skip to main content
research-article

GWiQ-P: an efficient decentralized grid-wide quota enforcement protocol

Published:01 January 2008Publication History
Skip Abstract Section

Abstract

Mega grids span several continents and may consist of millions of nodes and billions of tasks executing at any point in time. This setup calls for scalable and highly available resource utilization control that adapts itself to dynamic changes in the grid environment as they occur. In this paper, we address the problem of enforcing upper bounds on the consumption of grid resources. We propose a grid-wide quota enforcement system, called GWiQ-P. GWiQ-P is light-weight, and in practice is infinitely scalable, satisfying concurrently any number of resource demands, all within the limits of a global quota assigned to each user. GWiQ-P adapts to dynamic changes in the grid as they occur, improving future performance by means of improved locality. This improved performance does not impair the system's ability to respond to current requests, tolerate failures, or maintain the allotted quota levels.

References

  1. EGEE. http://www.eu-egee.org.Google ScholarGoogle Scholar
  2. TeraGrid. http://www.teragrid.org.Google ScholarGoogle Scholar
  3. Condor manual version 6.6.6. https://www.cs.wisc.edu/condor.Google ScholarGoogle Scholar
  4. OpenPBS. http://www.openpbs.org.Google ScholarGoogle Scholar
  5. LSF. http://www.platform.com/products/lsf.Google ScholarGoogle Scholar
  6. Avaki. http://www.avaki.com.Google ScholarGoogle Scholar
  7. Ali Raza Butt, Rongmei Zhang, and Y. Charlie Hu. A self-organizing flock of condors. In SC '03: Proceedings of the 2003 ACM/IEEE conference on Supercomputing, page 42, Washington, DC, USA, 2003. IEEE Computer Society. ISBN 1-58113-695-1. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Galen Hunt and Doug Brubacher. Detours: Binary interception of Win32 functions. In Proceedings of the 3rd USENIX Windows NT Symposium, pages 135--144, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Xuxian Jiang, Dongyan Xu, and R. Eigenmann. Protection mechanisms for application service hosting platforms. In CCGRID '04: Proceedings of the 2004 IEEE International Symposium on Cluster Computing and the Grid, pages 656--663, Washington, DC, USA, 2004. IEEE Computer Society. ISBN 0-7803-8430-X. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Takahiro Shinagawa, Kenji Kono, and Takashi Masuda. Flexible and efficient sandboxing based on fine-grained protection domains. In ISSS, pages 172--184, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Ian Goldberg, David Wagner, Randi Thomas, and Eric A. Brewer. A secure environment for untrusted helper applications. In Proceedings of the 6th Usenix Security Symposium, San Jose, CA, USA, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Grzegorz Czajkowski and Thorsten von Eicken. Jres: A resource accounting interface for java. Technical report, Cornell University, Ithaca, NY, USA, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Niranjan Suri, Jeffrey Bradshaw, Maggie R. Breedy, Paul T. Groth, Gregory A. Hill, and Renia Jeffers. Strong mobility and fine-grained resource control in nomads. In ASA/MA 2000: Proceedings of the Second International Symposium on Agent Systems and Applications and Fourth International Symposium on Mobile Agents, pages 2--15, London, UK, 2000. Springer-Verlag. ISBN 3-540-41052-X. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. VMWare. http://www.vmware.com.Google ScholarGoogle Scholar
  15. Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, and Andrew Warfield. Xen and the art of virtualization. In SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, pages 164--177, New York, NY, USA, 2003. ACM Press. ISBN 1-58113-757-5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Qumranet Kernel based Virtual Machine (KVM). http://kvm.qumranet.com/kvmwiki.Google ScholarGoogle Scholar
  17. Yitzhak Birk, Liran Liss, Assaf Schuster, and Ran Wolff. A local algorithm for ad hoc majority voting via charge fusion. In DISC, pages 275--289, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  18. Jeffrey M. Jaffe and Franklin H. Moss. A responsive distributed routing algorithm for computer networks. IEEE Transactions on Communications, 30(7): 1758--1762, jul 1982.Google ScholarGoogle ScholarCross RefCross Ref
  19. K. Karmon, L. Liss, and A. Schuster. GWiQ-P: An efficient decentralized grid-wide quota enforcement protocol. In Proceedings of the 14th IEEE International Symposium on High Performance Distributed Computing 2005, HPDC-14, pages 222--232, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Alberto Medina, Anukool Lakhina, Ibrahim Matta, and John Byers. Brite: An approach to universal topology generation. In MASCOTS '01: Proceedings of the Ninth International Symposium in Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'01), page 346, Washington, DC, USA, 2001. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. L. Moreau and C. Queinnec. Distributed and multi-type resource management, 2002.Google ScholarGoogle Scholar
  22. Moez A. Abdel-Gawad, Shu Du, and Khaled ElMeleegy. Decentralized past quota system.Google ScholarGoogle Scholar

Index Terms

  1. GWiQ-P: an efficient decentralized grid-wide quota enforcement protocol

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image ACM SIGOPS Operating Systems Review
                ACM SIGOPS Operating Systems Review  Volume 42, Issue 1
                January 2008
                133 pages
                ISSN:0163-5980
                DOI:10.1145/1341312
                Issue’s Table of Contents

                Copyright © 2008 Authors

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 January 2008

                Check for updates

                Qualifiers

                • research-article

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader