Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements I will be out of town Monday and Tuesday to present at Multimedia Computing and Networking.

Slides:



Advertisements
Similar presentations
Crash Recovery John Ortiz. Lecture 22Crash Recovery2 Review: The ACID properties  Atomicity: All actions in the transaction happen, or none happens 
Advertisements

TRANSACTION PROCESSING SYSTEM ROHIT KHOKHER. TRANSACTION RECOVERY TRANSACTION RECOVERY TRANSACTION STATES SERIALIZABILITY CONFLICT SERIALIZABILITY VIEW.
Topic 6.3: Transactions and Concurrency Control Hari Uday.
SPORC: Group Collaboration using Untrusted Cloud Resources Ariel J. Feldman, William P. Zeller, Michael J. Freedman, Edward W. Felten Published in OSDI’2010.
Pond: the OceanStore Prototype CS 6464 Cornell University Presented by Yeounoh Chung.
The Zebra Striped Network Filesystem. Approach Increase throughput, reliability by striping file data across multiple servers Data from each client is.
COS 461 Fall 1997 Transaction Processing u normal systems lose their state when they crash u many applications need better behavior u today’s topic: how.
CS-550: Distributed File Systems [SiS]1 Resource Management in Distributed Systems: Distributed File Systems.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Emery Berger University of Massachusetts Amherst Operating Systems CMPSCI 377 Lecture.
OceanStore: An Infrastructure for Global-Scale Persistent Storage John Kubiatowicz, David Bindel, Yan Chen, Steven Czerwinski, Patrick Eaton, Dennis Geels,
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Concurrency Control & Caching Consistency Issues and Survey Dingshan He November 18, 2002.
Wide-area cooperative storage with CFS
5.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 5: Working with File Systems.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
OceanStore An Architecture for Global-Scale Persistent Storage Motivation Feature Application Specific Components - Secure Naming - Update - Access Control-
University of Pennsylvania 11/21/00CSE 3801 Distributed File Systems CSE 380 Lecture Note 14 Insup Lee.
OceanStore: An Architecture for Global - Scale Persistent Storage John Kubiatowicz, David Bindel, Yan Chen, Steven Czerwinski, Patric Eaton, Dennis Geels,
Transaction. A transaction is an event which occurs on the database. Generally a transaction reads a value from the database or writes a value to the.
Academic Year 2014 Spring. MODULE CC3005NI: Advanced Database Systems “DATABASE RECOVERY” (PART – 1) Academic Year 2014 Spring.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung Google∗
Presented by: Alvaro Llanos E.  Motivation and Overview  Frangipani Architecture overview  Similar DFS  PETAL: Distributed virtual disks ◦ Overview.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
CSC 456 Operating Systems Seminar Presentation (11/13/2012) Leon Weingard, Liang Xin The Google File System.
Feb 7, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
Feb 7, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements Tomorrow’s class is officially cancelled. If you need someone to go over the reference implementation.
Pond: the OceanStore Prototype Sean Rhea, Patric Eaton, Dennis Gells, Hakim Weatherspoon, Ben Zhao, and John Kubiatowicz University of California, Berkeley.
OceanStore: An Infrastructure for Global-Scale Persistent Storage John Kubiatowicz, David Bindel, Yan Chen, Steven Czerwinski, Patrick Eaton, Dennis Geels,
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Distributed File Systems Overview  A file system is an abstract data type – an abstraction of a storage device.  A distributed file system is available.
Distributed File System By Manshu Zhang. Outline Basic Concepts Current project Hadoop Distributed File System Future work Reference.
Introduction to DFS. Distributed File Systems A file system whose clients, servers and storage devices are dispersed among the machines of a distributed.
Introduction to Database Systems1. 2 Basic Definitions Mini-world Some part of the real world about which data is stored in a database. Data Known facts.
OceanStore: An Architecture for Global- Scale Persistent Storage.
Eduardo Gutarra Velez. Outline Distributed Filesystems Motivation Google Filesystem Architecture The Metadata Consistency Model File Mutation.
Copyright © George Coulouris, Jean Dollimore, Tim Kindberg This material is made available for private study and for direct.
Feb 1, 2001CSCI {4,6}900: Ubiquitous Computing1 Eager Replication and mobile nodes Read on disconnected clients may give stale data Eager replication prohibits.
GLOBAL EDGE SOFTWERE LTD1 R EMOTE F ILE S HARING - Ardhanareesh Aradhyamath.
Chap 7: Consistency and Replication
Introduction.  Administration  Simple DBMS  CMPT 454 Topics John Edgar2.
POND: THE OCEANSTORE PROTOTYPE S. Rea, P. Eaton, D. Geels, H. Weatherspoon, J. Kubiatowicz U. C. Berkeley.
Transaction Processing Concepts Muheet Ahmed Butt.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Dsitributed File Systems
Distributed File System. Outline Basic Concepts Current project Hadoop Distributed File System Future work Reference.
System Models Advanced Operating Systems Nael Abu-halaweh.
Storage Systems CSE 598d, Spring 2007 Lecture 13: File Systems March 8, 2007.
OceanStore : An Architecture for Global-Scale Persistent Storage Jaewoo Kim, Youngho Yi, Minsik Cho.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Sanjay Ghemawat, Howard Gobioff, Shun-Tak Leung
Outline Announcements Fault Tolerance.
7.1. CONSISTENCY AND REPLICATION INTRODUCTION
EEC 688/788 Secure and Dependable Computing
Today: Coda, xFS Case Study: Coda File System
Outline Announcements Lab2 Distributed File Systems 1/17/2019 COP5611.
CSE 542: Operating Systems
CSE 542: Operating Systems
Lecture 20: Intro to Transactions & Logging II
Outline Review of Quiz #1 Distributed File Systems 4/20/2019 COP5611.
Mid term grades Mean = 48.59, Median = 48.5, Min = 40, Max = 56.
Review Stateless (NFS) vs Statefull (AFS)
Federated, Available, and Reliable Storage for an Incompletely Trusted Environment Atul Adya, William J. Bolosky, Miguel Castro, Gerald Cermak, Ronnie.
EEC 688/788 Secure and Dependable Computing
Outline for today Feasibility of a Serverless Distributed File System deployed on an Existing set of Desktop PCs – Microsoft research. ACM SIGMETRICS 2000.
Content Distribution Network
Outline for today Oceanstore: An architecture for Global-Scale Persistent Storage – University of California, Berkeley. ASPLOS 2000 Feasibility of a Serverless.
Presentation transcript:

Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements I will be out of town Monday and Tuesday to present at Multimedia Computing and Networking (MMCN '01) Prof. David Lowenthal would provide a guest lecture on Tuesday You are expected to review papers. Paper reviews are graded. You are supposed to send me your name, address and research interests for Project Milestone 1. Remember, late is not accepted

Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing2 Outline for today Oceanstore: An architecture for Global-Scale Persistent Storage – University of California, Berkeley. ASPLOS 2000 Feasibility of a Serverless Distributed File System deployed on an Existing set of Desktop PCs – Microsoft research. ACM SIGMETRICS 2000

Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing3 Persistent store E.g. files (traditional operating systems), persistent objects (in a object based system) Applications operate on objects in persistent store –Powerpoint operates on a persistent.ppt file, mutating its contents –Palm calendar operates on my calendar which is replicated in myYahoo, Palm Desktop and the Pilot itself Storage is cheap but maintenance is not ~ 4 $/GB

Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing4 Global Persistent Store Persistent store is fundamental for Ubiquitous Computing because it allows "devices" to operate transparently, consistently and reliably on data. Transparent: Permits behavior to be independent of the device themselves Consistently: Allows users to safely access the same information from many different devices simultaneously. Reliably: Devices can be rebooted or replaced without losing vital configuration information

Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing5 Persistent store on a wide-scale 10 billion users, 10,000 files per user = 100 trillion files!! Information: –should be separated from location. To achieve uniform and highly-available access to information, servers must be geographically distributed, but exploit caching close to clients for performance –must be secure –must be durable –must be consistent

Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing6 Oceanstore system model: Data Utility GeorgiaStore AsiaStore IndiaStore End User with roaming access

Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing7 Oceanstore system model: Data Utility GeorgiaStore AsiaStore IndiaStore End User with roaming access

Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing8 Oceanstore Goals Untrusted infrastructure (utility model – telephone) –Only clients can be trusted –Servers can crash, or leak information to third parties –Most of the servers are working correctly most of the time –Class of trusted servers that can carry out protocols on the clients behalf (financially liable for integrity of data) Nomadic Data Access –Data can be cached anywhere, anytime (promiscuous caching) –Continuous introspective monitoring to locate data close to the user

Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing9 Oceanstore Persistent Object Named by a globally unique id (GUID) Such GUIDs are hard to use. If you are expecting 10 trillion files, your GUID will have to be a long (say 128 bit) ID rather than a simple name –passwd vs 12agfs237dfdfhj459uxzozfk459ldfnhgga self-certifying names 1.secureHash (/id=surendar,ou=uga,key= /etc/passwd ) -> uniqueId 2.Map uniqueId->GUID –Users would use symbolic links for easy usage /etc/passwd -> uniqueId

Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing10 SecureHash Pros: –The self-certifying name specifies my access rights Cons: –If I lose the key, the data is lost Key management issues –Keys can be upgraded –Keys can be revoked –How do we share data?

Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing11 Access Control All read-shared-users share an encryption key –Revocation: Data should be deleted from all replicas Data should be re-encrypted New keys should be distributed Clients can still access old data till it is deleted in all replicas All writes are signed –Validity checked by Access Control Lists (ACLs) –If A says trust B, B says trust C, C says trust D, what can you infer about A ? D

Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing12 Oceanstore Persistent Object Objects are replicated on multiple servers. Replicated objects are not tied to particular servers i.e. floating replicas Replicas located by a probabilistic algorithm first before using a deterministic algorithm Data can be active or archival. –Archival data is read-only and spread over multiple servers – deep archival storage

Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing13 Updates Objects are modified through updates (data is never overwritten) i.e. versioning system Application level conflict resolution Updates consist of a predicate and value pair. If a predicate evaluates to true, the corresponding value is applied. 1., 2., 3. This is similar to Bayou which we will explore later in the semester

Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing14 Introspection Oceanstore uses introspection to monitor system behavior Use this information for cluster recognition Use this information for replica management

Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing15 MSR Serverless Distributed File System They’ve actually implemented this system within Microsoft and hence have real results Assumption 1: not-fully-trusted environment Assumption 2: Disk space is not that free Each disk is partitioned into three areas: –Scratch area – for local computations –Global storage area –Local cache for global storage

Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing16 Efficiency consideration Compress data in storage Coalesce distinct files that have identical contents –Probably an artifact of Windows environment that stores files in specific locations e.g. c:\windows\system\ File are replicated –Machines that are topologically close –Machines that are lightly loaded –Non-cache reads and writes to prevent buffer cache pollution

Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing17 Replica management Files in a directory are replicated together When new machines join, its data is replicated to other machines Replicas of other files are moved into the new machine When machine leaves, the data in that machine is replicated in other machines from other replicas

Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing18 Security File updates are digitally signed File contents are encrypted before replication Convergent encryption to coalesce encrypted file Encryption: 1.Hash(file contents) -> uniqueHash 1.Encrypt(unencrypterfile, uniqueHash)->encryptedfile 1.User1: encrypt(UserKey1, uniqueHash) -> Key1 2.User2: encrypt(UserKey2, uniqueHash) -> Key2 Decryption User1: decrypt(UserKey1, Key1) -> uniqueHash Decrypt(encryptedfile, uniqueHash) -> unencryptedfile

Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing19 Application API Related read, write operations to objects form a session (defined by the application developer) Users specify the session guarantees required for each session Applications can register call back functions for exceptions

Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing20 Transactions (Database technology) A transaction is a program unit that must be executed atomically; either the entire unit is executed or none at all. The transaction either completes in its entirety, or it does not (or at least, nothing appears to have happened). A transaction can generally be thought of as a sequence of reads and writes, which is either committed or aborted. A committed transaction is one that has been completed entirely and successfully, whereas an aborted transaction is one that has not. If a transaction is aborted, then the state of the system must be rolled-back to the state it had before the aborted transaction began.

Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing21 ACID semantics Atomicity – each transaction is atomic, every operation succeeds or none at all Consistency – maintaining correct invariants across the data before and after the transaction Isolation - either has the value before the atomic action or after it, but never intermediate Durability – persistent on stable storage (backups, transaction logging, checkpoints)

Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing22 Relaxed semantics Relax the ACID constraints We could relax consistency for better performance (ala Bayou) where you are willing to tolerate inconsistent data for better performance. For example, you are willing to work with partial calendar update and are willing to work with partial information rather than wait for confirmed data. More on this later on in the course.

Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing23 Discussion