1 / 14

Towards a Platform for Intelligent Activity at the Edge

This paper discusses the concept of intelligent activity at the edge of the network, focusing on the stateless call client-server request processing and reply messages. It explores the use of semantic parasites, caching at the edge, and other strategies to reduce latency and improve network performance.

stacybowen
Download Presentation

Towards a Platform for Intelligent Activity at the Edge

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Towards a Platform for Intelligent Activity at the Edge Hilarie Orman Advanced Development Group Novell, Inc.

  2. Network Service Bread and Butter: the Stateless Call Client Server Request Request Processing Reply Messages through the Internet

  3. Proxies: Semantic Parasites First Time Client Proxy Server Request Request Cached Reply Reply Reply Reduced Latency: Network Transit Server Load

  4. New Infrastructure: Caching at the Edge Client Cache Big, Overburdened Networks ISP cache Server Cache

  5. What’s in a Proxy Cache? CPU Cycles (mostly unused) RAM cached objects DNS objects Disk Space cached objects Cache Mgmt Strategy Protocol Client Protocol Server Network Stack

  6. Even More Parasitic Semantics First Time Client Proxy Server Request Request Servlet Execution Env Servlet Reply Reply Data Proxy Computed Reply Servlet Data

  7. Application and ProtocolSemantic Hooks • Redirect (instructs client to issue a new request • Add auxiliary data to context (the infamous cookie) • Embed requests in content (embedded URL’s) • Executable content

  8. Implicit Service Invocation Request Data Client Proxy Server Request Request F(req)= G(rep)= Reply Reply Data Reply Proxy Computed Reply

  9. Request Data Client Proxy Proxy Request Server Request Request F(req)= G(rep)= F(req)= G(rep)= Reply Reply Reply Proxy Computed Reply Reply Data Content Adaptation Content Transducer

  10. What Should Be in anEdge Services Box? Affinity Service Name Resolution Persona Mgmt Ad Barter Extensible Execution Environment • Service Loader • Library • Session Control RAM cached objects DNS objects Disk Space cached objects CPU Cycles Cache Mgmt Strategy Protocol Client Protocol Server Network Stack

  11. Example: Content Fast PathNo DNS, no redirection Request Data rtp://www.blockbuster.com/toystory3.mpg $5 Service type Stateless data Cost function FAST PROXY Begin fill from cache Continue fill by real-time redirection to lowest latency content server with $5 QoS

  12. Example: Security Services Http://f/r.htm Proxy Content Authority Access Control List r.htm - joe Https://f/r.htm SSL mutual authentication “joe” Content Cache Authentication Authority Encrypted Content //f/r.htm Authn Enforce joe

  13. Service Injection at the Edge • Scalable: log(n) edge devices • Fewer nodes to upgrade • Fewer organizations to agree to standards • Minimizes compatibility problems • Closer to provisioned services • Bandwidth SLA’s • Switches (levels 3 through 6) • Location independent security

More Related