Crisis Resilient Architecture Graeme Burnett Apr 2005.

Slides:



Advertisements
Similar presentations
Computer Concepts – Illustrated 8th edition
Advertisements

1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
Chapter 14 Intranets & Extranets. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES Introduction Technical Infrastructure Planning an Intranet.
Chapter 1: The Database Environment
Distributed Systems Architectures
Chapter 10 Architectural Design.
Andrew Dolan Markets and Banking Technology May-07 Enterprise Grid at Citi Grids Mean Business.
18 Copyright © 2005, Oracle. All rights reserved. Distributing Modular Applications: Introduction to Web Services.
Overview Environment for Internet database connectivity
MOSS ADAMS LLP | 1 W HAT I S S ENSITIVE D ATA ? Whats the Risk and What Do We Do About It? Weston Nelson Steve Fineberg Steven Gin.
Hello i am so and so, title/role and a little background on myself (i.e. former microsoft employee or anything interesting) set context for what going.
Our Digital World Second Edition
Network Systems Sales LLC
Configuration management
Software change management
© 2010 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks of Invensys.
Chapter 1: Introduction to Scaling Networks
1 The phone in the cloud Utilizing resources hosted anywhere Claes Nilsson.
The Platform as a Service Model for Networking Eric Keller, Jennifer Rexford Princeton University INM/WREN 2010.
Policy based Cloud Services on a VCL platform Karuna P Joshi, Yelena Yesha, Tim Finin, Anupam Joshi University of Maryland, Baltimore County.
Strategic Meetings Management 101
Whats New in Microsoft Office 365 Module 01 | Daniel Sierra | Account Technology Strategist Microsoft Education México.
Distributed Processing, Client/Server and Clusters
Presentation by Priyanka Sawarkar
Database System Concepts and Architecture
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
CA's Management Database (MDB): The EITM Foundation -WO108SN.
Thanks to Microsoft Azure’s Scalability, BA Minds Delivers a Cost-Effective CRM Solution to Small and Medium-Sized Enterprises in Latin America MICROSOFT.
1 Chapter 11: Data Centre Administration Objectives Data Centre Structure Data Centre Structure Data Centre Administration Data Centre Administration Data.
Chapter 13 The Data Warehouse
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 2.
The Top 10 Reasons Why Federated Can’t Succeed And Why it Will Anyway.
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
Adding scalability to legacy PHP web applications Overview Mario A. Valdez-Ramirez.
® IBM India Research Lab © 2006 IBM Corporation Challenges in Building a Strategic Information Integration Infrastructure Mukesh Mohania IBM India Research.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Establishing the overall structure of a software system
Virtualization Lab 3 – Virtualization Fall 2012 CSCI 6303 Principles of I.T.
Storage and data services eIRG Workshop Amsterdam Dr. ir. A. Osseyran Managing director SARA
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
Techcello Provides SaaS Lifecycle Management Solution to “SaaS-ify” Your Application Efficiently on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Actualog Social PIM Helps Companies to Manage and Share Product Information Using Secure, Scalable Ease of Microsoft Azure MICROSOFT AZURE ISV PROFILE:
Corent’s SurPaaS Transforms Your Software into Scalable SaaS on Windows Azure – in Days! COMPANY PROFILE: CORENT TECHNOLOGY INC. Corent’s SurPaaS is a.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
Zentera Guardia Fabric ™ Securely Connects Client-Server Apps between Microsoft Azure, Enterprise Datacenters & Other Public Clouds MICROSOFT AZURE ISV.
Slide 1 Chapter 8 Architectural Design. Slide 2 Topics covered l System structuring l Control models l Modular decomposition l Domain-specific architectures.
Towards a High Performance Extensible Grid Architecture Klaus Krauter Muthucumaru Maheswaran {krauter,
Chapter 6: Securing the Cloud
COMPANY PROFILE: CORENT TECHNOLOGY INC.
Crisis Resilient Architecture
Partner Logo Veropath Offers a Next-Gen Expense Management SaaS Technology Solution, Built Specifically to Harness Big Data Analytics Capabilities in Azure.
Free Cloud Management Portal for Microsoft Azure Empowers Enterprise Users to Govern Their Cloud Spending and Optimize Cloud Usage and Planning MICROSOFT.
Cloud Computing.
Built on the Powerful Microsoft Azure Platform, Lievestro Delivers Care Information, Capacity Management Solutions to Hospitals, Medical Field MICROSOFT.
Take Control of Insurance Product Management: Build, Test, and Launch Any Product Globally 10x Faster, 10x More Cheaply with INSTANDA on Azure Partner.
Be Better: Achieve Customer Service Excellence and Create a Lean RMA and Returns Process with Renewity RMA and the Power of Microsoft Azure MICROSOFT AZURE.
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
On-Premises, or Deployed in a Hybrid Environment
DeFacto Planning on the Powerful Microsoft Azure Platform Puts the Power of Intelligent and Timely Planning at Any Business Manager’s Fingertips Partner.
Data Security for Microsoft Azure
Excelian Grid as a Service Offers Compute Power for a Variety of Scenarios, with Infrastructure on Microsoft Azure and Costs Aligned to Actual Use MICROSOFT.
CloneManager® Helps Users Harness the Power of Microsoft Azure to Clone and Migrate Systems into the Cloud Cost-Effectively and Securely MICROSOFT AZURE.
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Media365 Portal by Ctrl365 is Powered by Azure and Enables Easy and Seamless Dissemination of Video for Enhanced B2C and B2B Communication MICROSOFT AZURE.
Abiquo’s Hybrid Cloud Management Solution Helps Enterprises Maximise the Full Potential of the Microsoft Azure Platform MICROSOFT AZURE ISV PROFILE: ABIQUO.
Cloud computing mechanisms
TEMPLATE NOTES Our datasheet and mini-case study templates are formatted specifically for consistency of branding at Microsoft. Please do not alter font.
Single Cell’s Progenitor Powered by Microsoft Azure Improves Organisational Efficiency with Strategic Procurement, Contract Management, and Analytics MICROSOFT.
Presentation transcript:

Crisis Resilient Architecture Graeme Burnett Apr 2005

2 Crisis Resilient Architecture - Quad Chart Schedule New Ideas Impact High Performance Data Infrastructure Resilient, Recoverable Applications Funded Open Source Development Web Service Marketplaces Anonymous applications Dynamic re-branding Infrastructure Independent Application Performance Task-based market delivering variable SLA Knowledge Management Approach to Technology Strategy High Performance Applications Highly Available Applications Increased Security Reduced Cost Variable SLAs Effective software and people outsourcing Business Aligned Strategy Mobile Data Mobile Applications Cryptoplumbing Web Services HAG Cots Hardware HDF5 Open Source Dynamic Re- randing Task Based Markets KM Strategy High Perf Data Infra Web Service Markets Anonymous Apps OS Dev COTS Hardware E Contracts

3 Crisis Resilient Architecture Technology Strategy A rationale of why how we got where we are and how to improve our capability

4 Strategy Driven by Industry Marketing Sales-lifecycle used to derive application, data and security strategy leading to piecemeal, vendor specific solutions. Enterprise Infrastructure Components Application Servers, Enterprise Middleware, Portal Engines etc. Often underused TCO as an effective model IT Over-Governance Difficult to introduce new products. Heavy handed change control by outsourced platform management thwarting business needs Technically Poor Solutions: Blade technology – configuration overhead, small memory footprint, one network card per cabinet Centralised Data Centres – physical security threats. They fill up. Enterprise Class Storage – poor scalability, expensive, slow. Generic, complex, high-cost, manufacturer lock-in, technological mediocrity Designed to suit Manufacturers capability model Technology Strategy Landscape

5 KM Driven Technology Strategy Collaborative Community Software Chat: Communities/themes of interest, intra-team communication, social capital Blogs: knowledge capture, dissemination, categorisation and persistence Knowledge Management Identifying organisationally important themes – Role Categorisation, activity monitoring, community reputation. Legitimisation of themes – Management endorsement – assignment of resources Transforming tacit knowledge to explicit knowledge – Community Wiki – Blogsphere Strategic Lifecycle – Feeding the strategic pipeline – Business-aligned, technology balanced strategy – Programme/Project identification

6 Current Application Architecture Were Still in the age of Client-Server Complex technologies - have they delivered? - ORBs, EJB, Object DB XML misunderstood - edge connectivity/co-ordination only please Language Wars Who cares? TCO again should be the guide. Methodologies RUP/MDA/UML/XMI - vendor driven methodology soup Everything belongs in a database Not all data is record orientated DSS queries poorly catered for Waterfall development predominates Long delivery cycles - 85% complete projects Outsourcing magnifies the problems - no pain/all gain Security is an afterthought Developers still live in a green zone

7 Current Data Architecture Data Architecture Over Engineering Dominated by expensive, poorly performing hardware orientated solutions Lack of knowledge as to data usage/application performance requirements. Fixed Data Bandwidth – Different applications need different bandwidth. One size does not fit all Centralised Data Centres Huge power and cooling requirements – Limited Fuel Supply Vulnerable to physical attack – Data unavailability due to human error – Unknown EMP resistance – Failure of connectivity Fixed Capacity - castle wall syndrome Diffusion is the answer

8 Current Security Architecture Physical Security Largely ignored in security risk assessments De-Militarised Zone Approach Ideal for protocol containment but fails to deal with application specific payload. Failure of PKI Key management issues unresolved, root CA compromises, real-time revocation. Largely relegated to green zone single sign-on solutions Penetration Testing is point in time security IDS Complexity Technology complexity, signals analysis a heuristic process. Network protocol specific, devoid of application syntax and semantics. Centralised Data Centres Centralised data means centralised risk. Extreme risk events would render business continuity planning ineffective. Huge energy requirements (15MWh, 5MWh of which is cooling)

9 Current Security Architecture cont. Risk Assessment Post design rubber stamp for the regulators? Often tacit advice given Security Architecture Patterns Pre-risk assessed architectural components or patterns enabling rapid development of secure, compliant applications

10 Crisis Resilient Architecture Data Architecture Turning the real into virtual Esther Dyson et al

11 Data Depth Perspective The World Produced in 1999 [1] : 1.5 exabytes (2 60) of storable content billion gigabytes 250 megabytes for every man, woman, and child on earth. Printed documents of all kinds make up only.003 percent of the total. Magnetic storage is by far the largest medium for storing information and is the most rapidly growing Shipped hard-drive capacity doubling every year. Amount of human generated content - 5TB Financial Market Data LSE Basic set currently is 14GB for 2 Years (stock, shares, price, bid, ask, flags) New Requirements: Market Depth + News + Traffic Analysis +VWAP + Volatilities etc RFID Millions of raw events which need to be stored

12 Data Architecture Tier 1 - Master Data Sets Enterprise grade persistence Satisfy Data Retention Regulations: – Gramm-Leach-Bliley - security and confidentiality – Sarbanes-Oxley - the need for data retention I/O profile per data set to suit predefined SLA Tier 2 - Derived Regional Data sets Geo-legislative Data Partitioning Tier 3 - Divisional/Departmental Data Sets Reduced infrastructure requirements Forward Caching - data near point of consumption Dataset Enrichment - pattern recognition, aggregation, data set generation Tier 4 - Workstation Spare-cycle computing Specialist enrichment

13 Data Topography

14 Data Discovery Ontologies An ontology is a conceptual model about some domain Relationships that hold between them Characteristics of data Data set Description using Protégé and OWL XML/RDF Metadata Can forward generate Database and XML Schemas Data Classification WEKA - data classification suite written in Java Pattern Recognition News analysis Envelope/Outlier analysis

15 HDF5 - The Big Idea For IT Management Infrastructure Independence - Data Delivery by Configuration Parallel Data Delivery Configurable To Individual Data Set Granularity Limitless Data Storage Optimised Data Storage – Szip compression minimises disk usage/maximises revenue Suited to heterogeneous environment – Virtual File Layer (VFL) ported to many platforms A Solution to the ever growing Data Storage Issue For Security Architects Diffusion and redundancy of data sets becomes an option For Software Architects Potential to capture limitless market depth and generate limitless analytical models Arbitrary precision, multidimensional and user defined data sets Toolkits in many flavours, C, Java, Perl High performance data access – Statistical analysis, 3 D visualisation and pattern recognition become a reality

16 HDF5 Feature Overview HDF5 File Format Public Domain, pioneered by the nuclear science community Robust, mature, standards driven Scalable Data Delivery, Efficient Storage, Data Transformation Virtual file Layer supports chunked data sets Raw, Standard, Parallel and Networked I/O Bandwidth configurable per data set Data type and spatial transforms of data or subsets during I/O Szip - high performance compression/decompression Infrastructure agnostic Metadata approach No specialised hardware required Suitable for distributed/lightweight architectures: Grid, COTS

17 Cryptoplumbing Leased Line Connectivity Six-week lead time for installation Seldom encrypted Vulnerable to disruption Virtual Leased Lines - stunnel, FreeS/WAN Instant connectivity Instant revocation Manually managed certificates Point-to-point/socket-to-socket encryption Application Security Legacy applications can be secured by local proxy – Secure – Endpoint extension from server to client

18 Crisis Resilient Architecture Web Services Anywhere in the world is but 65ms away by propagation delay - the rest is caching

19 The Problem with Web Services Web Services == Distributed Computing Distributed Computing == Federated Responsibility Federated Responsibility == Unreliability Distributed Failure Dependency on service availability Autonomic Computing offers platform/solution specific answer Web Services is not only XML XML is only suitable for edge connectivity between federated systems Message Orientated Communication TCP/IP Architecture is the basis of all web communication All high performance architecture is based on IP communication for speed with TCP for control Service Orientated Architecture A marketing term for network programming with application specific protocols layered above Design decisions: lightweight Interface with huge ontology versus huge API

20 Crisis Resilient Web Services Hierarchical Community Maintained Service Ontology Community maintained, versioned, web service interfaces Reputation-based Market place Quality of service enabling autonomic computing whilst delivering regulatory compliance Electronic Payments Fund Open Source Development Viable funding for open source developers Peered Service Provision Service forward caching Dynamic rebranding Self Healing Applications Ability to source alternative services from the market in realtime Anonymous Applications Anonymising proxies deliver applications composed of community based web services paid for by anonymous electronic cash. Per-service Security Policy and HAG model Pre-defined as part of the contract

21 Mobile Code Models Call or Buy Web Services A Web Service could be source or executable code Dynamically compiled or loaded Embedded in an electronic contract Could be analysed for vulnerabilities before execution Lightweight trust - reputation is all External communication mediated by a HAG for billing/service call Sensitive data sets Data De-aggregation - data sets splayed to N services Black hole execution - code and data enter - results leave. Obfuscation by HAG - geolegislative pseudonymity Web Service Pipelining - data is pipelined between services

22 Economic model for COTS Web Services Economic Web Service Development Lifecycle Web services can be developed by anyone, anywhere, anytime Market differentiated on reputation, performance and platform Electronic/Paper Contracts for accountability Revenue collection: – bearer electronic cash, traditional electronic payments Revenue Models One shot, Fixed term or Lifetime usage Floor/Ceiling/Stepped usage Grade of Service to suit Regulatory Requirements Characteristics of data

23 HAGS - High Assurance Guards Precise Syntactic and Semantic Communication Profile A HAG is associated with a class of web service What makes HAGs possible now? – OWL - semantic ontologies – BPML et al - business process markup lanaguages Application Firewall and IDS XML filtering Semantic Attack Defence Linked to business process Slow scan attacks Covert channel closure Additional Features: Geolegislative Transformation Payment and usage information Electronic capture and negotiation Regulatory Compliance

24 Crisis Resilient Architecture Hardware Infrastructure Order out of Chaos

25 Secure Hosting Physically Secure Infrastructure Hardened Nuclear Grade Facility - e.g. Multiple Connectivity Faraday cage 3 months fuel supply Master/Regional data set storage Vulnerabilities Well-known location - safe harbour in times of crisis High-energy EMP weapons Operational personnel failure Current Patterns MANs - do they really address crisis situations? Alternatives Pervasive redundant diffusion - e.g. oceanstore Microhosting

26 Microhosting Data is Mobile - Not All Data Needs Enterprise Class Persistence HDF5 makes it easy to forward cache static/reference data calved from master data sets – Regional/Divisional/Departmental/Workgroup Torrents deliver data in usertime whilst providing diffusion Real-time computational derivation using FPGAs and/or calculation farms Reduced cost whilst maintaining regulatory compliance Micro-hosting Software chooses the most appropriate execution environment and marshals data accordingly Each site operational has low cost COTS nodes, minimal cooling, energy footprint up to 15KW, multiple network connections. KNURR Secure 10/20KW Water cooled cabinets located across infrastructure [2]

27 COTS Hardware Lightweight Infrastructure Using COTS Components Pattern Recognition/DSS Node - ~$25,000 for 24TB JBOD Node – Sparse Data Analysis Analytics/HDF5 node $2700 – Data delivery, computation Throwaway nodes - reduced hosting costs

28 Mobile Mesh Networks Mobile adhoc networking allows users to exchange information in a wireless environment without the need for a fixed infrastructure. Decentralised Infrastructure COTS Hardware/Homebrew Antennas Limited Expertise Required to configure Avoids a central point of failure and control Extremely Low Power Requirements Enables Instant VoIP networks Self-Healing UWB Low power Low cost, High data rates 10m) Precise positioning capability No interference Passes through Buildings

29 Crisis Resilient Architecture The Crisis Desktop Turn the real into virtual Esther Dyson et al c 1999

30 The Crisis Desktop Bootable Operating System Images with Custom Toolkits Work from any computer Qemu - multiple OS, command line OS image booting Knoppix - read-only OS image – Quantian - Quantitative Workbench – The Coroners Toolkit - forensics Portable Storage 4GB USB 2.0 Devices 300GB Portable hard drives Web-based file storage Multiple providers offering 30-1GB for modest outlay Online-data libraries Custom data set order and delivery Instant Cluster Software OpenMosix - Instant Cluster using remote network boot using PXE, DHCP and tftp to boot linux clients via the network. Autodiscovery - new nodes automatically join the cluster Data delivery P2P - torrents, gridella

31 References [1] How Much Storage is Enough? pid=45 pid=45 [2] Knurr 10/20KW Water-cooled Environments