Swarm at the Edge of the Cloud. John Kubiatowicz UC Berkeley Swarm Lab September 29 th, 2013

Similar documents
Tessellation OS. Present and Future. Juan A. Colmenares, Sarah Bird, Andrew Wang, Krste Asanovid, John Kubiatowicz [Parallel Computing Laboratory]

CS Advanced Operating Systems Structures and Implementation Lecture 18. Dominant Resource Fairness Two-Level Scheduling.

Tessellation: Space-Time Partitioning in a Manycore Client OS

Global Data Plane. The Cloud is not enough: Saving IoT from the Cloud & Toward a Global Data Infrastructure PRESENTED BY MEGHNA BAIJAL

Networking Cyber-physical Applications in a Data-centric World

CS Advanced Operating Systems Structures and Implementation Lecture 2. OS Structure: Intro TDD, BDD, and all that.

Service Mesh and Microservices Networking

BUILDING A NEXT-GENERATION FIREWALL

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE

Real-Time Internet of Things

Distributed Systems Principles and Paradigms

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing

Distributed Systems Principles and Paradigms. Chapter 01: Introduction

Distributed Systems Principles and Paradigms. Chapter 01: Introduction. Contents. Distributed System: Definition.

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

Time-Awareness in the Internet of Things. ITSF 2014 Marc Weiss, NIST Consultant

Enabling Internet-of-Things (IoT) Services in MobilityFirst FIA

Overview SENTINET 3.1

CA464 Distributed Programming

Big Data - Security with Privacy

TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing

Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering

Department of Computer Science Institute for System Architecture, Operating Systems Group REAL-TIME MICHAEL ROITZSCH OVERVIEW

Title DC Automation: It s a MARVEL!

An Architecture. What the MEC? for 5G

Design of Next Generation Internet Based on Application-Oriented Networking

THE TERRASWARM RESEARCH CENTER (TSRC)

Internet 3.0: Ten Problems with Current Internet Architecture and a Proposal for the Next Generation

A Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

Stop Cyber Threats With Adaptive Micro-Segmentation. Jeff Francis Regional Systems Engineer

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

CS Advanced Operating Systems Structures and Implementation Lecture 13. Two-Level Scheduling (Con t) Segmentation/Paging/Virtual Memory

CS Advanced Operating Systems Structures and Implementation Lecture 25. Security (finished) Quantum Computing The Swarm

Research Faculty Summit Systems Fueling future disruptions

The Internet of Things and Factory of Future

Scaling Without Sharding. Baron Schwartz Percona Inc Surge 2010

CSE 5306 Distributed Systems. Course Introduction

Cisco Tetration Analytics

Software Defined Storage for the Evolving Data Center

What s the magic of real-time video streaming with hyper-low latency?

Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University)

Accelerating intelligence at the edge for embedded and IoT applications

Grid Computing Systems: A Survey and Taxonomy

2013 Cisco and/or its affiliates. All rights reserved. 1

Designing and debugging real-time distributed systems

IPv6-based Beyond-3G Networking

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

ResQ: Enabling SLOs in Network Function Virtualization

* Inter-Cloud Research: Vision

The Software Driven Datacenter

CSCI 350 Ch. 1 Introduction to OS. Mark Redekopp Ramesh Govindan and Michael Shindler

CS6453. Data-Intensive Systems: Rachit Agarwal. Technology trends, Emerging challenges & opportuni=es

Revolutionising mobile networks with SDN and NFV

Smart Grid Information Management

Example Networks on chip Freescale: MPC Telematics chip

Cisco SAN Analytics and SAN Telemetry Streaming

Presented by: B. Dasarathy OMG Real-Time and Embedded Systems Workshop, Reston, VA, July 2004

Oracle NoSQL Database Enterprise Edition, Version 18.1

Synthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE)

Internet 3.0: Ten Problems with Current Internet Architecture and Solutions for the Next Generation

The Smart Grid Security Innovation Alliance. John Reynolds October 26, 2011 Cambridge, Massachusetts

Fog Computing. ICTN6875: Emerging Technology. Billy Short 7/20/2016

Cooperative Wireless Communications. Ashutosh Sabharwal

Amigo Symposium 28 February 2008

Why Security Fails in Federated Systems

Hardware Acceleration for Tagging

QoS support for Intelligent Storage Devices

Mobile Security Fall 2011

Chapter 4. Fundamental Concepts and Models

Toward a Memory-centric Architecture

MASP Chapter on Safety and Security

Lecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday

Oracle NoSQL Database Enterprise Edition, Version 18.1

Run the business. Not the risks.

Advanced Cloud Infrastructures

Data Model Considerations for Radar Systems

Tizen apps with. Context Awareness, powered by AI. by Shashwat Pradhan, CEO Emberify

Cluster-Based Scalable Network Services

The Ubiquitous Web. Dave Raggett, W3C Technical Plenary, March /14

AN EVENTFUL TOUR FROM ENTERPRISE INTEGRATION TO SERVERLESS. Marius Bogoevici Christian Posta 9 May, 2018

Fujitsu World Tour 2018

Activity Recognition Using Cell Phone Accelerometers

Distributed Systems. Chapter 1: Introduction

Establishing Trust in Disconnected Environments, page 1

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

Panel 1 Service Platform and Network Infrastructure for Ubiquitous Services

Page 1. Quality of Service. CS 268: Lecture 13. QoS: DiffServ and IntServ. Three Relevant Factors. Providing Better Service.

Software-Defined Data Infrastructure Essentials

Data Driven Networks

GPFS Experiences from the Argonne Leadership Computing Facility (ALCF) William (Bill) E. Allcock ALCF Director of Operations

Distributed Systems. Overview. Distributed Systems September A distributed system is a piece of software that ensures that:

Functional Requirements for Grid Oriented Optical Networks

Device Discovery for Vulnerability Assessment: Automating the Handoff

FROM HPC TO THE CLOUD WITH AMQP AND OPEN SOURCE SOFTWARE

Chapter 3 Virtualization Model for Cloud Computing Environment

6LPXODWLRQÃRIÃWKHÃ&RPPXQLFDWLRQÃ7LPHÃIRUÃDÃ6SDFH7LPH $GDSWLYHÃ3URFHVVLQJÃ$OJRULWKPÃRQÃDÃ3DUDOOHOÃ(PEHGGHG 6\VWHP

How can we gain the insights and control we need to optimize the performance of applications running on our network?

CODE BLUE Sensor Networks for Emergency Response Challenges and Opportunities

Transcription:

Slide 1 John Kubiatowicz UC Berkeley Swarm Lab September 29 th, 2013

Disclaimer: I m not talking about the run- of- the- mill Internet of Things When people talk about the IoT, they often seem to be talking about a two-level system: sensor + cloud We are going to talk about a locality, bandwidth, and energy-aware system for constructing globally distributed applications Locality REALLY matters At 10 12 components (for instance), transmitting all information to and from the cloud would be impossible Slide 2

Example: a Smart Space Displays Everywhere Walls, Tables, Appliances, Smart Phones, Google Glasses. Audio Output Everywhere Inputs Everywhere Touch Surfaces Cameras/ Gesture Tracking Voice Context Tracking Who is Where What do they want Which Inputs map to which applications How do we hope to organize this complexity? Not via Stovepipe solutions! Today s typical solution! Need something more global! Sept 29th, 2013 Slide 3

An Applica>on Model Real-Time Components Channel SwarmLet ( The Application ) Transform and Archive A Swarm Application is a Connected graph of Components Globally distributed, but locality and QoS aware Avoid Stovepipe solutions through reusability Many components are Shared Services written by programmers with a variety of skill-sets and motivations Well-defined semantics and a managed software version scheme Service Level Agreements (SLA) with micropayments Many are Swarmlets written by domain programmers They care what application does, not how it does it Distributed Archival Storage Sensors with Aggregation Slide 4

Slide 5 SWARMLETs SWARMLET: a software component written by domain programmer that is easy to write but exhibits sophisticated behavior by exploiting services distributed within the infrastructure Swarmlets specify their needs in terms of humanunderstandable requirements Necessary Services, Frame rates, Minimum Bandwidths Locality, Ownership, and Micropayment parameters for sensors and/or data Swarmlets may evolve into Shared Services Programmers of Services used by Swarmlets think in terms of contracts provided to swarmlets

Mee>ng the needs of the Swarm Personal/Local Swarm Cloud Services Metropolitan Middleware Discover and Manage resource Integrate sensors, portable devices, cloud components Guarantee responsiveness, real-time behavior, throughput Self-adapt to failure and provide performance predictability Secure, high-performance, durable, available information Monetize resources when necessary: micropayments Slide 6

The Missing Link? Apps Home security/ emergency Energy- efficient home Health monitoring Unpad SWARM- OS Resources Sensors/ Input devs Actuators/ Output devs Networks Storage Computing SWARM- OS: A mediation layer that discovers resources and connects them with applications Slide 7

Slide 8 The Cell Model for Swarm Components

A Resource- Centric Approach: Guaranteeing Resources What might we want to guarantee? Guarantees of BW (say data committed to Cloud Storage) Guarantees of Requests/Unit time (DB service) Guarantees of Latency to Response (Deadline scheduling) Guarantees of maximum time to Durability in cloud Guarantees of total energy/battery power available to Cell What level of guarantee? Firm Guarantee (Better than existing systems) With high confidence (specified), Maximum deviation, etc. What does it mean to have guaranteed resources? A Service Level Agreement (SLA) Impedance-mismatch problem The SLA guarantees properties that programmer/user wants The resources required to satisfy SLA are not things that programmer/user really understands Slide 9

Slide 10 New Abstrac>on: the Cell Properties of a Cell A user-level software component with guaranteed resources Has full control over resources it owns ( Bare Metal ) Contains a set of secured channel endpoints to other Cells Contains a security context which may protect and decrypt information When mapped to the hardware, a cell gets: Gang-schedule hardware thread resources ( Harts ) Guaranteed fractions of other physical resources DRAM, Cache partitions, memory bandwidth, power Guaranteed fractions of system services Predictability of performance Ability to model performance vs resources Ability for user-level schedulers to better provide QoS

Applica>ons Composed of Interconnected Cells Real-Time Cells (Audio, Video) Component-based model of computation Applications consist of interacting components Components may be local or remote Communication impacts Security and Performance Channels are points at which data may be compromised Channels define points for QoS constraints Naming process for initiating endpoints Need to find compatible remote services Continuous adaptation: links changing over time! Secure Channel Secure Channel Core Application Secure Channel Parallel Library Secure Channel External Services File Service Slide 11

Slide 12 Example: Cells on Mul>core via Space- Time Par>>oning Space Time Spatial Partition: Performance isolation Each partition receives a vector of basic resources A number HW threads Chunk of physical memory A portion of shared cache A fraction of memory BW Shared fractions of services Partitioning varies over time Fine-grained multiplexing and guarantee of resources Resources are gang-scheduled Controlled multiplexing, not uncontrolled virtualization Partitioning adapted to the system s needs

Secure Cell: Trusted Swarm PlaKorm Decrypt Encrypt Signature, Policy Version, GUID Signature, Policy Version, GUID External Data Encrypted All The Time Distributed Public Key Infrastructure Only decrypted in Data Jails (trusted platform) Build in hardware or in software with secure attestation Data leaving cell automatically reencrypted Trusted Platform given keys to do its work Keys never given out to application software Similar idea: Hardware micropayment support Slide 13

What would this mean for the Swarm? Where are Cells in the swarm? In the Cloud and Fog at the edges of the cloud Mobile devices with significant processing What about Sensors or Actuators? Very little processing, but ability to provide guarantees could be quite important QoS in form of probabilistic guarantees Resistance to denial of service What about the network? Is it a Service? Probabilistic guarantees? Wireless channel reservation? Flow-level guarantees (AVB)? Is there a minimal hardware base for swarm integration? QoS enforcement, Secure Cell, Network guarantees Slide 14

Slide 15 Resource Distribu>on and Adapta>on

Resource Discovery and Ontology Dynamically discover resources, services, and cyber-physical components (sensors/actuators) that meet application requirements Find local components that meet some specification Use ontology to describe exactly what component do Distribute these resources (or fractions of services) to application cells in order to meet QoS requirements Many partial solutions out there, no complete solutions Must deal with locality (discover local items) while at same time dealing with remote (global) services Must gracefully handle failover of components One important aspect is that resources must be handed out only to authorized users Authorization can involve ownership, micropayments, etc.. Slide 16

Sibling Broker Parent Broker Local Broker Brokering Service: The Hierarchy of Ownership Child Broker Discover Resources in Domain Devices, Services, Other Brokers Resources self-describing? Allocate and Distribute Resources to Cells that need them Solve Impedance-mismatch problem Dynamically optimize execution Hand out Service-Level Agreements (SLAs) to Cells Deny admission to Cells which violate existing agreements Complete hierarchy World graph of applications Slide 17

Example: Convex alloca>on (PACORA) Convex Optimization with Online Application Performance Models Penalty 1 Speech Recognition System Penalty Allocations 2 Continuously minimize the penalty of the system (subject to restrictions on the total amount of resources) Penalty 2 Penalty i Response Time 1 Response Time 2 Response Time i Response Time 1 ( (0,1),, (n- 1,1) ) Stencil Response Time 2 ( (0,2),, (n- 1,2) ) Graph Traversal Response Time i ( (0,i),, (n- 1,i) ) Set of Running Applications Slide 18

Example: Feedback alloca>on Utilize dynamic control loops to fine-tune resources Example: Video Player interaction with Network Server or GUI changes between high and low bit rate Goal: set guaranteed network rate: Alternative: Application Driven Policy Static models Let network choose when to decrease allocation Application-informed metrics such as needed BW Slide 19

Slide 20 The Internet for the Internet of Things

Slide 21 DataCentric Vision Hardware resources are a commodity Computation resource fails? Get another Sensor fails? Find another Change your location? Find new resources All that really matters is the information Integrity, Privacy, Availability, Durability Hardware to prevent accidental information leakage Permanent state handled by Universal Data Storage, Distribution, and Archiving We need a new Internet for the Internet of Things Communication and Storage are really duals Why separate them?

Slide 22 Universal Data: The Great Integrator Cloud Services Universal Data Plane: Archival Storage and Opimized Streaming Personal Cache Aggregate/Filter Universal Tivo

Slide 23 Internet for the Internet of Things Duality between communication and storage Why explicitly distinguish them? The Data Grid equivalent to the Power Grid All data is is read-only and time stamped at the time that it enters the grid and preserved as long as it stays in the grid Provide a large flat namespace for routing to endpoints independent of their location Endpoints can be services, sensors, or archival objects Automatically locate close objects with given endpoint (when there are multiple of them such as cached read-only data) Dynamic Optimization: Gain advantages normally available only to large internet providers Generate optimized multicast networks when necessary Construct content distribution networks (CDNs) on the fly Security, authentication, privacy, micropayments

Conclusion Advance the Swarm by making it easy for programmers to construct applications Distributed application model focused on QoS, micropayments, stable services Sophisticated applications built with Swarmlets Cell Model User-Level Resource Container with guaranteed resources Hardware-Enforced Security Context Dynamic Resource Discovery, Brokerage, Optimization Universal Data Plane Provide a better Internet for the Internet of Things Security, dynamic optimization, caching, archival storage Tessellation OS: http://tessellation.cs.berkeley.edu SwarmLab: http://swarmlab.eecs.berkeley.edu Slide 24