ImageVerifierCode 换一换
格式:PPT , 页数:47 ,大小:879.50KB ,
资源ID:374358      下载积分:2000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-374358.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(Digital Technology Center.ppt)为本站会员(王申宇)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

Digital Technology Center.ppt

1、Digital Technology Center,ducs.umn.eduFor more information on Intelligent Storage Consortium, please check http:/www.dtc.umn.edu/programs/DISC.htm,University of Minnesota,David H.C. Du,Intelligent Storage Consortium,Overall Focus,Emphasize the application of Advanced Storage Technologies A Balanced

2、approach to research that includes: Applications that need/use storage Advanced and Emerging Storage Architectures Advanced and Emerging Storage Technologies both software and hardware Business Cases and aspects of the Storage industry Market Trends Product Directions Effects of these disruptive tec

3、hnologies Adoption rates Provide consortium members with not just technology research but a more complete and significant outcome,Initial Specific Focus,Applied Object-based Storage Device (OSD) Active Storage (Datanomic Concept) The Application of OSD and Active Storage Devices to different real-wo

4、rld problems (MPEG-21, data mirroring, iSCSI based data sharing and file systems) Demonstrate the feasibility and advantages of OSD and Active Storage (modifying Lustre code) Develop an understanding of the limitations of OSD and Active Storage from a theoretical and practical standpoint (many resea

5、rch issues) How OSD Active Storage addresses real-world problems facing the storage industry today and tomorrow Must make this a Win-Win value proposition for the University and Industry,University Participation,The Digital Technology Center Jim Licari and Tom Ruwart Cross-disciplinary University pa

6、rticipants Computer Science Software Technology focus David Du Active disk, OSD, and Networking Jon Weissman Software systems, grid computing Yongdae Kim- Computer and Network Security Zhili Zhang Networking and Internet Engineering Electrical Engineering Hardware Technology focus Ahmed Tewfik Signa

7、l processing, wireless network David Lilja Computer Architecture, Distributed systems Carlson School of Business Business focus Bob Kauffman, Information and Decision Sciences Alok Gupta Gediminas Adomavicius,Potential Industrial Participation,EMC, StorageTek Storage Systems Seagate, Qlogic, Storage

8、 components Development and demonstration of OSD Development and demonstration of OSD Active Storage Veritas Storage Software Microsoft, Intel, IBM, Sun Micro I/O Subsystem, Network Storage System and Applications Cisco- Network Storage System Storage Networking Industry Association (SNIA) Involveme

9、nt with Technical Working Groups Contact with leading-edge storage and networking companies Help and guidance for useful projects,Changes - Technology,Intelligent devicesStorage capacity Ubiquitous connectionhigh speed IP networkwireless networkReducing costAmount of data,Changes User&Application,Us

10、er Demandanytime, anywhere accessheterogeneous/diversified user requirementgrowing needs for storage space,Emerging data-intensive applications,What is Datanomic?,In an autonomic system, processes are performed automatically in response to internal causes and influences. Our proposed approach is to

11、take a data-centric view of the system in which actions performed by, or on behalf of, a data object are taken at the direction of the data object itself. Therefore, such a system is called datanomic system.,Datanomic Computing,System behavior driven by characteristics of the dataAutomatic optimizat

12、ion to ever changing data requirements Allocate resources according to increase in demand of the data Transform data formats to support different applicationsSeamless data access from anywhere at anytime Location and context aware access to data Adaptive performance Consistent view of each users dat

13、a Independent of platforms, operating systems, and data formatsExploit active object and intelligent disk,Basic Technologies and Assumptions of Datanomic,Intelligent Storage Devices Object Storage Devices Unique Object Id Flat Object Directory + Strong Search Engine Data + Meta-data + Attributes Net

14、work Attached Storage Devices Separation of Control and Data Paths Mobility of Data, Clients and Storage Devices Wireless and Intermittent Connectivity,System Architecture,IP Network,Within a Region,Desktop,Regional Manager,Laptop,App Server,IP Network,Within a Region,Desktop,Regional Manager,Laptop

15、,App Server,IP Network,Within a Region,Desktop,Regional Manager,Laptop,App Server,IP Network,Within a Region,Desktop,Regional Manager,Laptop,App Server,Regional Organization,Partition of regions:based on physical or logical affinity Single regional manager clients Intelligent object-based storage de

16、vices,Regional component (1),Regional Manager Object metadata management Security related issues within/outside region Naming service Object replication, migration and consistency Clients and OSD devices management (including mobile clients and devices),Regional component (2),Client End users or app

17、lications that access objects within a region Client has a home region that stores important client information. The home region is allowed to move Client can move freely among region,Regional component (3),Intelligent Object-based Storage Devices OSD decides if a specific client is allowed to perfo

18、rm some operations Perform data-directed operations specified by the object itself,Coordination within a region,Coordination between regions,IP Network,Lookup(object ID/name),Research Issues,Dynamic replica managementCaching and consistency managementSecurityEfficient and robust data pathsRepresenta

19、tive applications,Challenges Large scale of RMs, devices, objects and clients Wide area environment User, data, and device mobility Solution Dynamic replica management Cooperative replication Utilize the intelligence of object and device Goal Reduce the burden of regional manager Avoid hot spot Redu

20、ce the access delay and network traffic Provide continue access when RM is unavailable,Replication Overview,How can active object help?,user/application customizationflexible functionsThree ways Object MetadataAssociated Method Data Dependent Attributes,How can intelligent device help?,What does int

21、elligent device know? Object read/write traffic Real-time device loadWhat can intelligent device do? inside region object replication when and where(device) to replicate discover neighbor devices load balance traffic to neighbors guide cross region object replication when and where(region) to replic

22、ate provide continue access when RM is down alleviate RM burden (more scalable inside one region),Role of RM,Speculative replication based on “open” request Cross region replication Backup or mirroring Distributed location service Quota Control,Consistency Management Overview,Recognize replicas as t

23、he same object Allow automatic duplication, deletion, or migration of objects Support concurrent access of the same logical object from nearby replicas Allow caching of objects at multiple levels Overcome intermittent connections,Levels of Consistency,Objects indicate desired consistency level Stron

24、g consistency global consistency at any moment using server locking Weak consistency allow temporary inconsistency using optimistic concurrency control Balancing in-between Could allow one object to split into two versions,Partition of Consistency Management Functions,Regional Managers + Intelligent

25、 Storage Devices Goals: reducing overheads enhancing concurrency Approaches: fine granularity smaller than data objects hierarchical management over RM/ISD hierarchy,Differential Updates of Objects,Optimistic concurrency control generates co-existing multiple versions of objects Update history has t

26、o be maintained until final reconciliation Full copy of individual versions consume too much storage Exploiting incremental/differential updates Existing scheme for text file and database app. Seeking more general support for various objects,Distributed Committing,Updates of compound object may invo

27、lve several referenced objects Such updates have to be performed in a transaction way Such updates also have to support versions such that rollback is possible Determine global serializability of distributed updates,Consistency Management under Mobility,Mobile Entities: Users w/ high mobility Active

28、 objects w/ less mobility Intelligent storage devices w/ less mobility Different requirements Users require quick hand-off when moving across adjacent regions Active objects & Intelligent storage devices requires least interruption of other services during the moving,General Picture,Security Issues,

29、Typically file managers are involved in all security-related functions Issuing capability, access control, revocation Excessive load on the file managers Central point of failure Attractive target of DoS attacks Devices are directly attached to the network Exposed to various potential attacks DoS, m

30、asquerading, replaying, other active/passive attacks,Security Issues,Direct interaction between client and devices Client needs a capability or credential from the RM Object Mobility Compound objects Devices need to perform additional functions Authentication, access control Traffic analysis Traffic

31、 trends or identity of the communicating party can reveal some sensitive information Merger of two companies, business trends of ISP Providing anonymity of traffic is important,Authentication,General authentication Client RM, client- device, device RM, RM RM Message authentication Messages sent from

32、 and between RMs Responses from devices Non-repudiation Preventing RM, device, client from denying their operations or commands,Access Control,Credential based ACL on the RM RM issues a credential which contains the access rights for the client This credential by the client to probe to the device hi

33、s access rights Credential usually short lived, frequent requests to RM RM has to be online for the entire system to work Identity based ACL associated with the object Client receives an identity certificate from the RM Preferred if the object is mobile Revocation difficult, changes in clients right

34、s results in large number of updates,Access Control,Compound objects The component objects could be independent objects with different access rights than the main object Could be located on different device or region,Confidentiality and Integrity,Insecure Internet communication Encryption on link ne

35、cessary Person getting physical access to the device can read and modify the objects System administrator, device thefts End to End object level encryption may be required (optional) Ensuring integrity of the traffic on the link, cache etc. is important Compound objects How to encrypt? Accessing one

36、 object might require more than one keys,Key Management and Keyword Search,Key management Merging different groups Revocation of the user Encrypted objects can reside on the device for a long time Some parts of meta-data will be encrypted How to support search operations using this meta-data Decrypt

37、ing every time will be expensive If client wants to retrieve objects that contain certain keywords RM will have to decrypt all of the relevant objects However, RM cannot always be trusted (E2E) Decryption of the objects will be expensive and unnecessary,Data Path Requirements,High performance Reduce

38、 the protocol and system software overhead Quality of service Object data delivery adapts to network condition Mobile client Gracefully handle the intermittent connection Wireless connection Optimize the frequency, power level allocation Robustness Handle failure in the data path (e.g. network failu

39、re, end system crash, etc.),Software Overhead in Data Path,Software overhead of TCP/IP in end system is two high: Multiple memory copies Protocol processing overhead Context switching Interrupt servicing The object device has limited processing power CPU bound Memory bound,Reducing Software Overhead

40、,OSD/Secure RDMA Use RDMA to achieve zero memory copy Leverage RDMA over TCP/IP Incorporate security with RDMA mechanism Integrate RDMA with TOE Exploit the caching for different clients Develop a RDMA access interface,OSD/Secure RDMA Architecture,OSD Client,OSD controller,OSD VIPL,Object Manager,Bu

41、ffers,Disk Driver,NIC,VI NIC driver,OSD Device,Application,OSD VIPL,Buffers,NIC,VI NIC driver,IP network,Quality of Service,Active object is a special application may have its own QoS requirement Latency variance bandwidth Underlying network condition unpredictable TCP is a best-effort protocol, no

42、guarantee of BWTraffic can be bursty and varied Congestion may occur How to provide the QoS for object in datanomic? How to adapt the QoS smoothly when the network condition degrades? How to allot and schedule the BW in a OSD device?,Adaptive QoS control,Collect status info of substrate network Exch

43、ange QoS info between application and substrate network Exploit application “hint” Tailor the application level data transmission based on the underlying network behavior Network level transmission also adjusts to the above application requirements,Mobility,Mobility Mobile clients (PDA, wireless and

44、 mobile users) Mobile objects Mobile storage devices Challenges Connection can be intermittent An entity can dynamically join and leave a region A transition may happen in the process of data transmission or critical operation,Wireless Connection,Limited resource in wireless connection Bandwidth, er

45、ror rate, power consumption Effective resource management Optimize frequency allocation, power levels, and beamforming of access points Adapt to changing traffic patterns and QoS requirements Exploit multiple channels,Robustness,Possible component failures in datanomic system Network failure Storage

46、 device failure Client failure Regional manager failure Maintain robustness in the face of failures Data consistency Graceful degradation Roll-back mechanisms,Representative Applications,MPEG-21-compliant applications:Meeting users heterogeneous capabilities, dynamic bandwidth changing, & display re

47、solution by:Replication of objects and compound objects in different formats and resolution.Layered Multimedia representations.On-the-fly transcoding.Media personalization and Content-based search techniques.,Representative Applications (continue),Backup strategies ( special case of replication) tha

48、t operate at multiple time scales. Potential application in the field of the medical research and data mining:Using the “methods” stored together with active data objects to generate requested statistics or discovering undefined correlations based on a large number of patient records without effecting the confidentiality of patient records.,

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1