SlideShare a Scribd company logo
Miguel Vidal
Java Architect
Sun Microsystems
A Digital Ecosystem made with Jini
Federated
Advanced
Directory
Architecture
A digital ecosystem?
We are creating ‘digital Darwinism’: a service that
is able to evolve as the users need it to.
“It is not the strongest of species
that survive, nor the most
intelligent, but the one most
adaptable to change.”
Charles Darwin
1809 - 1882
The questions:
●
Is it possible to build up an air traffic
control system without any central
controller?
●
Is it possible to have wireless
mobile communications without a
telco operator?
●
Is it possible to have a service
available while it is moving trough
different networks?
The answer:
The Fetish NetworkTM
The FETISH NetworkTM
™ integrates information
systems, applications and services from disparate
tourism providers into a distributed, secure and
scalable platform within the European Research
DAFNE project.
It provides, through the use of Jini™ network
technology, an adaptive and self configuring
environment, delivering an integrated and
distributed application framework over the Internet.
From B2B model to S2S (Service to Service)
Fetish NetworkTM
Challenges
• Develop a platform infrastructure to
accommodate constantly changing environments
• Supporting spontaneous network of tourism-
oriented Value added services.
• Provide basic open source software components
to build value added services and join process
through automatic composition and configuration
• Opportunity to offer of “high-level” complex
services that are composed of basic tourism-
related services (as Lego blocks) provided by
different organizations
Where we are?
Fetish NetworkTM
Components• FETISH Repository
– Service Definitions and Service Implementations
(WSDL)
– Business Data Types
• FADA Infrastructure
– Cloud of Nodes (Virtual lookup server) and
Proxies
• Ontology System
– www.symontos.org
• Business Process Modeler & Executor
– Proman
FADA framework goals
• Enable the system to scale
– Over space
– Over number of services
– Over time
• Build reliable systems
– On the network
– From unreliable components
• Enable ad-hoc federations
– No central point of control (or failure)
Jini/Reggie constraints
●
Requires a broadcast medium
●
Reggie implementation, uses RMI as the
basic communication protocol (The
firewall problem)
●
It doesn't take into account variable net
latency for lease renewal
●
Discovery of Lookup services is based
on broadcasting certain message types.
This can NOT be achieved on the
Internet
FADA nodes
architecture●
An arbitrary graph of nodes is allowed,
because:
– As no central authority exists, everyone can
manage the connections, and create cycles.
– No single point of failure exists, except for the
DNS server of domain fetishproject.com, which is
replicated as-is.
●
Broadcasting on an arbitrary (and
potentially cyclic) graph must be
achieved.
– Several algorithms have been tested, but all of
them require knowledge of the structure or a fast
FADA topology
●
Mesh instead of a
tree
●
Lookup using
flooding algorithm
●
Self healing
●
Ad-hoc topology
FADA
FADA
FADA
FADA
FADA
FADA
FADA
FADAFADA
FADA
FADA
FADA
FADA lookup
●
Solution: the good, old flooding algorithm.
●
Main goal is not fast responsiveness, nor
optimal paths, but AVAILABILITY.
●
The flooding algorithm WILL find a path
between two nodes if such path exists.
●
It is reliable in front of connection failures: if
two nodes are no longer connected directly,
but a route through another one or more
nodes exits, the flooding algorithm will find it.
FADA Discovery
FADA
FADA
FADAFADA
FADA
New FADA node requests a FADA node IP
to its DNS in order to join the federation.
DNS
fada.fetishproject.com
10.1.1.1
10.1.1.2
10.1.1.3
10.1.1.4
10.1.1.5
10.1.1.6
FADA Lookup
example
FADA
FADA
FADAFADA
FADA
Client
FADA
FADA
FADAFADA
FADA
Client
Client performs lookup
FADA Lookup
example
FADA
FADA
FADAFADA
FADA
Client
New globally unique
SearchID is created
FADA Lookup
example
FADA
FADA
FADAFADA
FADA
Client
Local lookup is
performed.
Meanwhile, search is
expanded.
FADA Lookup
example
FADA
FADA
FADAFADA
FADA
Client
The above step is
repeated by
neighbors.
Meanwhile, the first
FADA node is waiting
for expiration of a
timeout
FADA Lookup
example
FADA
FADA
FADAFADA
FADA
Client
The direct neighbors notify
their results to the first
FADA node. Meanwhile,
the neighbors in the second
degree start local lookup
and attempt search
expansion. Both of them fail
to accomplish the latter,
because the node they
attempt to contact already
has the SearchID.
FADA Lookup
example
FADA
FADA
FADAFADA
FADA
Client
The latter neighbors
notify their results to
the first FADA node.
As they weren't
previously connected
to the first FADA
node, they connect
inmediately.
FADA Lookup
example
FADA
FADA
FADAFADA
FADA
Client
After the search
timeout occurs, the
first FADA node
returns the total
lookup results to the
client.
FADA Lookup
example
FADA
FADA
FADAFADA
FADA
Client
The service proxy is
retrieved directly by
the client, based on
the Service locator
delivered by the
FADA node.
FADA Lookup
example
FADA
FADA
FADAFADA
FADA
The SearchIDs
cached in every node
will be deleted after
30 sec.
FADA Lookup
example
FADA
FADA
FADAFADA
FADA
Resulting state of the
architecture: more
redundacy, improved
availability.
FADA Lookup
example
Reggie constraints
●
Requires a broadcast medium
●
Uses RMI as the basic communication
protocol
●
It doesn't take into account variable net
latency for lease renewal
RMI related Issues
●
Due to the fact that Reggie uses RMI as a
communication protocol, it opens sockets on arbitrary
ports. Firewalls don't allow this behaviour, and clients
behind them are not allowed to open a connection to
an arbitrary outside port.
●
All about RMI is useful with the exception of wire
protocol.
Protocol vs Implementation
●
Instead of a particular implementation, the
FADA architecture forces messages to be
exchanged amongst nodes and clients.
●
The use of XML documents allows clients
residing behind firewalls to work with the
FADA network without requiring the system
administrator to open new types of outside
connections.
●
The already existing setup of proxies and
open ports for http communication is used by
the FADA to exchange XML documents.
XML-RPC and JXTA
●
We get rid of the RMI constraint by
switching to another communication
protocols:
– XML-RPC over HTTP
– JXTA messages over HTTP
XML-RPC over HTTP
●
Every FADA node opens a socket on a
fixed port (chosen at startup)
●
It receives HTTP POST requests from
other FADA nodes or clients
●
These POST requests contain XML
documents that follow the XML-RPC
standard
Benefits of XML-RPC
●
Clients behind firewalls can safely use the
http proxies they may have available
●
FADA nodes can be behind a firewall: the
network administrator need only open a
single configurable port
●
Paranoid network administrators can trace
the traffic exchanges: it is only HTTP
messages.
●
FADA nodes can cooperate with other
implementations: only the protocol is
Lease renewal on the Internet
●
Delays on the internet are much larger than those
on a LAN.
●
Delays on the internet vary much more than those
on a LAN.
●
A method is needed to estimate the probable value
of the delay for a given instant of time.
●
Delay depends on many unknown factors, beyond
the observer's reach.
●
Lease renewal times depend on the delay between
the renewal request and the renewal operation.
Lease renewal on the
Internet
●
Hypothesis:
It is possible to do a network latency
forecast
●
Solution: Kalman filter
Kalman Filter
(1960)●
In 1960, R.E. Kalman published his
famous paper describing a recursive
solution to the discrete-data linear filtering
problem.
●
It resolves how do you get accurate
information out of inaccurate data.
●
The Kalman filter is a set of mathematical
equations that provides an efficient
computational (recursive) solution of the
least-squares method.
Why Kalman filter?
●
The Kalman filter provides a set of equations
that give the BEST estimate for the quantity
under study.
●
It can keep a history of past events without the
need to store all previous values.
●
It can cope with noisy measurement
procedures.
●
It can project the state in the future, and give
the BEST estimate for a FUTURE value, plus
the BEST estimate for its VARIANCE.
●
In that way, it is possible to get the WORST
Kalman Filter Block Diagram
Kalman Filter States
Kalman Filter States
The Kalman
assumptions●
The linear Kalman filter supposes the
parameter to be estimated follows a linear
function of its previous state plus an optional
control signal affected by a white gaussian
noise component.
●
Non-linear Kalman filters still suppose a
definite model. For instance, the movement of
a car on a track, the movement of currents of
hot/cold air, the movement of a rocket.
●
We have no such model: delay may vary
arbitrarily, grow or shrink, by a huge or a small
amount
Our Kalman model
●
Our approach is to consider the latency as
a constant value affected by white
gaussian noise.
●
This approach will give us the best
estimate for a parameter which is taken as
a constant, however we know for sure it's
not a constant.
●
We are interested in the variations of this
parameter, but the Kalman filter will strip
out these variations and give us the best
estimate for an hypothetical central value.
FETISH Kalman Filter
0
100
200
300
400
500
600
700
Delay
Kalman
Kalman+Sigm
Kalman Filter behaviour in front of a sudden delay
incrementDelay (ms)
FETISH Kalman Filter
0
200
400
600
800
1000
1200
1400
1600 Delay
Kalman
Kalman+Sigm
Kalman Filter behaviour in front of a sudden delay
decrementDelay (ms)
FETISH Kalman Filter
Kalman Filter behaviour in front of sudden delay
changes
0
500
1000
1500
2000
2500
3000
3500
4000
4500
Delay (ms)
Delay
Kalman Forecast
Sigma
Kalman+Sigma
Kalman Filter: conclusion
• Network latency forecast >95% accuracy
• Get accurate information out of
inaccurate data
• It supports estimations of future states,
not knowing the nature of the modeled
system
FADA Monitoring
FADA Monitoring
FADA Monitoring
FADA Administration
AdminCtl> h
Help
c <url1> <url2> Connect two Fada nodes
d <url1> <url2> Disconnect two Fada nodes
f <url> Get inFormation on a node
i <url> Isolate a Fada node
n <url> Get a Fada node neighbors
s <url> Get the Services registered in a Fada node
t <url> <password> Make a Fada node to sTop
q to leave administrator
h to show this message
AdminCtl> _
FADA Administration
FADA Installation
●
UNIX based installation process
FADA Installation
●
Windows based installation
process
FADA Releases
Version Released
FADA 3.0 04/09/2001
FADA 3.1 04/10/2001
FADA 4.0 24/01/2002
FADA 4.1.0 12/03/2002
FADA 4.1.1 08/04/2002
FADA 4.1.2 28/05/2002
FADA Evolution
Feature FADA 3.x FADA 4.x
Footprint 1 Mbyte 280 Kbytes
Speed Up 1 x 10 x
Administration Client/Server + Brow ser based
Installation Ad-hoc Wizards (Unix/Win)
Cross Firew alls No Yes
Coming soon...(FADA
5.0)●
Administration autentification
(PKI)
●
Proxy caching
●
Hot pluggable transport
protocol (RMI, JXTA, SOAP,
XML-RPC...)
●
SNMP protocol support
●
MMAE (Multiple Model
Adaptative Estimation) Kalman
Project Curriculum Vitae
●
European IT Tourism Conference (Brussels 12/11/1999)
●
IST Conference (Helsinki 24/11/1999)
●
Jini Community Meeting (Amsterdam 10/12/2000)
●
World Tourism (Lisbon 19/01/2001)
●
Enter 2001 (Montreal 25/04/2001)
●
Java One 2001 (San Francisco 07/06/2001)
●
Intelligent Transport System World Congress (Torino
7/11/2001)
●
European Commission Tourism Confecence (Brussels
9/7/2001)
●
IST Conference (Dusseldorf 3/12/2001)
●
Tourism exchange exibition BIT 2002 (Milan 22/2/2002)
●
Java One 2002 (San Francisco 27/3/2002)

More Related Content

What's hot

The Challenges of SDN/OpenFlow in an Operational and Large-scale Network
The Challenges of SDN/OpenFlow in an Operational and Large-scale NetworkThe Challenges of SDN/OpenFlow in an Operational and Large-scale Network
The Challenges of SDN/OpenFlow in an Operational and Large-scale Network
Open Networking Summits
 
Software Defined Networking (SDN)
Software Defined Networking (SDN)Software Defined Networking (SDN)
Software Defined Networking (SDN)
NetProtocol Xpert
 
Internet Traffic Engineering
Internet Traffic EngineeringInternet Traffic Engineering
Internet Traffic Engineering
jonassm
 
Performance Evaluation of GTP-U and SRv6 Stateless Translation
Performance Evaluation of GTP-U and SRv6 Stateless TranslationPerformance Evaluation of GTP-U and SRv6 Stateless Translation
Performance Evaluation of GTP-U and SRv6 Stateless Translation
Chunghan Lee
 
Routing, Network Performance, and Role of Analytics
Routing, Network Performance, and Role of AnalyticsRouting, Network Performance, and Role of Analytics
Routing, Network Performance, and Role of Analytics
APNIC
 
SDN interfaces and performance analysis of SDN components
SDN interfaces and performance analysis of SDN componentsSDN interfaces and performance analysis of SDN components
SDN interfaces and performance analysis of SDN components
Steffen Gebert
 
Tutorial on SDN data plane evolution
Tutorial on SDN data plane evolutionTutorial on SDN data plane evolution
Tutorial on SDN data plane evolution
Antonio Capone
 
Software-Defined Networking , Survey of HotSDN 2012
Software-Defined Networking , Survey of HotSDN 2012Software-Defined Networking , Survey of HotSDN 2012
Software-Defined Networking , Survey of HotSDN 2012
Jason TC HOU (侯宗成)
 
Carrier Ethernet
Carrier EthernetCarrier Ethernet
Carrier Ethernet
Azhar Khuwaja
 
SDN Traffic Engineering, A Natural Evolution
SDN Traffic Engineering, A Natural EvolutionSDN Traffic Engineering, A Natural Evolution
SDN Traffic Engineering, A Natural Evolution
APNIC
 
software defined network, openflow protocol and its controllers
software defined network, openflow protocol and its controllerssoftware defined network, openflow protocol and its controllers
software defined network, openflow protocol and its controllers
Isaku Yamahata
 
Routed networks sydney
Routed networks sydneyRouted networks sydney
Routed networks sydney
Miguel Lavalle
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44
Jisc
 
Openflow Protocol
Openflow ProtocolOpenflow Protocol
Openflow Protocol
Kaliyaperumal Krishnan
 
Distributed routing
Distributed routingDistributed routing
Distributed routing
Murali Reddy
 
LoRa и LoRaWAN. Особенности технологий и практическое использование, Богдан К...
LoRa и LoRaWAN. Особенности технологий и практическое использование, Богдан К...LoRa и LoRaWAN. Особенности технологий и практическое использование, Богдан К...
LoRa и LoRaWAN. Особенности технологий и практическое использование, Богдан К...
Sigma Software
 
DEVNET-1175 OpenDaylight Service Function Chaining
DEVNET-1175	OpenDaylight Service Function ChainingDEVNET-1175	OpenDaylight Service Function Chaining
DEVNET-1175 OpenDaylight Service Function Chaining
Cisco DevNet
 
I pv6 routing_protocol_for_low_power_and_lossy_
I pv6 routing_protocol_for_low_power_and_lossy_I pv6 routing_protocol_for_low_power_and_lossy_
I pv6 routing_protocol_for_low_power_and_lossy_
Sheetal Kshirsagar
 
Tech Tutorial by Vikram Dham: Let's build MPLS router using SDN
Tech Tutorial by Vikram Dham: Let's build MPLS router using SDNTech Tutorial by Vikram Dham: Let's build MPLS router using SDN
Tech Tutorial by Vikram Dham: Let's build MPLS router using SDN
nvirters
 
Valiant Load Balancing and Traffic Oblivious Routing
Valiant Load Balancing and Traffic Oblivious RoutingValiant Load Balancing and Traffic Oblivious Routing
Valiant Load Balancing and Traffic Oblivious Routing
Jason TC HOU (侯宗成)
 

What's hot (20)

The Challenges of SDN/OpenFlow in an Operational and Large-scale Network
The Challenges of SDN/OpenFlow in an Operational and Large-scale NetworkThe Challenges of SDN/OpenFlow in an Operational and Large-scale Network
The Challenges of SDN/OpenFlow in an Operational and Large-scale Network
 
Software Defined Networking (SDN)
Software Defined Networking (SDN)Software Defined Networking (SDN)
Software Defined Networking (SDN)
 
Internet Traffic Engineering
Internet Traffic EngineeringInternet Traffic Engineering
Internet Traffic Engineering
 
Performance Evaluation of GTP-U and SRv6 Stateless Translation
Performance Evaluation of GTP-U and SRv6 Stateless TranslationPerformance Evaluation of GTP-U and SRv6 Stateless Translation
Performance Evaluation of GTP-U and SRv6 Stateless Translation
 
Routing, Network Performance, and Role of Analytics
Routing, Network Performance, and Role of AnalyticsRouting, Network Performance, and Role of Analytics
Routing, Network Performance, and Role of Analytics
 
SDN interfaces and performance analysis of SDN components
SDN interfaces and performance analysis of SDN componentsSDN interfaces and performance analysis of SDN components
SDN interfaces and performance analysis of SDN components
 
Tutorial on SDN data plane evolution
Tutorial on SDN data plane evolutionTutorial on SDN data plane evolution
Tutorial on SDN data plane evolution
 
Software-Defined Networking , Survey of HotSDN 2012
Software-Defined Networking , Survey of HotSDN 2012Software-Defined Networking , Survey of HotSDN 2012
Software-Defined Networking , Survey of HotSDN 2012
 
Carrier Ethernet
Carrier EthernetCarrier Ethernet
Carrier Ethernet
 
SDN Traffic Engineering, A Natural Evolution
SDN Traffic Engineering, A Natural EvolutionSDN Traffic Engineering, A Natural Evolution
SDN Traffic Engineering, A Natural Evolution
 
software defined network, openflow protocol and its controllers
software defined network, openflow protocol and its controllerssoftware defined network, openflow protocol and its controllers
software defined network, openflow protocol and its controllers
 
Routed networks sydney
Routed networks sydneyRouted networks sydney
Routed networks sydney
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44
 
Openflow Protocol
Openflow ProtocolOpenflow Protocol
Openflow Protocol
 
Distributed routing
Distributed routingDistributed routing
Distributed routing
 
LoRa и LoRaWAN. Особенности технологий и практическое использование, Богдан К...
LoRa и LoRaWAN. Особенности технологий и практическое использование, Богдан К...LoRa и LoRaWAN. Особенности технологий и практическое использование, Богдан К...
LoRa и LoRaWAN. Особенности технологий и практическое использование, Богдан К...
 
DEVNET-1175 OpenDaylight Service Function Chaining
DEVNET-1175	OpenDaylight Service Function ChainingDEVNET-1175	OpenDaylight Service Function Chaining
DEVNET-1175 OpenDaylight Service Function Chaining
 
I pv6 routing_protocol_for_low_power_and_lossy_
I pv6 routing_protocol_for_low_power_and_lossy_I pv6 routing_protocol_for_low_power_and_lossy_
I pv6 routing_protocol_for_low_power_and_lossy_
 
Tech Tutorial by Vikram Dham: Let's build MPLS router using SDN
Tech Tutorial by Vikram Dham: Let's build MPLS router using SDNTech Tutorial by Vikram Dham: Let's build MPLS router using SDN
Tech Tutorial by Vikram Dham: Let's build MPLS router using SDN
 
Valiant Load Balancing and Traffic Oblivious Routing
Valiant Load Balancing and Traffic Oblivious RoutingValiant Load Balancing and Traffic Oblivious Routing
Valiant Load Balancing and Traffic Oblivious Routing
 

Similar to Java One 2001

A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
Tal Lavian Ph.D.
 
Voltaire ufm en_nov10
Voltaire ufm en_nov10Voltaire ufm en_nov10
Voltaire ufm en_nov10
sciecomp
 
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
Tal Lavian Ph.D.
 
Traffic Shaping Basics with PRIQ - pfSense Hangout February 2016
Traffic Shaping Basics with PRIQ - pfSense Hangout February 2016Traffic Shaping Basics with PRIQ - pfSense Hangout February 2016
Traffic Shaping Basics with PRIQ - pfSense Hangout February 2016
Netgate
 
DWDM-RAM: DARPA-Sponsored Research for Data Intensive Service-on-Demand Advan...
DWDM-RAM: DARPA-Sponsored Research for Data Intensive Service-on-Demand Advan...DWDM-RAM: DARPA-Sponsored Research for Data Intensive Service-on-Demand Advan...
DWDM-RAM: DARPA-Sponsored Research for Data Intensive Service-on-Demand Advan...
Tal Lavian Ph.D.
 
GÉANT TURN pilot
GÉANT TURN pilotGÉANT TURN pilot
GÉANT TURN pilot
Mihály Mészáros
 
5 g core network and the cloud - A standards perspective
5 g core network and the cloud - A standards perspective5 g core network and the cloud - A standards perspective
5 g core network and the cloud - A standards perspective
Sridhar Bhaskaran
 
5G in Brownfield how SDN makes 5G Deployments Work
5G in Brownfield how SDN makes 5G Deployments Work5G in Brownfield how SDN makes 5G Deployments Work
5G in Brownfield how SDN makes 5G Deployments Work
Lumina Networks
 
DWDM-RAM: DARPA-Sponsored Research for Data Intensive Service-on-Demand Advan...
DWDM-RAM: DARPA-Sponsored Research for Data Intensive Service-on-Demand Advan...DWDM-RAM: DARPA-Sponsored Research for Data Intensive Service-on-Demand Advan...
DWDM-RAM: DARPA-Sponsored Research for Data Intensive Service-on-Demand Advan...
Tal Lavian Ph.D.
 
Peering 101 - ABQNOG1 - May2023
Peering 101 - ABQNOG1 - May2023Peering 101 - ABQNOG1 - May2023
Peering 101 - ABQNOG1 - May2023
Chris Grundemann
 
Strategy briefing: network technologies 7 March 2013
Strategy briefing: network technologies 7 March 2013Strategy briefing: network technologies 7 March 2013
Strategy briefing: network technologies 7 March 2013
Jisc
 
Learning series fundamentals of Networking and Medical Imaging
Learning series fundamentals of Networking and Medical ImagingLearning series fundamentals of Networking and Medical Imaging
Learning series fundamentals of Networking and Medical Imaging
Ryan Furlough, BSCPE CPAS
 
Three years of OFELIA - taking stock
Three years of OFELIA - taking stockThree years of OFELIA - taking stock
Three years of OFELIA - taking stock
FIBRE Testbed
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
Asish Verma
 
Zigbee
ZigbeeZigbee
Zigbee
Kannan Rajan
 
Enabling Active Flow Manipulation (AFM) in Silicon-based Network Forwarding E...
Enabling Active Flow Manipulation (AFM) in Silicon-based Network Forwarding E...Enabling Active Flow Manipulation (AFM) in Silicon-based Network Forwarding E...
Enabling Active Flow Manipulation (AFM) in Silicon-based Network Forwarding E...
Tal Lavian Ph.D.
 
Introduction to Flink Streaming
Introduction to Flink StreamingIntroduction to Flink Streaming
Introduction to Flink Streaming
datamantra
 
MUM Melbourne : Build Enterprise Wireless with CAPsMAN
MUM Melbourne : Build Enterprise Wireless with CAPsMANMUM Melbourne : Build Enterprise Wireless with CAPsMAN
MUM Melbourne : Build Enterprise Wireless with CAPsMAN
GLC Networks
 
Presentation on Data Center Use-Case & Trends
Presentation on Data Center Use-Case & TrendsPresentation on Data Center Use-Case & Trends
Presentation on Data Center Use-Case & Trends
Amod Dani
 
Zigbee
ZigbeeZigbee

Similar to Java One 2001 (20)

A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
 
Voltaire ufm en_nov10
Voltaire ufm en_nov10Voltaire ufm en_nov10
Voltaire ufm en_nov10
 
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
 
Traffic Shaping Basics with PRIQ - pfSense Hangout February 2016
Traffic Shaping Basics with PRIQ - pfSense Hangout February 2016Traffic Shaping Basics with PRIQ - pfSense Hangout February 2016
Traffic Shaping Basics with PRIQ - pfSense Hangout February 2016
 
DWDM-RAM: DARPA-Sponsored Research for Data Intensive Service-on-Demand Advan...
DWDM-RAM: DARPA-Sponsored Research for Data Intensive Service-on-Demand Advan...DWDM-RAM: DARPA-Sponsored Research for Data Intensive Service-on-Demand Advan...
DWDM-RAM: DARPA-Sponsored Research for Data Intensive Service-on-Demand Advan...
 
GÉANT TURN pilot
GÉANT TURN pilotGÉANT TURN pilot
GÉANT TURN pilot
 
5 g core network and the cloud - A standards perspective
5 g core network and the cloud - A standards perspective5 g core network and the cloud - A standards perspective
5 g core network and the cloud - A standards perspective
 
5G in Brownfield how SDN makes 5G Deployments Work
5G in Brownfield how SDN makes 5G Deployments Work5G in Brownfield how SDN makes 5G Deployments Work
5G in Brownfield how SDN makes 5G Deployments Work
 
DWDM-RAM: DARPA-Sponsored Research for Data Intensive Service-on-Demand Advan...
DWDM-RAM: DARPA-Sponsored Research for Data Intensive Service-on-Demand Advan...DWDM-RAM: DARPA-Sponsored Research for Data Intensive Service-on-Demand Advan...
DWDM-RAM: DARPA-Sponsored Research for Data Intensive Service-on-Demand Advan...
 
Peering 101 - ABQNOG1 - May2023
Peering 101 - ABQNOG1 - May2023Peering 101 - ABQNOG1 - May2023
Peering 101 - ABQNOG1 - May2023
 
Strategy briefing: network technologies 7 March 2013
Strategy briefing: network technologies 7 March 2013Strategy briefing: network technologies 7 March 2013
Strategy briefing: network technologies 7 March 2013
 
Learning series fundamentals of Networking and Medical Imaging
Learning series fundamentals of Networking and Medical ImagingLearning series fundamentals of Networking and Medical Imaging
Learning series fundamentals of Networking and Medical Imaging
 
Three years of OFELIA - taking stock
Three years of OFELIA - taking stockThree years of OFELIA - taking stock
Three years of OFELIA - taking stock
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
Zigbee
ZigbeeZigbee
Zigbee
 
Enabling Active Flow Manipulation (AFM) in Silicon-based Network Forwarding E...
Enabling Active Flow Manipulation (AFM) in Silicon-based Network Forwarding E...Enabling Active Flow Manipulation (AFM) in Silicon-based Network Forwarding E...
Enabling Active Flow Manipulation (AFM) in Silicon-based Network Forwarding E...
 
Introduction to Flink Streaming
Introduction to Flink StreamingIntroduction to Flink Streaming
Introduction to Flink Streaming
 
MUM Melbourne : Build Enterprise Wireless with CAPsMAN
MUM Melbourne : Build Enterprise Wireless with CAPsMANMUM Melbourne : Build Enterprise Wireless with CAPsMAN
MUM Melbourne : Build Enterprise Wireless with CAPsMAN
 
Presentation on Data Center Use-Case & Trends
Presentation on Data Center Use-Case & TrendsPresentation on Data Center Use-Case & Trends
Presentation on Data Center Use-Case & Trends
 
Zigbee
ZigbeeZigbee
Zigbee
 

More from Miguel Vidal

Sironta
SirontaSironta
Sironta
Miguel Vidal
 
BCN City App
BCN City AppBCN City App
BCN City App
Miguel Vidal
 
By-Taxi
By-TaxiBy-Taxi
By-Taxi
Miguel Vidal
 
Curso Arduino 2015
Curso Arduino 2015Curso Arduino 2015
Curso Arduino 2015
Miguel Vidal
 
TechIDEAS Air Quality System
TechIDEAS Air Quality SystemTechIDEAS Air Quality System
TechIDEAS Air Quality System
Miguel Vidal
 
Birmingham-20060705
Birmingham-20060705Birmingham-20060705
Birmingham-20060705
Miguel Vidal
 
TechIDEAS Presentation
TechIDEAS PresentationTechIDEAS Presentation
TechIDEAS Presentation
Miguel Vidal
 

More from Miguel Vidal (7)

Sironta
SirontaSironta
Sironta
 
BCN City App
BCN City AppBCN City App
BCN City App
 
By-Taxi
By-TaxiBy-Taxi
By-Taxi
 
Curso Arduino 2015
Curso Arduino 2015Curso Arduino 2015
Curso Arduino 2015
 
TechIDEAS Air Quality System
TechIDEAS Air Quality SystemTechIDEAS Air Quality System
TechIDEAS Air Quality System
 
Birmingham-20060705
Birmingham-20060705Birmingham-20060705
Birmingham-20060705
 
TechIDEAS Presentation
TechIDEAS PresentationTechIDEAS Presentation
TechIDEAS Presentation
 

Recently uploaded

Optimizing Your E-commerce with WooCommerce.pptx
Optimizing Your E-commerce with WooCommerce.pptxOptimizing Your E-commerce with WooCommerce.pptx
Optimizing Your E-commerce with WooCommerce.pptx
WebConnect Pvt Ltd
 
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
manji sharman06
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
safelyiotech
 
Photoshop Tutorial for Beginners (2024 Edition)
Photoshop Tutorial for Beginners (2024 Edition)Photoshop Tutorial for Beginners (2024 Edition)
Photoshop Tutorial for Beginners (2024 Edition)
alowpalsadig
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
gapen1
 
Software Test Automation - A Comprehensive Guide on Automated Testing.pdf
Software Test Automation - A Comprehensive Guide on Automated Testing.pdfSoftware Test Automation - A Comprehensive Guide on Automated Testing.pdf
Software Test Automation - A Comprehensive Guide on Automated Testing.pdf
kalichargn70th171
 
What’s New in VictoriaLogs - Q2 2024 Update
What’s New in VictoriaLogs - Q2 2024 UpdateWhat’s New in VictoriaLogs - Q2 2024 Update
What’s New in VictoriaLogs - Q2 2024 Update
VictoriaMetrics
 
The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024
Yara Milbes
 
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSISDECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
Tier1 app
 
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
widenerjobeyrl638
 
What is Continuous Testing in DevOps - A Definitive Guide.pdf
What is Continuous Testing in DevOps - A Definitive Guide.pdfWhat is Continuous Testing in DevOps - A Definitive Guide.pdf
What is Continuous Testing in DevOps - A Definitive Guide.pdf
kalichargn70th171
 
Alluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio Webinar | 10x Faster Trino Queries on Your Data PlatformAlluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio, Inc.
 
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom KittEnhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Peter Caitens
 
TheFutureIsDynamic-BoxLang-CFCamp2024.pdf
TheFutureIsDynamic-BoxLang-CFCamp2024.pdfTheFutureIsDynamic-BoxLang-CFCamp2024.pdf
TheFutureIsDynamic-BoxLang-CFCamp2024.pdf
Ortus Solutions, Corp
 
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
Secure-by-Design Using Hardware and Software Protection for FDA ComplianceSecure-by-Design Using Hardware and Software Protection for FDA Compliance
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
ICS
 
Upturn India Technologies - Web development company in Nashik
Upturn India Technologies - Web development company in NashikUpturn India Technologies - Web development company in Nashik
Upturn India Technologies - Web development company in Nashik
Upturn India Technologies
 
Hyperledger Besu 빨리 따라하기 (Private Networks)
Hyperledger Besu 빨리 따라하기 (Private Networks)Hyperledger Besu 빨리 따라하기 (Private Networks)
Hyperledger Besu 빨리 따라하기 (Private Networks)
wonyong hwang
 
42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert
vaishalijagtap12
 
Refactoring legacy systems using events commands and bubble contexts
Refactoring legacy systems using events commands and bubble contextsRefactoring legacy systems using events commands and bubble contexts
Refactoring legacy systems using events commands and bubble contexts
Michał Kurzeja
 
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery FleetStork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
Vince Scalabrino
 

Recently uploaded (20)

Optimizing Your E-commerce with WooCommerce.pptx
Optimizing Your E-commerce with WooCommerce.pptxOptimizing Your E-commerce with WooCommerce.pptx
Optimizing Your E-commerce with WooCommerce.pptx
 
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
 
Photoshop Tutorial for Beginners (2024 Edition)
Photoshop Tutorial for Beginners (2024 Edition)Photoshop Tutorial for Beginners (2024 Edition)
Photoshop Tutorial for Beginners (2024 Edition)
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
 
Software Test Automation - A Comprehensive Guide on Automated Testing.pdf
Software Test Automation - A Comprehensive Guide on Automated Testing.pdfSoftware Test Automation - A Comprehensive Guide on Automated Testing.pdf
Software Test Automation - A Comprehensive Guide on Automated Testing.pdf
 
What’s New in VictoriaLogs - Q2 2024 Update
What’s New in VictoriaLogs - Q2 2024 UpdateWhat’s New in VictoriaLogs - Q2 2024 Update
What’s New in VictoriaLogs - Q2 2024 Update
 
The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024
 
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSISDECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
 
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
 
What is Continuous Testing in DevOps - A Definitive Guide.pdf
What is Continuous Testing in DevOps - A Definitive Guide.pdfWhat is Continuous Testing in DevOps - A Definitive Guide.pdf
What is Continuous Testing in DevOps - A Definitive Guide.pdf
 
Alluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio Webinar | 10x Faster Trino Queries on Your Data PlatformAlluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio Webinar | 10x Faster Trino Queries on Your Data Platform
 
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom KittEnhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
 
TheFutureIsDynamic-BoxLang-CFCamp2024.pdf
TheFutureIsDynamic-BoxLang-CFCamp2024.pdfTheFutureIsDynamic-BoxLang-CFCamp2024.pdf
TheFutureIsDynamic-BoxLang-CFCamp2024.pdf
 
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
Secure-by-Design Using Hardware and Software Protection for FDA ComplianceSecure-by-Design Using Hardware and Software Protection for FDA Compliance
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
 
Upturn India Technologies - Web development company in Nashik
Upturn India Technologies - Web development company in NashikUpturn India Technologies - Web development company in Nashik
Upturn India Technologies - Web development company in Nashik
 
Hyperledger Besu 빨리 따라하기 (Private Networks)
Hyperledger Besu 빨리 따라하기 (Private Networks)Hyperledger Besu 빨리 따라하기 (Private Networks)
Hyperledger Besu 빨리 따라하기 (Private Networks)
 
42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert
 
Refactoring legacy systems using events commands and bubble contexts
Refactoring legacy systems using events commands and bubble contextsRefactoring legacy systems using events commands and bubble contexts
Refactoring legacy systems using events commands and bubble contexts
 
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery FleetStork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
 

Java One 2001

  • 1. Miguel Vidal Java Architect Sun Microsystems A Digital Ecosystem made with Jini Federated Advanced Directory Architecture
  • 2. A digital ecosystem? We are creating ‘digital Darwinism’: a service that is able to evolve as the users need it to. “It is not the strongest of species that survive, nor the most intelligent, but the one most adaptable to change.” Charles Darwin 1809 - 1882
  • 3. The questions: ● Is it possible to build up an air traffic control system without any central controller? ● Is it possible to have wireless mobile communications without a telco operator? ● Is it possible to have a service available while it is moving trough different networks?
  • 4. The answer: The Fetish NetworkTM The FETISH NetworkTM ™ integrates information systems, applications and services from disparate tourism providers into a distributed, secure and scalable platform within the European Research DAFNE project. It provides, through the use of Jini™ network technology, an adaptive and self configuring environment, delivering an integrated and distributed application framework over the Internet. From B2B model to S2S (Service to Service)
  • 5. Fetish NetworkTM Challenges • Develop a platform infrastructure to accommodate constantly changing environments • Supporting spontaneous network of tourism- oriented Value added services. • Provide basic open source software components to build value added services and join process through automatic composition and configuration • Opportunity to offer of “high-level” complex services that are composed of basic tourism- related services (as Lego blocks) provided by different organizations
  • 7. Fetish NetworkTM Components• FETISH Repository – Service Definitions and Service Implementations (WSDL) – Business Data Types • FADA Infrastructure – Cloud of Nodes (Virtual lookup server) and Proxies • Ontology System – www.symontos.org • Business Process Modeler & Executor – Proman
  • 8. FADA framework goals • Enable the system to scale – Over space – Over number of services – Over time • Build reliable systems – On the network – From unreliable components • Enable ad-hoc federations – No central point of control (or failure)
  • 9. Jini/Reggie constraints ● Requires a broadcast medium ● Reggie implementation, uses RMI as the basic communication protocol (The firewall problem) ● It doesn't take into account variable net latency for lease renewal ● Discovery of Lookup services is based on broadcasting certain message types. This can NOT be achieved on the Internet
  • 10. FADA nodes architecture● An arbitrary graph of nodes is allowed, because: – As no central authority exists, everyone can manage the connections, and create cycles. – No single point of failure exists, except for the DNS server of domain fetishproject.com, which is replicated as-is. ● Broadcasting on an arbitrary (and potentially cyclic) graph must be achieved. – Several algorithms have been tested, but all of them require knowledge of the structure or a fast
  • 11. FADA topology ● Mesh instead of a tree ● Lookup using flooding algorithm ● Self healing ● Ad-hoc topology FADA FADA FADA FADA FADA FADA FADA FADAFADA FADA FADA FADA
  • 12. FADA lookup ● Solution: the good, old flooding algorithm. ● Main goal is not fast responsiveness, nor optimal paths, but AVAILABILITY. ● The flooding algorithm WILL find a path between two nodes if such path exists. ● It is reliable in front of connection failures: if two nodes are no longer connected directly, but a route through another one or more nodes exits, the flooding algorithm will find it.
  • 13. FADA Discovery FADA FADA FADAFADA FADA New FADA node requests a FADA node IP to its DNS in order to join the federation. DNS fada.fetishproject.com 10.1.1.1 10.1.1.2 10.1.1.3 10.1.1.4 10.1.1.5 10.1.1.6
  • 18. FADA FADA FADAFADA FADA Client The above step is repeated by neighbors. Meanwhile, the first FADA node is waiting for expiration of a timeout FADA Lookup example
  • 19. FADA FADA FADAFADA FADA Client The direct neighbors notify their results to the first FADA node. Meanwhile, the neighbors in the second degree start local lookup and attempt search expansion. Both of them fail to accomplish the latter, because the node they attempt to contact already has the SearchID. FADA Lookup example
  • 20. FADA FADA FADAFADA FADA Client The latter neighbors notify their results to the first FADA node. As they weren't previously connected to the first FADA node, they connect inmediately. FADA Lookup example
  • 21. FADA FADA FADAFADA FADA Client After the search timeout occurs, the first FADA node returns the total lookup results to the client. FADA Lookup example
  • 22. FADA FADA FADAFADA FADA Client The service proxy is retrieved directly by the client, based on the Service locator delivered by the FADA node. FADA Lookup example
  • 23. FADA FADA FADAFADA FADA The SearchIDs cached in every node will be deleted after 30 sec. FADA Lookup example
  • 24. FADA FADA FADAFADA FADA Resulting state of the architecture: more redundacy, improved availability. FADA Lookup example
  • 25. Reggie constraints ● Requires a broadcast medium ● Uses RMI as the basic communication protocol ● It doesn't take into account variable net latency for lease renewal
  • 26. RMI related Issues ● Due to the fact that Reggie uses RMI as a communication protocol, it opens sockets on arbitrary ports. Firewalls don't allow this behaviour, and clients behind them are not allowed to open a connection to an arbitrary outside port. ● All about RMI is useful with the exception of wire protocol.
  • 27. Protocol vs Implementation ● Instead of a particular implementation, the FADA architecture forces messages to be exchanged amongst nodes and clients. ● The use of XML documents allows clients residing behind firewalls to work with the FADA network without requiring the system administrator to open new types of outside connections. ● The already existing setup of proxies and open ports for http communication is used by the FADA to exchange XML documents.
  • 28. XML-RPC and JXTA ● We get rid of the RMI constraint by switching to another communication protocols: – XML-RPC over HTTP – JXTA messages over HTTP
  • 29. XML-RPC over HTTP ● Every FADA node opens a socket on a fixed port (chosen at startup) ● It receives HTTP POST requests from other FADA nodes or clients ● These POST requests contain XML documents that follow the XML-RPC standard
  • 30. Benefits of XML-RPC ● Clients behind firewalls can safely use the http proxies they may have available ● FADA nodes can be behind a firewall: the network administrator need only open a single configurable port ● Paranoid network administrators can trace the traffic exchanges: it is only HTTP messages. ● FADA nodes can cooperate with other implementations: only the protocol is
  • 31. Lease renewal on the Internet ● Delays on the internet are much larger than those on a LAN. ● Delays on the internet vary much more than those on a LAN. ● A method is needed to estimate the probable value of the delay for a given instant of time. ● Delay depends on many unknown factors, beyond the observer's reach. ● Lease renewal times depend on the delay between the renewal request and the renewal operation.
  • 32. Lease renewal on the Internet ● Hypothesis: It is possible to do a network latency forecast ● Solution: Kalman filter
  • 33. Kalman Filter (1960)● In 1960, R.E. Kalman published his famous paper describing a recursive solution to the discrete-data linear filtering problem. ● It resolves how do you get accurate information out of inaccurate data. ● The Kalman filter is a set of mathematical equations that provides an efficient computational (recursive) solution of the least-squares method.
  • 34. Why Kalman filter? ● The Kalman filter provides a set of equations that give the BEST estimate for the quantity under study. ● It can keep a history of past events without the need to store all previous values. ● It can cope with noisy measurement procedures. ● It can project the state in the future, and give the BEST estimate for a FUTURE value, plus the BEST estimate for its VARIANCE. ● In that way, it is possible to get the WORST
  • 38. The Kalman assumptions● The linear Kalman filter supposes the parameter to be estimated follows a linear function of its previous state plus an optional control signal affected by a white gaussian noise component. ● Non-linear Kalman filters still suppose a definite model. For instance, the movement of a car on a track, the movement of currents of hot/cold air, the movement of a rocket. ● We have no such model: delay may vary arbitrarily, grow or shrink, by a huge or a small amount
  • 39. Our Kalman model ● Our approach is to consider the latency as a constant value affected by white gaussian noise. ● This approach will give us the best estimate for a parameter which is taken as a constant, however we know for sure it's not a constant. ● We are interested in the variations of this parameter, but the Kalman filter will strip out these variations and give us the best estimate for an hypothetical central value.
  • 40. FETISH Kalman Filter 0 100 200 300 400 500 600 700 Delay Kalman Kalman+Sigm Kalman Filter behaviour in front of a sudden delay incrementDelay (ms)
  • 41. FETISH Kalman Filter 0 200 400 600 800 1000 1200 1400 1600 Delay Kalman Kalman+Sigm Kalman Filter behaviour in front of a sudden delay decrementDelay (ms)
  • 42. FETISH Kalman Filter Kalman Filter behaviour in front of sudden delay changes 0 500 1000 1500 2000 2500 3000 3500 4000 4500 Delay (ms) Delay Kalman Forecast Sigma Kalman+Sigma
  • 43. Kalman Filter: conclusion • Network latency forecast >95% accuracy • Get accurate information out of inaccurate data • It supports estimations of future states, not knowing the nature of the modeled system
  • 47. FADA Administration AdminCtl> h Help c <url1> <url2> Connect two Fada nodes d <url1> <url2> Disconnect two Fada nodes f <url> Get inFormation on a node i <url> Isolate a Fada node n <url> Get a Fada node neighbors s <url> Get the Services registered in a Fada node t <url> <password> Make a Fada node to sTop q to leave administrator h to show this message AdminCtl> _
  • 49. FADA Installation ● UNIX based installation process
  • 50. FADA Installation ● Windows based installation process
  • 51. FADA Releases Version Released FADA 3.0 04/09/2001 FADA 3.1 04/10/2001 FADA 4.0 24/01/2002 FADA 4.1.0 12/03/2002 FADA 4.1.1 08/04/2002 FADA 4.1.2 28/05/2002
  • 52. FADA Evolution Feature FADA 3.x FADA 4.x Footprint 1 Mbyte 280 Kbytes Speed Up 1 x 10 x Administration Client/Server + Brow ser based Installation Ad-hoc Wizards (Unix/Win) Cross Firew alls No Yes
  • 53. Coming soon...(FADA 5.0)● Administration autentification (PKI) ● Proxy caching ● Hot pluggable transport protocol (RMI, JXTA, SOAP, XML-RPC...) ● SNMP protocol support ● MMAE (Multiple Model Adaptative Estimation) Kalman
  • 54. Project Curriculum Vitae ● European IT Tourism Conference (Brussels 12/11/1999) ● IST Conference (Helsinki 24/11/1999) ● Jini Community Meeting (Amsterdam 10/12/2000) ● World Tourism (Lisbon 19/01/2001) ● Enter 2001 (Montreal 25/04/2001) ● Java One 2001 (San Francisco 07/06/2001) ● Intelligent Transport System World Congress (Torino 7/11/2001) ● European Commission Tourism Confecence (Brussels 9/7/2001) ● IST Conference (Dusseldorf 3/12/2001) ● Tourism exchange exibition BIT 2002 (Milan 22/2/2002) ● Java One 2002 (San Francisco 27/3/2002)