Xrootd/dCache Implementation Martin Radicke File transfer methods - - PowerPoint PPT Presentation

xrootd dcache implementation
SMART_READER_LITE
LIVE PREVIEW

Xrootd/dCache Implementation Martin Radicke File transfer methods - - PowerPoint PPT Presentation

dCache Workshop DESY 18.- 19.01.2007 Hamburg Xrootd/dCache Implementation Martin Radicke File transfer methods in 1.7.0 wide-area transfer (stream-based) GridFTP (GSI authentification) HTTP local-area transfer (random access) dCap (dCache


slide-1
SLIDE 1

Xrootd/dCache

Martin Radicke

dCache Workshop DESY 18.- 19.01.2007 Hamburg

Implementation

slide-2
SLIDE 2

Martin Radicke dCache Workshop, 18.-19.01.2007 DESY, Hamburg 2

File transfer methods in 1.7.0

wide-area transfer (stream-based)

GridFTP (GSI authentification) HTTP

local-area transfer (random access)

dCap (dCache native protocol, GSI auth. available) xrootd

slide-3
SLIDE 3

Martin Radicke dCache Workshop, 18.-19.01.2007 DESY, Hamburg 3

What is xrootd?

well-defined protocol, specification freely available client/server suite using the xrootd protocol

distributed daemon serving disk data, developed by SLAC client (integrated in ROOT, POSIX wrapper), developed by INFN Padova

major design goals

fault tolerance (adding or removing servers, failover) performance (TCP connection multiplexing, load balancing) smart client supports server by understanding redirects and doing several retries in case of server failures

slide-4
SLIDE 4

Martin Radicke dCache Workshop, 18.-19.01.2007 DESY, Hamburg 4

Xrootd/dCache features

dCache SE is a fully functional xrootd-server

native implementation of all required protocol methods (xrootd door) from dCache point of view same treatment as other protocols

transparency on the client side

no code or configuration changes necessary

works with main clients

ROOT toolkit xrdcp (basic CLI)

xrootd redirection scheme maps to dCache's internal load balancing mechanism, based on load and space of pools

TXNetFile::Open(“root://dCacheServer:1094/pnfs/pathToFile”, “r”)

slide-5
SLIDE 5

Martin Radicke dCache Workshop, 18.-19.01.2007 DESY, Hamburg 5

Architectural overview

xrootd door PNFS PoolManager Pools

xrootd protocol

1. 3. 2.

Redirector → xrootd door Data Server → Pool

dCache xrootd

dCache SE ROOT Client

  • ther

components

slide-6
SLIDE 6

Martin Radicke dCache Workshop, 18.-19.01.2007 DESY, Hamburg 6

Security

remote policy: Token-based authorization (ALICE)

encrypted token attached to xrootd file open request created by external service (e.g. file catalogue) has limited lifetime carries DN of user, permissions (r/w) for a set of files xrootd/dCache decrypts token and applies permissions more authorization methods pluggable

local dCache SE policy

xrootd access can be restricted to read-only (for each door)

authentification: yet to come

slide-7
SLIDE 7

Martin Radicke dCache Workshop, 18.-19.01.2007 DESY, Hamburg 7

Advanced usage

multiple xrootd doors

client iterates over server list to find an available door

applying different access pattern

  • ne xrootd door set read-only
  • > allowing public access

antoher xrootd door set to read-write, but require authorization

  • > centrally controlled write access (file catalogue with ACLs)

TXNetFile::Open(“root://door1,door2,door3/pnfs/pathToFile”, “r”)

slide-8
SLIDE 8

Martin Radicke dCache Workshop, 18.-19.01.2007 DESY, Hamburg 8

Xrootd/dCache @ ALICE

LHC ALICE experiment

analysis applications heavily based on ROOT/PROOF xrootd in use for data management, additional need for interfacing LCG/gLite services (SRM, FTS)

evaluation of xrootd/dCache finished successfully

GSI Darmstadt, CERN, GridPP

close contact to ALICE and fast development cycles xrootd/dCache about to go into production as an ALICE SE during PDC07

slide-9
SLIDE 9

Martin Radicke dCache Workshop, 18.-19.01.2007 DESY, Hamburg 9

Conclusion

dCache SE got enhanced by the xrootd access protocol acts as an xrootd-server while making full use of dCache core functionalities (mainly pool selection and namespace handling) first security mechanism added (Token authorization) about to go into production (ALICE service challenge)

slide-10
SLIDE 10

Martin Radicke dCache Workshop, 18.-19.01.2007 DESY, Hamburg 10

Outlook

authentification based on GSI under discussion

mapping of DN to local user, rights management reduces the risk of stealing the authorization token to a minimum

as user community grows, more protocol features are implemented If you are interested in a special feature, contact the developers!