Some Open Problems in Publish/Subscribe Networking David S. Rosenblum Chief Technology Officer PreCache Inc.

Slides:



Advertisements
Similar presentations
SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
Advertisements

Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Network Resource Broker for IPTV in Cloud Computing Lei Liang, Dan He University of Surrey, UK OGF 27, G2C Workshop 15 Oct 2009 Banff,
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004.
Efficient Event-based Resource Discovery Wei Yan*, Songlin Hu*, Vinod Muthusamy +, Hans-Arno Jacobsen +, Li Zha* * Chinese Academy of Sciences, Beijing.
Content Centric Networking in Tactical and Emergency MANETs Soon Y. Oh, Davide Lau, and Mario Gerla Computer Science Department University of California,
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
1 Content Delivery Networks iBAND2 May 24, 1999 Dave Farber CTO Sandpiper Networks, Inc.
Extensible Networking Platform IWAN 2005 Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
1 Improving the Performance of Distributed Applications Using Active Networks Mohamed M. Hefeeda 4/28/1999.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
IS Network and Telecommunications Risks
FeedTree: Sharing Web Micronews with Peer-to-Peer Event Notification D. Sandler, A. Mislove, A. Post, P. Druschel Presented by: Andrew Sutton.
CSE 190: Internet E-Commerce Lecture 16: Performance.
Carnegie Mellon University Complex queries in distributed publish- subscribe systems Ashwin R. Bharambe, Justin Weisz and Srinivasan Seshan.
Software Engineering and Middleware: a Roadmap by Wolfgang Emmerich Ebru Dincel Sahitya Gupta.
Design and Evaluation of a Wide-Area Event Notification Service Antonio Carzaniga David S. Rosenblum Alexander L. Wolf.
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
Copyright ©2009 Opher Etzion Event Processing Course Engineering and implementation considerations (related to chapter 10)
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
UNCLASSIFIED – APPROVED FOR PUBLIC RELEASEUNCLASSIFIED Architectures for Mobile Wireless Publish/Subscribe Networks David S. Rosenblum Chief Technology.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Microsoft ® Application Virtualization 4.5 Infrastructure Planning and Design Series.
Web 3.0 or The Semantic Web By: Konrad Sit CCT355 November 21 st 2011.
1 Enabling Secure Internet Access with ISA Server.
Barracuda Load Balancer Server Availability and Scalability.
Word Wide Cache Distributed Caching for the Distributed Enterprise.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
CH2 System models.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Content-Based Routing in Mobile Ad Hoc Networks Milenko Petrovic, Vinod Muthusamy, Hans-Arno Jacobsen University of Toronto July 18, 2005 MobiQuitous 2005.
A novel approach of gateway selection and placement in cellular Wi-Fi system Presented By Rajesh Prasad.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
1 Emergency Alerts as RSS Feeds with Interdomain Authorization Filippo Gioachin 1, Ravinder Shankesi 1, Michael J. May 1,2, Carl A. Gunter 1, Wook Shin.
Internet2 Spring 2004.pptApril 2004 Napster University Program Elements of Success W. Pence Chief Technology Officer Napster LLC.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Internet Protocol TeleVision
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Chapter 13: LAN Maintenance. Documentation Document your LAN so that you have a record of equipment location and configuration. Documentation should include.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Wavetrix Changing the Paradigm: Remote Access Using Outbound Connections Remote Monitoring, Control & Automation Orlando, FL October 6, 2005.
Internet2 Spring 2004.pptApril 2004 Napster University Program Elements of Success W. Pence Chief Technology Officer Napster LLC.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
IPS Infrastructure Technological Overview of Work Done.
Networking Components Assignment 3 Corbin Watkins.
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Communication Protocol Engineering Lab. VANET-cloud : a generic cloud computing model for vehicular ad hoc networks IEEE Wireless Communications February.
INTERNET PROTOCOL TELEVISION (IP-TV)
Chapter 1: Explore the Network
DISA Cyclops Program.
Principles of Network Applications
INTELLIGENT CONTENT For Your Knowledge Intensive Enterprise
Emitter: Scalable, fast and secure pub/sub in Go
INTERNET PROTOCOL TELEVISION (IP-TV)
IS4680 Security Auditing for Compliance
Goals Introduce the Windows Server 2003 family of operating systems
Data-Centric Networking
SIENA: Wide-Area Event Notification Service
Distributed Systems and Algorithms
Presentation transcript:

Some Open Problems in Publish/Subscribe Networking David S. Rosenblum Chief Technology Officer PreCache Inc.

Acknowledgments Alexander L. Wolf  University of Colorado at Boulder Antonio Carzaniga  University of Colorado at Boulder PreCache Engineering Team

Background

Information-Centric Internet Applications Software and Antivirus Updates Consumer Alerts Location-Based Services for Mobile Wireless Multiplayer Online Games Web Search Engines e-Business (e.g., Supply Chain Mgmt) Distributed Sensor Networks Publish/subscribe is a natural fit!

Publish/Subscribe Networking Publish/subscribe is traditionally implemented by centralized servers But server-based realizations do not scale to Internet-wide applications So existing networks require “faking it”  Request/response interaction  Continual subscriber polling  Enormous server farms  Dumb caching And so we must realize publish/subscribe via a distributed network of routers

S IENA Content-Based Routing Subscription Forwarding a s1s1 s1:a s1:1 s1:2 s1:3 s1:2 s1:6 s1:3 s1:1 s1:5

S IENA Content-Based Routing Subscription Merging s1:1 s1:2 s1:6 s1:3 s1:1 s2s2 b s1:3 s1:2 s1:5 s1:1 s2:5 s1:1 s2:5 s1:2 s2:8 s1:2 s2:8 s1:5 s2:b s1:5 s2:b a s 1 covers s 2 1 s1:a s2:2 s1:a s2:2

S IENA Content-Based Routing Notification Delivery b s1:1 s2:5 s1:1 s2:5 s1:2 s1:6 s1:3 s1:1 s1:3 s1:2 s2:8 s1:2 s2:8 a s1:a s2:2 s1:a s2:2 s1:5 s2:b s1:5 s2:b n 1 matches s 1 n 1 matches s 2 n1n1

PreCache N ET I NJECTOR Architecture = Routing Engine= Channel Manager Internet Publisher Subscriber = Event Agent

PreCache N ET I NJECTOR Routing and forwarding based on S IENA  Generalize idea of subscription merging Compute single subscription covering all received subscriptions  Employ approximate matching Constant time and space complexity Log time and space with additional leakage reduction Channel services  Namespace management  Resource allocation  Load balancing, fault tolerance, authentication

Open Problems

Comments on the Problems Problems identified based on experience with N ET I NJECTOR and S IENA Many of the problems arise because of a desire for scalability Some problems are deeply technical Other problems are simply pragmatic

Problem Wireless Mobile Devices (WMDs?) a s1:a s1:1 s1:2 s1:3 s1:2 s1:6 s1:3 s1:1 s1:5 a

Problem Issues with Wireless Mobile Devices Caching notifications in the network Stream reconstruction and duplicate suppression Frequency of movement versus overhead of reconfiguration Gateways for , SMS, etc.

Problem Security Traditional security properties are address-based  Example: Authentication Bob wants to make sure Alice sent the message  Content-based analog Bob wants to make sure a message represents reality Pub/sub admits new kinds of vulnerabilities  Example: Denial of Service Highly generic subscription (“Price > 0”) causes flood of notifications to subscriber  How do you distinguish a malicious subscriber from a greedy subscriber? How do you do content-based routing when the content is encrypted???

Problem Client Connections and Firewalls Want constant connection between subscriber and edge router  Otherwise subscriber polls for notifications  Connections limits may require multiplexing Client must initiate connection to edge router in order to breach firewall And if port 80 is the only open port …  Need HTTP encapsulation of messages  May need HTML formatting of messages  Routers need to multiplex and/or demultiplex message traffic

Problem Approximate Matching Rationale: High-performance routing  Expect approximate matching to have better time/space complexity than exact matching Approximation must be conservative  False positives OK, false negatives not  Must still perform exact match at some point before delivery to subscriber Leakage may increase traffic  Tradeoff in computational resources We need simulation tools to explore this!

Problem Optimizing for Traffic Variations Can routers dynamically optimize for traffic variations? Example: The Brittany Spears Effect  All subscribers want certain notifications N 1  Few subscribers want other notifications N 2  N 1 notifications may flood network Example: The Google Effect  Certain subscribers S 1 want all notifications  Other subscribers S 2 want few notifications  S 1 subscriptions may dominate routing We need simulation tools to explore this!

Problem Service-Provider Deployment Difficult to convince network service providers to enhance their networks with publish/subscribe  Application demand not yet critical  Lack of standards Economic barriers govern router design  Example: 100M users, $10K/router 1000 users/router: 100K routers, $1G outlay 100 routers: $1M outlay, 1M users/router

Problem Peer-to-Peer Deployment Reasonable alternative to service-provider deployment  “Grass roots” generation of demand Challenges  Dynamically aligning peer topology to underlying network topology  Dynamically partitioning routing responsibilities across peers  Ensuring reliability, privacy and/or integrity of messages

Problem Unicast Fanout at Edge Routers Example: 100M users on 1K routers  100K users per router  10Kbyte notification >80 milliseconds over OC-192 >80 seconds over 10Mb Ethernet >4 hours over 56K modem Idea: Use publish/subscribe for “leveling”  Partition users into classes Example: Last digit of serial number  Publish once per class  Tune publication rate to available bandwidth and SLA

Conclusion

Many Internet applications naturally require publish/subscribe messaging Scalability can be achieved through publish/subscribe networking S IENA, PreCache, and others have established many fundamental results But many open problems remain to be solved