O.C.E.A.N Open Computation Exchange and Auctioning Network.

Slides:



Advertisements
Similar presentations
Mobile Agents Mouse House Creative Technologies Mike OBrien.
Advertisements

Cryptography and Network Security
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Exchange Network Key Management Services A Security Component February 28, 2005 The Exchange Network Node Mentoring Workshop.
8.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Software Frameworks for Acquisition and Control European PhD – 2009 Horácio Fernandes.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
The Architecture of Transaction Processing Systems
Systems Architecture, Fourth Edition1 Internet and Distributed Application Services Chapter 13.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
Hussain Ali Department of Computer Engineering KFUPM, Dhahran, Saudi Arabia Microsoft Networking.
Chapter 8 Web Security.
Chapter 4.1 Interprocess Communication And Coordination By Shruti Poundarik.
Distributed Systems: Client/Server Computing
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Overview SAP Basis Functions. SAP Technical Overview Learning Objectives What the Basis system is How does SAP handle a transaction request Differentiating.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
The Design Discipline.
C Copyright © 2009, Oracle. All rights reserved. Appendix C: Service-Oriented Architectures.
1 Chapter Client-Server Interaction. 2 Functionality  Transport layer and layers below  Basic communication  Reliability  Application layer.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
第十四章 J2EE 入门 Introduction What is J2EE ?
Architecting Web Services Unit – II – PART - III.
Cryptography, Authentication and Digital Signatures
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Module 9: Fundamentals of Securing Network Communication.
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Module 5 Planning and Deploying Message Transport in Microsoft® Exchange Server 2010.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Slide 1 Service-centric Software Engineering. Slide 2 Objectives To explain the notion of a reusable service, based on web service standards, that provides.
Institute for Visualization and Perception Research 1 © Copyright 1999 Haim Levkowitz Java-based mobile agents.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
An Overview of OCEAN A Small Introduction by Cyrus & Erwin.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Training for developers of X-Road interfaces
Cryptography and Network Security
CHAPTER 3 Architectures for Distributed Systems
Chapter 3: Windows7 Part 4.
Cryptography and Network Security
Goals Introduce the Windows Server 2003 family of operating systems
Security & .NET 12/1/2018.
The Secure Sockets Layer (SSL) Protocol
Architecture Competency Group
Design.
Cryptography and Network Security
Presentation transcript:

O.C.E.A.N Open Computation Exchange and Auctioning Network

Overview Distributed Computing What is O.C.E.A.N. ? The O.C.E.A.N. Architecture. Future Goals

Distributed Computing What is Distributed Computing? History Why we need Distributed Computing? Applications of Distributed Computing Projects

O.C.E.A.N Roots OCEAN (Open Computation Exchange & Arbitration Network) –An evolving open distributed protocol for dynamic exchange of computing resources. –Begun at MIT with other MIT/Stanford alums. –OCEAN already led to at least 1 company (popularpower.com) & VCs want more.popularpower.com

O.C.E.A.N Architecture Overview Highly flexible. Deployable on any arbitrary network of host nodes connected by TCP/IP. Supports distributed P2P double auctions & job subcontracting.

Features of OCEAN Server and API software freely available. –Anyone w. a TCP/IP node can host a worker, auctioneer, or node-listing service. –Anyone can write OCEAN applications and/or submit app invocations (jobs) to OCEAN. Uses open, XML-based protocols. Deployable on an internet, intranet or extranet basis.

Potential OCEAN Apps CGI/Animation Rendering. Computational science & engineering (e.g., simulations). Bioinformatics (genetic data processing). Data mining, machine learning. Combinatorial search & optimization.

O.C.E.A.N. Components Communications/Security Task Spawning and Migration(TSM) Peer List Update Manager(PLUM) Naming Auctioning (more)

O.C.E.A.N. Components(contd.) Negotiation Central Accounting Server(CAS) Trader Job Maker API

Communications/Security Component The Security Component interacts with the Accounting, Auction, Negotiation, PLUM, TSM, Communication and Node Configuration components in each OCEAN node. It provides various security services, which include authentication, access control, confidentiality, integrity and non-repudiation. The security mechanism uses symmetric and asymmetric cryptographic techniques to maintain confidentiality of information; CA certificates, digital signatures and message authentication codes (MAC) or hash functions to ensure data integrity and authentication and security managers to implement access control functions and node security. Security layer plays an important role in CAS (Centralized Accounting Server), which contains accounting and transaction information of all OCEAN nodes. It is also responsible for offering secured exchange of financial information between financial networks and the CAS

CAS Financial Network Certification Authority Security and Communication layer of Node 2 Security & Communication Layer Databas e Security and Communicat ion layer of Node 1 Security Component

ONS(Ocean Naming System) Provides a unique naming scheme Syntax: ocean:// : / : /jobid Implementation provides wrappers to work with parts of names All modules are served by Naming Directory services will be added through JNDI in future

ONS TSM Returned name Destination address, port OCEAN Node 1 Name sent to other Ocean node Name sent as a parameter ONS Security / Communic AUCTION Auction, jobid OCEAN Node 2 Name received from other node Jobid Job Security / Communic

Task Spawning and Migration

The TSM obtains Task Sender information from the Trader Layer subsystem and migrates Ocean tasks from the buyer ( Task Sender ) to the seller ( Task Receiver ) through the Communication/Security Layer. Node 1 Node 2 Trader TSM Communication /Security Auction Nego. Web Server Trader TSM Communication / Security Auction Nego. TSM Architecture

PLUM The PLUM is acronym for Peer List Update Manager The role of PLUM is to maintain a list of peer’s with which transactions can be performed The PLUM component is present in each OCEAN node. The PLUM is primarily used by Auction component.

PLUM The components PLUM interacts with. –The PLUM mainly interacts with Communication and Security component. What the PLUM needs. –The PLUM may need some sort of lightweight database or persistence manager. The stages of operation of PLUM. –Registration Stage –Maintenance Stage –Termination Stage

LOCATION another OCEAN node - potential peer to node 1 OCEAN node 1 Auction PLUM Security/ communic. Negotiator Node config./ maint./oper. interface PLUM Security/ communic.

ARCHITECTURE Peer Peer List Configuration PeerEditor Ordering CheckUnique PreferenceChecker BlackList TransferPeerList Adder PLUM InterfacesQuery Manager Other Node Other Components

Negotiation Component This is a higher level Component Gets peer list from auction layer and negotiates with the nodes in the peer list Chooses a winning node based on the negotiations Gives the winning node address to the TSM component Improvements: –Include multiple simultaneous negotiations with several nodes –Include level of negotiation –Include history of past negotiations to make better negotiations in the future.

Buyer Seller Signed contract BuyerSeller Modify proposal New proposal Signed contract contract 1.No Negotiation. The buyer sends the contract and the seller signs the contract and sends it back. 2.Negotiation where the buyer sends a counter proposal and the seller adjusts to meet the new proposal. contract Negotiation Examples

CAS (Central Accounting Server) High level component in the OCEAN architecture. Connecting with financial network and local accounting layer through security and communication layer. To maintain OCEAN account in a secure location. To provide a connection between the OCEAN network and real-world financial networks. To communicate critical information to the local accounting system. Implementation using Oracle and JDBC.

Negotiation Layer CAS Security and Communication Layer Financial Network Local Accounting Layer CAS

Functionality Utilitarian functionality. XML Document Generators. Libraries. OCEAN API

Motivation Application produces the proper results. Application does not do anything malicious. Estimate cost of execution in OCEAN. Design Support OCEAN API. Free Auctions Nodes as Threads. No Auctioning Required! OCEAN SIMULATOR

Future Goals Implement beta version 1 of O.C.E.A.N by the end of fall semester. Deploy O.C.E.A.N. so that it can be tested by various distributed applications simultaneously being developed. Improve the higher layer components like Auction and Negotiation by adding more functionality.