Documente Academic
Documente Profesional
Documente Cultură
GRID COMPUTING
6. Define Scheduler:
Schedulers are types of applications responsible for the management of jobs,
such as allocating resources needed for any specific job, partitioning of jobs to
schedule parallel execution of tasks, data management, event correlation and servicelevel management capabilities.
7. What are the areas we need scheduler?
Advanced resource reservation
Service level agreement validation and enforcement
Job and resource policy management and enforcement for best turnaround
times within the allowable budget constraints
Monitoring job execution and status
Rescheduling and corrective actions of partial failover situations
8. What is the use of resource broker?
The resource broker provides pairing services between the service requester
and the service provider.
9. What is the use of load balancing?
To avoid processing delays and over commitment of resources.
10. List out the grid portal capabilities:
Querying databases or LDAP servers for resource-specific information
File transfer facilities such as file upload, down load, integration with custom
software, and so on
Manage job through job status feedbacks.
Allocate the resources for the execution of specific tasks.
Security management
Provide personalized solutions
11. What are the uses of Integrated Solutions?
The integrated solutions are a combination of the existing advances
middleware and application functionalities, combined to provide more coherent and
high performance results across the grid Computing environment.
12. What are the areas are difficult to implement in Grid Computing
Infrastructure?
A Grid computing infrastructure component must address several potentially
complicated areas in many stages of the implementation. These areas are
Security
Resource management
Information services
Data management
SNSCT Department of Computer Science & Engineering
(UG&PG)
Page 2
GRID COMPUTING
13. Define grid computing:
Grid concept is defined as control sharing of resources and problem solving in
dynamic, multi institutional virtual organization.
Grid computing is a open standard.
It has well defined policies and conditions to solving the problem.
14. What are the grid applications?
Scheduler
Resource broker
Grid portals
Load Balancing
Integrated solutions
15. What is meant by grid infrastructure?
Grid infrastructure is a complex combination of a number of capabilities and
resources identified for the specific problem and environment being addressed. It
forms the core foundations for successful grid applications.
16. List some grid computing toolkits and frameworks?
Globus Toolkit
Globus Resource Allocation Manager(GRAM)
Grid Security Infrastructure(GSI)
Information Services
Legion
Condor and Condor-G
NIMROD
UNICORE
NMI
17. Write short notes on Legion.
Legion is a middleware project initiated by University of Virginia, is object
based meta system software for grid applications. The goal of legion project is to
promote the principled design of distributed system software by providing standard
object representations for processors, data systems, file system and so on.
18. Define some important characteristics of legion system:
Everything is an object
Classes manage their own instances
Users can provide their own classes
Core objects implement common services
19. Define short notes on GRAM:
GRAM provides resource allocation, process creation, monitoring, and
management services. The most common use of GRAM is the remote job submission
and control facility. GRAM simplifies the use of remote systems.
SNSCT Department of Computer Science & Engineering
(UG&PG)
Page 3
GRID COMPUTING
20. What is mean by middleware?
Middleware is software that connects two or more other wise separate
applications across the Internet or local area network. Middleware makes resource
sharing seem transparent to the end user, providing capabilities, consistency, security
and privacy.
21. What is the major difference between condor and condor G?
Condor is a tool for harnessing the capacity of idle workstations for
computational tasks. Condor-G is a derivative software system, which leverages the
software from Condor and Globus with major focus on the job management services
for grid applications. This is a combination of interdomain resource management
protocols of globus with the intra domain resource management methods of Condor.
22. How do p2p environments differ from grid environments?
The major difference between Grid computing and p2p computing is centered on
the following notable points:
They differ in their target communities. Grid communities can be small with
regard to number of users, yet will yield a greater applications focus with a
higher level of security requirements and application integrity.
On the other hand, the p2p systems define collaboration among a larger
number of individuals and/or organizations, with a limited set of security
requirements and a less complex resource-sharing topology.
23. What is the primary objective of GGF?
The GGFs primary objective is to promote and support development,
deployment and implementation of grid technologies and applications via creation and
documentation of best practices-specifications, use cases, architecture and
implementation guidelines.
24. What are the best goals of GGF?
The basic goals of the GGF are to
Create an open process for the development of grid agreements and
specifications
Create grid specifications, architecture documents, and best practice
guidelines.
Manage and version controls the documents and specifications
Handle intellectual property policies
Provide a forum for information exchange and collaboration.
25. What are the major areas of GGF?
Application and programming environments
Architecture
Data
Information systems and performance
Peer-to-peer: Desktop grids
Scheduling and resource management
SNSCT Department of Computer Science & Engineering
(UG&PG)
Page 4
GRID COMPUTING
Security
GRID COMPUTING
Self-protecting
GRID COMPUTING
Part B
1. Explain in detail about virtual organization.(16)
2. Write about the scope of grid computing in business areas. (16)
3. Explain some of the grid application and their usage patterns. (16)
4. Write short notes on.(16)
a) Schedulers
b)Resource broker
c) Load balancing
d) Grid portals
5. What are the data and functional requirements of grid computing? .(16)
6. Explain briefly about grid infrastructure. .(16)
7. a) Explain about the organization developing grid standards and best practices
guidelines (8)
b) Explain about the organization working to adopt grid concepts into
commercial products.(8)
8. Discuss briefly about organization building and using grid based solution to
solve their computing data and network requirements. .(16)
9. Write notes on organizations developing grid computing toolkits frameworks
and middleware solution. .(16)
10. Explain the layered architecture of grid with a neat diagram. (16)
11. Describe about the relation of grid architecture with other distributed
technologies. .(16)
12. Write notes on
Autonomic computing (4)
BOD and infrastructure virtualization (4)
Service oriented architecture and grid (4)
Semantic grids (4)
UNIT-2 GRID COMPUTING ROADMAP
1. Define SOA.
Service oriented architecture is intended to define loosely coupled and
interoperable services applications, and to define process for integrating these
interoperable components. In SOA, the system is decomposed into a collection of
network-connected components. Applications and resources within a SOA shouldnt
SNSCT Department of Computer Science & Engineering
(UG&PG)
Page 7
GRID COMPUTING
be built as a tightly coupled monolithic model. Rather; these applications are
composed dynamically from the deployed and available services in the network.
2. What are the fundamental components of SOAP specification?
An envelope that defines a framework for describing message structure.
A set of encoding rules for expressing instances of application-defined data
types.
A convention for representing remote procedure (RPC) and responses.
A set of rules for using SOAP with HTTP.
Message exchange patterns (MEP) such as request-response, one-way and
peer-topeer
conversations.
3. Define SOAP.
SOAP is a simple and lightweight XML-based mechanism for creating
structured data packages that can be exchanged between network applications. SOAP
provides a simple enveloping mechanism and is proven in being able to work with
existing networking services technologies such as HHTP.SOAP is also flexible and
extensible. SOAP is based on the fact that it builds upon the XML info set.
4. What are the options related to processing in the SOAP process model?
There are two options related to processing.
If the SOAP header is targeted to this node and specifies a must understand
flag set to true, then the processing node must process that header.
If there is no such requirements (that is must understand flag is not set),it is
up to the preprocessing node to decide on the processing of the message. Once
the processing is completed, the message will be directed to the next node. The
decision on the next node selection is not specified by the SOAP specification.
Therefore it is now the choice of the processing node to make such decision.
5. How does the process of relaying is done in SOAP headers?
A header can have a relay attribute value (i.e. true or false)to indicate that
nonprocessed headers get forwarded to the next node. The default value is false.
This indicates a SOAP node, which is targeted by this header, will not forward this
header to the next node.
6. What are the characteristics of the SOAP feature?
A unique name used to identify the feature and its properties. This enables us
to identify whether a SOAP node supports a specific feature.
A set of properties associated with a feature that can be used to control,
constrain, or identify a feature.
7. What are the two important mechanisms for implementing the SOAP
features?
SOAP header blocks:
SNSCT Department of Computer Science & Engineering
(UG&PG)
Page 8
GRID COMPUTING
In this kind of implementation SOAP header blocks are used to specify the feature
.These headers are processed by the SOAP nodes. SOAP node in order to process an
individual message. The most common eg of such a feature is the security features as
defined by WS-security specifications.
SOAP binding protocol:
The features are directly implemented in the protocol binding level. For e.g., a
binding extension to support the SOAP over SSL protocol.
8. Define MEP.
It is one of the special type of SOAP feature. A SOAP MEP is a template that
establishes a pattern for the exchange of message between SOAP nodes. Some of the
examples of SOAP include request/response, one way, peer-to-peer conversation, and
so on.
9. What is SOAP module?
The combined syntax and semantics of SOAP headers are known as SOAP
module. A SOAP module realizes one or more SOAP features. This enables to specify
a more general purpose concepts such as a secure purchase order, the purchase order
of MEP,the security feature and more.
10. Define WSDL.
WSDL is an XML Info set based document, which provides a model and XML
format for describing web services. This enables services to be described and enables
the client to consume these services in a standard way without knowing much on the
lower level protocol exchange binding including SOAP and HTTP. This high level
abstraction on the service limits human interaction and enables the automatic
generation of proxies for web services, and these proxies can be static or dynamic. It
allows both document and RPC-oriented messages.
11. List out the vision behind Global XML Architecture:
Providing standards-based and interoperable protocol definitions.
Reducing development efforts by separating infrastructure protocols from
application and transport protocols.
Providing open standards-based designs for interoperable messaging across
multiple vendors.
12. Major building blocks identified by GXA:
Message-level security.
Exchanging transaction-aware messages.
Message exchange coordination among participants.
Reliable message exchange patterns.
Message routing and referral processes.
Addressing mechanisms to dispatch messages to the intended party.
Service and message policies for proper message handling.
Attachments to foreign bodies that wont fit with regular messages.
Metadata information exchange.
GRID COMPUTING
13. What is WS-Federation?
WS-Federation defines mechanisms that are used to enable identify, attribute,
authentication and authorization federation across different trust environments.
14. Mention the two type of message encoding used in WSDL 1.1.
The two types of message encoding are literal encoding and SOAP encoding.
Literal encoding specifies that the messages will be constructed using XML schema
literal, and SOAP encoding occurs according to the SOAP encoding rules
encoded defined in th SOAP specification.
15. What is mean by target Resource?
The target Resource is an attribute of a service element with a URI value
representing the resource URI.
16. What is WS-Secure Conversation?
This specification defines extensions that build on WS-Security to provide
secure communication. The mechanisms provided include provisions for establishing
and sharing security contexts and deriving session keys from security contexts.
17. What is WS-trust?
WS-Trust deals with different aspects of secure token services including how
to request a token and the issuing of tokens in a trusted manner. This issuance of
tokens must be secure and built on top of WS-Security. The secure token services can
be a contact point for secure negotiation through delegation and impersonation.
18. What is WS-Addressing?
WS-Addressing provides transport-neutral mechanisms to address Web
services and
messages. This capability is provided by the specification using two constructs:
A flexible and extendable end-point reference description model.
A set of SOAP message header and rules to map the above reference elements
to
the header elements.
19. What are the uses of XML Schema?
Service Publication and Discovery.
Security
Tools.
20. What do you mean by Grid Services?
Grid services are stateful Web services. The service itself maintains some state
information and it exposes a set of standard interfaces to enable interactions with its
client.
21. What is XM Data Model?
The core of Web services is the XML data model or the XML information set.
This is defined by the W3C and forms the core of all XML specifications including
SNSCT Department of Computer Science & Engineering
(UG&PG)
Page 10
GRID COMPUTING
SOAP and WSDL. This common base allows creation of adaptable tools and XML
processors.
Part B
1. Explain briefly about SOA.(16)
2. Explain briefly about Web service architecture .(16)
3. Explain in detail about SOAP.(16)
4. What are the service message description mechanism available?. Explain. .(16)
5. Explain briefly about WSDL. (16)
6. Discuss in detail about global XML Architecture vision.(16)
7. Discuss in detail about web service and grid service.(16)
8. Explain in detail about Basic Profile guidelines.(16)
GRID COMPUTING
remote centers. This eliminates burden on the end users but adds some QOS
requirements on the SP, including executing the code, executing within a certain time
frame, and produce the results with accuracy.
5. What are the layers of OGSA architectural organization?
Native platform services and transport mechanism.
OGSA hosting environment.
OGSA transport security.
OGSA infrastructure (OGSI).
OGSA basic services (meta-OS and domain services).
6. What are the two dimensions to state the nature of a web services?
The service is maintaining its state information. These are normally classified
as application state and in the case of grid service it directly maps to the state
of the resource.
The interaction pattern between the client and the service can de stateful.
There are numerous architecture styles and programming models for defining
these interactions including BPEL4WS and REST.
7. What are the core requirements for describing web services based on OGSI?
The ability to describe the interface inheritance.
The ability to describe additional information elements (state
data/attributes/properties)
with the interface definitions.
8. What do you mean by the term flattening?
Basically,GWSDL extensions are to be transformed to WSDL.All the
extends port types and their operations, which are brought down to a single most
derived portType. This process is called flattening of the interface hierarchy to the
most derived type.
9. What are the SDE attributes of OGSI schema type for service data?
The new OGSI schema type contains seven predefined attributes, including
name, type, minOccurs, maxOccurs, modifiable, mutability, and nilable.These are
standard XSD types with the exception of the mutability attribute. This is further
defined by OGSI as an enumerated type, with the values of static, constant,
extendable and mutable.
10. What are the lifetime properties of OGSI specification?
This time from which the contents of this element are valid (ogsi: goodFrom).
This time until which the contents of this element are valid (ogsi:goodUntil).
This time until which this element itself is available (ogsi: availableUntil).
11. What is soft-state lifetime management?
The soft-state lifetime management approach is a recommended method in the
grid service life-cycle management process. Every grid service has a terminated time
set by the service creator. This soft-state lifecycle is controlled by appropriate security
SNSCT Department of Computer Science & Engineering
(UG&PG)
Page 12
GRID COMPUTING
and policy decisions of the service and the service has the authority to control this
behavior.
12. What are Grid service Interfaces?
The grid service interfaces and their associated behaviors are described by the
OGSI specification. This OGSI interfaces are classified into three sets of interfaces
based upon their functionality. They are
OGSI core
Notification
Service groups.
13. What are the rules for handling the services of the set operation on service
data?
The rules are as follows:
The service Data must be modifiable; the SDE-modifiable attribute must be
true.
The service Data mutability attribute should not be static or constant.
If the service Data mutability attribute is extendable the set operation must
append the new SDE values to the existing SDE values.
If the service Data mutability attribute is mutable the set operation must
replace the existing SDE values with the new SDE values.
The SDE values, append and replace must adhere to the minOccurs and
maxOccurs attributes on SDE values.
14. What is handle resolver?
Handle resolving is a standard mechanism to resolve a GSH into a GSR. This
is an optional feature based on the Handler solver port Type. A grid service instance
that implements the Handler solver port Type is called a handle resolver.
15. Explain about MembershipContentRule:
Deriving a service from the ServiceGroup portType and utilizing the
MembershipContentRule service data for the classification mechanisms can create a
grouping concept similar to a registry. This rule service data is used to restrict the
membership of a grid service in the group.
16. What are the two types of clients in Grid Service?
Static:
1. These kinds of clients have plurality of a priori knowledge on the
runtime binding information.
2. These are faster but less flexible in operations.
Dynamic:
1. These types of clients ar flexible and they are not bound to any
predefined artifacts.
2. These are highly flexible but less efficiencies.
17. Define CMM:
GRID COMPUTING
CMM (Common Management Model) is an abstract representation of real IT
resources such as disks, file systems, operating systems, network ports and IP
addresses.
18. What are the three aspects of manageability in CMM specification?
An XML schema (XSD) for modeling the resource manageability information.
A collection of manageability port Types.
Guidelines for modeling resource.
19. What is service domain?
The OGSA service domain architecture proposes a high level abstraction
model to describe the common behaviors, attributes, operations and interfaces to
allow a collection of services to function as a single unit.
20. What are the functionalities provided by the service domain components?
Service registration and collection
Service routing and selection
Service interoperation and transformation
Flexible service composition
Automatic service orchestration
21. What are the various levels of Policy Abstraction?
Business Level
Domain Level
Device Level
Part B
1. Describe the architecture of OGSA.(16)
2. Explain briefly about commercial data center.(16
3. Explain briefly about NGC.(16)
4. Explain briefly about Commercial grid.
5. What are the OGSA platform components? Write note on each of them. (16)
6. Describe in detail about the inheritance interface diagram.(16)
7. Describe in detail about service data concepts(16)
8. Explain briefly about CMM.(16)
9. What are the OGSA basic services? Explain each of them with necessary
diagrams. .(16)
10.(a) Write notes on policy architecture (8)
(b) Write notes on security architecture (8)
11.(a) Write notes on metering and accounting (8)
(b)Write notes on common distributed logging (4)
(c)Write notes on distributed data access and replication (4).
UNIT IV SCHEDULING GRID SERVICES
1.What are the functions of static heuristics algorithm?
Opportunistic Load Balancing (OLB)
SNSCT Department of Computer Science & Engineering
(UG&PG)
Page 14
GRID COMPUTING
GRID COMPUTING
Enterprise Grids
High Performance Computing Grids
Global Grids
GRID COMPUTING
Data-intensive applications executing over a computational grid demand large
data transfers which are normally costly operations. Therefore, taking them into
account is mandatory to achieve efficient scheduling of data intensive applications on
grids.
12.What is external,local and dataset scheduler
External Scheduler (ES): Users submit jobs to the External Scheduler they are
associated with.
Local Scheduler (LS): Once a job is assigned to run at a particular site (and sent to
an incoming job queue) it is then managed by the Local Scheduler.
Dataset Scheduler (DS): The DS at each site keeps track of the popularity of each
dataset locally available. It then replicates popular datasets to remote sites depending
on some algorithm.
13.Defines principles of data grid architecture.
Mechanism neutrality. The data grid architecture is designed to be as
independent as possible of the low-level mechanisms used to store data, store
metadata, transfer data, and so forth.
Policy neutrality. Within the data grid architecture, data movement and replica
cataloging are provided as basic operations, but replication policies are
implemented via higher-level procedures. Although default policies are
provided, users can easily substitute these policies with application-specific
code.
Compatibility with grid infrastructure. The data grid tools should be
compatible with lower-level grid mechanisms. This approach also simplifies
the implementation of strategies that integrate, for example, storage and
computation.
Uniformity of information infrastructure. This means that we use the same
data model and interface to access the data grids metadata, replica, and
instance catalogs as are used in the underlying grid information infrastructure.
14.Types of fault-tolerant algorithms
Robust algorithm: Robust algorithms are designed to guarantee the correct behavior
of the processes which function correctly in spite of faults occurring in other
processes during their execution. These algorithms are based on strategies such as the
vote or the replication, which maintains the correct behavior of a failure process by
other backup processes.
These algorithms will never be blocked by the failure of processes, because of the
strategies of the vote and the replication. Usually, a robust algorithm is used to deal
with permanent faults.
Stabilizing algorithms: Stabilizing algorithms permit the failure of correct processes.
Correct processes might be affected by failure, but the algorithm will eventually repair
the failure after certain times. The system with these algorithms can be started in any
state (possibly faulty), and stabilizing algorithms should finally resume the correct
behavior.
15.Define Replication processes:
The replication is a technique achieving fault tolerance in a distributed system.
The replication is considered an effective means to increase the reliability of a
SNSCT Department of Computer Science & Engineering
(UG&PG)
Page 17
GRID COMPUTING
distributed system. Moreover, the replication can improve the performance of the
system by using the backup servers
PART- B
1.Explain Scheduling algorithms and strategies.
2.Explain service discovery services.
3,Eloborate resource information.
4.Explain Data-intensive service scheduling.
5.Explain fault tolerance techniques.
6.Explain meta schedulers.
7.Explain meta scheduling and grig scheduling schemes.
UNIT-5 GLOBUS GT3 TOOL KIT
1. What are the two aspects involved in GRAM?
Job submission
Resource Management
2. What are the services provided by GT3?
Transient services
Persistent services
3. What are the Expression evaluators supported in GT3?
Service Data Name Evaluator
Service Data Name Set Evaluator
Service Data Name Delete Evaluator
Service Data XPath Evaluator
GRID COMPUTING
7. What is GRIM?
Grid Resource Identity Mapper(GRIM) service is executing in the UHE to
create a user host certificate.The user host certificate is utilized for mutual
authentication between the MJS service and the client.
8. What are the sections in configuration file?
Installed providers
Executed providers
Aggregated subscriptions
9. What are the functions of the index service configuration file?
Specifies the service data provider to be enabled for each of the services
referencing this configuration file.
Specifies which of the enabled providers are to be executed at startup and/or
when the configuration file is read.It contains the necessary parameters
relevant to the providers execution.
Specifies notification and subscription of service data to other service
instances,which allows for aggregation of service data from multiple services
10. What is the use of File Stream factory Service?
These are helpful services to manage the data needed for the job
execution.The factory service creates two file stream services: stdout and stderr.Each
of these services has two service results:the URL for the stream destinations and a
flag to indicate the activity.
11. What is the function of RFT?
The reliable file transfer service(RFT) is an OGSA-based service that provides
interfaces for controlling vand monitoring third-party file transfers using the GridFTP
servers.The client controlling the transfer is hosted inside of a grid service so that it
can then be managed using the soft state model,and queried using the service data
interfaces available to all grid services.
GRID COMPUTING
GRID COMPUTING
5. Write notes on data management services.(16)
6. Explain briefly about service programming model.(16)
PREPARED BY
VERIFIED BY
R.M.Bhavadharni
P.Dhivya
S.R.Janani
REVIEWED BY
APPROVED BY