Towards a uniform self-configuring virtual private network for workstations and clusters in grid computing

  • Authors:
  • David Isaac Wolinsky;Yonggang Liu;Renato Figueiredo

  • Affiliations:
  • University of Florida, Gainesville, FL, USA;University of Florida, Gainesville, FL, USA;University of Florida, Gainesville, FL, USA

  • Venue:
  • VTDC '09 Proceedings of the 3rd international workshop on Virtualization technologies in distributed computing
  • Year:
  • 2009

Quantified Score

Hi-index 0.02

Visualization

Abstract

The rising popularity of grid computing makes the issues of growth, security, and access critical in deploying and maintaining well-functioning grid systems. Overlay networks (ON)provide a framework to deal with these issues, but current techniques impose limitations and administrative burdens such as manual configuration for each new system in the grid, installation and configuration of software. Additionally, current approaches lack methods of effectively merging clusters with individual workstations, usually focusing on either the grouping of distributed clusters or a desktop/workstation Grid. The main difference between the two scenarios is that in a cluster environment all machines share a common ON router, whereas in a workstation environment each machine has ON software. This paper presents a novel approach of self-configuring IP-based Virtual Private Networks (VPNs)1 overlays that support dynamic, seamless addition of new resources to the grid for both cluster and workstation platforms. The approach allows for bridging physical and virtual networking in clusters, in a manner that allows dynamic configuration of IP addresses while avoiding overlay routing among nodes within the same layer 2 network. To enable these features, the ON runs on top of a Peer-To-Peer (P2P) network that provides supports a distributed data store. IP addresses are dynamically allocated by a virtual DHCP server controlled by the ON router through atomic operations on the distributed data store. This atomic operation creates a mapping of an IP address to a P2P address that can later be used by the VPN and router to determine the host of an IP address. We have prototyped this approach, demonstrating the ability to seamlessly mix both workstation and cluster based approaches into a wide-area Condor pool.