How To Make A Network Overlay More Efficient



Similar documents
Multicast vs. P2P for content distribution

Evolution of Peer-to-Peer Systems

Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Optimizing Data Center Networks for Cloud Computing

Siemens Future HANNOVER MESSE Internet of Things and Services Guido Stephan

Architecture Guidelines Application Security

A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT

Web Application Hosting Cloud Architecture

Guidance Regarding Skype and Other P2P VoIP Solutions

Scalable Internet Services and Load Balancing

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

Unit 3 - Advanced Internet Architectures

Scalable Internet Services and Load Balancing

CS 360 Internet Programming

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November ISSN

Chord - A Distributed Hash Table

Information Searching Methods In P2P file-sharing systems

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria

Objectives. Distributed Databases and Client/Server Architecture. Distributed Database. Data Fragmentation

8 Conclusion and Future Work

Decentralized supplementary services for Voice-over-IP telephony

Introduction Chapter 1. Uses of Computer Networks

Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains

GEOG 482/582 : GIS Data Management. Lesson 10: Enterprise GIS Data Management Strategies GEOG 482/582 / My Course / University of Washington

A distributed system is defined as

Cisco IOS Flexible NetFlow Technology

RVS-Seminar Overlay Multicast Quality of Service and Content Addressable Network (CAN)

An Introduction to Peer-to-Peer Networks

1. Comments on reviews a. Need to avoid just summarizing web page asks you for:

全 新 企 業 網 路 儲 存 應 用 THE STORAGE NETWORK MATTERS FOR EMC IP STORAGE PLATFORMS

Network Level Multihoming and BGP Challenges

LIST OF FIGURES. Figure No. Caption Page No.

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

DDS-Enabled Cloud Management Support for Fast Task Offloading

VMDC 3.0 Design Overview

How To Create A P2P Network

Advanced IPSec with GET VPN. Nadhem J. AlFardan Consulting System Engineer Cisco Systems

Technical Overview Simple, Scalable, Object Storage Software

LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM

A Model for Access Control Management in Distributed Networks

Data Management in an International Data Grid Project. Timur Chabuk 04/09/2007

Introduction to Computer Networks

Three short case studies

Ranch Networks for Hosted Data Centers

Using Peer to Peer Dynamic Querying in Grid Information Services

An Architecture Concept for Mobile P2P File Sharing Services

The Challenges of Stopping Illegal Peer-to-Peer File Sharing

Outline. Mariposa: A wide-area distributed database. Outline. Motivation. Outline. (wrong) Assumptions in Distributed DBMS

An Optimization Model of Load Balancing in P2P SIP Architecture

Peer-to-peer data storage software Specification and source code

Outline. VL2: A Scalable and Flexible Data Center Network. Problem. Introduction 11/26/2012

5. Peer-to-peer (P2P) networks

A Review on Efficient File Sharing in Clustered P2P System

Distributed Systems. REK s adaptation of Prof. Claypool s adaptation of Tanenbaum s Distributed Systems Chapter 1

How To Understand and Configure Your Network for IntraVUE

Calto: A Self Sufficient Presence System for Autonomous Networks

MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT

Decentralised and Reliable Service Infrastructure to Enable Corporate Cloud Computing

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

Non-blocking Switching in the Cloud Computing Era

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet

Apache S4: A Distributed Stream Computing Platform

WAN Traffic Management with PowerLink Pro100

Software Concepts. Uniprocessor Operating Systems. System software structures. CIS 505: Software Systems Architectures of Distributed Systems

STATE OF THE ART OF DATA CENTRE NETWORK TECHNOLOGIES CASE: COMPARISON BETWEEN ETHERNET FABRIC SOLUTIONS

RELOAD Usages for P2P Data Storage and Discovery

Scaling 10Gb/s Clustering at Wire-Speed

SANE: A Protection Architecture For Enterprise Networks

Portable Wireless Mesh Networks: Competitive Differentiation

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online

Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions

COM A. White, K. Peterson, B. Lheureux

Research on P2P-SIP based VoIP system enhanced by UPnP technology

The IBM Cognos Platform for Enterprise Business Intelligence

PROFINET the Industrial Ethernet standard. Siemens AG Alle Rechte vorbehalten.

Digital Advisory Services Professional Service Description Network Assessment

AUTOMATED AND ADAPTIVE DOWNLOAD SERVICE USING P2P APPROACH IN CLOUD

Transcription:

Corporate Technology Service Layer Components for Resource Management in Distributed Applications Fabian Stäber Siemens Corporate Technology, Information and Communications Copyright Siemens AG 2007. Alle Rechte vorbehalten.

Introduction Peer-to-Peer Computing A peer can be summarized as a node which can: act as both a client and server make local resources available to the network search for resources in a cooperative group of peers Key Properties of a peer-to-peer network include: flexibility, scalability and self-organization resilience (normally via redundancy) the efficient use of existing storage and computing resources overlay protocols which work on top of TCP/UDP the shifting of data and computation from a centralized client-server based model to decentralized cooperation Seite 2 8. März 2007 Fabian Stäber, CT IC 6

Introduction Architecture of Peer-to-Peer Applications Applications use services provided by the service layer Service layer provides features like confidential communication, range query support,... Peer-to-peer layer is wellresearched, lot of algorithms File Sharing/ VoIP service layer components Resource Discovery/ Routing Application Layer Service Layer Overlay Layer Network layer is commodity Sensor Networks/ TCP/IP Network Layer Seite 3 8. März 2007 Fabian Stäber, CT IC 6

Introduction Architecture of Peer-to-Peer Applications Application Requirements do not match properties of raw overlay. Research on service layer is unstructured, not generic. The gap on service layer yields to low number of applications actually using peer-to-peer. File Sharing/ VoIP service layer components Resource Discovery/ Routing Sensor Networks/ TCP/IP Application Layer Service Layer Overlay Layer Network Layer Seite 4 8. März 2007 Fabian Stäber, CT IC 6

Synopsis Close the gap on the service layer and enable more applications to benefit from peer-to-peer based network overlays. Methodology 1.Identify and analyze use cases. 2.Implement and evaluate missing service layer components. 3.Create a map and classification of service layer components. Seite 5 8. März 2007 Fabian Stäber, CT IC 6

Use Cases Criteria for the Choice of the Use Cases 1. Business Relevance. All use cases are part of the Siemens business. That way, the identified requirements can be discussed and verified with experienced professionals from the chosen application domains, and the results can be applied in future Siemens projects. 2. Diversity. The use cases are chosen from a wide range of applications, covering very different application domains. That way, as many aspects as possible are taken into account on the service layer. 3. Multiple Impact. The service layer components implemented in the use cases must be transferable to other applications and other application domains. That way, the overall contribution to the service layer is maximized. Seite 6 8. März 2007 Fabian Stäber, CT IC 6

C Use Cases Use Case 1: Collaborative Product Design (CPD) in the Automotive Industry Developed in the ATHENA IP. Step 1: OEM (FIAT) issues Request for Quotation (RfQ) to its First Tier supplier (Siemens). Well structured, highly integrated environment Process-Centric communication using Web Services Standard Protocols Request For Quotations RfQs Seite 7 8. März 2007 Fabian Stäber, CT IC 6

Use Cases Use Case 1: Collaborative Product Design (CPD) in the Automotive Industry Developed in the ATHENA IP. Step 2: Siemens issues RfQs to the Second Tier Suppliers Event-based coordination Document-centric communication Dynamic set of partners s RfQs Common Peer-to-Peer Information Space Seite 8 8. März 2007 Fabian Stäber, CT IC 6

Use Cases Use Case 1: Collaborative Product Design (CPD) in the Automotive Industry Developed in the ATHENA IP. Step 3: Second Tier Suppliers place their bids. s Quote Common Peer-to-Peer Information Space Seite 9 8. März 2007 Fabian Stäber, CT IC 6

Co Use Cases Use Case 1: Collaborative Product Design (CPD) in the Automotive Industry Developed in the ATHENA IP. Step 4: Siemens makes proposal for OEM Request For Quotations Quote Seite 10 8. März 2007 Fabian Stäber, CT IC 6

Use Cases Use Case 2: Distributed Phone Book for VoIP Applications Searchable for the user s last names Storing user entries directly in the overlay causes hot spots: Too many people called Müller in Germany Developed the Extended Prefix Hash Tree, which is a service-layer component enabling scalable range queries Evaluated with the phone book of Munich (620 853 entries): nearly all peers store less than 3 entries, maximum load: 150 entries. Reduced network traffic through caching. Seite 11 8. März 2007 Fabian Stäber, CT IC 6

Use Cases Use Case 3: Routing and Aggregation of Sensor Data in Decentral Power Generation Power supply company use Web-based infrastructure to control small power generators Queries and threshold violations are routed through several levels of aggregation to reduce network traffic. Aggregation tree supports push- and pull-mode Benefit from locality preservation Seite 12 8. März 2007 Fabian Stäber, CT IC 6

Evaluation of new Service Layer Components The following new service layer components are evaluated: Confidential Communication, for peer-to-peer based auction scenarios. An Index Tree, contributing scalable range queries for user data A Routing Infrastructure, providing reliable aggregation for sensor data done. done. to do. Seite 13 8. März 2007 Fabian Stäber, CT IC 6

Map of Service Layer Components (ToDo) See how service layer components have impact on each other, which requirements can be combined easily, and which cannot. Requirement Area + - - - + - + - + + + + - Service Layer Component Example: Requirement area: Limited network bandwidth per peer Service layer component: Replication Impact: Positive, because replication facilitates load balancing. Seite 14 8. März 2007 Fabian Stäber, CT IC 6

Summary Overall contribution of the thesis 1. Enabling peer-to-peer in three new scenarios. 2. Classification of service layer components makes peer-to-peer integration more approachable. 3. New service layer components narrow the gap on the service layer. Seite 15 8. März 2007 Fabian Stäber, CT IC 6