Decentralized Control of Large-Scale Distributed System
|
|
- Jack Cooper
- 5 years ago
- Views:
Transcription
1 Decentralized Control of Large-Scale Distributed System Mario Südholt Département Informatique, Mines Nantes IMT Colloquium; March 26, 2014
2 Outline Large-scale software systems 1 Large-scale software systems 2 Improving distributed control in the Cloud The Discovery initiative Capacity planning Advanced choreographies for service compositions Protocols and distributed property enforcement Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 2 / 24
3 Large-scale software systems Networks and systems Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 3 / 24
4 Large-scale software systems Networks and systems Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 3 / 24
5 Large-scale software systems Networks and systems Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 3 / 24
6 Large-scale software systems Networks and systems Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 3 / 24
7 Large-scale software systems Networks and systems Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 3 / 24
8 Large-scale software systems Large-scale software systems Large-scale software systems (we are interested in) The Web The Cloud Major questions How are they built and coordinated? New architectures and implementation mechanisms? How to ensure availability, correctness and security? Handle cross-domain functionalities (across technical and policy domains) Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 4 / 24
9 The Web Large-scale software systems Basic model: distributed coordination of services Loose coupling (Some) Well-defined, standardized interfaces REST interfaces Centralization often arises: popular services, service orchestration... Correctness, security Standards, protocols for low-level properties But: frequent violation of high-level properties Ex.: social cross-site forgery (S-CSRF) attacks Support for distributed property enforcement? Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 5 / 24
10 The Cloud Large-scale software systems Mutualize resources required by many users Many types Public (Cloudwatt, Numergy, Amazon, Google, Microsoft,...) Private, community, hybrid clouds Different service levels: IaaS, PaaS, SaaS Homogeneous environment Hardware: datacenters (up to hundreds of thousands of servers) Software: virtual environments Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 6 / 24
11 Cloud federations Large-scale software systems Mutualize resources among one or several providers Scale cloud services over geographic regions Significant centralization Problems Availability Connectivity Energy consumption ("ice clouds") Legal issues (data privacy) Alice Duke Paula Users energy footprint Bob Internet backbone Tom Dan Rob Charles Sam Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 7 / 24
12 Large-scale software systems Issues with centralized control Recap: centralized control in large-scale infrastructures Cloud: significant centralization Web: access to special servers, service orchestration Scaling issues, legal issues Issues on the system architecture level Ex.: datacenters at the edge of the backbone Implementation-level issues Ex.: centralized capacity planning in datacenters Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 8 / 24
13 Outline Improving distributed control in the Cloud 1 Large-scale software systems 2 Improving distributed control in the Cloud The Discovery initiative Capacity planning Advanced choreographies for service compositions Protocols and distributed property enforcement Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 9 / 24
14 Improving distributed control in the Cloud The Discovery initiative 1. The Discovery initiative: architecture A new architectural principle: from federated clouds... Bob Dan Alice Charles Duke Internet backbone Sam Paula Users energy footprint Tom Rob Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 10 / 24
15 DISCOVERY Network DISCOVERY Network DISCOVERY Network DISCOVERY Network DISCOVERY Network Improving distributed control in the Cloud The Discovery initiative 1. The Discovery initiative: architecture A new architectural principle:...to cooperative clouds Bob Dan Alice Charles Duke DISCOVERY Network DISCOVERY Network Sam - - Paula Users energy footprint Tom Rob Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 10 / 24
16 Improving distributed control in the Cloud Main characteristics The Discovery initiative Cooperative and autonomous management of virtual environments Manipulate virtual environments like processes in traditional OSes Localization of data and computations Key to efficiency and sustainability Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 11 / 24
17 Improving distributed control in the Cloud The Discovery initiative Locality in backbones (ex. Renater) Network state on 17 May 13 Underutilized links Redundancy Evolves in terms of points-of-presence (PoP) Potential for "close" Clouds Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 12 / 24
18 Improving distributed control in the Cloud The Discovery initiative Distributed cooperative clouds (ex. Renater) 12 A.Le bre et al. Close deployment to network infrastructure hal , version 1-26 Aug 2013 Extend network hubs with servers Dedicated to VM hosting Proportional to PoP s size Mario Südholt (IMT, Mines Nantes) Figure 2: Overlay local groups on top of the RENATER platform. in terms of number of bridge nodes to go through. Hence, the system will be able to route quickly between close groups. The routing of requests between far groups will be based on a random decision when no information are available, but oriented by the aim of going away from the request s source. This overlay will provide the basic building block of the platform, on which will which 26/3/14 are described in13 the/ 24 Decentralized control...rely higher level overlays and functionalities, IMT Coll.,
19 Improving distributed control in the Cloud Capacity planning 2. Capacity planning: virtual machines Virtual machines: software emulation of a computer Advantages Isolation Snapshotting Suspend/resume Fast live migration in a datacenter Downtime: ca. 60ms But: migration plans for large sets of VMs are costly Crucial for handling over-/underutilization Migration across datacenters? Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 14 / 24
20 VM scheduling Improving distributed control in the Cloud Capacity planning Objective: autonomously manage millions of VMs on tens of thousands of machines Limitations of current approaches because of centralization Reactivity and scalability Fault-tolerance (single point of failure) Service node Worker node Communication between nodes 1. Monitoring 3. Applying schedule 2. Computing schedule Discovery also needs new VM scheduling strategy Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 15 / 24
21 Improving distributed control in the Cloud Distributed VM scheduling Capacity planning DVMS alg.: first fully decentralized algorithm Nodes have a local view of the system Cooperation between direct neighbors to solve scheduling events Validation [Quesnel et al.: CCPE 12]} In vivo (on Grid5000): ca. 500 physical machines, 4500 VMs Simulation (using Simgrid): ca. 10K PMs, 80K VMs Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 16 / 24
22 Improving distributed control in the Cloud Advanced choreographies for service compositions 3. Management of service compositions Service compositions (e.g., for business processes) Composition programs (not manageable on large-scale) Declarative definitions: orchestrations, choreographies Service orchestration (e.g., using BPEL) Central chef d orchestra Subject to scalability issues (availability, lack of autonomy,...) S B:Item Service choreography No central orchestrator Correct implementation? Properties? B S:Sale B C:Purchase Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 17 / 24
23 Improving distributed control in the Cloud Advanced choreographies for service compositions Service choreographies with session types Session types: type-based fully distributed choreographies Global types define an interaction as a whole Projection: compilation to correct decentralized implementation Guarantee correctness properties No messages send at wrong times to wrong receiver No deadlocks From 1998 (researchers from Imperial College L., U Lisbon) Multi-party session types [POPL 08] Session-types with roles [POPL 12] Extension by security properties [Concur 12] Problems Forbidden functionalities: no race conditions Extensive rewrites for adding functionalities Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 18 / 24
24 Improving distributed control in the Cloud Aspectual session types Advanced choreographies for service compositions Extension [Tabareau et al.: Modularity 14] Larger set of functionalities (admit some race conditions) Simple and declarative adding B S:* + B C:* S B:Item + S B:Item proceed B S:* + B C:* B A:Auth A B:Retry B S:Sale B C:Purchase + + C B:Counter B C:Offer proceed + A B:Ok B L:LogData proceed a) Trade session b) Negotiation aspect c) Logging aspect d) Authentication aspect Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 19 / 24
25 1. Display UA Improving distributed control in the Cloud 4. Protocol adaptation Protocols and distributed property enforcement Ex. OAuth 2.0 Framework for the authorization of resource accesses Access by third parties without original credentials Used by all major Web, Cloud and software editors companies Facebook, Google, Microsoft, SAP... Third-Party Client (TC) User Agent (UA) 5. Grant Access 2. Fill authentication credential 4. Grant Access 3. Request Access Alice OAuth 2.0 Provider (OP) Main OAuth protocol flow Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 20 / 24
26 1. Display UA 11. Alice's Authz Code Improving distributed control in the Cloud OAuth single sign-on attacks Protocols and distributed property enforcement Use access token to access data Cloud Storage/ Identity Server (RS) Third-Party App (TA) 5. Alice's Authz Code 2. Fill authentication credential Alice Holds Alice's Authz Code from TA Chuck Initially already authenticated 7. Fill authentication credential 10. Rewrite Chuck's Authz Code with Alice's Authz Code Another Third-Party App (ATA) 6. Display UA User Agent (UA) 3. Request Access OAuth 2.0 Provider (OP) 8. Request Access User Agent (UA) 4. Alice's Authz Code 9. Chuck's Authz Code (a) Alice Authorization/Authentication with OAuth (b) Alice Session Swapping while OAuth Authentication New types of distributed attacks Single sign-on (SSO), social cross-site request forgery (S-CSRF) May involve one instance of an OAuth protocol May include several instances Problem: OAuth is a framework not a protocol Right usage has to be enforced Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 21 / 24
27 Improving distributed control in the Cloud Protocols and distributed property enforcement Distributed transformation of protocols Modifications to the protocol flows needed Dynamic modifications Over different steps/different instances of the protocols Over different levels of the software stack Ex.: session identification, state introduction Approach [Cherrueau et al.: CoudCom 13] Domain-specific framework/protocol transformation language Invasive but controled transformation of service compositions and implementations Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 22 / 24
28 Conclusion Improving distributed control in the Cloud Protocols and distributed property enforcement Centralized control (still) common and problematic Cloud architectures, capacity management, service orchestrations Discovery initiative for a cloud architecture Cooperative Clouds close to users Interest by large players: Renater, Orange... New distributed algorithms and tools for VM scheduling, service choreographies, protocol manipulations Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 23 / 24
29 Improving distributed control in the Cloud Thank you for your attention! Protocols and distributed property enforcement Questions? Further information: Ascola research team: Discovery initiative: (PI) Mario Südholt (IMT, Mines Nantes) Decentralized control... IMT Coll., 26/3/14 24 / 24
Eventuation properties and interaction contracts
Eventuation properties and interaction contracts Mario Südholt Ascola research team; Mines Nantes, Inria, Lina SCRIPT WS Vrije Universiteit Brussel, 12 Nov. 2013 Motivation 1 Motivation 2 Generalizing
More informationCloud Computing and Service-Oriented Architectures
Material and some slide content from: - Atif Kahn SERVICES COMPONENTS OBJECTS MODULES Cloud Computing and Service-Oriented Architectures Reid Holmes Lecture 20 - Tuesday November 23 2010. SOA Service-oriented
More informationFaculté Polytechnique
Faculté Polytechnique INFORMATIQUE PARALLÈLE ET DISTRIBUÉE CHAPTER 7 : CLOUD COMPUTING Sidi Ahmed Mahmoudi sidi.mahmoudi@umons.ac.be 13 December 2017 PLAN Introduction I. History of Cloud Computing and
More informationCloud I - Introduction
Cloud I - Introduction Chesapeake Node.js User Group (CNUG) https://www.meetup.com/chesapeake-region-nodejs-developers-group START BUILDING: CALLFORCODE.ORG 3 Agenda Cloud Offerings ( Cloud 1.0 ) Infrastructure
More informationCSE 5306 Distributed Systems. Course Introduction
CSE 5306 Distributed Systems Course Introduction 1 Instructor and TA Dr. Donggang Liu @ CSE Web: http://ranger.uta.edu/~dliu Email: dliu@uta.edu Phone: 817-2720741 Office: ERB 555 Office hours: Tus/Ths
More informationSecuring Cloud Computing
Securing Cloud Computing NLIT Summit, May 2018 PRESENTED BY Jeffrey E. Forster jeforst@sandia.gov Lucille Forster lforste@sandia.gov Sandia National Laboratories is a multimission laboratory managed and
More informationSAP Security in a Hybrid World. Kiran Kola
SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal
More informationCloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
More informationModule Day Topic. 1 Definition of Cloud Computing and its Basics
Module Day Topic 1 Definition of Cloud Computing and its Basics 1 2 3 1. How does cloud computing provides on-demand functionality? 2. What is the difference between scalability and elasticity? 3. What
More informationCloud Computing and Service-Oriented Architectures
Material and some slide content from: - Atif Kahn SERVICES COMPONENTS OBJECTS MODULES Cloud Computing and Service-Oriented Architectures Reid Holmes Lecture 29 - Friday March 22 2013. Cloud precursors
More informationUMA and Dynamic Client Registration. Thomas Hardjono on behalf of the UMA Work Group
UMA and Dynamic Client Registration Thomas Hardjono on behalf of the UMA Work Group 1 UMA is... A web protocol that lets you control authorization of data sharing and service access made on your behalf
More informationSecurely Access Services Over AWS PrivateLink. January 2019
Securely Access Services Over AWS PrivateLink January 2019 Notices This document is provided for informational purposes only. It represents AWS s current product offerings and practices as of the date
More informationWhy Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard
Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard In my view, Microsoft Azure is fast becoming the trusted platform of choice for SMB and Enterprise customers.
More informationStandards-based Secure Signon for Cloud and Native Mobile Agents
Standards-based Secure Signon for Cloud and Native Mobile Agents P. Dingle July 2013 1 Mobile http://www.flickr.com/photos/nataliejohnson/2776045330 2 http://www.flickr.com/photos/soo/5525383948 Mobile
More informationIn this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing,
In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing, where shared resources, data and information are provided
More informationIntroduction To Cloud Computing
Introduction To Cloud Computing What is Cloud Computing? Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,
More informationIntroduction to Cloud Computing. [thoughtsoncloud.com] 1
Introduction to Cloud Computing [thoughtsoncloud.com] 1 Outline What is Cloud Computing? Characteristics of the Cloud Computing model Evolution of Cloud Computing Cloud Computing Architecture Cloud Services:
More informationReal-world security analyses of OAuth 2.0 and OpenID Connect
Real-world security analyses of OAuth 2.0 and OpenID Connect Wanpeng Li and Chris J Mitchell 1 Agenda Single sign-on and identity management OAuth 2.0 Two case studies Security analyses OpenID Connect
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationCourse 20533B: Implementing Microsoft Azure Infrastructure Solutions
Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Course details Course Outline Module 1: Introduction to Azure This module explains cloud computing, and compares cloud computing and
More informationCourse Outline. Lesson 2, Azure Portals, describes the two current portals that are available for managing Azure subscriptions and services.
Course Outline Module 1: Overview of the Microsoft Azure Platform Microsoft Azure provides a collection of services that you can use as building blocks for your cloud applications. Lesson 1, Azure Services,
More informationCloud Computing Lecture 4
Cloud Computing Lecture 4 1/17/2012 What is Hypervisor in Cloud Computing and its types? The hypervisor is a virtual machine monitor (VMM) that manages resources for virtual machines. The name hypervisor
More informationOnline Editor for Compiling and Executing Different Languages Source Code
Online Editor for Compiling and Executing Different Languages Source Code Ratnadip Kawale 1, Pooja Soni 2,Gaurav Suryawanshi 3 & Prof.Pradip Balbudhe 4 1 VIII Sem, B.E,.CE,Suryodaya College of Engg. &
More informationUnderstanding Cloud Migration. Ruth Wilson, Data Center Services Executive
Understanding Cloud Migration Ruth Wilson, Data Center Services Executive rhwilson@us.ibm.com Migrating to a Cloud is similar to migrating data and applications between data centers with a few key differences
More informationCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm Webinar April 19,
More informationIndustry-leading Application PaaS Platform
Industry-leading Application PaaS Platform Solutions Transactional Apps Digital Marketing LoB App Modernization Services Web Apps Web App for Containers API Apps Mobile Apps IDE Enterprise Integration
More informationLecture 9: MIMD Architecture
Lecture 9: MIMD Architecture Introduction and classification Symmetric multiprocessors NUMA architecture Cluster machines Zebo Peng, IDA, LiTH 1 Introduction MIMD: a set of general purpose processors is
More informationDEEP DIVE INTO CLOUD COMPUTING
International Journal of Research in Engineering, Technology and Science, Volume VI, Special Issue, July 2016 www.ijrets.com, editor@ijrets.com, ISSN 2454-1915 DEEP DIVE INTO CLOUD COMPUTING Ranvir Gorai
More informationCS 470 Spring Virtualization and Cloud Computing. Mike Lam, Professor. Content taken from the following:
CS 470 Spring 2018 Mike Lam, Professor Virtualization and Cloud Computing Content taken from the following: A. Silberschatz, P. B. Galvin, and G. Gagne. Operating System Concepts, 9 th Edition (Chapter
More informationThe intelligence of hyper-converged infrastructure. Your Right Mix Solution
The intelligence of hyper-converged infrastructure Your Right Mix Solution Applications fuel the idea economy SLA s, SLA s, SLA s Regulations Latency Performance Integration Disaster tolerance Reliability
More informationMETADATA SYNCHRONIZATION PROTOCOL FOR A DECENTRALIZED NETWORK OF DATA PROVIDERS
METADATA SYNCHRONIZATION PROTOCOL FOR A DECENTRALIZED NETWORK OF DATA PROVIDERS ACK CYFRONET AGH, Kraków, Poland AGH University of Science and Technology, Kraków, Poland Faculty of Computer Science, Electronics
More informationCloud Computing Context. Image: T. Sridhar
Introduction to Cloud Computing Sunland Springs Village Computer Club March 2 nd, 2016 Mesa, AZ Presented and edited by Bob Samson, Faculty - Mesa Community College Cloud Computing We will be discussing:
More informationMulti Packed Security Addressing Challenges in Cloud Computing
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationDistributing OpenStack on top of a Key/Value store
Distributing OpenStack on top of a Key/Value store Jonathan Pastor (Inria, Ascola, Ecole des Mines de Nantes) PhD candidate, under the supervision of Adrien Lebre and Frédéric Desprez Journée Cloud 2015
More informationDeveloping Microsoft Azure Solutions: Course Agenda
Developing Microsoft Azure Solutions: 70-532 Course Agenda Module 1: Overview of the Microsoft Azure Platform Microsoft Azure provides a collection of services that you can use as building blocks for your
More informationINFS 214: Introduction to Computing
INFS 214: Introduction to Computing Session 13 Cloud Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing
More informationFundamental Concepts and Models
Fundamental Concepts and Models 1 Contents 1. Roles and Boundaries 2. Cloud Delivery Models 3. Cloud Deployment Models 2 1. Roles and Boundaries Could provider The organization that provides the cloud
More informationWhose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control SESSION ID: CDS-T11 Sheung-Chi NG Senior Security Consulting Manager, APAC SafeNet, Inc. Cloud and Virtualization Are Change the
More information1/10/2011. Topics. What is the Cloud? Cloud Computing
Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing
More informationCourse Outline. Developing Microsoft Azure Solutions Course 20532C: 4 days Instructor Led
Developing Microsoft Azure Solutions Course 20532C: 4 days Instructor Led About this course This course is intended for students who have experience building ASP.NET and C# applications. Students will
More informationDeveloping Microsoft Azure Solutions (MS 20532)
Developing Microsoft Azure Solutions (MS 20532) COURSE OVERVIEW: This course is intended for students who have experience building ASP.NET and C# applications. Students will also have experience with the
More information70-532: Developing Microsoft Azure Solutions
70-532: Developing Microsoft Azure Solutions Exam Design Target Audience Candidates of this exam are experienced in designing, programming, implementing, automating, and monitoring Microsoft Azure solutions.
More informationPicocenter: Supporting long-lived, mostly-idle applications in cloud environments
Picocenter: Supporting long-lived, mostly-idle applications in cloud environments Liang Zhang* James Litton Frank Cangialosi Theophilus Benson Dave Levin Alan Mislove* *Northeastern University University
More informationOverview SENTINET 3.1
Overview SENTINET 3.1 Overview 1 Contents Introduction... 2 Customer Benefits... 3 Development and Test... 3 Production and Operations... 4 Architecture... 5 Technology Stack... 7 Features Summary... 7
More informationTitle DC Automation: It s a MARVEL!
Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights
More informationUser-Managed Access (UMA)
User-Managed Access (UMA) Joni Brennan, Kantara Managing Director Eve Maler, PayPal, UMA WG chair ITU-T Q10/17 Identity Summit 10 December 2010 (feel free to send questions to @xmlgrrl) 1 Privacy is not
More informationLarge Scale Computing Infrastructures
GC3: Grid Computing Competence Center Large Scale Computing Infrastructures Lecture 2: Cloud technologies Sergio Maffioletti GC3: Grid Computing Competence Center, University
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationSecuring Your Cloud Introduction Presentation
Securing Your Cloud Introduction Presentation Slides originally created by IBM Partial deck derived by Continental Resources, Inc. (ConRes) Security Division Revision March 17, 2017 1 IBM Security Today
More informationCOMP6511A: Large-Scale Distributed Systems. Windows Azure. Lin Gu. Hong Kong University of Science and Technology Spring, 2014
COMP6511A: Large-Scale Distributed Systems Windows Azure Lin Gu Hong Kong University of Science and Technology Spring, 2014 Cloud Systems Infrastructure as a (IaaS): basic compute and storage resources
More information5 OAuth Essentials for API Access Control
5 OAuth Essentials for API Access Control Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the user in control of delegating access to an API. This allows
More informationData Centers and Cloud Computing
Data Centers and Cloud Computing CS677 Guest Lecture Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet
More informationData Centers and Cloud Computing. Slides courtesy of Tim Wood
Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationEXPERTS LIVE SUMMER NIGHT. Close your datacenter and give your users-wings
EXPERTS LIVE SUMMER NIGHT Close your datacenter and give your users-wings Stefan van der Wiele Robbert van der Zwan TSP EMS Blackbelt TSP EMS Netherlands EXPERTS LIVE SUMMER NIGHT Stefan van der Wiele
More informationDemystifying the Cloud With a Look at Hybrid Hosting and OpenStack
Demystifying the Cloud With a Look at Hybrid Hosting and OpenStack Robert Collazo Systems Engineer Rackspace Hosting The Rackspace Vision Agenda Truly a New Era of Computing 70 s 80 s Mainframe Era 90
More informationCloud Computing introduction
Cloud and Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica
More informationRA-GRS, 130 replication support, ZRS, 130
Index A, B Agile approach advantages, 168 continuous software delivery, 167 definition, 167 disadvantages, 169 sprints, 167 168 Amazon Web Services (AWS) failure, 88 CloudTrail Service, 21 CloudWatch Service,
More informationChapter 3 Virtualization Model for Cloud Computing Environment
Chapter 3 Virtualization Model for Cloud Computing Environment This chapter introduces the concept of virtualization in Cloud Computing Environment along with need of virtualization, components and characteristics
More informationData Centers and Cloud Computing. Data Centers
Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet
More informationDistributed System. Gang Wu. Spring,2019
Distributed System Gang Wu Spring,2019 Computer Systems How a single computer works? (traditional single core system) Interrupt User-level System-level Operating System How a distributed system works?
More informationCHEM-E Process Automation and Information Systems: Applications
CHEM-E7205 - Process Automation and Information Systems: Applications Cloud computing Jukka Kortela Contents What is Cloud Computing? Overview of Cloud Computing Comparison of Cloud Deployment Models Comparison
More informationAdaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia
Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia F5 EMEA Webinar Listopad 2014 Andrzej Kroczek Field Systems Engineer Today s Network and App Access: So Many Variables! LOCATIONS USERS DEVICES
More informationMoving Digital Identity to the Cloud, a Fundamental Shift in rethinking the enterprise collaborative model.
TEG Progress Update Moving Digital Identity to the Cloud, a Fundamental Shift in rethinking the enterprise collaborative model. Fulup Ar Foll Master Architect Sun Microsystems Fulup@sun.com 1 What is the
More informationResearch Challenges in Cloud Computing
Research Challenges in Cloud Computing November 7th, 2016 Cloud Computing Consultation Orange Labs 1 Orange Restricted next big things for the digital future Big Data Internet of Things Cloud g g g 21
More informationModeling & Simulation as a Service (M&SaaS)
Modeling & Simulation as a Service (M&SaaS) NASA Phase II SBIR COTR: Michael Seablom PI: Mario Bulhoes Co-I: Curt Larock, Dabrien Murphy & Steven Armentrout Corporate Overview Parabon Computation, Inc.!
More information5 reasons why choosing Apache Cassandra is planning for a multi-cloud future
White Paper 5 reasons why choosing Apache Cassandra is planning for a multi-cloud future Abstract We have been hearing for several years now that multi-cloud deployment is something that is highly desirable,
More informationTransform Your Business To An Open Hybrid Cloud Architecture. Presenter Name Title Date
Transform Your Business To An Open Hybrid Cloud Architecture Presenter Name Title Date Why You Need To Transform Your Business Public cloud performance setting new expectations for: IT speed, flexibility
More informationCato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief
Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based
More informationRELIABILITY & AVAILABILITY IN THE CLOUD
RELIABILITY & AVAILABILITY IN THE CLOUD A TWILIO PERSPECTIVE twilio.com To the leaders and engineers at Twilio, the cloud represents the promise of reliable, scalable infrastructure at a price that directly
More informationNetwork Services, Cloud Computing and Virtualization
Network Services, Cloud Computing and Virtualization Client Side Virtualization Purpose of virtual machines Resource requirements Emulator requirements Security requirements Network requirements Hypervisor
More informationTransform to Your Cloud
Transform to Your Cloud Presented by VMware 2012 VMware Inc. All rights reserved Agenda Corporate Overview Cloud Infrastructure & Management Cloud Application Platform End User Computing The Journey to
More informationLoad Balancing Algorithms in Cloud Computing: A Comparative Study
Load Balancing Algorithms in Cloud Computing: A Comparative Study T. Deepa Dr. Dhanaraj Cheelu Ravindra College of Engineering for Women G. Pullaiah College of Engineering and Technology Kurnool Kurnool
More informationSaaS. Public Cloud. Co-located SaaS Containers. Cloud
SaaS On-prem Private Cloud Public Cloud Co-located SaaS Containers APP SERVICES ACCESS TLS/SSL DNS NETWORK WAF LOAD BALANCING DNS ACCESS CONTROL SECURITY POLICIES F5 Beside the Cloud Why Get Closer to
More informationModelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer
Modelos de Negócio na Era das Clouds André Rodrigues, Cloud Systems Engineer Agenda Software and Cloud Changed the World Cisco s Cloud Vision&Strategy 5 Phase Cloud Plan Before Now From idea to production:
More informationThe IBM Platform Computing HPC Cloud Service. Solution Overview
The IBM Platform Computing HPC Cloud Service Solution Overview Industry-leading workload management 20 years managing distributed scale-out systems with 2000+ customers in many industries High performance
More informationMobile Cloud Computing
MTAT.03.262 -Mobile Application Development Lecture 8 Mobile Cloud Computing Satish Srirama, Huber Flores satish.srirama@ut.ee Outline Cloud Computing Mobile Cloud Access schemes HomeAssignment3 10/20/2014
More information5 OAuth EssEntiAls for APi AccEss control layer7.com
5 OAuth Essentials for API Access Control layer7.com 5 OAuth Essentials for API Access Control P.2 Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the
More informationSecuring Cloud Applications with a Distributed Web Application Firewall Riverbed Technology
Securing Cloud Applications with a Distributed Web Application Firewall www.riverbed.com 2013 Riverbed Technology Primary Target of Attack Shifting from Networks and Infrastructure to Applications NETWORKS
More informationCPSC 426/526. Cloud Computing. Ennan Zhai. Computer Science Department Yale University
CPSC 426/526 Cloud Computing Ennan Zhai Computer Science Department Yale University Recall: Lec-7 In the lec-7, I talked about: - P2P vs Enterprise control - Firewall - NATs - Software defined network
More informationCloud Essentials for Architects using OpenStack
Cloud Essentials for Architects using OpenStack Course Overview Start Date 5th March 2015 Duration 2 Days Location Dublin Course Code SS15-13 Programme Overview Cloud Computing is gaining increasing attention
More informationRED HAT CLOUD STRATEGY (OPEN HYBRID CLOUD) Ahmed El-Rayess Solutions Architect
RED HAT CLOUD STRATEGY (OPEN HYBRID CLOUD) Ahmed El-Rayess Solutions Architect AGENDA Cloud Concepts Market Overview Evolution to Cloud Workloads Evolution to Cloud Infrastructure CLOUD TYPES AND DEPLOYMENT
More informationThe Post-Cloud. Where Google, DevOps, and Docker Converge
The Post-Cloud Where Google, DevOps, and Docker Converge About me Principal Architect, Intel Corporation DevOps, Telemetry, PaaS, Containers, Puppies Former: VMware EMC Nicholas Weaver nicholas.weaver@intel.com
More informationDevelopment and Operations: Continuous Delivery in Practice
Development and Operations: Continuous Delivery in Practice Dr. Julie Wagner Senior UX Researcher at Fujitsu EST Copyright 2016 FUJITSU LIMITED Enchantée Studied computer science in Aachen, Germany Majored
More informationSecurity and Compliance for Office 365
Security and Compliance for Office 365 [Proofpoint has] given us our time back to focus on the really evil stuff. CISO, Global 500 Manufacturer Like millions of businesses around the world, you may be
More informationCisco Container Platform
Cisco Container Platform Pradnesh Patil Suhail Syed Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click
More informationLecture 9: MIMD Architectures
Lecture 9: MIMD Architectures Introduction and classification Symmetric multiprocessors NUMA architecture Clusters Zebo Peng, IDA, LiTH 1 Introduction A set of general purpose processors is connected together.
More information2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising
More informationZabbix on a Clouds. Another approach to a building a fault-resilient, scalable monitoring platform
Zabbix on a Clouds Another approach to a building a fault-resilient, scalable monitoring platform Preface 00:20:00 We will be discussing a few topics on how you will deploy or migrate Zabbix monitoring
More informationChallenges in Authenticationand Identity Management
Sep 05 ISEC INFOSECURITY TOUR 2017 05.09.2017, Buenos Aires, Argentina Challenges in Authenticationand Identity Management CAMINANTE NO HAY CAMINO, SE HACE CAMINO AL ANDAR 2016 SecurIT Who is MerStar?
More informationFocusStack: Orchestrating Edge Clouds Using Location-Based Focus of Attention
FocusStack: Orchestrating Edge Clouds Using Location-Based Focus of Attention Brian Amento, Bharath Balasubramanian, Robert J. Hall, Kaustubh Joshi, Gueyoung Jung, K. Hal Purdy AT&T Labs Research, Bedminster,
More informationA Comparative Study of Various Computing Environments-Cluster, Grid and Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1065
More informationLesson 14: Cloud Computing
Yang, Chaowei et al. (2011) 'Spatial cloud computing: how can the geospatial sciences use and help shape cloud computing?', International Journal of Digital Earth, 4: 4, 305 329 GEOG 482/582 : GIS Data
More informationPUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS
PUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS Jane R. Circle Manager, Red Hat Global Cloud Provider Program and Cloud Access Program June 28, 2016 WHAT WE'LL DISCUSS TODAY Hybrid clouds and multi-cloud
More information2018 Edition. Security and Compliance for Office 365
2018 Edition Security and Compliance for Office 365 [Proofpoint has] given us our time back to focus on the really evil stuff. CISO, Global 500 Manufacturer Like millions of businesses around the world,
More informationSentinet for Microsoft Azure SENTINET
Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Cloud Deployment Model... 3 Hybrid Deployment Model...
More informationDavid Bernstein June 2012
David Bernstein IEEE Cloud Standards P2300 Series Founder and Working Group Chair, European Commission FP7 einfrastructure Expert/Roadmap Group, U.S. National Institute of Standards, Cloud Computing Project
More informationOPENSTACK: THE OPEN CLOUD
OPENSTACK: THE OPEN CLOUD Anuj Sehgal (s.anuj@jacobs-university.de) AIMS 2012 Labs 04 June 2012 1 Outline What is the cloud? Background Architecture OpenStack Nova OpenStack Glance 2 What is the Cloud?
More informationMicrosoft Azure Integration and Security. Course Code: AZ-101; Duration: 4 days; Instructorled
Microsoft Azure Integration and Security Course Code: AZ-101; Duration: 4 days; Instructorled WHAT YOU WILL LEARN This course teaches IT professionals how to discover, assess, plan and implement a migration
More informationHow to return control over user data back to the user The rethink framework
How to return control over user data back to the user The rethink framework Anastasius Gavras Eurescom GmbH Online Webinar 21. June 2017 This project has received funding from the European Union s Horizon
More information