An End-to-End Approach to Globally Scalable Network Storage Presented in cs294-4 P2P Systems by Sailesh Krishnamurthy 15 October 2003.

Slides:



Advertisements
Similar presentations
Recent Developments in Logistical Networking Micah Beck, Assoc. Prof. & Director Logistical Computing & Internetworking (LoCI) Lab Computer Science Department.
Advertisements

NAS vs. SAN 10/2010 Palestinian Land Authority IT Department By Nahreen Ameen 1.
Data Communications System By Ajarn Preecha Pangsuban.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Emery Berger University of Massachusetts Amherst Operating Systems CMPSCI 377 Lecture.
IP –Based SAN extensions and Performance Thao Pham CS 622 Fall 07.
Protocols and the TCP/IP Suite Chapter 4 (Stallings Book)
CS 268: Lecture 2 (Layering & End-to-End Arguments)
The Design Philosophy of the DARPA Internet Protocols D. D. Clark.
Protocols and the TCP/IP Suite
EE 122: Layering and the Internet Architecture Kevin Lai September 4, 2002.
1 Review of Important Networking Concepts Introductory material. This module uses the example from the previous module to review important networking concepts:
Review on Networking Technologies Linda Wu (CMPT )
1 Version 3.0 Module 10 Routing Fundamentals and Subnetting.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Module – 7 network-attached storage (NAS)
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
Storage Area Networks The Basics. Storage Area Networks SANS are designed to give you: More disk space Multiple server access to a single disk pool Better.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Object-based Storage Long Liu Outline Why do we need object based storage? What is object based storage? How to take advantage of it? What's.
Chapter 17 Networking Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings.
TCP/IP Reference Model For more notes and topics visit: eITnotes.com.
J.H.Saltzer, D.P.Reed, C.C.Clark End-to-End Arguments in System Design Reading Group 19/11/03 Torsten Ackemann.
More on TCP/IP and Networking CS-328 Dick Steflik.
Presentation on Osi & TCP/IP MODEL
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Protocol Layering Chapter 10. Looked at: Architectural foundations of internetworking Architectural foundations of internetworking Forwarding of datagrams.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
TCP/IP Yang Wang Professor: M.ANVARI.
Chapter 2 – X.25, Frame Relay & ATM. Switched Network Stations are not connected together necessarily by a single link Stations are typically far apart.
Computer Networks (CS 132/EECS148) General Networking Example Karim El Defrawy Donald Bren School of Information and Computer Science University of California.
Mukesh N. Tekwani Elphinstone College Mumbai
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
UNDERSTANDING THE HOST-TO-HOST COMMUNICATIONS MODEL - OSI LAYER & TCP/IP MODEL 1.
NSH0503/01/11041 Overview Computer Network Technology By Diyurman Gea.
Logistical Networking Micah Beck, Research Assoc. Professor Director, Logistical Computing & Internetworking (LoCI) Lab Computer.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Logistical Networking as an Advanced Engineering Testbed Micah Beck, Assoc. Prof. & Director Logistical Computing & Internetworking (LoCI) Lab
An Exposed Approach to Reliable Multicast in Heterogeneous Logistical Networks Micah Beck, Assoc. Prof. & Director Logistical Computing & Internetworking.
Using NAS as a Gateway to SAN Dave Rosenberg Hewlett-Packard Company th Street SW Loveland, CO 80537
1 Mobile Management of Network Files Alex BassiMicah Beck Terry Moore Computer Science Department University of Tennessee.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
Wide Area Data Sharing with Logistical Networking Micah Beck, Assoc. Prof. & Director Logistical Computing & Internetworking (LoCI) Lab Computer Science.
End-To-End Arguments in System Design J.H. Saltzer, D.P. Reed, and D. Clark Presented by: Amit Mondal.
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
. Large internetworks can consist of the following three distinct components:  Campus networks, which consist of locally connected users in a building.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
An End-to-End Approach to Scalable Network Storage Micah Beck, Associate Professor Director, Logistical Computing & Internetworking (LoCI) Lab Terry Moore,
End-to-End Principle Brad Karp UCL Computer Science CS 6007/GC15/GA07 25 th February, 2009.
Protocol Layering Chapter 11.
Internet Protocol Storage Area Networks (IP SAN)
STORAGE ARCHITECTURE/ MASTER): Where IP and FC Storage Fit in Your Enterprise Randy Kerns Senior Partner The Evaluator Group.
An Architectural Approach to Managing Data in Transit Micah Beck Director & Associate Professor Logistical Computing and Internetworking Lab Computer Science.
Networks, Part 2 March 7, Networks End to End Layer  Build upon unreliable Network Layer  As needed, compensate for latency, ordering, data.
© 2007 EMC Corporation. All rights reserved. Internet Protocol Storage Area Networks (IP SAN) Module 3.4.
1 Data Management for Internet Backplane Protocol by Tang Ming Assoc/Prof. Francis Lee School of Computer Engineering, Nanyang Technological University,
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Computer Networking A Top-Down Approach Featuring the Internet Introduction Jaypee Institute of Information Technology.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Protocols and the TCP/IP Suite
Network Architecture Introductory material
Protocols and the TCP/IP Suite
Review of Important Networking Concepts
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Review of Important Networking Concepts
Protocols and the TCP/IP Suite
Computer Networking A Top-Down Approach Featuring the Internet
OSI Reference Model Unit II
Review of Important Networking Concepts
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Presentation transcript:

An End-to-End Approach to Globally Scalable Network Storage Presented in cs294-4 P2P Systems by Sailesh Krishnamurthy 15 October 2003

Logistical Networking Models sync/async aspects of communication Single “fabric” that unifies: Data Storage Data Transportation Internet scalability goals Claim: end-to-end design principles vital

Background: SAN vs NAS Current trends in storage networking SAN - Storage Area Network NAS - Network Attached Storage

More on NAS v. SAN NAS Wires: TCP/IP Protocol: NFS, CIFS SAN Wires: Fiber Channel Protocol: Encapsulated SCSI Where is the File System ?

Traditional networks General goals Minimize delay Minimize probability of corruption Maximize probability of delivery Assumptions in traditional storage nets When storage is closely coupled, delay and probability of corruption can be low while availability is high.

SANs cannot scale to SWANs In the SWAN, resources can be intermittently unavailable So we need e2e strategies Simple retries Redundant data accesses spread across nw High-latency archival backups

Correctness in the wild SANs are “controlled” environments and correctness is not an issue In the SWAN, data storage may not be reliable. Data accuracy must be checked by producers and consumers - at endpoints

SWAN Security SWANs are not physically localized SAN security assumptions don’t hold Again, e2e approaches are required DoS is a gotcha for SWANs Can’t be prevented with e2e strategies Imitate techniques for handling DoS in IP

Unbounded Size/Duration Since single store may not have all the resources all the time, the endpoint has to manage distribution of data Unbounded duration allocation hurts resource sharing. Should this be managed at endpoints ?

Logistical Networking Storage Networking IP networks: interconnection fabric of storage pool Logistical Networking Storage part of the networking infrastructure Shared resource fabric exposing storage resources Similar to how internet exposes bandwidth resources Storage Stack Bottom-up, layered e2e design approach Internet Backplane Protocol (IBP)

Storage Stack Applications exNode tools and services exNode A data structure for aggregating network storage IBP Allocation and management of storage on network storage depots Local Access Physical

IBP - Internet Backplane Protocol First layer of stack that’s globally accessible Abstracts access layer resources (file/block storage services) Expose underlying storage resources to maximize freedom at higher levels Implement only indispensable & common functions Enable scalable internet style resource sharing Mask peculiarities of access layer resource Abstract service based on data blocks that are managed as “byte arrays”

IP vs IBP IP vs link layer Agg. of link layer packets masks packet size limits Simple fault detection - faulty datagrams dropped Global addressing masks diffs b/w LANs IP Property Any participant of a routed IP n/w can use any link layer connection IBP “byte array” indep. Agg. access layer blocks masks fixed block size Simple fault detection - drop faulty byte arrays Global addressing (IP) maks diff b/w acc layer IBP Property Any participant of an IBP n/w can use any access layer storage resource

Issues with IBP DoS vulnerability is much worse In IP: DoS attacks require constant sending of data Does not profit the attacker in any way In IBP: Once data block is allocated it remains used Using remote storage does benefit the attacker Strong semantics (reliability) of traditional storage/SAN are difficult to implement in the SWAN

IBP Solutions Time-limited storage allocations When a lease expires, the storage can be reused for some other user Soft storage semantics in IBP IBP is a “best-effort” service Allocated storage can be revoked at any time Storage ManagementData TransferDepot Management IBP_Allocate, IBP_Manage IBP_Store,IBP_Load, IBP_Copy,IBP_mcopy IBP_Status

exNode - Flexible Aggregation of Network Storage Implement abstractions w/ strong properties Higher layer construct Aggregates primitive IBP byte-arrays Need to maintain state that represents the agg. exNode aggregates IBP byte-arrays as the Unix inode aggs. disk blocks

e2e services for storage exNode can hold additional metadata for services: Redundancy Framing of data into segments w/ checksums exNode is analogous to the state of a TCP connection, data on disk analogue of a TCP stream

Relation to p2p systems Paper compares with Napster/Gnutella In file sharing all allocations are at endpoints.. leads to large data transfers Appropriate comparison is Oceanstore ? My view exNode infrastructure is a way to create storage services from smaller blocks Can be useful in an Oceanstore-like setting Can alleviate some SAN shortcomings ?