540 likes | 647 Views
NINJA: A Service Architecture for Internet-Scale Systems. Randy H. Katz UMC Distinguished Professor and Chair, EECS Department University of California, Berkeley Berkeley, CA 94720-1776 randy@cs.Berkeley.edu.
E N D
NINJA: A Service Architecture for Internet-Scale Systems Randy H. Katz UMC Distinguished Professor and Chair, EECS Department University of California, Berkeley Berkeley, CA 94720-1776 randy@cs.Berkeley.edu Ninjutsu is a stealth and espionage-oriented art which saw its greatest development in the 13th to early 17th centuries in Japan. Its practitioners, the ninja, were warrior-assassin-spies; most belonged to the Iga and Koga mountain clans. They were the supreme reconnaissance experts and saboteurs of their day.
Presentation Outline • Internet-Scale Systems • A New Service Architecture • Integration of Computing and Communications • Opportunity for Cooperation • Summary and Conclusion
Presentation Outline • Internet-Scale Systems • A New Service Architecture • Integration of Computing and Communications • Opportunity for Cooperation • Summary and Conclusion
Internet-Scale Systems • Extremely large, complex, distributed, heterogeneous, with continuous and rapid introduction of new technologies • Feasible architectures • Decentralized, scalable algorithms • Dynamically deployed agents where they are needed;“Big infrastructure, small clients” • Incremental processing/communications growth • Careful violation of traditional layering • Implementation approach based on incremental prototyping, deployment, evaluation, experimentation
Emerging Communications Infrastructure of the Future • The Challenge • Network-based applications becoming increasingly service intensive • Computational resources embedded in the switching fabric • Dealing with heterogeneity, true utility functionality, security, service discovery • Computing • Legacy servers • Partition functionality for “small” clients • Communications • High bandwidth backbones plus diverse access networks • Third generation cellular systems • Home networking
Motivation: Why Can’t We ... • Control the A/V equipment in this room • Get driving directions over the phone • Affect other’s calendars directly • Screen our calls based on the caller • Control things with the interface we want • Manage/sort/search our e-mail/v-mail/fax/news intelligently Needed: Ubiquitous connectivity and intelligent processing supported by the network
NINJA: A Service Architecture that Provides ... • Tinkertoy wide-area components • Automatic discovery, composition, and use • Powerful operators: clusters, databases, and agents • Viable component economics: subscription, pay per use • Supports great devices, sensors, actuators • Connects everything: ubiquitous support for access and mobility
Units Active routers Bases NINJA Computing Platform • Information Devices (~10 Billion) • Connected Stationary Computers (~100 Million) • Scalable Servers (~Million) “Small Devices, Big Infrastructure”
NINJA Computing Infrastructure • Computing resources inside the routing topology, not just at the leaves • Paths chosen for location of operators as much as for shortest # of hops • Mobile code that specializes the services provided by servers • Mobility, management of bottleneck links, “integration” services, service handoff Server Client Proxy Router Compute Node
NINJA Builds on Berkeley’s Systems Building Expertise TranSend TACC Model Wireless Access NINJA Scalable, Secure Services Computation in the Network “Smart Spaces” as an app Event-Response Programmable Access BARWAN Wireless Overlay Networks Scalable Proxies RTPGateway Service Discovery vic, vat, wb MASH Collaboration Applications Active Services NOW/Millennium Computing Platform MASH Toolkit Active Services Model
BARWAN Wireless Overlays: Ubiquitous Connectivity Seamless mobility among local and wide-area wireless networks via vertical handoff Satellite Regional Area Low-tier High-tier Local Area Wide Area Low Mobility High Mobility
BARWAN Proxies: Scalable Support for Heterogeneous Clients $ html gif jpg $ Cache control $ Front End PTM Control Panel To Internet NOW Cluster SAN (high speed) Cache partition $ Utility (10baseT) Datatype-specific distiller ... Coordination bus
BARWAN: Support for Thin Clients • Top Gun Wingman • World’s only graphical browser for PalmPilot • Greater than 10,000 users worldwide • Top Gun MediaBoard • Combines MASH tools with proxy • Interoperates with laptops, workstations Superiority of proxy-based approach to enabling “thin” clients successfully demonstrated
Presentation Outline • Internet-Scale Systems • A New Service Architecture • Integration of Computing and Communications • Opportunity for Cooperation • Summary and Conclusion
Vertically Integrated Services Fixed composition Static deployment No reuse Mixed presentation/data Fixed UI Worse pieces Component Services Dynamic composition Rapid deployment Reuse Data only UI defined dynamically -- based on device/connection Competition at every level Vertically Integrated Services vs. Component Services
Units: sensors/actuators PDAs/SmartPhones Laptops, PCs, NCs heterogeneous Active Routers: soft-state basestations localization local mobility support Bases: highly available persistent state databases computing agents “home” base per user “global” mobility support NINJA Service Architecture:Basic Elements of the Model
NINJA Active Infrastructure “Smart Spaces” Active Routers: Active network routers Soft state Interchangeable Bases: Scalable, available servers Persistent state Service discovery Public-key infrastructure Databases Home Base User state E-mail User tracking Units: Client Devices Sensors & Actuators
Personalization Example: Thin Client Access to Legacy Server AR PDA LegacyServer Base HomeBase AR Base AR AR Unit Unit Sensor Sensor
Agent Aggregator Example: Sensor Aggregation AR PDA LegacyServer Base AR Base AR AR Unit Unit Sensor Sensor
Example: TopGun WingMan/Mediaboard Operation AR PDA LegacyServer PDA Proxy Base Image Converter Un-Zip MediaBoard PC Multicast Connector Aggregator AR Mic Camera
NINJA Service Architecture • Operators/Connectors/Interfaces • Paths • Wide-Area Paths • Interface Interconnection • Path Optimization • Services • Service Discovery • Automatic Path Generation • Example Applications • Universal remote control/smart spaces • Universal In-Box/Personal Information Management
Operators: transformation aggregation agents Connectors: abstract wires ADUs varying semantics uni/multicast Interfaces: strongly typed language independent set of AM handlers Leverage all COM objects Operators/Connectors
Wide-Area Paths • Path is a first-class entity • Explicit or automatic creation • Can change dynamically • change path or operators • Unit of authentication: delegate along the path • Unit of resource allocation
WAN Paths: Economics • Key Idea: securely delegate authority to any path component • access your e-mail remotely • authorized services (subscriptions) • authenticated sensor data • Digicash: • Pay-per-use services • Can be one-time (or subscription)
WAN Paths: Optimization • Insert operators into the path: • forward error-correction, e.g., for error-prone wireless links • compression/decompression, e.g., bandwidth constrained links • Change parameters • retransmission windows • settings for wireless or satellites • Reroute path dynamically
Connecting Interfaces • Goal: trivial to connect • can be automated • Connectors are polymorphic • wires carry a generic ADU of type T • automatic marshall/unmarshall • code must be created at instantiation • Enables automated connection and use
Interoperability • Wrapper operators for legacy servers • HotBot, Zip2, Patent server • Generic wrappers for each MIME type • Connectors use TCP, UDP, multicast • Leverage COM objects as operators • Control Excel remotely • Lots of third party components • ODBC/JDBC databases
Services • Service • Highly available program with fixed interface at a fixed location • Strongly Typed Interfaces • Multiple services of a given type compete • Compete on location, price, robustness, “quality”, brand name • Service Discovery • Find “best” service of given type
Automatic Path Creation • Query goal is path creation • Find logical path of operators • Path must type check • Place operators on nodes • Some operators have affinity • Place them first • Add connectors as needed • Create any authentication keys
Service Discovery and Use Four basic steps: • Find a local Active Router • Query Service-discovery service • Automatic path creation, including transformations • Generate UI from interface specification
Application: Universal Remote Control • Adapt device functionality to services in new environment • Beacon augmentation • Adaptive user interfaces • Composed behaviors • Deployment within our building • Light, video, slide projector, VCR, audio receiver, camera, monitor, A/V switcher control • Local DNS/NTP/SMTP servers, HTTP proxies, RTP/multicast gateways • Audited printer access • Interactive floor maps, protocols for advertising object locations • Coarse-grained user tracking Universal Interaction?
Generalization: Smart Spaces • Walk into a A/V room and control everything with your own wireless PDA • Services for each device • Automated discovery and use • Automated UI generation • Composite behaviors • Local scope, no authentication (yet) • Phones as well as PalmPilots • Speech-enabled control
Network Infrastructure Experimental Testbed Fax IBM WorkPad Image/OCR Text Speech MC-16 Ericsson CF788 Motorola Pagewriter 2000 WLAN Pager 306 Soda 405 Soda 326 Soda “Colab” GSM BTS Millennium Cluster Smart Spaces Personal Information Management Millennium Cluster
Target Applications:Personal Information Management • Universal Inbox: e-mail, news, fax, voice mail • Notification: e-mail, pager • Priorities, Folders, Search • Access: internet or telephone • Peer-to-peer calendar • Control of environment
Personal Information Management Speech-to-Voice Mail Speech-to-Voice Attached-Email Call-to-Pager/Email Notification Email-to-Speech All compositions of the above! Universal In-box Policy-based Location-based Activity-based
Presentation Outline • Internet-Scale Systems • A New Service Architecture • Integration of Computing and Communications • Opportunity for Cooperation • Summary and Conclusion
ICEBERGVision • How far can we go with a packet-switched cellular core network? • How do you provision an IP network for large numbers of voice users? • What new kinds of data-oriented services can be deployed?
Mobility Management • Mobile IP-GSM Mobility Interworking • Mobile IP-GSM authentication interworking • GSM HLR/VLR interaction in an Internet signaling context • Scalability of Mobile IP/hierarchical agents • Multicast support for mobility • Alternative approach for mobility based on M/C addresses • Exploit multicast routing to reach mobile nodes without explicit handoff • Combine with real-time delivery of voice and video • Generalized redirection agents • Policy-based redirection: e.g., 1-800 service, email to pagers, etc. • Redirection agents collocated with multicast tree branching points
Packet Scheduling • Validated VINT modeling suite for GSM media access, link layer, routing, and transport layers • GSM channel error models • Better understanding of sources of latency in cellular link and methods to circumvent this • QoS-aware High Speed Circuit Switched Data (HSCSD), General Packet Radio System (GPRS), and Wideband CDMA (W-CDMA) link scheduling • RSVP signaling integration with bottleneck link scheduling • Fairness and utilization for TCP and RTP flows • Delay bound scheduling for R/T streams • Exploiting asymmetries in downstream/upstream slot assignment, CDMA self-interference
New Services • Proxies for Telephony-Computing Integration • GSM-vat-RTP interworking: handset-computer integration • Encapsulating complex data transformations • Speech-to-text, text-to-speech • Composition of services • Voice mail-to-email, email-to-voice mail • Location-aware information services • E.g., traffic reports • Multicast-enabled information services • Multilayered multicast: increasing level of detail as number of subscribed layers increase • Demonstrate the speed and ease with which new services can be developed • Develop innovative new services at the intersection of voice and data
2-way Paging PSTN IAP IAP IAP • Iceberg Access Points (Beyond H.323 gateways) • Provide policy engine • Handle routing, security IP IAP WIP IAP Potentially Any Network Service (PANS) Same service in different networks Service handoff between networks GSM E.g., “follow me” service e.g., any-to-any service
PANS Issues • Entities: What are the endpoints? • Naming: “What’s in a name?” • Authentication: Entity to Entity authentication • Billing: Charging entities, not “lines” • Routing: QoS and cost issues • Source conversion: Text-to-Speech, etc. • Network management: Monitoring, provisioning • Intelligent terminals: Services at the terminal
Service Mobility as aFirst-Class Object Universal Names: Globally unique IDs “Randy@Berkeley” OfficePSTN (Teaching): 510-642-8778 OfficePSTN (Chair): 510-642-0253 DeskIP: dreadnaught.cs.berkeley.edu:555 LaptopIP: polo.cs.berkeley.edu:555 PCS: 510-388-8778 Cellular: 510-409-6040 E-mail: randy@cs.berkeley.edu Home: 415-777-3382 An Entity has a universal name and a profile; Entities are people or processes Profile: set of domain-specific names
Iceberg Inter-Domain Naming Protocol • Naming: • Reuse network’s local naming services • Single resolution point for universal names • Routing: • Handles inter-network signaling • Users provide policies • IDNP gatekeepers provide policy engine • IDNP provides replication and consistency control
IDNP Issues IAP Call(Randy@Berkeley, Caller’s network, Interactive, CallerID certificate) IDNP Server weeks/months Profile Policy days/weeks • Replicated Information: • Real-time? • Lazy? • Epidemic? System State IDNP Server minutes/hours
Authentication and Billing • Networks uses different mechanisms • PSTN autheticates “on-line” • GSM uses SIM card (Carrier-carrier agreement) • Original cellular networks used personal agreements • IP uses host address, X.509, etc. • Iceberg certificates - two versions • Online verification by home network (Carrier) • Offline verification by local network (Personal/Visa)
Call-Forwarding Example • Called party can change policy and profiles from any network • Secure identification of entities • IDNP handles propagation of changes • IDNP can expose domain-specific addresses or hide them for privacy • Domain-specific information exposed to apps • Interactive? • Billing policies
Presentation Outline • Internet-Scale Systems • A New Service Architecture • Integration of Computing and Communications • Opportunity for Cooperation • Summary and Conclusion
Time Travel Evaluate using today’s too expensive technology to prototype tomorrow’s systems existing technology to understand its weaknesses Design new computing systems architectures Deploy understand implementation complexities and sources of performance gain/loss Berkeley Tradition of Experimental Computing Systems Research
Internet-Scale Systems Research Group Lead the evolution of the Internet through long-term research combined with the deployment of novel real-world large-scale systems and protocols • Unify on-going and future research projects in distributed computing, network protocols, services, access, new applications • Facilitate technology transfer and standardization • Work closely with industrial partners in an open laboratory environment We would like Lucent to be a charter member