Computer Science 490.002 Topical Paper Presentation #17 Terrance Wright Supervisor-Worker P a t t e r n S u p e r v i s o r - W o r k e r – P a g e 1.

Slides:



Advertisements
Similar presentations
Distributed System Structures Network Operating Systems –provide an environment where users can access remote resources through remote login or file transfer.
Advertisements

Master/Slave Architecture Pattern Source: Pattern-Oriented Software Architecture, Vol. 1, Buschmann, et al.
Network+ Guide to Networks, Fourth Edition
(4.4) Internet Protocols Layered approach to Internet Software 1.
Presented by Justin Bode CS 450 – Computer Security February 17, 2010.
EE 4272Spring, 2003 Chapter 10 Packet Switching Packet Switching Principles  Switching Techniques  Packet Size  Comparison of Circuit Switching & Packet.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
16: Distributed Systems1 DISTRIBUTED SYSTEM STRUCTURES NETWORK OPERATING SYSTEMS The users are aware of the physical structure of the network. Each site.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
OSI Model. Open Systems Interconnection (OSI) is a set of internationally recognized, non-proprietary standards for networking and for operating system.
System Architecture & Hardware Configurations Dr. D. Bilal IS 592 Spring 2005.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Databases and the Internet. Lecture Objectives Databases and the Internet Characteristics and Benefits of Internet Server-Side vs. Client-Side Special.
ISO Layer Model Lecture 9 October 16, The Need for Protocols Multiple hardware platforms need to have the ability to communicate. Writing communications.
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
B.Ramamurthy9/19/20151 Operating Systems u Bina Ramamurthy CS421.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
I. Basic Network Concepts. I.1 Networks Network Node Address Packet Protocol.
Distributed Systems: Concepts and Design Chapter 1 Pages
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
Computer Science Topical Paper Presentation #15 Zach Sloger The Secure Blackboard Pattern S e c u r e B l a c k b o a r d P a t t e r n – P a.
Chapter 2: System Models. Objectives To provide students with conceptual models to support their study of distributed systems. To motivate the study of.
25-Oct-15Network Layer Connecting Devices Networks do not normally operate in isolation.They are connected to one another using connecting devices. The.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
10 1 Chapter 10 Distributed Database Management Systems Database Systems: Design, Implementation, and Management, Sixth Edition, Rob and Coronel.
Distributed System Concepts and Architectures 2.3 Services Fall 2011 Student: Fan Bai
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Chapter2 Networking Fundamentals
An Introduction to Networking
IAD 2263: System Analysis and Design Chapter 3: Investigating System Requirements.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Design of a Cooperative Video Streaming System on Community based Resource Sharing Networks 2010 International Conference on P2P, Parallel, Grid, Cloud.
Mapping IP Addresses to Hardware Addresses Chapter 5.
SCSC 455 Computer Security Chapter 3 User Security.
The Internet Book. Chapter 16 3 A Packet Switching System Can Be Overrun Packet switching allows multiple computers to communicate without delay. –Requires.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
File Transfer And Access (FTP, TFTP, NFS). Remote File Access, Transfer and Storage Networks For different goals variety of approaches to remote file.
Networking Components Assignment 3 Corbin Watkins.
Computer Network Architecture Lecture 2: Fundamental of Network.
System Architecture & Hardware Configurations Dr. D. Bilal IS 582 Spring 2008.
Distributed Computing & Embedded Systems Chapter 4: Remote Method Invocation Dr. Umair Ali Khan.
COMPUTER NETWORKS CS610 Lecture-27 Hammad Khalid Khan.
System Architecture & Hardware Configurations
COMPUTER NETWORKS CS610 Lecture-9 Hammad Khalid Khan.
Hardware Addressing and Frame Type Identification
System Architecture & Hardware Configurations
Chapter 4: Routing Concepts
Data Networking Fundamentals
Lecture 2 Overview.
Distributed Systems Bina Ramamurthy 11/12/2018 From the CDK text.
Chapter 3: Open Systems Interconnection (OSI) Model
I. Basic Network Concepts
RKL Remote key loading.
Software models - Software Architecture Design Patterns
An Introduction to Cloud Computing
Network+ Guide to Networks, Fourth Edition
Requirements Definition
Database System Architectures
Done by:Thikra abdullah
Presentation transcript:

Computer Science Topical Paper Presentation #17 Terrance Wright Supervisor-Worker P a t t e r n S u p e r v i s o r - W o r k e r – P a g e 1 The Supervisor-Worker Pattern by Sebastian Fischmeister and Wolfgang Lugmayr

The Problem Mobile agents executing on remote systems need to protect their data from leakage and tampering. Leakage: the remote system views the agent’s data and returns values to one-up the competition. Tampering: the remote system alters the agent’s data to guarantee it’s selection or inclusion for consideration. Without protection, user or programs waste time and resources searching for optimal results only to find suboptimal or false results. P a t t e r n S u p e r v i s o r - W o r k e r – P a g e 2 Users could pay too much for services, or programs could make incorrect decisions.

The Supervisor-Worker Pattern A Constrain Manager enables constrains to be added, removed, and checked. P a t t e r n S u p e r v i s o r - W o r k e r – P a g e 3 An Agent provides an interface for moving to and from hosts. A Supervisor agent contains all the methods for creating Worker agents, assigns tasks, and merging results. A Worker agent contains all of the methods for completing a task and returning the results.

Real-World Application Before transmitting data across a network, a network management software determines which path would best suit its needs. P a t t e r n S u p e r v i s o r - W o r k e r – P a g e 4 The user specifies result constraints i.e. shortest, least congested, quickest. The client creates a RouterSupervisor. The RouterSupervisor moves to a secure host, creates RouterWorkers, and assigns them a task. The RouterWorkers move to a new host, request router information from the host, and filter it based on the user-specified constraints. The RouterWorkers send the results back to the RouterSupervisor in an encrypted format.

Real-World Application By dropping the data before moving to a new host, leakage and tampering are avoided. P a t t e r n S u p e r v i s o r - W o r k e r – P a g e 5 After all RouterWorkers are terminated, the RouterSupervisor merges the results and sends the recommended transmission path to the network management software. If the RouterSupervisor does not terminate the RouterWorker, the RouterWorker drops its data and begins again at a new host.

Pattern Analysis The Supervisor-Worker pattern is extremely useful but somewhat limited in use. P a t t e r n S u p e r v i s o r - W o r k e r – P a g e 6 It enhances the security and reliability of the data and decisions that it produces by allowing the Supervisor, which only resides on secure hosts, to handle the data rather than the Workers. It provides the concurrency control and fault tolerance benefits of the Master-Slave pattern from which it is derived. On the other hand, the Supervisor-Worker pattern is only useful when mobile agents are gathering data from remote hosts. Without the dangers of leakage and tampering by remote hosts, the Master-Slave pattern will suffice without the performance hit suffered by having to constantly encrypt and centralize data.