A P2P-based Storage Platform for Storing Session Data in Internet Access Networks T. Bahls, D. Duchow Nokia Siemens Networks Broadband Access Division.

Slides:



Advertisements
Similar presentations
Analysis and Construction of Functional Regenerating Codes with Uncoded Repair for Distributed Storage Systems Yuchong Hu, Patrick P. C. Lee, Kenneth.
Advertisements

P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Digital Library Service – An overview Introduction System Architecture Components and their functionalities Experimental Results.
Dr. Kalpakis CMSC 621, Advanced Operating Systems. Fall 2003 URL: Distributed System Architectures.
TCP-IP Primer David Cozens. Targets Have a basic understanding of Ethernet network technology Be aware of how this technology is applied on the 5000 series.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Kademlia: A Peer-to-peer Information System Based on the XOR Metric Petar Mayamounkov David Mazières A few slides are taken from the authors’ original.
CHORD – peer to peer lookup protocol Shankar Karthik Vaithianathan & Aravind Sivaraman University of Central Florida.
© 2005 Andreas Haeberlen, Rice University 1 Glacier: Highly durable, decentralized storage despite massive correlated failures Andreas Haeberlen Alan Mislove.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Speaker: Cathrin Weiß 11/23/2004 Proseminar Peer-to-Peer Information Systems.
Massively Distributed Database Systems Distributed Hash Spring 2014 Ki-Joune Li Pusan National University.
Small-world Overlay P2P Network
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications Stoica et al. Presented by Tam Chantem March 30, 2007.
Wide-area cooperative storage with CFS
File Sharing : Hash/Lookup Yossi Shasho (HW in last slide) Based on Chord: A Scalable Peer-to-peer Lookup Service for Internet ApplicationsChord: A Scalable.
Focus on Distributed Hash Tables Distributed hash tables (DHT) provide resource locating and routing in peer-to-peer networks –But, more than object locating.
Locality-Aware Request Distribution in Cluster-based Network Servers Presented by: Kevin Boos Authors: Vivek S. Pai, Mohit Aron, et al. Rice University.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
EKT303/4 PRINCIPLES OF PRINCIPLES OF COMPUTER ARCHITECTURE (PoCA)
Chapter 4: Managing LAN Traffic
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
CSC 456 Operating Systems Seminar Presentation (11/13/2012) Leon Weingard, Liang Xin The Google File System.
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
Distributed Systems Concepts and Design Chapter 10: Peer-to-Peer Systems Bruce Hammer, Steve Wallis, Raymond Ho.
1 Wide Area Networks Computer Networks. 2 Motivation Connect multiple sites Span geographic distances Cross public right-of-way streets buildings railroads.
Institute of Computer and Communication Network Engineering OFC/NFOEC, 6-10 March 2011, Los Angeles, CA Lessons Learned From Implementing a Path Computation.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Overlay network concept Case study: Distributed Hash table (DHT) Case study: Distributed Hash table (DHT)
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Of Rostock University DuDE: A D istributed Computing System u sing a D ecentralized P2P E nvironment The 4th International Workshop on Architectures, Services.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Kiew-Hong Chua a.k.a Francis Computer Network Presentation 12/5/00.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
An Improved Kademlia Protocol In a VoIP System Xiao Wu , Cuiyun Fu and Huiyou Chang Department of Computer Science, Zhongshan University, Guangzhou, China.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
EKT303/4 PRINCIPLES OF PRINCIPLES OF COMPUTER ARCHITECTURE (PoCA)
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Rehab AlFallaj.  Network:  Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and do specific task.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Bruce Hammer, Steve Wallis, Raymond Ho
Middleware issues: From P2P systems to Ad Hoc Networks
PeerNet: Pushing Peer-to-Peer Down the Stack Jakob Eriksson, Michalis Faloutsos, Srikanth Krishnamurthy University of California, Riverside.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Enterprise Computing with Jini Technology Mark Stang and Stephen Whinston Jan / Feb 2001, IT Pro presented by Alex Kotchnev.
Querying the Internet with PIER CS294-4 Paul Burstein 11/10/2003.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Seminar On Rain Technology
© 2015 MetricStream, Inc. All Rights Reserved. AWS server provisioning © 2015 MetricStream, Inc. All Rights Reserved. By, Srikanth K & Rohit.
Amazon Web Services. Amazon Web Services (AWS) - robust, scalable and affordable infrastructure for cloud computing. This session is about:
Chapter 29 Peer-to-Peer Paradigm Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
SEMINAR TOPIC ON “RAIN TECHNOLOGY”
PART1 Data collection methodology and NM paradigms 1.
Networking and firewall
Statistics Visualizer for Crawler
Module 8: Networking Services
Nuno Salta Supervisor: Manuel Ricardo Supervisor: Ricardo Morla
OceanStore: An Architecture for Global-Scale Persistent Storage
CHAPTER 3 Architectures for Distributed Systems
Plethora: Infrastructure and System Design
Prof. Leonardo Mostarda University of Camerino
Static Routing 1st semester
Scalable Memory-Less Architecture for String Matching With FPGAs
Specialized Cloud Architectures
A Simplified, Cost-Effective MPLS Labeling Architecture for Access Networks Harald Widiger1, Stephan Kubisch1, Daniel Duchow1, Thomas Bahls2, Dirk Timmermann1.
Consistent Hashing and Distributed Hash Table
Computer Networks Protocols
Kademlia: A Peer-to-peer Information System Based on the XOR Metric
Presentation transcript:

A P2P-based Storage Platform for Storing Session Data in Internet Access Networks T. Bahls, D. Duchow Nokia Siemens Networks Broadband Access Division Greifswald, Germany World Telecommunication Congress 2010 Network & Service Management Reliability September Peter Danielis, M. Gotzmann, D. Timmermann University of Rostock, Germany Institute of Applied Microelectronics and Computer Engineering

Outline Introduction & Motivation Utilization of P2P Technology Erasure Resilient Codes for High Data Availability Realization of the P2P-based Storage Platform Summary 2

Introduction & Motivation Internet Service Providers (ISPs) provide Internet access  Access nodes (ANs) = essential network elements E.g., DSLAMs (Digital Subscriber Line Access Multiplexers) 3

Introduction & Motivation  Access nodes (ANs) = essential network elements ANs have to be powerful but well-priced  ANs ≠ servers! Budget with available resources! 4 $ $ $ $

Introduction & Motivation  Access nodes (ANs) = essential network elements ANs need resets (or may fail)  data must not be lost! AN configuration data needs to be saved persistently! But there‘s more… 5

Introduction & Motivation Data - called session data - … … comprises MAC/IP addresses, IP lease times of customers … is required for data forwarding/traffic filtering 6 MAC address: E1-15-A0 IP address: Lease Time:60 min Active:No DHCP Request: I have MAC address E1-15-A0! DHCP Response: Your IP address is for 60 min!

Introduction & Motivation Data - called session data - … … comprises MAC/IP addresses, IP lease times of customers … is required for data forwarding/traffic filtering … has to be always available  persistent storage needed … is highly volatile due to continous changes 7 MAC address: E1-15-A0 IP address: Lease Time:60 min Active:Yes DHCP Request: I have MAC address E1-15-A0! DHCP Response: Your IP address is for 60 min!

Introduction & Motivation Today: ANs store session data in persistent flash memory Problem: Flash memory  limited availability/rewritability ISPs „sacrifice“ flash memory for session data reluctantly 8

Today: ANs store session data in persistent flash memory Problem: Flash memory  limited availability/rewritability Solution: Use available volatile RAM resources of ANs! Introduction & Motivation 9

Average AN, e.g., PowerQuicc III (Freescale Semiconductor) RAM capacity = 1 Gbyte + unlimited rewritability Introduction & Motivation 10

Average AN, e.g., PowerQuicc III (Freescale Semiconductor) Calculating capacity = 1234 Dhrystone MIPS Introduction & Motivation 11

Average AN, e.g., PowerQuicc III (Freescale Semiconductor) Calculating capacity = 1234 Dhrystone MIPS Introduction & Motivation 12

Average AN, e.g., PowerQuicc III (Freescale Semiconductor) Problem: How to efficiently utilize available resources? Introduction & Motivation 13

Outline Introduction & Motivation Utilization of P2P Technology Erasure Resilient Codes for High Data Availability Realization of the P2P-based Storage Platform Summary 14

What options does P2P offer?...beyond the incriminated applications, of course. New networking paradigm No clients and servers anymore 15

...beyond the incriminated applications, of course. New networking paradigm No clients and servers anymore All peers form a self-organizing network Network = storage resource Network = computing resource Scalability and resilience = intrinsic features Proven concept (BitTorrent, Zattoo, Joost) What options does P2P offer? 16

Networking paradigm Each AN is part of a logical P2P overlay on its uplink Network = Storage Resource Each AN stores just a piece of session data Network = Computing Resource Each AN implements P2P protocol But ANs may become unavailable… Problem: How to ensure high data availability? Utilization of P2P technology 17 Storage Capacity of ANs

Outline Introduction & Motivation Utilization of P2P Technology Erasure Resilient Codes (ERCs) for High Data Availability Realization of the P2P-based Storage Platform Summary 18

ERCs for High Data Availability Objective: High session data availability = % Simple replication wastes memory ressources  Reed-Solomon Codes Split session data of each AN into m data chunks 19

ERCs for High Data Availability Objective: High session data availability = % Simple replication wastes memory ressources  Reed-Solomon Codes Split session data of each AN into m data chunks Encoding: Add k interleaved coding chunks  n=m+k chunks 20

ERCs for High Data Availability Objective: High session data availability = % Simple replication wastes memory ressources  Reed-Solomon Codes Split session data of each AN into m data chunks Encoding: Add k interleaved coding chunks  n=m+k chunks Decoding: Restore session data from any m of n chunks 21

Outline Introduction & Motivation Utilization of P2P Technology Erasure Resilient Codes for High Data Availability Realization of the P2P-based Storage Platform Summary 22

Kad-based Realization 23

Kad-based Realization Connection of access nodes (ANs) with P2P-based overlay 24

Kad-based Realization Connection of access nodes (ANs) with P2P-based overlay P2P protocol: Kad-based Distributed Hash Table (DHT) ring 25

Kad-based Realization Connection of access nodes (ANs) with P2P-based overlay P2P protocol: Kad-based Distributed Hash Table (DHT) ring Structured chunk storage via DHT ring Assignment of hash values to ANs and session data chunks ANs save session data chunks with similar hash values 26

Kad-based Realization Connection of access nodes (ANs) with P2P-based overlay P2P protocol: Kad-based Distributed Hash Table (DHT) ring Structured chunk storage via DHT ring Assignment of hash values to ANs and session data chunks ANs save session data chunks with similar hash values 27 Admin

Block Diagram The main components are… 28 DHCP Server

Block Diagram (1) module with controlling functionality 29 1 Save Session Data! Time to Save Session Data! DHCP Server

Block Diagram (2) memory with own session data 30 2 DHCP Server

Block Diagram (3) Kad block with ERC functionality 31 3 DHCP Server

Block Diagram (4) routing table 32 4 DHCP Server

Block Diagram (5) memory with session data chunks of other nodes 33 5 DHCP Server

Outline Introduction & Motivation Utilization of P2P Technology Erasure Resilient Codes for High Data Availability Realization of the P2P-based Storage Platform Summary 34

Summary Successful development of P2P-based storage platform Utilization of free RAM instead of rarely available flash memory Connection of access nodes by P2P overlay High scalability and resilience towards network errors Efficient sharing of RAM and computing resources ERCs for high data availability & low redundandy Completion of fully functional prototype 35

36 Thank you! Any questions? Thank you! Any questions?

Backup: Related Work 37 J. Kubiatowicz et. al., “Oceanstore: An architecture for global-scale persistent storage”, 2000 Schwarz, Xin, Miller, “Availability in Global Peer-To- Peer Storage Systems”, 2004 Sattler, Hauswirth, Schmidt, „UniStore: Querying a DHT-based Universal Storage“, 2007 Morariu, „DIPStorage: Distributed Storage of IP Flow Records“, 2008

Backup: Kad-based DHT 38 Kad (eMule): 128 bit address space Distances between hash values are calculated by the XOR metric

Binary tree with XOR distances of other peers to itself Organized into k-buckets Each peer knows many close peers Each peer knows only few distant peers Each peer has a life time 39 Backup: Kad Routing Table

Backup: Kad Bootstrapping & Maintenance Bootstrapping New peer contacts a known peer and inserts itself on ring Maintenance Contact peers from routing table with expired life time Contact other peers periodically to learn new contacts 40

Backup: Kad Lookup Process Searching peer selects peers close to target 41 These peers are contacted via a request Some respond with new peers

Backup: Kad Lookup Process Some of the new peers are contacted Some of them respond 42

Responding peers within a defined search tolerance Action request: Execute the action! If they send an action response, a counter is increased If counter==defined value, the lookup terminates Otherwise, it is terminated via a timeout 43 Backup: Kad Lookup Process

Backup: Prototype 44

Backup: Related Issues 45 Benefit from using ERCs instead of data replication Moderate quantitative memory savings But significantly higher data availability Kad network: open source is high quality! Minimal traffic overhead introduced by Kad maintenance

Backup: Memory requirements & performance 46 Currently, prototype is ported to a Xilinx FPGA board Long-time test/simu of prototype at our institute intended Functional verification Determination of performance Determination of memory requirements Determination of CPU utilization