Clusters Massive Cluster Gigabit Ethernet Progress on System Architecture for Extreme Devices David Culler U.C. Berkeley.

Slides:



Advertisements
Similar presentations
Communication Topics Jason Hill –
Advertisements

Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
Application Guide For Mesh AP – MAP-3120
Prof. Kristofer S.J. Pister’s team Berkeley Sensor and Actuator Center University of California, Berkeley.
5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Evolution of High Performance Cluster Architectures David E. Culler NPACI 2001 All Hands Meeting.
Linux Clustering A way to supercomputing. What is Cluster? A group of individual computers bundled together using hardware and software in order to make.
Leveraging WinPE and Linux Preboot for Effective Provisioning Jonathan Richey | Director of Development | Altiris, Inc.
Unique Opportunities in Experimental Computer Systems Research - the Berkeley Testbeds David Culler U.C. Berkeley Grad.
Highly Available Central Services An Intelligent Router Approach Thomas Finnern Thorsten Witt DESY/IT.
1 Week #1 Objectives Review clients, servers, and Windows network models Differentiate among the editions of Server 2008 Discuss the new Windows Server.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
Handheld TFTP Server with USB Andrew Pangborn Michael Nusinov RIT Computer Engineering – CE Design 03/20/2008.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Towards I-Space Ninja Mini-Retreat June 11, 1997 David Culler, Steve Gribble, Mark Stemm, Matt Welsh Computer Science Division U.C. Berkeley.
UCB Millennium and the Vineyard Cluster Architecture Phil Buonadonna University of California, Berkeley
PROGRESS project: Internet-enabled monitoring and control of embedded systems (EES.5413)  Introduction Networked devices make their capabilities known.
Developing a Cluster Strategy for NPACI All Hands Meeting Panel Feb 11, 2000 David E. Culler Computer Science Division University of California, Berkeley.
Finale’ cs294-8 Design of Deeply Networked Systems Spring 2000 David Culler & Randy Katz U.C. Berkeley
ProActive Infrastructure Eric Brewer, David Culler, Anthony Joseph, Randy Katz Computer Science Division U.C. Berkeley ninja.cs.berkeley.edu Active Networks.
Connecting the Invisible Extremes of Computing David Culler U.C. Berkeley Summer Inst. on Invisible Computing July,
Clusters Massive Cluster Gigabit Ethernet System Design for Vastly Diverse Devices David Culler U.C. Berkeley HP Visit 3/9/2000.
Embedded Transport Acceleration Intel Xeon Processor as a Packet Processing Engine Abhishek Mitra Professor: Dr. Bhuyan.
Packing for the Expedition David Culler. 5/25/992 Ongoing Endeavors Millennium: building a large distributed experimental testbed –Berkeley Cluster Software.
NPACI: National Partnership for Advanced Computational Infrastructure August 17-21, 1998 NPACI Parallel Computing Institute 1 Cluster Archtectures and.
Building an Application Server for Home Network based on Android Platform Yi-hsien Liao Supervised by : Dr. Chao-huang Wei Department of Electrical Engineering.
Stanford University StanfordNetDB Stanford NetDB- An Open Source Network Management Application for DNS, DHCP, IP Address Spaces, etc.
Course 201 – Administration, Content Inspection and SSL VPN
Windows Internet Connection Sharing Dave Eitelbach Program Manager Networking And Communications Microsoft Corporation.
Welcome Thank you for taking our training. Collection 6421: Configure and Troubleshoot Windows Server® 2008 Network Course 6690 – 6709 at
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Wave Relay System and General Project Details. Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
Implementing Network Access Protection
Active Network Node in Silicon-Based L3 Gigabit Routing Switch Active Network Node in Silicon-Based L3 Gigabit Routing Switch 1 UC Berkeley Engineering.
http:// Sensor Node: Very Small Devices on the Internet Nobuo Okabe InternetNode Inc., Yokogawa.
Module 1: Installing and Configuring Servers. Module Overview Installing Windows Server 2008 Managing Server Roles and Features Overview of the Server.
What’s New in Fireware v11.9.5
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Installation and Development Tools National Center for Supercomputing Applications University of Illinois at Urbana-Champaign The SEASR project and its.
Management for IP-based Applications Mike Fisher BTexaCT Research
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
Networking in Windows NT Layered Network Architecture Network Interface Card Network Adapter Card Drivers NDIS InterfaceStreams Transport Protocols.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
TANGO TANGO ALTERNATE NETWORK GRAPH ORGANIZER Olof Hellqvist Zak Blacher.
Configuring Network Access Protection
An Architecture and Prototype Implementation for TCP/IP Hardware Support Mirko Benz Dresden University of Technology, Germany TERENA 2001.
Homework 02 NAT 、 DHCP 、 Firewall 、 Proxy. Computer Center, CS, NCTU 2 Basic Knowledge  DHCP Dynamically assigning IPs to clients  NAT Translating addresses.
ProActive Infrastructure Eric Brewer, David Culler, Anthony Joseph, Randy Katz Computer Science Division U.C. Berkeley ninja.cs.berkeley.edu Active Networks.
Chapter 3 Selecting the Technology. Agenda Internet Technology –Architecture –Protocol –ATM IT for E-business –Selection Criteria –Platform –Middleware.
Societal-Scale Computing: The eXtremes Scalable, Available Internet Services Information Appliances Client Server Clusters Massive Cluster Gigabit Ethernet.
KYUNG-HWA KIM HENNING SCHULZRINNE 12/09/2008 INTERNET REAL-TIME LAB, COLUMBIA UNIVERSITY DYSWIS.
IEEE Wireless LAN Standard
Model: DS-600 5x 10/100/1000Mbps Ethernet Port Centralized WLAN management and Access Point Discovery Manages up to 50 APs with access setting control.
NAT、DHCP、Firewall、FTP、Proxy
IFIP-UNU ADVANCED COURSE ON NETWORKING AND SECURITY Module II-Wireless Communications Section 5 Access Points.
Berkeley Cluster Projects
Local Area Networks Yiannos Mylonas.
Implementing Network Access Protection
Communication Topics Jason Hill –
U.C. Berkeley Millennium Project
GGF15 – Grids and Network Virtualization
IBM Pervasive Computing Visit June 9, 1997
Network Virtualization
Progress on System Architecture for Extreme Devices
Objective Understand the concepts of modern operating systems by investigating the most popular operating system in the current and future market Provide.
Objective Understand the concepts of modern operating systems by investigating the most popular operating system in the current and future market Provide.
Presentation transcript:

Clusters Massive Cluster Gigabit Ethernet Progress on System Architecture for Extreme Devices David Culler U.C. Berkeley Endeavour Retreat 1/20/200

1/20/2000Endeavour Sys. Arch2 Outline The Very Large –Millenium Cluster-of-cluster resources available to you –System Architecture The Middle –Kiosks, laptops, and PDAs The Small –Embedded Servers –Low power wireless –Architecture for Zillions of devices

1/20/2000Endeavour Sys. Arch3 Large Resource Deployment In place: –Full 64-PIII Linux Cluster w/ Myrinet & ethernet (Gb rdy) »demonstrated on Ninja DDS –several remote 16-PIII clusters –DLIB 4-P + 1/4 TB cluster –1/2 TB storage server –Gb connection to dept, OC48 to NTON –Rootstock cluster dissemination facility –REXEC econ-based remote execution facility –100 KVA PDU Demonstrated –intercampus network, routing, config (as per CNS) –full Gb/s with 2 source, 2 sinks Deploying –45 x 4 of main cluster (2/4 GB mem, 18 GB disk, Gb ether)

1/20/2000Endeavour Sys. Arch4 Vineyard Cluster Architecture dissemination, resource control, remote execution, and communication - VIA / GM, GbE - Multicast Applications / Services (ISPACE/Kiosks) - NT / Linux (2.2.x) - Stride Scheduler MPIVEXEC PBS I/O Mgmt / Monitoring REXEC TOOLS Rootstock Distribution

1/20/2000Endeavour Sys. Arch5 Dissemination: Rootstock K cluster stock - build - os - drvrs - mill SW - os mods leased builds cs CAN Cluster System Distribution Center... IP network 1. Cluster Stock - Rootstock build pages - Full Current Linux - all fixes and pckgs - SSL, SSH - Cluster Drivers - Cluster System Layers - rexec, mpe, pbs - Optional SW ($) - Cluster Kernal Mods 5. Cluster Update button (future) - 2nd dialtone, CF engine, rolling update 2. Make the CS “graft” - specify IP address - pckg removes - dchp, dns, nis,... sanity check and build - resolv.conf, /etc/hosts,... constructs cluster build (lease) download CS build floppy Cluster 3. CS power-on build - xfer and localize DT - add local admin scripts - node build floppy 4. Node power-on build - local stock from CS

1/20/2000Endeavour Sys. Arch6 REXEC / VEXEC Resource Management, Autoconfig, Mechanism/Policy, Enforcement rexecd vexecd (Policy A) rexec Cluster IP Multicast Channel %rexec –n 2 –r 3 indexer minimum $ vexecd (Policy B) Node ANode BNode CNode D “Nodes AB” run indexer on Nodes AB at 3 credits/min

1/20/2000Endeavour Sys. Arch7 “Intelligent” Middle Deployed many laptops with , 3 base stations, many PDAs with IR Solved the PDA to IR-dongle and PDA to Annex serial port (J. Hill) Deployed two kiosks: touch-LCD, IR-ppp –act as server for managment Demonstrated key aspects of the service infrastructure –eg: get device applet from service point eSticky notes appln motivated xcoding-security infrastucture => Need to harvest and extend

1/20/2000Endeavour Sys. Arch8 Small: Embedded Servers Tested commercial products - promising –axis camera server –SOHO NAT, DHCP, Firewall server plumbing = ethernet Identified platform for building embedded servers –DIMM PC + Linux + … – MB RAM + 16 MB Flash Disk

1/20/2000Endeavour Sys. Arch9 Low-power Wireless Tested available options –RF monolithics (used in Smart Rocks) »“virtual wire” is brain-dead, but good tranceiver –RadioMetrics (used in ISI RF Tags) »simple, primitive packet controller, no pwr down –World Wireless »nice MAC, but only infrastructure mode Selected RF monolithics –working with BSAC and ISI on building-block –new packet controller + MAC

1/20/2000Endeavour Sys. Arch10 Zillions of Little Devices Connected device as client well-established –distiller in the infrastructure spoonfeeds client »powerful services in power-limited devices! –How to get the illusion of continuous connectivity? What about sensors-based devices? –they should behave as servers »eg: camera server –How to scale tiny server to need? –How to get illusion of continuous connectivity? »use the infrastructure First a demonstration: note server in a PDA

1/20/2000Endeavour Sys. Arch11 Assumptions Computation and storage in the infrastructure is plentiful Wired bandwidth is pervasive and essentially free [ Multicast is widely accessible] => every device has a representative proxy in the infrastructure

1/20/2000Endeavour Sys. Arch12 Cautionary enabling thought TCP protocol (acks, fsm, etc.) terminates in the kernel. System specific protocol exists between kernel TCP agent and applications. –SSI clusters have another layer of network! Think of device as an application (not big laptop) Where is its kernel agent? IP TCP app

1/20/2000Endeavour Sys. Arch13 Device Access Architecture infra proxy provides name, state, queuing, etc. extend toward AP as optimization Physical Device low power local device link AP Scalable, Available Ninja Base Clients Services persistent named representative Dev MC

1/20/2000Endeavour Sys. Arch14 Demo Mapping PDA serial AP Laptop w/ Ninja iSpace Laptop Browser persistent named representative TCP laptop w/ pppd BayStacker Wireless

1/20/2000Endeavour Sys. Arch15 Key piece to build Low power controller with 2 stream devices –X = sensor + actuator for devices –X = host interface for AP and Embedded server RF tcvr X Tiny Kernel Tiny flow drivers Application host s a s a svr sasa