Cubesat Cloud: a Framework for Distributed Storage, Processing and Communication of Remote Sensing Data on Cubesat Clusters

Total Page:16

File Type:pdf, Size:1020Kb

Cubesat Cloud: a Framework for Distributed Storage, Processing and Communication of Remote Sensing Data on Cubesat Clusters CUBESAT CLOUD: A FRAMEWORK FOR DISTRIBUTED STORAGE, PROCESSING AND COMMUNICATION OF REMOTE SENSING DATA ON CUBESAT CLUSTERS By OBULAPATHI NAYUDU CHALLA A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY UNIVERSITY OF FLORIDA 2013 © 2013 Obulapathi Nayudu Challa 2 I dedicate this to my family, my wife Sreevidya Inturi, my mother Rangamma Challa, my father Ananthaiah Challa, my sister Sreelatha Chowdary Lingutla, my brother-in-laws Ramesh Naidu Lingutla, Sreekanth Chowdary Inturi, my father-in-law Sreenivasulu Chowdary Inturi, my mother-in-law Venkatalakshmi Inturi, my brothers Akshay Kumar Anugu and Dheeraj Kota and my uncle Venkatanarayana Pattipaati, for all their love and support. 3 ACKNOWLEDGMENTS It has been a great experience being a student of Dr. Janise Y. McNair for the last five and half years. There was never a time that I did not feel cared for, thanks to her constant support and guidance. I would like to thank my committee Dr. Xiaolin (Andy) Li, Dr. Norman G. Fitz-Coy and Dr. Haniph A. Latchman for agreeing to serve on my committee. I would like to thank them for providing valuable feedback in completing my dissertation. Thanks to the professors at University of Florida Dr. Patrick Oscar Boykin, Ms. Wenhsing Wu, Dr. Ramakant Srivastava, Dr. Erik Sander, Dr. A. Antonio Arroyo, Dr. Jose A. B. Fortes, Dr. John M. Shea, Dr. Greg Stitt, Dr. Sartaj Sahni and Dr. Shigang Chen, for teaching me what all I know today. Thanks to staff at University of Florida Ray E. McClure II, Jason Kawaja, Shannon M Chillingworth, Cheryl Rhoden and Stephenie A. Sparkman, for their patience with my countless requests and administrative questions. I would like to take this opportunity to thank all my Wireless and Mobile Group colleagues, past and present, for being there with me and helping me all along in one way or other. I would like to thank Alexander Verbitski for his mentorship during my internship. I would like to thank my teachers Sreedevi, Uma Kantha, Nalini Sreenivasan, K. Ramakrishna, K. Bhaskar Naidu, Sambasiva Reddy, A Koteswar Rao, A. K. Rama Rao, Dr. Vijay Kumar Chakka, Dr. Gautam Dutta and Dr. Prabhat Ranjan who greatly influenced my life. Internet and Open Source have made this world a true Vasudhaika Kutumbam for me. I would like to thank Linus Torvalds, creator of Linux; Richard Matthew Stallman, founder of GNU; Vint Cerf, father of Internet; Tim Berners-Lee, inventor of the World Wide Web; Guido Rossum, creator of Python programming language; Satoshi Nakamoto, inventor of Bitcoin; Masashi Kishimoto, creator of Naruto; Mark Shuttleworth, founder of Ubuntu and Tim O’Reilly, the founder of O’Reilly Media. Life at University of Florida has been always fun and exciting, thanks to the wonderful friends around here: Dan Trevino, Dante Buckley, Gokul Bhat, Hrishikesh 4 Pendurkar, Jimmy (Tzu Yu) Lin, Karthik Talloju, Krishna Chaitanya, Kishore Yalamanchili, Madhulika Dandina, Manu Rastogi, Paul Muri, Rakesh Chalasani, Ravi Shekhar, Seshu Pria, Shruthi Venkatesh, Subhash Guttikonda, Udayan Kumar, Vaibhav Garg, Vijay Bhaskar Reddy and Vivek Anand. I would like to thank Mr. Iqbal Qaiyumi, Dr. Shaheda Qaiyumi, Mr. Jagat Desai and Mrs. Vatsala Desai for taking care of me like their son. Thanks to my long-distance friends Bhargavi Vanga, Praveen Kumar, Radha Vummadi, Uday Kumar, Uzumaki Naruto and Vijay Kumar, who have been close even when they were far. Lastly, I would like to thank my family - my wife Sreevidya Inturi, my mother Rangamma Challa, my father Ananthaiah Challa, my sister Sreelatha Chowdary Lingutla, my brother-in-laws Ramesh Naidu Lingutla, Sreekanth Chowdary Inturi, my father-in-law Sreenivasulu Chowdary Inturi, my mother-in-law Venkatalakshmi Inturi, my brothers Akshay Kumar Anugu and Dheeraj Kota and my uncle Venkatanarayana Pattipaati. Their endless love and support throughout the years has meant more to me than words can express. I would like to dedicate my dissertation to them. 5 TABLE OF CONTENTS page ACKNOWLEDGMENTS .................................. 4 LIST OF TABLES ...................................... 10 LIST OF FIGURES ..................................... 11 ABSTRACT ......................................... 13 CHAPTER 1 INTRODUCTION ................................... 15 1.1 CubeSat Cloud ................................. 17 2 BACKGROUND ................................... 20 2.1 Remote Sensing ................................ 20 2.2 Evolution of CubeSat Networks ........................ 21 2.2.1 Summary and Limitations of CubeSat Communications ...... 24 2.3 Distributed Satellite Systems ......................... 25 2.4 Classification of Distributed Satellite Systems ................ 27 2.5 Related Work .................................. 27 2.5.1 Distributed Storage Systems ..................... 27 2.5.2 Distributed Computing Techniques .................. 30 3 NETWORK ARCHITECTURE OF CUBESAT CLOUD .............. 34 3.1 Components of the CubeSat Network .................... 35 3.1.1 Space Segment ............................. 35 3.1.2 Ground Segment ............................ 37 3.2 System Communication ............................ 38 3.2.1 Cluster Communication ........................ 38 3.2.2 Space Segment to Ground Segment Communication ....... 39 3.2.3 Ground Segment Network Communication .............. 40 3.3 CubeSat Cloud ................................. 40 3.3.1 Storage, Processing and Communication of Remote Sensing Data on CubeSat Clusters .......................... 40 3.3.2 Source Coding, Storing and Downlinking of Remote Sensing Data on CubeSat Clusters .......................... 41 4 DISTRIBUTED STORAGE OF REMOTE SENSING IMAGES ON CUBESAT CLUSTERS ...................................... 45 4.1 Key Design Points ............................... 45 4.1.1 Need for Simple Design ........................ 45 4.1.2 Low Bandwidth Operation ....................... 45 6 4.1.3 Network Partition Tolerant ....................... 45 4.1.4 Autonomous ............................... 46 4.1.5 Data Integrity .............................. 46 4.2 Shared Goals Between CDFS, GFS and HDFS ............... 46 4.2.1 Component Failures are Norm .................... 46 4.2.2 Small Number of Large Files ..................... 46 4.2.3 Immutable Files and Non-existent Random Read Writes ...... 47 4.3 Architecture of CubeSat Distributed File System .............. 47 4.3.1 File System Namespace ........................ 49 4.3.2 Heartbeats ............................... 49 4.4 File Operations ................................. 50 4.4.1 Create a File .............................. 50 4.4.2 Writing to a File ............................. 51 4.4.3 Deleting a File .............................. 51 4.5 Enhancements and Optimizations ...................... 52 4.5.1 Bandwidth and Energy Efficient Replication ............. 52 4.5.1.1 Number of nodes on communication path = replication factor ............................. 54 4.5.1.2 Number of nodes on communication path >replication factor ............................. 54 4.5.1.3 Number of nodes on communication path <replication factor ............................. 54 4.5.2 Load Balancing ............................. 55 4.5.3 Chunk Size and Granularity ...................... 56 4.5.4 Fault Tolerance ............................. 57 4.5.5 Master Failure .............................. 57 4.5.6 Worker Failure ............................. 57 4.5.7 Chunk Corruption ............................ 58 4.5.8 Inter CubeSat Link Failure ....................... 58 4.5.9 Network Partitioning .......................... 58 4.6 Simulation Results ............................... 59 4.7 Summary of CubeSat Distributed File System ................ 59 5 DISTRIBUTED PROCESSING OF REMOTE SENSING IMAGES ON CUBESAT CLUSTERS ...................................... 60 5.1 CubeSat MapMerge .............................. 60 5.2 Command and Data Flow during a CubeSat MapMerge Job ........ 61 5.3 Fault Tolerance, Failures, Granularity and Load Balancing ......... 63 5.3.1 Fault Tolerance ............................. 63 5.3.2 Master Failure .............................. 64 5.3.3 Worker Failure ............................. 64 5.3.4 Task Granularity and Load Balancing ................. 64 5.4 Simulation Results ............................... 64 5.5 Summary of CubeSat MapMerge ....................... 65 7 6 DISTRIBUTED COMMUNICATION OF REMOTE SENSING IMAGES FROM CUBESAT CLUSTERS ............................... 66 6.1 CubeSat Torrent ................................ 66 6.2 Command and Data Flow During a Torrent Session ............. 67 6.3 Enhancements and Optimizations ...................... 67 6.3.1 Improve Storage Reliability and Decrease Storage Overhead . 67 6.3.2 Using Source Coding to Improve Downlink Time .......... 69 6.3.3 Improving the Quality of Service for Real-time Traffic Applications Like VoIP ................................ 70 6.4 Fault Tolerance, Failures, Granularity and Load Balancing ......... 71 6.4.1 Fault Tolerance ............................. 71 6.4.2 Master Failure .............................. 72 6.4.3 Worker Failure ............................. 72 6.4.4 Task Granularity ............................ 72 6.4.5 Tail Effect and Backup Downloads .................. 73 6.5 Simulation Results and Summary of CubeSat Torrent ........... 73 7 SIMULATOR, EMULATOR AND PERFORMANCE ANALYSIS .......... 75 7.1 Hardware and Software of Master and Worker CubeSats for Emulator . 75 7.2 Hardware and
Recommended publications
  • PVC Technical Specifications V.1.0
    Pryvate™ Ltd. Functional & Technical Specifications PVC Technical Specifications V.1.0 APRIL 10, 2018 © PRYVATE™ 2018. PRYVATE™ is a suite of security products from Criptyque Ltd. Registered in the Cayman Islands. PRYVATE™ Is a brand wholly owned by CRIPTYQUE Ltd. Pryvate™ Ltd. Functional & Technical Specifications TABLE OF CONTENTS 1 GENERAL INFORMATION 5 1.1 Scope 1.2 Current Platform Summary 2 FUNCTIONAL TECH SPECIFICATIONS 5 2.1 Encrypted Voice Calls (VOIP) 2.2 Off Net Calling 2.3 Secure Conferencing 2.4 Encrypted Video Calls 2.5 Encrypted Instant Message (IM) 2.6 Notification of Screenshots 2.7 Encrypted Email 2.8 Secure File Transfer & Storage 2.9 Pin-Encrypted Mobile Protection 2.10 Multiple Account Management 2.11 Secure managed conversations 2.12 Anti-Blocking 3 HYBRIDIZATION 13 3.1 Voice / Video / Messaging 3.2 File Storage / Archival 3.3 Pryvate Crypto Wallet 3.3.1 Two-Wallet Solution 3.3.2 Three Methods 3.3.3 Enterprise Multi - by Pryvate 3.3.4 Risks of Cryptocurrency Wallets 3.4 Decentralized Email 3.5 Pryvate Dashboard 4 PERFORMANCE REQUIREMENTS 20 4.1 System Maintenance 4.2 Failure Contingencies 4.3 Customization and Flexibility 4.4 Equipment 4.5 Software 4.6 Interface / UI 5 CONCLUSION 21 6 APPENDIX 22 © PRYVATE™ 2018. PRYVATE™ is a suite of security products from Criptyque Ltd. Registered in the Cayman Islands. PRYVATE™ Is a brand wholly owned by CRIPTYQUE Ltd. Pryvate™ Ltd. Functional & Technical Specifications Acronyms: Definitions SCP = Secure Communications Platform Crypto= Cryptocurrency IPFS= Interplanetary File System ZRTP= ("Z" is a reference to its inventor, Zimmermann; "RTP" stands for Real-time Transport Protocol) it is a cryptographic key-agreement protocol to negotiate the keys for encryption between two end points in a Voice over Internet Protocol Diffie-Hellman= A method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols as originally conceptualized by Ralph Merkle and named after Whitfield Diffie and Martin Hellman.
    [Show full text]
  • The Parallel File System Lustre
    The parallel file system Lustre Roland Laifer STEINBUCH CENTRE FOR COMPUTING - SCC KIT – University of the State Rolandof Baden Laifer-Württemberg – Internal and SCC Storage Workshop National Laboratory of the Helmholtz Association www.kit.edu Overview Basic Lustre concepts Lustre status Vendors New features Pros and cons INSTITUTSLustre-, FAKULTÄTS systems-, ABTEILUNGSNAME at (inKIT der Masteransicht ändern) Complexity of underlying hardware Remarks on Lustre performance 2 16.4.2014 Roland Laifer – Internal SCC Storage Workshop Steinbuch Centre for Computing Basic Lustre concepts Client ClientClient Directory operations, file open/close File I/O & file locking metadata & concurrency INSTITUTS-, FAKULTÄTS-, ABTEILUNGSNAME (in der Recovery,Masteransicht ändern)file status, Metadata Server file creation Object Storage Server Lustre componets: Clients offer standard file system API (POSIX) Metadata servers (MDS) hold metadata, e.g. directory data, and store them on Metadata Targets (MDTs) Object Storage Servers (OSS) hold file contents and store them on Object Storage Targets (OSTs) All communicate efficiently over interconnects, e.g. with RDMA 3 16.4.2014 Roland Laifer – Internal SCC Storage Workshop Steinbuch Centre for Computing Lustre status (1) Huge user base about 70% of Top100 use Lustre Lustre HW + SW solutions available from many vendors: DDN (via resellers, e.g. HP, Dell), Xyratex – now Seagate (via resellers, e.g. Cray, HP), Bull, NEC, NetApp, EMC, SGI Lustre is Open Source INSTITUTS-, LotsFAKULTÄTS of organizational-, ABTEILUNGSNAME
    [Show full text]
  • A Fog Storage Software Architecture for the Internet of Things Bastien Confais, Adrien Lebre, Benoît Parrein
    A Fog storage software architecture for the Internet of Things Bastien Confais, Adrien Lebre, Benoît Parrein To cite this version: Bastien Confais, Adrien Lebre, Benoît Parrein. A Fog storage software architecture for the Internet of Things. Advances in Edge Computing: Massive Parallel Processing and Applications, IOS Press, pp.61-105, 2020, Advances in Parallel Computing, 978-1-64368-062-0. 10.3233/APC200004. hal- 02496105 HAL Id: hal-02496105 https://hal.archives-ouvertes.fr/hal-02496105 Submitted on 2 Mar 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. November 2019 A Fog storage software architecture for the Internet of Things Bastien CONFAIS a Adrien LEBRE b and Benoˆıt PARREIN c;1 a CNRS, LS2N, Polytech Nantes, rue Christian Pauc, Nantes, France b Institut Mines Telecom Atlantique, LS2N/Inria, 4 Rue Alfred Kastler, Nantes, France c Universite´ de Nantes, LS2N, Polytech Nantes, Nantes, France Abstract. The last prevision of the european Think Tank IDATE Digiworld esti- mates to 35 billion of connected devices in 2030 over the world just for the con- sumer market. This deep wave will be accompanied by a deluge of data, applica- tions and services.
    [Show full text]
  • Globalfs: a Strongly Consistent Multi-Site File System
    GlobalFS: A Strongly Consistent Multi-Site File System Leandro Pacheco Raluca Halalai Valerio Schiavoni University of Lugano University of Neuchatelˆ University of Neuchatelˆ Fernando Pedone Etienne Riviere` Pascal Felber University of Lugano University of Neuchatelˆ University of Neuchatelˆ Abstract consistency, availability, and tolerance to partitions. Our goal is to ensure strongly consistent file system operations This paper introduces GlobalFS, a POSIX-compliant despite node failures, at the price of possibly reduced geographically distributed file system. GlobalFS builds availability in the event of a network partition. Weak on two fundamental building blocks, an atomic multicast consistency is suitable for domain-specific applications group communication abstraction and multiple instances of where programmers can anticipate and provide resolution a single-site data store. We define four execution modes and methods for conflicts, or work with last-writer-wins show how all file system operations can be implemented resolution methods. Our rationale is that for general-purpose with these modes while ensuring strong consistency and services such as a file system, strong consistency is more tolerating failures. We describe the GlobalFS prototype in appropriate as it is both more intuitive for the users and detail and report on an extensive performance assessment. does not require human intervention in case of conflicts. We have deployed GlobalFS across all EC2 regions and Strong consistency requires ordering commands across show that the system scales geographically, providing replicas, which needs coordination among nodes at performance comparable to other state-of-the-art distributed geographically distributed sites (i.e., regions). Designing file systems for local commands and allowing for strongly strongly consistent distributed systems that provide good consistent operations over the whole system.
    [Show full text]
  • Development of the Istnanosat-1 Ground Segment
    Development of the ISTnanosat-1 Ground Segment Alexandre Simões Silva Thesis to obtain the Master of Science Degree in Bologna Master Degree in Telecommunications and Informatics Engineering Supervisor: Prof. Rui Manuel Rodrigues Rocha Examination Committee Chairperson: Prof. Paulo Jorge Pires Ferreira Supervisor: Prof. Rui Manuel Rodrigues Rocha Member of the Committee: Prof. Fernando Henrique Côrte-Real Mira da Silva May, 2017 Resumo Neste relatorio,´ e´ proposto uma soluc¸ao˜ para o segmento terrestre do ISTNanosat-1. O ISTNanosat-1 e´ um CubeSat, um tipo de satelite´ artificial, actualmente em desenvolvimento por alunos e professores do IST juntamente com especialistas radio´ amadores da AMRAD e AMSAT- CT. Tal como qualquer satelite,´ este precisa de ser monitorizado, controlado e os resultados obtidos em experienciasˆ cient´ıficas tem que ser recuperados. O segmento terrestre e´ entao˜ a infra-estrutura necessaria´ na Terra que permitira´ essas tarefas. O segmento de solo ISTNanosat-1 e´ um sistema que permite a recuperac¸ao˜ de telemetria e emi- tir instruc¸oes˜ ao satelite.´ Toda a informac¸ao˜ recolhida pode ser visualizada pelos utilizadores atraves´ de uma aplicac¸ao˜ web. Os utilizadores devidamente autorizados temˆ ainda a capacidade de emi- tir as instruc¸oes˜ para que o satelite´ as execute. O segmento terrestre desenvolvido e´ composto por varias´ estac¸oes˜ terrestres controladas por um servidor principal (denominado por “Core server”). Nesta arquitectura centralizada, o servidor central comunica com o satelite´ atraves´ das estac¸oes˜ terrestres utilizando o protocolo desenvolvido para o efeito (o chamado ISTnanosat Control Protocol (INCP)). Ha´ ainda varios´ servic¸os que permitem a recolha de dados e erros, execuc¸ao˜ de comandos e diagnosticos,´ para alem´ de assegurar a seguranc¸a da ligac¸ao˜ entre os segmentos terra-espac¸o.
    [Show full text]
  • Evaluation of Active Storage Strategies for the Lustre Parallel File System
    Evaluation of Active Storage Strategies for the Lustre Parallel File System Juan Piernas Jarek Nieplocha Evan J. Felix Pacific Northwest National Pacific Northwest National Pacific Northwest National Laboratory Laboratory Laboratory P.O. Box 999 P.O. Box 999 P.O. Box 999 Richland, WA 99352 Richland, WA 99352 Richland, WA 99352 [email protected] [email protected] [email protected] ABSTRACT umes of data remains a challenging problem. Despite the Active Storage provides an opportunity for reducing the improvements of storage capacities, the cost of bandwidth amount of data movement between storage and compute for moving data between the processing nodes and the stor- nodes of a parallel filesystem such as Lustre, and PVFS. age devices has not improved at the same rate as the disk ca- It allows certain types of data processing operations to be pacity. One approach to reduce the bandwidth requirements performed directly on the storage nodes of modern paral- between storage and compute devices is, when possible, to lel filesystems, near the data they manage. This is possible move computation closer to the storage devices. Similarly by exploiting the underutilized processor and memory re- to the processing-in-memory (PIM) approach for random ac- sources of storage nodes that are implemented using general cess memory [16], the active disk concept was proposed for purpose servers and operating systems. In this paper, we hard disk storage systems [1, 15, 24]. The active disk idea present a novel user-space implementation of Active Storage exploits the processing power of the embedded hard drive for Lustre, and compare it to the traditional kernel-based controller to process the data on the disk without the need implementation.
    [Show full text]
  • Everyone's Guide to Bypassing Internet Censorship
    EVERYONE’S GUIDE TO BY-PASSING INTERNET CENSORSHIP FOR CITIZENS WORLDWIDE A CIVISEC PROJECT The Citizen Lab The University of Toronto September, 2007 cover illustration by Jane Gowan Glossary page 4 Introduction page 5 Choosing Circumvention page 8 User self-assessment Provider self-assessment Technology page 17 Web-based Circumvention Systems Tunneling Software Anonymous Communications Systems Tricks of the trade page 28 Things to remember page 29 Further reading page 29 Circumvention Technologies Circumvention technologies are any tools, software, or methods used to bypass Inter- net filtering. These can range from complex computer programs to relatively simple manual steps, such as accessing a banned website stored on a search engine’s cache, instead of trying to access it directly. Circumvention Providers Circumvention providers install software on a computer in a non-filtered location and make connections to this computer available to those who access the Internet from a censored location. Circumvention providers can range from large commercial organi- zations offering circumvention services for a fee to individuals providing circumven- tion services for free. Circumvention Users Circumvention users are individuals who use circumvention technologies to bypass Internet content filtering. 4 Internet censorship, or content filtering, has become a major global problem. Whereas once it was assumed that states could not control Internet communications, according to research by the OpenNet Initiative (http://opennet.net) more than 25 countries now engage in Internet censorship practices. Those with the most pervasive filtering policies have been found to routinely block access to human rights organi- zations, news, blogs, and web services that challenge the status quo or are deemed threatening or undesirable.
    [Show full text]
  • Threat Modeling and Circumvention of Internet Censorship by David Fifield
    Threat modeling and circumvention of Internet censorship By David Fifield A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J.D. Tygar, Chair Professor Deirdre Mulligan Professor Vern Paxson Fall 2017 1 Abstract Threat modeling and circumvention of Internet censorship by David Fifield Doctor of Philosophy in Computer Science University of California, Berkeley Professor J.D. Tygar, Chair Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities|such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations. My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements.
    [Show full text]
  • Blockchain: an Enabler for Power Market Operations Exploring Potential Uses of Distributed Ledger Technology in the Evolving Georgian Power Market
    BLOCKCHAIN: AN ENABLER FOR POWER MARKET OPERATIONS EXPLORING POTENTIAL USES OF DISTRIBUTED LEDGER TECHNOLOGY IN THE EVOLVING GEORGIAN POWER MARKET USAID GOVERNING FOR GROWTH (G4G) IN GEORGIA 30 May 2019 This publication was produced for review by the United States Agency for International Development. It was prepared by Deloitte Consulting LLP. The author’s views expressed in this publication do not necessarily reflect the views of the United States Agency for International Development or the United States Government. BLOCKCHAIN: AN ENABLER FOR POWER MARKET OPERATIONS EXPLORING POTENTIAL USES OF DISTRIBUTED LEDGER TECHNOLOGY IN THE EVOLVING GEORGIAN POWER MARKET USAID GOVERNING FOR GROWTH (G4G) IN GEORGIA CONTRACT NUMBER: AID-114-C-14-00007 DELOITTE CONSULTING LLP USAID | GEORGIA USAID CONTRACTING OFFICER’S REPRESENTATIVE: PHILLIP GREENE AUTHOR(S): SRI SEKAR, JAMES CALLIHAN, AVTANDILI TODUA ACTIVITY AREA: 4420 LANGUAGE: ENGLISH 30 MAY 2019 DISCLAIMER: This publication was produced for review by the United States Agency for International Development. It was prepared by Deloitte Consulting LLP. The author’s views expressed in this publication do not necessarily reflect the views of the United States Agency for International Development or the United States Government. USAID | GOVERNING FOR GROWTH (G4G) IN GEORGIA BLOCKCHAIN: AN ENABLER FOR POWER MARKET OPERATIONS i DATA Reviewed by: Giorgi Giorgobiani, Andrea Lora Project Component: Energy Trade Policy Improvement Component Practice Area: Electricity Trading Mechanism (ETM) Key Words: Blockchain,
    [Show full text]
  • Using the Andrew File System on *BSD [email protected], Bsdcan, 2006 Why Another Network Filesystem
    Using the Andrew File System on *BSD [email protected], BSDCan, 2006 why another network filesystem 1-slide history of Andrew File System user view admin view OpenAFS Arla AFS on OpenBSD, FreeBSD and NetBSD Filesharing on the Internet use FTP or link to HTTP file interface through WebDAV use insecure protocol over vpn History of AFS 1984: developed at Carnegie Mellon 1989: TransArc Corperation 1994: over to IBM 1997: Arla, aimed at Linux and BSD 2000: IBM releases source 2000: foundation of OpenAFS User view <1> global filesystem rooted at /afs /afs/cern.ch/... /afs/cmu.edu/... /afs/gorlaeus.net/users/h/hugo/... User view <2> authentication through Kerberos #>kinit <username> obtain krbtgt/<realm>@<realm> #>afslog obtain afs@<realm> #>cd /afs/<cell>/users/<username> User view <3> ACL (dir based) & Quota usage runs on Windows, OS X, Linux, Solaris ... and *BSD Admin view <1> <cell> <partition> <server> <volume> <volume> <server> <partition> Admin view <2> /afs/gorlaeus.net/users/h/hugo/presos/afs_slides.graffle gorlaeus.net /vicepa fwncafs1 users hugo h bram <server> /vicepb Admin view <2a> /afs/gorlaeus.net/users/h/hugo/presos/afs_slides.graffle gorlaeus.net /vicepa fwncafs1 users hugo /vicepa fwncafs2 h bram Admin view <3> servers require KeyFile ~= keytab procedure differs for Heimdal: ktutil copy MIT: asetkey add Admin view <4> entry in CellServDB >gorlaeus.net #my cell name 10.0.0.1 <dbserver host name> required on servers required on clients without DynRoot Admin view <5> File locking no databases on AFS (requires byte range locking)
    [Show full text]
  • A Framework for Identifying Host-Based Artifacts in Dark Web Investigations
    Dakota State University Beadle Scholar Masters Theses & Doctoral Dissertations Fall 11-2020 A Framework for Identifying Host-based Artifacts in Dark Web Investigations Arica Kulm Dakota State University Follow this and additional works at: https://scholar.dsu.edu/theses Part of the Databases and Information Systems Commons, Information Security Commons, and the Systems Architecture Commons Recommended Citation Kulm, Arica, "A Framework for Identifying Host-based Artifacts in Dark Web Investigations" (2020). Masters Theses & Doctoral Dissertations. 357. https://scholar.dsu.edu/theses/357 This Dissertation is brought to you for free and open access by Beadle Scholar. It has been accepted for inclusion in Masters Theses & Doctoral Dissertations by an authorized administrator of Beadle Scholar. For more information, please contact [email protected]. A FRAMEWORK FOR IDENTIFYING HOST-BASED ARTIFACTS IN DARK WEB INVESTIGATIONS A dissertation submitted to Dakota State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Cyber Defense November 2020 By Arica Kulm Dissertation Committee: Dr. Ashley Podhradsky Dr. Kevin Streff Dr. Omar El-Gayar Cynthia Hetherington Trevor Jones ii DISSERTATION APPROVAL FORM This dissertation is approved as a credible and independent investigation by a candidate for the Doctor of Philosophy in Cyber Defense degree and is acceptable for meeting the dissertation requirements for this degree. Acceptance of this dissertation does not imply that the conclusions reached by the candidate are necessarily the conclusions of the major department or university. Student Name: Arica Kulm Dissertation Title: A Framework for Identifying Host-based Artifacts in Dark Web Investigations Dissertation Chair: Date: 11/12/20 Committee member: Date: 11/12/2020 Committee member: Date: Committee member: Date: Committee member: Date: iii ACKNOWLEDGMENT First, I would like to thank Dr.
    [Show full text]
  • On the Performance Variation in Modern Storage Stacks
    On the Performance Variation in Modern Storage Stacks Zhen Cao1, Vasily Tarasov2, Hari Prasath Raman1, Dean Hildebrand2, and Erez Zadok1 1Stony Brook University and 2IBM Research—Almaden Appears in the proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST’17) Abstract tions on different machines have to compete for heavily shared resources, such as network switches [9]. Ensuring stable performance for storage stacks is im- In this paper we focus on characterizing and analyz- portant, especially with the growth in popularity of ing performance variations arising from benchmarking hosted services where customers expect QoS guaran- a typical modern storage stack that consists of a file tees. The same requirement arises from benchmarking system, a block layer, and storage hardware. Storage settings as well. One would expect that repeated, care- stacks have been proven to be a critical contributor to fully controlled experiments might yield nearly identi- performance variation [18, 33, 40]. Furthermore, among cal performance results—but we found otherwise. We all system components, the storage stack is the corner- therefore undertook a study to characterize the amount stone of data-intensive applications, which become in- of variability in benchmarking modern storage stacks. In creasingly more important in the big data era [8, 21]. this paper we report on the techniques used and the re- Although our main focus here is reporting and analyz- sults of this study. We conducted many experiments us- ing the variations in benchmarking processes, we believe ing several popular workloads, file systems, and storage that our observations pave the way for understanding sta- devices—and varied many parameters across the entire bility issues in production systems.
    [Show full text]