METADATA SYNCHRONIZATION PROTOCOL FOR A DECENTRALIZED NETWORK OF DATA PROVIDERS

Size: px
Start display at page:

Download "METADATA SYNCHRONIZATION PROTOCOL FOR A DECENTRALIZED NETWORK OF DATA PROVIDERS"

Transcription

1 METADATA SYNCHRONIZATION PROTOCOL FOR A DECENTRALIZED NETWORK OF DATA PROVIDERS ACK CYFRONET AGH, Kraków, Poland AGH University of Science and Technology, Kraków, Poland Faculty of Computer Science, Electronics and Telecommunications Department of Computer Science Łukasz Opioła Łukasz Dutka Renata G. Słota Jacek Kitowski

2 AGENDA Global data access for modern science Challenges of global data access Metadata synchronization protocol - requirements Proposed concept of metadata synchronization protocol Conclusions

3 GLOBAL DATA ACCESS FOR MODERN SCIENCE GROUP 2 GROUP 3 GROUP 1

4 CHALLENGES OF GLOBAL DATA ACCESS GROUP 2 GROUP 3 GROUP 1

5 CHALLENGES OF GLOBAL DATA ACCESS Transparent data access GROUP 2 Bob GROUP 3 GROUP 1 Bob

6 CHALLENGES OF GLOBAL DATA ACCESS Transparent data access GROUP 2 Cross-border collaboration Bob Alice GROUP 3 GROUP 1 Bob

7 CHALLENGES OF GLOBAL DATA ACCESS Transparent data access GROUP 2 Cross-border collaboration Security & efficiency Bob Alice GROUP 3 GROUP 1

8 CHALLENGES OF GLOBAL DATA ACCESS Transparent data access GROUP 2 Cross-border collaboration Security & efficiency Bob Alice Openness of the network GROUP 3 GROUP 1 James GROUP 4

9 CHALLENGES OF GLOBAL DATA ACCESS Transparent data access GROUP 2 Cross-border collaboration Security & efficiency Openness of the network!!!! GROUP 3 Autonomy (lack of trust) GROUP 1!! GROUP 4

10 CHALLENGES OF GLOBAL DATA ACCESS Transparent data access GROUP 2 Cross-border collaboration Security & efficiency Openness of the network GROUP 3 Autonomy (lack of trust) GROUP 1 Reflecting existing hierarchies GROUP 4

11 METADATA SYNCHRONIZATION PROTOCOL

12 METADATA SYNCHRONIZATION GROUP 2 GROUP 3 GROUP 1 GROUP 4

13 METADATA SYNCHRONIZATION - REQUIREMENTS Decentralized (retaining autonomy) Globally consistent Scalable hundreds of providers Secure decentralized AAI* Location discovery mechanisms * AAI authentication and authorization infrastructure

14 PROPOSED SOLUTION Metadata synchronization protocol based on hybrid, multi-tier architecture

15 PROPOSED SOLUTION PROVIDER SCOPE Provider service basic building block Gathers knowledge using metadata sync Manages data on underlying storages AAI Authentication and Authorization Infrastructure

16 PROPOSED SOLUTION ZONE SCOPE Zone service oversees a group of providers Gathers and serves metadata Trusted authority & mediator AuthN & AuthZ center Macaroon based tokens Reflects existing hierarchies

17 PROPOSED SOLUTION GLOBAL SCOPE Cooperation between Zones hybrid architecture ZONE A Decentralized, P2P backbone ZONE B Local authority center Local authority center PROVIDER 1 PROVIDER 2 PROVIDER 3

18 PROPOSED SOLUTION METADATA SYNC Metadata handled by the Zone of origin local AuthN & AuthZ center ZONE A AAI CREATE / UPDATE / DELETE AAI ZONE B READ READ CREATE / UPDATE / DELETE CREATE / UPDATE / DELETE READ PROVIDER 1 PROVIDER 2 PROVIDER 3 No concurrent modification conflicts Metadata sync overheads evenly distributed

19 PROPOSED SOLUTION METADATA SYNC Multi-tier client-server architecture ZONE A ZONE B PROVIDER 2 PROVIDER 1 PROVIDER 3 web interface native client web interface

20 PROPOSED SOLUTION METADATA SYNC Publish / subscribe and multi-tier caching Vast performance improvement ZONE A FETCH & SUBSCRIBE CACHE ZONE B CACHE USER META FETCH & SUBSCRIBE USER META CACHE USER META FETCH & SUBSCRIBE PROVIDER 2 USER META PROVIDER 1 FETCH & SUBSCRIBE PROVIDER 3 CACHE FETCH & SUBSCRIBE USER META CACHE web interface native client web interface

21 PROPOSED SOLUTION METADATA SYNC Publish / subscribe and multi-tier caching Eventual consistency MODIFIED ZONE A CACHE ZONE B PUBLISH PUBLISH PUBLISH CACHE CACHE PROVIDER 2 PUBLISH PROVIDER 1 PROVIDER 3 CACHE PUBLISH CACHE web interface native client web interface

22 PROPOSED SOLUTION AAI Macaroon-based decentralized authorization ZONE A FETCH & SUBSCRIBE ZONE B DISCOVERY MECHANISM FETCH & SUBSCRIBE PROVIDER 2 PROVIDER 1 FETCH & SUBSCRIBE PROVIDER 3 location public bd3f798c749b TOKEN <caveats> sig a7e108fa16baeffab0 web interface native client web interface

23 PROPOSED SOLUTION ZONE MODE A) Open B) Restricted C) Isolated

24 METADATA SYNC PROTOCOL IN GLOBAL DATA ACCESS GROUP 2 ZONE 2 GROUP 3 ZONE 3 GROUP 1 ZONE 1 GROUP 4 ZONE 4

25 CONCLUSIONS Global data access can be achieved by creating a decentralized network of data providers We propose a metadata synchronization protocol for such network, based on hybdrid, multi-tier architecture with P2P backbone Proposed concept is being implemented in Onedata, a distributed virtual file system Zone service acting as central authority and SP server Synchronization Protocol (SP) for single zone scope Macaroon based AAI for single zone scope Data provider service employing the SP Cross Zone cooperation support Sync protocol supporting global, cross zone scale

26 THANK YOU The CGW'18, authorsoctober gratefully22-24, acknowledge KRAKÓW the financial support of this work from AGH-UST

Decentralized Control of Large-Scale Distributed System

Decentralized Control of Large-Scale Distributed System Decentralized Control of Large-Scale Distributed System Mario Südholt Département Informatique, Mines Nantes IMT Colloquium; March 26, 2014 Outline Large-scale software systems 1 Large-scale software systems

More information

Unit 8 Peer-to-Peer Networking

Unit 8 Peer-to-Peer Networking Unit 8 Peer-to-Peer Networking P2P Systems Use the vast resources of machines at the edge of the Internet to build a network that allows resource sharing without any central authority. Client/Server System

More information

UMA and Dynamic Client Registration. Thomas Hardjono on behalf of the UMA Work Group

UMA and Dynamic Client Registration. Thomas Hardjono on behalf of the UMA Work Group UMA and Dynamic Client Registration Thomas Hardjono on behalf of the UMA Work Group 1 UMA is... A web protocol that lets you control authorization of data sharing and service access made on your behalf

More information

Single Sign-On Architectures. Jan De Clercq Senior Member of Technical Staff Technology Leadership Group Hewlett-Packard

Single Sign-On Architectures. Jan De Clercq Senior Member of Technical Staff Technology Leadership Group Hewlett-Packard Single Sign-On Architectures Jan De Clercq Senior Member of Technical Staff Technology Leadership Group Hewlett-Packard Agenda Trusted Security Infrastructures SSO: What and Why? SSO Architectures Extending

More information

irods for Data Management and Archiving UGM 2018 Masilamani Subramanyam

irods for Data Management and Archiving UGM 2018 Masilamani Subramanyam irods for Data Management and Archiving UGM 2018 Masilamani Subramanyam Agenda Introduction Challenges Data Transfer Solution irods use in Data Transfer Solution irods Proof-of-Concept Q&A Introduction

More information

Distributed Databases

Distributed Databases Distributed Databases Chapter 21, Part B Database Management Systems, 2 nd Edition. R. Ramakrishnan and Johannes Gehrke 1 Introduction Data is stored at several sites, each managed by a DBMS that can run

More information

Cooperative Secondary Authorization Recycling

Cooperative Secondary Authorization Recycling Cooperative Secondary Authorization Recycling Qiang Wei, Matei Ripeanu, Konstantin Beznosov Laboratory for Education and Research in Secure Systems Engineering (lersse.ece.ubc.ca) University of British

More information

Qualifying exam: operating systems, 1/6/2014

Qualifying exam: operating systems, 1/6/2014 Qualifying exam: operating systems, 1/6/2014 Your name please: Part 1. Fun with forks (a) What is the output generated by this program? In fact the output is not uniquely defined, i.e., it is not always

More information

Announcements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris

Announcements.  me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,

More information

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 1 Introduction Modified by: Dr. Ramzi Saifan Definition of a Distributed System (1) A distributed

More information

irods - An Overview Jason Executive Director, irods Consortium CS Department of Computer Science, AGH Kraków, Poland

irods - An Overview Jason Executive Director, irods Consortium CS Department of Computer Science, AGH Kraków, Poland irods - An Overview Jason Coposky @jason_coposky Executive Director, irods Consortium CS3 2018 Department of Computer Science, AGH Kraków, Poland 1 What is irods irods is Distributed Open source Metadata

More information

THE COMPARISON OF PARALLEL SORTING ALGORITHMS IMPLEMENTED ON DIFFERENT HARDWARE PLATFORMS

THE COMPARISON OF PARALLEL SORTING ALGORITHMS IMPLEMENTED ON DIFFERENT HARDWARE PLATFORMS Computer Science 14 (4) 2013 http://dx.doi.org/10.7494/csci.2013.14.4.679 Dominik Żurek Marcin Pietroń Maciej Wielgosz Kazimierz Wiatr THE COMPARISON OF PARALLEL SORTING ALGORITHMS IMPLEMENTED ON DIFFERENT

More information

Enhancing and Extending Microsoft SharePoint 2013 for Secure Mobile Access and Management

Enhancing and Extending Microsoft SharePoint 2013 for Secure Mobile Access and  Management SharePoint 2013 and Colligo Apps Enhancing and Extending Microsoft SharePoint 2013 for Secure Mobile Access and Email Management SharePoint 2013 is the latest release of Microsoft s leading business collaboration

More information

Towards the Performance Visualization of Web-Service Based Applications

Towards the Performance Visualization of Web-Service Based Applications Towards the Performance Visualization of Web-Service Based Applications Marian Bubak 1,2, Wlodzimierz Funika 1,MarcinKoch 1, Dominik Dziok 1, Allen D. Malony 3,MarcinSmetek 1, and Roland Wismüller 4 1

More information

Routing Basics ISP/IXP Workshops

Routing Basics ISP/IXP Workshops Routing Basics ISP/IXP Workshops 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 addresses are 32 bits long range from 1.0.0.0 to

More information

Computing and Informatics, Vol. 37, 2018, 1 22, doi: /cai

Computing and Informatics, Vol. 37, 2018, 1 22, doi: /cai Computing and Informatics, Vol. 37, 2018, 1 22, doi: 10.4149/cai 2018 1 1 TWO-LAYER LOAD BALANCING FOR ONEDATA SYSTEM Lukasz Opio la, Lukasz Dutka, Micha l Wrzeszcz AGH University of Science and Technology

More information

Sentinet for Windows Azure VERSION 2.2

Sentinet for Windows Azure VERSION 2.2 Sentinet for Windows Azure VERSION 2.2 Sentinet for Windows Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Isolated Deployment Model... 3 Collocated Deployment Model...

More information

Monitoring System for Distributed Java Applications

Monitoring System for Distributed Java Applications Monitoring System for Distributed Java Applications W lodzimierz Funika 1, Marian Bubak 1,2, and Marcin Smȩtek 1 1 Institute of Computer Science, AGH, al. Mickiewicza 30, 30-059 Kraków, Poland 2 Academic

More information

Introducing Shibboleth. Sebastian Rieger

Introducing Shibboleth. Sebastian Rieger Introducing Shibboleth Sebastian Rieger sebastian.rieger@gwdg.de Gesellschaft für wissenschaftliche Datenverarbeitung mbh Göttingen, Germany CLARIN AAI Hands On Workshop, 25.02.2009, Oxford eresearch Center

More information

BUILDING LARGE VOD LIBRARIES WITH NEXT GENERATION ON DEMAND ARCHITECTURE. Weidong Mao Comcast Fellow Office of the CTO Comcast Cable

BUILDING LARGE VOD LIBRARIES WITH NEXT GENERATION ON DEMAND ARCHITECTURE. Weidong Mao Comcast Fellow Office of the CTO Comcast Cable BUILDING LARGE VOD LIBRARIES WITH NEXT GENERATION ON DEMAND ARCHITECTURE Weidong Mao Comcast Fellow Office of the CTO Comcast Cable Abstract The paper presents an integrated Video On Demand (VOD) content

More information

Service Mesh and Microservices Networking

Service Mesh and Microservices Networking Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards

More information

Client-Server Architecture PlusUltra beyond the Blockchain

Client-Server Architecture PlusUltra beyond the Blockchain 1--------------------------------------------Table of Contents 2--------------------------------------------PlusUltra Single Sign On 3--------------------------------------------Client-Server Architecture

More information

Routing Basics. Routing Concepts. IPv4. IPv4 address format. A day in a life of a router. What does a router do? IPv4 Routing

Routing Basics. Routing Concepts. IPv4. IPv4 address format. A day in a life of a router. What does a router do? IPv4 Routing Routing Concepts IPv4 Routing Routing Basics ISP/IXP Workshops Forwarding Some definitions Policy options Routing Protocols 1 2 IPv4 IPv4 address format Internet uses IPv4 addresses are 32 bits long range

More information

Distributed Databases

Distributed Databases Distributed Databases Chapter 22, Part B Database Management Systems, 2 nd Edition. R. Ramakrishnan and Johannes Gehrke 1 Introduction Data is stored at several sites, each managed by a DBMS that can run

More information

Oracle 10g and IPv6 IPv6 Summit 11 December 2003

Oracle 10g and IPv6 IPv6 Summit 11 December 2003 Oracle 10g and IPv6 IPv6 Summit 11 December 2003 Marshal Presser Principal Enterprise Architect Oracle Corporation Agenda Oracle Distributed Computing Role of Networking IPv6 Support Plans Early IPv6 Implementations

More information

Enterprise SOA Experience Workshop. Module 8: Operating an enterprise SOA Landscape

Enterprise SOA Experience Workshop. Module 8: Operating an enterprise SOA Landscape Enterprise SOA Experience Workshop Module 8: Operating an enterprise SOA Landscape Agenda 1. Authentication and Authorization 2. Web Services and Security 3. Web Services and Change Management 4. Summary

More information

Microservices on AWS. Matthias Jung, Solutions Architect AWS

Microservices on AWS. Matthias Jung, Solutions Architect AWS Microservices on AWS Matthias Jung, Solutions Architect AWS Agenda What are Microservices? Why Microservices? Challenges of Microservices Microservices on AWS What are Microservices? What are Microservices?

More information

Introduction to Distributed Systems

Introduction to Distributed Systems Introduction to Distributed Systems Other matters: review of the Bakery Algorithm: why can t we simply keep track of the last ticket taken and the next ticvket to be called? Ref: [Coulouris&al Ch 1, 2]

More information

Introduction of Identity & Access Management Federation. Motonori Nakamura, NII Japan

Introduction of Identity & Access Management Federation. Motonori Nakamura, NII Japan Introduction of Identity & Access Management Federation Motonori Nakamura, NII Japan } IP networking } The network enables a variety type of attractive applications } Communication E-mail Video conferencing

More information

INDIGO AAI An overview and status update!

INDIGO AAI An overview and status update! RIA-653549 INDIGO DataCloud INDIGO AAI An overview and status update! Andrea Ceccanti (INFN) on behalf of the INDIGO AAI Task Force! indigo-aai-tf@lists.indigo-datacloud.org INDIGO Datacloud An H2020 project

More information

Gmail Integration for Salesforce and Dynamics 365

Gmail Integration for Salesforce and Dynamics 365 Gmail Integration for Salesforce and Dynamics 365 PRIVACY POLICY LAST MODIFIED: MARCH 12, 2019 2019 Introduction Welcome to Gmail Integration for Salesforce and Dynamics 365, a service provided by Akvelon,

More information

Presented By: Devarsh Patel

Presented By: Devarsh Patel : Amazon s Highly Available Key-value Store Presented By: Devarsh Patel CS5204 Operating Systems 1 Introduction Amazon s e-commerce platform Requires performance, reliability and efficiency To support

More information

Distributed Systems. Chapter 1: Introduction

Distributed Systems. Chapter 1: Introduction Distributed Systems (3rd Edition) Chapter 1: Introduction Version: February 25, 2017 2/56 Introduction: What is a distributed system? Distributed System Definition A distributed system is a collection

More information

Lamassu: Storage-Efficient Host-Side Encryption

Lamassu: Storage-Efficient Host-Side Encryption Lamassu: Storage-Efficient Host-Side Encryption Peter Shah, Won So Advanced Technology Group 9 July, 2015 1 2015 NetApp, Inc. All rights reserved. Agenda 1) Overview 2) Security 3) Solution Architecture

More information

What is peer to peer?

What is peer to peer? 1 1 1 1 1 1 1 1 0 1 0 1 0 1 What is peer to peer? PP in some sense is decentralization moving away from monolithic central hub-spoke model to the decentralized device to device or service to service model.

More information

Distributed Systems LEEC (2006/07 2º Sem.)

Distributed Systems LEEC (2006/07 2º Sem.) Distributed Systems LEEC (2006/07 2º Sem.) Introduction João Paulo Carvalho Universidade Técnica de Lisboa / Instituto Superior Técnico Outline Definition of a Distributed System Goals Connecting Users

More information

Radix - Tempo. Dan Hughes Abstract

Radix - Tempo. Dan Hughes   Abstract Radix - Tempo Monday 25 t h September, 2017 Dan Hughes www.radix.global Abstract In this paper we present a novel method for implementing a Distributed Ledger that preserves total order of events allowing

More information

Radix - Tempo. Dan Hughes

Radix - Tempo. Dan Hughes Radix - Tempo Dan Hughes 25 th September 2017 Abstract In this paper we present a novel method for implementing a Distributed Ledger that preserves total order of events allowing for the trustless transfer

More information

Designing Next-Generation Data- Centers with Advanced Communication Protocols and Systems Services. Presented by: Jitong Chen

Designing Next-Generation Data- Centers with Advanced Communication Protocols and Systems Services. Presented by: Jitong Chen Designing Next-Generation Data- Centers with Advanced Communication Protocols and Systems Services Presented by: Jitong Chen Outline Architecture of Web-based Data Center Three-Stage framework to benefit

More information

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile

More information

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003 CSE 123b Communications Software Quick announcement My office hours tomorrow are moved to 12pm Spring 2003 Lecture 10: Mobile Networking Stefan Savage May 6, 2003 CSE 123b -- Lecture 10 Mobile IP 2 Last

More information

Federated Authentication with Web Services Clients

Federated Authentication with Web Services Clients Federated Authentication with Web Services Clients in the context of SAML based AAI federations Thomas Lenggenhager thomas.lenggenhager@switch.ch Mannheim, 8. March 2011 Overview SAML n-tier Delegation

More information

Routing Concepts. IPv4 Routing Forwarding Some definitions Policy options Routing Protocols

Routing Concepts. IPv4 Routing Forwarding Some definitions Policy options Routing Protocols Routing Basics 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 Addresses are 32 bits long Range from 1.0.0.0 to 223.255.255.255 0.0.0.0

More information

Implement SAML 2.0 SSO in WLS using IDM Federation Services

Implement SAML 2.0 SSO in WLS using IDM Federation Services Implement SAML 2.0 SSO in WLS using IDM Federation Services Who we are Experts At Your Service > Over 60 specialists in IT infrastructure > Certified, experienced, passionate Based In Switzerland > 100%

More information

(h)icn Socket Library for HTTP Leveraging (h)icn socket library for carrying HTTP messages

(h)icn Socket Library for HTTP Leveraging (h)icn socket library for carrying HTTP messages (h)icn Socket Library for HTTP Leveraging (h)icn socket library for carrying HTTP messages Mauro Sardara, Luca Muscariello, Alberto Compagno Software Engineer ICNRG Interim Meeting, London, 18 th of March

More information

Common approaches to management. Presented at the annual conference of the Archives Association of British Columbia, Victoria, B.C.

Common approaches to  management. Presented at the annual conference of the Archives Association of British Columbia, Victoria, B.C. Common approaches to email management Presented at the annual conference of the Archives Association of British Columbia, Victoria, B.C. Agenda 1 2 Introduction and Objectives Terms and Definitions 3 Typical

More information

to know how and when to apply which Microsoft technology. In many cases, you can combine multiple

to know how and when to apply which Microsoft technology. In many cases, you can combine multiple Overview of Microsoft Virtualization Microsoft offers a number of virtualization technologies that administrators and infrastructure architects can use to create and administer a virtual environment. To

More information

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed. Technical Overview Technical Overview Standards based Architecture Scalable Secure Entirely Web Based Browser Independent Document Format independent LDAP integration Distributed Architecture Multiple

More information

Software Architecture Patterns

Software Architecture Patterns Software Architecture Patterns *based on a tutorial of Michael Stal Harald Gall University of Zurich http://seal.ifi.uzh.ch/ase www.infosys.tuwien.ac.at Overview Goal Basic architectural understanding

More information

Towards a Federated SOA Model in Achieving Data Interoperability in DoD. Nick Duan, Ph.D. ManTech MBI AFCEA/GMU C4I Symposium May 20, 2008

Towards a Federated SOA Model in Achieving Data Interoperability in DoD. Nick Duan, Ph.D. ManTech MBI AFCEA/GMU C4I Symposium May 20, 2008 Towards a Federated SOA Model in Achieving Data Interoperability in DoD Nick Duan, Ph.D. ManTech MBI AFCEA/GMU C4I Symposium May 20, 2008 Overview The Interoperability Challenge and Use of SOA Existing

More information

Semi-automatic Creation of Adapters for Legacy Application Migration to Integration Platform Using Knowledge

Semi-automatic Creation of Adapters for Legacy Application Migration to Integration Platform Using Knowledge Semi-automatic Creation of Adapters for Legacy Application Migration to Integration Platform Using Knowledge Jan Pieczykolan 1,2,BartoszKryza 1, and Jacek Kitowski 1,2 1 Academic Computer Center CYFRONET-AGH,

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

draft-ietf-v6ops-tunnel-loops - Update and Status

draft-ietf-v6ops-tunnel-loops - Update and Status draft-ietf-v6ops-tunnel-loops - Update and Status IETF V6OPS WG - March 31, 2011 Fred L. Templin Boeing Research & Technology fred.l.templin@boeing.com BOEING is a trademark of Boeing Management Company.

More information

Sentinet for Microsoft Azure SENTINET

Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Cloud Deployment Model... 3 Hybrid Deployment Model...

More information

Outline. INF3190:Distributed Systems - Examples. Last week: Definitions Transparencies Challenges&pitfalls Architecturalstyles

Outline. INF3190:Distributed Systems - Examples. Last week: Definitions Transparencies Challenges&pitfalls Architecturalstyles INF3190:Distributed Systems - Examples Thomas Plagemann & Roman Vitenberg Outline Last week: Definitions Transparencies Challenges&pitfalls Architecturalstyles Today: Examples Googel File System (Thomas)

More information

Chapter Outline. Chapter 2 Distributed Information Systems Architecture. Distributed transactions (quick refresh) Layers of an information system

Chapter Outline. Chapter 2 Distributed Information Systems Architecture. Distributed transactions (quick refresh) Layers of an information system Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 2 Distributed Information Systems Architecture Chapter Outline

More information

API Best Practices. Managing APIs holistically across the enterprise

API Best Practices. Managing APIs holistically across the enterprise API Best Practices Managing APIs holistically across the enterprise APIs are critical to evolving application architectures Public clouds Microservices Distributed apps μservice μservice μservice μservice

More information

PNUTS and Weighted Voting. Vijay Chidambaram CS 380 D (Feb 8)

PNUTS and Weighted Voting. Vijay Chidambaram CS 380 D (Feb 8) PNUTS and Weighted Voting Vijay Chidambaram CS 380 D (Feb 8) PNUTS Distributed database built by Yahoo Paper describes a production system Goals: Scalability Low latency, predictable latency Must handle

More information

Get into the Groove: solutions for secure and dynamic collaboration

Get into the Groove: solutions for secure and dynamic collaboration Communication & Collaboration At a glance: What is Groove? Teaming up across boundaries Groove 2007 architecture Get into the Groove: solutions for secure and dynamic collaboration Yung Chou Prerelease

More information

Blockstack, a New Internet for Decentralized Apps. Muneeb Ali

Blockstack, a New Internet for Decentralized Apps. Muneeb Ali Blockstack, a New Internet for Decentralized Apps Muneeb Ali The New Internet Problems with the traditional internet End-to-end design principle for the Internet. *1981 Saltzer, Reed, and Clark paper End-to-end

More information

E-Signature Law of Iraq no. ( 78) of 2012

E-Signature Law of Iraq no. ( 78) of 2012 INTER-REGIONAL STANDARDIZATION FORUM FOR BRIDGING THE STANDARDIZATION GAP (BSG) Muscat, Oman, 11-12 December 2017 E-Signature Law of Iraq no. ( 78) of 2012 Halah Alrubaye Projects follow-up manager, Ministry

More information

State of the Dolphin Developing new Apps in MySQL 8

State of the Dolphin Developing new Apps in MySQL 8 State of the Dolphin Developing new Apps in MySQL 8 Highlights of MySQL 8.0 technology updates Mark Swarbrick MySQL Principle Presales Consultant Jill Anolik MySQL Global Business Unit Israel Copyright

More information

The Future of the Internet

The Future of the Internet The Future of the Internet CERNET 10 th Anniversary 25 December 2004 Douglas Van Houweling, President & CEO Internet2 Congratulations! China has been an important contributor to the global high performance

More information

Using Resources of Multiple Grids with the Grid Service Provider. Micha?Kosiedowski

Using Resources of Multiple Grids with the Grid Service Provider. Micha?Kosiedowski Using Resources of Multiple Grids with the Grid Service Provider Micha?Kosiedowski Grid Service Provider The Grid Service Provider came as a result of research done within the PROGRESS project: Project

More information

Chapter Outline. Chapter 2 Distributed Information Systems Architecture. Layers of an information system. Design strategies.

Chapter Outline. Chapter 2 Distributed Information Systems Architecture. Layers of an information system. Design strategies. Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 2 Distributed Information Systems Architecture Chapter Outline

More information

Distributed Information Processing

Distributed Information Processing Distributed Information Processing 1 st Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science & Engineering Seoul National University Copyrights 2017 Eom, Hyeonsang All Rights Reserved Outline

More information

Combining Virtual Organization and Local Policies for Automated Configuration of Grid Services

Combining Virtual Organization and Local Policies for Automated Configuration of Grid Services Combining Virtual Organization and Local Policies for Automated Configuration of Grid Services Shishir Bharathi, Beom Kun Kim, Ann Chervenak, Robert Schuler USC Information Sciences Institute Abstract.

More information

SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits

SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW Decentralized platform for coordination and administration of healthcare and benefits ENABLING TECHNOLOGIES Blockchain Distributed ledgers Smart Contracts Relationship

More information

User Management. Jabber IDs

User Management. Jabber IDs Jabber IDs, page 1 IM Address Scheme, page 2 Service Discovery using Jabber IDs, page 2 SIP URI, page 3 LDAP User ID, page 3 User ID Planning for Federation, page 3 Proxy Addresses for User Contact Photos,

More information

Inside GigaSpaces XAP Technical Overview and Value Proposition

Inside GigaSpaces XAP Technical Overview and Value Proposition Inside GigaSpaces XAP Technical Overview and Value Proposition Copyright GigaSpaces. All Rights Reserved. Introduction GigaSpaces extreme Application Platform (XAP) is an enterprise application virtualization

More information

Data Replication: Automated move and copy of data. PRACE Advanced Training Course on Data Staging and Data Movement Helsinki, September 10 th 2013

Data Replication: Automated move and copy of data. PRACE Advanced Training Course on Data Staging and Data Movement Helsinki, September 10 th 2013 Data Replication: Automated move and copy of data PRACE Advanced Training Course on Data Staging and Data Movement Helsinki, September 10 th 2013 Claudio Cacciari c.cacciari@cineca.it Outline The issue

More information

Intuit Application Centric ACI Deployment Case Study

Intuit Application Centric ACI Deployment Case Study Intuit Application Centric ACI Deployment Case Study Joon Cho, Principal Network Engineer, Intuit Lawrence Zhu, Solutions Architect, Cisco Agenda Introduction Architecture / Principle Design Rollout Key

More information

Azure SQL Database. Indika Dalugama. Data platform solution architect Microsoft datalake.lk

Azure SQL Database. Indika Dalugama. Data platform solution architect Microsoft datalake.lk Azure SQL Database Indika Dalugama Data platform solution architect Microsoft indalug@microsoft.com datalake.lk Agenda Overview Azure SQL adapts Azure SQL Instances (single,e-pool and MI) How to Migrate

More information

Distributed Systems. Edited by. Ghada Ahmed, PhD. Fall (3rd Edition) Maarten van Steen and Tanenbaum

Distributed Systems. Edited by. Ghada Ahmed, PhD. Fall (3rd Edition) Maarten van Steen and Tanenbaum Distributed Systems (3rd Edition) Maarten van Steen and Tanenbaum Edited by Ghada Ahmed, PhD Fall 2017 Introduction: What is a distributed system? Distributed System Definition A distributed system is

More information

Dynamo: Amazon s Highly Available Key-Value Store

Dynamo: Amazon s Highly Available Key-Value Store Dynamo: Amazon s Highly Available Key-Value Store DeCandia et al. Amazon.com Presented by Sushil CS 5204 1 Motivation A storage system that attains high availability, performance and durability Decentralized

More information

Chapter 2 Distributed Information Systems Architecture

Chapter 2 Distributed Information Systems Architecture Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 2 Distributed Information Systems Architecture Chapter Outline

More information

SDS: A Scalable Data Services System in Data Grid

SDS: A Scalable Data Services System in Data Grid SDS: A Scalable Data s System in Data Grid Xiaoning Peng School of Information Science & Engineering, Central South University Changsha 410083, China Department of Computer Science and Technology, Huaihua

More information

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 3 Processes

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 3 Processes DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 3 Processes Context Switching Processor context: The minimal collection of values stored in the

More information

GN2 JRA5: Roaming and Authorisation

GN2 JRA5: Roaming and Authorisation GN2 JRA5: Roaming and Authorisation Jürgen Rauschenbach, DFN TF-NGN Athens 03/11/05 Introduction JRA5 builds a European Roaming Infrastructure (eduroamng) taking into account existing experience from the

More information

Report. Middleware Proxy: A Request-Driven Messaging Broker For High Volume Data Distribution

Report. Middleware Proxy: A Request-Driven Messaging Broker For High Volume Data Distribution CERN-ACC-2013-0237 Wojciech.Sliwinski@cern.ch Report Middleware Proxy: A Request-Driven Messaging Broker For High Volume Data Distribution W. Sliwinski, I. Yastrebov, A. Dworak CERN, Geneva, Switzerland

More information

Overview of Microsoft Virtualization

Overview of Microsoft Virtualization Overview of Microsoft Virtualization Microsoft offers a number of virtualization technologies that administrators and infrastructure architects can use to create and administer a virtual environment. To

More information

Oracle Streams. An Oracle White Paper October 2002

Oracle Streams. An Oracle White Paper October 2002 Oracle Streams An Oracle White Paper October 2002 Oracle Streams Executive Overview... 3 Introduction... 3 Oracle Streams Overview... 4... 5 Staging... 5 Propagation... 6 Transformations... 6 Consumption...

More information

Produced by. Design Patterns. MSc in Computer Science. Eamonn de Leastar

Produced by. Design Patterns. MSc in Computer Science. Eamonn de Leastar Design Patterns MSc in Computer Science Produced by Eamonn de Leastar (edeleastar@wit.ie)! Department of Computing, Maths & Physics Waterford Institute of Technology http://www.wit.ie http://elearning.wit.ie

More information

Differentiating Your Datacentre in the Networked Future John Duffin

Differentiating Your Datacentre in the Networked Future John Duffin Differentiating Your Datacentre in the Networked Future John Duffin Managing Director, South Asia. Uptime Institute July 2017 2017 Uptime Institute, LLC The Global Datacentre Authority 2 2017 Uptime Institute,

More information

The EGI AAI CheckIn Service

The EGI AAI CheckIn Service The EGI AAI CheckIn Service Kostas Koumantaros- GRNET On behalf of EGI-Engage JRA1.1 www.egi.eu EGI-Engage is co-funded by the Horizon 2020 Framework Programme of the European Union under grant number

More information

Building Secure and Scalable Mobile Apps on AWS

Building Secure and Scalable Mobile Apps on AWS Building Secure and Scalable Mobile Apps on AWS Dennis Hills Mobile Developer Advocate, Amazon Web Services April 20, 2017 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Agenda

More information

Fujitsu World Tour 2018

Fujitsu World Tour 2018 Fujitsu World Tour 2018 May 30, 2018 #FujitsuWorldTour 1 Copyright 2018 FUJITSU Security and Privacy of Big Data A NIST Perspective Arnab Roy Fujitsu Laboratories of America Co-Chair, NIST Big Data WG:

More information

Routing Basics. ISP Workshops. Last updated 10 th December 2015

Routing Basics. ISP Workshops. Last updated 10 th December 2015 Routing Basics ISP Workshops Last updated 10 th December 2015 1 Routing Concepts p IPv4 & IPv6 p Routing p Forwarding p Some definitions p Policy options p Routing Protocols 2 IPv4 p Internet still uses

More information

Towards a Federated SOA Model in Achieving Data Interoperability in DoD

Towards a Federated SOA Model in Achieving Data Interoperability in DoD Towards a Federated SOA Model in Achieving Data Interoperability in DoD Nick Duan, Ph.D. ManTech-MBI nduan@mcdonaldbradley.com Abstract The Department of Defense (DoD) is undergoing a progressive transformation

More information

Architecture of a Next- Generation Parallel File System

Architecture of a Next- Generation Parallel File System Architecture of a Next- Generation Parallel File System Agenda - Introduction - Whats in the code now - futures An introduction What is OrangeFS? OrangeFS is a next generation Parallel File System Based

More information

WAN-DDS A wide area data distribution capability

WAN-DDS A wide area data distribution capability 1 A wide area data distribution capability Piet Griffioen, Thales Division Naval - Above Water Systems, Netherlands Abstract- The publish-subscribe paradigm has shown many qualities to efficiently implement

More information

Chapter 3. Design of Grid Scheduler. 3.1 Introduction

Chapter 3. Design of Grid Scheduler. 3.1 Introduction Chapter 3 Design of Grid Scheduler The scheduler component of the grid is responsible to prepare the job ques for grid resources. The research in design of grid schedulers has given various topologies

More information

Transform to Your Cloud

Transform to Your Cloud Transform to Your Cloud Presented by VMware 2012 VMware Inc. All rights reserved Agenda Corporate Overview Cloud Infrastructure & Management Cloud Application Platform End User Computing The Journey to

More information

EGI-InSPIRE. GridCertLib Shibboleth authentication for X.509 certificates and Grid proxies. Sergio Maffioletti

EGI-InSPIRE. GridCertLib Shibboleth authentication for X.509 certificates and Grid proxies. Sergio Maffioletti EGI-InSPIRE GridCertLib Shibboleth authentication for X.509 certificates and Grid proxies Sergio Maffioletti Grid Computing Competence Centre, University of Zurich http://www.gc3.uzh.ch/

More information

Grid monitoring with MonAlisa

Grid monitoring with MonAlisa Grid monitoring with MonAlisa Iosif Legrand (Caltech) Iosif.Legrand@cern.ch Laura Duta (UPB) laura.duta@cs.pub.ro Alexandru Herisanu (UPB) aherisanu@cs.pub.ro Agenda What is MonAlisa? Who uses it? A little

More information

Basic vs. Reliable Multicast

Basic vs. Reliable Multicast Basic vs. Reliable Multicast Basic multicast does not consider process crashes. Reliable multicast does. So far, we considered the basic versions of ordered multicasts. What about the reliable versions?

More information

1588v2 Performance Validation for Mobile Backhaul May Executive Summary. Case Study

1588v2 Performance Validation for Mobile Backhaul May Executive Summary. Case Study Case Study 1588v2 Performance Validation for Mobile Backhaul May 2011 Executive Summary Many mobile operators are actively transforming their backhaul networks to a cost-effective IP-over- Ethernet paradigm.

More information

Distributed Systems. Prof. Dr. Schahram Dustdar Distributed Systems Group Vienna University of Technology. dsg.tuwien.ac.

Distributed Systems. Prof. Dr. Schahram Dustdar Distributed Systems Group Vienna University of Technology. dsg.tuwien.ac. Distributed Systems Prof. Dr. Schahram Dustdar Distributed Systems Group Vienna University of Technology dustdar@dsg.tuwien.ac.at dsg.tuwien.ac.at Outline 1. History 2. What is a distributed system? 3.

More information

Lecture 1: January 23

Lecture 1: January 23 CMPSCI 677 Distributed and Operating Systems Spring 2019 Lecture 1: January 23 Lecturer: Prashant Shenoy Scribe: Jonathan Westin (2019), Bin Wang (2018) 1.1 Introduction to the course The lecture started

More information

Lightstreamer. The Streaming-Ajax Revolution. Product Insight

Lightstreamer. The Streaming-Ajax Revolution. Product Insight Lightstreamer The Streaming-Ajax Revolution Product Insight 1 Agenda Paradigms for the Real-Time Web (four models explained) Requirements for a Good Comet Solution Introduction to Lightstreamer Lightstreamer

More information