SlideShare a Scribd company logo
Lighthouse:
Intercloud Metadata Service



                                   Rich Miller
                            Surendra Reddy
                 Infrastructure 2.0 Working Group
                                 January 20, 2010
Agenda
•  Intercloud & Lighthouse Objectives

•  Use cases (as drivers & definition)

•  Lighthouse Requirements & Concepts

•  Available technologies & standards

•  Architectural Guiding Principles

•  Call(s) to action
Intercloud & Objectives
Intercloud

Requires the dissemination &
exchange of operational metadata
- among clouds,
- between cloud services and
consumers of their services.
Lighthouse
Lighthouse
  Where to start?
  •  Agreement on identification, location
     and ID-Loc resolution
  •  A registry for the discovery and
     description of intercloud constituents
  •  A mechanism for the delivery of cloud
     service descriptive & operational data
  •  A governance structure for
     admission & ejection, assurance,
     permissions & entitlements
Lighthouse
  The concept:
  •  Each member takes responsibility for
     its own metadata access services
  •  Membership in a communal registry of
     metadata access services, with
     identification – location resolution
  •  Agreement on mechanisms for
     - pub/sub/search/query
     - asynchronous message delivery
Lighthouse Scope

Scope is limited to providing the
Service Access Point and related
 metadata to service Consumers
Use Cases
Intercloud: Use Case #1
•  Customer A, EDA company, seeks a list of
   IaaS services which claim to provide:
       •  cloud data management
       •  Linux OS image management
  •     Queries the Intercloud registry,
        returns IDs of services that meet criteria
  •     Searches IaaS service metadata to make selection
  •     Access the Service Access Point (SAP) of a
        vendor to validate claims
  •     Subscribes to Service Access Point for receipt of
        service announcements, rate changes, etc
Intercloud: Use Case #2
•  Customer B, an insurance company, seeks a
   single IaaS provider to continuously satisfy
   service requirements (constraints)
       •  E.g. latencies, geography, SLAs etc.
  •     Queries the Intercloud registry,
        returns IDs of services that meet criteria
  •     Searches IaaS metadata to make selection
  •     Access the SAPs of vendor to create
        Cloud Service Account Instance
  •     Subscribes to SAP for receipt of relevant
        requirement-specific metadata
  •     Takes specific actions based on timely notifications
        (near realtime alerts) via Service Provider APIs and
        management functions
Intercloud: Use Case #3
•  Customer C, a globally distributed online
   service looking for an IaaS Providers in Europe
   and in USA with specific SLAs.
  •    Using the Intercloud registry, locates services
       meeting needs in two locations.
  •    Identifies alternative providers for the business
       continuity (DR, backup, …) functions.
  •    Customer C’s application management system
       subscribes to failure events & performance sensors
       from the IaaS providers.
  •    Based monitored event/sensor feeds, C’s service
       monitoring application dynamically scales up/down
       the resources (computing, networking, and storage)
       to their applications
Intercloud: Use Case #4
•  Customer D, a financial services company,
   runs applications that are either (or both)
     •    latency sensitive
     •    throughput sensitive
  •  After selecting IaaS provider:
     •    Sets up the virtual network between on-premise
          data center and the IaaS provider cloud.
     •    Customer D runs their own application mobility
          controller within their data center.
  •  Application Mobility Controller subscribes to
      IaaS and data center metadata related to:
     •  traffic flows, performance metrics
     •  log feeds from the IaaS cloud service.
Intercloud: Use Case #5
•  PaaS E, a security broker service, provides an
   anti-phishing service for e-mail:
   “whitelist”, analytics and forensics
     •    Operates on behalf of domain holders
     •    A list management and forensics for multiple
          receiver services (e.g. web mail services)
  •  After establishing service w/ receiver:
     •    Each receiver establishes a metadata access
          point (MAP) regarding failed email
     •    PaaS E publishes notifications of phishing
          attempts to subs, on behalf of domain holder
     •    All new events and changes in state/status
          distributed as pub/sub metadata
Lighthouse:
Requirements & Concepts
Lighthouse Requirements
•  Defines a dynamically extensible set of
   identifiers and metadata
•  Automatically aggregates and associates
   real-time info from many different sources
•  Provides real-time pub/sub/search
   mechanism for data regarding cloud instances,
   their state and their activities
•  Scales for cloud to cloud coordination
Lighthouse Concept

Autonomous Metadata Access Point

  •  All interested and authenticated cloud
     services, acting in ‘good faith’, provide
     their own Metadata Access Point.

  •  A Metadata Access Point publishes to
     the intercloud community any
     information about itself.
Lighthouse Concept

A Registry of Registries

  •  Identity and location of individually and
     autonomously managed
     Metadata Access Services

  •  Authoritatively establishes the status of
     any individual cloud service and its
     standing within the Intercloud
     community
Lighthouse Concept

Process / Event Coordination

  •  All 'interested' consumers of a cloud’s
     MAP Service may subscribe to
     metadata updates that result in a
     'property' change

  •  Many systems can coordinate through
     a Metadata Access Protocol with no in-
     depth knowledge of each other's APIs
Lighthouse Concept

Share operational metadata

  •  Near Real-time

  •  Cloud Information Service
     +
     Cloud Operations Coordination
Intercloud Registry: Features

•  Discovery of a registry’s specific
   interfaces / capabilities

•  Auditable logging mechanism
  •  For element / value changes
  •  For publishing event
Intercloud Registry: Features

Forms of Search & Query
  •  search and report of items based on
     (…)
  •  comparison of object to ‘checklist’ of
     elements and parameters
  •  ‘standing’ search/query established as
     subscription
  •  query and retrieval of items based on
     published / recognized (?) data scheme
Intercloud Registry: Operational
•  Distributed MAP Servers:
  Each Cloud Service is responsible for
  establishing and administering
   •  its own Registry Server, or
   •  publication of metadata by a trusted party

•  Authoritative compilation of Registries
   (and, therefore, of Cloud Services)
  •  Unambiguous identification
  •  Authentication method associated with ID
Available Standards
Current Standards/Protocols
Federated UDDI Registry
• Pros:
   •      Federated UDDI consisting of multiple repositories
          that are synchronized periodically.
   •      Federated UDDI is an efficient solution for service
          discovery in distributed service networks.
• Cons:
   •      too expensive to replicate frequently updated
          information
   •      it is hard to directly utilize this approach to support
          discovery of dynamic information
   •      Governance nightmare…
Current Standards/Protocols
Service Location Protocol (SLP)
• Pros:
  •    agent based service discovery framework
  •    designed for service discovery in for local area
       network
  •    extensions to SLP proposed aiming to the WAN
       environment
• Cons:
  •    Not suitable for wide area network environment
  •    unsuitable for Cloud environment due to the scale
       and distribution complexities involved.
Current Standards/Protocols
IF-MAP
• Pros:
  •    Client-Server based, real-time pub/sub/search
  •    Designed to disseminate network security info on
       objects & events (dynamic state and activity data)
  •    Easily extensible to components other than network
       and security components
  •    XML-based SOAP protocol
  •    Supports standardized, dynamic data interchange
  •    Provides an uniform mechanism to securely
       discover, consume, and manage a single
       management domain’s metadata.
Current Standards/Protocols
IF-MAP (continued)
•  Cons:
  •    SOAP based only, heavy messaging structure
  •    Scale for Cloud
  •    Need lot of extensions to existing metadata model
  •    IF-MAP access point becomes a central authority
•  TBD
  •    Federation to support intercloud scale?
  •    Wider range of protocols / RESTful interface?
  •    A MAP-to-MAP (P2P) approach to bi-directional
       pub/sub?
  •    Asynch messaging queues?
  •    “Economical” message encoding system ?
        hierarchical, binary, self-describing
Current Standards/Protocols
Other Standards/Protocols to Consider

  •  WebDAV/DASL
    •  DAV Provides Versioned Metadata
       Access of Resources
    •  DASL: Provides Searching and Location
Current Standards/Protocols
  And, what about asynchronous
  messaging?
  •    AMQP
  •    Session Initiation Protocol (SIP)
  •    XMPP
  •    HTTP
  •    JMS

   Not to mention message encoding…
  •  ASN.1
  •  FUDGE
  •    …
Lighthouse: Architectural
         Model
Lighthouse: Metadata Model
Lighthouse: Conceptual Architecture 1

    Cloud Service Provider


                                             CSP
                                                          CSP


        CSP
                 MAP




               Metadata
              Access Point
                                       IC-
                                      MAP          "
                                             InterCloud
                                              Registry
                        IC Registry
                         Metadata
                       Access Point
Lighthouse: Conceptual Architecture 2

     Cloud Service Provider


                                                   CSP


                                                         CSP
         CSP         IC
                    MAP          InterCloud Registry
                                              "
              IC                           IC-
                                          ROOT
           Metadata
          Access Point



                               IC Registry
                                Metadata
                              “Root Server”
Lighthouse: Call(s) to Action




                                   Rich Miller
                            Surendra Reddy
                 Infrastructure 2.0 Working Group
Lighthouse 20100120

More Related Content

What's hot

7. the grid ogsa
7. the grid ogsa7. the grid ogsa
7. the grid ogsa
Dr Sandeep Kumar Poonia
 
Data Intensive Grid Service Model
Data Intensive Grid Service ModelData Intensive Grid Service Model
Data Intensive Grid Service Model
gomathynayagam
 
Unit 2 - Grid and Cloud Computing
Unit 2 - Grid and Cloud ComputingUnit 2 - Grid and Cloud Computing
Unit 2 - Grid and Cloud Computing
vimalraman
 
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
I3E Technologies
 
Grid fabrication of traffic maintenance system clustering at road junctions
Grid fabrication of traffic maintenance system clustering at road junctionsGrid fabrication of traffic maintenance system clustering at road junctions
Grid fabrication of traffic maintenance system clustering at road junctions
eSAT Publishing House
 
Software connector type - Adaptor
Software connector type - AdaptorSoftware connector type - Adaptor
Software connector type - Adaptor
Hashini Senaratne
 
Data Intensive Services
Data Intensive ServicesData Intensive Services
Data Intensive Services
mbasti2
 
Design Principles for a Service-Aware Future Internet
Design Principles for a Service-Aware Future InternetDesign Principles for a Service-Aware Future Internet
Design Principles for a Service-Aware Future Internet
mbasti2
 
Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...
Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...
Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...
Yogesh Santhan
 
Security considerations
Security considerationsSecurity considerations
Security considerations
Pooja Dixit
 
Service operator aware trust scheme for resource matchmaking across multiple ...
Service operator aware trust scheme for resource matchmaking across multiple ...Service operator aware trust scheme for resource matchmaking across multiple ...
Service operator aware trust scheme for resource matchmaking across multiple ...
ieeepondy
 
Service operator aware trust scheme for resource
Service operator aware trust scheme for resourceService operator aware trust scheme for resource
Service operator aware trust scheme for resource
Pvrtechnologies Nellore
 
cloud computing- service operator aware trust scheme
cloud computing- service operator aware trust schemecloud computing- service operator aware trust scheme
cloud computing- service operator aware trust scheme
jisa joy
 
DevDay: The Corda Network, James Carlyle
DevDay: The Corda Network, James CarlyleDevDay: The Corda Network, James Carlyle
DevDay: The Corda Network, James Carlyle
R3
 
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
IJCNCJournal
 
Lifecycle Management of Service-based Applications on Multi-Clouds: A Resear...
Lifecycle Management of Service-based Applications on Multi-Clouds: A Resear...Lifecycle Management of Service-based Applications on Multi-Clouds: A Resear...
Lifecycle Management of Service-based Applications on Multi-Clouds: A Resear...
George Baryannis
 

What's hot (17)

7. the grid ogsa
7. the grid ogsa7. the grid ogsa
7. the grid ogsa
 
Data Intensive Grid Service Model
Data Intensive Grid Service ModelData Intensive Grid Service Model
Data Intensive Grid Service Model
 
Unit 2 - Grid and Cloud Computing
Unit 2 - Grid and Cloud ComputingUnit 2 - Grid and Cloud Computing
Unit 2 - Grid and Cloud Computing
 
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
 
Grid fabrication of traffic maintenance system clustering at road junctions
Grid fabrication of traffic maintenance system clustering at road junctionsGrid fabrication of traffic maintenance system clustering at road junctions
Grid fabrication of traffic maintenance system clustering at road junctions
 
Software connector type - Adaptor
Software connector type - AdaptorSoftware connector type - Adaptor
Software connector type - Adaptor
 
Data Intensive Services
Data Intensive ServicesData Intensive Services
Data Intensive Services
 
Design Principles for a Service-Aware Future Internet
Design Principles for a Service-Aware Future InternetDesign Principles for a Service-Aware Future Internet
Design Principles for a Service-Aware Future Internet
 
Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...
Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...
Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...
 
Security considerations
Security considerationsSecurity considerations
Security considerations
 
Service operator aware trust scheme for resource matchmaking across multiple ...
Service operator aware trust scheme for resource matchmaking across multiple ...Service operator aware trust scheme for resource matchmaking across multiple ...
Service operator aware trust scheme for resource matchmaking across multiple ...
 
Service operator aware trust scheme for resource
Service operator aware trust scheme for resourceService operator aware trust scheme for resource
Service operator aware trust scheme for resource
 
cloud computing- service operator aware trust scheme
cloud computing- service operator aware trust schemecloud computing- service operator aware trust scheme
cloud computing- service operator aware trust scheme
 
DevDay: The Corda Network, James Carlyle
DevDay: The Corda Network, James CarlyleDevDay: The Corda Network, James Carlyle
DevDay: The Corda Network, James Carlyle
 
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
 
Lifecycle Management of Service-based Applications on Multi-Clouds: A Resear...
Lifecycle Management of Service-based Applications on Multi-Clouds: A Resear...Lifecycle Management of Service-based Applications on Multi-Clouds: A Resear...
Lifecycle Management of Service-based Applications on Multi-Clouds: A Resear...
 
Network Virtualization - A Survey
Network Virtualization - A SurveyNetwork Virtualization - A Survey
Network Virtualization - A Survey
 

Similar to Lighthouse 20100120

Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...
Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...
Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...
WSO2
 
IoT heap 1
IoT heap 1IoT heap 1
IoT heap 1
SushrutaMishra1
 
Summer School Delivering On-Demand Shared Middleware Services
Summer School   Delivering On-Demand Shared Middleware ServicesSummer School   Delivering On-Demand Shared Middleware Services
Summer School Delivering On-Demand Shared Middleware ServicesWSO2
 
Open Source Middleware for the Cloud: WSO2 Stratos
Open Source Middleware for the Cloud: WSO2 StratosOpen Source Middleware for the Cloud: WSO2 Stratos
Open Source Middleware for the Cloud: WSO2 StratosWSO2
 
652.ppt
652.ppt652.ppt
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
sateeshka
 
Iot unit i present by JAVVAJI VENKATRAO SVEC,TIRUPATI
Iot unit i present by JAVVAJI VENKATRAO SVEC,TIRUPATIIot unit i present by JAVVAJI VENKATRAO SVEC,TIRUPATI
Iot unit i present by JAVVAJI VENKATRAO SVEC,TIRUPATI
VenkatRaoJ
 
Iot unit i
Iot unit iIot unit i
Iot unit i
VenkatRaoJ
 
Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...
Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...
Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...
Chris Haddad
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
Rahul Gurnani
 
Cloud-native Data
Cloud-native DataCloud-native Data
Cloud-native Data
cornelia davis
 
Cloud-Native-Data with Cornelia Davis
Cloud-Native-Data with Cornelia DavisCloud-Native-Data with Cornelia Davis
Cloud-Native-Data with Cornelia Davis
VMware Tanzu
 
Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...
Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...
Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...
Tammy Bednar
 
Data Engineer, Patterns & Architecture The future: Deep-dive into Microservic...
Data Engineer, Patterns & Architecture The future: Deep-dive into Microservic...Data Engineer, Patterns & Architecture The future: Deep-dive into Microservic...
Data Engineer, Patterns & Architecture The future: Deep-dive into Microservic...
Igor De Souza
 
Kubernetes Infra 2.0
Kubernetes Infra 2.0Kubernetes Infra 2.0
Kubernetes Infra 2.0
Deepak Sood
 
Come costruire apllicazioni "12-factor microservices" in AWS
Come costruire apllicazioni "12-factor microservices" in AWSCome costruire apllicazioni "12-factor microservices" in AWS
Come costruire apllicazioni "12-factor microservices" in AWS
Amazon Web Services
 

Similar to Lighthouse 20100120 (20)

Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...
Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...
Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...
 
Forecast odcau5 100_ak2
Forecast odcau5 100_ak2Forecast odcau5 100_ak2
Forecast odcau5 100_ak2
 
IoT heap 1
IoT heap 1IoT heap 1
IoT heap 1
 
Summer School Delivering On-Demand Shared Middleware Services
Summer School   Delivering On-Demand Shared Middleware ServicesSummer School   Delivering On-Demand Shared Middleware Services
Summer School Delivering On-Demand Shared Middleware Services
 
Cloud presentation NELA
Cloud presentation NELACloud presentation NELA
Cloud presentation NELA
 
Open Source Middleware for the Cloud: WSO2 Stratos
Open Source Middleware for the Cloud: WSO2 StratosOpen Source Middleware for the Cloud: WSO2 Stratos
Open Source Middleware for the Cloud: WSO2 Stratos
 
652.ppt
652.ppt652.ppt
652.ppt
 
Chapter - 1.pptx
Chapter - 1.pptxChapter - 1.pptx
Chapter - 1.pptx
 
Design patternsforiot
Design patternsforiotDesign patternsforiot
Design patternsforiot
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
Iot unit i present by JAVVAJI VENKATRAO SVEC,TIRUPATI
Iot unit i present by JAVVAJI VENKATRAO SVEC,TIRUPATIIot unit i present by JAVVAJI VENKATRAO SVEC,TIRUPATI
Iot unit i present by JAVVAJI VENKATRAO SVEC,TIRUPATI
 
Iot unit i
Iot unit iIot unit i
Iot unit i
 
Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...
Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...
Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
 
Cloud-native Data
Cloud-native DataCloud-native Data
Cloud-native Data
 
Cloud-Native-Data with Cornelia Davis
Cloud-Native-Data with Cornelia DavisCloud-Native-Data with Cornelia Davis
Cloud-Native-Data with Cornelia Davis
 
Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...
Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...
Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...
 
Data Engineer, Patterns & Architecture The future: Deep-dive into Microservic...
Data Engineer, Patterns & Architecture The future: Deep-dive into Microservic...Data Engineer, Patterns & Architecture The future: Deep-dive into Microservic...
Data Engineer, Patterns & Architecture The future: Deep-dive into Microservic...
 
Kubernetes Infra 2.0
Kubernetes Infra 2.0Kubernetes Infra 2.0
Kubernetes Infra 2.0
 
Come costruire apllicazioni "12-factor microservices" in AWS
Come costruire apllicazioni "12-factor microservices" in AWSCome costruire apllicazioni "12-factor microservices" in AWS
Come costruire apllicazioni "12-factor microservices" in AWS
 

More from Infrastructure 2.0

Application Mobility - Lightning Talk
Application Mobility - Lightning TalkApplication Mobility - Lightning Talk
Application Mobility - Lightning TalkInfrastructure 2.0
 
OCC Intercloud Testbed Status Jan 20, 2010
OCC Intercloud Testbed Status Jan 20, 2010OCC Intercloud Testbed Status Jan 20, 2010
OCC Intercloud Testbed Status Jan 20, 2010Infrastructure 2.0
 
20100120 Pvm Cherchez La Federation
20100120 Pvm Cherchez La Federation20100120 Pvm Cherchez La Federation
20100120 Pvm Cherchez La FederationInfrastructure 2.0
 
Infrastructure2.0 Model Proposal 1 19 10
Infrastructure2.0 Model Proposal 1 19 10Infrastructure2.0 Model Proposal 1 19 10
Infrastructure2.0 Model Proposal 1 19 10
Infrastructure 2.0
 

More from Infrastructure 2.0 (7)

Workgroup Issues
Workgroup IssuesWorkgroup Issues
Workgroup Issues
 
Application Mobility - Lightning Talk
Application Mobility - Lightning TalkApplication Mobility - Lightning Talk
Application Mobility - Lightning Talk
 
OCC Intercloud Testbed Status Jan 20, 2010
OCC Intercloud Testbed Status Jan 20, 2010OCC Intercloud Testbed Status Jan 20, 2010
OCC Intercloud Testbed Status Jan 20, 2010
 
Cloud APIs Overview Tucker
Cloud APIs Overview   TuckerCloud APIs Overview   Tucker
Cloud APIs Overview Tucker
 
Intercloud Registry
Intercloud RegistryIntercloud Registry
Intercloud Registry
 
20100120 Pvm Cherchez La Federation
20100120 Pvm Cherchez La Federation20100120 Pvm Cherchez La Federation
20100120 Pvm Cherchez La Federation
 
Infrastructure2.0 Model Proposal 1 19 10
Infrastructure2.0 Model Proposal 1 19 10Infrastructure2.0 Model Proposal 1 19 10
Infrastructure2.0 Model Proposal 1 19 10
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Lighthouse 20100120

  • 1. Lighthouse: Intercloud Metadata Service Rich Miller Surendra Reddy Infrastructure 2.0 Working Group January 20, 2010
  • 2. Agenda •  Intercloud & Lighthouse Objectives •  Use cases (as drivers & definition) •  Lighthouse Requirements & Concepts •  Available technologies & standards •  Architectural Guiding Principles •  Call(s) to action
  • 4. Intercloud Requires the dissemination & exchange of operational metadata - among clouds, - between cloud services and consumers of their services.
  • 6. Lighthouse Where to start? •  Agreement on identification, location and ID-Loc resolution •  A registry for the discovery and description of intercloud constituents •  A mechanism for the delivery of cloud service descriptive & operational data •  A governance structure for admission & ejection, assurance, permissions & entitlements
  • 7. Lighthouse The concept: •  Each member takes responsibility for its own metadata access services •  Membership in a communal registry of metadata access services, with identification – location resolution •  Agreement on mechanisms for - pub/sub/search/query - asynchronous message delivery
  • 8. Lighthouse Scope Scope is limited to providing the Service Access Point and related metadata to service Consumers
  • 10. Intercloud: Use Case #1 •  Customer A, EDA company, seeks a list of IaaS services which claim to provide: •  cloud data management •  Linux OS image management •  Queries the Intercloud registry, returns IDs of services that meet criteria •  Searches IaaS service metadata to make selection •  Access the Service Access Point (SAP) of a vendor to validate claims •  Subscribes to Service Access Point for receipt of service announcements, rate changes, etc
  • 11. Intercloud: Use Case #2 •  Customer B, an insurance company, seeks a single IaaS provider to continuously satisfy service requirements (constraints) •  E.g. latencies, geography, SLAs etc. •  Queries the Intercloud registry, returns IDs of services that meet criteria •  Searches IaaS metadata to make selection •  Access the SAPs of vendor to create Cloud Service Account Instance •  Subscribes to SAP for receipt of relevant requirement-specific metadata •  Takes specific actions based on timely notifications (near realtime alerts) via Service Provider APIs and management functions
  • 12. Intercloud: Use Case #3 •  Customer C, a globally distributed online service looking for an IaaS Providers in Europe and in USA with specific SLAs. •  Using the Intercloud registry, locates services meeting needs in two locations. •  Identifies alternative providers for the business continuity (DR, backup, …) functions. •  Customer C’s application management system subscribes to failure events & performance sensors from the IaaS providers. •  Based monitored event/sensor feeds, C’s service monitoring application dynamically scales up/down the resources (computing, networking, and storage) to their applications
  • 13. Intercloud: Use Case #4 •  Customer D, a financial services company, runs applications that are either (or both) •  latency sensitive •  throughput sensitive •  After selecting IaaS provider: •  Sets up the virtual network between on-premise data center and the IaaS provider cloud. •  Customer D runs their own application mobility controller within their data center. •  Application Mobility Controller subscribes to IaaS and data center metadata related to: •  traffic flows, performance metrics •  log feeds from the IaaS cloud service.
  • 14. Intercloud: Use Case #5 •  PaaS E, a security broker service, provides an anti-phishing service for e-mail: “whitelist”, analytics and forensics •  Operates on behalf of domain holders •  A list management and forensics for multiple receiver services (e.g. web mail services) •  After establishing service w/ receiver: •  Each receiver establishes a metadata access point (MAP) regarding failed email •  PaaS E publishes notifications of phishing attempts to subs, on behalf of domain holder •  All new events and changes in state/status distributed as pub/sub metadata
  • 16. Lighthouse Requirements •  Defines a dynamically extensible set of identifiers and metadata •  Automatically aggregates and associates real-time info from many different sources •  Provides real-time pub/sub/search mechanism for data regarding cloud instances, their state and their activities •  Scales for cloud to cloud coordination
  • 17. Lighthouse Concept Autonomous Metadata Access Point •  All interested and authenticated cloud services, acting in ‘good faith’, provide their own Metadata Access Point. •  A Metadata Access Point publishes to the intercloud community any information about itself.
  • 18. Lighthouse Concept A Registry of Registries •  Identity and location of individually and autonomously managed Metadata Access Services •  Authoritatively establishes the status of any individual cloud service and its standing within the Intercloud community
  • 19. Lighthouse Concept Process / Event Coordination •  All 'interested' consumers of a cloud’s MAP Service may subscribe to metadata updates that result in a 'property' change •  Many systems can coordinate through a Metadata Access Protocol with no in- depth knowledge of each other's APIs
  • 20. Lighthouse Concept Share operational metadata •  Near Real-time •  Cloud Information Service + Cloud Operations Coordination
  • 21. Intercloud Registry: Features •  Discovery of a registry’s specific interfaces / capabilities •  Auditable logging mechanism •  For element / value changes •  For publishing event
  • 22. Intercloud Registry: Features Forms of Search & Query •  search and report of items based on (…) •  comparison of object to ‘checklist’ of elements and parameters •  ‘standing’ search/query established as subscription •  query and retrieval of items based on published / recognized (?) data scheme
  • 23. Intercloud Registry: Operational •  Distributed MAP Servers: Each Cloud Service is responsible for establishing and administering •  its own Registry Server, or •  publication of metadata by a trusted party •  Authoritative compilation of Registries (and, therefore, of Cloud Services) •  Unambiguous identification •  Authentication method associated with ID
  • 25. Current Standards/Protocols Federated UDDI Registry • Pros: •  Federated UDDI consisting of multiple repositories that are synchronized periodically. •  Federated UDDI is an efficient solution for service discovery in distributed service networks. • Cons: •  too expensive to replicate frequently updated information •  it is hard to directly utilize this approach to support discovery of dynamic information •  Governance nightmare…
  • 26. Current Standards/Protocols Service Location Protocol (SLP) • Pros: •  agent based service discovery framework •  designed for service discovery in for local area network •  extensions to SLP proposed aiming to the WAN environment • Cons: •  Not suitable for wide area network environment •  unsuitable for Cloud environment due to the scale and distribution complexities involved.
  • 27. Current Standards/Protocols IF-MAP • Pros: •  Client-Server based, real-time pub/sub/search •  Designed to disseminate network security info on objects & events (dynamic state and activity data) •  Easily extensible to components other than network and security components •  XML-based SOAP protocol •  Supports standardized, dynamic data interchange •  Provides an uniform mechanism to securely discover, consume, and manage a single management domain’s metadata.
  • 28. Current Standards/Protocols IF-MAP (continued) •  Cons: •  SOAP based only, heavy messaging structure •  Scale for Cloud •  Need lot of extensions to existing metadata model •  IF-MAP access point becomes a central authority •  TBD •  Federation to support intercloud scale? •  Wider range of protocols / RESTful interface? •  A MAP-to-MAP (P2P) approach to bi-directional pub/sub? •  Asynch messaging queues? •  “Economical” message encoding system ? hierarchical, binary, self-describing
  • 29. Current Standards/Protocols Other Standards/Protocols to Consider •  WebDAV/DASL •  DAV Provides Versioned Metadata Access of Resources •  DASL: Provides Searching and Location
  • 30. Current Standards/Protocols And, what about asynchronous messaging? •  AMQP •  Session Initiation Protocol (SIP) •  XMPP •  HTTP •  JMS Not to mention message encoding… •  ASN.1 •  FUDGE •  …
  • 33. Lighthouse: Conceptual Architecture 1 Cloud Service Provider CSP CSP CSP MAP Metadata Access Point IC- MAP " InterCloud Registry IC Registry Metadata Access Point
  • 34. Lighthouse: Conceptual Architecture 2 Cloud Service Provider CSP CSP CSP IC MAP InterCloud Registry " IC IC- ROOT Metadata Access Point IC Registry Metadata “Root Server”
  • 35. Lighthouse: Call(s) to Action Rich Miller Surendra Reddy Infrastructure 2.0 Working Group

Editor's Notes

  1. Rich, add some talking points why did you choose Lighthouse? Helping us to get to the shore 
  2. 12/27/09 RHM: modify use case to include not just finding the directory / registry, but establishes requirements / criteria
  3. 12/27/09 RHM: I’m not sure I understand the reference here to “Customer B.” Are you saying that Customer B (from previous page) is using Customer C’s services? Or, is this a typo and you’re referring to Customer C? I assume it’s the latter, and that you were referring to Customer C.
  4. Customer’s application controller helps them to negotiate the resources from various cloud service providers using the Intercloud registry as a matchmaking service utilizing Searching, Location services offered by the Intercloud registry. NOTE: the difference between earlier and this use case, the timely meta-data delivery and consistency of mata-data are two critical needs for this use case.
  5. Customer’s application controller helps them to negotiate the resources from various cloud service providers using the Intercloud registry as a matchmaking service utilizing Searching, Location services offered by the Intercloud registry. NOTE: the difference between earlier and this use case, the timely meta-data delivery and consistency of mata-data are two critical needs for this use case.
  6. Marketplace for Cloud Services offers matchmaking of service providers based on competitive pricing, SLA, and Location preferences. 12/27/09 RHM: I’m not sure I would include the Marketplace as part of Lighthouse. The idea of marketplaces, brokers of various kinds, intercloud ‘core services’ … any of the service offerings that require a ‘trusted third party’ … require the existence of the Lighthouse underpinnings: Autonomously managed metadata access services a registry for the discovery of metadata access services, identification – location resolution a common set of mechanisms and protocols for messaging and pub/sub/search/query