An Architecture for Internet Data Transfer Niraj Tolia, Michael Kaminsky, David G. Andersen, and Swapnil Patil NSDI ’06 2008. 8. 12. Eunsang Cho.

Slides:



Advertisements
Similar presentations
Internet Applications INTERNET APPLICATIONS. Internet Applications Domain Name Service Proxy Service Mail Service Web Service.
Advertisements

Web Server Benchmarking Using the Internet Protocol Traffic and Network Emulator Carey Williamson, Rob Simmonds, Martin Arlitt et al. University of Calgary.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
HTTP Cookies. CPSC Application Layer 2 User-server state: cookies Many major Web sites use cookies Four components: 1) cookie header line of HTTP.
Technical Architectures
Application Layer  We will learn about protocols by examining popular application-level protocols  HTTP  FTP  SMTP / POP3 / IMAP  Focus on client-server.
An Analysis of Internet Content Delivery Systems Stefan Saroiu, Krishna P. Gommadi, Richard J. Dunn, Steven D. Gribble, and Henry M. Levy Proceedings of.
The Internet Useful Definitions and Concepts About the Internet.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
1 Lecture 30 Introduction to Data Communications Overview  Lecture Objectives.  Data Communications: Basics.  Major Issues in Data Communications. 
An Architecture for Internet Data Transfer Niraj Tolia Michael Kaminsky*, David G. Andersen, and Swapnil Patil Carnegie Mellon University and *Intel Research.
An Architecture for Internet Data Transfer Niraj Tolia Michael Kaminsky*, David G. Andersen, and Swapnil Patil Carnegie Mellon University and *Intel Research.
An Architecture for Internet Data Transfer Offence by: Aaron Ballew Sagar Vemuri.
Data Communications Architecture Models. What is a Protocol? For two entities to communicate successfully, they must “speak the same language”. What is.
Service Providers & Data Link & Physical layers Week 4 Lecture 1.
Business Data Communications & Networking
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
1 Computer Networks Transport Layer Protocols. 2 Application-layer Protocols Application-layer protocols –one “piece” of an app –define messages exchanged.
Application Layer  We will learn about protocols by examining popular application-level protocols  HTTP  FTP  SMTP / POP3 / IMAP  Focus on client-server.
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
COMPUTER TERMS PART 1. COOKIE A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
CLIENT A client is an application or system that accesses a service made available by a server. applicationserver.
Barracuda Load Balancer Server Availability and Scalability.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
Computer Networks26-1 Chapter 26. Remote Logging, Electronic Mail and File Transfer.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Institute of Computer and Communication Network Engineering OFC/NFOEC, 6-10 March 2011, Los Angeles, CA Lessons Learned From Implementing a Path Computation.
1 Introduction to Networking Dr. Mahdi Nasereddin PPU.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
Protocol(TCP/IP, HTTP) 송준화 조경민 2001/03/13. Network Computing Lab.2 Layering of TCP/IP-based protocols.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Common Servers in a Workplace Environment Brandon Reynolds Computer Electronic Networking Dept. of Technology, Eastern Kentucky University.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
The Transport Layer application transport network data link physical application transport network data link physical application transport network data.
A Measurement Based Memory Performance Evaluation of High Throughput Servers Garba Isa Yau Department of Computer Engineering King Fahd University of Petroleum.
Ditto - A System for Opportunistic Caching in Multi-hop Mesh Networks Fahad Rafique Dogar Joint work with: Amar Phanishayee, Himabindu Pucha, Olatunji.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 8 Omar Meqdadi Department of Computer Science and Software Engineering University of.
1 Evaluation of Cooperative Web Caching with Web Polygraph Ping Du and Jaspal Subhlok Department of Computer Science University of Houston presented at.
ECEN “Internet Protocols and Modeling”, Spring 2012 Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Class.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
IT 210: Web-based IT Winter 2012 Measuring Speed on the Internet and WWW.
Lecture Week 3 Application Layer Functionality and Protocols Network Fundamentals.
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
Networking Named Content Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, Rebecca L. Braynard.
2007cs Servers on the Web. The World-Wide Web 2007 cs CSS JS HTML Server Browser JS CSS HTML Transfer of resources using HTTP.
1. Introduction REU 2006-Packet Loss Distributions of TCP using Web100 Zoriel M. Salado, Mentors: Dr. Miguel A. Labrador and Cesar D. Guerrero 2. Methodology.
Getting Connected Overview Getting Connected Overview.
Performance Testing Test Complete. Performance testing and its sub categories Performance testing is performed, to determine how fast some aspect of a.
1 Microsoft Outlook Web Access Outlook Web Access Overview Outlook Web Access Environments.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
1 Evaluation of Cooperative Web Caching with Web Polygraph Ping Du and Jaspal Subhlok Department of Computer Science University of Houston presented at.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
UDP: User Datagram Protocol. What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host – treats a computer as an.
The Transport Layer Implementation Services Functions Protocols
Some bits on how it works
Processes The most important processes used in Web-based systems and their internal organization.
Department of Computer Science University of Calgary
Chapter 2 Introduction Application Requirements VS. Transport Services
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Internet Protocols IP: Internet Protocol
Computer Networks Protocols
Objectives: 1.Identify different internet protocol (IP) 2.Configure sample of IP address 3.Appreciate and relate protocol in our life.
Presentation transcript:

An Architecture for Internet Data Transfer Niraj Tolia, Michael Kaminsky, David G. Andersen, and Swapnil Patil NSDI ’ Eunsang Cho

2/23 Contents Motivation Data Oriented Transfer (DOT)‏  Architecture  Scenarios Evaluation  File Transfer  Postfix – production mail server Conclusion

3/23 Motivation Over 70% of Internet traffic is bulk data transfer.  Many efforts to improve this kind of transfer. Imagine that you have a novel data transfer – such as BitTorrent. How can you deploy it?  Update HTTP: Talk to IETF. Modify Apache, IIS, Firefox, IE,...  Update SMTP: Talk to IETF. Modify Sendmail, Postfix, Thunderbird, Outlook,...  Repeat... Give it up...

4/23 Motivation Innovation in data transfer is very difficult. Why?  Content negotiation and data transfer is tightly coupled.  Content negotiation: deciding what data to be sent. Naming, language, identification,...  Data transfer: actual data bits are exchanged. Solution Application Protocol SenderReceiver Xfer Service and Data Data

5/23 Data Oriented Transfer (DOT)‏

6/23 Architecture Applications perform content negotiation as before. And then, applications use transfer service for actual data exchange.

7/23 An unique OID (object identifier) refers to an object.  OID is generated with cryptographic hash. Hints inform the possible data locations. Data Exchange using DOT Xfer Service Sender Receiver Request File X OID, Hints put(X) OID, Hints get(OID, Hints) read() data Transfer Plugins

8/23 Data Exchange using DOT An unique OID (object identifier) refers to an object.  OID is generated with cryptographic hash. Hints inform the possible data locations. Generic Transfer Client Extra round trips

9/23 Extensibility Application Protocol SenderReceiver Xfer Service USB Keychain Xfer Service Local Cache USB Keychain Bittorrent Application-independent cache Non-networked transfers New network features Bittorrent Plugins

10/23 Plugins Plugins: add new features to DOT  Transfer plugins Transferring data between hosts  Storage plugins Providing access to local data Dividing data into chunks Computing the content hash of data

11/23 Plugin Examples Multi-path plugin  Acts as a load balancer between multiple transfer plugins Portable storage plugin  Supports portable storage device such as USB keychain DOT Network MultiPath Plugin Transfer Plugin Transfer Plugin

12/23 Scenarios Beneficial usages  Cross-application caching A user receives the same file through IM as well as .  Content delivery networks Akamai could extent their reach beyond just the Web.  Not bound to a particular network, layer, or technology Multi-path transfer over different types of network Portable storage to transfer data

13/23 Benefits Applications can reuse available transfer techniques. Easier deployment of new technologies. Cross-application sharing.

14/23 Limitations DOT is a receiver-pull, point-to-point service.  Not suitable for real-time communication such as telnet. Intended to large transfers.  Extra round trips are significant overhead for small transfers.

15/23 Evaluation

16/23 File Transfer gcp  Similar to scp  Bulk data transfer occurs via GTC-GTC communication Network Emulator  Evaluate various bandwidths and delays Network Emulator

17/23 Result of File Transfer Overhead: hashing, extra RTT No noticeable overhead with delay

18/23 Multi-path Plugin Link 1 (Mbps/ms) Link 2 (Mbps/ms) Single (s)Multipath (s)Savings 100/ % 10/ % Gigabit Link 1 Link 2 40MB over ideal 100Mbps: 3.2s Multi-path plugin nearly doubles throughput. TCP effects dominate. Link is not saturated. 100/ % 10/ % 1/ %

19/23 Portable Storage Plugin 255MB over emulated DSL  Based on Virtual Machine transfers at CMU Wait 5 minutes, and plug USB drive into receiver Two drive speeds  8MB/s  20MB/s 2 Mbit/s

20/23 Result of Portable Storage Plugin s (~ 19 min) Device Inserted

21/23 Postfix Trace Replay DOT is integrated with Postfix as an SMTP protocol extension.  for backward compatibility Based on recorded messages, messages were regenerated and used for replay.  Postfix is disk-bound, so DOT’s CPU overhead is negligible.  Savings are due to duplication within s. (caching) ProgramSecondsBytes Sent Postfix468172MB Postfix + DOT468117MB (68%)

22/23 Postfix Integration The cost of integrating DOT with the Postfix One week job for a graduate student, new to Postfix  Easy deployment ProgramLoCNew LoC% GTC Library-421- Postfix70, % smtpd6, % smtp3, %

23/23 Conclusion DOT separates content negotiation from data transfer.  With easier extending possibility DOT architecture has:  Relatively low overhead, especially for high delay  Benefits with caching and extensibility