PARALLEL DATA LABORATORY Carnegie Mellon University An Architecture for Self-  Storage Systems Andrew Klosterman, John Strunk Greg Ganger.

Slides:



Advertisements
Similar presentations
Steve Lewis J.D. Edwards & Company
Advertisements

Windows® Deployment Services
Andrew File System CSS534 ZACH MA. History  Originated in October 1982, by the Information Technology Center (ITC) formed with Carnegie Mellon and IBM.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
G O O G L E F I L E S Y S T E M 陳 仕融 黃 振凱 林 佑恩 Z 1.
Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung Google Jaehyun Han 1.
PASIS: Perpetually Available and Secure Information Systems Greg Ganger, Pradeep Khosla, Chenxi Wang, Mehmet Bakkaloglu,
Innosoft international inc. Ó 1999 Innosoft International, Inc. Using LDAPv3 for Directory-Enabled Applications & Networking Greg Lavender Director of.
Database Administration and Security Transparencies 1.
Chapter 7 LAN Operating Systems LAN Software Software Compatibility Network Operating System (NOP) Architecture NOP Functions NOP Trends.
Ceph: A Scalable, High-Performance Distributed File System Sage Weil Scott Brandt Ethan Miller Darrell Long Carlos Maltzahn University of California, Santa.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
Highly Available Central Services An Intelligent Router Approach Thomas Finnern Thorsten Witt DESY/IT.
Extensible Scalable Monitoring for Clusters of Computers Eric Anderson U.C. Berkeley Summer 1997 NOW Retreat.
Other File Systems: AFS, Napster. 2 Recap NFS: –Server exposes one or more directories Client accesses them by mounting the directories –Stateless server.
Sinfonia: A New Paradigm for Building Scalable Distributed Systems Marcos K. Aguilera, Arif Merchant, Mehul Shah, Alistair Veitch, Christonos Karamanolis.
OSD Metadata Management
Network Administration Procedures Tools –Ping –SNMP –Ethereal –Graphs 10 commandments for PC security.
Grids and Grid Technologies for Wide-Area Distributed Computing Mark Baker, Rajkumar Buyya and Domenico Laforenza.
Chapter 1 Introducing Windows Server 2012/R2
Tripwire Enterprise Server – Getting Started Doreen Meyer and Vincent Fox UC Davis, Information and Education Technology June 6, 2006.
11 SERVER CLUSTERING Chapter 6. Chapter 6: SERVER CLUSTERING2 OVERVIEW  List the types of server clusters.  Determine which type of cluster to use for.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung Google∗
Presented by: Alvaro Llanos E.  Motivation and Overview  Frangipani Architecture overview  Similar DFS  PETAL: Distributed virtual disks ◦ Overview.
Federated, Available, and Reliable Storage for an Incompletely Trusted Environment Atul Adya, Bill Bolosky, Miguel Castro, Gerald Cermak, Ronnie Chaiken,
Distributed File Systems Concepts & Overview. Goals and Criteria Goal: present to a user a coherent, efficient, and manageable system for long-term data.
Chapter 4.  Understand network connectivity.  Peer-to-Peer network & Client-Server network  Understand network topology  Star, Bus & Ring topology.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Object-based Storage Long Liu Outline Why do we need object based storage? What is object based storage? How to take advantage of it? What's.
1 The Google File System Reporter: You-Wei Zhang.
Data Center Infrastructure
CSC 456 Operating Systems Seminar Presentation (11/13/2012) Leon Weingard, Liang Xin The Google File System.
Virtualization Infrastructure Administration Network Jakub Yaghob.
Distributed Systems. Interprocess Communication (IPC) Processes are either independent or cooperating – Threads provide a gray area – Cooperating processes.
MODULE – 8 OBJECT-BASED AND UNIFIED STORAGE
Computing in the RAIN: A Reliable Array of Independent Nodes Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
1 Configurable Security for Scavenged Storage Systems NetSysLab The University of British Columbia Abdullah Gharaibeh with: Samer Al-Kiswany, Matei Ripeanu.
Status and Development of VoIP based emergency calls Alexander Mayrhofer, nic.at GmbH The 1st European Security and Safety Summit Brussels, June 2007.
Wireless Access and Terminal Mobility in CORBA Dimple Kaul, Arundhati Kogekar, Stoyan Paunov.
IMDGs An essential part of your architecture. About me
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Introduction to dCache Zhenping (Jane) Liu ATLAS Computing Facility, Physics Department Brookhaven National Lab 09/12 – 09/13, 2005 USATLAS Tier-1 & Tier-2.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
Presenters: Rezan Amiri Sahar Delroshan
Large Scale Parallel File System and Cluster Management ICT, CAS.
1 Public DAFS Storage for High Performance Computing using MPI-I/O: Design and Experience Arkady Kanevsky & Peter Corbett Network Appliance Vijay Velusamy.
Amit Warke Jerry Philip Lateef Yusuf Supraja Narasimhan Back2Cloud: Remote Backup Service.
Presented By: Samreen Tahir Coda is a network file system and a descendent of the Andrew File System 2. It was designed to be: Highly Highly secure Available.
Sun Network File System Presentation 3 Group A4 Sean Hudson, Syeda Taib, Manasi Kapadia.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Secure Sharding.
Install, configure and test ICT Networks
EGI-Engage Data Services and Solutions Part 1: Data in the Grid Vincenzo Spinoso EGI.eu/INFN Data Services.
AFS/OSD Project R.Belloni, L.Giammarino, A.Maslennikov, G.Palumbo, H.Reuter, R.Toebbicke.
AMSA TO 4 Advanced Technology for Sensor Clouds 09 May 2012 Anabas Inc. Indiana University.
HUAWEI TECHNOLOGIES CO., LTD. Huawei Storage ISM Management Pre-sales Product Training Materials Easy and Efficient WEU IT Solution Team.
UFIT Infrastructure Self-Service. Service Offerings And Changes Virtual Machine Hosting Self service portal Virtual Machine Backups Virtual Machine Snapshots.
NetFlow Analyzer Best Practices, Tips, Tricks. Agenda Professional vs Enterprise Edition System Requirements Storage Settings Performance Tuning Configure.
GGF OGSA-WG, Data Use Cases Peter Kunszt Middleware Activity, Data Management Cluster EGEE is a project funded by the European.
Introduction to Data Management in EGI
Storage Virtualization
The Google File System Sanjay Ghemawat, Howard Gobioff and Shun-Tak Leung Google Presented by Jiamin Huang EECS 582 – W16.
Transarc AFS Client for NT
A Redundant Global Storage Architecture
Presentation transcript:

PARALLEL DATA LABORATORY Carnegie Mellon University An Architecture for Self-  Storage Systems Andrew Klosterman, John Strunk Greg Ganger

Klosterman, Strunk, Ganger June 4, Self-  Overview Object store Provide clients with object-based interface Aggregate object-based workers Support snapshot, clone, and versioning Easy to manage Goal-based & complaint-based tuning Problem diagnosis via history Automatic integration of new resources No “on-call” administrator

Klosterman, Strunk, Ganger June 4, Maintenance & Fault-Tolerance Repairs necessary, but accident-prone Tolerate mistakes during repair Support simulated failures: fire-drills Keep maintenance procedures short Reduce number of “destructive” activities Time pressure causes mistakes No repairs required in less than 1 week!

Klosterman, Strunk, Ganger June 4, System Deployment Single datacenter environment High bandwidth, tightly coupled How big can it be? Integrated is easier to manage Vertical: disk  file system Horizontal: large device vs. small ones Capacity: 16 PB with current technology Objects: 128 billion (128 KB object size)

Klosterman, Strunk, Ganger June 4, System Architecture I/O request routing Administrator Clients Management hierarchy Workers

Klosterman, Strunk, Ganger June 4, Admin Console Supervisor Worker Discovery, Group Membership and Directory Service Event Notification Service Security Service Metadata Service Head-end Interface Messaging LayerRouterRead / Write ProtocolEncode / Decode Administrator Management hierarchy Workers I/O request routing Clients Router

Klosterman, Strunk, Ganger June 4, Management Hierarchy Admin Console System-wide monitoring Goal determination Goal distribution Complaint-based tuning Supervisor Monitoring Sub-systems Goals Performance tuning Fault detection Fault recovery

Klosterman, Strunk, Ganger June 4, Worker Object-based storage device Objects: read / write Attributes: read / write Comprehensive versioning Fast-copy  clone() A copy-on-write object “Intelligent bricks” 1U, P4, 2 GB RAM, 2 Gb NICs 4 SATA 250 GB or 4 SCSI 73 GB

Klosterman, Strunk, Ganger June 4, Request Routing #1 Discovery Detect new components Assign system ID Group Membership Aggregate components Service groups Directory Lookup service  “DNS” Query for contact info Event Notification post() subscribe() Situations trigger event posting Receipt of a subscribed message triggers reaction

Klosterman, Strunk, Ganger June 4, Request Routing #2 Security Service Authenticity Token based Checked at Workers against ACLs Confidentiality: PASIS Encode / Decode Integrity: Messaging Layer Key management

Klosterman, Strunk, Ganger June 4, Request Routing #2 Security Service

Klosterman, Strunk, Ganger June 4, Request Routing #3 Metadata Service Gigantic B-tree of object metadata Goals Encoding Share locations Can be rebuilt from data on workers Supports enumeration for fsck

Klosterman, Strunk, Ganger June 4, Head-end Interface Object-storage interface Supports additional calls Goal assignment Side-band performance tuning Two types of head-ends Translation: exports NFS, AFS, CIFS, etc. Direct: raw access to self-  objects Clients

Klosterman, Strunk, Ganger June 4, Communication Infrastructure #1 Encode/Decode Encoding chosen to meet Goals Breaks objects into shares on write() Reconstructs objects from shares on read() Read / Write Protocol Atomic changes to ~64 kB chunks of objects

Klosterman, Strunk, Ganger June 4, Communication Infrastructure #2 Router Decision maker Picks destination Distributed services Shares on read() Messaging Layer Forwards messages Picks network Interacts with Directory service

Klosterman, Strunk, Ganger June 4, Admin Console Supervisor Worker Discovery, Group Membership and Directory Service Event Notification Service Security Service Metadata Service Head-end Interface Messaging LayerRouterRead / Write ProtocolEncode / Decode Administrator Management hierarchy Workers I/O request routing Clients