OSD Metadata Management

Slides:



Advertisements
Similar presentations
Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
Advertisements

Dr. Kalpakis CMSC 621, Advanced Operating Systems. Fall 2003 URL: Distributed System Architectures.
Innosoft international inc. Ó 1999 Innosoft International, Inc. Using LDAPv3 for Directory-Enabled Applications & Networking Greg Lavender Director of.
Lakshmi Narayana Gupta Kollepara 10/26/2009 CSC-8320.
Serverless Network File Systems. Network File Systems Allow sharing among independent file systems in a transparent manner Mounting a remote directory.
Study of Hurricane and Tornado Operating Systems By Shubhanan Bakre.
Distributed components
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
2/18/2004 Challenges in Building Internet Services February 18, 2004.
P2P: Advanced Topics Filesystems over DHTs and P2P research Vyas Sekar.
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
SERVER LOAD BALANCING Presented By : Priya Palanivelu.
EEC-681/781 Distributed Computing Systems Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Anycast Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Data Sharing in OSD Environment Dingshan He September 30, 2002.
Object Naming & Content based Object Search 2/3/2003.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Introspective Replica Management Yan Chen, Hakim Weatherspoon, and Dennis Geels Our project developed and evaluated a replica management algorithm suitable.
Conclusions in Peer-to-Peer Systems Παρουσίαση: Τάσος Καραγιάννης, Σπυριδούλα Μαργαρίτη, Κώστας Στεφανίδης, Θοδωρής Τσώτσος.
Wide-area cooperative storage with CFS
Two-Tier Architecture of OSD Metadata Management Xianbo Zhang, Keqiang Wu 11/11/2002.
Enterprise Network Security Accessing the WAN Lecture week 4.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
SensIT PI Meeting, January 15-17, Self-Organizing Sensor Networks: Efficient Distributed Mechanisms Alvin S. Lim Computer Science and Software Engineering.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Module 12: Designing High Availability in Windows Server ® 2008.
Introduction - What is Jini Technology?
Scalability Terminology: Farms, Clones, Partitions, and Packs: RACS and RAPS Bill Devlin, Jim Cray, Bill Laing, George Spix Microsoft Research Dec
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
GeoGrid: A scalable Location Service Network Authors: J.Zhang, G.Zhang, L.Liu Georgia Institute of Technology presented by Olga Weiss Com S 587x, Fall.
IT Infrastructure Chap 1: Definition
Rule-Based Data Management Systems Reagan W. Moore Wayne Schroeder Mike Wan Arcot Rajasekar {moore, schroede, mwan, {moore, schroede, mwan,
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
What is a Distributed File System?? Allows transparent access to remote files over a network. Examples: Network File System (NFS) by Sun Microsystems.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Application Policy on Network Functions (APONF) G. Karagiannis and T.Tsou 1.
Introduction to dCache Zhenping (Jane) Liu ATLAS Computing Facility, Physics Department Brookhaven National Lab 09/12 – 09/13, 2005 USATLAS Tier-1 & Tier-2.
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
A Peer-to-Peer Approach to Resource Discovery in Grid Environments (in HPDC’02, by U of Chicago) Gisik Kwon Nov. 18, 2002.
Configuring File Services. Using the Distributed File System Larger enterprises typically use more file servers Used to improve network performce Reduce.
Paper Survey of DHT Distributed Hash Table. Usages Directory service  Very little amount of information, such as URI, metadata, … Storage  Data, such.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Naming in Distributed Systems. Outline IntroductionIntroduction Some basic ConceptsSome basic Concepts INS :)INS :) Yet another naming Scheme.Yet another.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Globally Distributed Content Delivery Presenter: Baoning Wu 03/25/2003.
1/11/2016Lecturer : Trần Thị Ngọc Hoa1 ISA Array  Introduction  Deployment.
6.894: Distributed Operating System Engineering Lecturers: Frans Kaashoek Robert Morris
Introduction to Active Directory
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Enterprise Computing with Jini Technology Mark Stang and Stephen Whinston Jan / Feb 2001, IT Pro presented by Alex Kotchnev.
Chapter 25 Internet Routing. Static Routing manually configured routes that do not change Used by hosts whose routing table contains one static route.
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
Netprog: Chat1 Chat Issues and Ideas for Service Design Refs: RFC 1459 (IRC)
1 CEG 2400 Fall 2012 Network Servers. 2 Network Servers Critical Network servers – Contain redundant components Power supplies Fans Memory CPU Hard Drives.
TRUST Self-Organizing Systems Emin G ü n Sirer, Cornell University.
SQL Server 2012 Session: 1 Session: 4 SQL Azure Data Management Using Microsoft SQL Server.
CS791Aravind Elango Maintenance-Free Global Data Storage Sean Rhea, Chris Wells, Patrick Eaten, Dennis Geels, Ben Zhao, Hakim Weatherspoon and John Kubiatowicz.
Module Overview Installing and Configuring a Network Policy Server
Module 8: Concepts of a Network Load Balancing Cluster
Cengage Learning: Computer Networking from LANs to WANs
Microsoft Virtual Academy
Presentation transcript:

OSD Metadata Management Xianbo Zhang 10/14/02

Region Concept . . . Client Metadata Server Client IP Networks Client osd . . . Client IP Networks osd Client osd osd osd Client osd

Region Concept . . . Client Metadata Server1 Client IP Networks osd . . . Client IP Networks Region 2 osd Region 3 Metadata Server2 Metadata Server3 Client osd osd osd Client osd

Region Concept (Cont.) Interested networks partitioned into regions Each region has local metadata server, osd devices and clients Each metadata server has information about osd devices, objects, and client policies in this region. Also each metadata server has direct or indirect way to communicate with other servers. All metadata servers form a decentralized system, each server has the same(or similar) capabilities and responsibilities

Region Concept (Cont.) With the services and information provided by metadata system, object can migrate or replicate itself to the right region to make most of the data request/access happen in the same local region, minimizing network latency, reducing WAN traffic, and providing good locality, scalability, high performance, high availability, … Special algorithms/data structures need to be developed to achieve these goals.

Functionality Requirements for Region based Infrastructure Region self-organization: Manage dynamic region division, merging based on specified criteria. osd device registration: through simple configuration, the device can register with any known metadata server and will be managed by the right region. Client registration: client registers with any known server, and will be migrated to the nearest server automatically along with its capabilities

Functionality Requirements for Region based Infrastructure (Cont.) Floating among regions: Client: Client with its policy may move among regions. Object: Object may be migrated or replicated among regions according to object access pattern, object attribute requirements such as data location sensitivity. Device: Moving osd device from one region to another region is transparent to client. The transparency may be achieved through object migration/replication.

Functionality Requirements for Region based Infrastructure (Cont.) Fault-tolerance (avoiding single point of failure): Server: three levels of failover support, that is, server local backup/mirroring, server remote backup/mirroring, for most important data, erasure code can be used among servers for data disaster recovery. Object: object replication among osd devices, among different regions

Functionality Requirements for Region based Infrastructure (Cont.) Data access pattern monitoring: Servers monitor data requests within region. According to the access pattern, object may be migrated, replicated or stripped among osd devices to achieve good locality, load balancing and high scalability. Load balance among metadata servers can be achieved based on this same data access monitoring.

Functionality Requirements for Region based Infrastructure (Cont.) Common services provided: Object location : Locate the nearby copy of requested object upon authenticated client request. Message routing : overlay network built among servers, message can be routed efficiently for resource discovery and system management. Here each server acts as server, client and router.

Functionality Requirements for Region based Infrastructure (Cont.) Common services provided (Cont.): Distributed lock services for metadata and objects. Object consistency service among osd devices according to object’s unique consistency requirements Automatic backup based on object attributes, supporting remote backup Remote mirroring

Schematic Explanation of Data Access within a Region After authentication and authorization, client directly access data with capability from metadata server IP Networks Client Metadata Server osd osd Client osd

Schematic Explanation of Data Access outside a Region Distributed lookup protocol find nearby object copy via the distributed system formed by metadata servers Direct data access to that osd device with required data IP Networks Metadata Server Client osd osd Metadata Server osd osd Client osd

Enterprise vs. Globe/Internet Enterprise has one consistent administration policy. Each client of global storage system has its own. Enterprise has trusted servers. Global storage system has untrusted servers. Enterprise has limited size when comparing to Internet, object location could be different from popular peer-to-peer global systems.