EEC 688/788 Secure and Dependable Computing Lecture 12 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University

Slides:



Advertisements
Similar presentations
Paxos Made Simple Leslie Lamport. Introduction ► Lock is the easiest way to manage concurrency  Mutex and semaphore.  Read and write locks in 2PL for.
Advertisements

CS 5204 – Operating Systems1 Paxos Student Presentation by Jeremy Trimble.
1 Indranil Gupta (Indy) Lecture 8 Paxos February 12, 2015 CS 525 Advanced Distributed Systems Spring 2015 All Slides © IG 1.
Consensus Hao Li.
EEC 688/788 Secure and Dependable Computing Lecture 12 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Paxos Made Simple Gene Pang. Paxos L. Lamport, The Part-Time Parliament, September 1989 Aegean island of Paxos A part-time parliament – Goal: determine.
Eddie Bortnikov & Aran Bergman, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Recitation.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 16 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 15 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 9 Wenbing Zhao Department of Electrical and Computer Engineering.
Eddie Bortnikov & Aran Bergman, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Recitation.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 12 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 11 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 16 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 12 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 13 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
EEC 688/788 Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
EEC 688/788 Secure and Dependable Computing Lecture 14 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CHUBBY and PAXOS Sergio Bernales 1Dennis Kafura – CS5204 – Operating Systems.
Chapter 6 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University Building Dependable Distributed Systems.
EEC 688 Secure and Dependable Computing Lecture 16 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Eddie Bortnikov & Aran Bergman, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Recitation.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 14 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 11 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Paxos Made Simple Jinghe Zhang. Introduction Lock is the easiest way to manage concurrency Mutex and semaphore. Read and write locks. In distributed system:
Bringing Paxos Consensus in Multi-agent Systems Andrei Mocanu Costin Bădică University of Craiova.
EEC 688/788 Secure and Dependable Computing Lecture 14 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Paxos A Consensus Algorithm for Fault Tolerant Replication.
EEC 688/788 Secure and Dependable Computing Lecture 10 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
EEC 688/788 Secure and Dependable Computing Lecture 15 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Paxos Steve Ko Computer Sciences and Engineering University at Buffalo.
CS425 / CSE424 / ECE428 — Distributed Systems — Fall Nikita Borisov - UIUC1 Some material derived from slides by Leslie Lamport.
CSE 486/586, Spring 2014 CSE 486/586 Distributed Systems Paxos Steve Ko Computer Sciences and Engineering University at Buffalo.
Consensus, impossibility results and Paxos Ken Birman.
EEC 688/788 Secure and Dependable Computing Lecture 10 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
The consensus problem in distributed systems
CS 525 Advanced Distributed Systems Spring 2013
Distributed Systems – Paxos
EECS 498 Introduction to Distributed Systems Fall 2017
CS 525 Advanced Distributed Systems Spring 2018
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
EECS 498 Introduction to Distributed Systems Fall 2017
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
Paxos Made Simple.
Presentation transcript:

EEC 688/788 Secure and Dependable Computing Lecture 12 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University

2 6/27/2015 EEC688/788: Secure & Dependable ComputingWenbing Zhao Outline Reminder: midterm#2 this Wednesday! Paxos algorithm Review exercise for midterm#2

3 The Paxos Algorithm – Consensus for Asynchronous Systems Contribution: separately consider safety and liveness issues. Safety can be guaranteed and liveness is ensured during period of synchrony Participants of the algorithm are divided into three categories –Proposers: those who propose values –Accepters: those who decide which value to choose –Learners: those who are interested in learning the value chosen 6/27/2015 EEC688/788: Secure & Dependable ComputingWenbing Zhao

4 The Paxos Algorithm How to choose a value –Use a single acceptor: straightforward but not fault tolerant –Use a number of acceptors: a value is chosen if the majority of the acceptors have accepted it 6/27/2015 EEC688/788: Secure & Dependable ComputingWenbing Zhao

5 The Paxos Algorithm Requirements for choosing a value –P1. An acceptor must accept the first proposal that it receives –P2. If a proposal with value v is chosen, then every higher-numbered proposal that is chosen has value v Since the proposal numbers are totally ordered, P2 guarantees the safety property 6/27/2015 EEC688/788: Secure & Dependable ComputingWenbing Zhao

6 The Paxos Algorithm How to guarantee P2? –P2a: If a proposal with value v is chosen, then every higher-numbered proposal accepted by any acceptor has value v But what if an acceptor that has never accepted v accepted a proposal with v’? –P2b: if a proposal with value v is chosen, then every higher-numbered proposal issued by any proposer has value v P2b implies P2a, which implies P2 6/27/2015 EEC688/788: Secure & Dependable ComputingWenbing Zhao

7 The Paxos Algorithm How to ensure P2b? P2c: For any v and n, if a proposal with value v and number n is issued, then there is a set S consisting of a majority of acceptors such that either –(a) no acceptor in S has accepted any proposal numbered less than n, or –(b) v is the value of the highest-numbered proposal among all proposals numbered less than n accepted by the acceptors in S 6/27/2015 EEC688/788: Secure & Dependable ComputingWenbing Zhao

8 The Paxos Algorithm To ensure P2c, an acceptor must promise: –It will not accept any more proposals numbered less than n, once it has accepted a proposal n 6/27/2015 EEC688/788: Secure & Dependable ComputingWenbing Zhao

9 The Paxos Algorithm Phase 1. –(a) A proposer selects a proposal number n and sends a prepare request with number n to a majority of acceptors. –(b) If an acceptor receives a prepare request with number n greater than that of any prepare request to which it has already responded, then it responds to the request with a promise not to accept any more proposals numbered less than n and with the highest- numbered proposal (if any) that it has accepted. 6/27/2015 EEC688/788: Secure & Dependable ComputingWenbing Zhao

10 The Paxos Algorithm Phase 2. –(a) If the proposer receives a response to its prepare requests (numbered n) from a majority of acceptors, then it sends an accept request to each of those acceptors for a proposal numbered n with a value v, where v is the value of the highest-numbered proposal among the responses, or is any value if the responses reported no proposals. –(b) If an acceptor receives an accept request for a proposal numbered n, it accepts the proposal unless it has already responded to a prepare request having a number greater than n. 6/27/2015 EEC688/788: Secure & Dependable ComputingWenbing Zhao

11 The Paxos Algorithm 6/27/2015 EEC688/788: Secure & Dependable ComputingWenbing Zhao

12 Paxos Examples 6/27/2015 EEC688/788: Secure & Dependable ComputingWenbing Zhao

13 Paxos Examples 6/27/2015 EEC688/788: Secure & Dependable ComputingWenbing Zhao

14 Paxos Examples 6/27/2015 EEC688/788: Secure & Dependable ComputingWenbing Zhao

15 Paxos Examples 6/27/2015 EEC688/788: Secure & Dependable ComputingWenbing Zhao

16 Paxos Examples 6/27/2015 EEC688/788: Secure & Dependable ComputingWenbing Zhao

17 Paxos Examples 6/27/2015 EEC688/788: Secure & Dependable ComputingWenbing Zhao

18 Review Problem 1 In the Needham-Schroeder protocol, Alice generates two challenges, RA and RA2. This seems like overkill. Would one not have done the job? 6/27/2015 EEC688/788: Secure & Dependable ComputingWenbing Zhao

19 Review Problem 2 In the public-key authentication protocol shown below, in message 7, RB is encrypted with KS. Is this encryption necessary, or would it have been adequate to send it back in plaintext? Explain your answer 6/27/2015 EEC688/788: Secure & Dependable ComputingWenbing Zhao

20 Review Problem 3 Give two reasons why PGP compresses messages. 6/27/2015 EEC688/788: Secure & Dependable ComputingWenbing Zhao

21 Review Problem 4 Assuming that everyone on the Internet used PGP, could a PGP message sent to a mailing list and be decoded correctly by all receipants? 6/27/2015 EEC688/788: Secure & Dependable ComputingWenbing Zhao

22 Review Problem 5 The SSL data transport protocol involves two nonces as well as a premaster key. What value, if any, does using the nonces have? 6/27/2015 EEC688/788: Secure & Dependable ComputingWenbing Zhao