July 14, 2006 1 KIMICS 2006 Kulveer Singh Graduate School of Design & IT Dongseo University Busan, South Korea Data Concurrency Issues in iSCSI Based-Data.

Slides:



Advertisements
Similar presentations
Chapter 17 Networking Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
Advertisements

Dr. Kalpakis CMSC 621, Advanced Operating Systems. Fall 2003 URL: Distributed System Architectures.
Chapter 5 standards for multimedia communications
1 Semester 2 Module 4 Learning about Other Devices Yuda college of business James Chen
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
IP –Based SAN extensions and Performance Thao Pham CS 622 Fall 07.
Socket Programming.
Shadow Configurations: A Network Management Primitive Richard Alimi, Ye Wang, Y. Richard Yang Laboratory of Networked Systems Yale University.
Protocols and the TCP/IP Suite Chapter 4 (Stallings Book)
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Protocols and the TCP/IP Suite
ISCSI Performance Experiments Li Yin EECS Department U.C.Berkeley.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Chapter 9 Overview  Reasons to monitor SQL Server  Performance Monitoring and Tuning  Tools for Monitoring SQL Server  Common Monitoring and Tuning.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
File Systems (2). Readings r Silbershatz et al: 11.8.
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
CS 356 Systems Security Spring Dr. Indrajit Ray
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Chapter 17 Networking Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Presentation on Osi & TCP/IP MODEL
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
The Internet model consists of _______ layers.
Redes Inalámbricas Máster Ingeniería de Computadores 2008/2009 Tema 7.- CASTADIVA PROJECT Performance Evaluation of a MANET architecture.
Chapter 6: Packet Filtering
DNS (Domain Name System) Protocol On the Internet, the DNS associates various sorts of information with domain names. A domain name is a meaningful and.
12/12/2008 Summers - SAiSCSI 1 Secure Asymmetric iSCSI For Online Storage Sarah A. Summers.
Protocols and the TCP/IP Suite
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
TCP/IP Yang Wang Professor: M.ANVARI.
Design and Implementation of a Linux SCSI Target for Storage Area Networks Ashish A. PalekarAnshul Chaddha, Trebia Networks Narendran Ganapathy, 33 Nagog.
Slide 1 DESIGN, IMPLEMENTATION, AND PERFORMANCE ANALYSIS OF THE ISCSI PROTOCOL FOR SCSI OVER TCP/IP By Anshul Chadda (Trebia Networks)-Speaker Ashish Palekar.
Examining TCP/IP.
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
Computer Networks (CS 132/EECS148) General Networking Example Karim El Defrawy Donald Bren School of Information and Computer Science University of California.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Lesson 5—Networking BASICS1 Networking BASICS Protocols and Network Software Unit 2 Lesson 5.
Prepared by: Azara Prakash L.. Contents:-  Data Transmission  Introduction  Socket Description  Data Flow Diagram  Module Design Specification.
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
GLOBAL EDGE SOFTWERE LTD1 R EMOTE F ILE S HARING - Ardhanareesh Aradhyamath.
IATA Kulveer Singh
SIMULATION OF MULTIPROCESSOR SYSTEM AND NETWORK Manish Patel Nov 8 th 2004 Advisor: Dr. Chung-E-Wang Department of Computer Science California State University,
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
1 A Scalable Distributed Data Management System for ATLAS David Cameron CERN CHEP 2006 Mumbai, India.
- 1 - DPNM Review of Important Networking Concepts J. Won-Ki Hong Dept. of Computer Science and Engineering POSTECH Tel:
Spring Ch 17 Internetworking Concepts, Architecture, and Protocols Part III Internetworking.
Protocols and the TCP/IP Suite
Gijeong Kim ,Junho Kim ,Sungwon Lee Kyunghee University
OSI model vs. TCP/IP MODEL
Distributed Systems.
SAN (Extension Protocol & Protocol Stack)
Network Architecture Introductory material
Lec 5 Layers Computer Networks Al-Mustansiryah University
Direct Attached Storage and Introduction to SCSI
Protocols and the TCP/IP Suite
ECEN 619 “Internet Protocols and Modeling”
Data and Computer Communications by William Stallings Eighth Edition
Review of Important Networking Concepts
ECEN “Internet Protocols and Modeling”
iSCSI-based Virtual Storage System for Mobile Devices
Chapter 15 – Part 2 Networks The Internal Operating System
Protocols and the TCP/IP Suite
Presentation transcript:

July 14, KIMICS 2006 Kulveer Singh Graduate School of Design & IT Dongseo University Busan, South Korea Data Concurrency Issues in iSCSI Based-Data Storages

July 14, KIMICS 2006 Outline Introduction Concurrency Issues Hierarchical Locking System Design & Simulation Simulation Results Conclusion References

July 14, KIMICS 2006 iSCSI Defined: What Is iSCSI? iSCSI = internet Small Computer System Interface An interconnect protocol that:  Is designed for storage area networks (SANs)  Supports the block-based storage needs of database applications  Is TCP/IP based  Establishes and manages connections between IP-based storage devices, hosts and clients  Is based on familiar and ubiquitous open standards  Provides advanced IP routing, management, and security tools

July 14, KIMICS 2006 iSCSI stack Initiator : System which request block level data from Target Target : System which receive the SCSI commands from Initiator

July 14, KIMICS 2006 Main Reason For Concurrency No Centralized Locking mechanism implemented. No Cache consistency semantics used at the initiators.

July 14, KIMICS 2006 Concurrency Issue

July 14, KIMICS 2006 Design Approach

July 14, KIMICS 2006 Hierarchical Locking System * Indicates conflict S Share lock X Exclusive lock IS Intention Share IX Intention exclusive SXISIX S* * X**** IS* IX** Compatibility Table

July 14, KIMICS 2006 Central Metadata Manager (CMM) Lock Table consists of  Block ID  Conflict Count  Group Mode  Lock Queue  Wait Queue

July 14, KIMICS 2006 Ns2 (Network Simulator) Applications in Ns2 are virtual Does not transfer data. Packets are generated at transport layer by transport agent. Send at particular intervals according to the application specification.

July 14, KIMICS 2006 Simulation Model in Ns2 iscsiInitApp Agent iscsiRouterApp AgentiscsiTargetApp Agent Application Class iSCSI

July 14, KIMICS 2006 iSCSI layer implementation In Ns2 iSCSI layer on top of Full TCP agent iSCSI layer will be able to send data according to the user requirement. iSCSI layer composed of user interface layer and iSCSI agent. iSCSI agent User Interface iSCSI layer

July 14, KIMICS 2006 Layer architecture In NS iSCSI layer Agent Wrapper (Full TCP agent) TCP base class Process_data (PDU) Send_data (PDU) Recv. (bytes)Send (bytes) Packets

July 14, KIMICS 2006 Initiator & Target Simulation Initiator will use the same layer architecture defined above. Target (iSCSI router) will also use the same architecture except the user interface layer will be eliminated from iSCSI layer.

July 14, KIMICS 2006 Simulation Parameters Read/Write Access Pattern. Number of initiators sharing a LUN (Logical Unit Number). Allotted Time for the Exclusive Locks. Directory Depth. Throughput  Measured as the average number of locks granted per initiator per minute by the CMM.

July 14, KIMICS 2006 Result of Varying Read/Write Access Pattern for LAN The parameters are  Number of LUN = 4  Allotted Time = 10  Directory Depth = 2

July 14, KIMICS 2006 Result of Varying Number of Initiators Sharing a LUN for LAN The parameters are  Read: Write Ratio = 60:40  Allotted Time =10  Directory Depth = 2

July 14, KIMICS 2006 Conclusion Design has been validated by the NS2 simulator and the study of various parameters has been done. Now the design can be practically implemented on the iSCSI router and performance can be measured practically.

July 14, KIMICS 2006 References [1]Simulation of Hierarchical Locking Scheme for ISCSI SAN File Sharing – A Plan B report by Fang Zhang [2]Caching in the Sprite Network File System - Michael N. Nelson, et al. [3]Metadata Update Performance in File Systems - Gregory R. Ganger and Yale N. Patt [4]Scalable Session Locking for a Distributed File System - Randal C. Burns, et al. [5]An Overview of the Global File System - He and Qing Yang. [6]The Linux Virtual File-system Layer - Neil Brown, et al. [7]The Network Simulator - Ns-2 [8] Ns by example – Jae Chung and Mark Claypool

July 14, KIMICS 2006 Questions?

July 14, KIMICS 2006 Thank You