workspace sc04 poster final

Upload: ashish-panchal

Post on 04-Jun-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 Workspace Sc04 Poster Final

    1/1

    The VM deployment process has 3 major steps:1. The client queries the VM repository, sending a list of criteria

    describing a worspace. The repository returns a list of VMdescriptors that match them.

    !. The client contacts the VMManager, sending it the descriptorof the VM they want to deploy, along with an identifier, and alifetime for the VM. The VMManager authori"es the requestusing an access control list.

    3. The VM instance is registered with the VMManager and theVM is copied from the VM#epository. The VMManager theninterfaces with the VMM on the resource to power on the VM.

    ow does using VMs help the Bioinformatics community?

    irtual Machines meet the Grids

    Performance Implications

    Do VMs fulfill their promise?

    VM Deployment

    The performance of applications running on a VM depends on thethird$party VMMs and the applications themsel%es. & purely '()bound program will ha%e almost no performance degradation asall instructions will be e*ecuted directly on hardware. Typically,%irtual machines intercept pri%ileged instructions +such as -/resulting in a performance hit for those instructions although newmethods, such as those implemented by 0en, impro%e thisfactor. n our implementation, we e*perimented with VMare

    orstation and 0en and in our e*perience slowdown wasne%er more than 32 and is often less than 4. +The 0enslowdown was muchless than 32/

    oader base of resources:ur tests show that this first promise is met. 'onsider the following situation: aientist can use a testbed on 67 8cience 9rid across se%eral clusters. & scientist has access to !2 8olarisdes in 5;, !2 nodes in &; minutes !3 seconds(eace of mind +not ha%ing to debug installation/: priceless@

    ne 9rained resource management: 6epending on the implementation of, a VM can pro%ide fine$grainedsource usage enforcement critical in many scenarios in the 9rid

    hanced security:VMs offer enhanced isolation and are therefore a more secure solution for representinger en%ironments.

    Migration

    Complex applications require customized software

    configurations such en!ironments may not "e widely a!aila"le on

    #rid nodesInstalling scientific applications "y hand can "e arduous$ lengthy

    and error%prone the a"ility to amortize this process o!er many

    installations would helpPro!iding good isolation of #rid computations is a &ey security

    requirement the currently used mechanism of 'nix accounts is not

    sufficientPro!iding a !ehicle for fine%grained resource usage enforcement

    is critical for more efficient use of #rid resources$ yet such

    technology is not widely a!aila"le(he a"ility to migrate or restart applications would "e of

    enormous !alue in a #rid en!ironment yet the current #rid

    framewor&s do not support it

    &fter a scientist has deployed a VM onto the resource, he mayrun an application in it. Aor this purpose, each of our VMs wasconfigured with the 9lobus Toolit. This picture represents ascientist running the T( program, creating an image of atransmembrane protein.

    A Glossary of Terms:VMM(Virtual MachineMonitor) B a 3rd$party toolpro%iding the interfacebetween a Virtual Machine andthe host machine. 8omee*amples of VMMs are VMareand 0en.

    uality of !ife in the Grids: VMs meet Bioinformatics Applications

    6aniel 9alronC1D

    Tim AreemanC!DEate EeaheyC3D

    8tephanie 9atoC?D ;atalia Maltse%C4D &le* #odrigue"C>D

    Mie ildeCFDC1D

    The hio 8tate )ni%ersity. galronGcis.ohio$state.edu C!D &rgonne ;ational aboratory. tfreemanGmcs.anl.go%C3D

    &rgonne ;ational aboratory. eaheyGmcs.anl.go%

    C?Dndiana )ni%ersity. sgatoGcs.indiana.edu C4D&rgonne ;ational aboratory. maltse%Gmcs.anl.go% C>D&rgonne ;ational aboratory. arodriFGmcs.anl.go%

    CFD&rgonne ;ational aboratory. wildeGmcs.anl.go%

    Descri"ing VM Properties

    & VM constitutes a %irtual worspace configured to meetthe requirements of 9rid computations. e use an 0M8chema to describes %arious aspects of such worspaceincluding %irtual hardware +#&M si"e, dis si"e, Virtual'6$#M dri%es, serial ports, parallel ports/, installedsoftware including the operating system +e.g. ernel%ersion, distribution type/ as well as library signature, aswell as other properties such as image name and VMowner. 5ased on those descriptions VMs can be selected,duplicated, or further configured.

    ntegrating Virtual Machines with 9rid technology allowseasy migration of applications from one node to another.The steps are as follows:

    1. )sing 9rid software, the client free"es e*ecution of the VM!. The client then sends the HmigrateI command to the

    VMManager, specifying the new host node as a parameter3. &fter checing for the proper authori"ation, the VM is

    registered with the new host and a 9ridAT( call transfersthe image

    n terms of performance this is on a par with deployment B itis mainly bound by the length of transfer. n our tests, wemigrated a !95VM image from two identical nodesthrough a Aast 7thernet connection.

    VMManagerB 9rid ser%ice interfaceto allow a remote client to interact

    with the VMMVM"epository B 9rid ser%ice whichcatalogues VM images of a V andwhich stores them for retrie%al anddeploymentAuthori#ation $er%iceB 9rid ser%icewhich the VMManager andVM#epository ser%ices call to chec if auser is authori"ed to perform therequested operation

    Issues or Pro"lems )ncountered

    hen de%eloping the architecture we encountered se%eral important but interesting issues andproblems we had to resol%e.

    'locs:hile a VM image is fro"en or powered$off, the VM