Perspective on Overlay Networks Panel: Challenges of Computing on a Massive Scale Ben Y. Zhao FuDiCo 2002.

Slides:



Advertisements
Similar presentations
Brocade: Landmark Routing on Peer to Peer Networks Ben Y. Zhao Yitao Duan, Ling Huang, Anthony Joseph, John Kubiatowicz IPTPS, March 2002.
Advertisements

Dynamic Replica Placement for Scalable Content Delivery Yan Chen, Randy H. Katz, John D. Kubiatowicz {yanchen, randy, EECS Department.
Internet Indirection Infrastructure (i3 ) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002 Presented by:
Supporting Rapid Mobility via Locality in an Overlay Network Ben Y. Zhao Anthony D. Joseph John D. Kubiatowicz Sahara / OceanStore Joint Session June 10,
Tapestry: Scalable and Fault-tolerant Routing and Location Stanford Networking Seminar October 2001 Ben Y. Zhao
Tapestry: Decentralized Routing and Location SPAM Summer 2001 Ben Y. Zhao CS Division, U. C. Berkeley.
Self-Managing Anycast Routing for DNS
Peer-to-Peer Systems Chapter 25. What is Peer-to-Peer (P2P)? Napster? Gnutella? Most people think of P2P as music sharing.
Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
NDN in Local Area Networks Junxiao Shi The University of Arizona
Project Byzantium Networking for the Zombie Apocalypse.
Hiperspace Lab University of Delaware Antony, Sara, Mike, Ben, Dave, Sreedevi, Emily, and Lori.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Probabilistic Aggregation in Distributed Networks Ling Huang, Ben Zhao, Anthony Joseph and John Kubiatowicz {hling, ravenben, adj,
Networks and Distributed Systems: Project Ideas
On Proxy Server based Multipath Connections (PSMC) PhD Proposal Yu Cai 10/2003 University of Colorado at Colorado Springs.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
Tapestry Software Infrastructure Enabling Virtual Private Networks K. Balakrishnan, N. Chokshi, R. Huang, A. Konrad, S. Kumar, O. Sakdamnuson, B. Zhao.
Supporting Rapid Mobility via Locality in an Overlay Network Ben Y. Zhao Anthony D. Joseph John D. Kubiatowicz Sahara / OceanStore Joint Session June 10,
Scalable Adaptive Data Dissemination Under Heterogeneous Environment Yan Chen, John Kubiatowicz and Ben Zhao UC Berkeley.
Each mesh represents a single hop on the route to a given root. Sibling nodes maintain pointers to each other. Each referrer has pointers to the desired.
ProActive Infrastructure Eric Brewer, David Culler, Anthony Joseph, Randy Katz Computer Science Division U.C. Berkeley ninja.cs.berkeley.edu Active Networks.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
Connecting the Invisible Extremes of Computing David Culler U.C. Berkeley Summer Inst. on Invisible Computing July,
Implementation of a Tapestry Node: The main components: The core router, utilizes the routing and object reference tables to handle messages, The node.
Introspective Replica Management Yan Chen, Hakim Weatherspoon, and Dennis Geels Our project developed and evaluated a replica management algorithm suitable.
Weaving a Tapestry Distributed Algorithms for Secure Node Integration, Routing and Fault Handling Ben Y. Zhao (John Kubiatowicz, Anthony Joseph) Fault-tolerant.
OceanStore: An Architecture for Global-Scale Persistent Storage Professor John Kubiatowicz, University of California at Berkeley
1 Routing as a Service Karthik Lakshminarayanan (with Ion Stoica and Scott Shenker) Sahara/i3 retreat, January 2004.
Decentralized Location Services CS273 Guest Lecture April 24, 2001 Ben Y. Zhao.
OceanStore/Tapestry Toward Global-Scale, Self-Repairing, Secure and Persistent Storage Anthony D. Joseph John Kubiatowicz Sahara Retreat, January 2003.
Or, Providing High Availability and Adaptability in a Decentralized System Tapestry: Fault-resilient Wide-area Location and Routing Issues Facing Wide-area.
Or, Providing Scalable, Decentralized Location and Routing Network Services Tapestry: Fault-tolerant Wide-area Application Infrastructure Motivation and.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
Principles for Collaboration Systems Geoffrey Fox Community Grids Laboratory Indiana University Bloomington IN 47404
Locality Aware Mechanisms for Large-scale Networks Ben Y. Zhao Anthony D. Joseph John D. Kubiatowicz UC Berkeley Future Directions in Distributed Computing.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Word Wide Cache Distributed Caching for the Distributed Enterprise.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
SCAN: a Scalable, Adaptive, Secure and Network-aware Content Distribution Network Yan Chen CS Department Northwestern University.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Exploring the Network.
1 Evolving a Manageable Internet Tom Anderson University of Washington.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
Multiuser Receiver Aware Multicast in CDMA-based Multihop Wireless Ad-hoc Networks Parmesh Ramanathan Department of ECE University of Wisconsin-Madison.
Internet2 AdvCollab Apps 1 Access Grid Vision To create virtual spaces where distributed people can work together. Challenges:
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
Self-stabilizing energy-efficient multicast for MANETs.
Introduction to Networking
Intro Wireless vs. wire-based communication –Costs –Mobility Wireless multi hop networks Ad Hoc networking Agenda: –Technology background –Applications.
TRUST Self-Organizing Systems Emin G ü n Sirer, Cornell University.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Seminar On Rain Technology
Chapter 1 Characterization of Distributed Systems
Internet Indirection Infrastructure (i3)
Peer to peer Internet telephony challenges, status and trend
Weikuan Yu, Hui Cao, and Vineet Mittal The Ohio State University
Routers Multiport connectivity device
Overlay Networking Overview.
Mobile ad hoc networking: imperatives and challenges
Concept of VLAN (Virtual LAN) and Benefits
John D. Kubiatowicz UC Berkeley
DATA RETRIEVAL IN ADHOC NETWORKS
Rapid Mobility via Type Indirection
EE 122: Lecture 22 (Overlay Networks)
Brocade: Landmark Routing on Peer to Peer Networks
Hari Balakrishnan Hari Balakrishnan Computer Networks
Presentation transcript:

Perspective on Overlay Networks Panel: Challenges of Computing on a Massive Scale Ben Y. Zhao FuDiCo 2002

June 4, Why Overlays Changes to standards is hard Possible benefits of overlays Extensible communication models (more than best-effort point to point) More easily deployed services / infrastructures More adaptable, fault-tolerant …

June 4, Massive Scale Its coming… Driven by global scale resource sharing apps File-sharing, data dissemination, shared computation Viral deployment (Kazaa / alt.net) More thin clients going online: cellphones, PDAs, fridges, toasters

June 4, Implications of Scale Pushing bounds of infrastructure scalability Logarithmic bounds are not enough! Worse case: massive congestion, network partitions, data / service unavailability Scrutinize infrastructure scalability Re-examine system level primitives Control traffic, fault-detection, replication overhead Dampen impact of operations on infrastructure Localize bandwidth / storage requirements, faults

June 4, Highly Dynamic Its here… Small half-life for P2P apps (leeching) Connectivity loss from congestion, flash crowds, misconfiguration, hardware faults, lower MTBF BGP convergence 3-15 mins Mobile clients in semi-connected mode E.g. chatting / file-sharing on your IPAQ / Palm

June 4, Implications of Change Have to reexamine stability assumptions Overlay maintenance under instability Without care, worst case: sub-optimal paths, network partitions, broken invariants loss of availability Proactive overlay construction and maintenance Integrate optimal routes from square 1 Estimate global knowledge w/ distributed algorithms at node insertion Run-time heuristics are too late Constant fault-detection and self-repair Use of redundancy to mask self-repair

June 4, Extending Scope of Overlays Broader utility than file storage and retrieval General routing layer (efficiency, fault-tolerance) Detour, RAMP, RON, Tapestry Flexible data dissemination layer overlay multicast, anycast, mobility Collaborative applications Shared annotations, mail filtering Data transcoding Shared workspaces, games Distributed computation Barter incentives (Mojos, ads, access to resources)

June 4, Introspective Tuning for Reality Exploit knowledge of the environment Network latency discontinuity Order of magnitude latency jump from LAN to WAN Generic solution: Brocade: minimize wide-area hops via 2 nd overlay Non-uniformity in node resources PDA < laptops < desktops < servers Segregate supernodes, infrastructure routers, pure clients, storage devices

June 4, Many Security Challenges Open P2P = Infrastructure for attacks? Misreporting data unfair resource allocation DDoS attacks on infrastructure Sybil attack enabling scale for attacker Detecting maliciousness made harder Scalable defense? Cryptographic methods for authentication, privacy, etc. Byzantine agreement Redundancy (ID aliasing, multiple namespaces) Misuse leads to resource based DDoS Access control?