declarative secure convergent edge computation
play

Declarative, Secure, Convergent Edge Computation Christopher - PowerPoint PPT Presentation

Declarative, Secure, Convergent Edge Computation Christopher Meiklejohn Universit catholique de Louvain, Belgium 1 Internet of Things 2 Internet of Things but, more generally 2 Edge Computation Logical extremes Pushing both


  1. Declarative, Secure, Convergent Edge Computation Christopher Meiklejohn Université catholique de Louvain, Belgium 1

  2. Internet of Things 2

  3. Internet of Things but, more generally… 2

  4. Edge Computation • Logical extremes 
 Pushing both computation and data to the logical extremes of the network 3

  5. Edge Computation • Logical extremes 
 Pushing both computation and data to the logical extremes of the network • Arbitrary computation 
 Support arbitrary computations regardless of location of data in the network 3

  6. Edge Computation • Logical extremes 
 Pushing both computation and data to the logical extremes of the network • Arbitrary computation 
 Support arbitrary computations regardless of location of data in the network • Self-organizing, resilient 
 Directed diffusion, Cornell circa-1990; self-organizing systems that coordinate to complete computations 3

  7. Example Application Hospital Refrigerators 4

  8. Hospital Refrigerators Typical Topology 5

  9. 6

  10. Internet 7

  11. Internet HDFS 8

  12. Client Hadoop Internet Client Internet HDFS 9

  13. Internet HDFS Client Spark Internet Client 10

  14. Hospital Refrigerators Ideal Execution 11

  15. Spark Internet HDFS 12

  16. Spark Internet HDFS 13

  17. Spark Internet HDFS 14

  18. Spark Internet HDFS 15

  19. Spark Internet HDFS 16

  20. Spark Client Internet HDFS 17

  21. Problem Connectivity 18

  22. Spark Internet HDFS 19

  23. Spark Internet HDFS 20

  24. Spark Internet HDFS 21

  25. Spark Internet HDFS 22

  26. Spark Internet HDFS 23

  27. Spark Internet HDFS 24

  28. Spark Internet HDFS 25

  29. Solution Local Decisions 26

  30. Spark Internet HDFS 27

  31. Spark Internet HDFS 28

  32. Spark Internet HDFS 29

  33. Spark Internet HDFS 30

  34. Spark Internet HDFS 31

  35. Local Decisions • Not new for backup (80s-90s) 
 Backup communication mechanisms for critical systems; POTS backup for ISDN, etc. 32

  36. Local Decisions • Not new for backup (80s-90s) 
 Backup communication mechanisms for critical systems; POTS backup for ISDN, etc. • Not new for storage (90s-00s) 
 EMC’s “phone home” via POTS when disks failed in NAS devices to signal for replacement unit 32

  37. Solution Transitive Dissemination 33

  38. Spark Internet HDFS 34

  39. Spark Internet HDFS 35

  40. Spark Internet HDFS 36

  41. Spark Internet HDFS 37

  42. Spark Internet HDFS 38

  43. Spark Client Internet HDFS 39

  44. Problem State Transmission 40

  45. Internet 41

  46. Internet 42

  47. Internet 43

  48. Internet 44

  49. Solution Aggregate Dissemination 45

  50. Internet 46

  51. Internet 47

  52. Internet 48

  53. Internet HDFS 49

  54. Internet HDFS = = 50

  55. Internet ? = = 51

  56. Internet ? = = 52

  57. Local Computation • Reduce state transmission 
 Perform some local computation to reduce transmitted state on the wire 53

  58. Local Computation • Reduce state transmission 
 Perform some local computation to reduce transmitted state on the wire • Make local decisions 
 Make decisions based on results of local computation 53

  59. Databases Consistency Models 54

  60. Databases Strong Consistency 55

  61. R1 C1 C2 56

  62. R1 C1 C2 57

  63. R1 Read C1 C2 58

  64. R1 Read C1 C2 59

  65. R1 C1 C2 60

  66. R1 CAS C1 C2 61

  67. R1 C1 C2 62

  68. R1 CAS C1 C2 63

  69. I won’t diagram the Paxos protocol 64

  70. Value 2 R1 R2 R3 Paxos C1 C2 Value 2 Value 1 65

  71. Databases Eventual Consistency 66

  72. R1 R2 R3 C1 C2 67

  73. R1 R2 R3 C1 C2 68

  74. R1 R2 R3 Read C1 C2 69

  75. R1 R2 R3 Read C1 C2 70

  76. R1 R2 R3 Write C1 C2 71

  77. R1 R2 R3 Write C1 C2 72

  78. R1 R2 R3 Write C1 C1 C2 73

  79. R1 R2 R3 Read C1 C2 74

  80. R1 R2 R3 Write C1 C2 75

  81. Eventual Consistency As The Model 76

  82. Clients Own Their Data 77

  83. 78

  84. 79

  85. 80

  86. Computations Mergeability & Provenance 81

  87. A C A B 82

  88. A F D’ C A F D’’ B 83

  89. A F D’ C ≤ ≤ D’ D’’ D A F D’’ B 84

  90. A F D’ D C ≤ ≤ D’ D’’ D Merge A F D’’ D B 85

  91. Example Application Preliminary Results 86

  92. Preliminary Results • Conflict-Free Replicated Data Types 
 Distributed data structures designed for convergence 
 [Shapiro et al., 2011] 87

  93. Preliminary Results • Conflict-Free Replicated Data Types 
 Distributed data structures designed for convergence 
 [Shapiro et al., 2011] • Lattice Processing 
 Make decisions based on results of local computation 
 [Meiklejohn & Van Roy, 2015] 87

  94. Preliminary Results • Conflict-Free Replicated Data Types 
 Distributed data structures designed for convergence 
 [Shapiro et al., 2011] • Lattice Processing 
 Make decisions based on results of local computation 
 [Meiklejohn & Van Roy, 2015] • Selective Hearing 
 Scalable, epidemic broadcast based runtime system 
 [Meiklejohn & Van Roy, 2015/2016] 87

  95. Conflict-Free 
 Replicated Data Types • Collection of types 
 Sets, counters, registers, flags, maps 88

  96. Conflict-Free 
 Replicated Data Types • Collection of types 
 Sets, counters, registers, flags, maps • Strong Eventual Consistency (SEC) 
 Objects that receive the same updates, regardless of order, will reach equivalent state 88

  97. RA RB RC

  98. add(1) RA {1} (1, {a}, {}) RB RC

  99. add(1) RA {1} (1, {a}, {}) RB add(1) RC {1} (1, {c}, {})

  100. add(1) RA {1} (1, {a}, {}) RB add(1) remove(1) RC {1} {} (1, {c}, {c}) (1, {c}, {})

Recommend


More recommend