FileSync/NDN: Peer-to-Peer File Sync over Named Data Networking
|
|
|
- Gerard Webb
- 10 years ago
- Views:
Transcription
1 FileSync/NDN: Peer-to-Peer File Sync over Named Data Networking Jared Lindblöm 1, Ming-Chun Huang 1, Jeff Burke 2 and Lixia Zhang 1 1. Computer Science Department, University of California, Los Angeles 2. REMAP, University of California, Los Angeles Abstract FileSync/NDN is a distributed application that implements file synchronization using Named Data Networking. Its purpose is to provide a service similar to the commercial DropBox platform, with improvements. Unlike DropBox, FileSync/NDN adopts a peer-to-peer (P2P) model that does not require centralization of data, and it employs NDN to reduce the traffic that would be present in a TCP/IP-based P2P approach. FileSync/NDN takes advantage of several features of NDN to improve the distribution and security of the content it provides. It employs the CCNx Synchronization Protocol (CCNx-SYNC) to maintain consistency of its content across multiple nodes on the network. In this technical report, the design considerations of NDN and SYNC are discussed, and a novel application design for distributed file synchronization is introduced. I. INTRODUCTION File synchronization is a useful network application that provides data replication over a variety of hosts to support sharing, backup, and remote access. The commercial service DropBox uses a client-server (C-S) model to implement such synchronization. It is simple and popular, but has drawbacks including high traffic concentration at the server and concentrated points of failure. To enforce its security model, clients on the same local area network are required to coordinate with a remote central server before they may exchange information locally to achieve consistency. In addition to these drawbacks, client-server models also may offer easy attack targets because the addresses of the servers are well-known. Peer-to-peer (P2P) alternatives use a distributed file sharing model, which has different drawbacks, such as a large number of duplicated packets when using the current Internet Protocol (IP), which is due to the lack of efficient control in data distribution, and limited resilience to failure when there are a small number of participants. Also, since data can be disseminated by every peer, the integrity and relevance of the data are difficult to assure. File synchronization applications reconcile all distributed copies of a given file, which is usually identified to the user by its path and filename. Typically, applications attempt to ensure every participating node has the latest version. In the C-S model, all clients must be informed of an update to a file on any other client either through a callback from, or periodic polling of, a server. When there is an update to a file on one client, the server must reflect this quickly so that all other clients are able to access the latest copy from the server. At the time of replication, high traffic at the server results, because each client must ask for a copy of the file from the server and cannot request it from another client. In a P2P file sharing system, there isn t a central server to mandate the most up-todate copy of a file. Therefore, propagation of synchronization updates must be well-designed, otherwise synchronized files may develop inconsistencies across hosts. This report explores how Named Data Networking (NDN) can be used to support file synchronization without centralization, while also mitigating the significant drawbacks of P2P strategies used on the current Internet. This application seeks to harness NDN s efficient multicast dissemination, intrinsic content signatures and straightforward incorporation of storage at every node. FileSync/NDN uses the CCNx Synchronization Protocol to maintain consistency of files being synchronized and relies on NDN s intrinsic content caching and multicast to reduce traffic when compared to IP-based P2P approaches. A. Named Data Networking II. BACKGROUND Named Data Networking (NDN) [10], [11] is a data consumer-driven network architecture in which data flows through the network when it is requested by a consumer. In NDN, named content is identified with, and requested by, its unique name; additionally, every segment of content is signed by the producer, binding it to its name. To retrieve such a content object from the network, a consumer specifies the name of the content object in an interest packet which it issues to the network. Each upstream node in the network attempts to satisfy the interest by the providing the corresponding content, if available, or else forwards the interest on to other nodes advertising an appropriate prefix. When an interest is satisfied, the corresponding data follows the path of the interest back to the requester. Each router along the path traveled by an interest receives the interest s corresponding data packet, and it checks its forwarding information base (FIB) to determine where the content should be forwarded. At each node, pending interests are consumed, and the data packet is forwarded via all registered interfaces to requesting consumers. If no data has arrived to fulfill an interest, the interest is kept in the router s pending interest table (PIT) until it times out. Content objects are cached in the router s memory for future use, enabling a router to satisfy repeated interests for the same content directly from its cache.
2 B. CCNx-SYNC protocol in NDN In addition to the content store of each node, which caches the content objects that pass through the node repositories are used within the network to provide persistent storage of published content objects. In the CCNx reference implementation, the Synchronization Protocol [3] provides a mechanism to efficiently synchronize namespaces and their corresponding content across repositories in an NDN network. CCNx-SYNC synchronizes named data saved to repositories under a given name prefix, enabling applications to synchronize content by simply saving it to their repository under that prefix. The list below outlines important concepts and terminology used by CCNx-SYNC. 1) A collection is a set of content to be synchronized, as identified by its namespace, the content prefix. 2) The topological prefix defines the namespace used for the broadcast messages needed to synchronize a given collection. 3) The definition of a collection is called a slice and includes (1) the collection prefix, (2) a set of filters that limit the content to be synchronized under that prefix, and (3) the topological prefix under which broadcast messages used for synchronization can be issued for the collection. In order to synchronize content objects among peers, each peer s repository must define the same slice. 4) After a collection has been defined in a repository, sync agents associated with that repository build a sync tree based on the collection s content. The combined hash for each node in the tree is the sum of the hashes of individual content names in that node and of the combined hashes of all its child nodes. The root hash is compared by sync agents across repositories to determine if the content objects represented in the collection are consistent. 5) Root advise interests are periodically broadcast to sync peers using the topological prefix. By default, the protocol limits such peers to those reachable in two hops or less. Each root advise interest contains the peer s current hash digest of the local sync tree and is used to check the consistency of sync trees for a given collection across repositories within the network. CCNx-SYNC s process can be summarized follows: First, an appropriate slice with valid topological and content prefixes is established for a group of repositories to be synchronized. Then the local sync agent for each repository generates its own sync tree based on the stored collection of content objects. Periodically it sends out a root advise interest containing the tree s hash digest, which serves to inquire about updates to the collection it is synchronizing. All peers that receive a root advise interest corresponding to a slice they share compare the digest in the interest with their own. If they are inconsistent, the trees are reconciled using the interest/data exchange in the topological prefix described in [3]. C. Routing considerations Before proceeding to describe the architecture of FileSync/NDN, it is also important to note some routingrelated considerations resulting from the use of CCNx-SYNC. Each peer that participates in synchronizing a repository must be able to publish content and receive interests in the topological prefix, where root advise interests and responses are shared, and the content prefix, where the actual data is published. This requires an approach somewhere along the range of two extremes: (a) providing routing table entries for both prefixes per collection (e.g., FileSync/NDN shared directory) per peer, or, (b) using a common broadcast namespace for all synchronized repositories. For simplicity, we take the latter approach in our testbed implementation, and assume a single prefix routed with broadcast semantics, e.g., /ndn/broadcast. The scaling limitations of both approaches must be addressed in future work. CCNx-SYNC, by default, limits interests to scope 2, which enables only directly-connected peers to exchange content using this mechanism. While this default can be changed, 1 the preferred method is to use the standard implementation of CCNx to promote easy adoption of the application. To enable use on the NDN testbed, where most users nodes are not directly connected to each other, requires running the Filesync/NDN application on each hub, which is connected via scope 2. These hubs are configured to synchronize content with the nodes that use them for connectivity. These nodes are typically end users hosts and are also connected with scope 2. III. ARCHITECTURE AND SYSTEM DESIGN CCNx-SYNC on its own does not support file synchronization as performed by popular applications like DropBox because (1) it does not yet provide an API or convention for the removal or modification of content that has previously been added to a collection; (2) it is embedded inside the CCNx C-based repository; and (3) it cannot be used directly to synchronize the local filesystem. FileSync/NDN is designed to work in conjunction with CCNx-SYNC to enable the necessary operations - add, delete, move, modify and rename - to be performed directly on the local filesystem and to allow synchronization to occur automatically in the background without user intervention. FileSync/NDN is designed to synchronize files between multiple hosts by maintaining a consistent view of the common shared directory. Files within the designated local directory on each host are mapped to a collection of versioned content objects within a repository and synchronized between machines using CCNx-SYNC. Because the synchronization protocol only supports the addition of content into a collection, FileSync/NDN extends the functionality of CCNx-SYNC to maintain consistency between the collection in the repository and the local files the collection represents. The following sections describe the application s design. 1 This can be changed by setting the CCNS_SYNC_SCOPE environment variable and modifying the code itself to accept larger scope values.
3 A. Namespace Design As previously mentioned, in CCNx-SYNC a slice defines a collection as a combination of a topological prefix, a content prefix, and filters. 2 To configure FileSync/NDN to synchronize a directory with other peers, a user provides (1) a local directory to hold the files to be shared; (2) the topological and content prefixes associated with the desired shared directory, thus defining the slice for CCNx-SYNC. In the current design, the prefixes are the same for all participating peers. Other users wishing to share this folder must similarly provide their local instance of FileSync/NDN with the identical topological and content prefixes so that the same slice can be saved to each of their local repositories. Figure 1 depicts an example slice definition. 3 Topological Prefix Content Prefix Slice /ndn/broadcast/apps/filesync /ndn/broadcast/apps/filesync/uclaclass217 Fig. 1: Example Slice in FileSync/NDN Every file in the shared directory is written by FileSync/NDN to a local CCNx repository in the form of segmented, versioned content objects adhering to the repository naming conventions. The file data is stored under the content prefix, using the file s filename and relative path as its name, in UTF-8 text, followed by a version which corresponds to the timestamp of when the object was created, followed by segment numbers, if needed. Additionally, the file is also made available in a flat namespace under the content prefix, where it is named by the SHA-1 hash of its name and relative path, followed by version and segment numbering. <content prefix> The naming convention is shown in Figure 2, along with an example for the first segment of the shared file Document. txt in the root of the shared directory published under /ndn/ broadcast/apps/filesync/uclaclass217. B. Shared Directory Reconciliation Each host informs all other hosts of local changes to the synchronized collection by generating a snapshot representing the complete state of the local shared directory, as well as a record of deletions, and adding it to the collection using a unique name. This snapshot is a plaintext, CSV-format file that lists both the files that exist in the shared directory and those that have been deleted from it. Its content is synchronized in the same manner as the other files in the shared directory by the underlying CCNx-SYNC mechanism. Figure 3 shows the naming convention for the snapshot which is also stored using standard CCNx repository conventions. In FileSync/NDN, there is one latest snapshot for every collection that is reconciled across all participating peers. <content prefix>.filesync_snapshot <version> <segment> /ndn/broadcast/apps/filesync/uclaclass217/.filesync_snapshot/%fd%05%0b0%f5%b6f/00 Fig. 3: Snapshot Naming <relative path & filename> SHA1 <relative path & filename> Figure 4 depicts the information which a snapshot holds on each file: relative path, existence, content name and digest. Relative path specifies the file s name and path relative to the local shared directory root. <version> <segment> /ndn/broadcast/apps/filesync/uclaclass217/document.txt/%fd%05%0b0%cff%21/00 Fig. 2: Shared File Namespace 2 Filters are not used in the current implementation of FileSync/NDN. 3 These prefixes could be different, but both require all peers to be able to publish content and receive interests for both the topological and the content prefix. As discussed above, the example uses the /ndn/broadcast namespace for both, because that will be the most straightforward deployment on the NDN testbed. Relative Path Existence Content Name Digest Document.txt True /ndn/broadcast/apps/filesync/uclaclass217/ Document.txt/%FD%05%0B0%CFf%21 Reports/Report.pdf True /ndn/broadcast/apps/filesync/uclaclass217/ Reports/Report.pdf/%FD%05%0B0%F5%B6f Fig. 4: File Metadata in the Snapshot 2205e48de5f93c ffcca841d2b5 d41d8cd98f00b204e ecf8427e The existence entry indicates whether that file should exist in the shared directory and it is used by FileSync/NDN to overcome the add-only nature of CCNx-SYNC. 4 The content 4 This approach is in contrast to the approach proposed by [12], [13], whereby every content object that should no longer exist is overwritten with an empty content object. Although both approaches overcome this limitation, the approach proposed by [12], [13] produces, in the worst case, twice as many content objects in a collection than the approach used by this application.
4 Repository 1. Callback informs application of snapshot update. 2. Newest snapshot is requested and returned to application. FileSync/NDN Should file exist? 3. Shared Folder is reconciled on a file - by - file basis. Recognize file? No No Remember file For Each Global Snapshot /file1,.,.,. /file2,.,.,. /file3,.,.,. /file4,.,.,. Does file exist locally? Does file exist locally? Should file exist? No If versions differ, request file and update local copy Request file, add local copy Delete local copy Request file, add local copy Fig. 5: Shared Directory Reconciliation name is included as an absolute path, including the content prefix, and follows the naming convention described above. The digest of a file is used by FileSync/NDN to verify file integrity before it is placed in the shared directory, and it is calculated by taking the MD5 summation of its contents. Hosts reconcile the differences between a local hashtable, which tracks file additions, deletions, and modifications in the local directory, and the state of the shared directory as specified in the synchronized snapshot file. Each host reconciles the differences between the local shared directory and the state from the latest snapshot using the algorithm shown in Figure 5, which is applied whenever a snapshot is received that is newer, i.e., has a higher version number, than the previous local copy. In the worst case scenario, the algorithm compares n number of files in the snapshot to n number of local file copies, which occurs when every file entry is compared with a local copy in the local shared directory. An event-based approach is used to detect and respond to changes in the local file system and corresponding repository. A file system watcher generates an event (callback) when changes to the local shared directory occur. The local hashtable is updated and a new snapshot is written to the repository reflecting those changes. Asynchronously, the sync tree is updated by CCNx-SYNC, and the synchronization process occurs as discussed in the previous section. Similarly, when a new snapshot file coming from another peer is synchronized with the collection, a callback is received from CCNx-SYNC. The snapshot is compared with the local directory, and, if necessary, interests are issued to get new content objects from the repository, which are then written to the local file system. IV. IMPLEMENTATION In this section, the approach to implementation of the application is briefly outlined. A. Cross Platform Support FileSync/NDN was developed in Java so that it is platform independent. This application will run on any platform supported by the CCNx library. It has been tested in the Linux and Mac environments. B. File System Monitoring Jnotify[4] is used for file system monitoring. It is a Java library that enables Java applications to listen to file system events such as creation, modification, renaming, and deletion. Jnotify informs the application of file system events by invoking a registered callback function. Jnotify was incorporated into FileSync/NDN to monitor changes made to the local shared directory. C. Multi-threading FileSync/NDN is a multi-threaded application. File system events, content publication and content retrieval are all handled by threads to improve the efficiency of the application. The current application dispatches threads to a thread pool that is allocated to run up to twenty threads simultaneously. D. Batch-processing To improve shared directory reconciliation efficiency, snapshots are published no faster than every two seconds and reflect all changes that have been made to the local shared directory over that period. A. Speed of Reconciliation V. PRELIMINARY EVALUATION An experiment was conducted to determine the relationship between the time it takes the application to reconcile a shared directory and the number of file updates contained in a snapshot.
5 Two virtual machines running Ubuntu were used. The Eclipse application profiling tool, TPTP [5], was employed to measure the time it took FileSync/NDN to reconcile a local directory after first receiving a new snapshot. The results from this experiment suggest that the shared directory reconciliation algorithm that was developed for this application performs linearly. Figure 6 shows the relationship between the number of files in a snapshot and the time it takes the application to process that snapshot. Fig. 6: Reconciliation Experiment Result B. Speed of Propagation A second experiment was conducted to determine the relationship between the number of peers sharing a synchronized collection and the time it takes a snapshot update to be propagated to all peers. Six virtual machines running Ubuntu were used. Each VM was time-synchronized using the network time protocol (NTP) over IP. The application was tested using groups of two, three, four, five and six peers. From these experiments, it was observed that, on average, it took the application 0.35 seconds to propagate the global snapshot to all peers, with a standard deviation of 97 milliseconds. This measurement was taken from the time just before a peer wrote a new global snapshot to the time each peer received word of the update. There was no observed correlation between the number of peers sharing the synchronized collection and the average time it took each peer to receive the snapshot update. VI. DISCUSSION AND FUTURE WORK A. Use of CCNx-SYNC CCNx-SYNC provides the ability to effectively synchronize content across hosts over NDN. However, it has limitations for supporting a DropBox-style file synchronization application like this one. The sections above describe how FileSync/NDN builds on the current CCNx approach to support the file operations necessary for a distributed file sharing service. Other design decisions in CCNx-SYNC require tradeoffs for this application: (1) As discussed, CCNx-SYNC limits the scope of the root advise interest to two hops or less, limiting the application s reach to neighboring repositories. (2) It requires that each participating repository agree on the definition of a synchronized collection, i.e. uses the same content prefix, in order to synchronize the content objects associated with that collection. (3) The order in which names and content are synchronized is arbitrary, which requires the application to track the order of file system events itself, if it chooses to perform reconciliation. [2]. B. Security Future versions of FileSync/NDN will provide users with the ability to control access to the files they are sharing. Users will have the ability to decide who can read from, and/or write to, a collection that will be synchronized across machines. We aim to achieve this by leveraging the group-based access controls available in the CCNx Java API and obfuscating the content names of shared files. 1) Group-Based Access Controls: In the CCNx Java API, an AccessControlManager can be used to enforce an access control list on a particular namespace in a repository. We plan to adapt this for subsequent versions of FileSync/NDN. The AccessControlManager implements read, write, or manage permissions for named users or groups. The permissions of each user are tied to the user s published public key. Permissions are supersets of one another, allowing writers to read, and managers to read and write. Managers have the additional capability to create and edit the access control lists [1]. The repository enforces the access policy by requiring that the AccessControlManager of the namespace in question be consulted before any content is read from, or written to, the repository. Content stored under the namespace is encrypted; if access is granted, the AccessControlManager provides the appropriate content encryption/decryption keys to encrypt/decrypt the content. An access control policy will be created by allowing the user to define the managers, writers and readers of a namespace. A manager of a namespace would have the option to add or revoke permissions for any user at any time. 2) Preventing File Name Leakage: Even though access to the shared files in a namespace can be controlled by an access policy, an outsider could glean information about what files are being shared by listening to the interests and data packets flowing between repositories. To prevent snooping, users will be given the option to obfuscate the content names of each file in the shared directory. This will be accomplished by replacing the relative path of each file with its secure hash and mapping that name to the file s relative path in the snapshot. An initial version of this feature has already been implemented, as mentioned above. C. Version Control and Conflict Resolution FileSync/NDN handles conflicts between snapshots of a common shared directory by employing a last-writer-wins policy. When a snapshot is created, it is versioned using a network timestamp. If two snapshots with conflicting views are created and added to the collection, the snapshot with the
6 latest timestamp is considered, and the other one is ignored. In CCNx, network timestamps are accurate to 1/4096 second, making it very unlikely that two snapshots could be created with identical timestamps. By employing this form of conflict resolution, changes proposed by the ignored snapshot are discarded and never reflected in the state of the shared directory. Work is presently being performed to incorporate more desirable forms of conflict resolution into this application, which could provide version control features. VII. RELATED WORK H. Choi and J. Kang proposed a home-networking file storage system that runs over NDN [6]. They designed and implemented an application that provided a file sharing service using the client-server model. They determined that their design alleviated traffic concentration at the server by taking advantage of NDN s in-network content caching, but did not prevent single-point failure problems inherent in a client-server design. Z. Qu and J. Burke proposed a framework to support a car racing game, Egal Car, over NDN [13]. They used the CCNx Synchronization Protocol to synchronize gaming messages between players. V. Jacobson, et. al proposed the concept of custodian-based information sharing [12]. To support the removal of content from a synchronized collection, they proposed adding a content object to the collection to flag certain content as having been removed. Chronos, proposed by Zhu, et. al, is a multi-user chat application that runs over NDN [14]. The authors of this application bridged existing XMPP protocol-enabled, client-end software with a synchronization protocol that they designed to provide scalable data dissemination of chat messages over NDN. In their design, special namespace rules were defined to guarantee reliable delivery of chat messages in chronological order to each client. In Securing Network Content by V. Jacobson, et. al, general security considerations and designs in NDN are discussed [8] and two implementations of a security-centric design are proposed in D. Kulinski and J. Burke s NDN Video technical report [7] and Securing Instrumented Environments by J. Burke, et. al[9]. and security with the goal that it will be a popular application within the NDN community. REFERENCES [1] Access control manager class reference. latest/doc/javacode/html/classorg 1 1ccnx 1 1ccnx 1 1profiles 1 1security 1 1access 1 1 access control manager.html. [2] Ccnsyncslice manual page. 0rc1/doc/manpages/ccnsyncslice.1.html. [3] Ccnx synchronization protocol. technical/synchronizationprotocol.html. [4] Jnotify-file system event library for java. [5] Test and performance tools platform project. projects/project.php?id=tptp. [6] H. Choi and J. Kang. NDN-based Smart Digital Home Storage. UCLA CS217 Class Project, [7] D. Kulinski and J. Burke. Ndnvideo: Random-access live and prerecorded streaming using ndn. Technical report, University of California, Los Angeles, REMAP, [8] D. Smetters and V. Jacobson. Securing network content. Technical report, PARC, [9] J. Burke and P. Gasti and N. Nathan and G. Tsudik. Securing Instrumented Environments over Content-Centric Networking: the Case of Lighting Control. In CoRR, [10] L. Zhang and D. Estrin and J. Burke. Named data networking (ndn) project. Technical report, PARC, [11] V. Jacobson and D. Smetters and J. Thornton and M. Plass and N. Briggs. Networking Named Content. In CoNEXT 09, pages ACM, [12] V. Jacobson and R. Braynard and T. Diebert and P. Mahadevan and M. Mosko and N. Briggs and S. Barber and M. Plass and I. Solis and E. Uzun and B. Lee and M. Jang and D. Byun and D. Smetters and J. Thornton. Custodian-based information sharing. Comunications Magazine, 50(7):38 43, [13] Z. Qu and J. Burke. Egal car: A peer-to-peer car racing game synchronized over named data networking. Technical report, University of California, Los Angeles, REMAP, [14] Z. Zhu and C. Bian and A. Afanasyev and V. Jacobson and L. Zhang. Chronos: Severless multi-user chat over ndn. Technical report, PARC, VIII. CONCLUSION FileSync/NDN is a distributed file sharing application implemented using the CCNx reference implementation. An initial evaluation suggests synchronization for modest numbers of files to be linear in time. The application s design takes advantage of several features of NDN to improve the distribution and consistency of the content it provides. FileSync/NDN extends CCNx-SYNC to support the file operations necessary for a distributed file sharing service that is transparent to the user. This approach holds promise for redefining the way applications share information across multiple hosts on a network. Current limitations include routing requirements dictating that each peer be able to publish content in the same prefix. Future work is underway to improve the application s synchronization efficiency, routing requirements, robustness
Egal Car: A Peer-to-Peer Car Racing Game Synchronized Over Named Data Networking
NDN, Technical Report NDN-0010, 2012. http://named-data.net/techreports.html Revision 1: October 2012 Egal Car: A eer-to-eer Car Racing Game Synchronized Over Named Data Networking Zening Qu UCLA REMA
Live Streaming with Content Centric Networking
Live Streaming with Content Centric Networking Hongfeng Xu 2,3, Zhen Chen 1,3, Rui Chen 2,3, Junwei Cao 1,3 1 Research Institute of Information Technology 2 Department of Computer Science and Technology
NDSS: A Named Data Storage System
NDSS: A Named Data Storage System Shuo Chen, Junwei Cao Research Institute of Information Technology Tsinghua National Laboratory for Information Science and Technology Tsinghua University, Beijing 100084,
Live Streaming with CCN & Content Transmission with CCNx
Live Streaming with CCN & Content Transmission with CCNx 21 Jun. 2012 Suphakit Awiphan Katto Laboratory, Waseda University Outline Introduces the paper entitled Live Streaming with Content Centric Networking
NDNlive and NDNtube: Live and Prerecorded Video Streaming over NDN
NDN, Technical Report NDN-0031, 2015. http://named-data.net/techreports.html Revision 1: April 30, 2015 1 NDNlive and NDNtube: Live and Prerecorded Video Streaming over NDN Lijing Wang Tsinghua University
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &
ZooKeeper. Table of contents
by Table of contents 1 ZooKeeper: A Distributed Coordination Service for Distributed Applications... 2 1.1 Design Goals...2 1.2 Data model and the hierarchical namespace...3 1.3 Nodes and ephemeral nodes...
Supporting Information-Centric Networking in SDN
Supporting Information-Centric Networking in SDN Peng Li, Wu Muqing, Wang Ning, and Liu Hongbao Abstract Recently the Software-Defined Networking (SDN) has attracted increasing attention in the research
MODERN buildings rely on state of the art Building
1 Security Evaluation of a Control System Using Named Data Networking Victor Perez, Mevlut Turker Garip, Silas Lam, and Lixia Zhang, Fellow, IEEE Abstract Security is an integral part of networked computer
A seman(c firewall for Content Centric Networking
A seman(c firewall for Content Centric Networking IFIP/IEEE Integrated Network Management Symposium (IM 2013) - MC2: Security Management and Recovery May 27-31, 2013 David Goergen Thibault Cholez Jérôme
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0 Contents 1 Introduction 3 1.1 Purpose..............................
Realtime Multi-party Video Conferencing Service over Information Centric Networks
Realtime Multi-party Video Conferencing Service over Information Centric Networks (Anil Jangam, Ravishankar Ravindran, Asit Chakraborti, Xili Wan, Guoqiang Wang ) University of Maryland, Baltimore County,
MuleSoft Blueprint: Load Balancing Mule for Scalability and Availability
MuleSoft Blueprint: Load Balancing Mule for Scalability and Availability Introduction Integration applications almost always have requirements dictating high availability and scalability. In this Blueprint
CipherShare Features and Benefits
CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application
Implementing Intercluster Lookup Service
Appendix 11 Implementing Intercluster Lookup Service Overview When using the Session Initiation Protocol (SIP), it is possible to use the Uniform Resource Identifier (URI) format for addressing an end
HDFS Users Guide. Table of contents
Table of contents 1 Purpose...2 2 Overview...2 3 Prerequisites...3 4 Web Interface...3 5 Shell Commands... 3 5.1 DFSAdmin Command...4 6 Secondary NameNode...4 7 Checkpoint Node...5 8 Backup Node...6 9
Feature and Technical
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's
Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.
Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with
Avaya P330 Load Balancing Manager User Guide
Avaya P330 Load Balancing Manager User Guide March 2002 Avaya P330 Load Balancing Manager User Guide Copyright 2002 Avaya Inc. ALL RIGHTS RESERVED The products, specifications, and other technical information
Distributed File System. MCSN N. Tonellotto Complements of Distributed Enabling Platforms
Distributed File System 1 How do we get data to the workers? NAS Compute Nodes SAN 2 Distributed File System Don t move data to workers move workers to the data! Store data on the local disks of nodes
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Understanding. Active Directory Replication
PH010-Simmons14 2/17/00 6:56 AM Page 171 F O U R T E E N Understanding Active Directory Replication In previous chapters, you have been introduced to Active Directory replication. Replication is the process
Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network
Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network Tim Schattkowsky Paderborn University, C-LAB, D-33102 Paderborn, Germany [email protected] Abstract. Network infrastructures are nowadays
Backup with synchronization/ replication
Backup with synchronization/ replication Peer-to-peer synchronization and replication software can augment and simplify existing data backup and retrieval systems. BY PAUL MARSALA May, 2001 According to
Multicast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
Enterprise Backup and Restore technology and solutions
Enterprise Backup and Restore technology and solutions LESSON VII Veselin Petrunov Backup and Restore team / Deep Technical Support HP Bulgaria Global Delivery Hub Global Operations Center November, 2013
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,
Overview: Load Balancing with the MNLB Feature Set for LocalDirector
CHAPTER 1 Overview: Load Balancing with the MNLB Feature Set for LocalDirector This chapter provides a conceptual overview of load balancing and introduces Cisco s MultiNode Load Balancing (MNLB) Feature
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
Diagram 1: Islands of storage across a digital broadcast workflow
XOR MEDIA CLOUD AQUA Big Data and Traditional Storage The era of big data imposes new challenges on the storage technology industry. As companies accumulate massive amounts of data from video, sound, database,
Overview of NFD. Beichuan Zhang The University Of Arizona
Overview of NFD Beichuan Zhang The University Of Arizona What is NFD A new NDN Forwarder, implementing the NDN protocol. Apps, tools, routing, NFD Links and Tunnels L i b r a r y 1 Why NFD To support the
DnsCluster: A networking tool for automatic domain zone updating
DnsCluster: A networking tool for automatic domain zone updating Charalambos Alatas and Constantinos S. Hilas * Dept. of Informatics and Communications Technological Educational Institute of Serres Serres,
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
Steelcape Product Overview and Functional Description
Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session
Object Storage: A Growing Opportunity for Service Providers. White Paper. Prepared for: 2012 Neovise, LLC. All Rights Reserved.
Object Storage: A Growing Opportunity for Service Providers Prepared for: White Paper 2012 Neovise, LLC. All Rights Reserved. Introduction For service providers, the rise of cloud computing is both a threat
Module 11. Configuring and Managing Distributed File System. Contents:
Configuring and Managing Distributed File System 11-1 Module 11 Configuring and Managing Distributed File System Contents: Lesson 1: DFS Overview 11-3 Lesson 2: Configuring DFS Namespaces 11-15 Lesson
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
How To Get To A Cloud Storage And Byod System
Maginatics Security Architecture What is the Maginatics Cloud Storage Platform? Enterprise IT organizations are constantly looking for ways to reduce costs and increase operational efficiency. Although
draft-forwarding-label-ccn- 01.txt
draft-forwarding-label-ccn- 01.txt Ravi Ravindran and Asit Chakraborti Huawei (IETF/ICNRG, Yokohama, 94) [[email protected]] [[email protected]] Agenda Draft Objectives Terminology Why
From Centralization to Distribution: A Comparison of File Sharing Protocols
From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015
IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.
Cloud Sync White Paper. Based on DSM 6.0
Cloud Sync White Paper Based on DSM 6.0 1 Table of Contents Introduction 3 Product Features 4 Synchronization 5 Architecture File System Monitor (Local change notification) Event/List Monitor (Remote change
SwanLink: Mobile P2P Environment for Graphical Content Management System
SwanLink: Mobile P2P Environment for Graphical Content Management System Popovic, Jovan; Bosnjakovic, Andrija; Minic, Predrag; Korolija, Nenad; and Milutinovic, Veljko Abstract This document describes
Fault Tolerance in the Internet: Servers and Routers
Fault Tolerance in the Internet: Servers and Routers Sana Naveed Khawaja, Tariq Mahmood Research Associates Department of Computer Science Lahore University of Management Sciences Motivation Client Link
Caching SMB Data for Offline Access and an Improved Online Experience
Caching SMB Data for Offline Access and an Improved Online Experience Agenda What is Offline Files How does Offline Files interact with SMB Offline Files enhancements for Windows 7 Questions 2 What is
v.2.5 2015 Devolutions inc.
v.2.5 Contents 3 Table of Contents Part I Getting Started 6... 6 1 What is Devolutions Server?... 7 2 Features... 7 3 System Requirements Part II Management 10... 10 1 Devolutions Server Console... 11
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
Egnyte Local Cloud Architecture. White Paper
w w w. e g n y t e. c o m Egnyte Local Cloud Architecture White Paper Revised June 21, 2012 Table of Contents Egnyte Local Cloud Introduction page 2 Scalable Solutions Personal Local Cloud page 3 Office
EMC VNX Series: Introduction to SMB 3.0 Support
White Paper EMC VNX Series: Introduction to SMB 3.0 Support Abstract This white paper introduces the Server Message Block (SMB) 3.0 support available on the EMC VNX and the advantages gained over the previous
SOA Software: Troubleshooting Guide for Agents
SOA Software: Troubleshooting Guide for Agents SOA Software Troubleshooting Guide for Agents 1.1 October, 2013 Copyright Copyright 2013 SOA Software, Inc. All rights reserved. Trademarks SOA Software,
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,
New Products and New Features May, 2015
NetAcquire Server 8 New Products and New Features May, 2015 1. Includes all NetAcquire 7.6 and earlier enhancements 2. Runs on a new real-time operating system: NetAcquire Deterministic Linux (NDL) a.
Smart Briefcases. Tiago Ferreira Nogueira Leite
Smart Briefcases Tiago Ferreira Nogueira Leite ABSTRACT In recent years computational devices have become affordable to the point where is common for a user to own mobile phones, PDAs, Laptops and Desktops.
The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar [email protected] [email protected] Gothenburg, May
Peer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
Scaling Web Applications in a Cloud Environment using Resin 4.0
Scaling Web Applications in a Cloud Environment using Resin 4.0 Abstract Resin 4.0 offers unprecedented support for deploying and scaling Java and PHP web applications in a cloud environment. This paper
Virtual PortChannels: Building Networks without Spanning Tree Protocol
. White Paper Virtual PortChannels: Building Networks without Spanning Tree Protocol What You Will Learn This document provides an in-depth look at Cisco's virtual PortChannel (vpc) technology, as developed
Postgres Plus xdb Replication Server with Multi-Master User s Guide
Postgres Plus xdb Replication Server with Multi-Master User s Guide Postgres Plus xdb Replication Server with Multi-Master build 57 August 22, 2012 , Version 5.0 by EnterpriseDB Corporation Copyright 2012
Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol
Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška
Distributed File Systems
Distributed File Systems Paul Krzyzanowski Rutgers University October 28, 2012 1 Introduction The classic network file systems we examined, NFS, CIFS, AFS, Coda, were designed as client-server applications.
OSPF Version 2 (RFC 2328) Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs).
OSPF Version 2 (RFC 2328) Interior gateway protocol (IGP). Routers maintain link-state database. Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs). Router
VIP-102B IP Solutions Setup Tool Reference Manual
VIP-102B IP Solutions Setup Tool Reference Manual Table of Contents Overview...5 System Requirements for Managed VoIP Products...6 Term Definitions...7 Main Application Window...8 Legend Description...9
Gladinet Cloud Backup V3.0 User Guide
Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service Achieving Scalability and High Availability Abstract DB2 Connect Enterprise Edition for Windows NT provides fast and robust connectivity
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX
White Paper SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX Abstract This white paper explains the benefits to the extended enterprise of the on-
Project 2: Firewall Design (Phase I)
Project 2: Firewall Design (Phase I) CS 161 - Joseph/Tygar November 12, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version
Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features
Solaris For The Modern Data Center Taking Advantage of Solaris 11 Features JANUARY 2013 Contents Introduction... 2 Patching and Maintenance... 2 IPS Packages... 2 Boot Environments... 2 Fast Reboot...
A Comparative Study on Vega-HTTP & Popular Open-source Web-servers
A Comparative Study on Vega-HTTP & Popular Open-source Web-servers Happiest People. Happiest Customers Contents Abstract... 3 Introduction... 3 Performance Comparison... 4 Architecture... 5 Diagram...
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
GRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
Network File System (NFS) Pradipta De [email protected]
Network File System (NFS) Pradipta De [email protected] Today s Topic Network File System Type of Distributed file system NFS protocol NFS cache consistency issue CSE506: Ext Filesystem 2 NFS
IPv6 First Hop Security Protecting Your IPv6 Access Network
IPv6 First Hop Security Protecting Your IPv6 Access Network What You Will Learn This paper provides a brief introduction to common security threats on IPv6 campus access networks and will explain the value
LinkProof And VPN Load Balancing
LinkProof And Load Balancing Technical Application Note May 2008 North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware Ltd. 22 Raoul Wallenberg
Veeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM
A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM Hideto Horiuchi, Naoki Wakamiya and Masayuki Murata Graduate School of Information Science and Technology, Osaka University 1
A Network Monitoring Tool for CCN
A Network Monitoring Tool for CCN Wonchul Kang, Byungryeol Sim, Joohee Kim, Eunkyoung Paik, and Youngseok Lee Chungnam National University at Korea 2012. 03. 05 Presented by Taeseong Kim 1 Contents Introduction
Lecture 5: GFS & HDFS! Claudia Hauff (Web Information Systems)! [email protected]
Big Data Processing, 2014/15 Lecture 5: GFS & HDFS!! Claudia Hauff (Web Information Systems)! [email protected] 1 Course content Introduction Data streams 1 & 2 The MapReduce paradigm Looking behind
Multi-level Metadata Management Scheme for Cloud Storage System
, pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1
HPAM: Hybrid Protocol for Application Level Multicast. Yeo Chai Kiat
HPAM: Hybrid Protocol for Application Level Multicast Yeo Chai Kiat Scope 1. Introduction 2. Hybrid Protocol for Application Level Multicast (HPAM) 3. Features of HPAM 4. Conclusion 1. Introduction Video
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
NDN Technical Memo: NDNS, NDN based Domain Name System
NDN, Technical Report NDN-00XX. http://named-data.net/techreports.html NDN Technical Memo: NDNS, NDN based Domain Name System immediate Revision history Revision Revision date Description 0.21 Oct 22,
Internet Packets. Forwarding Datagrams
Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed
White Paper. Intrusion Detection Deploying the Shomiti Century Tap
White Paper Intrusion Detection Deploying the Shomiti Century Tap . Shomiti Tap Deployment Purpose of this Paper The scalability of Intrusion Detection Systems (IDS) is often an issue when deploying an
Unicenter Remote Control r11
Data Sheet Unicenter Remote Control r11 Unicenter Remote Control TM is a highly reliable and secure application for controlling and supporting remote Windows and Linux systems. It delivers all of the features
Lightweight DNS for Multipurpose and Multifunctional Devices
IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.12, December 2013 71 Lightweight DNS for Multipurpose and Multifunctional Devices Yogesh A. Wagh 1, Prashant A. Dhangar
ICN based Scalable Video Conferencing on Virtual Edge Service Routers (VSER) Platform
Security Level: 客 户 伙 伴 在 右 35pt B0 体 : ium rial 32pt B0 体 based Scalable Video Conferencing on Virtual Edge Service Routers (VSER) Platform 配 色 建 议 不 超 以 下 方 案 内 只 用 22pt 色 体 : ular rial Asit Chakraborti,
The Hadoop Distributed File System
The Hadoop Distributed File System The Hadoop Distributed File System, Konstantin Shvachko, Hairong Kuang, Sanjay Radia, Robert Chansler, Yahoo, 2010 Agenda Topic 1: Introduction Topic 2: Architecture
JoramMQ, a distributed MQTT broker for the Internet of Things
JoramMQ, a distributed broker for the Internet of Things White paper and performance evaluation v1.2 September 214 mqtt.jorammq.com www.scalagent.com 1 1 Overview Message Queue Telemetry Transport () is
March 2010 Webcasting: Dealing with significant audiences behind the corporate firewall
March 2010 Webcasting: Dealing with significant audiences behind the corporate firewall Ed Van Petten CIO / Vice President, Network Operations ON24, Inc. Introduction Webcasts sometimes involve significant
Using Logon Agent for Transparent User Identification
Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense
WHITE PAPER. Understanding Transporter Concepts
WHITE PAPER Understanding Transporter Concepts Contents Introduction... 3 Definition of Terms... 4 Organization... 4 Administrator... 4 Organization User... 4 Guest User... 4 Folder Hierarchies... 5 Traditional
