Preface | |
About the Author | |
Introdution To Grid Computing | p. 1 |
Grid Computing Concept | p. 1 |
History of Distributed Computing | p. 4 |
Computational Grid Applications | p. 12 |
Grid Computing Infrastructure Development | p. 14 |
Large-Scale U.S. Grids | p. 14 |
National Grids | p. 16 |
Multi-National Grids | p. 17 |
Campus Grids | p. 18 |
Grid Computing Courses | p. 18 |
Grid Computing Software Interface | p. 19 |
Summary | p. 27 |
Further Reading | p. 28 |
Bibliography | p. 29 |
Self-Assessment Questions | p. 31 |
Programming Assignments | p. 32 |
Job Submission | p. 35 |
Introduction | p. 35 |
Globus Job Submission | p. 38 |
Components | p. 38 |
Job Specification | p. 41 |
Submitting a Job | p. 48 |
Transferring Files | p. 55 |
Command-Line File Transfers | p. 55 |
Staging | p. 57 |
Summary | p. 59 |
Further Reading | p. 59 |
Bibliography | p. 59 |
Self-Assessment Questions | p. 60 |
Programming Assignments | p. 62 |
Schedulers | p. 65 |
Scheduler Features | p. 65 |
Scheduling | p. 65 |
Monitoring Job Progress | p. 69 |
Additional Scheduler Features | p. 70 |
Scheduler Examples | p. 75 |
Sun Grid Engine | p. 75 |
Condor | p. 81 |
Grid Computing Meta-Schedulers | p. 100 |
Condor-G | p. 100 |
Grid Way | p. 102 |
Distributed Resource Management Application (DRMAA) | p. 107 |
Summary | p. 110 |
Further Reading | p. 111 |
Bibliography | p. 111 |
Self-Assessment Questions | p. 112 |
Programming Assignments | p. 114 |
Security Concepts | p. 117 |
Introduction | p. 117 |
Secure Connection | p. 117 |
Password Authentication | p. 118 |
Encryption and Decryption | p. 119 |
Symmetric Key Cryptography | p. 120 |
Asymmetric Key Cryptography (Public Key Cryptography) | p. 122 |
Public Key Infrastructure | p. 128 |
Data Integrity | p. 128 |
Digital Signatures | p. 129 |
Certificates and Certificate Authorities | p. 130 |
Systems/Protocols Using Security Mechanisms | p. 140 |
Mutual Authentication and Single-Sided Authentication | p. 140 |
Secure Shell (SSH) | p. 141 |
Secure Sockets Layer (SSL) Protocol | p. 142 |
Summary | p. 144 |
Further Reading | p. 144 |
Bibliography | p. 144 |
Self-Assessment Questions | p. 145 |
Programming Assignments | p. 148 |
Grid Security | p. 149 |
Introduction | p. 149 |
Grid Environment | p. 149 |
Authentication and Authorization Aspects for a Grid | p. 151 |
Grid Security Infrastructure (GSI) | p. 153 |
Component Parts | p. 153 |
GSI Communication Protocols | p. 154 |
GSI Authentication | p. 156 |
GSI Authorization | p. 162 |
Delegation | p. 164 |
The Need for Delegation | p. 164 |
Proxy Certificates | p. 165 |
My Proxy Grid Credential Repository | p. 167 |
Higher-Level Authorization Tools | p. 170 |
Security Assertion Markup Language (SAML) | p. 171 |
Using Certificates for Authorization | p. 172 |
Summary | p. 174 |
Further Reading | p. 175 |
Bibliography | p. 175 |
Self-Assessment Questions | p. 176 |
Programming Assignments | p. 177 |
System Infrastructure I: Web Services | p. 179 |
Service-Oriented Architecture | p. 179 |
Web Services | p. 181 |
Concept | p. 181 |
Communication Protocols for Web Services | p. 183 |
Defining a Web Service Interface - WSDL | p. 184 |
Service Registry | p. 190 |
Web Service Implementation | p. 192 |
Web Service Containers | p. 192 |
Building and Deploying a Service | p. 193 |
Summary | p. 196 |
Further Reading | p. 196 |
Bibliography | p. 197 |
Self-Assessment Questions | p. 197 |
Programming Assignments | p. 199 |
System Infrastructure II: Grid Computing Services | p. 201 |
Grid Computing and Standardization Bodies | p. 201 |
Interacting Grid Computing Components | p. 202 |
Development of a Service-Oriented Approach | p. 202 |
Staieful Web Services | p. 203 |
Transient Services | p. 204 |
Open Grid Services Architecture (OGSA) | p. 205 |
Purpose | p. 205 |
Open Grid Services Infrastructure (OGSI) | p. 205 |
WS-Resource Framework | p. 206 |
Generic Stateful WSRF Service | p. 209 |
Additional Features of WSRF/GT4 Services | p. 213 |
Information Services | p. 215 |
Summary | p. 219 |
Further Reading | p. 219 |
Bibliography | p. 219 |
Self-Assessment Questions | p. 220 |
Programming Assignments | p. 222 |
User-Friendly Interfaces | p. 223 |
Introduction | p. 223 |
Grid Computing Workflow Editors | p. 224 |
Workflows | p. 224 |
Workflow Editor Features | p. 225 |
GridNexus | p. 226 |
Grid Portals | p. 234 |
General Features | p. 234 |
Available Technologies | p. 236 |
Early Grid Portals | p. 239 |
Development of Grid Portals with Portlets | p. 241 |
Summary | p. 250 |
Further Reading | p. 250 |
Bibliography | p. 251 |
Self-Assessment Questions | p. 252 |
Programming Assignments | p. 255 |
Grid-Enabling Applications | p. 259 |
Introduction | p. 259 |
Definition of Grid Enabling | p. 259 |
Types of Jobs to Grid Enable | p. 260 |
Parameter Sweep | p. 261 |
Parameter Sweep Applications | p. 261 |
Implementing Parameter Sweep | p. 261 |
Using an Existing Program on Multiple Grid Computers | p. 265 |
Data Partitioning | p. 265 |
Deploying Legacy Code | p. 267 |
Exposing an Application as a Service | p. 267 |
Writing an Application Specifically for a Grid | p. 269 |
Using Grid Middleware APIs | p. 269 |
Higher Level Middleware-Independent APIs | p. 270 |
Using Multiple Grid Computers to Solve a Single Problem | p. 271 |
Parallel Programming | p. 271 |
Message-Passing Approach | p. 272 |
Message-Passing Interface (MPI) | p. 273 |
Grid-Enabled MPI | p. 282 |
Grid Enabling MPI Programs | p. 286 |
Summary | p. 288 |
Further Reading | p. 288 |
Bibliography | p. 288 |
Self-Assessment Questions | p. 290 |
Programming Assignments | p. 291 |
Internet And Networking Basics | p. 293 |
Linux And Windows Command-Line Interfaces | p. 303 |
Xml Markup Language | p. 315 |
Globus Installation Tutorial | p. 331 |
Glossary | p. 345 |
Answers To Self-Assessment Questions | p. 357 |
Index | p. 359 |
Table of Contents provided by Ingram. All Rights Reserved. |