Scalable Sharing of Network Storage Micah Beck, Research Assoc. Professor Director, Logistical Computing & Internetworking (LoCI) Lab Computer Science.

Slides:



Advertisements
Similar presentations
Recent Developments in Logistical Networking Micah Beck, Assoc. Prof. & Director Logistical Computing & Internetworking (LoCI) Lab Computer Science Department.
Advertisements

Introduction 2 1: Introduction.
Dr. Kalpakis CMSC 621, Advanced Operating Systems. Fall 2003 URL: Distributed System Architectures.
Internet Backplane Protocol: Storage in the Network James S. Plank, Micah Beck, Wael Elwasif, Terry Moore, Martin Swany, Rich Wolski University of Tennessee.
High Performance Computing Course Notes Grid Computing.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Emery Berger University of Massachusetts Amherst Operating Systems CMPSCI 377 Lecture.
An End-to-End Approach to Globally Scalable Network Storage Presented in cs294-4 P2P Systems by Sailesh Krishnamurthy 15 October 2003.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Spring 2004 EE4272 EE4272: Computer Networks Instructor: Dr. Tricia Chigan Dept.: Elec. & Comp. Eng.
Socket Programming.
Introduction1-1 Introduction to Computer Networks Our goal:  get “feel” and terminology  more depth, detail later in course  approach:  use Internet.
The Design Philosophy of the DARPA Internet Protocols D. D. Clark.
CS335 Principles of Multimedia Systems Multimedia Over IP Networks -- I Hao Jiang Computer Science Department Boston College Nov. 6, 2007.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Protocols and the TCP/IP Suite
Computer Network Architecture and Programming
An Overlay Multicast Infrastructure for Live/Stored Video Streaming Visual Communication Laboratory Department of Computer Science National Tsing Hua University.
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
Data Communications Architecture Models. What is a Protocol? For two entities to communicate successfully, they must “speak the same language”. What is.
Multicast Communication
Network Architectures Week 3 – OSI and The Internet.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Lecturer: Tamanna Haque Nipa
Fundamentals of Computer Networks ECE 478/578 Lecture #2 Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University of Arizona.
Lecture 1, 1Spring 2003, COM1337/3501Computer Communication Networks Rajmohan Rajaraman COM1337/3501 Textbook: Computer Networks: A Systems Approach, L.
1: Introduction1 Part I: Introduction Goal: r get context, overview, “feel” of networking r more depth, detail later in course r approach: m descriptive.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
IBP-BLAST: Using Logistical Networking to Distribute BLAST Databases Over a Wide Area Network Ravi Kosuri 1 Jay Snoddy 2, 3 Stefan Kirov2 Erich Baker 1*
GridNM Network Monitoring Architecture (and a bit about my phd) Yee-Ting Li, 1 st Year UCL, 17 th June 2002.
Fundamentals of Computer Networks ECE 478/578 Lecture #19: Transport Layer Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Putting Intelligence in Internetworking: an Architecture of Two Level Overlay EE228 Project Anshi Liang Ye Zhou.
Example: Sorting on Distributed Computing Environment Apr 20,
RNP's Digital Video Working Group Applying Logistical Networking to Content Delivery.
Introduction to Logistical Networking Micah Beck, Assoc. Prof. & Director Logistical Computing & Internetworking (LoCI) Lab APAN Advanced.
Working together towards a next generation storage element Surya D. Pathak Advanced Computing Center for Research and Education.
Computer Networks with Internet Technology William Stallings
1 Logistical Computing and Internetworking: Middleware for the Use of Storage in Communication Micah Beck Jack Dongarra Terry Moore James Plank University.
Distributed Systems and Algorithms Sukumar Ghosh University of Iowa Spring 2011.
Logistical Networking Micah Beck, Research Assoc. Professor Director, Logistical Computing & Internetworking (LoCI) Lab Computer.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Logistical Networking as an Advanced Engineering Testbed Micah Beck, Assoc. Prof. & Director Logistical Computing & Internetworking (LoCI) Lab
Chapter 1 Communication Networks and Services Network Architecture and Services.
An Exposed Approach to Reliable Multicast in Heterogeneous Logistical Networks Micah Beck, Assoc. Prof. & Director Logistical Computing & Internetworking.
1 Mobile Management of Network Files Alex BassiMicah Beck Terry Moore Computer Science Department University of Tennessee.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Wide Area Data Sharing with Logistical Networking Micah Beck, Assoc. Prof. & Director Logistical Computing & Internetworking (LoCI) Lab Computer Science.
ECEN “Internet Protocols and Modeling”, Spring 2012 Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Class.
An End-to-End Approach to Globally Scalable Programmable Networking Micah Beck, Assoc. Prof. & Director Terry Moore, Assoc. Director James S. Plank, Assoc.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
An End-to-End Approach to Scalable Network Storage Micah Beck, Associate Professor Director, Logistical Computing & Internetworking (LoCI) Lab Terry Moore,
Internet Protocol Storage Area Networks (IP SAN)
An Architectural Approach to Managing Data in Transit Micah Beck Director & Associate Professor Logistical Computing and Internetworking Lab Computer Science.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Logistical Networking: Buffering in the Network Prof. Martin Swany, Ph.D. Department of Computer and Information Sciences.
© 2007 EMC Corporation. All rights reserved. Internet Protocol Storage Area Networks (IP SAN) Module 3.4.
1 Data Management for Internet Backplane Protocol by Tang Ming Assoc/Prof. Francis Lee School of Computer Engineering, Nanyang Technological University,
Internet2 Distributed Storage Infrastructure Status Micah Beck, Chair Network Storage WG Innovative Computing Laboratory University of Tennessee, Knoxville.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Towards a High Performance Extensible Grid Architecture Klaus Krauter Muthucumaru Maheswaran {krauter,
CIS 700-5: The Design and Implementation of Cloud Networks
Scheduled Accomplishments
Outline Overview of IP History of the Internet - 3-May-19
Presentation transcript:

Scalable Sharing of Network Storage Micah Beck, Research Assoc. Professor Director, Logistical Computing & Internetworking (LoCI) Lab Computer Science Department University of Tennessee CERNMay 30, 2002

A Broad View of Networking A network is a facility for sharing a pool of resources within a community. Sharing is enabled by –Common goals –Standard protocols –Low allocation overhead –Mutual protection

IP Routing as Scalable Sharing of Bandwidth The Internet is a collection of links connected by routers Internet Protocol (IP) datagrams flow from sender to reciever along some path of links The choice of paths is made by routers according to topological considerations (tempered by policy)

Wide Area Network Services Are Like the Network Itself Intermittently inaccessible Vulnerable to partition Prone to corruption in transit Unpredictable latencies/jitter End-to-End: Never require a network service to be bigger, better or more complex than wide area access allows

Why Is It Called “End-to-End”? If the end-points requires a service that is stronger than the network can provide, they must implement it on top of the network. The fundamental tools are –Aggregation (retransmission, fragmentation) –Timers –Protocol state maintained at the end-points

How Can Storage Be Shared Scalably? Don’t require it to be –Unbounded in size –Unbounded in duration –Perfectly available –Perfectly reliable Best effort network storage Implement these properties end-to-end

Sharing Storage Enables Advanced Network Apps Caching Staging (Replication) Localization (Rendezvous) Distribution (Multicast) Spooling ( ) Temporary State Management (Checkpointing)

“Logistical” Networking Analogy to military or industrial logistics Distributing goods requires not only highways but also warehouses (depots) Data transmission is the highway Storage servers are the depots This is not Storage Networking Enabling new users and applications

Dimensions in Communication Routing (spatial)Storage (temporal) Logistical Networking

Principle Investigators –Micah Beck –James S. Plank Graduate Students –Erica Fuentes –Xiang Li Funding –DoE SciDAC –NSF Next Gen SW –NSF Internet Tech. Research Staff –Scott Atchley –Alex Bassi –Ying Ding –Hunter Hagewood –Sharmila Kancherla –Jeremy Millar –Terry Moore –Stephen Soltesz –Yong Zheng

Internet Backplane Protocol (IBP) Servers that make allocation of primitive “byte arrays” available to clients Byte arrays are not blocks (more abstract) –Network capabilities (primitive security) –Variable extents Byte arrays are not files (weaker semantics) –Size & duration are limited –“Volatile” allocations –Best effort reliability and availability –No directory structure, accounting –No caching, replication An end-to-end approach to network storage

IBP Software Structure IBP Depots (servers) are daemons that serve local storage to IBP clients. IBP clients only link to a protocol library. Clients talk to depots using TCP/IP. –Alternatives are being investigated Design is for high-performance/scalability.

Allocation Attributes Permanent vs. Time-Limited Volatile vs. Stable Read/Write semantics: –Byte Array –Pipe –Circular Queue –Completely Destructive Write

Impressions of Networking for High Energy Physics (?) Reliable throughput is the limiting factor Modes of sharing can be “modified” The use of specialized data movement middleware is acceptable The data transfer network has very few nodes and small user communities Little patience for fancy architectural ideas

IBP Enables Heterogeneity The tyranny of “TCP-friendly” IP –Datagrams and usage policy must be homogeneous end-to-end –Non-standard IP policies in the middle can leak out onto public networks Good fences make good neighbors IBP can terminate a flow and regenerate it in different network, with localized control

Example:Tsunami Uses very aggressive UDP transfer with TCP back-link for control Runs using Abilene less-than-best-effort “Scavenger Service” Tsunami must not be routed onto a link where Scavenger Service is not supported! Solution: do not route the packets, require explicit buffering and retransmission

Scheduling Control Over Sharing Without IP QoS Consider a high speed link that operates at 10Gb/s, connected to two types of links: –100Mb/s and 1Gb/s Jobs are 1TB transfers –~20 hours at 100Mb/s, ~2 hours at 1Gb/s Suspending a slow job to allow a fast job through delays it by only 10%

Scheduled Sharing of Network Links Is In Your Future! Ignoring buffer control won’t make the need for scheduled sharing go away When was more control over time & space ever a bad thing? Are we revisiting CERNET/UUCP/BITNET/DEC net? A Short History of Internet Protocols at CERN Ben Segal / CERN PDP-NS April, 1995 IBP is designed according to end-to-end principles (see SIGCOMM ’02 paper)

The Alternative to Interoperability In Buffering High performance data transfer is an isolated service, with “job scheduling” and “data staging” like at computation centers As more high performance links are built, concatenation is based on “gateways” rather than a scalable routing infrastructure Should networking solutions be built without the benefit of network architecture?

Application Areas Source routing Bandwidth adaption Reducing ( BW  delay) Reliable multicast Content Distribution Remote access to structured data Managing computation state (NetSolve caching) Temporary storage Very large data sets Collaborative computing & visualization

Building on IBP Many applications assume file semantics –Unbounded size & duration –High reliability & availability –Caching & replication In a layered architecture, these are implemented through aggregation and additional intelligence at the next level

The Network Storage Stack Physical Access (OS) IBP (Internet Backplane Protocol) Logistical Runtime System Logistical Tools Applications L-BoneexNode

ExNode vs inode exNode inode IBP Allocations the network local system disk blocks kernel capabilities block addresses user

ExNode Mobility XML Serialization The exNode serialization is a portable soft link

Sameple exNodes Services: Fragmentation, Replication 123

Building a Logistical Operating Environment Resource Discovery –Logistical Backbone registry (LBone: Plank) –Can also use DNS, could use MDS Programming Tools –exNode library, primitive commands –policy modules (replication, fragmentation) –cool applications (SC demo: IBPster MP3)

Related Work Peer-to-Peer Storage –Napster, Gnutella, etc –OceanStore (UC Berkeley) Storage Area Networking –Fiber Channel, Ultraband, iSCSI –Network Attached Storage (CMU) Overlay Networking –Caching –Multicast –Data Grids Multimedia Protocols –Content Delivery –Streaming –Video on Demand

Logistical Networking: E2E Storage and Bandwidth Complex paths and buffers are exposed Assumptions are appropriately weak Resource management is passive Spatial and temporal control Applic. autonomy, network transparency Resources in the hands of end users Futures: more control, greater scope

Logistical Computing and Internetworking Laboratory Documents and software downloads