| ||
|
|
SETI and grid computing |
|
The Search for Extra-Terrestrial Intelligence (SETI) project initiated by UC Berkeley, and mentioned in the movie 'Contact', basically harnesses the computing power of each individual PC linked to its network to analyze the enormous amount of radio data collected by its space telescope. Anyone who believes in the existence of alien life forms may participate in this quest by downloading a screensaver program from the http://setiathome.berkeley.edu and registering with the SETI server. While connected to the Internet, the program will activate itself during idle moments just like any other screensaver. Using the computing resources available in a PC, it then process radio spectra as received by the space telescope at Arecibo, Puerto Rico, which tracks the skies 24 hours everyday for unusual radio activity believed to be our alien friends attempting to communicate. Because of the potential load of the data, which could amount to millions of gigabytes each day, it makes more economical sense to use the combined power of the millions of PCs around the world, rather than one or several prohibitively expensive super computers. |
Security is a major issue in any distributed computing system. This falls into the point where I mentioned that grid technology is more than just about bringing resources together, it's also about making them usable. One important point that makes the grid usable is the security. Would anyone eat at a restaurant where any stranger can walk into the kitchen and poison the mee goreng? I wouldn't.
In ALiCE, we address the problem by several techniques:
secure sockets, encryption, authentication, sand-boxing mechanisms, and
many more. ALiCE provides several 'levels' of security. A more secure
environment would have effects on performance because some resources will
be allocated for the security mechanisms. In ALiCE, we
strictly enforce
anonymity among the participating resources. This means that a
participating computer would not be able to know what other computers
there are in the ALiCE system. This makes life more difficult for
hackers.
For more information on the ALiCE project, please see http://www.comp.nus.edu.sg/~teoym
Contributed by:
Josh San
2nd Year
Undergraduate
Media Publications
Student Associates
Program