Research Agenda on Efficient and Robust Datapath Yingping Lu.

Slides:



Advertisements
Similar presentations
Network-I/O Convergence in Too Fast Networks: Threats and Countermeasures David R. Cheriton Stanford University.
Advertisements

Encrypting Wireless Data with VPN Techniques
Distributed Data Processing
INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
TCP/IP MODEL Maninder Kaur
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
CCNA – Network Fundamentals
© N. Ganesan, Ph.D., All rights reserved. Chapter ISO-OSI Reference Model and IEEE Standards.
Object-Based Storage HPCC Lab. OBS Architecture OBSD  Storage components of the system to be shared  Disk drives, RAID subsystems, tape drives, optical.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
VIA and Its Extension To TCP/IP Network Yingping Lu Based on Paper “Queue Pair IP, …” by Philip Buonadonna.
1ISM - © 2010 Houman Younessi Lecture 5 Convener: Houman Younessi Information Systems Spring 2011.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
OSD Metadata Management
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
High-Performance Object Access in OSD Storage Subsystem Yingping Lu.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Supporting iWARP Compatibility and Features for Regular Network Adapters P. BalajiH. –W. JinK. VaidyanathanD. K. Panda Network Based Computing Laboratory.
John Degenhart Joseph Allen.  What is FTP?  Communication over Control connection  Communication over Data Connection  File Type  Data Structure.
OIS Model TCP/IP Model.
Lecturer: Tamanna Haque Nipa
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Fundamentals of Computer Networks ECE 478/578 Lecture #2 Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University of Arizona.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Introducing Network Standards Open Systems Interconnection (OSI) Model IEEE 802.x Standard Device Drivers and OSI 1.
Object-based Storage Long Liu Outline Why do we need object based storage? What is object based storage? How to take advantage of it? What's.
IP Ports and Protocols used by H.323 Devices Liane Tarouco.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Slide 1 DESIGN, IMPLEMENTATION, AND PERFORMANCE ANALYSIS OF THE ISCSI PROTOCOL FOR SCSI OVER TCP/IP By Anshul Chadda (Trebia Networks)-Speaker Ashish Palekar.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Crossing firewalls Liane Tarouco Leandro Bertholdo RNP POP/RS.
Remote Direct Memory Access (RDMA) over IP PFLDNet 2003, Geneva Stephen Bailey, Sandburst Corp., Allyn Romanow, Cisco Systems,
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
1 Public DAFS Storage for High Performance Computing using MPI-I/O: Design and Experience Arkady Kanevsky & Peter Corbett Network Appliance Vijay Velusamy.
1 Integrating security in a quality aware multimedia delivery platform Paul Koster 21 november 2001.
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Communicating over the Network Network Fundamentals – Chapter 2.
Intel Research & Development ETA: Experience with an IA processor as a Packet Processing Engine HP Labs Computer Systems Colloquium August 2003 Greg Regnier.
Lecture 24 Wireless Network Security
LE427 Data communication and networks Jarree Chaicharn, Ph.D. รศ ดร จรี ไชยชาญ
BASIC NETWORK PROTOCOLS AND THEIR FUNCTIONS Created by: Ghadeer H. Abosaeed June 23,2012.
GLOBAL EDGE SOFTWERE LTD1 R EMOTE F ILE S HARING - Ardhanareesh Aradhyamath.
Framework & Requirements for an Access Node Control Mechanism in Broadband Multi-Service Networks draft-ietf-ancp-framework-02.txt Presenter: Dong Sun.
WLAN.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
1 Protocol Layering Myungchul Kim Tel:
Internet Protocol Storage Area Networks (IP SAN)
The OSI Model A Framework for Communications David A. Abarca July 19, 2005.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Challenges of Mobile ad-hoc Grids and their Applications in e-Healthcare Zhuoqun Li, Lingfen Sun and Emmanuel C. Ifeachor School of Computing, Communications.
© 2007 EMC Corporation. All rights reserved. Internet Protocol Storage Area Networks (IP SAN) Module 3.4.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Mr. Sathish Kumar. M Department of Electronics and Communication Engineering I’ve learned that people will forget what you said, people will forget what.
Computer Network Lab. 1 3 장 OSI 기본 참조 모델 n OSI : Open System Interconnection n Basic Reference Model : ISO-7498 n Purpose of OSI Model ~ is to open communication.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Advisor: Hung Shi-Hao Presenter: Chen Yu-Jen
Date: April. 13, Monday Evening.
Chapter 3: Windows7 Part 4.
CPEG514 Advanced Computer Networkst
System Models and Networking Chapter 2,3
Presentation transcript:

Research Agenda on Efficient and Robust Datapath Yingping Lu

OSD Data Transmission Requirements Direct delivery from object device – Direct transmission between initiator and target device – This is the critical data path Secure delivery – No security channel is assumed, encryption of transmitted object is necessary – Object device exposed to network access QoS requirement – Object may have specific QoS requirement (bw, latency) Mobile client – Client may be intermittent – Error can occur during transmission

Approaches Robust Secure RDMA in End System (LAN) – RDMA / OSD in OSD device – Incorporate security in RDMA mechanism – Incorporate robustness in RDMA mechanism Adaptive Transport QoS Control – Tailor the data transmission based on the underlying network behavior Proper data delivery of wireless communication – radio resource management

OSD/Secure RDMA This is a ULP-based RDMA – The RDMA is tightly integrated with OSD protocol Leverage RDMA over TCP/IP – Extend the communication to IP network OSD device initiate RDMA requests Security-enabled RDMA – The underlying transport support security QoS support – Virtual Lane-type mechanism to provide QoS support

OSD/Secure RDMA Architecture OSD Client OSD controller OSD VIPL Object Manager Buffers Disk Driver NIC VI NIC driver OSD Device Application OSD VIPL Buffers NIC VI NIC driver IP network

Protocol Stacks OSD/RDMA maps OSD to RDMA DDP provide the direct data placement The underlying transport can be either SCTP or MPA with TCP. IPSec is used as security protocol (object encryption) SCTP DDP OSD/RDMA OSD Protocol TCP MPA IP/IPSec Intelligent NIC OSD Consumer OSD VIPL Consumer

Research Issues Functionality distribution among regional manager and intelligent device – What are the reasonable assumptions about two components? – Under such assumption, what is the best way to partition the functions? Statically or dynamically? – What’s the implications of the partition to the network, storage device, supporting software?

Research Issues RDMA over OSD – Characterize main operations and requirements of OSD protocol Common operations Customized operations by the object creator – Characterize the capability of OSD device or OSD subsystem – Study the implication of these requirements to RDMA design in OSD device

RDMA/OSD Issues System Architecture of OSD Device – The role of individual object – The role of supporting system – The interaction between the supporting system and user object – Two existing types, what’s our position? Passive data (normal file system) Active objects (COM objects, EJB objects)

RDMA/OSD Multiple Protocol processing in RDMA – ULP Application OSD iSCSI – LLP (TOE) TCP or SCTP? IP Ethernet – Different level has different header and message size, how to adding/removing the header, segmentation/desegmentation without incurring multiple data copies?

RDMA/OSD Data sharing in RDMA – Different clients may access the same object, thus has the data sharing requirement. – Who provide data sharing? Object itself or device subsystem? – How to provide data sharing in RDMA/OSD? RDMA is a one-to-one communication between server and client How to manage the registered buffer? How to incorporate the flow control?

RDMA/OSD Security implication – How to prevent malicious attack? – How to incorporate the security measure with RDMA? IP level (IPSec)? Upper level? Object level?

RDMA / OSD QoS for OSD session – QoS attributes? – QoS mechanism at the OSD device – QoS hint exploitation? – QoS functionality partition: Object Device? – How to collect proper information for each stream and adjust the transmission based on underlying network behavior

Failure recovery Failure: – Disk device failure – A TCP connection break – Client crash

Research Focus Get familiar with two projects and its code: – Intel iSCSI/OSD – Lustre Focus: – OSD System Architecture – Upper level OSD protocol design issues – Lower level protocol design issues (TOE)