1 Planetary Network Testbed Larry Peterson Princeton University.

Slides:



Advertisements
Similar presentations
INDIANAUNIVERSITYINDIANAUNIVERSITY GENI Global Environment for Network Innovation James Williams Director – International Networking Director – Operational.
Advertisements

Distributed Data Processing
The future of Desktops Transform Your Desktop with Virtualization.
Project Byzantium Networking for the Zombie Apocalypse.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
1 GENI: Global Environment for Network Innovations Jennifer Rexford Princeton University
An Overlay Data Plane for PlanetLab Andy Bavier, Mark Huang, and Larry Peterson Princeton University.
Chapter 9: Troubleshooting and Repairing Networking.
The End of Internet Architecture Author: Timothy Roscoe Presented by Gross, Zhaosheng Zhu.
1 GENI: Global Environment for Network Innovations Jennifer Rexford Princeton University See for.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
1 Bridging Clouds with CernVM: ATLAS/PanDA example Wenjing Wu
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Ensure geographical redundancy.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Introduction to Cloud Computing
Cloud Computing for the Enterprise November 18th, This work is licensed under a Creative Commons.
STRATEGIES INVOLVED IN REMOTE COMPUTATION
Web Based Applications
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
IT:Network:Microsoft Server 2 Chapter 27 WINDOWS SERVER UPDATE SERVICES.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Patch Management Only part of the solution….. Bob Isaak Mar 04, 2004.
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Community Tour 2011 Infrastrutture in evoluzione.
BaBar MC production BaBar MC production software VU (Amsterdam University) A lot of computers EDG testbed (NIKHEF) Jobs Results The simple question:
Realtime Technologies, Inc. Distributed Simulation Training  April 2005.
1 A Blueprint for Introducing Disruptive Technology into the Internet Larry Peterson Princeton University / Intel Research.
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
Bringing plant information to the office in real-time Johan Louw Automation Specialist Lonmin.
Maintaining and Updating Windows Server Monitoring Windows Server It is important to monitor your Server system to make sure it is running smoothly.
Freelib: A Self-sustainable Digital Library for Education Community Ashraf Amrou, Kurt Maly, Mohammad Zubair Computer Science Dept., Old Dominion University.
1 Testbeds Breakout Tom Anderson Jeff Chase Doug Comer Brett Fleisch Frans Kaashoek Jay Lepreau Hank Levy Larry Peterson Mothy Roscoe Mehul Shah Ion Stoica.
Server Performance, Scaling, Reliability and Configuration Norman White.
ABone Architecture and Operation ABCd — ABone Control Daemon Server for remote EE management On-demand EE initiation and termination Automatic EE restart.
Microsoft Management Seminar Series SMS 2003 Change Management.
Introduction & Vision. Introduction MANTICORE provides a software implementation and tools for providing and managing routers and IP networks as services.
Jini Architecture Introduction System Overview An Example.
Ethernet. Ethernet  Ethernet is the standard communications protocol embedded in software and hardware devices, intended for building a local area network.
1 Wide Area Network Emulation on the Millennium Bhaskaran Raman Yan Chen Weidong Cui Randy Katz {bhaskar, yanchen, wdc, Millennium.
Jini Architectural Overview Li Ping
Sample Presentation Headline REPRESENTATIVE SUBHEAD TO SUPPORT SUBJECT Presenter’s Name Presenter’s Title Presentation Date DeterLab A Tool for Cybersecurity.
Globus and PlanetLab Resource Management Solutions Compared M. Ripeanu, M. Bowman, J. Chase, I. Foster, M. Milenkovic Presented by Dionysis Logothetis.
Development of e-Science Application Portal on GAP WeiLong Ueng Academia Sinica Grid Computing
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 Essentials of Design.
Distributed Computing Systems CSCI 4780/6780. Scalability ConceptExample Centralized servicesA single server for all users Centralized dataA single on-line.
Web Technologies Lecture 13 Introduction to cloud computing.
Virtual Desktop Infrastructure
Vignesh Ravindran Sankarbala Manoharan. Infrastructure As A Service (IAAS) is a model that is used to deliver a platform virtualization environment with.
Activity 1 5 minutes to discuss and feedback on the following:
Microsoft ® Official Course Module 6 Managing Software Distribution and Deployment by Using Packages and Programs.
Scrapping the Internet Presented by Dhaval Joshi.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Hosting Wide-Area Network Testbeds: Policy Considerations Larry Peterson Princeton University.
1 A Blueprint for Introducing Disruptive Technology into the Internet Larry Peterson Princeton University / Intel Research.
1 7 th IEEE International Symposium on Cluster Computing and the Grid Welcome to the TCSC Doctoral Symposium.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Sponsored by the National Science Foundation Systematic Experimentation Sarah Edwards GENI Project Office.
Give Your Data the Edge A Scalable Data Delivery Platform
Vmware 2V0-642 VMware Certified Professional 6 - Network Virtualization (NSX v6.2) VCE Question Answers.
Chapter 16: Distributed System Structures
Network Coding Testbed
By - Ricardo Sanchez, Ken Wolters and William Hibbard
Distributed computing deals with hardware
Towards Distributed Test-Lab for Planetary-Scale Services
Internet Engineering Course
Calypso Service Architecture
Presentation transcript:

1 Planetary Network Testbed Larry Peterson Princeton University

2 For What Purpose? Peer-to-Peer Testbed –volunteered desktop machines Akamai-for-Researchers Testbed –geographically-distributed clusters Network Research Testbed –network of open routers …

3 Goals 1000 edge sites –desktop machines that run p2p applications –access nodes for CDN-like applications –run open router software cluster sites –host content and services Both a testbed and a deployment platform

4 Challenges Consensus on the purpose –understand user requirements –users: researchers, clients, volunteers,… Simultaneously build it and use it –quick ramp-up, yet accommodate evolution –minimal base, yet sufficient infrastructure Build a user base –make it easy to access from the desktop –offer useful services

5 Challenges (cont) Build a research community –confluence of research agendas –library of shared components –force ourselves to use our own system Access to sufficient resources –lots of PCs –engineers to code and deploy –administrators to maintain and operate

6 Testbed Management Major failing of past testbeds Interesting problem in its own right –resource and topology discovery –remote logging, debugging, and control –signalling and configuration –secure code distribution –resource allocation