Computer Measurement Group, India 1 1 www.cmgindia.org Reliable and Scalable Data Streaming in Multi-Hop Architecture Sudhir Sangra, BMC Software Lalit.

Slides:



Advertisements
Similar presentations
Transmission Control Protocol (TCP)
Advertisements

IS333, Ch. 26: TCP Victor Norman Calvin College 1.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Chapter 11 Data Link Control
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Introduction to the Transport.
Oracle Data Guard Ensuring Disaster Recovery for Enterprise Data
1 Cheriton School of Computer Science 2 Department of Computer Science RemusDB: Transparent High Availability for Database Systems Umar Farooq Minhas 1,
TCP over ad hoc networks Ad Hoc Networks will have to be interfaced with the Internet. As such backward compatibility is a big issue. One might expect.
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Power saving technique for multi-hop ad hoc wireless networks.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Network Topologies.
Process-to-Process Delivery:
Computer System Lifecycle Chapter 1. Introduction Computer System users, administrators, and designers are all interested in performance evaluation. Whether.
1 Chapter Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
Qian Zhang Department of Computer Science HKUST Advanced Topics in Next- Generation Wireless Networks Transport Protocols in Ad hoc Networks.
CH2 System models.
TRƯỜNG ĐẠI HỌC CÔNG NGHỆ Bộ môn Mạng và Truyền Thông Máy Tính.
IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.
Mobile Communications: Mobile Transport Layer Mobile Communications Chapter 10: Mobile Transport Layer  Motivation  TCP-mechanisms  Indirect TCP  Snooping.
TCP PERFORMANCE OVER AD HOC NETWORKS Presented by Vishwanee Raghoonundun Assisted by Maheshwarnath Behary MSc Computer Networks Middlesex University.
A novel approach of gateway selection and placement in cellular Wi-Fi system Presented By Rajesh Prasad.
26-TCP Dr. John P. Abraham Professor UTPA. TCP  Transmission control protocol, another transport layer protocol.  Reliable delivery  Tcp must compensate.
CS332, Ch. 26: TCP Victor Norman Calvin College 1.
University of the Western Cape Chapter 12: The Transport Layer.
Networked & Distributed Systems TCP/IP Transport Layer Protocols UDP and TCP University of Glamorgan.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
Transport Layer Moving Segments. Transport Layer Protocols Provide a logical communication link between processes running on different hosts as if directly.
Computer Networks with Internet Technology William Stallings
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 3.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lecture (Mar 23, 2000) H/W Assignment 3 posted on Web –Due Tuesday March 28, 2000 Review of Data packets LANS WANS.
AMQP, Message Broker Babu Ram Dawadi. overview Why MOM architecture? Messaging broker like RabbitMQ in brief RabbitMQ AMQP – What is it ?
TCP OVER ADHOC NETWORK. TCP Basics TCP (Transmission Control Protocol) was designed to provide reliable end-to-end delivery of data over unreliable networks.
Chapter 13 Introduction to the Transport Layer
Failure detection The design of fault-tolerant systems will be easier if failures can be detected. Depends on the 1. System model, and 2. The type of failures.
Fault Tolerance (2). Topics r Reliable Group Communication.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Part III. Data Link Layer Chapter 11. Data Link Control COMP 3270 Computer Networks Computing Science Thompson Rivers University.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
DATA LINK CONTROL. DATA LINK LAYER RESPONSIBILTIES  FRAMING  ERROR CONTROL  FLOW CONTROL.
1 Ad-hoc Transport Layer Protocol (ATCP) EECS 4215.
Mobile Transport Layer  Motivation  TCP-mechanisms  Indirect TCP  Snooping TCP  Mobile TCP  Fast retransmit/recovery  Transmission freezing  Selective.
SURENDRA INSTITUTE OF ENGINEERING & MANAGEMENT PRESENTED BY : Md. Mubarak Hussain DEPT-CSE ROLL
2.10 Flow and Error Control Before that ...
Chapter 9: Data Link Control
Part III Datalink Layer 10.
Chapter 23 Introduction To Transport Layer
UNIT-V Transport Layer protocols for Ad Hoc Wireless Networks
6 Transport Layer Computer Networks Tutun Juhana
Ad-hoc Transport Layer Protocol (ATCP)
Storage Virtualization
Replication Middleware for Cloud Based Storage Service
Transport Layer Our goals:
Introduction to the Transport Layer
NFS and AFS Adapted from slides by Ed Lazowska, Hank Levy, Andrea and Remzi Arpaci-Dussea, Michael Swift.
Chapter 23 Introduction To Transport Layer
Process-to-Process Delivery:
Dr. John P. Abraham Professor UTPA
Dr. John P. Abraham Professor UTPA
Chapter 11 Data Link Control
Process-to-Process Delivery: UDP, TCP
Chapter 9: Data Link Control
STATEL an easy way to transfer data
Presentation transcript:

Computer Measurement Group, India Reliable and Scalable Data Streaming in Multi-Hop Architecture Sudhir Sangra, BMC Software Lalit Shukla, BMC Software

Computer Measurement Group, India 2 Contents Introduction Challenges Approaches – Acknowledge based – Store and forward – Distributed consumer model (Peer to Peer Acknowledge) Conclusion Questions

Computer Measurement Group, India 3 Introduction Multi-Hop architecture for various reasons but not limited to – Time to market - Buy decision – multiple component to integrate Integration of the different component using different technologies underline, to provide end to end solution Independent products performance and scalability needs to be remained intact while new features are added to solve the customer problem and provide value – Multiple hop to increase scalability, failover, load balance Fully developed solution organically with technology parity in end to end multi-hop architecture for streaming and scalability but still there are challenges to handle when middleware need to be stateless

Computer Measurement Group, India 4 Challenges Real time data streaming consumes resources on both the end (provider and consumer) impact scalability – Multi hop protocol difference – No TCP-IP like protocol to handle guaranteed delivery in multi- hop environment Network bandwidth (Concerns when on WAN) specially on Software as a Service model – In-consistence detection trigger full data sync by provider – Provider failover from one middleware to another middleware initiated the full sync of data Priority data such as event data is treated as metric data for transmission leading to delay in IT problem resolution

Computer Measurement Group, India 5 System behavior The end to end system performance used to be function of the state of middle ware. Analytics resource requirement (CPU/Memory) were reflecting the spikes and used to take long time to settle after fixing the fault at the middle ware or network

Computer Measurement Group, India 6 System behavior Database Performance was also a function of middleware state and network. Abrupt failure of any components were very expensive for DB operations.

Computer Measurement Group, India 7 Approach There could be various approaches to provide reliability and scalability for data streaming but we will be focusing in context of performance and monitoring domain where data can be categorized in 3 different sets – Event – Performance metric – Discovered resource instance

Computer Measurement Group, India 8 End to End Acknowledge Model Approach For each message sent, acknowledge is needed for reliability delivery, in case acknowledge is not received message is retransmitted. – Provide and consumer is sole responsible, middleware is stateless – Message are not discarded from provider until consumer sends an ACK or time to live timer expires Instead of network layer TCP/IP protocol, application protocol is devised to handle the sequencing and ACK’ing as provider and consumer are not directly connected over socket Round trip to receive ACK message is used to determine the time interval for retransmission of message. This allows to take the server load in consideration Dynamic sliding window to handle the bust of messages – Message is added to window if window is empty and also added to disk cache – In case window is full, message is written to disk cache Discovered resources instances messages are best suitable for this model as – No tolerance in data loss

Computer Measurement Group, India 9 End to End Acknowledge Model Approach

Computer Measurement Group, India 10 Store and Forward Model Approach In case of network glitch, server under maintenance mode or server unavailability due to unknown reasons, data should not be lost – Application layer is transparent to these network issues – Virtual socket abstract the file system and TCP/IP socket to peer – Reestablishment of the connection via same hop or different hop in case of fail over will not re-send the whole state but only delta which is generated after the link was broken increase scalability Basically suitable for “performance metric” for which acknowledgment is not desired because – Huge data – Some % of tolerance is acceptable for data loss Messages such as discovered resources instance piggy back on this model but does not degrade the model because change in system characteristics/resources are not frequent

Computer Measurement Group, India 11 Store and Forward Model Approach

Computer Measurement Group, India 12 Distributed Data Consumer Model Approach Event messages are highest priority message. Loss in these messages leads to business loss These message requires high grade reliability and message loss which are in transition is not acceptable Peer – to – Peer acknowledgment distributed consumer model is best suited for these messages – Hop connected on TCP/IP socket is responsible for acknowledge – 100 % fault tolerant and reliability – Each hop is designated as processing hop or presentation hop – Event processing happens on each hop which reduces the network bandwidth and/or resources needed on end consumer to process the message because pre-processing of message is already done

Computer Measurement Group, India 13 Distributed Data Consumer Model Approach

Computer Measurement Group, India 14 System behavior The system resources utilization is now uniformly distributed and no longer remains the function of faulty middleware states. Process pronet_cntl Sun 01/26/14 10:00 AM to Mon 01/27/14 10:00 AM

Computer Measurement Group, India 15 Conclusion Categorizing the data and applying the relevant model provided a significant improvement – The architecture has increased the number of allowed attributes under analytics from 1.2 M to 1.7 M, which is nearly 30% more than the traditional integration method of pulling data from the source nodes with no or minimal data loss – Number of device supported went from 200 to 1000 which is 5 X improvement with no or minimal data loss – The architecture became stateless and thus could fit to extend linearly with a mix of distributed analytics and distributed middleware

Computer Measurement Group, India 16 Questions ?s