An Architecture for Internet Data Transfer Niraj Tolia Michael Kaminsky*, David G. Andersen, and Swapnil Patil Carnegie Mellon University and *Intel Research.

Slides:



Advertisements
Similar presentations
Secure Naming structure and p2p application interaction IETF - PPSP WG July 2010 Christian Dannewitz, Teemu Rautio and Ove Strandberg.
Advertisements

1 A GPU Accelerated Storage System NetSysLab The University of British Columbia Abdullah Gharaibeh with: Samer Al-Kiswany Sathish Gopalakrishnan Matei.
SPORC: Group Collaboration using Untrusted Cloud Resources Ariel J. Feldman, William P. Zeller, Michael J. Freedman, Edward W. Felten Published in OSDI’2010.
Esma Yildirim Department of Computer Engineering Fatih University Istanbul, Turkey DATACLOUD 2013.
Study of Hurricane and Tornado Operating Systems By Shubhanan Bakre.
On the Effectiveness of Measurement Reuse for Performance-Based Detouring David Choffnes Fabian Bustamante Fabian Bustamante Northwestern University INFOCOM.
Dynamic Adaptive Streaming over HTTP2.0. What’s in store ▪ All about – MPEG DASH, pipelining, persistent connections and caching ▪ Google SPDY - Past,
Receiver-driven Layered Multicast S. McCanne, V. Jacobsen and M. Vetterli SIGCOMM 1996.
Vijay Vasudevan, Amar Phanishayee, Hiral Shah, Elie Krevat David Andersen, Greg Ganger, Garth Gibson, Brian Mueller* Carnegie Mellon University, *Panasas.
Real-Time Authentication Using Digital Signature Schema Marissa Hollingsworth BOISECRYPT ‘09.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
1 Defragmenting DHT-based Distributed File Systems Jeffrey Pang, Srinivasan Seshan Carnegie Mellon University Phillip B. Gibbons, Michael Kaminsky Intel.
An Analysis of Internet Content Delivery Systems Stefan Saroiu, Krishna P. Gommadi, Richard J. Dunn, Steven D. Gribble, and Henry M. Levy Proceedings of.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
A Novel Approach for Transparent Bandwidth Conservation David Salyers, Aaron Striegel University of Notre Dame Department of Computer Science and Engineering.
EEC-681/781 Distributed Computing Systems Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Delay Tolerant Networking Gareth Ferneyhough UNR CSE Department
An Architecture for Internet Data Transfer Niraj Tolia Michael Kaminsky*, David G. Andersen, and Swapnil Patil Carnegie Mellon University and *Intel Research.
An Architecture for Internet Data Transfer Offence by: Aaron Ballew Sagar Vemuri.
Service Providers & Data Link & Physical layers Week 4 Lecture 1.
Adaptive Content Delivery for Scalable Web Servers Authors: Rahul Pradhan and Mark Claypool Presented by: David Finkel Computer Science Department Worcester.
Wide-area cooperative storage with CFS
Sanzaru Capability-Based Interactions for Web Applications Raluca Sauciuc Shaunak Chatterjee University of California, Berkeley Motivation Limitations.
Active Network Applications Tom Anderson University of Washington.
Computer Concepts 2014 Chapter 7 The Web and .
Interposed Request Routing for Scalable Network Storage Darrell Anderson, Jeff Chase, and Amin Vahdat Department of Computer Science Duke University.
PRISM: Proxies for Internet Streaming Media J. Kurose, P. Shenoy, D. Towsley (UMass/Amherst) L. Gao (Smith College) G. Hjalmtysson, J. Rexford (AT&T Research.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Institute of Computer and Communication Network Engineering OFC/NFOEC, 6-10 March 2011, Los Angeles, CA Lessons Learned From Implementing a Path Computation.
Monitoring Latency Sensitive Enterprise Applications on the Cloud Shankar Narayanan Ashiwan Sivakumar.
NPS: A Non-interfering Web Prefetching System Ravi Kokku, Praveen Yalagandula, Arun Venkataramani, Mike Dahlin Laboratory for Advanced Systems Research.
High Performance User-Level Sockets over Gigabit Ethernet Pavan Balaji Ohio State University Piyush Shivam Ohio State University.
Key Words: File systems, Steganography, Encrypted Communications, RAID, Information Hiding, Intelligence, Instagram, flickr Original can be found at:
Adaptive File Transfers for Diverse Environments Himabindu Pucha, Purdue University David G. Andersen, Carnegie Mellon University Michael Kaminsky, Intel.
EICP—extended Internet Cache Protocol (draft-zhang-ppsp-eicp-00.txt ) Presenter: Christian Schmidt IETF-81, Quebec, July 2011.
Data Staging on Untrusted Surrogates Jason Flinn Shafeeq Sinnamohideen Niraj Tolia Mahadev Satyanarayanan Intel Research Pittsburgh, University of Michigan,
Sockets process sends/receives messages to/from its socket
Heavy and lightweight dynamic network services: challenges and experiments for designing intelligent solutions in evolvable next generation networks Laurent.
Ditto - A System for Opportunistic Caching in Multi-hop Mesh Networks Fahad Rafique Dogar Joint work with: Amar Phanishayee, Himabindu Pucha, Olatunji.
MapReduce and GFS. Introduction r To understand Google’s file system let us look at the sort of processing that needs to be done r We will look at MapReduce.
Increasing Web Server Throughput with Network Interface Data Caching October 9, 2002 Hyong-youb Kim, Vijay S. Pai, and Scott Rixner Rice Computer Architecture.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
ECEN “Internet Protocols and Modeling”, Spring 2012 Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Class.
An Architecture and Prototype Implementation for TCP/IP Hardware Support Mirko Benz Dresden University of Technology, Germany TERENA 2001.
World Wide Web “WWW”, "Web" or "W3". World Wide Web “WWW”, "Web" or "W3"
GFS. Google r Servers are a mix of commodity machines and machines specifically designed for Google m Not necessarily the fastest m Purchases are based.
TCP/IP (Transmission Control Protocol / Internet Protocol)
A P2P-Based Architecture for Secure Software Delivery Using Volunteer Assistance Purvi Shah, Jehan-François Pâris, Jeffrey Morgan and John Schettino IEEE.
Department of Computer Science and Engineering Applied Research Laboratory Architecture for a Hardware Based, TCP/IP Content Scanning System David V. Schuehler.
Networking Named Content Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, Rebecca L. Braynard.
Latency Reduction Techniques for Remote Memory Access in ANEMONE Mark Lewandowski Department of Computer Science Florida State University.
2007cs Servers on the Web. The World-Wide Web 2007 cs CSS JS HTML Server Browser JS CSS HTML Transfer of resources using HTTP.
Internet Applications (Cont’d) Basic Internet Applications – World Wide Web (WWW) Browser Architecture Static Documents Dynamic Documents Active Documents.
AMQP, Message Broker Babu Ram Dawadi. overview Why MOM architecture? Messaging broker like RabbitMQ in brief RabbitMQ AMQP – What is it ?
AFS/OSD Project R.Belloni, L.Giammarino, A.Maslennikov, G.Palumbo, H.Reuter, R.Toebbicke.
An Architecture for Internet Data Transfer Niraj Tolia, Michael Kaminsky, David G. Andersen, and Swapnil Patil NSDI ’ Eunsang Cho.
DECADE Requirements draft-gu-decade-reqs-05 Yingjie Gu, David A. Bryan, Y. Richard Yang, Richard Alimi IETF-78 Maastricht, DECADE Session.
DISTRIBUTED FILE SYSTEM- ENHANCEMENT AND FURTHER DEVELOPMENT BY:- PALLAWI(10BIT0033)
Outline Introduction and motivation, The architecture of Tycho,
Accelerating Peer-to-Peer Networks for Video Streaming
The Transport Layer Implementation Services Functions Protocols
Processes The most important processes used in Web-based systems and their internal organization.
Chapter 2 Introduction Application Requirements VS. Transport Services
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
File Transfer Issues with TCP Acceleration with FileCatalyst
Software models - Software Architecture Design Patterns
SCTP-based Middleware for MPI
Beyond FTP & hard drives: Accelerating LAN file transfers
Presentation transcript:

An Architecture for Internet Data Transfer Niraj Tolia Michael Kaminsky*, David G. Andersen, and Swapnil Patil Carnegie Mellon University and *Intel Research Pittsburgh

Niraj Tolia © May Outline Motivation Data Oriented Transfer (DOT) service Evaluation Open Issues and Future Work Conclusion

Niraj Tolia © May Innovation in Data Transfer is Hard Imagine: You have a novel data transfer technique How do you deploy? 1.Update HTTP. Talk to IETF. Modify Apache, IIS, Firefox, Netscape, Opera, IE, Lynx, Wget, … 2.Update SMTP. Talk to IETF. Modify Sendmail, Postfix, Outlook… 3.Give up in frustration

Niraj Tolia © May Barriers to Innovation in Data Transfer Applications bundle: Content Negotiation: What data to send –Naming (URLs, directories, …) –Languages –Identification –… Data Transfer: Getting the bits across Both are tightly coupled (e.g., HTTP, SMTP) Hinders innovation and evolution of new services

Niraj Tolia © May Solution: A Data Transfer Service Decouple content negotiation from data transfer Applications perform negotiation as before But hand data objects to the Transfer Service The Transfer Service is shared by applications Application Protocol SenderReceiver Xfer Service and Data Data

Niraj Tolia © May Transfer Service Benefits Apps. can reuse available transfer techniques No reimplementation needed Easier deployment of new technologies Applications need no modification Provides for cross-application sharing Can interpose on all data transfers Handles transient disconnections

Niraj Tolia © May Outline Motivation Data Oriented Transfer (DOT) service Evaluation Open Issues and Future Work Conclusion

Niraj Tolia © May Xfer Service Sender Receiver 10,000 Foot View of Transfers using DOT Request File X put(X) read() data How does the transfer service name data? How does the transfer service locate data? ? ?

Niraj Tolia © May Application defined names are not portable Use content-naming for globally unique names Objects represented by an OID Objects are further sub-divided into “chunks” Each OID corresponds to a list of descriptors Descriptor lists allow for partial transfers FileFile Desc3 DOT: Object Naming Foo.txtFoo.txt OID File Cryptographic Hash Desc1 Desc2

Niraj Tolia © May DOT: Object Location Data transfers in DOT are receiver driven Receiver has better idea of available resources Senders specify ‘hints’ - potential data locations –dot://sender.example.com:12000/ –dht://opendht.org/ –…

Niraj Tolia © May Xfer Service Sender Receiver A Transfer using DOT Request File X OID, Hints put(X) OID, Hints get(OID, Hints) read() data Transfer Plugins

Niraj Tolia © May (1) Application API DOT’s Modular Architecture DOT Application Network Local Storage Storage Plugin Transfer Plugin (3) Storage Plugin API (2) Transfer Plugin API

Niraj Tolia © May Xfer Current DOT Prototype NET ( DSL ) Xfer NET Multi- path NET wireless SENDER RECEIVER USB Internet cache Application-independent cache Non-networked transfers Multipath and Mirror support NET MIRROR Xfer Plugins

Niraj Tolia © May Outline Motivation Data Oriented Transfer (DOT) service Evaluation Open Issues and Future Work Conclusion

Niraj Tolia © May Evaluation Standard file transfer Portable Storage Multi-Path Case Study: Postfix Server Evaluation of DOT-enabled SMTP server Integration effort

Niraj Tolia © May Standard File Transfer Setup Two DOT-enabled machines Network Emulator Evaluate various b/w + delay combinations Use gcp for the file transfers Used 40MB, 4MB, 400KB, 40KB, 4KB files Presenting 40MB here Network Emulator

Niraj Tolia © May Standard File Transfer Overhead: hashing, extra RTT No noticeable overheads with latency

Niraj Tolia © May Multipath Plugin: Load Balancing Varied capacity + delay of experimental links Compare fastest link alone with multipath plugin on both links; what speedup? Transferred 40MB file 128 KB socket buffer sizes Gigabit Experimental links Network Emulator

Niraj Tolia © May Multipath Plugin is Effective Link 1Link 2SingleMultipathSavings 100/0 10/ % 1.4% 100/66 10/66 1/ % 47% 12% Mbit/s ideal: 3.2 seconds -Multipath plugin nearly doubles throughput - TCP effects dominate. Pipe not full. - Multipath plugin doubles by adding second stream. Actual capacity irrelevant. Gigabit Link 1 Link 2

Niraj Tolia © May Postfix Trace Replay Generated 10,000 messages from trace Random data matched to chunk hash data Preserves some similarity between messages Replayed through Postfix to a single local server Postfix disk bound… DOT CPU overhead negligible Savings due to duplication within s ProgramSecondsBytes Sent Postfix MB Postfix + DOT MB (68%)

Niraj Tolia © May Postfix Integration Integrated DOT with the Postfix mail server 1 part-time week, 1 student new to Postfix Includes time to write generic adapter library ProgramLoCAdded LoC% GTC Lib--421 Postfix70, % smtpd6, % smtp3, %

Niraj Tolia © May Discussion on Deployment Application Resilience DOT is a service - it’s outside the control of the application. Our Postfix falls back to normal SMTP if –No Transfer Service contact –Transfer keeps failing In the short term, a simple fallback is encouraged. However, this could interfere with some functions –DOT-based virus scanner… In the long term, DOT would be a part of a system’s core infrastructure

Niraj Tolia © May Future Work Security Application encrypts before DOT -No block-based caching, reuse, mirroring, … No encryption -Resembles the status quo In progress: Convergent encryption –Requires integration with DOT chunking Application Preferences Encryption, QoS, priorities, … –DOT might benefit from application input Need an extensible way to express these

Niraj Tolia © May Conclusion DOT separates app. logic from data transfer Makes it easier to extend both Architecture works well Overhead low (especially in wide-area) Major benefits Caching Flexibility to implement new transfer techniques