Você está na página 1de 8

OGSI.NET: OGSI-compliance on the .

NET Framework

Glenn Wasson, Norm Beekwilder, Mark Morgan, and Marty Humphrey


Grid Computing Group
Computer Science Department
University of Virginia
Charlottesville, VA 22904

Abstract: The Open Grid Service hosting environment that has been constructed to be
Infrastructure (OGSI) has been designed to fully OGSI-compliant. OGSI.NET is built upon the
facilitate the creation of multiple, .NET Framework [4], which is the Web Services
interoperable Grid Service hosting infrastructure of Microsoft. Generally speaking, there
environments, but to date only one fully OGSI- are two interrelated reasons why we chose to design
compliant hosting environment exists, Globus and implement an OGSI-compliant hosting
Toolkit version 3 (GT3). This paper describes environment on .NET. First, Microsoft technologies
the design and implementation of OGSI.NET, are among the first implementations of many of the
which is the second, independent hosting emerging Web Services specifications that are the
environment that is fully compliant with the foundation of OGSA and OGSI; we wanted to perform
OGSI specification. While the Microsoft suite a critical evaluation of both the expressibility and the
of Visual Studio, Internet Information Services performance of these specifications in the context of
(IIS), and the Web Services Enhancements Grid requirements. Similarly, we wanted to create a
(WSE) provide a robust foundation upon platform by which to evaluate OGSI in the context of
which we implemented OGSI.NET, the “pure” Web Services to determine the value of OGSA
challenges included constructing the Grid and OGSI. There is starting to emerge a healthy debate
Service container, parsing OGSI WSDL in the community regarding the value of OGSI (e.g.,
(“gwsdl”), and supporting Grid Service [5]), and we wanted to have a defensible position one
Handles (GSHs). By describing our approach way or the other in this debate. Second, many people
to these challenges, and by describing the equate Grid computing and GT3, and GT3 is
unique Grid attribute programming model we synonymous with OGSI, so if we as a community are
are developing as part of OGSI.NET, we going to start getting Windows-based clients and
contribute an early evaluation of OGSI and the servers more involved in Grids beyond running
broader Open Grid Services Architecture Internet Explorer, arguably, it is necessary to have an
(OGSA). OGSI implementation on .NET. That said, it is
important to understand that we acknowledge and
1. Introduction increasingly agree with the belief that “pure” Web
The goal of the Open Grid Services Architecture Services might be enough to meet the requirements of
(OGSA) [1] is to significantly broaden the established Grids, especially if the particular Grid consists entirely
approach of Grid Computing and tap into the emerging of Windows machines; however, the OGSI layer and
capabilities of Web Services, which are largely being rendering is important if a heterogeneous mix of
driven by the commercial sector. To date, the core of Windows and UNIX-based machines exist in the
OGSA has been the Open Grid Services Infrastructure particular Grid.
(OGSI) [7], which essentially defines the common
capabilities and interfaces of the “hosting The contributions of this paper are that it presents the
environment” for services that adhere to the larger design and implementation of the OGSI.NET hosting
vision of the OGSA. OGSI defines conventions for environment and discusses some early observations on
creating, managing, and exchanging information the challenges and issues of implementing the OGSI
between Grid services. To date the only hosting specification. We describe the programming model we
environment that fully complies with the OGSI are developing to enable easier construction of Grid
specification is the Globus Toolkit version 3 (GT3) [2]. applications. We describe how we utilize certain
Microsoft technologies to create OGSI.NET and we
This paper describes our design and implementation of discuss our initial impressions on the value of OGSI
OGSI.NET, which to our knowledge is only the second itself through our use of OGSI.NET to construct
sample demo applications. We also discuss the future threads to execute the dispatcher. The dispatcher
of the OGSI.NET hosting environment, focusing on determines which service instance should get the
issues of interoperability with other hosting request and transfers execution of that thread to an
environments such as GT3 and on how we believe object in the appropriate AppDomain. A diagram of
future products of Microsoft will add to the value of the system is shown in Figure 1.
OGSI.NET, which directly translates into added
capabilities for Grid computing in general.

2. Basic Architecture
In many ways, the single design goal of OGSI.NET is
to achieve OGSI-compliance by exploiting the core
technologies of Microsoft as much as possible. Simply,
by creating the thinnest layer possible, we could
replace current Microsoft technologies with newer
versions as they become available. This is particularly
important with regard to Web Services security. That
is, many of the Web Services security specifications
[3] do not yet have publicly-available implementations
(either from Microsoft or elsewhere). We want to
utilize, as easily as possible, the Microsoft SDKs as
they emerge to implement these specifications. An
example of such an SDK is the Microsoft Web
Services Enhancements (WSE) [10].

The basic design of OGSI.NET is to have a container


Figure 1. OGSI Container on the .NET Platform
entity that “holds” all service instances running on a
host. The container process consists of a collection of Inside the AppDomain, control transfers to an object
ApplicationDomains (or AppDomains), Microsoft’s called the Grid Service Wrapper (GSW). A GSW
mechanism for intra-process memory protection. Each encapsulates a service instance, including the
service instance executes in its own AppDomain and implementations of its methods and its service data.
there is one additional domain for the container’s logic The GSW maintains lists of the port types that the
(some dispatching and message processing service supports (both custom port types written by the
functionality). The object in this final AppDomain is service’s author and OGSI specification port types
referred to as the dispatcher. While the current version provided with the container, e.g. grid service port type,
of OGSI.NET (2.0) keeps each service in its own notification source port type, etc.) and the serializers
AppDomain, there is an open issue about other and deserializers needed for the various messaging
possible mappings for future versions of the container. protocols the service supports (e.g. SOAP or Microsoft
For example, all instances created by a given factory Remoting). The GSW performs processing of any
could live in the same AppDomain. Having more than message specific information (e.g. SOAP headers) and
one service in a given AppDomain would make inter- deserializes the request message to get the name of the
service communication more efficient, but at a cost of method to invoke and any parameters. Then the GSW
some security since any errant or malicious service has selects the port type that implements the requested
direct access to the memory of all the services in its method and uses reflection to get a handle to the
AppDomain. method. The method is invoked with any parameters
and message specific data (e.g. SOAP header data)
A client makes a request on the OGSI.NET sent in the request. The data returned by the invocation
architecture by sending a message to the IIS web is serialized by the GSW and sent back to the
server. In order to support arbitrary names for grid dispatcher as a binary array. The dispatcher sends this
services (as required by the OGSI specification), array back to IIS for return to the client.
OGSI.NET uses an ISAPI filter to intercept requests at
an early stage in the IIS request chain. This filter re- 3. System Elements
writes the request so that IIS will dispatch it to This section discusses the major components of
OGSI.NET’s ASP.NET HttpHandler. This OGSI.NET: the dispatcher, service wrappers (grid
HttpHandler dispatches the request to the OGSI.NET service and light-weight service), factories and
container. The container process has a thread pool and message handlers.
each IIS request causes one of the container process’
3.1. Dispatcher service. The containers configuration file provides
The dispatcher is the interface between the client further information about services. When a GSW is
request and the service instance that serves that instantiated in an AppDomain (see section 3.4), it
request. The dispatcher’s main function is to route loads the assembly containing the appropriate grid
request messages to the appropriate service instance service. The config file tells the GSW which of the
and return the results to the client. The dispatcher various serializer/deserializer modules registered with
contains a mapping from request Grid Service the container are usable by this service. The attributes
References (GSRs) [7] to AppDomains within the on the service’s class declare the port types supported
container. The raw request is dispatched to the Grid by the service. The GSW instantiates instances of all
Service Wrapper (see section 3.2) in the requested the service’s port types, both those written by the
service’s AppDomain. The Grid Service Wrapper will service author and those defined by the OGSI
perform the requested work and return a byte stream to specification and included with OGSI.NET.
the dispatcher (if appropriate) that the dispatcher will
then send on to the client. The service’s service data elements (SDEs) are
initialized by the GSW and exposed through the
The simplicity of the dispatcher is deliberate and interfaces defined in the OGSI specification. Currently,
assists in providing concurrent access to the container both XPath and “ByName” queries are supported.
because it allows requests to be independent of each Finally, a service’s policy is initialized from any policy
other. Security is also enhanced because the dispatcher attributes of the service. Any requests made of this
does not “process” the incoming or outgoing messages. service are checked against this policy by the GSW.
If the dispatcher did marshall/unmarshall types from
the messages, it would potentially be running user 3.3. Light-Weight Service Wrapper
(service) code which might endanger the container by The Grid Service Wrapper depends on the
corrupting the dispatcher. By processing messages in functionality of the container in order to handle
the AppDomain of the requested service instance, only requests and dynamically create or destroy service
that instance is affected. instances. While the container presents a powerful,
server-side abstraction to service authors, there are
3.2. Grid Service Wrapper occasions when “services”, i.e. entities exposing
The Grid Service Wrapper or GSW encapsulates the service-like interfaces, are useful on the client-side
various functional units of a grid service instance. Each (e.g. notification sinks). Also, certain server-side
AppDomain in the container (except the dispatcher’s) services have limited functionality (such as those that
has a GSW and each GSW wraps a grid service just hold some SDEs, e.g. ServiceGroupEntry). These
instance. The GSW is a convenient operational unit for services are often only used in concert with some
grid service authors because it provides: number of other services and the protection of having
• Pluggable, service-specific message serializers these simple services in their own AppDomain is out-
and deserializers weighted by the overhead of constantly
• Support for plugging-in port types that the service communicating across the AppDomain boundary.
supports (including those not written by the OGSI.NET provides a second kind of service called
service author, e.g. the grid service port type) the light-weight service, which allows entities with
• An SDE management API limited functionality to present OGSI-compliant
interfaces without the full container underneath them
• Service policy support
(nor factory services to create them). In OGSI.NET,
such services are encapsulated by light-weight service
The Grid Service Wrapper also provides the dispatcher
wrappers (LWSW). Light-weight services are similar
with a well-known interface through which any grid
to grid services, but have the following restrictions:
service instance can be accessed. The GSW’s
ProcessRequest method is used to invoke any function
supported by the instance (see section 4) while the • Cannot create other services
ProcessQuery method is used to retrieve a service • Are terminated when the “parent” grid service, or
instance’s WSDL from the instance itself (allowing the client terminates (or when explicitly destroyed by
instance to potential modify its WSDL to, for example, the parent/client)
update its communication end-points). • Do not have the configurability of grid services (A
grid service has both “service params”, parameters
A grid service author decorates their service code with specific to this service instance, and “global
.NET attributes (see section 7) which provide the params”, parameters for every instance running in
container (at runtime) with information about the the container. Light-weight services have no
service params, though they may use the dispatcher handles the transport protocol while the
container’s global params when created on the message handlers deal with the messaging protocol.
server side)
The message handlers allow service authors to write
3.4. Factories services independent of messaging issues. Marshalling,
Factories are services that create instances of other unmarshalling and exceptions are all handled
services. In OGSI.NET, this means creating a new transparently by the message handlers.
AppDomain and a new Grid Service Wrapper in that
domain. The Grid Service Wrapper will then load the 4. Service Function Invocation
assembly for the appropriate service and instantiate a Each grid service instance provides some functions
new instance as discussed in section 3.2. A factory that clients can invoke. This section discusses the
service stores a reference to the GSW in the new process by which client requests are served. We frame
domain along with the published name of that instance the discussion in terms of an HTTP transport, though
(a GSR). This mapping is also sent to the dispatcher. other mechanisms could, in principle, be supported.
Object references can be “wrapped” and passed across
AppDomains, and this is how the reference to the new When a request arrives at the IIS web server, the
service instance (i.e., the reference to its GSW) is following steps occur.
passed from the factory’s domain to the dispatcher’s.
1. ISAPI filter: An ISAPI filter “rewrites”2 the
In general, the type of instance created by a factory is request’s destination URI so it is handled by
specified at container-start time (i.e. in the container’s OGSI.NET’s managed-code HttpHandler (if that
config file). However, a second type of factory in message is bound for the OGSI.NET container).
OGSI.NET, the meta-factory functions differently. A 2. HttpHandler routing: The HttpHandler dispatches
meta-factory is a factory that receives a collection of out of the IIS/ASP.NET system and into the
.NET assemblies that define a grid service class in the OGSI.NET container. The request message is sent
creation parameters for its createService method. A to the container’s dispatcher.
meta-factory then creates a new factory that 3. Dispatcher finds Grid Service: The dispatcher
instantiates instances of the service defined in the finds the appropriate GSW (and hence
assemblies (including auto-generating the WSDL for AppDomain) for the service by looking up the
the new services). In this way, a meta-factory can request URI in the dispatcher’s service table. The
deploy service instances into a container that are not dispatcher then gets a handle to that GSW and
specified at container-start time and which are not calls its ProcessRequest method, which takes
initially resident on the container’s host. the raw message as a parameter.
4. Process message headers: The GSW’s message
3.5. Message Handlers handler processes the headers of the raw message.
Message handlers perform message format specific If the message was a SOAP message, this is done
processing on a service instance’s incoming and by via the Web Services Enhancements (WSE)
outgoing messages (including exceptions the service pipeline [10]. The processed header information is
may throw). OGSI.NET 2.0 contains two message used by the container to check if the invocation
handlers for the SOAP and remoting1 message formats. message met the service’s stated policy and is
A service instance’s GSW will create message handler made available to the code of the invoked function
objects for each message format that the service (which may wish to process it further).
supports when the instance is created. A message
handler deserializes the request message that arrives
(as a byte array) from the dispatcher. This includes
2
creating any needed parameter objects and processing The ISAPI filter dispatches requests to the ASP.NET
any message headers. When the request is completed infrastructure by “rewriting” the request URL. This is
or an exception is thrown, the handler will serialize the necessary because IIS dispatches requests based on
results into a byte stream which is passed to the extensions in the name of the requested page (e.g.,
dispatcher to be returned to the client. In this way, the request.asmx will be handed to ASP.NET to process).
In order to handle arbitrary service names, an ISAPI
filter was used because the request could be
1
OGSI.NET supports the “binary format over http” intercepted at an early stage in the processing (before
flavor of remoting. The remoting message handler IIS begins to dispatch) and rewritten such that any
deals with the binary format and the Microsoft request starting with a container’s well-defined prefix
remoting system handles the transport. would be handled by OGSI.NET’s HttpHandler.
5. Determine function name and parameters: The starting a service automatically, but then letting it time
message handler deserializes the message body, out.
determining the name of the function the client
wants to invoke and decoding any invocation The removal of services when their timeout expires is
parameters. the job of the dispatcher. Periodically, the dispatcher
6. Find method handle for method name: The GSW runs a “garbage collector” to remove old instances.
finds the port type implementing the specific The OGSI Specification does not say that a service
function from its port type array and then uses must immediately be removed if its timeout has
reflection to get a handle to the desired method. expired, but rather that clients may no longer count on
7. Invoke function: The GSW invokes the requested that service’s availability. This means the dispatcher’s
function and gets the result. garbage collection machinery does not need to be
8. Serialize the results: The GSW uses the message highly synchronized with the clocks of the service
handler to serialize the results (or a thrown instances.
exception) into a byte array.
9. Send results back to client: The GSW sends the Permanent service state can be supported through
result array to the dispatcher, which sends them to service data elements (SDEs). The Grid Service
the HttpHandler, where they are sent back to IIS. Wrapper provides access to a service’s SDEs through
IIS handles forwarding the results to the client. functions defined by the OGSI Specification. In
OGSI.NET 2.0, service-specific SDEs are specified via
5. Persistence attributes on the service’s (or port type’s) class or on
There are multiple types of persistence in the OGSI data members. By default, this data does not persist
framework: between restarts of a service instance. However, an
• Services that are automatically loaded into the SDE itself can be annotated with attributes that tell the
container at startup (and therefore “persist” if the container to both save the SDE’s value when it
container goes down and gets restarted) changes and load the SDE’s value when it is unknown
• Services that do not require soft-state keep-alive (presumably when the service is starting up).
messages (i.e., services that have an infinite OGSI.NET refers to code run when an SDE’s value is
timeout) retrieved as a GetHandler and code run when an SDE’s
• Services with state that is saved to permanent value is changed as a SetHandler. Grid service authors
media (e.g., disk) and which can load that state can write arbitrary Get and SetHandlers for each SDE
back into a running service instance to make them persistent (or perform any number of
other functions).
Certain services must be available to make the
container useful. For example, indexing/registry 6. Security
services are needed to discover existing service There are several security concerns in the creation of a
instances and handle resolution services are needed to .NET hosting container. Some of these concerns are
determine how to communicate with them. unique to .NET, while some are issues for any hosting
OGSI.NET’s container configuration file allows the environment. First, OGSI.NET provides standards-
specification of services that are to be created and based message layer security to the service instances
loaded when the container initializes. (e.g. WS-Security) via the Web Service Extensions
(WSE) pipeline [10] run by the message handler in the
The OGSI Specification [7] (and hence OGSI.NET) Grid Service Wrapper.
defines the notion of timeout for services. A service
may elect to “die” if it does not receive a message from In addition, there are security concerns relating to the
a client (which could be another service) within this dispatcher and the container. How are these system
time period. This prevents unused (and forgotten) components to be protected from badly implemented
instances from cluttering the container. However, this or malicious services? AppDomains provide the
timeout can be set such that no keep-alive messages memory protection of a process without the
are needed. This, in effect, makes the service heavyweight activity of creating a new process for
permanent as long as the container is running. each service. Allowing each service instance to live in
However, if the container is shutdown or crashes, these its own AppDomain provides a large amount of
services will not be restarted (as opposed to services protection for the other services in the container.
listed in the container’s config file). Obviously, a Because the Grid Service Wrapper actually invokes
service in the container’s config file will have both functions on the service from within the service’s
types of persistence - there seems to be little point in AppDomain, any problems that cause the service to
crash or hang will not effect the dispatcher or the other
services in the container. However, if services are of meta-data is needed to actually expose that service
allowed to make calls into unmanaged code, they can logic as a grid service. This meta-data consists of
bypass the protection of AppDomains. instructions to the service’s hosting environment about
what elements (methods and data) should be exposed
Similarly, factories create Grid Service instances by to clients and the conditions under which clients can
creating a new AppDomain and then creating a Grid access them (policy). This goes beyond simple
Service Wrapper in that domain. That GSW then loads automatic generation of service WSDL and client-side
the assembly for the actual grid service. By having the proxies to describing events that must be analyzed at
service’s assembly loaded and the grid service runtime. In OGSI.NET, programmers annotate their
initialized from within the new AppDomain, the code with attributes that are subsequently used by both
remainder of the AppDomains in the container are pre-processing tools (e.g., to generate static
protected from potential bugs in service author’s information such as WSDL documents) and by the
service creation code. service’s hosting environment (e.g. to detect policy
events). We argue that an attribute-based model can
We also wish to support running services that have the ultimately make creating a Grid Service as easy as
local host access privileges of particular users (i.e. the creating a Web Service.
Windows equivalent of running a service as a
particular UNIX user id). Note that this does not mean Although OGSI.NET supports a number of different
simply having a service that can spawn computational attributes, they are primarily divided into three classes,
jobs under a certain user id, but having the service those that expose methods, those that expose data and
itself access local resources as a particular user. We are those that express policy. The [OGSIPortType]
currently investigating two approaches to this problem. tells the GSW that a service implements a particular
The first is to have a hierarchical container system in port type. This makes it easy for a service author to
which a single master container dispatches to one of a support the various port types defined in the OGSI
set of other containers, each running under a different specification by including an attribute. For example,
Windows user id. Each of these “user containers” the attribute
could only create services that are running under a [OGSIPortType(typeof(NotificationSour
particular user id and hence every contained service cePortType))] says that the service implements
would run as the container’s owner. This approach is the functionality of the NotificationSource port type
similar to the one used by the GT3 Managed Job and causes the GSW to instantiate a NotificationSource
Service for running computational jobs (except that port type to serve requests for instances of this service.
this would also apply to the services themselves). A The [WebMethod] attribute (which should be
second option is to have any thread active in a given familiar to Web Service programmers) is also used by
service run under the service author’s OGSI.NET. Any method marked with this attribute
WindowsIdentity. In this way, multiple threads with will be exposed as a method on the port type in which
different ids may be operating within the same it is defined. OGSI.NET’s WsdlGenerator will
container. automatically place that method in any port type
definitions and can automatically create WSDL
Finally, it is not clear given this design, if we will need bindings for that method. For authors requiring more
to provide some sandboxing capabilities above the precise control of bindings (such as those
inherent .NET security mechanisms (e.g., evidence- implementing the functionality for a given WSDL
based security, policy evaluation in the CLR). While document), the [SoapDocumentMethod] attribute
these .NET capabilities will be greatly leveraged, it is can be used to specify the SOAP binding exactly.
not clear if they, alone, are sufficient given our
constraints. For example, the meta-factory’s ability to Service data can be exposed by using the [SDE]
instantiate services unknown to the container deployer attribute on either service (or port type) class, or on a
might create challenges. particular data member. The [SDE] attribute defines a
Service Data Element that the service/port type should
7. An Attribute-Based Programming expose. When used at the class level, the attribute
Model for Grid Services allows complete specification of all the SDE
One of the key challenges for a “Grid programmer” parameters (name, mutability, nilability, min and
today is how to expose functionality as an OGSI- maxOccurs, etc.). When placed on a data member, this
compliant Grid Service. One of the principle attribute essentially exposes that programming-
differences between programming a Grid Service and lanugage specific member as an SDE. For example,
simply coding the service logic is that a certain amount when placing this attribute on a integer member of a
port type, an SDE will be created with the name of that the only other complete implementation of the OGSI
data member, type int, min and maxOccurs of 1, specification and therefore provides the most leverage-
nilable = false and mutability set to mutable. In able work. Currently, OGSI.NET leverages this work
addition, whenever a call to findServiceData references to perform baseline compatibility tests. Both GT3 and
this SDE, the GSW will return the current value of this OGSI.NET come with graphical browsers which can
data member. In this way, dynamic SDE can be created be used to navigate through and interact with the
for which the programmer need only manipulate services that live in a container. By pointing the GT3
language specific variables. browser at an OGSI.NET container and hitting the
“load” button, we can test a number of functions. The
Finally, service policy can be specified via class-level opposing test with the OGSI.NET browser and the
attributes (method level policy support is currently GT3 container is also performed. This test is non-
being added). OGSI.NET 2.0 supports definitions of trivial because it involves activating a service (the
security policy through the [Integrity], container registry), subscribing to and receiving
[Confidentiality], [Message] and notifications, performing handle resolution and
[Token] attributes. [Integrity] and invoking service methods. We then test the
[Confidentiality] allow specification of digital implementations further by exercising the functions of
signing and encryption requirements respectively. the GridServicePortType (finding service data,
Each attribute specifies the portion of the message to termination, etc) and the FactoryPortType (by creating
which the requirement applies and the token(s) that can new services). These tests ensure that both containers
be used to either sign or encrypt the message portion. can inter-operate whether a particular they are
[Message] can be used to define other requirements operating as the server or the client.
of the message. Currently, only the message age can be
specified and “compliant” messages must be less than A deeper issue, common to all OGSI containers, is
the given age (based on their WS-Timestamps). Lastly, how they will inter-operate “below the spec”. The
[Token] is used to specify the cryptographic tokens OGSI specification does not fully define (nor should it
necessarily) the exact content of each message
that must be (or cannot be) used to sign or encrypt
exchanged between grid services. OGSI provides a
messages. Various token types (e.g. X509, Kerberos,
framework for request/response messages to a standard
Username) can be specified although currently only
set of port types, but the exact semantics of those
X509 tokens are implemented. Each token can be
messages is not always fully defined. For example,
parameterized with a token-specific string. For X509
tokens, this string allows DN and CA to be specified. OGSI cannot define what a GSR will look like for all
possible transport/messaging formats. Further
When the policy of checked against a message using
specification of the exact results returned by common
an X509 token, if DN or CA was specified, the token
system components, e.g. Container registry services,
must contain the correct DN, CA or both. We note that
will allow client and services from different
certain security policy decisions are appropriate for the
implementations to inter-operate. We are currently
grid service author (e.g. which functions require
engaged in an effort with Jarek Gawor and the GT3
administrative access) while certain decisions are
team to make OGSI.NET and GT3 inter-operate such
appropriate for the grid service deployer (e.g. which
that unmodified clients (written for either container)
CAs are acceptable). While it is appropriate for grid
can access services running in both hosting
service author decisions to be represented “in code”, it
environments. We hope that this work will further
this is probably not appropriate for grid service
define the OGSI-compliance process and guide other
deployer decisions. Currently, we are working on
container implementers whose experiences can also be
defining what policy authors and deployers wish to
filtered back into the process.
control and how each should specify this in
OGSI.NET.
Another useful product of the creation of the
OGSI.NET container was experience with the OGSI
More details on OGSI.NET’s programming model see
specification itself. We are in a unique position to
“Attribute-base Programming for Grid Services” [8]
reflect on different aspects of OGSI and how useful
and “OGSI.NET Programmer’s Reference” [9].
they are to the process of creating grid applications.
The first way in which OGSI was useful was that
8. Discussion building on top of web services allowed us to leverage
In order to achieve wide-scale inter-operability among the deeply integrated support of web services that
OGSI-compliant implementations, it is important to Microsoft has placed in .NET. It also allows access to
leverage work currently being done, or planned to be web service tools (e.g. Microsoft’s wsdl.exe can be
started, on other hosting environments. To date, GT3 is
used to generate client stubs for OGSI.NET grid [3] IBM Corporation and Microsoft Corporation.
services). 2002. Security in a Web Services World: A
Proposed Architecture and Roadmap. http://www-
The utility of the factory paradigm has been debated 106.ibm.com/developerworks/webservices/library/
[5], but in developing OGSI.NET, it was proved useful ws-secmap/.
in some circumstances. Firstly, factories and instance [4] Microsoft Corporation. 2003. .NET Framework.
provide natural abstraction for exposing computational http://www.microsoft.com/net/.
jobs as services. Users are used to the idea that jobs [5] Parastatidis, S., Webber, J., Watson, P. and
“spawn” as individually addressable/monitorable Richbeck, T. 2003. A Grid Application
entities. Second, the meta-factory concept provides a Framework Based on Web Services Specifications
mechanism by which services not known to the and Practices. Available from
container when it starts can be deployed. In a factory- http://www.neresc.ac.uk/ws-gaf/.
less world, it is unclear how new types of services (not [6] Sandholm, T., Tuecke, S., Gawor, J., Seed, R.
just new instances of services) can be instantiated Maguire, T. Rofrano, J., Sylvester, S. and
dynamically. Williams, M. 2002. Java OGSI Hosting
Environment Design – A Portable Grid Service
Other OGSI-isms such as asynchronous notification Container Framework. Globus Toolkit 3 Alpha 2
and handle resolution are useful precisely because docs.
OGSI defines functions for achieving these common [7] Tuecke, S., Czajkowski, C., Foster, I., Frey, J.,
grid computing needs. Such facilities will be needed by Graham, S., Kesselman, C., Vanderbilt, P., and
a grid system and will likely be defined in different, Snelling D. 2002. Grid Service Specification –
incompatible ways, if left to the individual systems. Draft 11/4/02. OGSI Working Group, Global Grid
Here OGSI fulfills its main function by defined Forum. http://www.ggf.org/ogsi-wg.
mechanisms for common grid tasks. [8] Wasson, G. and Humphrey, H. 2003. Attribute-
based Programming for Grid Services. GGF9
9. Conclusion Workshop on Designing and Building Grid
In this paper, we have presented OGSI.NET, an OGSI- Services.
complaint hosting environment based on the Microsoft [9] Wasson, G. 2003. OGSI.NET Programmer’s
.NET platform. OGSI.NET forms a bridge between the Reference. in the docs directory of the OGSI.NET
native Windows world and the OGSI-based systems in 2.0 distribution.
the Unix world, such as GT3. [10] Web Services Enhancements for Microsoft .NET.
http://msdn.microsoft.com/webservices/building/w
Many of the future plans for OGSI.NET have been se/default.aspx
presented throughout this paper. The immediate plans
include concentrating on inter-operation with GT3 and
improving/evaluating performance of the OGSI.NET
container itself. We will expand the security and policy
capabilities of the container and enrich the
programming model by the introduction of new
attributes. A greater understanding of the ways in
which OGSI.NET is used will be gained as it begins to
be used by the community. This understanding will
shape the future of OGSI.NET and hopefully provide
feedback useful for all OGSI-complaint systems.

10. References
[1] Foster, I., Kesselman, C., Nick, J., and Tuecke, S.
2002. The Physiology of the Grid: An Open Grid
Services Architecture for Distributed Systems
Integration. Open Grid Service Infrastructure WG,
Global Grid Forum, June 22, 2002.
[2] Globus Toolkit 3.0.2. 2003. The Globus Alliance.
Available at: http://www.globus.org/toolkit/gt3-
factsheet.html.

Você também pode gostar