Towards I-Space Ninja Mini-Retreat June 11, 1997 David Culler, Steve Gribble, Mark Stemm, Matt Welsh Computer Science Division U.C. Berkeley.

Slides:



Advertisements
Similar presentations
웹 서비스 개요.
Advertisements

Introduction to Web Services
A component- and message-based architectural style for GUI software
Study of Hurricane and Tornado Operating Systems By Shubhanan Bakre.
UNDERSTANDING JAVA APIS FOR MOBILE DEVICES v0.01.
I.1 Distributed Systems Prof. Dr. Alexander Schill Dresden Technical University Computer Networks Dept.
Unique Opportunities in Experimental Computer Systems Research - the Berkeley Testbeds David Culler U.C. Berkeley Grad.
Transparent Robustness in Service Aggregates Onyeka Ezenwoye School of Computing and Information Sciences Florida International University May 2006.
1 Improving the Performance of Distributed Applications Using Active Networks Mohamed M. Hefeeda 4/28/1999.
 Java  Python  Bigtable(Bt) is a distributed storage system for managing structured data that is designed to scale to a very large size.  Query Language.
Technical Architectures
NPACI Panel on Clusters David E. Culler Computer Science Division University of California, Berkeley
Towards System Architecture for Tiny Networked Devices David Culler U.C. Berkeley Wireless hoo-hah 5/30/2000.
SEDA: An Architecture for Well-Conditioned, Scalable Internet Services Matt Welsh, David Culler, and Eric Brewer Computer Science Division University of.
Edward Tsai – CS 239 – Spring 2003 Strong Security for Active Networks CS 239 – Network Security Edward Tsai Tuesday, May 13, 2003.
Demystifying Architectural Styles Nikunj Mehta 3/11/02Demystifying Architectural Styles2 Agenda Architectural Styles The Alfa Project Architectural framework.
EECS Research into the Post-PC Era David Culler U.C. Berkeley Feb 25, 1999
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
ISRG and the Post-PC Era David Culler U.C. Berkeley ISRG Retreat Jan, 1999.
The Case for ICEBERG Integrated services from diverse networks-- “PANS” (Potentially Any Network Services) Service infrastructure that allows user level.
ProActive Infrastructure Eric Brewer, David Culler, Anthony Joseph, Randy Katz Computer Science Division U.C. Berkeley ninja.cs.berkeley.edu Active Networks.
Connecting the Invisible Extremes of Computing David Culler U.C. Berkeley Summer Inst. on Invisible Computing July,
V0.01 © 2009 Research In Motion Limited Understanding Java APIs for Mobile Devices Trainer name Date.
Clusters Massive Cluster Gigabit Ethernet System Design for Vastly Diverse Devices David Culler U.C. Berkeley HP Visit 3/9/2000.
Demystifying Architectural Styles Nikunj Mehta 3/11/02Demystifying Architectural Styles2 Architectural Styles Characterize –Structure, i.e. external.
Slide 1 ISTORE: System Support for Introspective Storage Appliances Aaron Brown, David Oppenheimer, and David Patterson Computer Science Division University.
1 Personal Activity Coordinator (PAC) Xia Hong UC Berkeley ISRG retreat 1/11/2000.
Object Based Operating Systems1 Learning Objectives Object Orientation and its benefits Controversy over object based operating systems Object based operating.
Little Demonstration of the Power in Discovery Jason Hill, Steve Ross David E. Culler Computer Science Division U.C. Berkeley.
A Security Framework for a World of Post-PC Clients and Infrastructure-based Services Steven Ross, Jason Hill, Michael Chen, Anthony D. Joseph, David E.
Packing for the Expedition David Culler. 5/25/992 Ongoing Endeavors Millennium: building a large distributed experimental testbed –Berkeley Cluster Software.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
NFS. The Sun Network File System (NFS) An implementation and a specification of a software system for accessing remote files across LANs. The implementation.
Client-Server Computing in Mobile Environments
Web Application Architecture: multi-tier (2-tier, 3-tier) & mvc
Meir Botner David Ben-David. Project Goal Build a messenger that allows a customer to communicate with a service provider for a fee.
SEDA: An Architecture for Well-Conditioned, Scalable Internet Services
Jaeki Song ISQS6337 JAVA Lecture 16 Other Issues in Java.
Copyright © 2012 Accenture All Rights Reserved.Copyright © 2012 Accenture All Rights Reserved. Accenture, its logo, and High Performance Delivered are.
Computer Science Wi-Fi App using J2ME and MVC Architecture Advisor : Dr. Chung-E Wang Department of Computer Science Sacramento State University Date:
Personal Activity Coordinator Shelley Zhuang Computer Science Division U.C. Berkeley Ericsson Workshop August 2000.
Microsoft SharePoint Server 2010 for the Microsoft ASP.NET Developer Yaroslav Pentsarskyy
1 MAIN TABLE OF CONTENTS Definition: SOFTWARE AGENT HOW MANY TYPES OF AGENT? DEFINITION OF MOBILE AGENT: SOFTWARE AGENTS PROPERTIES, WORKING OF MOBILE.
Android Security Model that Provide a Base Operating System Presented: Hayder Abdulhameed.
Hwajung Lee.  Interprocess Communication (IPC) is at the heart of distributed computing.  Processes and Threads  Process is the execution of a program.
SCHOOL OF ELECTRICAL AND COMPUTER ENGINEERING | SCHOOL OF COMPUTER SCIENCE | GEORGIA INSTITUTE OF TECHNOLOGY MANIFOLD Manifold Execution Model and System.
1 Object Oriented Logic Programming as an Agent Building Infrastructure Oct 12, 2002 Copyright © 2002, Paul Tarau Paul Tarau University of North Texas.
ProActive Infrastructure Eric Brewer, David Culler, Anthony Joseph, Randy Katz Computer Science Division U.C. Berkeley ninja.cs.berkeley.edu Active Networks.
Millennium Executive Committee Meeting David E. Culler Computer Science Division
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 JSP Application Models.
CSI 3125, Preliminaries, page 1 SERVLET. CSI 3125, Preliminaries, page 2 SERVLET A servlet is a server-side software program, written in Java code, that.
GYTE - Bilgisayar Mühendisliği Bölümü Bilgisayar Mühendisliği Bölümü GYTE - Bilgisayar Mühendisliği Bölümü AN ARCHITECTURE FOR NEXT GENERATION MIDDLEWARE.
NINJA. Project of UC Berkeley Computer Science Division Paper : The Ninja Architecture for Robust Internet-Scale Systems and Services
Institute for Visualization and Perception Research 1 © Copyright 1999 Haim Levkowitz Java-based mobile agents.
Relevant Systems Issues Motivation 1. A Group Calendar application available through web and partially disconnected portable information appliances will.
The Ninja Architecture for Robust Internet-Scale Systems and Services UC Berkeley Computer Science Division 2002 년 10 월 9 일 박준호.
Active Networks Jennifer Rexford. Nice Quotation from the Tennenhouse Paper There is presently a disconnect between what users consider to be “inside”
Introduction to Mobile-Cloud Computing. What is Mobile Cloud Computing? an infrastructure where both the data storage and processing happen outside of.
Advance Computer Programming Market for Java ME The Java ME Platform – Java 2 Micro Edition (J2ME) combines a resource- constrained JVM and a set of Java.
The Holmes Platform and Applications
Cluster-Based Scalable
Berkeley Cluster Projects
Operating System Structure
IBM Pervasive Computing Visit June 9, 1997
IBM Pervasive Computing Visit Jan 7, 1999
Lecture 1: Multi-tier Architecture Overview
Distributed Systems Bina Ramamurthy 12/2/2018 B.Ramamurthy.
Next-Generation Internet-Scale Systems Ninja/Millennium Projects
Towards a Service Architecture for Internet-Scale Systems
EECS Research into the Post-PC Era
Presentation transcript:

Towards I-Space Ninja Mini-Retreat June 11, 1997 David Culler, Steve Gribble, Mark Stemm, Matt Welsh Computer Science Division U.C. Berkeley

6/11/98Ninja I-space2 Outline Placing I-Space within Ninja System Architecture TACC as a starting point Ninja I-Space Requirements Java opportunities Strawman Framework Discussion

6/11/98Ninja I-space3 Ninja Perspective Information Devices (~10 Billion) Connected Stationary Computers (~100 Million) Scalable Servers (~Million) Units Active routers Bases Small Devices become Powerful through the infrastructure

6/11/98Ninja I-space4 Example: Super Mail Server Diverse ubiquitous access connected or disconnected move function and customization into scalable service ex: filter with arbitrary predicate Kiosk Desktop Laptop Customized Mail Service PDA

6/11/98Ninja I-space5 Operational Behavior Devices find ARs Build a “wide area path” of connectors and operators to service. Active transformation at each step Careful management of state Units Active routers Bases

6/11/98Ninja I-space6 Generalized Active Messages Message arrival causes handler to fire and perform computation to additional communication –named or encapsulated Units initiate proxy in AR, ARs route and transcode, Base services react Each layer has a distinct execution environment –control model, storage, protection, events, fault behavior

6/11/98Ninja I-space7 I-Space Execution environment for scalable, available, customizable, and easily constructed Base services Units Active routers Bases You are here

6/11/98Ninja I-space8 Toward the I-Space Design TACC –framework for building a restricted class of scalable, available services –transformation, aggregation, caching –logically stateless Java –safe language suitable for mobile code –a world of distributed objects –oriented to virtual machines

6/11/98Ninja I-space9 TACC review Service specified by FE thread logic Worker = function operator (state-free transformation) –Shared among services, unix process protection Very limited hard state Manager responsible for logical and physical mapping –monitors progress and resources –simple restart model Service request Front-end service threads Worker Processes Caches User Profile Database Manager Physical processor

6/11/98Ninja I-space10 Ninja I-space requirements Persistent state Polymorphic operators –functionally equivalent operations on strongly typed content User customizable services –customize operators within service –customize service logic Composable services

6/11/98Ninja I-space11 Key lesson from TACC Clean division of responsibilities –datapath (transformational workers) –control(service thread logic) –management –manipulation of persistent state Obtain performance and ease of service construction by constraining the programming methodology –not by introducing many low level primitives –critical to find the “sweet spot”

6/11/98Ninja I-space12 Java - the natural step Service thread ~ servlet Worker operation ~ method invocation Overloading Managed worker invocation => extension to RMI –mapping from type to method –mapping to physical resources –monitoring progress, failure, restart

6/11/98Ninja I-space13 Opportunities User customization of operators is easy –provide “load worker” request –extend manager mapping to include user context Path to user composition of services –expose “worker” API –active service methods Active Service Worker Processes Caches Manager

6/11/98Ninja I-space14 Opportunities (cont) Worker VM allows sandbox to be better tailored VM offers additional point of fault handling control

6/11/98Ninja I-space15 Millennium Testbed (started 9/97) Gigabit Ethernet SIMS C.S. E.E. M.E. BMRC N.E. IEOR C. E. MSME NERSC Transport Business Chemistry Astro Physics Biology Economy Math

6/11/98Ninja I-space16 Partnership => Testbed for I.S. Research Gigabit Ethernet PDAs Cell Phones Future Devices Wireless Infrastructure