally or in geographical area. in grid computing user can dynamically select and locate any recourses such as (processing power, disk storage, applications, etc). In another hand grid computing integrate hardware and software by network , for multiple different organizations to be available to any of the users of any of these multiple organizations. Grid computing has many goals such as : providing remote access to IT assets, and aggregating processing power more detail in [1]. huge number of research have studied the grid computing in different areas and also, many researchers have defined the grid computing, Foster and Kesselman [2] Define a computational Grid “as a hardware and software infrastructure that provides dependable, consistent, pervasive, and inexpensive access to high-end computational capabilities.” Grid computing is concerned with coordinated resource sharing and problem solving in dynamic, multi-institutional virtual organizations. TU saver a shortages in funding and also in skills for grid computing technology for mitigating these shortages we come up with this paper which is maiming to implement a grid computing environment (Globus Toolkit).We choose to implement grid and its tools because Grids can more easily deal with the enormous increasing amounts of data and provide tools to access, securely share data between trusted sources, storage and to solve other problems. To achieving this objective we built the hardware and software parts, and configured several basic grid services of a grid, this grid not be targeted to specific domain, we followed a general simplified architecture that leads to general practical results and build a wide skills knowledge in grid computing technology, we separated out the group of the different components and functionalities of the grid into smaller groups or parts distributed over different machines. 2. TYPES OF GRID Grid computing address various kinds of applications used in many areas, grid computing are categorized by the type which are summarized below [3]: • Computational: A computational grid is focused on setting aside resources specifically for compute power. In this type of grid most of the machines are high-performance servers. • Scavenging: A scavenging grid is most commonly used with large numbers of desktop machines. In [4,5] machines are scavenged for available CPU cycles and other resources. Owners of the desktop machines are usually
  • 2. Int. J. Advanced Networking and Applications Volume: 6 Issue: 3 Pages: 2291-2299 (2014) ISSN : 0975-0290 2292 given control of when their resources are available to participate in the grid. • Data grid: The main task of data grid is storing and providing access to data across multiple organizations. an example, that if multiple organizations using an application, each organization has unique data. A data grid would allow these organizations to share their data, manage the data, and manage security issues such as who has access to what data[6]. 3. GRID ARCHITECTURE Grid computing should has number of characteristics and features that are required by a grid to provide users with a computing environment and the detail of these characteristics can be find in [7, 8]. Foster, Kesselman, & Tuecke, proposed a new grid architecture exploration can be seen in [9] this architecture, identifies the basic components of a grid system, defines the purpose and functions of such components and indicates how each of these components interacts with one another, the new architectures shown in Figure 1. Figure 1. Grid Architecture 4. Grid Components The major components that are necessary to form a grid computing and the detail of those components can be find in [10]. 5. Implementation Requirements To implement a grid computing model (Globus Toolkit) the hardware requirements and software requirements should be introduce as follows: 1. Hardware The implementation test bad of grid computing model consisted of three machines each machine can be regarded as a source of computing power and data storage capacity and all machines are identical in specification, which is listed below. Intel® Core ® 2 Due Processor (2CPUs) 2.40GHz, 2M cache Integrated Broadcom 802.11a/b/g/n Wi-Fi Adapter 2MB DDR2 Memory 250GB Serial ATA Hard Drive These three machines will play the roles as servers as follow: a). CA Server: Is the Digital certification authority server Used for issuing digital certificates (X.509 certificates) to grid users, resources and services. b). MyProxy Server: is An online credential repository used to store X.509 proxy credentials, protected by a passphrase, for later retrieval over the network so you and other applications can access your credentials remotely. This eliminates the need for manually copying private key and certificate files between machines. MyProxy-Server can also be used for authentication to grid portals and credential renewal with job managers. c). Portal Server: is a portal-server where the grid portal resides, the Grid portal is the access point to a web system; it provides an environment where the user can access the resources and services of the Grid, implement and monitor network applications and collaborate with other users. 2. Software Requirements The basic software requirements that must be satisfied by any grid implementation are : • Ubuntu Desktop Edition 11.04 We use Ubuntu as the main platform. Development tools and various other packages were installed as needed on each of the machine. Globus Toolkit Version 4.2.1 (GT4) The open source Globus® Toolkit is a fundamental enabling technology for the "Grid," letting people share computing power, databases, and other tools securely online across corporate, institutional, and geographic boundaries without sacrificing local autonomy. The toolkit includes software services and libraries for resource monitoring, discovery, and management, plus security and file management[11,12]. • Grid Portal we used the OGCE portal v2.5, it includes everything you need to get started building a Java- based Grid portal, including Tomcat 5.5 web server, GridSphere 2.1 portlet container, and OGCE Grid portlets. • Apache Tomcat 5.5 Apache Tomcat is an open source web server and servlet container developed by the Apache Software Foundation (ASF). Tomcat implements Application Collective Resource Connectivity Fabric
  • 3. Int. J. Advanced Networking and Applicatio Volume: 6 Issue: 3 Pages: 2291-2299 (20 the Java Servlet and the JavaServe specifications from Sun Micro provides a "pure Java" HTTP environment for Java code to run in. • MyProxy v 4.2 MyProxy is an open source software X.509 Public Key Infrastructure credentials (certificates and private k • GridSphere 2.1 portlet cont The GridSphere portal framework open-source portlet bas portal. GridSphere enables develope develop and package third-party applications that can be run and within the GridSphere portlet contain • OGCE Portal v2.5 OGCE portal v2.5 includes everythin get started building a Java-based including Tomcat 5.5 web server, G portlet container, and OGCE Grid portle 6. GRID COMPUTING MODEL DE ARCHITECTURE The main focus of this section is hardware and software parts, and con basic grid services of a grid in w implement and test them. Our pr computing model will not be target domain, we will follow a gene architecture that leads to general practi are going to separate out the group o components and functionalities of smaller groups or parts distributed machines so we can examine and get a each one functionalities. Figure 2 proposed architecture. Figure 2. Proposed Grid Architecture Mode ons 14) ISSN : 0975-0290 er Pages (JSP) osystems, and web server e for managing (PKI) security keys). tainer provides an sed Web ers to quickly y portlet web d administered ner. ng you need to Grid portal, GridSphere 2.1 ets ESIGN AND s building the nfigure several which we will roposed grid ted to specific ral simplified ical results, we of the different the grid into over different a clear view of 2. shows our el 7. ACCESSING THE GRID In order for the accessing the propos computing, user should create a se key cryptography and request his Certificate Authority and a copy o the CA. 1. Obtaining signed certificate Before users be able to request th a specific CA, they first should c to trust that CA by coping CA’s GSI in their hosts, Figure 3. procedure describe the steps to communication [13]: 1. Copy the Certificate Author our grid host with which we s 2. Creating private key and a ce 3. after that we send the certif by e-mail or another more se running a production sys positively identify the sender Figure 3. Obtaining Signed Certificat When that procedure has been co digital certificate should to be re user will have three important fil host and these files are: • The CA’s public key • The grid host’s private key • The grid host’s digital cert Mapping Global name of a Grid name in each resource of the gri user is going to use. 2. Accessing the grid through the g A certain things should be done firs access and use the grid resources a the grid portal from any machine th portal web server, before anythin 2293 sed architecture grid et of keys for public certificate from the of the public key of s from CA server: heir certificates from configure their hosts public key to setup and the following o establish the GSI rity’s public key to setup GSI. ertificate request. ficate request to CA ecure way if you are stem and need to r. tes from CA Server ompleted the signed eceived, at that time les on his own grid y tificate user to a local user id resources that the grid portal st before the user can and services through hat has access to the ng a kind of trust
  • 4. Int. J. Advanced Networking and Applicatio Volume: 6 Issue: 3 Pages: 2291-2299 (20 relationship between portal web ser underling grid architecture should exist. I to access the grid through the portal the p able to access the grid on that user beha achieved with the help of Myproxy manages grid users credentials and dele privileges to the portal server or any othe has access to the grid. The followin describe all the process in order. a). Delegation of Credential to MyP After the user has acquired his Grid cr use this credential to delegate his pr grid portal. To delegate (store) a prox the MyProxy server, the user would run client program (contained in the M package) on the machine (or logge manner - e.g. an encrypted Secure where he can access his X.509 creden passphrase that encrypts the private with this credential) and delegate a pr to the MyProxy server repository authentication information. Figure 4. Delegation of Privileges to MyPro b). Retrieval of Credential from My To obtain a proxy credential from server, the user must provide a user passphrase then user delegated a prox the MyProxy server. Figure 5. shows retrieval of proxy credential from server. ons 14) ISSN : 0975-0290 rver and the If a user wants portal should be alf, this can be Server which egation of user er machine that ng subsections Proxy server: edential he can rivileges to the xy credential in n myproxy-init MyProxy server d in a secure Shell session) ntial (using the key associated roxy credential y along with oxy server. yProxy server: the MyProxy rname and the xy credential in s the steps for the MyProxy Figure 5. Retrieval Proxy Credent server. 2. Data Management GridFTP: GridFTP is a high-pe reliable data transfer protocol o bandwidth wide-area networks. Th is based on FTP [14].One of the GridFTP is that it enables third-pa party transfer is suitable for an envir is a large file in remote storage and copy it to another remote server our is similar to that in [15] , as illustrate Figure 6. GridFTP third-part • Reliable File Transfer Se web service that provid controlling and monitoring transfers using GridFTP ser controlling the transfer which Grid service so it can be man state model and queried usin interfaces available to all Gri shows the RST and GridFTP1 2294 tial from MyProxy erformance, secure, ptimized for high- he GridFTP protocol e major features of arty transfer. Third- ronment where there d the client wants to r work in this section ed in Figure 6. y transfer . ervice (RFT): is a des interfaces for g third party file rvers. The client h hosted inside of a naged using the soft ng the Service Data id services figure 7. 16]. 56
  • 5. Int. J. Advanced Networking and Applicatio Volume: 6 Issue: 3 Pages: 2291-2299 (20 Figure 7. RST and GridFTP 8. INSTALLATION CONFIGURATION STEPS O COMPUTING MODEL step 1: Install and configure the software require grid computing in all machines and s software are as follows: • Globus Toolkit installer, from G Java J2SE 1.5.0+ SDK from Sun BEA (do not use GCJ). IOD requirement for RLS) ,Tomcat WebMDS, optional for other servic VOMS parsing •Setting up the Resource or Ma This Settings applies to all node ma considered as a resource donor, in our these machines are: node1.grid.local node2.grid.local node3.grid.local step 2: Install Portal Server Step 3: Setup Certificate Authority Serve include the following: 1) 1. Create users: user account, A g account. 2) Run the setup script. 3) Configure the Subject Name: • CA Name components: • Identifies the particular certifica certificate. • Identifies the CA from other CA SimpleCA. 4. Configure the CA's email 5. Configure the expiration date 6. Enter a passphrase 7. Confirm generated certificate 8. Complete setup of GSI Step 4: ons 14) ISSN : 0975-0290 AND OF GRID ed for build our some of these Globus Toolkit, n, IBM, HP, or DBC (compile (required by ces), gLite Java achine achines that is r infrastructure er and this step generic globus ate as the CA As created by 1. Configure MyProxy version server can be configured the myproxy-server-setup comman 2. Manage User Credentials A. Initialize Credentials B. Retrieve Credentials Step5: 1. Distribute Service Credentials A. Initialize Credentials B. Retrieve Credentials 9. RESULT OVERVIEW. 1). After finished the Installation steps to the proposed model for gr 8. shown the result or the work ha Figure 8. System after Insta Configuration 2). Testing Grid Nodes a). Testing Java WS Core after setup, install and configure ou started testing if it is work properl promised and encouragement resul grid model can be used as a environment for research and for tea 9. shown promised result In each configured to run the Globus contain run all commands which used for g as: globus-start-container this com security requirements has been set requirements has not yet been set following command: globus-start-co 2295 4.0 and Myproxy- automatically by nd n and Configuration rid computing, figure as been done: allation and ur model of Grid we y we have found a lts that indicate our an grid computing aching in TU , figure grid's nodes that is ner, globus user can grid computing such mmand use only if up , but if security up user can run the ontainer –nosec
  • 6. Int. J. Advanced Networking and Applications Volume: 6 Issue: 3 Pages: 2291-2299 (2014) ISSN : 0975-0290 2296 Figure 9. Starting the Java WS Core Container 3. Testing GridFTP To testing GridFTP user should get a user credentials from MyProxy Server than he can use myproxy client tools- by typing: myproxy- logon -l griduser3 -s myproxy-server.grid.local. figure 10. illustrated the following result which is the affection of pervious command which also indicted the capability of high performance and transfer secure data between grid's nodes Figure 10.Ttransfer with Globus-url-copy Command 4. Testing Reliable File Transfer Service (RFT) Figure 11. shows the result of testing RFT by Submitting a transfer to the Reliable File Transfer Service and prints out the status of the transfer on the console. Figure 11. RFT File Transfer Result 5. Testing WS GRAM: Services provide secure job submission in grid computing. WS GRAM enables the client to add a self-generated resource Figure 12. shows the result of running simple WS GRAM command. Figure 12. Running Simple WS GRAM Command 6. Testing Grid Servers 1. Testing MyProxy Server: in this test we have testing MyProxy server for two processes these are: • First process is storing users credentials to MyProxy server – through command line : myproxy-server.grid.local. Figure 13. shows the process of storing user credentials of user griduser3 to myproxy server and this result is powerful indication for our grid model that can be used for different applications such as cultural heritage available in digital form which will be test bed on the proposed grid model. Figure 13. Storing Users Credentials to MyProxy Server • second process is retrieving users credentials from MyProxy server – through command line: myproxy-server.grid.local, Here Figure 14. shows the process of retrieving user’s credentials of user griduser3 from MyProxy server. Figure 14. Retrieving Users Credentials 2. Testing grid Portal Server Web portal provides a pool of services and information that users can access. A Grid portal is a web server that provides the framework in which grid services are housed and accessed and user can submit compute jobs, transfer files, and query Grid information services from a standard web browser. we have Configured and installed Open Grid Computing Environment (OGCE) Portal , we have previously shown how we can access our grid computing model using the commands line now we are going to access the proposed grid computing model using grid web portal and Figure 15. shows the login page, we can access it from any machine by pointing the browser to http://portal- server.grid.local:8080/gridsphere,this is myproxy server address, we have already registered a portal user with login name gridadmin which we will get any grid user credentials from myproxy server and start using the grid with that credentials
  • 7. Int. J. Advanced Networking and Applications Volume: 6 Issue: 3 Pages: 2291-2299 (2014) ISSN : 0975-0290 2297 Figure 15. Login page of the grid portal At the time we login, all basic deployed portals will be displayed in taps as in shown in figure 16. deployed portlets are the following: Figure 16. Taps of Deployed Portal. 3. Using Grid Portal to Get User proxy Credentials from Myproxy server: Figure 17 shows the File Management Portal. Files can be uploaded or downloaded through the browser. Myproxy-portlet provides us with the credentials to use the grid due to after logging to the grid portal the user is not able to use the grid services until getting a proxy credentials of an already registered grid user from myproxy server, using a grid user name and password via the following address: myproxy-server.grid.local address. Figure 17. File Management Portal 4.Grid Security Infrastructure GSI: is responsible for providing APIs and tools for authentication, authorization and certificate management to our proposed grid model figure 18. shows the GSI proxy credentials loaded into an account and will be valid for two hours. Figure 18. GSI Proxy Credentials Loaded from Myproxy Server 5. File Transfer and Job Submission Through the Grid Portal: Figure 19 shows the Job Submission Portal, Information of fields available and resources of sending and receiving the job must be entered as a GRAM resource in a configuration file in order to show up in the Host list as once can see in the figure 19,20. Figure 19. Job Submission Portlet
  • 8. Int. J. Advanced Networking and Applications Volume: 6 Issue: 3 Pages: 2291-2299 (2014) ISSN : 0975-0290 2298 Figure 20.File Transfer Portlet not Connected 10. CONCLUSION & FUTURE WORKS TU's campuses have more one thousand computing resources in computer labs and offices most of them connecting to networks and almost their time are idle time . Grid computing is mechanism to integrate or unify all of these resources and harness their computing power effectively, all these features of grid motivated us to brought TU into the grid computing field. Globus Toolkit provide the necessary features such as the ability of utilize idle time on any machines around campuses and this will give TU powerful high performance computing resources without any additional cost, in addition the results we have gained them from the Adoption and testing the proposed grid computing model in two ways commands line and web portal interfaces which are mitigate the complexity of the shortage of using grid computing fields in TU. After the successes of this work which was as starting point to get the grid computing technology work in place and the skills and knowledge in grid computing that we have gained, we about to start scale up our grid model to integrate all computing resources in labs and offices to built large-scale grid computing and make it available to students, faculty, and researchers. we have built our grid model and installed Globus Toolkit Version 4.2.1on three machines including security components, Apon GridPortal, Ubuntu Desktop Edition 11.04, OGCE portal v2.5, Apache Tomcat 5.5, MyProxy v 4.2, GridSphere 2.1, portlet container and others grid software need. Many tasks involved in effective use of the grid were discussed with example executions in section 6. Among these were credential management by requesting credentials with gridcert-request, creating proxy credentials with grid proxyinit, and using the MyProxy Server. result gained from commands line and portal interfaces ware shown , Java WS Core, GridFTP, RFT, WS GRAM, MyProxy Server, Portal Server, Grid Portal to Get User proxy Credentials, GSI, Transfer and Job Submission Through the Grid Portal using command-line and portal interfaces both mechanisms were works correctly. Results with the final deployment of GridSphere and GridPort , proxy management, file management, and the resource monitoring services work without a problem. After a successful testing period for the proposed grid computing and gained the promising and encouragement results which motivated us to start integrating the computing resources at TU into what we plan to called it the campus grid and we believe our future large-scale campus grid computing will help to further unite the campus' computing power and give students, faculty and researchers a stronger system with which to work. REFRENCES [1] R. Al-Khannak, B. Bitzer. Load Balancing for Distributed and Integrated Power Systems using Grid Computing”. ICCEP 07, Capri, Italy, 23 November 2009, from IEEE database.. [2] S. Tarun and N. Sharma, "Grid Computing: A Collaborative Approach in Distributed Environment for Achieving Parallel Performance and Better Resource Utilization": International Journal on Computer Science and Engineering (IJCSE), January 2011Vol. 3, Issue.01, 0975–3397 [3] B. Jacob, L. Ferreira, N. Bieberstein, C. Gilzean. Enabling Applications for Grid Computing with Globus, Springer, CSA2011&WCC2011 Proceeding. [4] J. Xiao, D. Lin Survey of Security in Grid Services The Fourth International Conference on Electronic Business ICEB, Beijing, May,1st 200. [5] P. Dabas A. Arya Grid Computing: An Introduction , International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 3, ISSN: 2277 128X , March 2013. [6] N. Thenmozhi1 , M. Madheswaran2 Content Based Data Tarnsfer Mechanism for Efficient Bulk Data Transfer in Grid Computing Environment" International Journal of Grid Computing & Applications (IJGCA) Vol.2, No.4, December 2011 [7] X. Shi · H. Jin · S. Wu · W. Zhu · L. Qi Adapting grid computing environments dependable with virtual machines: design, implementation, and evaluations, The Journal of Supercomputing An International Journal of High-Performance Computer Design, Analysis, and Use ISSN 0920-8542 J Supercomput DOI 10.1007/ s11227-011-0664-7. [8] M.A. Baker, R. Buyya, and D. Laforenza, The Grid: International Efforts in Global Computing, SSGRR 2000 The Computer & eBusiness Conference, l`Aquila, Italy July 31. 2000 - August 6. 2000. [9] C. Germain, V. Néri,..,. Building an experimental platform for global computing Grid2000 December 2000, IEEE Press. [10]Chervenak, I.Foster, C.Kesselman Salisbury, “The Data Grid: Towards an Architecture for the Distributed Management and Analysis of Large Scientific Data Sets”, J. Network and Computer Applications (23). 187-200, (2001), [11] GlobusToolkit4.2.1 Download: https://www.globus.org/toolkit/downloads/4. 2.1/. [12]GlobusToolkit4.2.1Release Manuals:https://www.glob us.org/toolkit/docs/4.2/4.2.1/
  • 9. Int. J. Advanced Networking and Applications Volume: 6 Issue: 3 Pages: 2291-2299 (2014) ISSN : 0975-0290 2299 [13] S. Tarkoma Efficient Content-based Routing, Mobility-aware Topologies and Temporal Subspace Matching “, Report A-2, ISBN 952-10-3055-0, 2006. [14] H. Subramoni, P. Lai, R. Ketti, High Performance Data transfer in grid Environment using GridFTP over InfiniBand, Preceedings of the 10th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), (May 2010). [15] Introduction to Grid Computing: http://www.redbooks.ibm.com/redbooks/pdfs/sg24677 8.pdf [16] J. .Jacob1, R. E. Blessing, J. R. I. Ballasting. Impact of arrival rate of job / resource and Dual queues in the Matchmaking process in Grid Environment" International Journal of Innovation and Applied Studies ISSN 2028-9324 Vol. 2 No. 4 Apr. 2013, pp. 484-487 ©nnovative Space of Scientific Research Journals ttp://www.issr-journals.org/ijias [17] S. K. Patel; A. Seetha, A. K. Sharma, Grid Computing: Status of Technology In Current Perspective, International Journal of software and hardware research in engineering, ISSN NO. 234- 4890,Volum 2 issue 6 June 2014 Authors Biography Mohammed A.M. Ibrahim born in Taiz city, Yemen, received his BSc degree in computer science from Baghdad University, Iraq , in 1991, also he received his MSc in computer science &engineering from Shanghai University China,1996, and his PhD degree in computer science and engineering from Shanghai Jiaotong University, China ,2003, his research interests include grid computing, cloud computing ,distributing computing ,network computing, network security.