A Scalable Virtual Registry Service for jGMA Matthew Grove CCGRID 2005 - WIP May 2005.

Slides:



Advertisements
Similar presentations
Southampton Open Wireless Network The Topology Talk.
Advertisements

Module 5 - Switches CCNA 3 version 3.0 Cabrillo College.
May, A Portal-based P2P System for the Distribution and Management of Large Data Sets Rahim Lakhoo (Raz) and Prof Mark Baker ACET,
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Technical Architectures
BOTNETS/Cyber Criminals  How do we stop Cyber Criminals.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
Distributed Information Systems - The Client server model
Grids and Grid Technologies for Wide-Area Distributed Computing Mark Baker, Rajkumar Buyya and Domenico Laforenza.
Internet Networking Spring 2002 Tutorial 13 Web Caching Protocols ICP, CARP.
The Architecture of Transaction Processing Systems
Jun Peng Stanford University – Department of Civil and Environmental Engineering Nov 17, 2000 DISSERTATION PROPOSAL A Software Framework for Collaborative.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
Client/Server Architectures
P2P File Sharing Systems
.NET, and Service Gateways Group members: Andre Tran, Priyanka Gangishetty, Irena Mao, Wileen Chiu.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
JGMA: A Reference Implementation of the Grid Monitoring Architecture Mat Grove Distributed Systems Group University of Portsmouth
Internet Addressing. When your computer is on the Internet, anything you do requires data to be transmitted and received. For example, when you visit.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Chapter 9: Novell NetWare
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Cloud Computing 1. Outline  Introduction  Evolution  Cloud architecture  Map reduce operation  Platform 2.
Data Management Kelly Clynes Caitlin Minteer. Agenda Globus Toolkit Basic Data Management Systems Overview of Data Management Data Movement Grid FTP Reliable.
CH2 System models.
DISTRIBUTED COMPUTING
WEB SERVICES Mahmoud Rabie – EGJUG W EB SERVICES The world before Situation Problems Solutions Motiv. for Web Services Probs. with Curr. sols. Web.
1 Apache. 2 Module - Apache ♦ Overview This module focuses on configuring and customizing Apache web server. Apache is a commonly used Hypertext Transfer.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
1 Next Few Classes Networking basics Protection & Security.
 What is intranet What is intranet  FeaturesFeatures  ArchitectureArchitecture  MeritsMerits  applicationsapplications  What is ExtranetWhat is.
1 An Advanced Hybrid Peer-to-Peer Botnet Ping Wang, Sherri Sparks, Cliff C. Zou School of Electrical Engineering & Computer Science University of Central.
Backdrop Particle Paintings created by artist Tom Kemp September Grid Information and Monitoring System using XML-RPC and Instant.
The Client/Server Database Environment Ployphan Sornsuwit KPRU Ref.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Tycho: A Resource Discovery and Messaging Framework for Distributed Applications Matthew Grove Viva Presentation, November 2006.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
© Chinese University, CSE Dept. Distributed Systems / Distributed Systems Topic 1: Characterization of Distributed & Mobile Systems Dr. Michael R.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
A Scalable Virtual Registry Service for jGMA Matthew Grove DSG Seminar 3 rd May 2005.
Tycho: A General Purpose Virtual Registry and Asynchronous Messaging System Matthew Grove ACET Invited Talk February 2006.
Towards Anonymous Communication Infrastructure There are many existing anonymous communication solutions each having advantages and disadvantages and most.
1 G52IWS: Web Services Chris Greenhalgh. 2 Contents The World Wide Web Web Services example scenario Motivations Basic Operational Model Supporting standards.
Cotter-cs431 Tanenbaum, Modern Operating Systems 3 e, (c) 2008 Prentice-Hall, Inc. All rights reserved Chapter 8 Multiple Processor Systems.
AMQP, Message Broker Babu Ram Dawadi. overview Why MOM architecture? Messaging broker like RabbitMQ in brief RabbitMQ AMQP – What is it ?
A Multifaceted Approach to Understanding the Botnet Phenomenon Aurthors: Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Publication: Internet.
Copyright 2007, Information Builders. Slide 1 iWay Web Services and WebFOCUS Consumption Michael Florkowski Information Builders.
PART1: NETWORK COMPONENTS AND TRANSMISSION MEDIUM Wired and Wireless network management 1.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
AMSA TO 4 Advanced Technology for Sensor Clouds 09 May 2012 Anabas Inc. Indiana University.
Fermilab Scientific Computing Division Fermi National Accelerator Laboratory, Batavia, Illinois, USA. Off-the-Shelf Hardware and Software DAQ Performance.
ArcGIS for Server Security: Advanced
Outline Introduction and motivation, The architecture of Tycho,
Outline Introduction. Changes made to the Tycho design from last time (June 2005). Example Tycho setup. Tycho benchmark motivations and methodology. Some.
Peer-to-peer networking
CHAPTER 3 Architectures for Distributed Systems
Storage Virtualization
Network Virtualization
Distributed Peer-to-peer Name Resolution
Pluggable Architecture for Java HPC Messaging
MPJ: A Java-based Parallel Computing System
Presentation transcript:

A Scalable Virtual Registry Service for jGMA Matthew Grove CCGRID WIP May 2005

1 Outline Introduction and motivation, The jGMA architecture, The Virtual Registry (VR), An implementation of the VR using IRC, Future work, Summary.

2 Introduction jGMA is a pure Java reference implementation of the GGF's Grid Monitoring Architecture, initially designed to be a “standards-based” messaging layer to bind together the global layer of a project called GridRM, jGMA requirements: –Compliant to the GMA specification, –Supports both non-blocking and blocking events, –Work locally over a LAN or a wide-area, such as the Internet, –Fast, and have a minimal impact on its hosts, –Scalable, –An integrated registry service, –Able to work through firewalls.

3 Design Philosophy Reuse existing software components, if possible, rather than reinvent functionality, Small and well defined API, Minimal number of other installation dependencies, Simple to install, configure and use, Provide a pluggable infrastructure with a choice to extend core functionality with a further more-sophisticated component.

4 jGMA Implementation jGMA has the following components: –A producer and consumer (shared code-base), –A Mediator which provides WAN access to producers and consumers and hooks for a distributed Virtual Registry, and debugging/monitoring. jGMA features: –Written in Java, so takes advantage of usual features and libraries, –Small API (<15 calls), –Released as single “jar” of currently 28Kbytes, –Limited dependencies: Java.

5 jGMA Architecture

6 The Mediator The Mediator replaces the PC and Registry servlets.

7 The jGMA Library and API A choice local registries, two have been implemented: Java data structure and MySQL.

8 Virtual Registry Requirements To complete the implementation jGMA requires a registry component which must: – Be scalable, – Store sufficient information to be GMA compliant, – Be secure, and prevent unauthorised access to the data, – Need minimal configuration, – Ideally have no single point of failure, – Be robust and tolerant to failures, – Efficient query routing between VRs.

9 Virtual Registry Services Core Services: –Boot-strapping: Joining the jGMA network with minimal hardwiring, –Communications: Efficient routing of queries between VR peers, –Caching: Keeping a temporary local copy of some information to reduce the amount of communications between peers. The API is designed to allow different implementations of these core services to be mixed and matched.

10 IRC VR Service The IRC VR service is an attempt at meeting the criteria of the jGMA VR by building a service which uses the mature Internet Relay Chat protocol, IRC networks have servers connected via a graph topology (attempting to efficiently route messages and provide fault tolerance), some networks manage thousands of users. Fault tolerant boot-strapping via DNS, Various degrees of security can be provided by combinations of: –Leveraging functionality built into the IRC protocol (locking the channel, private messages), –Using features of the IRC daemons such as encrypted routing for IRC messages, –Running your own IRC daemons rather than using a public network.

11 IRC VR Service Continued Each Mediator has an “IRC Bot” which connects to a chosen IRC network: –The Bot joins a channel and announces itself to other Bots, –The Bot publishes search queries to the IRC channel, –Other Bots receive the queries and pass them onto the Registry backend, –The Bots reply to the queries via a private message over IRC. All messages are routed by the IRC network.

12 IRC VR Schematic

13 IRC VR Issues / Questions Currently IRC channels are used to partition the VR by project, There needs to be other ways to reduce the impact of a ‘flood query’ on the network: –What are the limits on individual channels, is there a need to have multiple channels and route messages between them? Using IRC requires an extra port be accessible to the mediator (out going port 6667).

14 Current Status LAN (socket) and WAN (HTTP) layers complete, The initial implementation of the IRC VR is complete and functional, Demo applications and benchmarking has thoroughly tested the jGMA software, Permanent on-line demo:

15 Webcam Browser Demo

16 Future Work Short term: – Implement a generic caching service for the VR, – Write a simple P2P VR, which can be used in place of the IRC VR, – Add hooks for debugging, – Benchmark jGMA against Naradabroker. Longer term: – Provide a updated binary release of jGMA, – Develop an application or library that uses jGMA.

17 Summary jGMA is functional despite a few missing features, Current work is focusing on the implementation of the VR, The design of the jGMA architecture is complete.

18 University of Portsmouth, Members of the DSG: –Mark Baker, –Hong Ong, –Garry Smith, –Mr Boe-akis, –Aamir Shafi, –Helen Xaing. Acknowledgements

19 Project Web page: – The DSG Web page: – Links