Software Quality and Infrastructure Protection for Diffuse Computing



Similar documents
Network Edge Services

Tactical Service Bus: The flexibility of service oriented architectures in constrained theater environments

Cisco s Massively Scalable Data Center

Large-Scale Distributed Systems. Datacenter Networks. COMP6511A Spring 2014 HKUST. Lin Gu

CHAPTER 7 SUMMARY AND CONCLUSION

DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING

SDN and Data Center Networks

Distributed Systems. Examples. Advantages and disadvantages. CIS 505: Software Systems. Introduction to Distributed Systems

A very short history of networking

A Systems of Systems. The Internet of Things. perspective on. Johan Lukkien. Eindhoven University

Northrop Grumman White Paper

IT 3202 Internet Working (New)

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

Cloud Computing for Agent-based Traffic Management Systems

US Federal Cyber Security Research Program. NITRD Program

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

Optimizing Data Center Networks for Cloud Computing

NETWORK ISSUES: COSTS & OPTIONS

Automated Formal Analysis of Internet Routing Systems

Overview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID}

Communication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar

An Active Packet can be classified as

Table of Contents. Cisco How Does Load Balancing Work?

How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet

Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance

Building Secure Network Infrastructure For LANs

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

About the Authors Preface Acknowledgements List of Acronyms

Chapter 3. Enterprise Campus Network Design

Huawei Technologies ERC Position Statement: Towards a Future Internet Public Private Partnership

The Application Front End Understanding Next-Generation Load Balancing Appliances

10CS64: COMPUTER NETWORKS - II

Secured Voice over VPN Tunnel and QoS. Feature Paper

Software Defined Networking What is it, how does it work, and what is it good for?

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

Start building a trusted environment now... (before it s too late) IT Decision Makers

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

PART IV Performance oriented design, Performance testing, Performance tuning & Performance solutions. Outline. Performance oriented design

EL Program: Smart Manufacturing Systems Design and Analysis

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

CS6204 Advanced Topics in Networking

Cisco CCNP Optimizing Converged Cisco Networks (ONT)

Xperience of Programmable Network with OpenFlow

How To Handle Big Data With A Data Scientist

Distribution transparency. Degree of transparency. Openness of distributed systems

Data Center Network Topologies: FatTree

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

Enabling Cloud Architecture for Globally Distributed Applications

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

PortLand:! A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric

Qualifying SDN/OpenFlow Enabled Networks

Meeting Cyber Security Challenges

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

Comprehensive IP Traffic Monitoring with FTAS System

Service-Oriented Architectures

How To Build A Clustered Storage Area Network (Csan) From Power All Networks

Virtual Network Provisioning and Fault-Management across Multiple Domains

No Free Lunch in Cyber Security

XPROBE-NG. What s new with upcoming version of the tool. Fyodor Yarochkin Armorize Technologies

Network management and QoS provisioning - QoS in the Internet

Silver Peak s Virtual Acceleration Open Architecture (VXOA)

The Software Defined Hybrid Packet Optical Datacenter Network SDN AT LIGHT SPEED TM CALIENT Technologies

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

Enabling the SmartGrid through Cloud Computing

Network Mission Assurance

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

use it Messaging Fax Over IP (FoIP) Overview

IPv6 Based Sensor Home Networking

Radware s Attack Mitigation Solution On-line Business Protection

Converging P2P with clouds towards advanced real time media distribution architectures.

Cisco Catalyst 3750 Metro Series Switches

Layer 3 Network + Dedicated Internet Connectivity

Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols

Design of Remote data acquisition system based on Internet of Things

Data Center Content Delivery Network

A Model-based Methodology for Developing Secure VoIP Systems

Introduction to LAN/WAN. Network Layer

Network Virtualization

A Study of Network Security Systems

Routing and Transport in Wireless Sensor Networks

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Communication Networks. MAP-TELE 2011/12 José Ruela

Load Balancing and Maintaining the Qos on Cloud Partitioning For the Public Cloud

Content Delivery Networks. Shaxun Chen April 21, 2009

APPLICATION-AWARE ROUTING IN SOFTWARE-DEFINED NETWORKS

Transcription:

FY2001 ONR CIP/SW URI Software Quality and Infrastructure Protection for Diffuse Computing Principal Investigator: Andre Scedrov Institution: University of Pennsylvania URL: http://www.cis.upenn.edu/spyce NEW START May 01

The SPYCE Team. Cynthia Dwork* (Compaq) Joan Feigenbaum (Yale) Joseph Y. Halpern (Cornell) Patrick D. Lincoln* (SRI) John C. Mitchell (Stanford) Jonathan M. Smith (U Penn) Paul Syverson* (NRL)

What is Diffuse Computing? The computer diffuses into the environment as..... computation, communication, and storage performed by a distributed, networked collective invisibly in the background freeing people from the tyranny of the desktop computer

Diffuse vs Pervasive, Ubiquitous Pervasive Computing - Access to information from anywhere - Many humans, one information network Ubiquitous computing - Lots of little devices everywhere - One human, many little computers Diffuse Computing - Development of services: compute, store, - Accessing and combining services robustly - Teams of users, many machines at-the-ready

Where is Diffuse Computing? Hosts Routers Diffuse Computing Elements

Initial Examples of The Power of Diffuse Computing SETI at home Protein folding Pervasive Computing

Why Diffuse Computing? Large commercial computing markets - Yet personalized computing support Huge potential of p2p architectures - Leverage potential of the whole Needs of network-centric systems - High assurance: you can bet your life on it - Survivable: resists massive cyber attack - Scalable: can grow to support government - Smart: distributed control over things - Affordable: infrastructure can grow quickly

Research Challenges in Diffuse Computing Providing high quality solutions out of lower-quality computing and network resources working together Make ordinary computers do extra-ordinary things together New software design & engineering methods Create new business opportunities New mechanisms for stability in diffuse systems Components combined on an asneeded basis Think about computing in terms of economics, physics, & systems metaphors Local autonomy in ultra-large-scale distributed systems ad hoc is in, tightly coupled is out Given up for self-synchronization

Multi-Disciplinary Approach Combines 4 complementary thrusts: - Incentive-compatibility in distributed computing - Authorization mechanisms - Secure data storage and retrieval - Communication protocols Multi-institution experimental platform + systematic, formal treatment of underlying models, algorithms & data structures

Multi-Disciplinary Approach Combines 4 complementary thrusts: - Incentive-compatibility in distributed computing - Authorization mechanisms - Secure data storage and retrieval - Communication protocols Multi-institution experimental platform + systematic, formal treatment of underlying models, algorithms & data structures

Market System of Autonomous Agents Mechanism Design how to achieve global goals with local autonomy? Behavior of software as a system, described formally in spite of incomplete knowledge Initial development of this methodology Multi-institutional experimental platform for prototyping

Game Theory and Computer Science Both game theory and computer science focus on multiagent distributed systems - In game theory, the emphasis is on strategic thinking - agent s goals as quantified by their utilities (payoffs) - In CS, the focus is on fault-tolerance, dealing with asynchrony, and problems of scaling up (computational complexity) For many practical applications, we need to combine these concerns.

Example: Routing in Networks Different companies control various parts of the internet - no company is enthusiastic about routing another company s traffic through its portion - But they must cooperate to transmit traffic - Negotiation is carried out using BGP (Border Gateway Protocol) - this is done badly - doesn t take into account strategic thinking

Modeling this in the standard game-theoretic way is unlikely to work well: - We want to deal with strategic behavior on the part of routers and with failures but - We typically don t have an accurate probability distribution characterizing failures and when moves are made - Even if we had the relevant probabilities the obvious game tree would have uncountable outdegree - How can we compute good solutions efficiently?

More Problems - How do we specify the desired behavior - This is a hybrid system, with continuous changes + discrete moves - How could a spec take into account, say, denial-ofservice attacks and privacy concerns? - How do we prove correctness?

Mechanism Design Mechanism Design: design a system in which strategic agents behave in socially desirable ways - well studied in economics Algorithmic mechanism design [NR99] - takes complexity into account We need fault-tolerant, computationally efficient algorithmic mechanism design for hybrid distributed systems

Previous Work Computationally efficient mechanisms have been given for many problems of interest: Shortest paths (Nisan-Ronen 1999; Hershberger-Suri 2001) Multiagent scheduling (Wellman et al. 1998; Nisan-Ronen 1999) Combinatorial auctions (Parkes 1999; Nisan-Ronen 2000) Digital-goods auctions (Goldberg et al. 2001) All use a single, centralized mechanism; none take faults into account.

Decentralized Algorithmic Mechanisms Distribute the mechanism computation among all nodes in the network. Low network complexity [FPS00]: Small total number of messages No link is a hot spot Small maximum message size Fast local processing Feigenbaum, Papadimitriou, and Shenker (2000) study the network complexity of natural mechanisms for multicast cost sharing.

Open Problems Include Distributed multiagent-scheduling mechanisms (Distributed) mechanisms for DB-access and information retrieval Similar user-layer market-design problems Proofs of correctness Agent privacy

Multi-Disciplinary Approach Combines 4 complementary thrusts: - Incentive-compatibility in distributed computing - Authorization mechanisms - Secure data storage and retrieval - Communication protocols Multi-institution experimental platform + systematic, formal treatment of underlying models, algorithms & data structures

Outline Active networks and diffuse computing Experimental platform - ALIEN prototype - Extensions for market-based computation First experiments: - diffuse model in network control Plans for enhancing the infrastructure

Experimental Platform: Where? Hosts Routers Diffuse Computing Elements

Active Network Model Packets can change the behavior of the switches on-the-fly -In-band active packets -Out-of-band active extensions

Experimental Platform Based on ALIEN AN prototype - CAML language and runtime - Dynamic module loading (over the network) - Restricted general computation model (sandboxing) - Strong crypto support

The Design Space Usability vs. Flexibility vs. Security vs. Performance A General-Purpose Language gets the first two for free; other two are hard!

Protection vs. Quality All Programs Node Safe Programs Network Safe Programs

Protection and Quality All Programs Node Safe Programs Market Safe Programs Network Safe Programs

Market-based computation on ALIEN Trading of resource access rights - Between producers, consumers, brokers Trust management - Express+verify resource access rights - Glue to administrative policy Embedded market mechanisms - For managing raw resources

Experiment: network control Motivated by flaws in Internet model: - Global cooperation assumed For how much longer? - Network-side function static users can t touch routing infrastructure gets bloated - Users are captives at the end-points Latency, uncertainty Clear need for a diffuse approach

The Bourse of Packets Non-cooperative environment Main ideas: - Diffuse services in the network - Embed strategy in active packets Expected impact: - Local+intelligent reaction to congestion - increase utility, reclaim local autonomy

Enhancing the infrastructure Currently a local (per-node) market To scale up we need: - Distributed brokers / service location / information distribution / state management (starting from BGP ) ALIEN designed for routers: - How about diffuse elements, hosts?

Multi-Disciplinary Approach Combines 4 complementary thrusts: - Incentive-compatibility in distributed computing - Authorization mechanisms - Secure data storage and retrieval - Communication protocols Multi-institution experimental platform + systematic, formal treatment of underlying models, algorithms & data structures

When will Diffuse Computing be here? Currently an emerging paradigm Significant current commercial interest Increasing operational need Dramatic potential for DoD benefit

Diffuse Computing Support for Network-Centric Warfare Shared Awareness Increased Awareness Ability to Self-Synchronize Degree of Interoperability Major Impact Operational Tempo Attributes of Network-Centric Operations Survivability Lethality Responsiveness Attributes of Diffuse Network-Centric Operations

Focus: Middle Layer of Self-Synchronization Sensor / Awareness Shooter / Transaction Information Timeliness Minutes Seconds Sub-seconds Sensor Networks: Joint Composite Tracking Network (CEC) < 100 Users Joint Data Network (Link 16/11) <500 Users Joint Planning Network (GCCS) ~1000 Users Sensor Fusion Weapons Control Force Control Self-Synchronizing Forces Force Coordination Information Accuracy CEC: Cooperative Engagement Capability GCCS: Global Command and Control System Variable Quality of Service

Possible Impact of Successful Research on Diffuse Computing Improved Self Synchronization New forms of collaboration Compressed NCW OODA-loops Networked information-based acceleration of understanding the environment of a mission capability package

Expected Impact New range of global software-design techniques for today s and tomorrow s systems New software technology realizing full potential of network-centric computing

END