Optimization of Data Transfer for Grid Using GridFTP

Radic, Branimir; Kajic, Vedran; Imamagic, Emir
December 2007
Journal of Computing & Information Technology;Dec2007, Vol. 15 Issue 4, p347
Academic Journal
Grid is a highly distributed heterogeneous environment which interoperates towards completing a common goal. As such, grids performance is highly dependant on the speed of data transfer between systems of which grid consists. Most commonly used and a "de facto" standard for data transfer on grid systems is GridFTP. While working on CRO-GRID Infrastructure project, we faced problems with small data transfer speeds when transferring small files. In this paper we present a program we have developed which uses GridFTP and speeds up data transfer of large number of small or medium sized files. We also present empirical results of the performance measurements achieved while using the implemented system.


Related Articles

  • Location Independent Remote Execution in NEST. Agrawal, Rakesh; Ezzat, Ahmed K. // IEEE Transactions on Software Engineering;Aug87, Vol. 13 Issue 8, p905 

    We consider a computing environment consisting of a network of autonomous, yet cooperating personal computer workstations and shared servers. Computing cycles in such an environment can be shared by treating a pool of compute servers in the network that may be used by the workstations to...

  • Data Compression and Source Coding. Hema, R. // International Conference on Information Theory & Applications;Mar2011, pI23 

    This paper surveys a variety of data compression methods. The aim of data compression is to reduce redundancy in stored or communicated data, thus increasing effective data density. Data compression has important application in the areas of file storage and distributed systems. Concepts of...

  • Reliability Optimization in the Design of Distributed Systems. Raghavendra, C. S.; Hariri, Salim // IEEE Transactions on Software Engineering;Oct85, Vol. 11 Issue 10, p1184 

    The reliability of a distributed system depends on the reliabilities of its communication links and computing elements, as well as on the distribution of its resources, such as programs and data files. A useful measure of reliability in distributed systems is the terminal reliability between a...

  • Grid Computing -- the Hasty Computing to Access Internet. Ashok, A.; Harikrishnan, N.; Thangavelu, V. // Computer Science & Telecommunications;2009, Vol. 2009 Issue 6, p30 

    Today we are in the Internet world and everyone prefers to enjoy fast access to the Internet. But due to multiple downloading, there is a chance that the system hangs up or slows down the performance that leads to the restarting of the entire process from the beginning. This is one of the...

  • Creating Directory Structures in Replicated, Synchronous Systems. Dathan, Brahma; Baireddy, Divya // Annual International Conference on Advances in Distributed & Par;2011, p1 

    The article considers the problem of obtaining a directory of files in a replicated, synchronous database system. It outlines the model and defines the problem. It explains the algorithm used, as well as analyze its complexity. It provides distribution system examples and the desired result. It...

  • Dynamic Routing in Distributed File System. Matějka, Luboš; Skupa, Jindřich; Strejc, Radek; Pešička, Ladislav; Šafařík, Jiří // Journal of Networks;Oct2014, Vol. 9 Issue 10, p2591 

    Mobile devices, such as smart phones, tablets, and netbooks, are now becoming increasingly popular. Effective access to remote files on servers in the network should be granted to the user. Today's common distributed file systems, such as OpenAFS, Coda, and others, are not suitable for use on...

  • Two-way Internet.  // Consumer Reports;Jul2001, Vol. 66 Issue 7, p65 

    Discusses several peer-to-peer Internet applications. File-sharing applications, like Gnutella; Research projects that use distributed computing; Instant messaging systems.

  • Top Tricks for Safe, Smart Downloads. Bass, Steve // PCWorld;Jun2007, Vol. 25 Issue 6, p45 

    The article offers tips for downloading files efficiently and safely. When picking up adware, the author suggests to giving Cyberhawk Basic a try. Unlike antivirus software that checks for virus signatures, Cyberhawk watches for and blocks suspicious behavior as it occurs. Or try Sandboxie, a...

  • Stego Machine -- Video Steganography using Modified LSB Algorithm. Ramalingam, Mritha // World Academy of Science, Engineering & Technology;May2011, Issue 53, p502 

    No abstract available.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics