DOC PREVIEW
Berkeley COMPSCI 294 - After the Internet

This preview shows page 1-2-3-24-25-26-27-49-50-51 out of 51 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 51 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 51 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 51 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 51 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 51 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 51 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 51 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 51 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 51 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 51 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 51 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

After the InternetMy Background in CIPCritical Infrastructure Rapidly Expanding Web of DependencyTangled InterdependenciesMultiple ConcernsMost serious issue?Concrete Examples of Threats?Vendor Perspective?Security: Often mistaken for the whole storyLet’s get technicalScalability: Achilles Heel of a Networked World?Technologies need to keep paceScalable Publish SubscribePowerPoint PresentationLarge-scale applications with similar technical requirementsPoor ScalabilityDo current technologies scale?Stock Exchange Problem: Vsync. multicast is too “fragile”With 32 processes….The problem gets worse as the system scales upWhy doesn’t anything scale?Serious issue for our scalable publish-subscribe technologyFight fire with fire!Cornell Scalability ResearchAstrolabeAstrolabe in a single domainBuild a hierarchy using a P2P protocol that “assembles the puzzle” without any servers(1) Query goes out… (2) Compute locally… (3) results flow to top level of the hierarchyHierarchy is virtual… data is replicatedSlide 30Examples?Astrolabe summaryContrast with most P2P schemesBimodal MulticastReminder: Multicast scaling issueSlide 36Slide 37Bimodal Multicast uses gossipSlide 39Slide 40Unlimited scalability!Slide 42Slide 43Good things?Bad things?The Internet “policy”Internet itself: Main weak pointThe Internet got stuck in 1985Lagging public interestBest hope?ConclusionsAfter the InternetKen BirmanProfessor, Dept. of Computer ScienceCornell UniversityMy Background in CIPProfessor at Cornell since 1982: 19 years of research on reliable, secure communications software. Author of 150 papers, 2 books… founder and CEO of two companiesMy software is used by New York and Swiss Stock Exchanges, French air traffic control system, AEGIS warshipLead 1995 DARPA ISAT study of Critical Infrastructure Assurance, recommendations used to retarget DARPA ITO programsCritical InfrastructureRapidly Expanding Web of DependencyMassive rollout underwayControl of restructured power gridNew medical information systems link hospital to other providers, reach right into the homeTelephony infrastructureFinancial systems: eMoney replaces cash!Disaster response and coordinationFuture military will be extremely dependent on information resources and solutionsTangled InterdependenciesPower GridInternetTelephonyBankingInternet Software, COTS Technology BaseMultiple ConcernsInfrastructure industries have been dangerously naïve about challenges of using Internet and computing technologies in critical ways Nationally critical information systems poorly protected, fragile, easily disruptedStems from pervasive use of COTS componentsVendors poorly motivated to address the issueYet academic research is having little impactNo sense of “excitement” or importanceFew significant technology transition successesMost serious issue?Loss of public interest and enthusiasmGovernment shares this view“It’s just software; we buy it from Microsoft”Academic researchers often seen as freeloading at taxpayer’s expenseCritical infrastructure components often look “less critical” considered in isolationTen thousand networked medical care systems would worry us, but not individual instancesConcrete Examples of Threats?Power system requires new generation of technology for preventing cascaded failures, implementing load-following power contractsIndustry requires solutions but has no idea how to build them. Technical concern “masked” by politicsDOE effort is completely inadequateThree branches of military are separately developing real-time information support tools.Scale will be orders of magnitude beyond anything ever done with Internet technologiesGoals recall the FAA’s AAS fiasco (lost $6B!)Vendor Perspective?Little interest in better security“You have zero privacy anyway. Get over it.” Scott McNealy, CEO Sun Microsystems; 1/99Gates recently suggested that perhaps MSFT needs to improve, but doesn’t have critical infrastructure in mind and didn’t point to Internet issues.Internet technology is adequate for the most commercially lucrative Web functionsBut inadequate reliability, security for other emerging needs, including CIP requirementsIssue is that market is the main driver for product evolution, and market for critical solutions is smallSecurity: Often mistaken for the whole storyEven today, most CIP work emphasizes security and denial of service attacksBut critical applications must also workCorrectlyWhen and where requiredEven when components fail or are overloadedEven when the network size grows or the application itself is used on a large scaleEven when the network is disrupted by failuresLet’s get technicalA digression to illustrate both the potential for progress but also the obstacles we confront!Scalability: Achilles Heel of a Networked World?1980’s: Client-server architectures.1 server, 10’s of simultaneous clients1990’s: Web serversSmall server cluster in a data center or farm1000’s of simultaneous clientsFirst decade of 2000?Server “geoplex”: large farms in a WAN setting10’s of 1000’s of simultaneous clientsEmergence of peer-to-peer applications: “live” collaboration and sharing of objectsWireless clients could add another factor of 10 client loadTechnologies need to keep paceWe want predictable, stable performance, reliability, security… despiteLarge numbers of usersLarge physical extent of networkIncreasing rates of infrastructure disruption (purely because of growing span of network)Wide range of performance profilesGrowth in actual volume of work applications are being asked to doScalable Publish SubscribeA popular paradigm; we’ll use it to illustrate our pointsUsed to link large numbers of information sources in commercial or military settings to even larger numbers of consumersTrack down the right serversUpdates in real-time as data changesHappens to be a top military priority, so one could imagine the government tackling it…Server clusterSubscriber must identify the best servers. Subjects are partitioned among servers hence one subscriber may need multiple connectionsPublisher offers new events to a proxy server. Subjects are partitioned among the server sets. In this example there are four partitions: blue, green, yellow and red. Server set and partition


View Full Document

Berkeley COMPSCI 294 - After the Internet

Documents in this Course
"Woo" MAC

"Woo" MAC

11 pages

Pangaea

Pangaea

14 pages

Load more
Download After the Internet
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view After the Internet and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view After the Internet 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?