Slide 1 Ubiquitous Storage Breakout Group Endeavour mini-retreat January, 2000.

Slides:



Advertisements
Similar presentations
Information Capture and Re-Use Joe Hellerstein. Scenario Ubiquitous computing is more than clients! –sensors and their data feeds are key –smart dust.
Advertisements

Confidentiality using Symmetric Encryption traditionally symmetric encryption is used to provide message confidentiality consider typical scenario –workstations.
Information Utility Breakout Expeditions Meeting 8/16/1999.
Gas Tracker 9000 Semester Project EEL 6788 Spring 2010 Chris Giles EEL April-2010 University of Central Florida.
Telegraph: An Adaptive Global- Scale Query Engine Joe Hellerstein.
Naming and Integrity: Self-Verifying Data in Peer-to-Peer Systems Hakim Weatherspoon, Chris Wells, John Kubiatowicz University of California, Berkeley.
Connecting the Invisible Extremes of Computing David Culler U.C. Berkeley Summer Inst. on Invisible Computing July,
1 Fault-tolerant Paths ISRG Retreat Z. Morley Mao 1/11/2000 Services Paths.
OceanStore: Data Security in an Insecure world John Kubiatowicz.
OceanStore: An Architecture for Global-Scale Persistent Storage Professor John Kubiatowicz, University of California at Berkeley
Or, Providing Scalable, Decentralized Location and Routing Network Services Tapestry: Fault-tolerant Wide-area Application Infrastructure Motivation and.
Telegraph: A Universal System for Information. Telegraph History & Plans Initial Vision –Carey, Hellerstein, Stonebraker –“Regres”, “B-1” Sweat, ideas.
1 IRAM and ISTORE David Patterson, Katherine Yelick, John Kubiatowicz U.C. Berkeley, EECS
Problem Definition Data path –Created by the Automatic Path Creation (APC) component –Service: program with well-defined interface –Operator: stateless.
7/15/2015ROC/OceanStore Winter Retreat Introspective Replica Management in OceanStore Dennis Geels.
CS 443 Advanced OS Fabián E. Bustamante, Spring 2005 Porcupine: A Highly Available Cluster- based Mail Service Y. Saito, B. Bershad, H. Levy U. Washington.
Windows 7 Windows Server 2008 R2 VirtualizationVirtualization Heterogeneous Server Environment Inventory Linux, Unix & VMware Windows 7 & Server 2008.
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
Data-intensive Computing on the Cloud: Concepts, Technologies and Applications B. Ramamurthy This talks is partially supported by National.
Copyright © 2012 Cleversafe, Inc. All rights reserved. 1 Combining the Power of Hadoop with Object-Based Dispersed Storage.
Clustering & VPC Patrick Gallucci Microsoft Colorado PASSCamp 2006.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Cloud Computing.
 Security and Smartphones By Parker Moore. The Smartphone Takeover  Half of mobile phone subscribers in the United States have a smartphone.  An estimated.
HDInsight on Azure and Map-Reduce Richard Conway Windows Azure MVP Elastacloud Limited.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
IT Terminology Quiz VSB 1002: Business Dynamics II Spring 2009.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
1 Liquid Software Larry Peterson Princeton University John Hartman University of Arizona
Freenet: A Distributed Anonymous Information Storage and Retrieval System Josh Colvin CIS 590, Fall 2011.
Presentation seminar on   Google Chrome OS is Linux based OS  Google Chrome is an open source, lightweight OS.  It is based.
Proposal for Term Project J. H. Wang Mar. 2, 2015.
Intel IT Overlay Jeff Sedayao PlanetLab Workshop at HPLABS May 11, 2006.
ECEN “Internet Protocols and Modeling”, Spring 2012 Slide 2.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Software Development. Systems Life Cycle Analysis  Collect and examine data  Analyze current system and data flow Design  Plan your.
Agile Survivable Store PIs: Mustaque Ahamad, Douglas M. Blough, Wenke Lee and H.Venkateswaran PhD Students: Prahlad Fogla, Lei Kong, Subbu Lakshmanan,
Department of Computer Science A Scalable, Commodity Data Center Network Architecture Mohammad Al-Fares Alexander Loukissas Amin Vahdat SIGCOMM’08 Reporter:
TeraPaths The TeraPaths Collaboration Presented by Presented by Dimitrios Katramatos, BNL Dimitrios Katramatos, BNL.
Freenet “…an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity.
TeraGrid n US based, funded by the NSF n High speed network, combines clusters into one Super-Cluster! n Doesn’t just combine computation… combines storage,
Slide 1 Cluster-on-Demand (COD) Justin Moore Duke University.
1 Wide Area Network Emulation on the Millennium Bhaskaran Raman Yan Chen Weidong Cui Randy Katz {bhaskar, yanchen, wdc, Millennium.
Maite Barroso - 10/05/01 - n° 1 WP4 PM9 Deliverable Presentation: Interim Installation System Configuration Management Prototype
Computer Hardware Software, Memory & Storage Internet & EthicsPowerPoint
Data Grid Plane Network Grid Plane Dynamic Optical Network Lambda OGSI-ification Network Resource Service Data Transfer Service Generic Data-Intensive.
Service Composition: Breakout Session Summary Randy Katz David Culler Summary: Bhaskaran Raman.
Chapter 7 – Confidentiality Using Symmetric Encryption.
Societal-Scale Computing: The eXtremes Scalable, Available Internet Services Information Appliances Client Server Clusters Massive Cluster Gigabit Ethernet.
Dsitributed File Systems
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
INTRODUCTION TO GRID & CLOUD COMPUTING U. Jhashuva 1 Asst. Professor Dept. of CSE.
Presented by: Aaron Stanley King.  Benefits of SQL Azure  Features of SQL Azure  Demos, Demos, Demos!  How to query in SQL Azure  More Demos!  Recent.
Distributed Correlation in Fabric Kiwi Team PSNC.
OceanStore : An Architecture for Global-Scale Persistent Storage Jaewoo Kim, Youngho Yi, Minsik Cho.
Option 2: The Oceanic Data Utility: Global-Scale Persistent Storage
Proposal for Term Project
Information Technology Deanship
Scaling for the Future Katherine Yelick U.C. Berkeley, EECS
Capitalize on modern technology
Telegraph: An Adaptive Global-Scale Query Engine
A Software-Defined Storage for Workflow Applications
Security Vulnerabilities in RPC (csci5931)
Ubiquitous and Mobile Smart Phones
ICEBERG Release Version 0
Content Distribution Network
Information Capture and Re-Use
Outline for today Oceanstore: An architecture for Global-Scale Persistent Storage – University of California, Berkeley. ASPLOS 2000 Feasibility of a Serverless.
Presentation transcript:

Slide 1 Ubiquitous Storage Breakout Group Endeavour mini-retreat January, 2000

Slide 2 Crossovers OceanStore + Telegraph –OceanStore uses Telegraph storage manager to store data –State machine description of servers Telegraph + Ninja –Operator-based flows == Ninja paths? –Constructing paths: graphical vs. automatic path creation –Use Ninja to create a cluster for Telegraph Machine Learning –Operator reordering –Introspection for data placement –Multidimensional scaling and smart dust

Slide 3 Crossovers (cont.) Security –Security must be built in from the beginning to avoid toy systems –End-to-end vs. link-to-link security –HCI for key management –Denial of Service is a key issue –Physically secure devices (gadget) –Encrypted search ISTORE + Ninja + Telegraph –Fault-tolerant testbed

Slide 4 Proposal Cycles are free (Moore’s Law) Secure –Data secure –Protection against denial of service –Traffic analysis Ubiquitous Highly available Maintainable

Slide 5 Schedule OceanStore (end of summer) –Read-mostly prototype –Terabytes –Linux FS API –(Geographically?) Distributed Telegraph (May) –Initial version of storage manager (on Ninja?) –Initial q.p. based on Eddy (relational + internet svcs?) Ninja v3 (this semester) –Manageability –RPC –Demos: cluster jukebox over cellphone

Slide 6 Schedule (cont.) ISTORE –80-node prototype (spring break) –Availability, Maintainability, Evolutionary Growth benchmarks (<= May)