Internet Backplane Protocol: Storage in the Network James S. Plank, Micah Beck, Wael Elwasif, Terry Moore, Martin Swany, Rich Wolski University of Tennessee.

Slides:



Advertisements
Similar presentations
Recent Developments in Logistical Networking Micah Beck, Assoc. Prof. & Director Logistical Computing & Internetworking (LoCI) Lab Computer Science Department.
Advertisements

Categories of I/O Devices
An End-to-End Approach to Globally Scalable Network Storage Presented in cs294-4 P2P Systems by Sailesh Krishnamurthy 15 October 2003.
The Network Weather Service A Distributed Resource Performance Forecasting Service for Metacomputing Rich Wolski, Neil T. Spring and Jim Hayes Presented.
Distributed components
Scalable Sharing of Network Storage Micah Beck, Research Assoc. Professor Director, Logistical Computing & Internetworking (LoCI) Lab Computer Science.
CSCI 4550/8556 Computer Networks Comer, Chapter 3: Network Programming and Applications.
2: OS Structures 1 Jerry Breecher OPERATING SYSTEMS STRUCTURES.
1 School of Computing Science Simon Fraser University CMPT 771/471: Internet Architecture and Protocols Socket Programming Instructor: Dr. Mohamed Hefeeda.
NFS. The Sun Network File System (NFS) An implementation and a specification of a software system for accessing remote files across LANs. The implementation.
CS510 Concurrent Systems Jonathan Walpole. Lightweight Remote Procedure Call (LRPC)
Process-to-Process Delivery:
Object-based Storage Long Liu Outline Why do we need object based storage? What is object based storage? How to take advantage of it? What's.
1 Reading Report 9 Yin Chen 29 Mar 2004 Reference: Multivariate Resource Performance Forecasting in the Network Weather Service, Martin Swany and Rich.
ISO Layer Model Lecture 9 October 16, The Need for Protocols Multiple hardware platforms need to have the ability to communicate. Writing communications.
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System.
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
CSC 322 Operating Systems Concepts Lecture - 25: by Ahmed Mumtaz Mustehsan Special Thanks To: Tanenbaum, Modern Operating Systems 3 e, (c) 2008 Prentice-Hall,
I/O Systems I/O Hardware Application I/O Interface
More Network Security Threats Worm = a stand-alone program that can replicate itself and spread Worms can also contain manipulation routines to perform.
Introduction to Logistical Networking Micah Beck, Assoc. Prof. & Director Logistical Computing & Internetworking (LoCI) Lab APAN Advanced.
Working together towards a next generation storage element Surya D. Pathak Advanced Computing Center for Research and Education.
1 Logistical Computing and Internetworking: Middleware for the Use of Storage in Communication Micah Beck Jack Dongarra Terry Moore James Plank University.
Logistical Networking Micah Beck, Research Assoc. Professor Director, Logistical Computing & Internetworking (LoCI) Lab Computer.
Logistical Networking as an Advanced Engineering Testbed Micah Beck, Assoc. Prof. & Director Logistical Computing & Internetworking (LoCI) Lab
An Exposed Approach to Reliable Multicast in Heterogeneous Logistical Networks Micah Beck, Assoc. Prof. & Director Logistical Computing & Internetworking.
1 Mobile Management of Network Files Alex BassiMicah Beck Terry Moore Computer Science Department University of Tennessee.
® IBM Software Group © 2007 IBM Corporation Best Practices for Session Management
CS 153 Design of Operating Systems Spring 2015 Lecture 22: File system optimizations.
Wide Area Data Sharing with Logistical Networking Micah Beck, Assoc. Prof. & Director Logistical Computing & Internetworking (LoCI) Lab Computer Science.
ITEC 502 컴퓨터 시스템 및 실습 Chapter 11-2: File System Implementation Mi-Jung Choi DPNM Lab. Dept. of CSE, POSTECH.
An End-to-End Approach to Globally Scalable Programmable Networking Micah Beck, Assoc. Prof. & Director Terry Moore, Assoc. Director James S. Plank, Assoc.
Remote Procedure Calls CS587x Lecture Department of Computer Science Iowa State University.
The Data Logistics Toolkit Martin Swany Professor, School of Informatics and Computing Executive Associate Director, Center for Research in Extreme Scale.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Silberschatz, Galvin and Gagne  Operating System Concepts Six Step Process to Perform DMA Transfer.
Globus and PlanetLab Resource Management Solutions Compared M. Ripeanu, M. Bowman, J. Chase, I. Foster, M. Milenkovic Presented by Dionysis Logothetis.
An End-to-End Approach to Scalable Network Storage Micah Beck, Associate Professor Director, Logistical Computing & Internetworking (LoCI) Lab Terry Moore,
4343 X2 – Outline The Domain Name System The Web.
.NET Mobile Application Development XML Web Services.
COT 4600 Operating Systems Fall 2009 Dan C. Marinescu Office: HEC 439 B Office hours: Tu-Th 3:00-4:00 PM.
An Architectural Approach to Managing Data in Transit Micah Beck Director & Associate Professor Logistical Computing and Internetworking Lab Computer Science.
1 Remote Procedure Calls External Data Representation (Ch 19) RPC Concept (Ch 20)
Distributed File Systems Questions answered in this lecture: Why are distributed file systems useful? What is difficult about distributed file systems?
Silberschatz, Galvin, and Gagne  Applied Operating System Concepts Module 12: I/O Systems I/O hardwared Application I/O Interface Kernel I/O.
Logistical Networking: Buffering in the Network Prof. Martin Swany, Ph.D. Department of Computer and Information Sciences.
FILE SYSTEM IMPLEMENTATION 1. 2 File-System Structure File structure Logical storage unit Collection of related information File system resides on secondary.
Overview on Web Caching COSC 513 Class Presentation Instructor: Prof. M. Anvari Student name: Wei Wei ID:
Internet2 Distributed Storage Infrastructure Status Micah Beck, Chair Network Storage WG Innovative Computing Laboratory University of Tennessee, Knoxville.
COMPUTER NETWORKS Hwajung Lee. Image Source:
Mike Switlick. Overview What is a covert channel? Storage / Timing Requirements Bunratty attack Covert_tcp Questions.
Amazon Web Services. Amazon Web Services (AWS) - robust, scalable and affordable infrastructure for cloud computing. This session is about:
CS533 Concepts of Operating Systems
File System Implementation
Operating System Structure
Software Architecture in Practice
IBP Client APIs Storage Management IBP_allocate , IBP_manage
Virtualization Layer Virtual Hardware Virtual Networking
Process-to-Process Delivery:
Operating System Concepts
CS703 - Advanced Operating Systems
Software models - Software Architecture Design Patterns
Scheduled Accomplishments
XDR External Data Representation
Chapter 2: Operating-System Structures
Chapter 15: File System Internals
Chapter 2: Operating-System Structures
Process-to-Process Delivery: UDP, TCP
Chapter 6 – Distributed Processing and File Systems
Presentation transcript:

Internet Backplane Protocol: Storage in the Network James S. Plank, Micah Beck, Wael Elwasif, Terry Moore, Martin Swany, Rich Wolski University of Tennessee

The End-to-End Model: There is no state management in the Internet. The Main Issue:

No State Management: A Good Thing It scales. It has a clean failure model. Resources used in a transient manner. It has worked in the past. It works now. It will work in the future.

No State Management: A Bad Thing Performance suffers. End-to-end retransmissions required. Locality cannot be exploited. Data movement cannot be managed. Balkanization of roll-your-own state management techniques.

IBP: The Internet Backplane Protocol Managing and using state in the network. Inserting storage in the network so that: –Applications may use it advantageously. –Storage owners do not lose control of their resources. Deep-sixing the End-to-End model! Provides low-level primitives and software for:

What is in This Talk The Software Structure of IBP and its API. IBP Applications and Projects Deployment: The Logistical Backbone

Our Overarching Buzzword: Logistical Networking Allows an application to manage the trajectory of data in space and time as it travels across the network.

The Byte Array: IBP’s Unit of Storage You can think of it as a buffer. You can think of it as a “file”. Append-only semantics. Transience built in.

The IBP Client API Can be used by anyone who can talk to the server. Seven procedure calls in three categories: –Allocation (1) –Data transfer (5) –Management (1)

Client API: Allocation IBP_allocate(char *host, int maxsize, IBP_attributes attr) Returns a trio of capabilities. –Read / Write / Manage –ASCII Strings (obfuscated) No user-defined file names: –Big flat name space. –No registration required to pass capabilities.

Allocation Attributes Permanent or Time-Limited Volatile or Stable Read/Write semantics: –Byte Array –Pipe –Circular Queue

Client API: Data Transfer IBP_store(IBP_cap wr_cap, char *data, int size) IBP_read(IBP_cap rd_cap, char *buf, int size, int offset) IBP_remote_store(IBP_cap wr_cap, char *host, int port, int size) IBP_deliver(IBP_cap rd_cap, char *host, int port, int size, int offset) IBP_copy(IBP_cap source, IBP_cap target, int size, int offset) 2-party: 3-party:

IBP Client API: Management IBP_manage(IBP_cap man_cap, int cmd, IBP_status info) Allows for resizing byte arrays. Allows for extending/shortening the time limit on time-limited allocations. Manages reference counts on the read/write capabilities. Some simple state probing.

IBP Servers Daemons that serve local disk or memory Root access not required. Can specify sliding time limits or revokability. Encourages resource sharing.

Logistical Application Strategies The Goal: To improve application performance, resource utilization or application functionality as a result of logistical networking.

Strategy #1: Keep data close to the sender Network Weather Service sensor data collection (Wolski). Checkpoint servers (Plank, Agbaria). Sender Receiver IBP Network

Strategy #2: Place data close to the receiver IBP Mail (Elwasif). Speculative HTTP Transfer (Beck). NWS Client Data Acquisition (Wolski). Sender ReceiverIBPNetwork

Strategy #3: Utilize transient storage throughout “Logistical Session Layer” (Swany). Sender ReceiverIBP

Strategy #4: Optimized Producer/Consumer Client S1 S2 Network Client S1 S2 Network IBP Add Logistical Scheduling to NetSolve (The LoCI Team)

The Logistical Backbone (L-Bone) Goal: To provide ready storage for experi- mental logistical networking applications. Composed of dedicated and lent resources running IBP. Currently: –5 I2-DSI machines + few machines at Tennessee

To Conclude Logistical Networking: Managing data movement and locality on the network. IBP: A key piece of software infrastructure for Logistical Networking. IBP Applications: Demonstrate the effective- ness of IBP and Logistical Networking. L-Bone: Experimental public test facility.

You Can Play Too IBP code available – L-Bone participation – Working IBP Applications –IBP Mail (talk later today) –NWS client data acquisition –Checkpointing in NetSolve

Internet Backplane Protocol: Storage in the Network James S. Plank, Micah Beck, Wael Elwasif, Terry Moore, Martin Swany, Rich Wolski University of Tennessee