Private Virtual Cluster: Infrastructure and Protocol for Instant Grids

  • Ala Rezmerita
  • Tangui Morlier
  • Vincent Neri
  • Franck Cappello
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4128)


Given current complexity of Grid technologies, the lack of security of P2P systems and the rigidity of VPN technologies make sharing resources belonging to different institutions still technically difficult. We propose a new approach called ”Instant Grid” (IG), which combines various Grid, P2P and VPN approaches, allowing simple deployment of applications over different administration domains. Three main requirements should be fulfilled to make Instant Grids realistic: 1) simple networking configuration (Firewall and NAT), 2) no degradation of resource security and 3) no need to re-implement existing distributed applications. In this paper, we present Private Virtual Cluster, a low-level middleware that meets these three requirements. To demonstrate its properties, we have connected with PVC a set of firewall-protected PCs and conducted experiments to evaluate the networking performance and the capability to execute unmodified MPI applications.


Security Policy Virtual Private Network Private Address Virtual Cluster Connection Establishment 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Foster, I., Kesselman, C.: The Grid 2: Blueprint for a New Computing Infrastructure. Morgan Kaufmann Publishers Inc., San Francisco (2003)Google Scholar
  2. 2.
    Humphrey, M., et al.: An early evaluation of WSRF and WS-notification via In: Proceedings of the 5th IEEE/ACMInternational Workshop on Grid Computing, Washington, pp. 172–181. IEEE Computer Society, Los Alamitos (2004)CrossRefGoogle Scholar
  3. 3.
    Tuecke, S., Czajkowski, K., Foster, I.: Open Grid Services Infrastructure (OGSI) version 1.0. Global Grid Forum (2003)Google Scholar
  4. 4.
    Gong, L.: JXTA: A network programming environment. IEEE IC 5(3), 88–95 (2001)Google Scholar
  5. 5.
    Krasnyansky, M.: Virtual tunnels over tcp/ip networks,
  6. 6.
    Thayer, R., Doraswamy, N., Glenn, R.: Rfc 2411 - ip security document roadmap. USA, RFC Editor (1998)Google Scholar
  7. 7.
    Denis, A., et al.: Wide-area communication for grids: An integrated solution to connectivity, performance and security problems. In: Proceedings of the 13th IEEE International Symposium on High Performance Distributed Computing, Washington, pp. 97–106. IEEE Computer Society, Los Alamitos (2004)CrossRefGoogle Scholar
  8. 8.
    Son, S., Allcock, B., Livny, M.: CODO: Firewall traversal by cooperative on-demand opening. In: Proceedings of the 14th IEEE International Symposium on High Performance Distributed Computing, Washington, IEEE CS, Los Alamitos (2005)Google Scholar
  9. 9.
    Srisuresh, P., Ford, B., Kegel, D.: Peer-to-peer communication across NATs. USENIX Annual Technical Conference (2005)Google Scholar
  10. 10.
  11. 11.
    Huitema, C., Rosenberg, J., Weinberger, J., Mahy, R.: Rfc 3489 - STUN - simple traversal of UDP through NATs. USA, RFC Editor (March 2003)Google Scholar
  12. 12.
    Ruth, P., McGachey, P., Jiang, X., Xu, D.: VioCluster: Virtualization for dynamic computational domains. In: IEEE IC on Cluster Computing (Cluster 2005) (2005)Google Scholar
  13. 13.
    Jiang, X., Xu, D.: Violin: Virtual internetworking on overlay infrastructure. Technical report, Purdue University (2003)Google Scholar
  14. 14.
    Chase, J., et al.: Dynamic virtual clusters in a grid site manager. In: The 12th International Symposium on High Performance Distributed Computing (2003)Google Scholar
  15. 15.
    Appleby, K., et al.: Oceano-SLA based management of a computing utility. In: Proc. 7th IFIP/IEEE International Symposium on Integrated Network Management (2001)Google Scholar
  16. 16.
    Townsley, W., Valencia, A., Rubens, A., Pall, G., Zorn, G., Palter, B.: Layer two tunneling protocol l2tp. USA, RFC Editor (August 1999)Google Scholar
  17. 17.
    Reynolds, J., Postel, J.: Rfc 1340 - assigned numbers. USA, RFC Editor (1992)Google Scholar
  18. 18.
    Wool, A.: A quantitative study of firewall configuration errors. IEEE Computer 37(6), 62–67 (2004)Google Scholar
  19. 19.
    Jones, R.: (1999), Netperf:
  20. 20.
    Bailey, D.H., et al.: The NAS parallel benchmarks: summary and preliminary results. In: Proceedings of the 1991 ACM/IEEE conference on Supercomputing, pp. 158–165. ACM Press, New York (1991)CrossRefGoogle Scholar
  21. 21.
    Ten Eyck, L.F., Mandell, J., Roberts, V.A., Pique, M.E.: Surveying molecular interactions with DOT. In: Proc. ACM/IEEE SC 1995 Conference (1995)Google Scholar
  22. 22.
  23. 23.

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Ala Rezmerita
    • 1
  • Tangui Morlier
    • 1
  • Vincent Neri
    • 1
  • Franck Cappello
    • 1
  1. 1.INRIA/LRIUniversity Paris-SudOrsayFrance

Personalised recommendations