Copyright 2000-12 1 COMP 3410 – I.T. in Electronic Commerce E-Trading 5. Alternative Architectures Roger Clarke Xamax Consultancy, Canberra Visiting Professor,

Slides:



Advertisements
Similar presentations
Computer Concepts – Illustrated 8th edition
Advertisements

Copyright, IP Business Models for the TAFE Sector Roger Clarke Chair, AEShareNet Limited Xamax Consultancy, Canberra & Visiting Professor at.
Copyright COMP 3410 – I.T. in Electronic Commerce eTrading 1.Markets Roger Clarke Xamax Consultancy, Canberra Visiting Professor, A.N.U. and.
Lecture 2 - Revenue Models
1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
Chapter 14 Intranets & Extranets. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES Introduction Technical Infrastructure Planning an Intranet.
A Flexible Cloud-Computing Platform Focus on solving business problems
© Ravi Sandhu Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.
Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Computer Science, ANU and in Cyberspace Law & Policy, UNSW 25th Bled.
Copyright, The Malware Menagerie Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy at U.N.S.W., eCommerce.
Copyright, Issues from Internet Technologies 2 – Apps for Collaboration & Subversion Roger Clarke, Xamax Consultancy, Canberra Visiting Prof/Fellow,
Copyright A 'Fair Go' for Creatives in a Digital Environment Roger Clarke Xamax Consultancy, Canberra Chair, AEShareNet Limited & Visiting.
Chapter 1: The Database Environment
Distributed Systems Architectures
Copyright © 2003 Pearson Education, Inc. Slide 9-1.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
Negotiating the Internet: Equipment and Beyond David Bankowski IT Manager, Electronic Communications 25 July 2008 Insert graphic.
18 Copyright © 2005, Oracle. All rights reserved. Distributing Modular Applications: Introduction to Web Services.
1 Term 2, 2004, Lecture 9, Distributed DatabasesMarian Ursu, Department of Computing, Goldsmiths College Distributed databases 3.
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
UCL Bloomsbury Conference 29 June 2007 Michael Holdsworth 1 Amazon, Google and Windows Live: emerging models and bumpy playing-fields Michael Holdsworth.
INTERNET PROTOCOLS Class 9 CSCI 6433 David C. Roberts Entire contents copyright 2011, David C. Roberts, all rights reserved.
Auto-scaling Axis2 Web Services on Amazon EC2 By Afkham Azeez.
Peer-to-Peer and Social Networks An overview of Gnutella.
© Prentice Hall, 2005 Business In Action 3eChapter Developing Distribution and Promotional Strategies.
16 MKTG CHAPTER Lamb, Hair, McDaniel
Our Digital World Second Edition
The Social Buddies Application Jalele Achour External Consultant in Social CRM Powered by.
Chapter 1: Introduction to Scaling Networks
Networks: Introduction 1 CS4514 Computer Networks Term B06 Professor Bob Kinicki.
1 The phone in the cloud Utilizing resources hosted anywhere Claes Nilsson.
Discovering Computers Fundamentals, 2012 Edition
The Platform as a Service Model for Networking Eric Keller, Jennifer Rexford Princeton University INM/WREN 2010.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Taiwan ITQ.
Public Thomas Mejtoft Exjobbsredovisning Teknisk fysik, Umeå universitet
© Robert G Parker – UW-CISA 2010 S-1 New and Emerging Technologies 3 - New and Emerging Technologies.
1 IC GS J. Broome, Mar Introduction to the Informatics and Data Aspects John Broome (Canada)
Cloud Computing for Education & Cloud Learning Minjuan Wang to BT Research Center (Abu Dhabi) Educational Technology San Diego State University
IP Multicast Information management 2 Groep T Leuven – Information department 2/14 Agenda •Why IP Multicast ? •Multicast fundamentals •Intradomain.
1 World Meteorological Organization Working together in weather, climate and water Sixteenth World Meteorological Congress Information Technology Support.
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
E-business infrastructure
© 2012 National Heart Foundation of Australia. Slide 2.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
Requirements Analysis Moving to Design b521.ppt © Copyright De Montfort University 2000 All Rights Reserved INFO2005 Requirements Analysis.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
Global E-Commerce Back to Table of Contents.
The Internet–Illustrated Introductory, Fourth Edition
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
PSSA Preparation.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
1 Cloud Computing Prof. Ravi Sandhu Executive Director and Endowed Chair April 12, © Ravi Sandhu World-Leading.
Public cloud definition Public cloud is a cloud in which Cloud infrastructure is available to the general public. Public cloud define cloud computing.
An Introduction to Cloud Computing. The challenge Add new services for your users quickly and cost effectively.
Effectively Explaining the Cloud to Your Colleagues.
For more notes and topics visit:
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Copyright COMP 2410 – Networked Information Systems IC1 – The Architectures of Networked Applications Roger Clarke Xamax Consultancy, Canberra.
Introduction to Cloud Computing
Cloud Computing. Cloud Computing defined Dynamically scalable, device-independent and task-centric computing resources are provided online, with all charges.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
Introduction to Cloud Computing
Cloud Computing.
Presentation transcript:

Copyright COMP 3410 – I.T. in Electronic Commerce E-Trading 5. Alternative Architectures Roger Clarke Xamax Consultancy, Canberra Visiting Professor, A.N.U. and U.N.S.W. {ETIntro.html#L5, OhdsET5.ppt} ANU RSCS, 9 October 2012

Copyright Alternative Architectures Agenda 1.Master-Slave Architecture 2.Client-Server Architecture 3.Peer-to-Peer (P2P) Architecture 4.eSharing Digital Objects using P2P 5.eTrading Digital Objects using P2P 6.'The Cloud'

Copyright Master-Slave Architecture Star Topology

Copyright Multi-Personal Client-Server The 'PC Era – Mid-Late 1970s Onwards

Copyright Client-Server Architecture Mid-1980s Onwards

Copyright Client-Server Architecture – Internet-Mediated Mid-1990s Onwards

Copyright Computing Power at the Edge

Copyright Key Developments Since the Mid- 1990s Workstation Capacity (now rivals Hosts) Workstation Diversity (vast, expanding) desktops, laptops, handhelds, smartcards,... phones ==> smartphones, PDAs ==> tablets, cameras,... carburettors, fridges,... RFID tags,... Broadband Connectivity (widespread) This enables dispersion and replication of devices capable of providing services Wireless Connectivity (increasingly widespread) This enables Mobility which means Devices change networks which means their IP-addresses change

Copyright Peer-to-Peer (P2P) Architecture

Copyright P2P Architecture Cooperative Use of Resources at the Edge

Copyright The ARPANets Peer-to-Peer Topology 1969 Onwards Multi-Organisational

Copyright P2P – The Motivation Take advantage of resources that are available at the edges of the Internet To do so, make each participating program both a Client and a Server so each workstation acts as a host as well, e.g. a music playstation can be a mixer too your PC can host part of a music repository your PDA can host part of a music catalogue

Copyright The P2P Server-Components Multiple Functions Network Management Directory Management Object Management Process Management

Copyright P2P – Towards a Technical Definition P2P is a network architecture in which each node is capable of performing each of the functions necessary to support the network and in practice many nodes do perform many of the functions

Copyright Important Characteristics of P2P Collaboration is inherent Clients can find Servers Enough Devices with Enough Resources act as Servers for discovery, and as Servers for services Single Points-of-Failure / Bottlenecks / Chokepoints are avoided by means of networking dynamics 'Free-Riding' / 'Over-Grazing' of the 'Commons' is restrained through software and psych. features

Copyright The Scale of the Undertaking The DNS grew to c. 30 million names in 18 years from its establishment in 1984 to 2002 Napster achieved that many in 2 years The top 3 distributed-catalogue services combined quickly exceeded Napster at its peak AOL Instant Messaging is also very large By 2005, the total of all P2P names probably exceeded the number in the DNS by a factor of 10

Copyright Why P2P Is Attractive Much-Reduced Dependence on individual devices and sub-networks (no central servers) Robustness not Fragility (no single point-of-failure) Resilience / Quick Recovery (inbuilt redundancy) Resistance to Denial of Service (D)DOS Attacks (no central servers) Much-Improved Scalability (proportionality) Improved Servicing of Highly-Peaked Demand (more devices on the demand-side implies there are also more server-resources)

Copyright Technical Concerns about P2P Address Volatility: old addresses may not work (hence trust based on repetitive dealings is difficult) Absence of Central Control (hence risk of anarchy) Inadequate Server Participation (over-grazing) Security Challenges: Malware, embedded or infiltrated Surreptitious Enlistment (at least potential) Vulnerability to Masquerade Vulnerability to Pollution Attacks (decoys)

Copyright P2P Applications for Access to Digital Objects Software: Fixes/Patches Releases Virus Signatures Announcements, e.g. of technical info, business info, entertainment info, sports results, promotional messages, advertisements News Reports, by news organisations, and by members of the public Emergency Services Data Backup and Recovery Data Games Data, e.g. scenes and battle configurations Archived Messages, for conferencing/chat/IM, and cooperative publishing Learning Materials, in various formats Entertainment Materials, in various formats

Copyright eSharing Files using Peer-to-Peer (P2P) MP3 Napster Gnutella, KaZaA, et al. CD-quality digital sound in files sized 1 MB/minute a central catalogue of a distributed database, to facilitate sharing of MP3 files a distributed catalogue of a distributed database, to facilitate sharing of (MP3?) files

Copyright The Scope for eTrading in Music Identify price resistance-points in the various customer-segments i.e. what the market will bear Set prices accordingly (and hence sustain payment morality) Make backlists and new releases available via for-fee P2P channels Discourage and prosecute breaches where the purpose is commercial Take no action over breaches by consumers (esp. time-shifting, format-change, even sharing?) The Evidence Since 2003, Apple iTunes charges USD 0.99/track!? Copyright-Owners get USD 0.70 In , they asked for more And argued with Jobs about variable track-pricing

Copyright eBusiness Era Revenue Sources Direct and Immediate Reciprocity Low prices for volume sales Higher prices for services that are value-added / differentiated / customised Indirect and/or Deferred Reciprocity Donations, sponsorship, advertising The-artist-pays / vanity press Shareware – use now, maybe pay later The After-Market Accessories Upgrades Enhancements Extensions

Copyright 'The Cloud' Outsourcing of IT Infrastructure of IT platform, i.e. software environment if Applications 'Server Virtualisation' Cloudsourcing

Copyright From Insourcing to Outsourcing Off-Site Hosting Outsourced Facility

Copyright From Outsourcing to Cloudsourcing CloudSourced Facilities

Copyright Cloud Computing is a Form of Outsourcing How is it different from earlier forms? Scalability ('there when it's needed) Flexible Contractual Arrangements ('pay per use') Opaqueness ('let someone else worry about details') which means less user control: of the application, through commoditisation of service levels, through SLA dependence (assuming there's an SLA, and it's negotiable) of host location, through resource-virtualisation

Copyright Levels of Cloudsourcing Infrastructure as a Service (IaaS) Amazon EC2, Rackspace,... Platform as a Service (PaaS) MS Azure, Sware Dev Environments,... Software as a Service (SAAS) Google Gmail, Google Docs / Apps MS Office 365 Dropbox Salesforce MYOB LiveAccounts, Intuit Online

Copyright Levels of Cloudsourcing and What is and isn't Outsourced

Copyright CC Architecture – The User Organisation Perspective

Copyright Reliability – The First Few Years Inferences from Media Reports (1) Outages are not Uncommon (2) Outages Arise from Multiple Causes (3) Providers' Safeguards are Sometimes Ineffective (4) Failure Cascades are Prevalent (5) Providers have had to be Forced to be Responsive (6) Providers have often been Uninformative (7) Outages may Affect Important Ancillary Services (8) The Direct Impacts have sometimes been Significant (9) Indirect Impacts have often been Even More Significant (10) Few Customers are Recompensed

Copyright Alternative Architectures Agenda 1.Master-Slave Architecture 2.Client-Server Architecture 3.Peer-to-Peer (P2P) Architecture 4.eSharing Digital Objects using P2P 5.eTrading Digital Objects using P2P 6.'The Cloud'

Copyright COMP 3410 – I.T. in Electronic Commerce E-Trading 5. Alternative Architectures Roger Clarke Xamax Consultancy, Canberra Visiting Professor, A.N.U. and U.N.S.W. {ETIntro.html#L5, OhdsET5.ppt} ANU RSCS, 9 October 2012