Automatic Cache Update Control for Scalable Resource Information Service with WS-Management September 23, 2009 Kumiko Tadano, Fumio Machida, Masahiro Kawato,

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Module 12: Auditing SQL Server Environments
DESIGN AND IMPLEMENTATION OF SOFTWARE COMPONENTS FOR A REMOTE LABORATORY J. Fernandez, J. Crespo, R. Barber, J. Carretero University Carlos III of Madrid.
1 Searching the Web Junghoo Cho UCLA Computer Science.
1 A Comparison of Load Balancing Techniques for Scalable Web Servers Haakon Bryhni, University of Oslo Espen Klovning and Øivind Kure, Telenor Reserch.
1 Internet and Data Management Junghoo “John” Cho UCLA Computer Science.
1 An Empirical Study on Large-Scale Content-Based Image Retrieval Group Meeting Presented by Wyman
Configuration Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Polaris Financial Technologies Welcomes the members of Hyderabad chapter for the 2nd event on 4 th July 14 held by PACE (The Testing Practice)
Configuration Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
VMware vCenter Server Module 4.
Towards Autonomic Hosting of Multi-tier Internet Services Swaminathan Sivasubramanian, Guillaume Pierre and Maarten van Steen Vrije Universiteit, Amsterdam,
Enterprise Reporting with Reporting Services SQL Server 2005 Donald Farmer Group Program Manager Microsoft Corporation.
® IBM Software Group © IBM Corporation IBM Information Server Service Oriented Architecture WebSphere Information Services Director (WISD)
TIBCO Designer TIBCO BusinessWorks is a scalable, extensible, and easy to use integration platform that allows you to develop, deploy, and run integration.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Research on cloud computing application in the peer-to-peer based video-on-demand systems Speaker : 吳靖緯 MA0G rd International Workshop.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.

Overview of SQL Server Alka Arora.
 Cloud computing  Workflow  Workflow lifecycle  Workflow design  Workflow tools : xcp, eucalyptus, open nebula.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Module 8 Configuring and Securing SharePoint Services and Service Applications.
Monitoring Latency Sensitive Enterprise Applications on the Cloud Shankar Narayanan Ashiwan Sivakumar.
Agent-based Device Management in RFID Middleware Author : Zehao Liu, Fagui Liu, Kai Lin Reporter :郭瓊雯.
Design Tradeoffs For Software-Managed TLBs Authers; Nagle, Uhlig, Stanly Sechrest, Mudge & Brown.
NETWORK FILE ACCESS SECURITY Daniel Mattingly EKU, Dept. of Technology, CEN/CET.
1 Vulnerability Analysis and Patches Management Using Secure Mobile Agents Presented by: Muhammad Awais Shibli.
Service Computation 2010November 21-26, Lisbon.
20 October 2006Workflow Optimization in Distributed Environments Dynamic Workflow Management Using Performance Data David W. Walker, Yan Huang, Omer F.
« Performance of Compressed Inverted List Caching in Search Engines » Proceedings of the International World Wide Web Conference Commitee, Beijing 2008)
Module 4 Planning and Deploying Client Access Services in Microsoft® Exchange Server 2010 Presentation: 120 minutes Lab: 90 minutes After completing.
A performance evaluation approach openModeller: A Framework for species distribution Modelling.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Future of the Server Room Tour. Ottawa Montreal Calgary Vancouver Toronto Future of Your Server Room Three Pillars of Windows Server 2008 Virtualization.
ECO-DNS: Expected Consistency Optimization for DNS Chen Stephanos Matsumoto Adrian Perrig © 2013 Stephanos Matsumoto1.
Architecture for Caching Responses with Multiple Dynamic Dependencies in Multi-Tier Data- Centers over InfiniBand S. Narravula, P. Balaji, K. Vaidyanathan,
ICDL 2004 Improving Federated Service for Non-cooperating Digital Libraries R. Shi, K. Maly, M. Zubair Department of Computer Science Old Dominion University.
Hidemoto Nakada, Hirotaka Ogawa and Tomohiro Kudoh National Institute of Advanced Industrial Science and Technology, Umezono, Tsukuba, Ibaraki ,
Relational Database vs. Data Files By Willa Zhu JISAO/UW - PMEL/NOAA March 25, 2005.
Zibin Zheng DR 2 : Dynamic Request Routing for Tolerating Latency Variability in Cloud Applications CLOUD 2013 Jieming Zhu, Zibin.
Efficient RDF Storage and Retrieval in Jena2 Written by: Kevin Wilkinson, Craig Sayers, Harumi Kuno, Dave Reynolds Presented by: Umer Fareed 파리드.
Kjell Orsborn UU - DIS - UDBL DATABASE SYSTEMS - 10p Course No. 2AD235 Spring 2002 A second course on development of database systems Kjell.
02/09/2010 Industrial Project Course (234313) Virtualization-aware database engine Final Presentation Industrial Project Course (234313) Virtualization-aware.
INNOV-10 Progress® Event Engine™ Technical Overview Prashant Thumma Principal Software Engineer.
Multimedia Information System Lab. Network Architecture Res. Group Cooperative Video Streaming Mechanisms with Video Quality Adjustment Naoki Wakamiya.
Full and Para Virtualization
An answer to your common XACML dilemmas Asela Pathberiya Senior Software Engineer.
Hosting Websites and Web Applications with Microsoft ® SQL Server ® 2008.
Big traffic data processing framework for intelligent monitoring and recording systems 學生 : 賴弘偉 教授 : 許毅然 作者 : Yingjie Xia a, JinlongChen a,b,n, XindaiLu.
Module 9 Planning and Implementing Monitoring and Maintenance.
Chapter 7: Consistency & Replication IV - REPLICATION MANAGEMENT By Jyothsna Natarajan Instructor: Prof. Yanqing Zhang Course: Advanced Operating Systems.
Feb 24-27, 2004ICDL 2004, New Dehli Improving Federated Service for Non-cooperating Digital Libraries R. Shi, K. Maly, M. Zubair Department of Computer.
July 14, KIMICS 2006 Kulveer Singh Graduate School of Design & IT Dongseo University Busan, South Korea Data Concurrency Issues in iSCSI Based-Data.
Bigtable: A Distributed Storage System for Structured Data
Copyright 2007, Information Builders. Slide 1 iWay Web Services and WebFOCUS Consumption Michael Florkowski Information Builders.
IBM Express Runtime Quick Start Workshop © 2007 IBM Corporation Deploying a Solution.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Apache Solr Dima Ionut Daniel. Contents What is Apache Solr? Architecture Features Core Solr Concepts Configuration Conclusions Bibliography.
18 May 2006CCGrid2006 Dynamic Workflow Management Using Performance Data Lican Huang, David W. Walker, Yan Huang, and Omer F. Rana Cardiff School of Computer.
Adaptive Configuration of a Web Caching Hierarchy Pranav A. Desai Jaspal Subhlok Presented by: Pranav A. Desai.
Jan 27, Digital Preservation Seminar1 Effective Page Refresh Policies for Web Crawlers Written By: Junghoo Cho & Hector Garcia-Molina Presenter:
Software Architecture in Practice
Building a Database on S3
Mixed Reality Server under Robot Operating System
Smita Vijayakumar Qian Zhu Gagan Agrawal
Presented By: Darlene Banta
IP Control Gateway (IPCG)
Ponder policy toolkit Jovana Balkoski, Rashid Mijumbi
Presentation transcript:

Automatic Cache Update Control for Scalable Resource Information Service with WS-Management September 23, 2009 Kumiko Tadano, Fumio Machida, Masahiro Kawato, and Yoshiharu Maeno Service Platforms Research Laboratories, NEC Corporation

© 2009 ASET © NEC Corporation 2009 Page 2 Outline ▐Introduction Secure Platform Project ▐Approach Requirements of Resource Information Service Existing Approaches for Cache Update Control Proposed Solution ▐Design Resource Information Manager Resource Information Cache Update Control ▐Performance Evaluation Experiment Simulation Studies ▐Conclusion

© 2009 ASET © NEC Corporation 2009 Page 3 Introduction ▐Advanced datacenters host many enterprise applications using virtualization for server consolidation ▐Consolidated security management is a complex and risky task for system administrators There are a large number of managed resources All the security modules should be configured properly and consistently The complexity may cause misconfiguration Windows Linux Xen Oracle MySQL Business Applications Multi-vendor Multiple layers Large number

© 2009 ASET © NEC Corporation 2009 Page 4 Secure Platform Project ▐Integrated Access Control Manager (IAM) Integrates access control policies for various resources (OS, VM, DB..) based on the standards (CIM, WS-Management) Provides a common interface to compose abstract access control policies Automatically transforms the abstract policies into concrete policies (ACLs) for individual resources The transformation requires information of various resources system administrator Management VM VMM (Hypervisor) IAM Management OS Guest VM Guest OS Database Policy deployment Consolidated enterprise systems GUI Policy composition Business application ACL

© 2009 ASET © NEC Corporation 2009 Page 5 Secure Platform Project -Policy Transformation- ▐Administrator composes RBAC policy using GUI IAM GUI Administrator compose Abstract Policy Subject Object Action Members of Accounting Division “Read” is permitted Directories for Accounting Division ResourceUserPermission /usr/dir1User A User B read /etc/dir2User A User B read ・・・ Concrete Policy (ACL) ▐For policy transformation, mapping between abstract and concrete resources is required ▐For the mapping, the administrator requires information of various resources The mapping may vary with time ▐Fast retrieval of resource information is the key point of this work transform mapping

© 2009 ASET © NEC Corporation 2009 Page 6 Outline ▐Introduction Secure Platform Project ▐Approach Requirements of Resource Information Service Existing Approaches for Cache Update Control Proposed Solution ▐Design Resource Information Manager Resource Information Cache Update Control ▐Performance Evaluation Experiment Simulation Studies ▐Conclusion

© 2009 ASET © NEC Corporation 2009 Page 7 Requirements of the Resource Information Service ▐Requirements Short response time for information retrieval Up-to-date resource information Scalability for a large amount of information on various resources (e.g managed physical hosts) ▐A solution Caching of resource information for quick response Cache update control method to keep resource information up-to-date What kind of cache update control method meets the requirements?

© 2009 ASET © NEC Corporation 2009 Page 8 Existing Approaches for Cache Update Control ▐Notification-based cache update control An agent in a managed host notifies resource state changes to the manager The manager may get too many notifications from many agents at a time ⇒ Overload of management host ▐Reactive cache update control The manager updates cached information reactively when cache miss occurs It always takes long time to retrieve resource information for the first time after expiration ⇒ Long response time ▐Proactive cache update control: Web Service Polling Engine The manager updates cached information proactively and periodically This algorithm updates whole resource information and needs to run too many update processes ⇒ Does not scale

© 2009 ASET © NEC Corporation 2009 Page 9 Proposed Solution ▐A selective cache update control method for resource information cache The method periodically invokes the cache update control process: 1.picks up the cached resource instances which will expire in the near future as update candidates 2.selects the resource instances from the update candidates which are likely to be referred 3.updates the selected resource instances ▐Advantages Short query response time by automatically updating cached information likely to be referred High scalability by selecting part of cached instances as update targets Pick up Select r1r1 r3r3 r2r2 r4r4 r5r5 r1r1 r2r2 r3r3 r4r4 r5r5 expiring likely to be referred Update r1r1 r2r2 r3r3 r4r4 r5r5

© 2009 ASET © NEC Corporation 2009 Page 10 Outline ▐Introduction Secure Platform Project ▐Approach Requirements of Resource Information Service Existing Approaches for Cache Update Control Proposed Solution ▐Design Resource Information Manager Resource Information Cache Update Control ▐Performance Evaluation Experiment Simulation Studies ▐Conclusion

© 2009 ASET © NEC Corporation 2009 Page 11 Resource Information Manager (RIM) ▐Structure IAM consists of Policy Manager and RIM ▐Functionalities RIM receives CQL queries from system administrator via Policy Manager and returns the requested resource information CQL: CIM Query Language RIM adopts the selective cache update control method for quick response ▐Compliance with standards RIM collects information of various resources with WS-Management Resource information is represented with CIM based information schema IAM Policy Manager RIM

© 2009 ASET © NEC Corporation 2009 Page 12 Control Sequences of Resource Information Manager ▐Query Processing Cache Hit : When the requested information exists in the cache Cache Miss: When the requested information does not exist in the cache or the cached information is expired ▐Automatic Cache Update Control Cache update controller (CUC) periodically invokes the selective cache update control process CUC is a sub-component of RIM

© 2009 ASET © NEC Corporation 2009 Page 13 system administrator Business system IAM Query Processor Resource information cache RIM CIM Policy manager CQL Control Sequence –Cache Hit-

© 2009 ASET © NEC Corporation 2009 Page 14 system administrator Business system Policy manager IAM Resource information collector Query Processor Resource information cache RIM CIM Agent Protocol handler CIMOM provider CMPI Control Sequence -Cache Miss- WS-Management CQL

© 2009 ASET © NEC Corporation 2009 Page 15 system administrator Business system Policy manager IAM Resource information collector Query Processor CUC Resource information cache RIM CIM Agent Protocol handler CIMOM provider CMPI Control Sequence -Automatic Cache Update Control- CQL (1) Periodically selects the cached resource information as an update target (2) Sends requests to collect recent data of the selected resource information from the remote hosts (3) Receives the responses (4) Updates resource information in the cache WS-Management

© 2009 ASET © NEC Corporation 2009 Page 16 Update Target Selection Process of the CUC ▐Conditions The number of resources whose information is updated during a certain time interval t interval is limited by m Cached Information of each resource has expiration time that is assigned using time to live (TTL). ▐CUC works as follows: Repeat step 1 through step 5 once in t interval 1.Select resources whose cached information will expire within threshold of time to expiration (T ex ) as candidates for update 2.For each candidate, predict the query request rate based on the system administrator’s access patterns 3.Select m candidates with highest query request rates as update targets 4.Collect resource information of the update targets through the resource information collector 5.Update information in the cache with collected resource information time Cache update Expiration TTL

© 2009 ASET © NEC Corporation 2009 Page 17 Outline ▐Introduction Secure Platform Project ▐Approach Requirements of Resource Information Service Existing Approaches for Cache Update Control Proposed Solution ▐Design Resource Information Manager Resource Information Cache Update Control ▐Performance Evaluation Experiment Simulation Studies ▐Conclusion

© 2009 ASET © NEC Corporation 2009 Page 18 Performance Evaluation ▐Purpose Query performance measurement for cache hit and miss cases Simulation of the average query response time with the proposed method in maximally and minimally effective cases The simulation uses the results obtained from the measurements

© 2009 ASET © NEC Corporation 2009 Page 19 Experimental Setup for Query Performance Measurement ▐We measured the response time of the CQL Each CQL requests to retrieve an instance of a CIM class Request Response Agent Target server CPUIntel Xeon GHz Memory10GB OSCentOS 5.1 Client CQL Target server Management Server RIM Management server CPUIntel Xeon E GHz Memory10GB OSCentOS 5.1 Case 1 : Cache Hit Case 2 : Cache Miss

© 2009 ASET © NEC Corporation 2009 Page 20 Experiment -Result- Query targetCQLResponse time [sec]Size of response message [bytes] Cache missCache hit CIM_Computer System SELECT * FROM CIM_ComputerSystem WHERE Name='hostA' CIM_FileSyste m SELECT * FROM CIM_FileSystem WHERE Name='/' SPF_DirectorySELECT * FROM SPF_Directory WHERE Name='/etc/' CIM_LogicalFil e SELECT * FROM CIM_LogicalFile WHERE Name='/etc/yum.conf' CIM_EnabledL ogicalElementC apabilities SELECT * FROM CIM_EnabledLogicalElementCapabi lities Average ▐Average response time of each query (measured 10 times)

© 2009 ASET © NEC Corporation 2009 Page 21 Simulation Studies ▐To evaluate the CUC in a consistent and systematic manner, we simulate the CUC in the maximally and minimally effective cases and the reactive cache update control: Maximally effective case :optimal proactive update The query request rate of each resource is completely estimated Minimally effective case :random proactive update Resource information is updated just randomly Reactive update Automatic cache update is not performed

© 2009 ASET © NEC Corporation 2009 Page 22 Simulation of the CUC ▐Simulated value We simulated average query response time T res T hit and T miss are obtained from measurements ▐Conditions Constant query request rate s i for each target resource r i is given ▐Update Control Methods to be Compared Op-proactive: Optimal proactive update Selects resources whose cached information will expire within T ex in descending order of query request rate, and updates them proactively Rd-proactive: Random proactive update Selects resources whose cached information will expire within T ex randomly and updates them proactively Reactive: Reactive update Updates resource information only when cache miss occurs. T hit :Query response time (cache hit) T miss :Query response time (cache miss) p :Cache hit rate

© 2009 ASET © NEC Corporation 2009 Page 23 ▐The simulation is performed according to the following steps: Step 1. Extract cached resource information whose remaining time before expiration is less than T ex. Step 2. Select update targets from the extracted resource information in step 1 up to m based on query request rate s i (op-proactive) or randomly (rd-proactive). Step 3. Update expiration time of the update targets with the summation of the current time and TTL i. Step 4. For each resource, issue a query request with query request rate s i. From the result, calculate the cache hit rate p and T res. Step 5. Repeat step 1 to step 4 from t start to t end at a certain update interval t interval. Reactive method skips steps 1-3 In the simulation, we evaluate T res by varying the T ex and m Simulation Procedure Less than T ex Up to mCurrent time +TTL i r1r1 r3r3 r2r2 r4r4 r5r5 r1r1 r2r2 r3r3 r4r4 r5r5 r4r4 r5r5 r3r3 r1r1 r2r2 r1r1 r3r3 r2r2 r4r4 r5r5 expired hitmiss p=0.5

© 2009 ASET © NEC Corporation 2009 Page 24 Simulation Results –Effect of varying T ex on T res - ▐We evaluated the average query response time T res by varying the threshold of time to expiration T ex in the range of -10 to 10 [sec] Obtain the optimal value of the T ex to minimize T res ▐The minimum value of T res Op-proactive [sec] at T ex = 0 Rd-proactive0.451 [sec] at T ex = -1 T ex [sec] Parameter settings R1000 T hit [sec] T miss [sec] s i random number of [0-1] TTL i random number of [0-10] t start 0 t end 200 [sec] t interval 5 [sec] T res [sec] op-proactive rd-proactive optimal value

© 2009 ASET © NEC Corporation 2009 Page 25 Simulation Results –Effect of varying m on T res - ▐We evaluated the average query response time T res by varying the number of resources whose information is updated per update interval m in the range of 0 to 1000 Reduced by 66.66% Ratio of the best case of op-proactive and reactive: Parameter settings: R1000 T hit [sec] T miss [sec] s i random number of [0-1] TTL i random number of [0-10] t start 0 t end 200 [sec] t interval 5 [sec] T res [sec] m op-proactive at T ex =0 rd-proactive at T ex =0 reactive op-proactive at T ex =10 rd-proactive at T ex =10

© 2009 ASET © NEC Corporation 2009 Page 26 Outline ▐Introduction Secure Platform Project ▐Approach Requirements of Resource Information Service Existing Approaches for Cache Update Control Proposed Solution ▐Design Resource Information Manager Resource Information Cache Update Control ▐Performance Evaluation Experiment Simulation Studies ▐Conclusion

© 2009 ASET © NEC Corporation 2009 Page 27 Conclusion ▐We proposed an selective cache update control method for the resource information service to reduce average query response time in large-scale systems. ▐We implemented the method based on the WS-Management and the CIM standards ▐We measured basic query performance of the implementation ▐We evaluated average query response time by simulating update control methods With given query request rate and the experimental results ▐Average query response time of the proposed method is 66.66% shorter than that of the reactive method

© 2009 ASET © NEC Corporation 2009 Page 28 Thank you!

© 2009 ASET © NEC Corporation 2009 Page 29 Target methods for comparison Difference of T res m Average [sec]Average [ratio]Maximum [sec]Average [ratio] 1 op-proactive at T ex =0 and % %380 2 op-proactive and rd- proactive at T ex = % %380 3 op-proactive at T ex =0 and reactive % %840 Simulation Studies –Effect of varying m on T res - ▐We investigate the variation of T res due to: 1.Adjustment of the T ex 2.Update target selection methods 3.Introduction of the proposed method (compared to the existing method)