Scalability Requirements and Implementation Options.

Slides:



Advertisements
Similar presentations
Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
Advertisements

MUNIS Platform Migration Project WELCOME. Agenda Introductions Tyler Cloud Overview Munis New Features Questions.
Take your CMS to the cloud to lighten the load Brett Pollak Campus Web Office UC San Diego.
1 NETE4631 Cloud deployment models and migration Lecture Notes #4.
Cloud Computing Brandon Hixon Jonathan Moore. Cloud Computing Brandon Hixon What is Cloud Computing? How does it work? Jonathan Moore What are the key.
Security Issues and Challenges in Cloud Computing
Building on the BIRN Workshop BIRN Systems Architecture Overview Philip Papadopoulos – BIRN CC, Systems Architect.
EInfrastructures (Internet and Grids) - 15 April 2004 Sharing ICT Resources – Discussion of Best Practices in the U.S. Mary E. Spada Program Manager, Strategic.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 2 Installing Windows Server 2008.
Engineering the Cloud Andrew McCombs March 10th, 2011.
1 Module 2 Installing Windows NT. 2  Overview Preparing for Installation Installing Windows NT Performing a Server-based Installation Troubleshooting.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Amazon EC2 Quick Start adapted from EC2_GetStarted.html.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
VAP What is a Virtual Application ? A virtual application is an application that has been optimized to run on virtual infrastructure. The application software.
Barracuda Load Balancer Server Availability and Scalability.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 7 2/23/2015.
Module 12: Designing an AD LDS Implementation. AD LDS Usage AD LDS is most commonly used as a solution to the following requirements: Providing an LDAP-based.
IT Infrastructure Transformation – VPN Services 0 Enterprise VPN Don Kendrick, VITA Senior Manager, Security Operations August 25, 2009.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
Appendix B Planning a Virtualization Strategy for Exchange Server 2010.
Module 7: Fundamentals of Administering Windows Server 2008.
Installing Windows Vista Lesson 2. Skills Matrix Technology SkillObjective DomainObjective # Performing a Clean Installation Set up Windows Vista as the.
Presented by: Sanketh Beerabbi University of Central Florida COP Cloud Computing.
Network Plus Virtualization Concepts. Virtualization Overview Virtualization is the emulation of a computer environment called a Virtual Machine. A Hypervisor.
608D CloudStack 3.0 Omer Palo Readiness Specialist, WW Tech Support Readiness May 8, 2012.
Lesson 17-Windows 2000/Windows 2003 Server Security Issues.
Eucalyptus: An Open-source Infrastructure for Cloud Computing Rich Wolski Eucalyptus Systems Inc.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Bulletproof WebSphere Architectures Tony Higham, CTO Rare Medium.
Interoperability and Image Analysis KC Stegbauer.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
The Biomedical Informatics Research Network Carl Kesselman BIRN Principal Investigator Professor of Industrial and Systems Engineering Information Sciences.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
Microsoft Management Seminar Series SMS 2003 Change Management.
GCRC Meeting 2004 BIRN Coordinating Center Software Development Vicky Rowley.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Hosting Websites and Web Applications with Microsoft ® SQL Server ® 2008.
Architecture & Cybersecurity – Module 3 ELO-100Identify the features of virtualization. (Figure 3) ELO-060Identify the different components of a cloud.
1 Overview of Microsoft Windows 2000 Multipurpose OS Reduces total cost of ownership (TCO)
+ Lec#1: Planning, Designing, and Operating Local Area Networks 1 st semester CT.
Cloud Computing Shannon McManus Michael Weihert. What is Cloud Computing?
Cloud computing: IaaS. IaaS is the simplest cloud offerings. IaaS is the simplest cloud offerings. It is an evolution of virtual private server offerings.
Data Hosting and Security Overview January, 2011.
All Hands Meeting 2005 BIRN-CC: Building, Maintaining and Maturing a National Information Infrastructure to Enable and Advance Biomedical Research.
BIRN IT Task Force 2006 AHM, San Diego. Outline Two Themes + Lunch (Start at 12:20, go eat lunch for 20 minutes) Overall Software Integration, Application.
1 SAP NetWeaver 2004s ABAP Trial Version. 2 SAP NetWeaver Application Server ABAP with MaxDB SAP NetWeaver Application Server ABAP with MaxDB This package.
Windows Vista Configuration MCTS : Installing and Upgrading.
© 2015 MetricStream, Inc. All Rights Reserved. AWS server provisioning © 2015 MetricStream, Inc. All Rights Reserved. By, Srikanth K & Rohit.
IPlant Collaborative Tools and Services Workshop iPlant Collaborative Tools and Services Workshop Overview of Atmosphere.
SEMINAR ON.  OVERVIEW -  What is Cloud Computing???  Amazon Elastic Cloud Computing (Amazon EC2)  Amazon EC2 Core Concept  How to use Amazon EC2.
Software architectures and tools for highly distributed applications Voldemaras Žitkus.
Speed Cash System. Purpose of the Project  online Banking Transaction Information.  keeping in view of the distributed client server computing technology,
DISCUSSION LEADERS PRAVINA KOTA, KEVAN ESSMYER, NAVEEN KARDURI
Unit 3 Virtualization.
Chapter 6: Securing the Cloud
Don Kendrick, VITA Senior Manager, Security Operations
Building a Virtual Infrastructure
Welcome! Thank you for joining us. We’ll get started in a few minutes.
MCSA VCE
Managing Clouds with VMM
Brandon Hixon Jonathan Moore
Cloud-Enabling Technology
DATS International Portfolio.
Designing IIS Security (IIS – Internet Information Service)
Productive + Hybrid + Intelligent + Trusted
06 | SQL Server and the Cloud
Presentation transcript:

Scalability Requirements and Implementation Options

Big Picture Goals for BIRN Provide IT Infrastructure for Biomedical Research –Best Practices from CS/Grid Community –Adapted to Biomedical Needs –Highly Available and Scalable Provide High Speed Access –Internet2 and TeraGrid –Overflow to Commercially Available Services when Research Facilities are Overloaded

Current Implementation Relies on Dedicated Hardware Resources Per Site –To Ensure Compatibility –Consistent Target for Software Stack Requires Dedicated HW/SW Support at BIRN-CC and Site Not Scalable Across Sites or Within Institutions –Finite Disk and Compute Resources per Rack –Custom Installations, Troubleshooting

Goals for a Virtualized BIRN Infrastructure Meet Specifications of Current BIRN –Security, Audit Trails, Access Controls –BIRN Application Software Stack Migrate to Commodity Computing –Machine Instances Created as Needed –Distributed, Redundant Data Centers –Outsource Facilities, Maint, Admin… Provide Predictable Costs and Availability to Biomedical Research Customers

Amazon EC2 / S3 as Possible Implementation Known Costs per CPU Hour / Gigabyte of Data Transferred –Allows Detailed Budgeting for Grants BIRN Software Stack Provided on Boot Disk Images –Known Application Environment to Support Research Needs BIRN Audits Accounts, Permissions All Administration is Virtual –Avoid Hardware Headaches –Effort Scales Easily

Practical Requirements BIRN Rocks Distributions Ported to Xen S3FS Fuse Module Needed –Likely to be Developed by Community –Not yet available –May Require BIRN Extensions Make BIRN Authentication Control Login to Virtual BIRN Servers Provide Rights-Based Access to / Audit of S3FS Data Resources Based BIRN Credentials Provide User Tools and Best Practices to Integrate with Workstations and Desktops Inside Firewalls –sshfs, sftpdisk, rsync, unision…

To Be Determined… Feasibility of S3FS Performance of S3/EC2 Migration Path for BIRN Users Other Unknowns…