1 Secure Dynamic Reconfiguration of Scalable Systems with Mobile Agents Fabio Kon, Binny Gill, Manish Anand, Roy Campbell, and M. Dennis Mickunas

Slides:



Advertisements
Similar presentations
Calling the Cloud: Connecting Mobile Devices to the Grid. Joel Tucci University of Tsukuba.
Advertisements

1 Towards Building Generic Grid Services Platform A component oriented approach Jeyarajan Thiyagalingam Stavros Isaiadis, Vladimir Getov Distributed and.
Kensington Oracle Edition: Open Discovery Workflow Meets Oracle 10g Professor Yike Guo.
Ubiquitous Computing and Active Spaces The Gaia Approach Fabio Kon Department of Computer Science University of São Paulo, Brazil
Next Generation Distributed Systems: The and dynamicTAO approach Fabio Kon Department of Computer Science University of São Paulo, Brazil.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 9 Distributed Systems Architectures Slide 1 1 Chapter 9 Distributed Systems Architectures.
2. Computer Clusters for Scalable Parallel Computing
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
GridRPC Sources / Credits: IRISA/IFSIC IRISA/INRIA Thierry Priol et. al papers.
1 Automatic Configuration of Component-Based Distributed Systems Ph.D. Thesis Defense Fabio Kon Advisor: Prof. Roy H. Campbell May 17, 2000.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Web-based Distributed Flexible Manufacturing System (FMS) Monitoring and Control Student: Wei Liu Instructor: Dr. Chang Apr. 23, 2003.
Distributed Systems Architectures
A brief look at CORBA. What is CORBA Common Object Request Broker Architecture developed by OMG Combine benefits of OO and distributed computing Distributed.
Terminal Bridge Extension Over Distributed Architecture MSc. Sami Saalasti.
Mobile Agents: A Key for Effective Pervasive Computing Roberto Speicys Cardoso & Fabio Kon University of São Paulo - Brazil.
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
1 Network Management Active Networks. 2 Network Management.
Connecting the Invisible Extremes of Computing David Culler U.C. Berkeley Summer Inst. on Invisible Computing July,
Ch 12 Distributed Systems Architectures
For more Lectures and Notes Visit
Systems Architecture, Fourth Edition1 Internet and Distributed Application Services Chapter 13.
1 FM Overview of Adaptation. 2 FM RAPIDware: Component-Based Design of Adaptive and Dependable Middleware Project Investigators: Philip McKinley, Kurt.
DISTRIBUTED PROCESS IMPLEMENTAION BHAVIN KANSARA.
WebQuilt and Mobile Devices: A Web Usability Testing and Analysis Tool for the Mobile Internet Tara Matthews Seattle University April 5, 2001 Faculty Mentor:
Chapter 9 Moving to Design Part 2.
MADE Mobile Agents based system for Distance Evaluation Vikram Jamwal KReSIT, IIT Bombay Guide : Prof. Sridhar Iyer.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 12 Slide 1 Distributed Systems Architectures.
Introduction to the Atlas Platform Mobile & Pervasive Computing Laboratory Department of Computer and Information Sciences and Engineering University of.
Jaeki Song ISQS6337 JAVA Lecture 16 Other Issues in Java.
1 소프트웨어공학 강좌 Chap 9. Distributed Systems Architectures - Architectural design for software that executes on more than one processor -
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
C# Overview and Features. Content I.History of C# II.Architecture III.How to install IV.Features V.Code Sample VI.Microsoft.NET Platform VII.Why use C#
Software Architecture Framework for Ubiquitous Computing Divya ChanneGowda Athrey Joshi.
IWAN 2005 November – Sophia Antipolis, France Towards the Design of an Industrial Network Node M.Chaudier, J.P Gelas, L.Lefèvre INRIA/LIP Ecole.
Lecture 3: Sun: 16/4/1435 Distributed Computing Technologies and Middleware Lecturer/ Kawther Abas CS- 492 : Distributed system.
Fundamentals of Database Chapter 7 Database Technologies.
15/06/1999HP OVUA Workshop - Bologna - Italy1 An Integrated Environment for the Management of Network Resources and Services Paolo Bellavista, Antonio.
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
Contents 1.Introduction, architecture 2.Live demonstration 3.Extensibility.
Chapter 5.4 DISTRIBUTED PROCESS IMPLEMENTAION Prepared by: Karthik V Puttaparthi
Middleware for FIs Apeego House 4B, Tardeo Rd. Mumbai Tel: Fax:
Open Service Gateway Initiative (OSGi) Reporter : 林學灝 侯承育 1.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Future Directions in Middleware Research and Technology Fabio Kon Department of Computer Science University of São Paulo, Brazil
Understanding Code Mobility A Fuggetta, G P Picco and G Vigna Presenter Samip Bararia.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Design and Implementation of Runtime Reflection in Communication Middleware: the dynamicTAO Case Manuel Román, Fabio Kon, Roy H. Campbell University of.
Monitoring, Security, and Dynamic Configuration with the dynamicTAO Reflective ORB Fabio Kon, Manuel Roman, Ping Liu, Jina Mao, Tomonori Yamane, Luiz C.
ICMC 2004 – Nov. 5 1 Andante: Composition and Performance with Mobile Musical Agents Leo Kazuhiro Ueda Fabio Kon
Mobile Agents For Mobile Computing Department Of Computer Science – Dartmouth College Robert Gray David Kotz Saurab Nog Daniela Rus George Cybenko.
Software Deployment and Mobility. Introduction Deployment is the placing of software on the hardware where it is supposed to run. Redeployment / migration.
Cherubim Dynamic Security System Roy Campbell and Denny Mickunas Tin Qian, Vijay Raghavan, Tim Fraser, Chuck Willis, Zhaoyu Liu Department of Computer.
1 My Dream of Jini Fabio Kon Jalal Al-Muhtadi Roy Campbell M. Dennis Mickunas Department of Computer Science University of Illinois at.
Institute for Visualization and Perception Research 1 © Copyright 1999 Haim Levkowitz Java-based mobile agents.
Features Of SQL Server 2000: 1. Internet Integration: SQL Server 2000 works with other products to form a stable and secure data store for internet and.
Gaia An Infrastructure for Active Spaces Prof. Klara Nahrstedt Prof. David Kriegman Prof. Dennis Mickunas
Summer School on Telecommunications Lappeenranta August Calypso: System Components and Tools for Media Distribution over Broadband Networks Calypso:
Chapter 12: Architecture
Virtual Private Networks
Supporting Mobile Collaboration with Service-Oriented Mobile Units
An Introduction to Computer Networking
Distributed Systems Bina Ramamurthy 11/30/2018 B.Ramamurthy.
Distributed Systems Bina Ramamurthy 12/2/2018 B.Ramamurthy.
Chapter 12: Physical Architecture Layer Design
3rd Studierstube Workshop TU Wien
Instructor: Mort Anvari
A lighttwiht reconfigurable security mechanism for 3G/4G mobile devices 2019/7/1 A Lightweight reconfigurable security mechanism for 3G/4G mobile devices.
Presentation transcript:

1 Secure Dynamic Reconfiguration of Scalable Systems with Mobile Agents Fabio Kon, Binny Gill, Manish Anand, Roy Campbell, and M. Dennis Mickunas Department of Computer Science University of Illinois at Urbana-Champaign

2 Introduction Network-Centric Operating System: l Facilitate management in modern computing environments l Heterogeneity: embedded sys., PDAs, laptops, workstations l Dynamism: rapid software evolution, mobile users & computers l GOAL: l Facilitate management by building a middleware-level operating system on top of this heterogeneous world

3 2K Research l Automatic Configuration l based on component prerequisites l Dynamic Reconfiguration l based on component configurators l QoS-aware Resource Management l Security Service l User Environment Service l Data Management Service l Mobile Reconfiguration Agents

4 Motivation l Scope of Internet services is expanding: l e-commerce, banking, news, distance learning, medical applications, active spaces. l Basic requirements: l Scalability l Availability l Software evolution brings an additional requirement: l Dynamic Reconfiguration

5 Dynamic Reconfiguration l Dynamic Reconfiguration is required for 1. changing system parameters at runtime 2. replacing components at runtime: l fixing bugs l updating functionality l adaptation to changes in the environment l Challenge: integrate 3 conflicting requirements (scalability, availability, and dynamic reconfiguration) l Solution: mobile reconfiguration agents

6 Our Approach l 2K services and applications are built on top of the CORBA standard middleware. l But, traditional CORBA was not very flexible. l We created dynamicTAO, a reflective CORBA ORB that supports: l inspection of dynamic software architecture l dynamic reconfiguration of software architecture

7 dynamicTAO l reflective capabilities can be used to l reconfigure the ORB internals, l reconfigure applications that run on top of the ORB. l Our infrastructure for mobile reconfiguration agents is implemented inside dynamicTAO. l So, it is available to any 2K service and application.

8 The 2K Architecture

9 The dynamicTAO Framework

10 Mobile Agents l A mobile agent visits a collection of ORBs. l In each ORB along its path, it can l install new components on the disk, l dynamically link new components, l inspect the state and configuration of the ORB and the applications on top of it, l reconfigure ORBs and applications.

11 A Flexible Framework l Different NetworkBrokers support different agent flavors. For example: l simple, lightweight, script-based agents (carrying data and DCP commands only). l powerful, heavyweight, Java-based agents (carrying data, bytecode, and dynamic state, taking autonomous decisions). l Simple agents are suitable for PDAs, embedded systems.

12 Reconfiguration with Mobile Agents l SysAdmins use a GUI to build agents for l reconfiguration l inspection l GUI is used to 1. Build distribution graph 2. Select reconfiguration and inspection commands 3. Visualize results.

13 Security l SecureAgentBroker uses the GSS-API and supports Role-Based Access Control. l Agents are signed and transmitted via secure connections, using encryption. l RBAC is used in each ORB to decide which commands each agent is allowed to perform.

14 The SecureAgentBroker

15 Experimental Results l Testbed: l Three Ultra Sparcs, Solaris l Three 333MHz PCs, Linux l Three 300MHz PCs, Linux l 100Mbps Fast Ethernet (intra-domain) l Public Internet (inter-domain)

16 Mobile Agents vs. Conventional Client/Server

17 Point-to-Point vs. Distribution Tree

18 Uploading a New Component to 9 Nodes

19 Related Work l Our work was influenced by previous research on: l mobile agent infrastructures l dynamic reconfiguration of distributed systems l object-oriented frameworks l security l Our main contribution was to show how to combine all these results in an integrated architecture.

20 Future Work l Support for fault-tolerance: l fault-recovery when part of the reconfiguration process fails within a node l fault-recovery when the reconfiguration fails in part of the distributed system l New implementation of Java reconfiguration agents based on one of the existing infrastructures. l Deploying agents for reconfiguration of active spaces.

21 Conclusions l Mobile agents is an effective mechanism for reconfiguration of distributed systems, combining scalability and availability with dynamic reconfiguration. l A framework enabling different agent flavors is important for taking agents to devices with limited resources (e.g.PDAs).

22 How to contact us 2K Web site:

23 Reconfiguration Agents l Code uploading example: upload_impl Connection UDPCon load_impl Connection UDPCon hook_impl >Connection Reflector UDPConnection l Reconfiguration example: configure_impl Reflector “MAX_NUM_CLIENTS=200”

24 Accessing the ORB Reconfiguration Interface 1. Local or remote code through IDL 2. Telnet 3. Java GUI 4. Reconfiguration Agents

25 DOCTOR D ynamic O RB C onfiguration T ool