Title: The LHC Grid
1The LHC Grid
- Norbert Podhorszki
- MTA SZTAKI
EGEE is funded by the European Union under
contract IST-2003-508833
2Acknowledgement
- This tutorial is based on the work of many
people - Fabrizio Gagliardi, Flavia Donno and Peter Kunszt
(CERN) - the EDG developer team
- the EDG training team
- the NeSC training team
- the SZTAKI training team
3What is LHC Grid?
- LHC stands for Large Hadron Collider to be built
by CERN - http//lhc-new-homepage.web.cern.ch/lhc-new-home
page/ - The LHC will be put in operation in 2007 with
many experiments collecting 5-6 PetaB data per
year - The LHC Grid was built by CERN in order to
provide storage and computing capacity for the
process of this huge data set - The LHC Grid current version is called LCG-2
- It was built based on the sw developed by the
European DataGrid project and by the Gryphin US
project - Now LCG-2 is the first EGEE infrastructure
4What is LHC Grid?
- The first EGEE infrastructure - Largest
functioning Grid - more than 70 sites, over 5,000 CPUs, 4,000 TB
- 5,000 jobs simultaneously
5What is EGEE ? (I)
- EGEE (Enabling Grids for Escience in Europe) is a
seamless Grid infrastructure for the support of
scientific research, which - Integrates current national, regional and
thematic Grid efforts, especially in HEP (High
Energy Physics) - Provides researchers in academia and industry
with round-the-clock access to major computing
resources, independent of geographic location
Applications
Grid infrastructure
Geant network
6What is EGEE ? (II)
- 70 leading institutions in 27 countries,
federated in regional Grids - 32 M Euros EU funding (2004-5), O(100 M) total
budget - Aiming for a combined capacity of over 20000
CPUs (the largest international Grid
infrastructure ever assembled) - 300 dedicated staff
7EGEE Community
8EGEE infrastructure
- Access to networking services provided by GEANT
and the NRENs - Production Service
- in place (based on HEP LCG-2)
- for production applications
- MUST run reliably, runs only proven stable,
debugged middleware and services - Will continue adding new sites in EGEE
federations - Pre-production Service
- For middleware re-engineering
- Certification and Training/Demo testbeds
9What do we expect from the Grid?
- Access to a world-wide virtual computing
laboratory with almost infinite resources - Possibility to organize distributed scientific
communities in VOs - Transparent access to distributed data and easy
workload management - Easy to use application interfaces
10The LCG-2 Architecture
Local Computing
Local Application
Local Database
Grid
Grid Application Layer
Data Management
Metadata Management
Job Management
Collective Services
Information Monitoring
Replica Manager
Grid Scheduler
Underlying Grid Services
Computing Element Services
Authorization Authentication Accounting
Replica Catalog
Storage Element Services
Logging Book-keeping
Database Services
Grid
Fabric services
Fabric
Node Installation Management
Monitoring and Fault Tolerance
Fabric Storage Management
Configuration Management
Resource Management
11Main Logical Machine Types (Services) in LCG-2
- User Interface (UI)
- Information Service (IS)
- Computing Element (CE)
- Frontend Node
- Worker Nodes (WN)
- Storage Element (SE)
- Replica Catalog (RC,RLS)
- Resource Broker (RB)
12User Interface
- The initial point of access to the LCG-2 Grid is
the User Interface - This is a machine where
- LCG users have a personal account
- The users certificate is installed
- The UI is the gateway to Grid services
- It provides a Command Line Interface to perform
the following basic Grid operations - list all the resources suitable to execute a
given job - replicate and copy files
- submit a job for execution on a Computing
Element - show the status of one or more submitted jobs.
- retrieve the output of one or more finished jobs
- cancel one or more jobs
- One or more UIs are available at each site part
of the LCG-2 Grid
13Main Logical Machine Types (Services) in LCG-2
- User Interface (UI)
- Information Service (IS)
- Computing Element (CE)
- Frontend Node
- Worker Nodes (WN)
- Storage Element (SE)
- Replica Catalog (RC,RLS)
- Resource Broker (RB)
14Computing Element (CE)
- Defined as a Grid batch Queue and identified by a
pair - lthostnamegtltportgt/ltbatch queue namegt
- Several queues defined for the same hostname are
considered different CEs. For example - adc0015.cern.ch2119/jobmanager-lcgpbs-long
- adc0015.cern.ch2119/jobmanager-lcgpbs-short
- A Computing Element is built on a homogeneous
farm of computing nodes (called Worker Nodes) - One node acts as a Grid Gate (GG) or front-end to
the Grid and runs - a Globus gatekeeper
- the Globus GRAM (Globus Resource Allocation
Manager) - the master server of a Local Resource Management
System that can be - PBS, LSF or Condor
- a local Logging and Bookkeeping server
- Each LCG-2 site runs at least one CE and a farm
of WNs behind it.
15Computing Element
- Computing Element entry
- point into a queue of a batch
- system
- information associated with a computing element
is limited only to information relevant to the
queue - Resource details relates to the system
infoService
gatekeeper
Batch server
Grid Gate node
CPUPIII RAM0.5GB OSLinux
CPUPIII RAM0.5GB OSLinux
CPUPIV RAM2GB OSLinux
CPUPIV RAM2GB OSLinux
in the example the red queue is assigned for two
hosts
16Main Logical Machine Types (Services) in LCG-2
- User Interface (UI)
- Information Service (IS)
- Computing Element (CE)
- Frontend Node
- Worker Nodes (WN)
- Storage Element (SE)
- Replica Catalog (RC,RLS)
- Resource Broker (RB)
17Storage Element (SE)
- A Storage Element (SE) provides uniform access
and services to large storage spaces. - Each site includes at least one SE
- They use two protocols
- GSIFTP for file transfer
- Remote File Input/Output (RFIO) for file access
18Storage Resource Management (SRM)
- Data are stored on disk pool servers or Mass
Storage Systems - storage resource management needs to take into
account - Transparent access to files (migration to/from
disk pool) - Space reservation
- File status notification
- Life time management
- SRM (Storage Resource Manager) takes care of all
these details - SRM is a Grid Service that takes care of local
storage interaction and provides a Grid interface
to outside world
19Storage Resource Management
- Support for local policy
- Each storage resource can be managed
independently - Internal priorities are not sacrificed by data
movement between Grid agents - Disk and tape resources are presented as a single
element - Reservation on demand and advance reservation
- Space can be reserved for registering a new file
- Plan the storage system usage
- File status and estimates for planning
- Provides info on file status
- Provide estimates on space availability/usage
20A Simple Configuration
Computing Element 1
Storage Element 1
CLOSE
User Interface Resource Broker Replica
Catalog Information Service
CLOSE
Storage Element 2
Computing Element 2
21SZTAKIs LCG-2 system
- LCG-2 local configuration
GRID GATE
n31.hpcc.sztaki.hu
(512MB, P4 2.53GHz)
- User Interface
- Computing Element
- Storage Element (69GB)
- Resource Broker
- ReplicaManager
n27.hpcc.sztaki.hu
n28.hpcc.sztaki.hu
Workernode 1
(128MB, Dual-PIII, 2x500MHz)
(128MB, Dual-PIII, 2x500MHz)
DefaultWorkernode2
22Main Logical Machine Types (Services) in LCG-2
- User Interface (UI)
- Information Service (IS)
- Computing Element (CE)
- Frontend Node
- Worker Nodes (WN)
- Storage Element (SE)
- Replica Catalog (RC,RLS)
- Resource Broker (RB)
23Information System (IS)
- The Information System (IS) provides information
about the LCG-2 Grid resources and their status - The current IS is based on LDAP (Lightweight
Directory Access Protocol) a directory service
infrastructure which is a specialized database
optimized for - reading,
- browsing and
- searching information.
- the LDAP schema used in LCG-2 implements the GLUE
(Grid Laboratory for a Uniform Environment)
Schema
24How to store Information?
- The LDAP information model is based on entries.
- An entry usually describes an object such as a
- person,
- a computer,
- a server, and so on.
- Each entry contains one or more attributes that
describe the entry. - Each attribute has a type and one or more values.
- Each entry has a name called a Distinguished Name
(DN) that uniquely identifies it. - A DN is formed by a sequence of attributes and
values. - Example The DN of a particular CE entry would
be - an attribute identifying the site (site_IDcern)
and - an attribute identifying the CE
(CE_IDlxn1102.cern.ch), - so the complete DN would be CE_IDlxn1102.cern.ch
,site_IDcern.
25The Directory Information Tree
- Based on their DNs, the entries can be arranged
into a hierarchical tree-like structure. - This tree of directory entries is called the
Directory Information Tree (DIT).
26Information System (IS)
- The IS is a hierarchical system with 3 levels
from bottom up - GRIS (Grid Resource Information Servers) level
(CE and SE level) - Grid Index Information Server (GIIS) level (site
level) - Top, centralized level (Grid level)
- the Globus Monitoring and Discovery Service (MDS)
mechanism has been adopted at the GRIS level - The other two levels use the Berkeley DB
Information Index (BDII) mechanism
27LCG-2 hierarchical Info system
BDII Berkley DB Information Index GIIS Grid
Index Information Server GRIS Grid Resource
Information Server CE Computing
Element SE Storage Element
28How to collect and store information?
- All services are allowed to enter information
into the IS - The BDII at the top
- queries every GIIS in every 2 min and
- acts as a cache storing information about the
Grid status in its LDAP database - The BDII at the GIIS
- collects info from every GRIS in every 2 min and
- acts as a cache storing information about the
site status in its LDAP database - The GRIS updates information according to the MDS
protocol
29How to obtain Information?
- All users can browse the catalogues
- To obtain the information the client should
- Ask BDII about possible GIIS/GRIS
- Directly query GIIS/GRIS
- Or use BDII cache
- The IS scales to 1000 sites (MDS much less
100)
30Main Logical Machine Types (Services) in LCG-2
- User Interface (UI)
- Information Service (IS)
- Computing Element (CE)
- Frontend Node
- Worker Nodes (WN)
- Storage Element (SE)
- Replica Catalog (RC,RLS)
- Resource Broker (RB)
31Data Management
- The Data Management services are provided by
- the Replica Management System (RMS) of EDG
- and the LCG Data Management client tools
- In LCG, the data files are replicated
- on a temporary basis,
- to many different sites depending on
- where the data is needed.
- The users or applications do not need to know
where the data is located, they use logical files
names - the Data Management services are responsible for
locating and accessing the data.
32File Management Motivation
Replica Manageratomic replication
operationsingle client interfaceorchestrator
Replica Catalog Map Logical to Site files
Replica Selection Get best file
Security
Pre- Post-processing Prepare files for
transfer Validate files after transfer
Replication Automation Data Source subscription
Site A
Site B
Load balancing Replicate based on usage
Metadata LFN metadata Transaction
information Access patterns
Storage Element A
Storage Element B
File Transfer
File A
File X
File A
File C
File B
File Y
File B
File D
33Data Management Tools
- Tools for
- Locating data
- Copying data
- Managing and replicating data
- Meta Data management
- In LCG-2 you have
- Replica Manager (RM)
- Replica Location Service (RLS)
- Replica Metadata Catalog (RMC)
RM
RLS
RMC
34Replication Services Basic Functionality
Each file has a unique Grid ID. Locations
corresponding to the GUID are kept in the Replica
Location Service.
Users may assign aliases to the GUIDs. These are
kept in the Replica Metadata Catalog.
Files have replicas stored at many Grid sites on
Storage Elements.
Replica Metadata Catalog
Replica Location Service
Replica Manager
The Replica Manager provides atomicity for file
operations, assuring consistency of SE and
catalog contents.
Storage Element
Storage Element
35Interactions with other Grid components
Virtual Organization Membership Service
User Interface or Worker Node
Resource Broker
Applications and users interface to data through
the Replica Manager either directly or through
the Resource Broker. Management calls should
never go directly to the SRM.
Information Service
Replica Metadata Catalog
Replica Location Service
Replica Manager
Storage Element
Storage Element
36Simplified Interaction Replica Manager
Storage Resource Manager
Replica Catalog
Replica Manager client
SRM
Storage
- The Client asks a catalog to provide the location
of a file - The catalog responds with the name of an SRM
- The client asks the SRM for the file
- The SRM asks the storage system to provide the
file - The storage system sends the file to the client
through the SRM or - directly
37Replica Manager (RM)
- High level data management on the Grid, takes
care of - Location of data
- Replication of data
- Efficient access to data
- Hides the SRM (Storage Resource Manager)
- User cannot access directly the SRM, only through
the RM - Coordinates the use of
- Replica Location Service
- Replica Metadata Catalog
38Interaction of the Replica Manager (RM) with
other Grid services
- The RM presents a single interface to the user or
other services - Some of the RM functionalities have been replaced
by a new, faster interface the LCG Data
Management client tools.
39File References and Replica Catalogs
- The files in the Grid are referenced by different
names - Grid Unique IDentifier (GUID)
- Logical File Name (LFN)
- Storage URL (SURL)
- Transport URL (TURL).
- the GUID or LFN refer to files and not replicas,
and say nothing about locations - the SURLs and TURLs give information about where
a physical replica is located.
RMC Replica Metadata Catalog
LRC Local Replica Catalog
40Abstract file names
- GUID
- A file can always be identified by its GUID
- GUID is assigned at data registration time
- GUID is based on the UUID standard to guarantee
unique IDs - A GUID is of the form guidltunique stringgt
- All the replicas of a file will share the same
GUID - LFN
- In order to locate a Grid accessible file, the
human user will normally use a LFN - LFNs are human-readable strings, they are
allocated by the user as GUID aliases - LFNs form is lfnltany aliasgt
41Physical file names
- SURL
- used by the RMS to find where a replica is
physically stored and by the SE to locate the
file - SURLs are of the form sfnltSE hostnamegt/ltlocal
stringgt - where ltlocal stringgt is used internally by the SE
to locate the file. - TURL
- TURL gives the necessary information to retrieve
a physical replica, including - hostname
- path
- protocol
- port (as any conventional URL)
42Replica Location Service (RLS)
- RLS maintains information about the physical
location of the replicas (mapping with the
GUIDs). - It is composed of several Local Replica Catalogs
(LRCs) which hold the information of replicas for
a single VO.
43Replica Metadata Catalog (RMC)
- The RMC stores the mapping between GUIDs and the
respective aliases (LFNs) - Maintains other metada information (sizes, dates,
ownerships. . . )
44User Interfaces for Data Management
- Users are mainly referred to use the interface of
the Replica Manager client - Management commands
- Catalog commands
- File Transfer commands
- The services RLS and RMC provide additional user
interfaces - Mainly for additional catalog operations
- Additional server administration commands
- Should mainly be used by administrators
- Can also be used to check the availability of a
service
RM
RLS
RMC
45Main Logical Machine Types (Services) in LCG-2
- User Interface (UI)
- Information Service (IS)
- Computing Element (CE)
- Frontend Node
- Worker Nodes (WN)
- Storage Element (SE)
- Replica Catalog (RC,RLS)
- Resource Broker (RB)
46Job Management
- The user interacts with Grid via a Workload
Management System (WMS) - The Goal of WMS is the distributed scheduling
and resource management in a Grid environment. - What does it allow Grid users to do?
- To submit their jobs
- To execute them on the best resources
- The WMS tries to optimize the usage of resources
- To get information about their status
- To retrieve their output
47WMS Components
- WMS is currently composed of the following parts
- Workload Manager, which is the core component of
the system - Match-Maker (also called Resource Broker), whose
duty is finding the best resource matching the
requirements of a job (match-making process). - Job Adapter, which prepares the environment for
the job and its final description, before passing
it to the Job Control Service. - Job Control Service (JCS), which finally performs
the actual job management operations (job
submission, removal. . .) - Logging and Bookkeeping services (LB) store Job
Info available for users to query
48Job PreparationLets think the way the Grid
thinks!
- Information to be specified
- Job characteristics
- Requirements and Preferences of the computing
system - including software dependencies
- Job Data requirements
- Specified using a Job Description Language (JDL)
49Job Submission
50Job Submission
Job Status
51Job Submission
Job Status
52Job Submission
Job Status
53Job Submission
Job Status
54Job Submission
Job Status
55Job Submission
Job Status
56Job Submission
Job Status
57Job Submission
Job Status
58Job Submission
Job Status
59Job Submission
Job Status
60Job Submission
Job Status
61Job Submission
Job Status
62Job Submission
Job Status
63Job Submission
Job Status
64Job Submission
Job Status
65Job monitoring
66Possible job states
67Job Flow Status and Errors
- Status queries from the UI machine
- job status queries are addressed to the LB
database. - Resource status queries are addressed to the BDII
- If the site where the job is being run falls
down, the job will be automatically resent to
another CE that is analogue to the previous one,
w.r.t. requirements the user asked for. - In the case that this new submission is disabled,
the job will be marked as aborted. - Users can get information about what happened by
simply questioning the LB service.
68Security
69Introduction to Security
- What aspects of security should we be concerned
about? - Authentication (Identification)
- Confidentiality (Privacy)
- Integrity (non-Tampering)
- Authorisation
- Also
- Accounting
- Delegation
- Non-Repudiation
70How do I login on the Grid ?
- Distribution of resources secure access is a
basic requirement - secure communication
- security across organisational boundaries
- single sign-on" for users of the Grid
- Two basic concepts
- Authentication Who am I?
- Equivalent to a pass port, ID card etc.
- Authorisation What can I do?
- Certain permissions, duties etc.
71Security in the Grid
- In industry, several security standards exist
- Public Key Infrastructure (PKI)
- PKI keys
- SPKI keys (focus on authorisation rather than
certificates) - RSA
- Secure Socket Layer (SSL)
- SSH keys
- Kerberos
- Need for a common security standard for Grid
services - Above standards do not meet all Grid requirements
(e.g. delegation, single sign-on etc.) - Grid community mainly uses X.509 PKI for the
Internet - Well established and widely used (also for www,
e-mail, etc.)
72Encrypting for Confidentiality
- Sending a message using asymmetric keys
- Encrypt message using Receivers public key
- Send encrypted message
- Receiver decrypts message using own private key
- Only someone with Receivers private key can
decrypt message
Receiver space
Public space
Sender space
Private Key
Public Key
Receivers Public Key
Receivers Public Key
3
hR3a rearj
hR3a rearj
openssl
openssl
2
hR3a rearj
1
Hello World
Hello World
73Signing for Authentication
- Encrypt message with Senders private key
- Send encrypted message
- Message is readable by ANYONE with Senders
public key - Receiver decrypts message with Senders public
key - Receiver can be confident that only someone with
Senders private key - could have sent the message
Public space
Sender space
Receiver space
Senders Public Key
Senders Public Key
Public Key
Private Key
3
openssl
1
openssl
n52krj rer
n52krj rer
openssl
Hello World
4
2
n52krj rer
Hello World
Hello World
74The Full Monty
- Server authenticates Client
- Client authenticates Server
- (Symmetric) Session key exchanged confidentially
using public key mechanism - Secure session can now commence using more
efficient, agreed session key - Secure messages will also contain a message
digest to ensure integrity
75Digital Certificates
- How can B be sure that As public key is really
As public key and not someone elses? - A third party guarantees the correspondence
between public key and owners identity, by
signing a document which contains the owners
identity and his public key (Digital Certificate) - Both A and B must trust this third party
- Two models
- X.509 hierarchical organization
- PGP web of trust.
76Certificate contents
- The certificate that you present to others
contains - Your distinguished name (DN)
- your identifier
- Your public key
- anyone can send a secret message to you
- The identity of the CA who issued the certificate
- just a name
- Its expiry date
- the certificates expiry date (usually issued for
one year) - Digital signature of the CA which issued it
- the certificate encrypted with the CAs private
key
77Involved entities
Certificate Authority
User
Public key Private key certificate
Resource (site offering services)
78Certificate Request
User send public key to CA along with proof of
identity.
User generatespublic/privatekey pair.
CA confirms identity, signs certificate and sends
back to user.
Cert
Signed public key.
Private Key encrypted on local disk
79X.509 certificates and authentication
B
A
A
As certificate
Verify CA signature
Random phrase
Encrypt with A s private key
Encrypted phrase
Decrypt with A s public key
Compare with original phrase
80Certificate classification
- User certificate
- issued to a physical person
- DN CCH, OCERN, OUGRID, CN John Smith
- the only kind of certificate good for a client,
i.e. to send Grid jobs etc. - Host certificate
- issued to a machine (i.e. a secure web server,
etc.) - request signed with a user certificate
- DN CCH, OCERN, OUGRID, CNhost1.cern.ch
- Grid host certificate
- issued to a Grid service (i.e. a Resource Broker,
a Computing Element, etc.) - request signed with a user certificate
- DN CCH, OCERN, OUGRID, CNhost/host1.cern.ch
- Service certificate
- issued to a program running on a machine
- request signed with a user certificate
- DN CCH, OCERN, OUGRID, CNldap/host1.cern.ch
81Grid Security Infrastructure (GSI)
- Globus ToolkitTM proposed and implements the Grid
Security Infrastructure (GSI) - Protocols and APIs to address Grid security needs
- GSI protocols extend standard public key
protocols - Standards X.509 SSL/TLS
- Extensions X.509 Proxy Certificates (single
sign-on) Delegation - Proxy Certificate
- Short term, restricted certificate that is
derived form a long-term X.509 certificate - Signed by the normal end entity cert, or by
another proxy - Allows a process to act on behalf of a user
- Not encrypted and thus needs to be securely
managed by file system
82Delegation
- Proxy creation can be recursive
- each time a new private key and new X.509 proxy
certificate, signed by the original key - Allows remote process to act on behalf of the
user - Avoids sending passwords or private keys across
the network - The proxy may be a Restricted Proxy a proxy
with a reduced set of privileges (e.g. cannot
submit jobs).
83Virtual Organisations
84Virtual organisations
- An EGEE user must belong to a VO
- A VO
- Sets of users belonging to a collaboration
- Usually comprises geographically distributed
people - Controls access to specified CE, SE
- Requires the ability to know who has done what,
and who will not be allowed to do it again.
Security. - Each VO user has the same access privileges to
Grid resources - List of supported VOs
- https//lcg-registrar.cern.ch/virtual_organization
.html - HEP communities (atlas, cms, etc.), biology,
astronomy - HunGrid
85Virtual Organizations and authorization
- VOs maintain a list of their members
- The list is downloaded by Grid machines to map
user certificate subjects to local pool
accounts only mapped users are authorized in LCG - Sites decide which VOs to accept
... "/CCH/OCERN/OUGRID/CNSimone Campana 7461"
.dteam "/CCH/OCERN/OUGRID/CNAndrea Sciaba
8968" .cms "/CCH/OCERN/OUGRID/CNPatricia
Mendez Lorenzo-ALICE" .alice ...
grid-mapfile
86VOMS, LCAS, LCMAPS
- Virtual Organization Membership Service
- Extends the proxy info with VO membership, group,
role and capabilities - Local Centre Authorization Service (LCAS)
- Checks if the user is authorized (currently using
the grid-mapfile) - Checks if the user is banned at the site
- Checks if at that time the site accepts jobs
- Local Credential Mapping Service (LCMAPS)
- Maps grid credentials to local credentials (eg.
UNIX uid/gid, AFS tokens, etc.) - Currently uses the grid-mapfile (based only on
certificate subject) - In the near future will map also VOMS group and
roles
"/VOcms/GROUP/cms"
.cms "/VOcms/GROUP/cms/prod"
.cmsprod "/VOcms/GROUP/cms/prod/ROLEmanager"
.cmsprodman
87Virtual organisations
- EGEE has a formal procedure for adding selected
new user communities (Virtual Organisations) - Negotiation with one of the Regional Operations
Centres - Seek balance between the resources contributed by
a VO and those that they consume. - Resource allocation will be made at the VO level.
- Many resources need to be available to multiple
VOs shared use of resources is fundamental to a
Grid
88EGEE Pilot Applications (I)
- High Energy Physics
- Have been running large distributed computing
systems for many years - Now focus on computing for LHC ? hence LCG (LHC
computing grid project) - several current HEP experiments use grid
technology (Babar,CDF, etc.) - LHC experiments are currently executing large
scale data challenges
89EGEE Pilot Applications (II)
- Biomedics
- Bioinformatics (gene/proteome databases
distributions) - Medical applications (screening, epidemiology,
image databases distribution, etc.) - Interactive application (human supervision or
simulation) - BioMed applications deployed and expect to run
first job on LCG-2 by September
90EGEE Applications (III)
- BLAST comparing DNA or protein sequences
- BLAST is the first step for analysing new
sequences to compare DNA or protein sequences to
other ones stored in personal or public
databases. Ideal as a grid application.
- Requires resources to store databases and run
algorithms - Can compare one or several sequence against a
database in parallel - Large user community
91Who else will benefit from EGEE?
- EGEE Generic Applications Advisory Panel
- 4 applications presented
- 3 applications (comp. chemistry, earth science,
astro-particle) recommended for deployment with
allocation of NA4 resources - EU projects GRACE, Mammogrid and Diligent asking
for support - Expression of interest Planck/Gaia
(astroparticle), SimDat (drug discovery)
92How to access EGEE (I)
- 0) Review information provided on the EGEE
website - www.eu-egee.org
- Establish contact with the EGEE applications
group lead by - Vincent Breton (breton_at_clermont.in2p3.fr)
- 2) Provide information by completing a
questionnaire describing your application - 3) Applications selected based on
- scientific criteria,
- Grid added value,
- effort involved in deployment,
- resources consumed/contributed etc.
93How to access EGEE (II)
- 4) Follow a training session
- 5) Migrate application to EGEE infrastructure
with the support of EGEE technical experts - 6) Initial deployment for testing purposes
- 7) Production usage (contribute computing
resources for heavy production demands)
94SZTAKIs role in EGEE
- Education Centre of the Central European Region
- Developing and providing various training courses
- Provide user support for applications
- See the web page www.lpds.sztaki.hu/egee
- Leader of middleware deployment effort in the
SEEGRID project - Creating a regional EGEE Grid for South-East
Europe - Promote the establishment of the Hungarian EGEE
Grid together with other members of MGKK - Creating a national EGEE Grid for Hungary
(HunGrid VO) - Extend the EGEE Grid with new layers
- Mercury monitor www.lpds.sztaki.hu/mercury
- P-GRADE portal www.lpds.sztaki.hu/pgportal
95Conclusions
- EGEE is the first attempt to build a worldwide
Grid infrastructure for data intensive
applications from many scientific domains - A large-scale production grid service, LCG-2 is
already deployed and being used for HEP and
BioMed applications - Resources and user groups will rapidly expand
during the course of the project - A process has been established for migrating new
applications to the EGEE infrastructure - A training programme has been established with a
number of events already held - Prototype next generation grid middleware is
being tested now - See the on-line broker demo at
http//www.hep.ph.ic.ac.uk/mp801/applet/
96GRID'2005 EGEE Summer School
- Budapest
- July 11-16, 2005
- http//www.egee.hu/grid05
- Registration deadline May 1, 2005
- Venue MTA SZTAKI, Victor Hugo building,
97GRID'2005 EGEE Summer School
- Lessons and hands-on tutorials every day
- EGEE
- Job execution
- Data management
- Information system
- Security
- Virtual organisations
- Large scale simulations on the EGEE Grid
- Gilda training testbed and Genius portal
- Workflow application development
- Parallel program development with P-GRADE portal
- gLite new middleware, based on web services