Presentation on theme: "What is OceanStore? - 10^10 users with 10.000 files each - Goals: Durability, Availability, Enc. & Auth, High performance - Worldwide infrastructure to."— Presentation transcript:
What is OceanStore? - 10^10 users with 10.000 files each - Goals: Durability, Availability, Enc. & Auth, High performance - Worldwide infrastructure to give access to persistent data - Assumptions - Always online, fast connections (not a demand) - The network is untrusted (malicious hosts) - Hosts / routers can fail arbitrarily - Hosts constantly entering / leaving
What does Tapestry do for OS? Routing messages to nodes and objects Locating nodes and objects Publishing objects
OS Data Model - AGUID: Hash of name + owner’s public key - BGUID: Hash of data block - Data blocks (leaves) are read-only and shared between object versions - Updates creates new versions which enables Time travel - Fundamental data unit: the object - Objects are either active or archived
OS Actions (on objects) An application using OS could want to: –Store –Read the latest version –Read a previous version –Update (create new version)
How a client stores an object ”Disco.mp3”B98C5D… + PUK = AGUID A1F39B… 75DD2E…
How a client stores an object (2) 11 11 Disco.mp3 RN ”Disco.mp3 _”AGUID… RN ”Disco.mp3 _ _”AGUID… RN ”Disco.mp3 _ _ _”AGUID… RN ”Disco.mp3”AGUID Primary Replicas / Primary Tier / Inner Ring is chosen by a Responsible Party
How a client reads the latest version of an object ”Disco.mp3” CRN1 AGUID VGUID Transfer blocks to client B98C5D… + PUK = AGUID C RN 1 2/3 of PR servers....
How a client reads a previous version VGUID n-1 VGUID n-2 AGUID … Deep Archival Storage Fragments created via Erasure Coding ….. VGUID 1 Fragments
Deep Archival Storage (Erasure Coding) ”Disco.mp3” m = 4n = 8 ….. Reconstruct block using m arbitrary fragments Rate of encoding r = m/n Increase in storage space: 1/r Tradeoff between performance and durability
Deep Archival Storage (2) Example: 1 million machines, 10% down, p = probability of finding a document: Replication p = 0.99 EC, m = 8, n = 16p = 0.99999 EC, m = 16, n = 32p = 0.9999999999…. (20000 nines)
Cached objects 11 11 2 2 2 22 2 C transfer - Old versions can also be cached - No consistency protocol - Soft state - Increase performance and avail., but only if the application requires a lesser degree of consistency - No serialization of concurrent updates - Known as Secondary Replicas
Example Applications Distributed backup –Extremely high durability –Time travel Groupware –Serialization of concurrent updates –Time travel Email –Serialization of concurrent updates –Encryption and authentication –No single point of failure –Caching of mails close to clients
Your consent to our cookies if you continue to use this website.