August 2009 Volume 34 Number 4

Total Page:16

File Type:pdf, Size:1020Kb

August 2009 Volume 34 Number 4 AUGUST 2009 VOLUME 34 NUMBER 4 OPINION Musings 2 Rik Farrow FILE SYSTEMS Cumulus: Filesystem Backup to the Cloud 7 Michael VR able, SteFan SaVage, and geoffrey M. VoelkeR THE USENIX MAGAZINE PROGRAMMinG Rethinking Browser Performance 14 leo MeyeRoVich Programming Video Cards for ­Database Applications 21 tiM kaldewey SECURITY Malware to Crimeware: How Far Have They Gone, and How Do We Catch Up? 35 daVid dittRich HARDWARE A Home-Built NTP Appliance 45 Rudi Van dRunen CoLUMns Practical Perl Tools: Scratch the ­Webapp Itch with CGI::Application, Part 1 56 daVid n. blank-edelMan Pete’s All Things Sun: T Servers—Why, and Why Not 61 PeteR baeR galVin iVoyeur: Who Invited the Salesmen? 67 daVe JoSePhSen /dev/random 71 RobeRt g. Ferrell BooK REVIEWS Book Reviews 74 elizabeth zwicky et al. USEniX NOTES USENIX Lifetime Achievement Award 78 STUG Award 79 USENIX Association Financial Report for 2008 79 ellie young Writing for ;login: 83 ConfERENCES NSDI ’09 Reports 84 Report on the 8th International Workshop on Peer-to-Peer Systems (IPTPS ’09) 97 Report on the First USENIX Workshop on Hot Topics in Parallelism (HotPar ’09) 99 Report on the 12th Workshop on Hot Topics in Operating Systems (HotOS XII) 109 The Advanced Computing Systems Association aug09covers.indd 1 7.13.09 9:21:47 AM Upcoming Events 22n d ACM Sy M p o S i u M o n op e r A t i n g Sy S t e ms 7t H uSENIX Sy M p o S i u M o n ne t w o r k e d Sy S t e ms prinCipleS (SoSp ’09) de S i g n A n d iM p l e M e n t A t i o n (nSDI ’10) Sponsored by ACM SIGOPS in cooperation with USENIX Sponsored by USENIX in cooperation with ACM SIGCOMM and OCTOBER 11–14, 2009, BIG SKY, MT, USA ACM SIGOPS http://www.sigops.org/sosp/sosp09/ April 28–30, 2010, San Jose, CA, USA http://www.usenix.org/nsdi10 Submissions due: October 2, 2009 23r d lA r g e in S t A l l A t i o n Sy S t e M Ad M i n i S t r A t i o n Co n f e r e n C e (LISA ’09) 2n d uSENIX wo r k sh o p o n Ho t to p i cs in Sponsored by USENIX and SAGE in cooperation with LOPSA pA r A l l e l i sm (Ho t pA r ’10) NOvember 1–6, 2009, BALTIMORE, MD, USA June 14–15, berkeley, CA, USA http://www.usenix.org/lisa09 http://www.usenix.org/hotpar10 Submissions due: January 24, 2010 Sy M p o S i u M o n Co M p u t e r -Hu ma n in t e r ac t i o n f o r MA n A g e M e n t o f in f o r ma t i o n te ch n o l o g y uSENIX Co n f e r e n C e o n we b Ap p l i ca t i o n (CHiMIT 09) de v e l o p M e n t (we b Ap p S ’10) Sponsored by ACM in association with USENIX Co-located with USENIX ’10 NOvember 7–8, 2009, BALTIMORE, MD, USA June 20–25, 2010, Boston, MA, USA http://www.chimit09.org/ http://www.usenix.org/webapps10 Submissions due: January 11, 2010 ACM/IFIP/uSENIX 10t H in t e r n A t i o n A l Mi d d l e w A r e Co n f e r e n C e 2010 uSENIX An n u A l te ch n i ca l Co n f e r e n C e NOv. 30–Dec. 4, 2009, Urbana Champaign, IL (uSENIX ’10) http://middleware2009.cs.uiuc.edu/ June 20–25, 2010, boston, MA, USA 8t H uSENIX Co n f e r e n C e o n fi l e A n d St o r A g e 19t H uSENIX Se C u r i t y Sy M p o S i u M te ch n o l o g i e S (fASt ’10) (uSENIX Se C u r i t y ’10) Sponsored by USENIX in cooperation with ACM SIGOPS august 9–13, 2010, washington, D.C. february 23–26, 2010, San Jose, CA , USA http://www.usenix.org/fast10 Submissions due: September 10, 2009 9t H uSENIX Sy M p o S i u M o n op e r A t i n g Sy S t e ms de S i g n A n d iM p l e M e n t A t i o n (oSDI ’10) october 4–6, 2010, Vancouver, B.C. For a complete list of all USENIX & USENIX co-sponsored events, see http://www.usenix.org/events. aug09covers.indd 2 7.13.09 9:21:48 AM OPINION Musings 2 RIk Farrow FILE SYSTEMS Cumulus: Filesystem Backup to the Cloud 7 Michael Vrable, stefan Savage, and Geoffrey M. Voelker PROGRAMMinG Rethinking Browser Performance 14 Leo MEyerovich Programming Video Cards for Database contents Applications 21 Tim KaldEwEy SECURITY Malware to Crimeware: How Far Have They Gone, and How Do We Catch Up? 35 David dIttrich HARDWARE A Home-Built NTP Appliance 45 RudI VAN dRunen CoLUMns Practical Perl Tools: Scratch the Webapp Itch with CGI::Application, Part 1 56 David N. Blank-Edelman VOL. 34, #4, August 2009 Pete’s All Things Sun: T Servers—Why, and Why Not 61 ;login: is the official Editor PEtER Baer Galvin Rik Farrow magazine of the [email protected] USENIX Association. iVoyeur: Who Invited the Salesmen? 67 Managing Editor ;login: (ISSN 1044-6397) is Dave JOsEPhsEN published bi-monthly by the Jane-Ellen Long /dev/random 71 [email protected] USENIX Association, 2560 Ninth Street, Suite 215, RObert G. Ferrell Copy Editor Berkeley, CA 94710. Steve Gilmartin [email protected] $90 of each member’s annual BooK REVIEWS dues is for an annual sub- Book Reviews 74 produCtion scription to ;login:. Subscrip- ElizAbEth zwicky Et al. Casey Henderson tions for nonmembers are Jane-Ellen Long $125 per year. Jennifer Peterson USEniX NOTES USENIX Lifetime Achievement Award 78 Periodicals postage paid at typEsEttEr Berkeley, CA, and additional STUG Award 79 Star Type offices. [email protected] USENIX Association Financial Report POSTMASTER: Send address for 2008 79 USEniX assoCiation changes to ;login:, 2560 Ninth Street, USENIX Association, Ellie Young Suite 215, Berkeley, 2560 Ninth Street, Writing for ;login: 83 California 94710 Suite 215, Berkeley, Phone: (510) 528-8649 CA 94710. FAX: (510) 548-5738 ConfERENCES NSDI ’09 Reports 84 ©2009 USENIX Association http://www.usenix.org Report on the 8th International Workshop http://www.sage.org USENIX is a registered trade- mark of the USENIX Associa- on Peer-to-Peer Systems (IPTPS ’09) 97 tion. Many of the designations Report on the First USENIX Workshop on used by manufacturers and sellers to distinguish their Hot Topics in Parallelism (HotPar ’09) 99 products are claimed as trade- Report on the 12th Workshop on Hot Topics marks. USENIX acknowledges all trademarks herein. Where in Operating Systems (HotOS XII) 109 those designations appear in this publication and USENIX is aware of a trademark claim, the designations have been printed in caps or initial caps. ;LOGIN: AuGust 2009 ARtICLE tItLE 1 Login_articlesAUGUST9_final.indd 1 7.13.09 8:46:06 AM I’ve decIded to use thIs column to defend the ordinary person—certainly a Rik Farrow monumental task, one requiring volumes instead of a couple of pages. Yet I believe I can make a dent in the project by focusing on just one group: the part of the human population that does not include most USENIX members or other computer secu- musings rity professionals and CS researchers. Rik is the Editor of ;login:. The days when I spent a large part of my life stand- [email protected] ing in front of MIS and IT folk attempting to ex- plain Internet security are long past, but they have left me with a strong feeling about the people who run both the public and the private computer and network infrastructures in North America. Keep in mind that I was either teaching classes or lecturing at conferences that focus on bringing in business and government IT people, I can say that under- standing computer security is a black art for most of these people. There, I’ve said it. Not having to stand in front of such an audience again will hopefully protect me from being stoned to death. But the very people in charge of administering our all-important cyber- infrastructure are largely clueless about what re- ally matters. (N.B.: I use the adjective “cyber,” even though I loathe it, as it has become popular.) I do not mean this as an attack on anyone’s intelligence: if it was easy to get this stuff right, we wouldn’t continue to have security problems. After all, the idea behind malware goes back to NSA research in the ’70s, and viruses became popular in the late ’80s—20 years ago. Now let’s broaden the potential lack of clue a bit. I suggest that most people who use computers and similar networked devices such as cell phones know just as little about computer security as, and likely less than, the managers of our cyber-industry.
Recommended publications
  • Here I Led Subcommittee Reports Related to Data-Intensive Science and Post-Moore Computing) and in CRA’S Board of Directors Since 2015
    Vivek Sarkar Curriculum Vitae Contents 1 Summary 2 2 Education 3 3 Professional Experience 3 3.1 2017-present: College of Computing, Georgia Institute of Technology . 3 3.2 2007-present: Department of Computer Science, Rice University . 5 3.3 1987-2007: International Business Machines Corporation . 7 4 Professional Awards 11 5 Research Awards 12 6 Industry Gifts 15 7 Graduate Student and Other Mentoring 17 8 Professional Service 19 8.1 Conference Committees . 20 8.2 Advisory/Award/Review/Steering Committees . 25 9 Keynote Talks, Invited Talks, Panels (Selected) 27 10 Teaching 33 11 Publications 37 11.1 Refereed Conference and Journal Publications . 37 11.2 Refereed Workshop Publications . 51 11.3 Books, Book Chapters, and Edited Volumes . 58 12 Patents 58 13 Software Artifacts (Selected) 59 14 Personal Information 60 Page 1 of 60 01/06/2020 1 Summary Over thirty years of sustained contributions to programming models, compilers and runtime systems for high performance computing, which include: 1) Leading the development of ASTI during 1991{1996, IBM's first product compiler component for optimizing locality, parallelism, and the (then) new FORTRAN 90 high-productivity array language (ASTI has continued to ship as part of IBM's XL Fortran product compilers since 1996, and was also used as the foundation for IBM's High Performance Fortran compiler product); 2) Leading the research and development of the open source Jikes Research Virtual Machine at IBM during 1998{2001, a first-of-a-kind Java Virtual Machine (JVM) and dynamic compiler implemented
    [Show full text]
  • Ultra-Large-Scale Sites
    Ultra-large-scale Sites <working title> – Scalability, Availability and Performance in Social Media Sites (picture from social network visualization?) Walter Kriha With a forword by << >> Walter Kriha, Scalability and Availability Aspects…, V.1.9.1 page 1 03/12/2010 Copyright <<ISBN Number, Copyright, open access>> ©2010 Walter Kriha This selection and arrangement of content is licensed under the Creative Commons Attribution License: http://creativecommons.org/licenses/by/3.0/ online: www.kriha.de/krihaorg/ ... <a rel="license" href="http://creativecommons.org/licenses/by/3.0/de/"><img alt="Creative Commons License" style="border-width:0" src="http://i.creativecommons.org/l/by/3.0/de/88x31.png" /></a><br /><span xmlns:dc="http://purl.org/dc/elements/1.1/" href="http://purl.org/dc/dcmitype/Text" property="dc:title" rel="dc:type"> Building Scalable Social Media Sites</span> by <a xmlns:cc="http://creativecommons.org/ns#" href="wwww.kriha.de/krihaorg/books/ultra.pdf" property="cc:attributionName" rel="cc:attributionURL">Walter Kriha</a> is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by/3.0/de/">Creative Commons Attribution 3.0 Germany License</a>.<br />Permissions beyond the scope of this license may be available at <a xmlns:cc="http://creativecommons.org/ns#" href="www.kriha.org" rel="cc:morePermissions">www.kriha.org</a>. Walter Kriha, Scalability and Availability Aspects…, V.1.9.1 page 2 03/12/2010 Acknowledgements <<master course, Todd Hoff/highscalability.com..>> Walter Kriha, Scalability and Availability Aspects…, V.1.9.1 page 3 03/12/2010 ToDo’s - The role of ultra fast networks (Infiniband) on distributed algorithms and behaviour with respect to failure models - more on group behaviour from Clay Shirky etc.
    [Show full text]
  • Optimizing Applications for Multicore by Intel Software Engineer Levent Akyil Welcome to the Parallel Universe
    Letter to the Editor by parallelism author and expert James Reinders Are You Ready to Enter a Parallel Universe: Optimizing Applications for Multicore by Intel software engineer Levent Akyil Welcome to the Parallel Universe Contents Think Parallel or Perish, BY JAMES REINDERS .........................................................................................2 James Reinders, Lead Evangelist and a Director with Intel® Software Development Products, sees a future where every software developer needs to be thinking about parallelism first when programming. He first published“ Think Parallel or Perish“ three years ago. Now he revisits his comments to offer an update on where we have gone and what still lies ahead. Parallelization Methodology...................................................................................................................... 4 The four stages of parallel application development addressed by Intel® Parallel Studio. Writing Parallel Code Safely, BY PETER VARHOL ........................................................................... 5 Writing multithreaded code to take full advantage of multiple processors and multicore processors is difficult. The new Intel® Parallel Studio should help us bridge that gap. Are You Ready to Enter a Parallel Universe: Optimizing Applications for Multicore, BY LEVENT AKYIL .............................................. 8 A look at parallelization methods made possible by the new Intel® Parallel Studio—designed for Microsoft Visual Studio* C/C++ developers of Windows* applications.
    [Show full text]
  • Jungledocs Documentation Release V1.0.1
    jungledocs Documentation Release v1.0.1 Sarah Scott Jul 24, 2017 Table Of Contents 1 What Is Jungle Disk? 1 1.1 Backup Solutions.............................................1 2 Setting Up Jungle Disk 3 2.1 System Requirements..........................................3 2.2 Installation................................................4 2.3 Administrator Setup...........................................7 3 Introduction to the Jungle Disk Client 13 3.1 Agent................................................... 13 3.2 Activity Monitor............................................. 18 3.3 Application Settings........................................... 20 3.4 Settings File............................................... 28 4 Backup Solutions 31 4.1 Network Drive.............................................. 31 4.2 Backup Vault............................................... 32 5 The Network Drive 33 5.1 Network Drive.............................................. 35 5.2 Local Drive Mapping........................................... 37 5.3 Previous Versions............................................ 39 6 Simple Backup 43 6.1 Simple Backup.............................................. 44 6.2 Backup Job................................................ 45 7 The Backup Vault 51 7.1 Backup Vault............................................... 54 7.2 Backup Job................................................ 54 7.3 Previous Versions............................................ 59 8 How Does The Backup Process Work? 61 8.1 Data De-Duplication..........................................
    [Show full text]
  • High Performance Neural Network Inference, Streaming, and Visualization of Medical Images Using FAST
    Received August 15, 2019, accepted September 16, 2019, date of publication September 19, 2019, date of current version October 2, 2019. Digital Object Identifier 10.1109/ACCESS.2019.2942441 High Performance Neural Network Inference, Streaming, and Visualization of Medical Images Using FAST ERIK SMISTAD 1,2, ANDREAS ØSTVIK 1,2, AND ANDRÉ PEDERSEN 1 1SINTEF Medical Technology, 7465 Trondheim, Norway 2Department of Circulation and Medical Imaging, Norwegian University of Science and Technology, 7491 Trondheim, Norway Corresponding author: Erik Smistad ([email protected]) This work was supported by the Research Council of Norway under Grant 270941 and Grant 237887. ABSTRACT Deep convolutional neural networks have quickly become the standard for medical image analysis. Although there are many frameworks focusing on training neural networks, there are few that focus on high performance inference and visualization of medical images. Neural network inference requires an inference engine (IE), and there are currently several IEs available including Intel's OpenVINO, NVIDIA's TensorRT, and Google's TensorFlow which supports multiple backends, including NVIDIA's cuDNN, AMD's ROCm and Intel's MKL-DNN. These IEs only work on specific processors and have completely different application programming interfaces (APIs). In this paper, we presents methods for extending FAST, an open-source high performance framework for medical imaging, to use any IE with a common programming interface. Thereby making it easier for users to deploy and test their neural networks on different processors. This article provides an overview of current IEs and how they can be combined with existing software such as FAST. The methods are demonstrated and evaluated on three performance demanding medical use cases: real-time ultrasound image segmentation, computed tomography (CT) volume segmentation, and patch-wise classification of whole slide microscopy images.
    [Show full text]
  • Migrating Enterprise Storage Applications to the Cloud
    UNIVERSITY OF CALIFORNIA, SAN DIEGO Migrating Enterprise Storage Applications to the Cloud A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Computer Science by Michael Daniel Vrable Committee in charge: Professor Stefan Savage, Co-Chair Professor Geoffrey M. Voelker, Co-Chair Professor Bill Lin Professor Paul Siegel Professor Amin Vahdat 2011 Copyright Michael Daniel Vrable, 2011 All rights reserved. The dissertation of Michael Daniel Vrable is approved, and it is acceptable in quality and form for publication on micro- film and electronically: Co-Chair Co-Chair University of California, San Diego 2011 iii DEDICATION To my family, for all the support I’ve received. iv EPIGRAPH If I have seen further it is only by standing on the shoulders of giants. —Sir Isaac Newton v TABLE OF CONTENTS Signature Page . iii Dedication . iv Epigraph . .v Table of Contents . vi List of Figures . ix List of Tables . .x Acknowledgements . xi Vita ......................................... xiii Abstract of the Dissertation . xv Chapter 1 Introduction . .1 1.1 Cloud Computing Applications . .3 1.2 Contributions . .5 1.3 Organization . .6 Chapter 2 Background . .7 2.1 Cloud Providers . .7 2.1.1 Cloud Storage . .8 2.1.2 Cloud Computation . 12 2.2 Enterprise Storage Applications . 13 2.2.1 File System Backup . 14 2.2.2 Shared Network File Systems . 15 Chapter 3 Cumulus . 18 3.1 Related Work . 20 3.2 Design . 22 3.2.1 Storage Server Interface . 23 3.2.2 Storage Segments . 23 3.2.3 Snapshot Format . 24 3.2.4 Sub-File Incrementals .
    [Show full text]
  • Bsync: Sistema Extensible Para La Sincronizaci´Ony Copia De Seguridad De ficheros Para Su Uso En Organizaciones
    Escuela Polit´ecnicaSuperior Departamento de Inform´atica Proyecto de Fin de Carrera bsync: Sistema extensible para la sincronizaci´ony copia de seguridad de ficheros para su uso en organizaciones Javier Torres Ni~no Tutores Juan Miguel G´omezBerb´ıs Alejandro Rodr´ıguezGonz´alez 28 de Julio de 2011 2 Resumen En la actualidad existen muchos sistemas de sincronizaci´ony copia de segu- ridad de ficheros, pero la mayor´ıade ellos no comercializan el producto, optando por comercializar los servicios ofrecidos por medio de estos. Esto impide el uso de estas herramientas a entidades que necesiten que sus datos no salgan de su entorno, por lo que el objetivo de este Proyecto de Fin de Carrera es el dise~no y desarrollo de un sistema similar a estos otros productos. Se analizan las caracter´ısticasde los competidores, y se dise~naun programa que incluye en el n´ucleolas caracter´ısticasb´asicasy sea capaz de incluir to- das las caracter´ısticasadicionales mediante el uso de extensiones o plugins. Es precisamente esta extensibilidad la que caracteriza el sistema, permitiendo que un mismo producto pueda adaptarse a las necesidades de multitud de clientes, que pueden precisar, por ejemplo, de distintos sistemas de autenticaci´on(para integrar el sistema en la arquitectura existente) o utilizar la infraestructura para sincronizar m´asque ficheros. Palabras clave: sincronizaci´on,copia de seguridad, extensibilidad, plugins, sistemas distribuidos 3 4 Agradecimientos Es impensable dejar este proyecto sin unas breves l´ıneas en las que agradecer a todas las personas que me han soportado durante estos ´ultimoscinco a~nos,y especialmente los ´ultimosmeses.
    [Show full text]
  • Comparison and Analysis of Parallel Computing Performance Using Openmp and MPI
    Send Orders for Reprints to [email protected] 38 The Open Automation and Control Systems Journal, 2013, 5, 38-44 Open Access Comparison and Analysis of Parallel Computing Performance Using OpenMP and MPI Shen Hua1,2,* and Zhang Yang1 1Department of Electronic Engineering, Dalian Neusoft University of Information Dalian, 116023/Liaoning, China 2Department of Biomedical Engineering, Faculty of Electronic Information and Electrical Engineering, Dalian Univer- sity of Technology, Dalian, 116024/Liaoning, China Abstract: The developments of multi-core technology have induced big challenges to software structures. To take full advantages of the performance enhancements offered by new multi-core hardware, software programming models have made a great shift from sequential programming to parallel programming. OpenMP (Open Multi-Processing) and MPI (Message Passing Interface), as the most common parallel programming models, can provide different performance characteristics of parallelism in different cases. This paper intends to compare and analyze the parallel computing ability between OpenMP and MPI, and then some proposals are provided in parallel programming. The processing tools used include Intel VTune Performance Analyzer and Intel Thread Checker. The find- ings indicate that OpenMP is in favor of implementation and provides good performance in shared memory systems , and that MPI is propitious to programming models which require nodes performing a large number of tasks and little commu- nications in processes. Keywords: Parallel computing, Multi-core, multithread programming, OpenMP, MPI. 1. INTRODUCTION library routines and environment variables. OpenMP em- ploys the fork-join model, where different tasks are imple- As the number of transistors has increased to fit within a mented by multiple threads within the same address space.
    [Show full text]
  • Threading Building Blocks Getting Started Guide
    Intel(R) Threading Building Blocks Getting Started Guide Intel® Threading Building Blocks is a runtime-based parallel programming model for C++ code that uses threads. It consists of a template-based runtime library to help you harness the latent performance of multicore processors. Use Intel® Threading Building Blocks to write scalable applications that: • Specify logical parallel structure instead of threads • Emphasize data parallel programming • Take advantage of concurrent collections and parallel algorithms This guide provides a complete example that uses Intel® Threading Building Blocks to write, compile, link, and run a parallel application. The example shows you how to explore a key feature of the library and to successfully build and link an application. After completing this guide, you should be ready to write and build your own code using Intel® Threading Building Blocks. Contents 10H Note Default Directory Paths...............................................................................29H 21H Set Up Environment ..........................................................................................310H 32H Develop an Application Using parallel_for .............................................................411H 43H Build the Application..........................................................................................812H 54H Run the Application .........................................................................................1013H 65H Next Steps.....................................................................................................1114H
    [Show full text]
  • Programming Models & Environments Summit
    REPORT OF THE 2014 Programming Models & Environments Summit EDITOR: Michael Heroux CO-EDITOR: Richard Lethin CONTRIBUTORS: Michael Garland, Mary Hall, Michael Heroux, Larry Kaplan, Richard Lethin, Kathryn O’Brien, Vivek Sarkar, John Shalf, Marc Snir, Armando Solar-Lezama, Thomas Sterling, and Katherine Yelick DOE ASCR REVIEWER: Sonia R. Sachs September 19, 2016 Sponsored by the U.S. Department of Energy, Office of Science, Office of Advanced Scientific Computing Research (ASCR) 17-CS-3270 Contents 1 Executive Summary 5 2 Introduction 7 2.1 Hardware Challenges for Programming Environments ...................... 8 2.2 Application Challenges for Programming Models and Environments .............. 10 2.3 Application Software Design Challenges .............................. 12 2.4 Principles of Exascale Programming Models and Environments ................. 12 2.5 Ecosystem Considerations ...................................... 14 3 Role of Programming Models and Environments Research 15 3.1 Challenges ............................................... 16 3.2 Metrics for Success .......................................... 17 4 Background, Challenges and Opportunities 18 4.1 Characterizing Programming Models and Environments ..................... 18 4.2 Design Choices ............................................ 22 4.2.1 Low Level ........................................... 22 4.2.2 Uniform vs. Hybrid ..................................... 23 4.2.3 Physical vs. Virtual ..................................... 23 4.2.4 Scheduling and Mapping ..................................
    [Show full text]
  • Cloud Providers
    Basics of Cloud Computing – Lecture 2 Cloud Providers Satish Srirama Outline • Cloud computing services – recap • Amazon cloud services – Elastic Compute Cloud (EC2) – Storage services - Amazon S3 and EBS • Cloud managers • Eucalyptus 20/02/2018 Satish Srirama 2/40 Cloud Computing - Services • Software as a Service – SaaS Level of – A way to access applications Abstraction hosted on the web through your web browser SaaS • Platform as a Service – PaaS Facebook, Flikr, Myspace.com, – Provides a computing platform Google maps API, Gmail and a solution stack (e.g. LAMP) as a service PaaS • Infrastructure as a Service – Google App Engine, IaaS Force.com, Hadoop, Azure, – Use of commodity computers, Heroku, etc distributed across Internet, to IaaS perform parallel processing, distributed storage, indexing and Amazon EC2, Rackspace, mining of data GoGrid, SciCloud, etc. – Virtualization 20/02/2018 Satish Srirama 3/40 Cloud Infrastructure • Provisioning of computing resources – CPU, Memory, Processing – Basically an “Operating System” on demand • Usually billed on a per-hour usage model • Players in this space – Amazon EC2, Rackspace, GoGrid, Eucalyptus/Openstack based SciCloud • Management providers: RightScale, HybridFox, ElasticFox, Amazon Management Console 20/02/2018 Satish Srirama 4/40 Cloud Storage • Provisioning of data storage – Either file/object based or Database like functionality • Billed on bandwidth and storage consumed • Players in the space – Amazon S3, Amazon EBS – Amazon’s SimpleDB, Google’s BigTable, Apache Cassandra • Management
    [Show full text]
  • Migrating Enterprise Storage Applications to the Cloud
    UC San Diego UC San Diego Electronic Theses and Dissertations Title Migrating enterprise storage applications to the cloud Permalink https://escholarship.org/uc/item/0dv3d3p5 Author Vrable, Michael Daniel Publication Date 2011 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA, SAN DIEGO Migrating Enterprise Storage Applications to the Cloud A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Computer Science by Michael Daniel Vrable Committee in charge: Professor Stefan Savage, Co-Chair Professor Geoffrey M. Voelker, Co-Chair Professor Bill Lin Professor Paul Siegel Professor Amin Vahdat 2011 Copyright Michael Daniel Vrable, 2011 All rights reserved. The dissertation of Michael Daniel Vrable is approved, and it is acceptable in quality and form for publication on micro- film and electronically: Co-Chair Co-Chair University of California, San Diego 2011 iii DEDICATION To my family, for all the support I’ve received. iv EPIGRAPH If I have seen further it is only by standing on the shoulders of giants. —Sir Isaac Newton v TABLE OF CONTENTS Signature Page . iii Dedication . iv Epigraph . .v Table of Contents . vi List of Figures . ix List of Tables . .x Acknowledgements . xi Vita ......................................... xiii Abstract of the Dissertation . xv Chapter 1 Introduction . .1 1.1 Cloud Computing Applications . .3 1.2 Contributions . .5 1.3 Organization . .6 Chapter 2 Background . .7 2.1 Cloud Providers . .7 2.1.1 Cloud Storage . .8 2.1.2 Cloud Computation . 12 2.2 Enterprise Storage Applications . 13 2.2.1 File System Backup .
    [Show full text]