Cluster Computing Spring 2004 Paul A. Farrell 4/25/2006. Dept of Computer Science Kent State University 1. Configuring & Tuning Cluster Networks

Similar documents
Cluster Computing Spring 2004 Paul A. Farrell

Parallel Panther Beowulf Cluster

Linux. Computer networks - Administration 1DV202. fredag 30 mars 12

Linux+ Guide to Linux Certification, Third Edition. Chapter 12 Network Configuration

Configure HOSTNAME by adding the hostname to the file /etc/sysconfig/network. Do the same to all the all nodes.

Project #3: Implementing NIS

Configure HOSTNAME by adding the hostname to the file /etc/sysconfig/network. Do the same to all the other 3(4) nodes.

TCP /IP Fundamentals Mr. Cantu

Preface to the First Edition Preface to the Second Edition Acknowledgments UNIX Operating System Environment p. 1 UNIX: Past and Present p.

VM Service. A Benchmark suite for cloud environment USER S MANUAL

Introduction to Internetworking

LAN Setup Reflection. Ask yourself some questions: o Does your VM have the correct IP? o Are you able to ping some locations, internal and external?

Position of IP and other network-layer protocols in TCP/IP protocol suite

Firewalls. Firewall. means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense

Software Engineering 4C03 Answer Key

Practical Magic with SSH. By David F. Skoll Roaring Penguin Software Inc. 1 February

SRT210. The Pragmetic art of Administration. NIS Server. Raymond Chan

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

LAN Setup Reflection

XE2000/XE3000 IP-PBX: Getting Started Guide Package Contents

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

TSIN02 - Internetworking

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

Interconnecting Networks with TCP/IP

Overview. Computer Center, CS, NCTU. Introduction Layers of TCP/IP. Network Interface and Hardware Networking ARP Setting up Network

Linux Network Administration

Secure SHell Explained!

Lecture 08: Networking services: there s no place like

SE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer

Vorlesung Kommunikationsnetze

Networking interview questions

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

RH202. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) Exam.

TELE301 Lab16 - The Secure Shell

Lab #9: Basic Linux Networking

IP fields. TCP/IP Support Protocols. IP datagram structure. IP fields. are another reason TCP/IPs popularity. total length

University of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J.

TCP/IP Protocol Suite and IP Addressing

NETWORK CONFIGURATION AND SERVICES. route add default gw /etc/init.d/apache restart

Network Configuration

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Different Layers Lecture 20

ITDUMPS QUESTION & ANSWER. Accurate study guides, High passing rate! IT dumps provides update free of charge in one year!

Internet Protocol, Version 6

Internet Protocols (chapter 18)

Data ONTAP 8.1 Software Setup Guide for 7-Mode

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

The Microdrive and CF card are electrically compatible this means that a CF card reader can be used to program a Microdrive.

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

Network Configuration for Cisco UCS Director Baremetal Agent

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

Cryptography Application : SSH. 7 Sept 2017, Taichung, Taiwan

TSIN02 - Internetworking

RG-MACC_2.0 Installation Manual

The Netwok 15 Layer IPv4 and IPv6 Part 3

ICS 451: Today's plan

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

CS162 Operating Systems and Systems Programming Lecture 21. Networking. Page 1

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology

TSIN02 - Internetworking

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material

What is Secure. Authenticated I know who I am talking to. Our communication is Encrypted

TCP/IP Protocol Suite

NT1210 Introduction to Networking. Unit 10

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Testpassport.

Setting Up a Multihomed System

Chapter 5 Network Layer

Create Test Environment

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August

9th Slide Set Computer Networks

TSIN02 - Internetworking

Introduction to internetworking, OSI, TCP/IP and Addressing.

CHAPTER-2 IP CONCEPTS

TECHNICAL NOTE. Technical Note. EMC Avamar Post-Installation Network Configuration Avamar 5.x, 6.x, or 7.x Server Software P/N REV 03

THE INTERNET PROTOCOL INTERFACES

Computer Security Spring Firewalls. Aggelos Kiayias University of Connecticut

The Internet Protocol

Networking Technologies and Applications

Computer Security and Privacy

ET4254 Communications and Networking 1

CompTIA Exam LX0-102 Linux Part 2 Version: 10.0 [ Total Questions: 177 ]

Copyleft 2005, Binnur Kurt. Objectives

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016

Cryptography - SSH. Network Security Workshop May 2017 Phnom Penh, Cambodia

CIT 380: Securing Computer Systems. Network Security Concepts

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Cryptography Application : SSH. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh

Network Layer: Internet Protocol

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

Cryptography - SSH. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Chapter 09 Network Protocols

10 Defense Mechanisms

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

SEN366 (SEN374) (Introduction to) Computer Networks

User Datagram Protocol

Transcription:

Configuring & Tuning Cluster Networks Node connectivity Node visibility Networking Services Security Performance Enhancement Network Designs Impact of Network Design Security from outside attack Usability Single application : tune for it General purpose : intuitiveness and ease of use Application performance Network Designs Fully Internet connected all nodes visible from outside Only front-end machine Internet visible User logs on front-end and can access all nodes Only front-end machine Internet visible Can compile and test there Computational nodes only accessible through scheduler Single System Image Cluster Computing 1 Cluster Computing 2 Internet Protocol Stack and Parameters NIC/OS Driver Maximum Amount of Data in Frame : MTU (Maximum Transmission Unit) Ethernet 1500 bytes GE Jumbo Frame 9000 bytes IP (Internet Protocol) Header includes length of datagram (incl header) field 16 bits field -> 65,635 bytes IP datagrams larger than MTU are fragmented and reassembled by receiver Datagrams may also be fragmented by intermediate routers if MTU on outgoing link is smaller IP only identifies machines Unreliable, unordered, connectionless (stateless) UDP and TCP User Datagram Protocol (UDP) Unreliable, unordered, connectionless (stateless) Allows identification of end-points of communication (ports) Multiple flows per machine Transmission Control Protocol (TCP) Reliable communication, bidirectional connection, state maintained Data is segmented and each segment, plus TCP header, embedded in an IP datagram. Maximum Segment Size (MSS) is size of segment To avoid segmentation MSS is advertised as MSS = MTU of network sizeof (TCP + IP headers) On LAN MTU is MTU of NIC Cluster Computing 3 Cluster Computing 4 Kent State University 1

TCP On WAN determining MSS more difficult MTU of all intermediate networks not known TCP/IP assume MTU of 576 bytes unless sysadm specifies Wide area MTU discovery is then used to determine the maximum MTU acceptable to all networks TCP reliability uses positive acknowledgements (ACKs), sliding windows to permit multiple unacked segments data buffering : receiver can advertise amount available Provides flow control IP addresses 32 bits (4 octets) usually written 131.123.42.51 Consists of network and host parts Netmask is used to indicate network part AND with netmask Ex: 255.255.255.0 means first 3 octets network, last host Reserved Host Addresses 0 network itself 255 broadcast Routers use network part of IP address to choose network link Sender must know address of local router gateway router Cluster Computing 5 Cluster Computing 6 Non-Routable IP Addresses Reserved for private networks: 10.0.0.0-10.255.255.255 172.16.0.0 173.31.255.255 192.168.0.0 192.168.255.255 Can be used for clusters that Don t need to communicate on the Internet Are behind a firewall that does NAT (Network Address Translation) Hostnames Unique name - really an interface name long version including domain (f01.fianna.cs.kent.edu) Short version (f01) Recommendation for Clusters Give nodes names like f01 f32 and address 192.168.1.1 to 192.168.1.32 Gateway must follow nodes try maximum available host address e.g. 192.168.1.254 Cluster Computing 7 Cluster Computing 8 Kent State University 2

Name Resolution /etc/hosts File with list of IP address, long and short hostnames, one per line Also loopback device address 127.0.0.1 localhost.fianna.cs.kent.edu localhost Can have a master copy on one node Push to other nodes using e.g. scp (see 5.3.5) Use cluster administration tools (see Ch 6) Alternatives NIS (Network Information Service) Also can do /etc/passwd, /etc/group etc DNS (Domain Name Service) File Sharing NFS (Network File System) Allows installation of software package on one machine and use on all Allows users to have access to programs and data on all machines Also useful on clusters Also ensure shared libraries available on every node Users need to take care if they are writing from the processes executing on each node to ensure they do not overwrite data Cluster Computing 9 Cluster Computing 10 Remote Access telnet, rlogin, rsh, rcp telnet security issue send data including passwords in clear rlogin, rsh, rcp Can use host based authentication File of hosts authorized to connect without password /etc/hosts.equiv ~/.rhosts Need to control physical access to network and to these files Secure shell ssh, slogin, scp, sftp Public-private key based authentication Can verify that host is expected host using keys More later Cluster Configuration Example RH9 Network address : 192.168.13.0 Netmask: 255.255.255.0 Gateway: 192.168.13.254 Cluster Computing 11 Cluster Computing 12 Kent State University 3

Initial Install Default workstation install Add NIS Will run NIS and NFS servers on bc1-01 Assume DNS server on 192.168.1.1 for hosts outside cluster network Hostname and gateway /etc/sysconfig/network NETWORKING=yes HOSTNAME=bc1-01.phy.myu.edu GATEWAY=192.168.13.254 Use long name Changes only take effect on reboot Network Interface Configuration Disable the interface using ifdown eth0 /etc/sysconf/network-scripts/ifcfg-eth0 DEVICE=eth0 BOOTPROTO=static IPADDR= 192.168.13.1 NETMASK=255.255.255.0 GATEWAY= 192.168.13.0 BROADCAST= 192.168.13.255 ONBOOT=yes Enable the interface using ifup eth0 Cluster Computing 13 Cluster Computing 14 Name Resolution Enter names of all hosts and localhost in /etc/hosts on bc1-01 Use NIS to make available On other hosts only add localhost entry Nameserver /etc/resolv.conf nameserver 192.168.1.1 search phy.myu.edu Search path is appended to short names Accounts Use adduser Create /etc/passwd and /etc/shadow entries Adds group for user in /etc/group Creates home directory Run passwd to set password To create on other nodes Do it all again, and again and Automate with scp, ssh and perhaps NIS Note NIS and NFS treat root differently NIS does not publish root info NFS does not mount the root s home directory Enhanced security Cluster Computing 15 Cluster Computing 16 Kent State University 4

Packet Filtering Default in RH9 blocks ssh, NFS, NIS Need to change /etc/sysconfig/iptables Insert before first A INPUT line -A INPUT p tcp m tcp dport 22 - - syn j ACCEPT -A INPUT p tcp s 192.168.13.0/24 j ACCEPT -A INPUT p udp s 192.168.13.0/24 j ACCEPT Allows ssh connections from everywhere and all tcp and udp packets from any cluster machines Execute /etc/rc.d/init.d/iptables restart Secure Shell RH9 has OpenSSH package Ssh, scp, sshd With packet filter rules, root can replicate files over nodes Need NIS, NFS to enable for non-root users Sshd generates authentication keys when first started Client needs to know public key to validate First connection to a host ssh asks user to authorize Then stores name and public key in ~/.ssh/known_hosts Alternatively sysadm can create system wide list in /etc/ssh/ssh_known_hosts Can be done automatically using ssh-keyscan Uses file (say scanhosts) with IP address, all names and addresses ssh-keyscan t rsa,dsa,rsa1 f scanhosts > /etc/ssh/ssh_known_hosts Cluster Computing 17 Cluster Computing 18 Ssh user authentication Users must still be authenticated Default by password Alternative: host based authentication Need to change configuration in /etc/ssh/sshd_config HostbasedAuthentication yes IgnoreUserKnownHosts yes IgnoreRhosts no Last allows authorization file ~/.shosts to be used Needed for root for which /etc/ssh/shosts.equiv not used Both need to contain list of full hostnames of all nodes To make effective need to restart sshd /etc/rc.d/init.d/sshd restart The client config file /etc/ssh/ssh_config needs to have HostbasedAuthentication yes added Ssh key generation Users can generate authentication keys using ssh-keygen t rsa Public and private keys put in ~/.ssh/id_rsa.pub and ~/.ssh/id_rsa Adding public key to ~/.ssh/authorized_keys on any machine allows password free access Keys can be generated with or without a passphrase to protect the private key If generated with passphrase, this must be entered for each remote operation Alternative: use ssh-agent to manage private pass keys and ssh-add to add them to set of managed keys (see book) See www.openssh.org for more information Cluster Computing 19 Cluster Computing 20 Kent State University 5

Network Information Service (NIS) Originally a Sun product (yellow-pages) On each node add to /etc/sysconfig/network NISDOMAIN=bc1.phy.myu.edu NIS domain being administered NIS server run on bc1-01. Add to /var/yp/securenets host 127.0.0.1 255.255.255.0 192.168.13.0 Replace all: line in /var/yp/makefile with list to be exported all: passwd group hosts networks services protocols rpc NIS (ctd.) Need to build maps (databases) of services echo loopback 127 >> /etc/networks /etc/rc.d/init.d/ypserv start /etc/rc.d/init.d/ypxfrd start /etc/rc.d/init.d/yppasswdd start cd /var/yp make Need to have start automatically at boot time chkconfig --level 345 ypserv on (etc) Configure ypbind to run on all clients /etc.rc.d/init.d/ypbind start chkconfig --add ypbind chkconfig --level 345 ypbind on Cluster Computing 21 Cluster Computing 22 NIS (ctd.) To make opsys use NIS update /etc/nsswitch.conf passwd: files nis hosts: files nis dns etc When new accounts or groups are added need to rebuild maps To make changed passwords available on all nodes use yppasswd If sshd is started before ypbind then ssh will not use NIS, so need to restart sshd Network File System On bc1-01 export users home directories by adding to /etc/exports /home 192.168.13.0/24(rw) Enable and start NFS chkconfig --level 345 nfs on /etc/rc.d/init.d/nfs start Configure client nodes to mount /home directories from bc1-01 add to /etc/fstab 192.168.13.1:/home /home nfs rw,hard,intr,bg,rsize=8192,wsize=8192 0 0 To cause remote file system to be mounted /etc/rc.d/init.d/netfs restart Cluster Computing 23 Cluster Computing 24 Kent State University 6

Scripting It For larger cluster need to automate process Can use, for example, kickstart in RH9 A config file is automatically generated during installation This can be used to create a kickstart file for other nodes This is copied to a floppy and used together with the RH CD to create the other nodes See book for details Cluster Computing 25 Kent State University 7