1-1 Incentive Mechanisms for Large Collaborative Resource Sharing Objectives:  Why Resource harnessing  Resource sharing  Assumptions  Considerations.

Slides:



Advertisements
Similar presentations
Module 13: Implementing ISA Server 2004 Enterprise Edition: Site-to-Site VPN Scenario.
Advertisements

The following 10 questions test your knowledge of Internet-based client management in Configuration Manager Configuration Manager 2007 Internet-Based.
Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
Database Architectures and the Web
Chapter 4 Infrastructure as a Service (IaaS)
High Performance Computing Course Notes Grid Computing.
Lecture 23 Internet Authentication Applications
NETWORK LOAD BALANCING NLB.  Network Load Balancing (NLB) is a Clustering Technology.  Windows Based. (windows server).  To scale performance, Network.
Cold Fusion High Availability “Taking It To The Next Level” Presenter: Jason Baker, Digital North Date:
Chapter 10 Site Architecture McGraw-Hill/Irwin Copyright © 2004 by The McGraw-Hill Companies, Inc. All rights reserved.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Trust and Grid Computing Systems Presented By: Woodas Lai.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Squirrel: A decentralized peer- to-peer web cache Paul Burstein 10/27/2003.
1-1 Incentive Mechanisms for Large Collaborative Resource Sharing Objectives:  Why Resource harnessing  Examples of resource harnessing  Grid computing.
5th Edition, Irv Englander
Content Delivery Networks. History Early 1990s sees 100% growth in internet traffic per year 1994 o Netscape forms and releases their first browser.
Tiered architectures 1 to N tiers. 2 An architectural history of computing 1 tier architecture – monolithic Information Systems – Presentation / frontend,
DATABASE MANAGEMENT SYSTEMS 2 ANGELITO I. CUNANAN JR.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Microsoft Load Balancing and Clustering. Outline Introduction Load balancing Clustering.
1 Content Distribution Networks. 2 Replication Issues Request distribution: how to transparently distribute requests for content among replication servers.
Configuring File Services Lesson 6. Skills Matrix Technology SkillObjective DomainObjective # Configuring a File ServerConfigure a file server4.1 Using.
VAP What is a Virtual Application ? A virtual application is an application that has been optimized to run on virtual infrastructure. The application software.
Page  1 SaaS – BUSINESS MODEL Debmalya Khan DEBMALYA KHAN.
ATIF MEHMOOD MALIK KASHIF SIDDIQUE Improving dependability of Cloud Computing with Fault Tolerance and High Availability.
Web Development Process Description
P EER - TO -P EER N ETWORKS Michael Fine 1. W HAT ARE P EER -T O -P EER N ETWORKS ? Napster Social networking spawned from this concept. Emerged in the.
Database Architectures and the Web Session 5
Windows 2000 Advanced Server and Clustering Prepared by: Tetsu Nagayama Russ Smith Dale Pena.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Infrastructure for Better Quality Internet Access & Web Publishing without Increasing Bandwidth Prof. Chi Chi Hung School of Computing, National University.
CH2 System models.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Module 5: Designing a Terminal Services Infrastructure.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Distributed Software Engineering Lecture 1 Introduction Sam Malek SWE 622, Fall 2012 George Mason University.
CH1. Hardware: CPU: Ex: compute server (executes processor-intensive applications for clients), Other servers, such as file servers, do some computation.
Computing Infrastructure for Large Ecommerce Systems -- based on material written by Jacob Lindeman.
Kiew-Hong Chua a.k.a Francis Computer Network Presentation 12/5/00.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
DISTRIBUTED COMPUTING Introduction Dr. Yingwu Zhu.
DISTRIBUTED COMPUTING. Computing? Computing is usually defined as the activity of using and improving computer technology, computer hardware and software.
PROP: A Scalable and Reliable P2P Assisted Proxy Streaming System Computer Science Department College of William and Mary Lei Guo, Songqing Chen, and Xiaodong.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Cloud Computing Lecture 5-6 Muhammad Ahmad Jan.
Chapter 1 Characterization of Distributed Systems
5th Edition, Irv Englander
Chapter 6: Securing the Cloud
Configuring File Services
CONNECTING TO THE INTERNET
F5 BIGIP V 9 Training.
Chapter 1- Introduction
Distribution and components
3.1 Types of Servers.
TYPES OF SERVER. TYPES OF SERVER What is a server.
Distributed Systems Bina Ramamurthy 11/12/2018 From the CDK text.
IS4680 Security Auditing for Compliance
Introduction to Databases Transparencies
Distributed Systems Bina Ramamurthy 11/30/2018 B.Ramamurthy.
Distributed Systems Bina Ramamurthy 12/2/2018 B.Ramamurthy.
Operating Systems : Overview
Operating Systems : Overview
Cloud Computing Architecture
Slides for Chapter 1 Characterization of Distributed Systems
Distributed Systems Bina Ramamurthy 4/22/2019 B.Ramamurthy.
Presentation transcript:

1-1 Incentive Mechanisms for Large Collaborative Resource Sharing Objectives:  Why Resource harnessing  Resource sharing  Assumptions  Considerations  What are incentives?  Trust as a mechanism to provide incentives

1-2 Web Server Farms  All serious web sites are maintained using web server farms  A group of computers acting as servers and housed in a single location  ISP’s provide web hosting services using a web server farm  Hardware and software is used to load balance requests across the machines

1-3 Web Server Farms  Other issues addressed by web server farms include:  Redundancy eliminates single point of failure  Backup  Failover strategy is required  Security: secure areas are placed behind firewalls Monitor web traffic Network address translation Port translation SSL

1-4 Content Delivery Networks  Web Content can be replicated across the Internet  Reduces client access  Better manages network traffic  Such replication needs to be efficient  Replaces replicas closer to the clients  Clients are transparently redirected to the replica nearest them  A single administrative Web server does not own machines at every location  Web servers must cooperate We have a problem???

1-5 Content Delivery Networks  A single administrative Web server does not own machines at every location  Web servers must cooperate  A server that wants to replicate some of its contents access other servers MUST provide remote access to some of its local resources CPU, storage space, network bandwidth, etc.  We will have a server-to-server relationship  Such system presents some security risks

1-6 Content Delivery Networks  Some of these security risks are  A malicious server could accept to host Web contents and deliver modified versions  A malicious server could accepts to host replicas and refuse to answer any requests directed to them, causing a “denial of service”  A malicious server can allocate less resources to replicas than was negotiated

1-7 Resource Harnessing  Huge interest in linking up resources  Server Farms, Content Distribution Networks, Web Services  It is all about sharing  Quality of Service  Security  Participation versus Cost

1-8 Resource Sharing  Assumptions  Resource owners have committed their resources Honestly To be used efficiently To be used for the overall good of the community  Considerations  Free riding  Malicious entities  Non cooperative entities Incentives are needed for resources to cooperate honestly

1-9 Resource Harnessing:  Since, we deal with public resources, we need to address the following  How can we encourage resources to cooperate 70% of all users do not share files 50% of all requests are satisfied by the top 1% sharing hosts  How can we deal with security  We do not want security to become an overhead!  Can we use “trust” as an incentive?

1-10 Trust Considerations  How can we define “trust” in an operational way? Who will evaluate trust?  Trust maintenance can result in an efficient process especially in a very large-scale system. Hence, our task is to come up with an efficient model for maintaining trust  Techniques for managing and evolving trust in a large-scale distributed system  Mechanisms for maintaining trust from ongoing transactions

1-11 Overall Trust Model

1-12 Trust Terminology  Identity trust  Behavior trust  Honesty  Accuracy  Set of recommenders  Set of trusted allies

1-13  To make the trust model efficient  the overall NC system is divided into NCDs  trust is a slow varying attribute  the number of contexts is limited to printing, storage, and computing Trust Level (TL)Equivalent numerical valueDescription A1very low TL B2low TL C3medium TL D4high TL E5very high TL Trust Model Characteristics

1-14 Why Behavior Trust Trust Attributes IdentityBehavior Importancefoundationlayer Costfixedvariable Changeabilityvery seldomyes Naturegivengained Replacementyesno Propagationimmediatewith time Perceptionexistslearned

1-15 Notation  Let and represent recommenders set and trusted allies set, respectively  Let the honesty of recommender as observed by be denoted as  Let denote the recommendation for given by to at time for context  Let denote the recommendation for given by to where for the same and

1-16 Computing Honesty  Let  The value of will be less than a small value if recommender is honest  Therefore, is computed as

1-17 Computing Accuracy  Let denote the true trust level of obtained by as a results of monitoring the transaction  Let  The value of will be an integer value ranging from 0 to 4  Therefore, is computed as

1-18 Computing Trust & Reputation  Before can use the recommendation given by to calculate the reputation of, needs to be adjusted to reflect the accuracy of recommender  This shift is given by

1-19 Computing Trust & Reputation  Trust relationship expressed as  Direct trust relationship and the reputation of expressed as and,respectively.  The decay function is expressed as  Let and