Lilliput meets Brobdingnagian PowerPoint Presentation, PPT - DocSlides

Lilliput meets  Brobdingnagian PowerPoint Presentation, PPT - DocSlides

2018-11-03 6K 6 0 0

Description

: Data Center Systems Management through. Mobile Devices. Jan . Rellermeyer. , . Thomas . Osiecki. , . Michael . Kistler. , . Ahmed . Gheith. . 3. rd. International . Workshop on Dependability of Clouds, Data Centers and Virtual Machine . ID: 711589

Embed code:

Download this presentation



DownloadNote - The PPT/PDF document "Lilliput meets Brobdingnagian" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Presentations text content in Lilliput meets Brobdingnagian

Slide1

Lilliput meets Brobdingnagian: Data Center Systems Management throughMobile Devices

Jan Rellermeyer, Thomas Osiecki, Michael Kistler, Ahmed Gheith

3rd International Workshop on Dependability of Clouds, Data Centers and Virtual Machine Technology (DCDV)Held in conjunction with Dependable Systems and Networks (DSN)Budapest, Hungary June 18, 2013

Saurabh

Bagchi,Fahad Arshad

Slide2

System Management Workflow

Something is wrong!

Patch

Slide3

Systems Management: A Changed View

Filtering

Patch

Slide4

So What Exactly Are the Changes?

Platform being used for doing the systems managementServer

Mobile devices

Large screen

Resource richWithin organization’s security perimeter

High dependability

Small screen

Resource

constrained

Outside organization’s security

perimeter

Lower

dependability

Slide5

So Exactly Are the Changes?

Layered systems management to flat hierarchy

Filtering

Slide6

Case Study: IBM Research’s IBM Remote Project

User Interface

Communication

v

isualization of complex data

r

elevance first

d

rill-down UI

d

irect connection to the managed machines

r

efresh rate vs. power consumption

IBM Blade Centers

Slide7

Case Study: IBM Remote Project

Slide8

Research Challenges Due To The Changes

Platform being used for doing the systems management: Server to Mobile Devices

How do we optimize the scarce resources of the systems management platforms? Primarily, battery and communication bandwidth.

How do we handle the fact that the platforms will be insecure and fault-intolerant for parts of their operation?

How do we visualize the (hopefully) rare failure event in a deluge of systems monitoring data?

Slide9

Research Challenges Due To The Changes

Layered systems management to flat hierarchy

Can we avoid chaos due to the looser coordination?

Can we leverage overlap between interests to cut down on traffic to individual mobile devices?

Slide10

Solution Directions for Question 1

How do we optimize the scarce resources of the systems management platforms? Primarily, battery and communication bandwidth.

Platform being used for doing the systems management: Server to Mobile Devices

Minimize number of messages, while still receiving enough to reliably detect failures

Use publish-subscribe or other push mechanism, in preference to pull mechanism

BUT: Most hardware management modules do not support push

Use an intermediate server for aggregation and filtering

Apply principles of rare event detection

Non-events occur with much higher frequency than events of interest

BUT: Requires model of events: time distribution, correlation, etc.

Slide11

Solution Directions for Question 1

How do we handle mismatch in dependability characteristics (between target platform and management platform)?

Mobile device can be physically compromised and OS-level protection can be bypassedMobile devices are often employee ownedPlatform being used for doing the systems

management: Server to Mobile Devices

Application security and server-side security need to be built in

Periodic authentications, not one-time authentications

Biometric-based authentication

Slide12

Solution Directions for Question 1

How do we visualize the needle in the haystack?

Needle: Outages, failures, or behavior that is indicative of an imminent failureHaystack: Deluge of monitored data about target platformsScreen real estate is limited

Platform being used for doing the systems

management: Server to Mobile Devices

First off, deliver only a small superset of relevant messages

Push notification, such as, through Google Cloud Messaging (GCM)

Drill-down views, starting with summary alert view for all machines in data center

Followed up with root cause analysis techniques that run on servers

Slide13

Solution Directions for Question 2

Tight vertical integration of different software layers implies different domain experts will be concurrently involved in problem troubleshooting

Layered systems management to flat hierarchy, OR Crowdsourcing systems management

Relevant features of social media will be used

Example: At IBM, you can “friend” specific Blade Centers and have “circles” of administrators

Role-based Access Control (RBAC) can be used for security control of different software layers

Fine-grained roles can be assigned

RBAC solutions exist for sophisticated management of these roles, such as, hierarchies, overlaps, and

trasience

Slide14

Solution Directions for Question 2

Overlap between interests of multiple mobile devices and their geographical proximity

Layered systems management to flat hierarchy, OR Crowdsourcing systems management

Commonalities of interest can be used to cut down on cellular bandwidth usage

Commonalities can exist due to proximal geographic location or overlap among system administration responsibilities

Distribute information to a subset of mobile devices and then use local communication (Bluetooth, Wi-Fi) to disseminate information among proximal devices

Slide15

Case Study: IBM RemoteHealth view (left) broken into critical, non-critical, and system-level health messages

Event log view (right) is filtered to show only warnings and errors

Slide16

Related WorkMuch work on managing mobile devices – opposite direction than what we are discussing in this paper

Some work on mobile agents for managing servers [18 – NOMS02, 19 – Software07]Sophistication lies in designing a dynamic set of agents whose monitoring policies can be changed on the flySome commercial prototypes for monitoring and control of target end points from mobile devicesUCSand for Android devices [21] for Cisco Unified Systems monitoring and control PCMonitor [22] from MMSoft Design Ltd. VMWare vCenter Mobile Access [23] is a virtual appliance on the server side for managing a datacenter from mobile devicesRecent offering from HP [18]

Slide17

Take-away LessonsA changed vision of systems management is happening – mobile clients being used to manage large masses of physical and virtual servers

This throws open some technical challengesManagement to be done through resource-constrained mobile devices which have lower dependability than target devicesCrowd-sourcing of systems management, rather than linear flow of control through hierarchies of sysadminsThese challenges are being addressed in multiple projects at commercial organizations, including in the IBM Remote project at IBM Research

Slide18

Presentation available at:Dependable Computing Systems Lab (DCSL) web site

engineering.purdue.edu/dcsl


About DocSlides
DocSlides allows users to easily upload and share presentations, PDF documents, and images.Share your documents with the world , watch,share and upload any time you want. How can you benefit from using DocSlides? DocSlides consists documents from individuals and organizations on topics ranging from technology and business to travel, health, and education. Find and search for what interests you, and learn from people and more. You can also download DocSlides to read or reference later.