TRUST:Team for Research in Ubiquitous Secure Technologies

Slides:



Advertisements
Similar presentations
M-grid Using Ubiquitous Web Technologies to create a Computational Grid R J Walters and S Crouch 21 January 2009.
Advertisements

Using Gossip to Build Scalable Services Ken Birman, CS514 Dept. of Computer Science Cornell University.
Future Usage Environments & Systems Integration November 16 th 2004 HCMDSS planning workshop Douglas C. Schmidt (moderator) David Forslund, Cognition Group.
After the Internet Ken Birman Professor, Dept. of Computer Science Cornell University.
CS5412: ADAPTIVE OVERLAYS Ken Birman 1 CS5412 Spring 2012 (Cloud Computing: Birman) Lecture V.
Astrolabe Serge Kreiker. Problem Need to manage large collections of distributed resources (Scalable system) The computers may be co-located in a room,
Ken Birman Cornell University. CS5410 Fall
Epidemic Techniques Chiu Wah So (Kelvin). Database Replication Why do we replicate database? – Low latency – High availability To achieve strong (sequential)
Navigating in the Dark: New Options for Building Self- Configuring Embedded Systems Ken Birman Cornell University.
Cloud Storage – A look at Amazon’s Dyanmo A presentation that look’s at Amazon’s Dynamo service (based on a research paper published by Amazon.com) as.
EPIDEMIC TECHNIQUES Ki Suh Lee. OUTLINE Epidemic Protocol Epidemic Algorithms for Replicated Database Maintenance Astrolabe: A Robust and scalable technology.
Thesis Proposal Data Consistency in DHTs. Background Peer-to-peer systems have become increasingly popular Lots of P2P applications around us –File sharing,
On P2P Collaboration Infrastructures Manfred Hauswirth, Ivana Podnar, Stefan Decker Infrastructure for Collaborative Enterprise, th IEEE International.
Collaborative Content Delivery Werner Vogels Robbert van Renesse, Ken Birman Dept. of Computer Science, Cornell University A peer-to-peer solution for.
Approved for Public Release, Distribution Unlimited QuickSilver: Middleware for Scalable Self-Regenerative Systems Cornell University Ken Birman, Johannes.
Peer to Peer Networks Distributed Hash Tables Chord, Kelips, Dynamo Galen Marchetti, Cornell University.
CS5412: BIMODAL MULTICAST ASTROLABE Ken Birman CS5412 Spring Lecture XIX.
Leiden; Dec 06Gossip-Based Networking Workshop1 Epidemic Algorithms and Emergent Shape Ken Birman.
Leiden; Dec 06Gossip-Based Networking Workshop1 Gossip Algorithms and Emergent Shape Ken Birman.
Scalable Self-Repairing Publish/Subscribe Robbert van Renesse Ken Birman Werner Vogels Cornell University.
CS5412: BIMODAL MULTICAST ASTROLABE Ken Birman Gossip-Based Networking Workshop 1 Lecture XIX Leiden; Dec 06.
BIMODAL MULTICAST ASTROLABE Ken Birman 1 CS6410. Gossip  Recall from early in the semester that gossip spreads in log(system size) time  But is.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Why TRUST? Why this team? Ken Birman TRUST TRUST:Team for Research in Ubiquitous Secure Technologies September 13th 2004 NSF STC Review.
Tackling Challenges of Scale in Highly Available Computing Systems Ken Birman Dept. of Computer Science Cornell University.
Oracle Database Native Sharding: a customer perspective ©2016 PayPal Inc. Confidential and proprietary. John Kanagaraj, Sr. Member of Technical Staff,
What is BizTalk ?
Building Enterprise Applications Using Visual Studio®
Distributed, real-time actionable insights on high-volume data streams
Magdalena Balazinska, Hari Balakrishnan, and David Karger
Azure-Based Project Management App Helps Creative Agencies Run Their Projects Efficiently “With Microsoft Azure PaaS, we can focus on our app and offer.
Web Mashups -Nirav Shah.
Netscape Application Server
Information Services Discussion TeraGrid ‘08
New Heights by Guiding Them into the Cloud
TRUST Area 3 Overview: Privacy, Usability, & Social Impact
Open Source distributed document DB for an enterprise
Azure-Powered Software Solution is Changing the Way Real Estate Professionals Do Business “Microsoft Azure has empowered our team to focus on building.
Dynamo: Amazon’s Highly Available Key-value Store
The Azure Cloud Platform Delivers Data-Driven Digital Transformation for Credit Union Industry Partner Logo “When Helios and Matheson Analytics embarked.
CHAPTER 3 Architectures for Distributed Systems
EADD – Introduction Chapter -1.
Cloud Computing.
TRUST:Team for Research in Ubiquitous Secure Technologies
Using Gossip to Build Scalable Services
Ian Goldsmith – VP, Product Management, SOA Software
CS5412: Bimodal Multicast Astrolabe
CS5412: TIER 2 OVERLAYS Lecture VI Ken Birman
Design and Maintenance of Web Applications in J2EE
You Are Not Alone Architect Analyst Developer Manage Operations Tester
Providing Secure Storage on the Internet
Microsoft Azure Delivers Reliability, Security, and Mobility for Customers Moving to Cloud MINI-CASE STUDY “Using Microsoft Azure, we are able to move.
CS514: Intermediate Course in Operating Systems
Enterprise Service Bus (ESB) (Chapter 9)
Goals Introduce the Windows Server 2003 family of operating systems
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Microsoft Azure Carries the Load, Enabling IT Companies to Offer New Services to Customers “When we realized the volume of network traffic and the amount.
Cloud Computing and its Implementation
“Azure provides us with an integrated development environment
TRUST:Team for Research in Ubiquitous Secure Technologies
TRUST:Team for Research in Ubiquitous Secure Technologies
Big Data Young Lee BUS 550.
Enterprise Program Management Office
Web Application Server 2001/3/27 Kang, Seungwoo. Web Application Server A class of middleware Speeding application development Strategic platform for.
Architectures of distributed systems
CAD DESK PRIMAVERA PRESENTATION.
TRUST:Team for Research in Ubiquitous Secure Technologies
Mark Quirk Head of Technology Developer & Platform Group
CS5412: Bimodal Multicast Astrolabe
Distributed Systems and Algorithms
Presentation transcript:

TRUST:Team for Research in Ubiquitous Secure Technologies Secure Information Management Software Tools Ken Birman (lead) Anantharam, Bajcsy, Karsai, Lee, McFadden, Samuelson, Sastry, Schmidt, Sztipanovits, Weber, Wicker NSF STC Review September 13th 2004

The Need: Better Tools TRUST Software developers depend on complex platforms, and increasingly work by extending or customizing with extra code Web Services, J2EE, CORBA Even Microsoft .NET The quality of these platforms and “tools” is a direct determinant of the quality of their applications and solutions 2 NSF STC Review September 13th 2004

Existing Platforms are Inadequate TRUST Existing Platforms are Inadequate But existing platforms Scale poorly and can “melt down” under stress Are insecure; child’s play to disrupt or intrude Are human intensive to deploy, configure Are hard to repair when disruption occurs Are costly to own and operate Example: publish-subscribe scalability issues within Yahoo, Amazon, other big data centers 3 NSF STC Review September 13th 2004

Why don’t platforms scale? TRUST Why don’t platforms scale? Prevailing client-server communications model, combined with strong reliability goals, impose O(N) delays and O(N2) performance degradation New technologies offer hope Based on peer-to-peer interaction styles Substitute probabilistic objectives for classic deterministic ones 4 NSF STC Review September 13th 2004

Map nodes to affinity groups Kelips Map nodes to affinity groups Affinity Groups: peer membership thru consistent hash 1 2 1 N - 110 N 230 202 members per affinity group 30

110 knows about other members – 230, 30… Kelips 110 knows about other members – 230, 30… Affinity group view Affinity Groups: peer membership thru consistent hash id hbeat rtt 30 234 90ms 230 322 30ms 1 2 1 N - 110 N 230 202 members per affinity group 30 Affinity group pointers

202 is a “contact” for 110 in group 2 Kelips 202 is a “contact” for 110 in group 2 Affinity group view Affinity Groups: peer membership thru consistent hash id hbeat rtt 30 234 90ms 230 322 30ms 1 2 1 N - 110 Contacts N 230 202 members per affinity group group contactNode … 2 202 30 Contact pointers

Gossip protocol replicates data cheaply “cnn.com” maps to group 2. So 110 tells group 2 to “route” inquiries about cnn.com to it. Kelips Affinity group view Affinity Groups: peer membership thru consistent hash id hbeat rtt 30 234 90ms 230 322 30ms 1 2 1 N - 110 Contacts N 230 202 members per affinity group group contactNode … 2 202 30 Resource Tuples Gossip protocol replicates data cheaply resource info … cnn.com 110

Gossip protocol replicates data cheaply Kelips Lookup is routed by a contact node in group 2, then handled by node 110 Affinity Groups: peer membership thru consistent hash 1 2 1 N - 110 N 230 202 members per affinity group 30 Gossip protocol replicates data cheaply

Astrolabe: Scalable Monitoring Infrastructure Astrolabe: Scalable Monitoring Infrastructure. Captures system state hierarchically, using P2P protocol that “assembles a puzzle” without any servers Dynamically changing query output is visible system-wide SQL query “summarizes” data Name Avg Load WL contact SMTP contact SF 2.6 123.45.61.3 123.45.61.17 ITH 1.8 127.16.77.6 127.16.77.11 Paris 3.1 14.66.71.8 14.66.71.12 Name Load Weblogic? SMTP? Word Version … swift 2.0 1 6.2 falcon 1.5 4.1 cardinal 4.5 6.0 Name Load Weblogic? SMTP? Word Version … gazelle 1.7 4.5 zebra 3.2 1 6.2 gnu .5 Ithaca San Francisco

Our team has many ideas like the two you’ve seen TRUST Our team has many ideas like the two you’ve seen We’re challenging assumptions industry accepts as dogma (like client-server structure) Building real solutions that really work And finding ways to apply them in critical infrastructure settings For example, we’ve worked with EPRI to explore applications of Astrolabe and Kelips to monitoring the electric power grid Poor monitoring contributed to ’03 blackout 11 NSF STC Review September 13th 2004