You are previewing Cloud, Grid and High Performance Computing.
O'Reilly logo
Cloud, Grid and High Performance Computing

Book Description

Cloud, Grid and High Performance Computing: Emerging Applications offers new and established perspectives on architectures, services and the resulting impact of emerging computing technologies. Intended for professionals and researchers, this publication furthers investigation of practical and theoretical issues in the related fields of grid, cloud, and high performance computing.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Preface
  5. Section 1: Introduction
    1. Chapter 1: Supercomputers in Grids
      1. ABSTRACT
      2. INTRODUCTION
      3. DEFINITIONS
      4. GRIDS AND SUPERCOMPUTERS
      5. THE ROLE OF SUPERCOMPUTERS IN GRIDS
      6. A PUBLIC-PRIVATE SUPERCOMPUTING-GRID PARTNERSHIP
      7. DISCUSSION OF RESULTS
      8. CONCLUSION
    2. Chapter 2: Porting HPC Applications to Grids and Clouds
      1. ABSTRACT
      2. INTRODUCTION
      3. APPLICATIONS AND THE GRID INFRASTRUCTURE
      4. GRID APPLICATIONS AND DATA
      5. PORTING AND PROGRAMMING GRID APPLICATIONS
      6. GRID-ENABLING APPLICATION PROGRAMS AND NUMERICAL ALGORITHMS
      7. GRID CASE STUDY: HPC ON THE DEISA E-INFRASTRUCTURE
      8. HPC APPLICATIONS IN THE CLOUD
      9. CLOUD CASE STUDIES: HPC APPLICATIONS ON AMAZON
      10. CONCLUSIONS: GRIDS VERSUS CLOUDS FOR HPC
      11. CONCLUSIONS: TEN RULES FOR BUILDING SUSTAINABLE GRID AND CLOUD E-INFRASTRUCTURES FOR HPC APPLICATIONS
    3. Chapter 3: Grid-Enabling Applications with JGRIM
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. JGRIM
      5. EVALUATION AND DISCUSSION
      6. CONCLUSION AND FUTURE WORK
  6. Section 2: Scheduling
    1. Chapter 4: Moldable Job Allocation for Handling Resource Fragmentation in Computational Grid
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. COMPUTATIONAL GRID MODEL AND EXPERIMENTAL SETTING
      5. MOLDABLE JOB ALLOCATION ON HOMOGENEOUS PARALLEL COMPUTER
      6. MOLDABLE JOB ALLOCATION IN HETEROGENEOUS GRID
      7. COMPARISON WITH MULTI-SITE CO-ALLOCATION
      8. CONCLUSION
    2. Chapter 5: Speculative Scheduling of Parameter Sweep Applications using Job Behaviour Descriptions
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. ARCHITECTURE OVERVIEW
      5. JOB BEHAVIOUR DESCRIPTION
      6. GENERATING JOB DESCRIPTIONS
      7. SCHEDULING STRATEGIES
      8. IMPLEMENTATION
      9. SIMULATION RESULTS
      10. SUMMARY AND CONCLUSION
      11. FUTURE WORK
    3. Chapter 6: A Security Prioritized Computational Grid Scheduling Model
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. PROPOSED MODEL
      5. EXPERIMENTAL EVALUATION
      6. OBSERVATIONS AND CONCLUSION
    4. Chapter 7: A Replica Based Co-Scheduler (RBS) for Fault Tolerant Computational Grid
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED MODELS
      4. THE REPLICA BASED CO-SCHEDULER (RBS)
      5. INTEGRATION OF RBS WITH TSM
      6. ILLUSTRATIVE EXAMPLE
      7. EXPERIMENTAL STUDY
      8. CONCLUSION
  7. Section 3: Security
    1. Chapter 8: A Policy-Based Security Framework for Privacy-Enhancing Data Access and Usage Control in Grids
      1. ABSTRACT
      2. INTRODUCTION
      3. PRIVACY MANAGEMENT IN LARGE-SCALE DISTRIBUTED SYSTEMS
      4. GRIDS AND THEIR REQUIREMENTS FOR PRIVACY MANAGEMENT
      5. ARCHITECTURE OF A POLICY-BASED SECURITY FRAMEWORK FOR PRIVACY-ENHANCING DATA ACCESS AND USAGE CONTROL IN GRIDS
      6. APPLICATION OF THE SECURITY FRAMEWORK TO A XACML-BASED PRIVACY MANAGEMENT ARCHITECTURE
      7. INTEGRATION OF THE SECURITY FRAMEWORK’S PRIVACY MANAGEMENT COMPONENTS ON THE SERVICE PROVIDER SIDE
      8. SUMMARY AND OUTLOOK
    2. Chapter 9: Adaptive Control of Redundant Task Execution for Dependable Volunteer Computing
      1. ABSTRACT
      2. INSTRUCTION
      3. RELATED WORK
      4. A HEURISTICS-BASED FAILURE PROBABILITY ESTIMATION
      5. LEAST FAILURE PROBABILITY DISPATCH POLICY
      6. EVALUATION RESULTS
      7. CONCLUSION
    3. Chapter 10: Publication and Protection of Sensitive Site Information in a Grid Infrastructure
      1. ABSTRACT
      2. INTRODUCTION
      3. THE OPEN SCIENCE GRID
      4. INFORMATION COLLECTION IN OSG
      5. SUMMARY OF SECURITY RISKS
      6. RECOMMENDED GRID MIDDLEWARE CONFIGURATION
      7. RECOMMENDATIONS FOR DATA PROTECTION
      8. APPLICABILITY TO OTHER GRIDS
      9. FUTURE WORK
      10. CONCLUSION
    4. Chapter 11: Federated PKI Authentication in Computing Grids
      1. ABSTRACT
      2. AUTHENTICATION IN VIRTUAL ORGANIZATIONS
      3. PAST AND PRESENT OF AUTHENTICATION IN GRIDS
      4. PKI RESOURCE DISCOVERY IN GRIDS
      5. TRUST AND CERTIFICATION POLICIES
      6. INTEROPERABLE GRID PKIS: FIRST STEPS
      7. INTEGRATING PRQP INTO GRIDS
      8. PRQP AND TACAR: A REAL WORLD DEPLOYMENT
      9. TOWARDS GLOBAL GRID AUTHENTICATION
      10. CONCLUSION
    5. Chapter 12: Identifying Secure Mobile Grid Use Cases
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SECURITY REQUIREMENTS AND ATTACKS ON A MOBILE GRID SYSTEM
      5. OVERVIEW OF OUR PROCESS
      6. CASE STUDY
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    6. Chapter 13: Trusted Data Management for Grid-Based Medical Applications
      1. ABSTRACT
      2. INTRODUCTION
      3. USAGE SCENARIO
      4. LEGAL REQUIREMENTS
      5. BASIC GRID SECURITY INFRASTRUCTURE
      6. PROBLEM ANALYSIS
      7. THE TSRB FRAMEWORK
      8. CONCEPTS AND INTERACTIONS
      9. PUTTING IT ALL TOGETHER
      10. USABILITY
      11. CURRENT STATUS AND FUTURE WORK
      12. RELATED WORK
      13. DISCUSSION
  8. Section 4: Applications
    1. Chapter 14: Large-Scale Co-Phylogenetic Analysis on the Grid
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. FIT FOR THE GRID
      5. EXPERIMENTAL RESULTS
      6. CONCLUSION
    2. Chapter 15: Persistence and Communication State Transfer in an Asynchronous Pipe Mechanism
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. Π-CHANNELS: A PERSISTENT PIPE MECHANISM
      5. THE Π-CHANNEL API
      6. SEMANTICS OF Π-CHANNEL OPERATIONS
      7. DESIGN AND IMPLEMENTATION
      8. EXPERIMENTAL RESULTS
      9. CONCLUSION
    3. Chapter 16: Self-Configuration and Administration of Wireless Grids
      1. ABSTRACT
      2. INTRODUCTION
      3. KEY CHARACTERISTICS
      4. GRID LAYOUT
      5. TECHNICAL CHALLENGES
      6. SELF-CONFIGURING AND SELF-ADMINISTERING DYNAMIC ADDRESS SERVICES ACROSS VIRTUAL ORGANIZATIONS
      7. GRID OPERATION
      8. CONCLUSION
    4. Chapter 17: Push-based Prefetching in Remote Memory Sharing System
      1. ABSTRACT
      2. INTRODUCTION
      3. OVERVIEW
      4. SYSTEM DESIGN
      5. PREFETCHING ALGORITHM
      6. PERFORMANCE EVALUATION
      7. RELATED WORK
      8. CONCLUSION
    5. Chapter 18: Distributed Dynamic Load Balancing in P2P Grid Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORKS
      4. SYSTEM ARCHITECTURE
      5. EXPERIMENTAL RESULTS
      6. CONCLUSIONS AND FUTURE RESEARCH DIRECTIONS
    6. Chapter 19: An Ontology-Based P2P Network for Semantic Search
      1. ABSTRACT
      2. INTRODUCTION
      3. THE TWO-TIER SEMANTIC P2P NETWORK
      4. OVERVIEW
      5. ONTOLOGY-BASED SEMANTIC CLUSTERING
      6. THE UPPER-TIER NETWORK
      7. THE LOWER-TIER NETWORK
      8. QUERY ROUTING
      9. EVALUATION
      10. PROTOTYPE MEASUREMENT
      11. RELATED WORK
      12. CONCLUSION
    7. Chapter 20: FH-MAC
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORKS
      4. HYBRID MAC PROTOCOLS
      5. MULTI-CHANNEL MAC PROTOCOLS
      6. MAC PROTOCOLS WITH QOS
      7. H-MAC PROTOCOL
      8. PROTOCOL DESCRIPTION
      9. THE INITIALIZATION PHASE
      10. THE COMMUNICATION PHASE
      11. PERFORMANCE EVALUATION
      12. HYBRID SCHEME EVALUATION
      13. CHANNEL DIVERSITY EVALUATION
      14. CONCLUSION
    8. Chapter 21: A Decentralized Directory Service for Peer-to-Peer-Based Telephony
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. EXTENDED PREFIX HASH TREE ALGORITHM
      5. COMPARISON WITH THE ORIGINAL PREFIX HASH TREES
      6. EVALUATION
      7. CONCLUSION
      8. FUTURE RESEARCH DIRECTIONS
  9. Compilation of References
  10. About the Contributors