Kai Hwang, September 2011

4 downloads 1843 Views 18MB Size Report
Massively Parallel. Processors. Source: K. Hwang, G. Fox, and J. Dongarra,. Distributed and Cloud Computing,. Morgan Kaufmann, 2011 (in press to appear)  ...
Research Challenges in The Clouds, Many Cores, and Internet of Things Prof. Kai Hwang, Univ. of Southern California and Tsinghua Univ.



Research Frontiers in Supercomputers, Clouds, and Internet of Things based on recent advances in Multi-Core CPU, Many-Core GPU, virtualization techniques and datacenter automation.



Research Challenges in Three Frontier Areas : - Asymmetric Chip Multiprocessors (CMP) – Integrating CPU/GPGPU - Cost-Effective Private Clouds over Automated Datacenters - IoT Maturity and How to Bring Social Networks under control



Open Problems in the Clouds, Internet of Things, and Social Networks - Can we entrust clouds to take over many things we handle privately ? - Are IoT truly cost-effective and fully supported by the Internet Clouds ? - Privacy in Social networks and copyright protection in content networks ?

Kai Hwang, September 2011

1

Web 2.0, Clouds, and Internet of Things HPC: HighPerformance Computing

HTC: HighThroughput Computing

P2P: Peer to Peer

MPP: Massively Parallel Source: K. Hwang, G. Fox, and J. Dongarra,

Processors

Distributed and Cloud Computing, Morgan Kaufmann, 2011 (in press to appear) Kai Hwang, September 2011

2

Hot Research Frontiers: 

Multi-core-CPU and many-core GPU and beyond : Heterogeneous (asymmetric) chip multiprocssors



Virtualization support for cloud computing over distributed and automated datacenters



Cloud security, data integrity, privacy and copyright protection, and trust management in clouds and the future Internet



Advances in RFID tracking, sensor networks, and GPS technologies to build the Internet of things



Ubiquitous cloud computing and social networking using the clouds to process hugh amounts of time-sensitive datasets collected in IoT applications

Kai Hwang, September 2011

3

Top 5 Systems in Top-500 List , Nov. 2010

Kai Hwang, September 2011

4

The Winner in November 2010

The 2.5 Flops performance shows only a 54.6% efficiency from the peak speed of 4.7 PFlops. Kai Hwang, September 2011

5

Kai Hwang, September 2011

6

The Exascale Echelon Project A Future Supercomputer funded by DARPA in The USA

The Echelon CPU/GPU cluster proposed with a hierarchical architecture that can deliver 2.6 PFlops per cabinet. It takes at least N = 400 cabinets to achieve the EFlops performance. (Source: Bill Dally, SC-2010).

Kai Hwang, September 2011

7

Mapping of Virtual Machines (VMs) into Many Cores on A Chip Multiprocessor (CMP)

(Courtesy of Marty and Hill, IEEE Micro, 2007) Kai Hwang, September 2011

8

Virtual Hierarchy in CMP

CMP Server Consolidation by Space-Sharing of VMs with multiple Virtual Clusters for various Workloads. (Courtesy of Marty and Hill, 2007) Kai Hwang, September 2011

9

A Large Ware-House Datacenter owned by Microsoft in WA. USA

Kai Hwang, September 2011

10

Cloud Computing – Service Provider Priorities  Ensure confidentiality, integrity, and availability in a multi-tenant environment.

 Effectively meet the advertised SLA, while optimizing cloud resource utilization.

 Offer tenants capabilities for selfservice, and achieve scaling through automation and simplification. Kai Hwang, September 2011

11

HPC and HTC Cloud Benchmark Experiments on Amazon EC2 Platform 1. High Throughput 2. High Performance Computing: Computing: RUBiS NAS Parallel Benchmarks (NPB)

(Fan Zhang, Junwei Cao, Kai Hwang at THU joint with CAS/ICT 973 Project) Kai Hwang, September 2011

Kai Hwang, USC

12

MapReduce Skyline Composition of Web/Cloud Services with QoS Guarantee (Joint ZJU/USC Project)

Kai Hwang, September 2011

13

Algorithm 3

Similarity Test Algorithm 2

Algorithm 4

Skyline Selection

Services Requests

Service Pool

Skyline Representatives

Skyline Services

Service Flow Requirements

Kai Hwang, September 2011

Compositio n Process

Optimal Composite Services

QoS Guarantees

14

Data Security and Copyright Protection in A Trusted Cloud Platform

(Source: K. Hwang and D. Li, IEEE Internet Computing, September 2010 11, 2009 KaiMarch Hwang, September 2011

Prof. Kai Hwang, USC

15

Ex '  X

Security and Trust Barriers in Cloud Computing 

Protecting datacenters must first secure cloud resources and uphold user privacy and data integrity.



Trust overlay networks could be applied to build reputation systems for establishing the trust among interactive datacenters.



A watermarking technique is suggested to protect shared data objects and massively distributed software modules.



These techniques safeguard user authentication and tighten the data access-control in public clouds.



The new approach could be more cost-effective than using the traditional encryption and firewalls to secure the clouds. Kai Hwang, September 2011

16 16

Trusted Zones for VM Insulation Federate identities with public clouds

Identity federatio n

Virtual network security

Access Mgmt

Control and isolate VM in the virtual infrastruct ure Segregate and control user access

Security Info. & Event Mgmt

APP OS

APP OS

Anti-malware Insulate infrastructure from Malware, Cybercrime intelligence Trojans and cybercriminals Strong

Tenan t #2 Virtual Infrastructure APP

APP OS

Tenan t #1 Virtual Infrastructure OS

Cloud Provider Physical Infrastructure Physical Infrastructure

Enable end to end view of security events and compliance across infrastructures Kai Hwang, September 2011

authentication Insulate information from other tenants Insulate informatio n from cloud providers’ employees

Data loss prevention

Encryption & key mgmt Tokenization

GRC 17

Protection of Cloud Datasets and Trust Management

Kai Hwang, September 2011

18

Architecture of The Internet of Things Application Layer

Merchandis e Tracking

Environmen t Protection

Intelligent Search

Telemedicine

Intelligent Traffic

Smart Home

Cloud Computing Platform Network Layer

Sensing Layer

Mobile Telecom Network

The Internet

Information Network

RFID

Sensor Network

GPS

RFID Label

Sensor Nodes

Road Mapper

Source: K. Hwang, G. Fox, and J. Dongarra, Distributed and Cloud Computing, Morgan Kaufmann, September 2011. Kai Hwang, September 2011

19

Mobility Support and Security Measures for Mobile Cloud Computing Cloud Service Models

Mobility Support and Data Protection Methods

Hardware and Software Measures for Cloud Security

Infrastructure Cloud (The IaaS Model)

   

Special air interfaces Mobile API design File/Log access control Data coloring

 Hardware/software root of trust,

Platform Cloud (The PaaS Model)

   

Wireless PKI , User authentication, Copyright protection Disaster recovery

 Network-based firewalls and IDS  Trust overlay network  Reputation system  OS patch management

Kai Hwang, September 2011

 Provisioning of virtual machines,  Software watermarking  Host-based firewalls and IDS

20

Cloudlets- A trusted, VM-based, and Resource-Rich Portal for Upgrading Mobile Devices with Cognitive Abilities for Mobile access of the cloud to explore Location-Aware Cloud Applications such as : Opportunity Discovery, Fast Information Processing, and Intelligent Decision Making on The Road, etc.

Source: “The Case of VM-based Cloudlets in Mobile Computing”, IEEE Pervasive Computing, Vol.8, No. 4, April 2009 Kai Hwang, September 2011

21

24 Satellites of GPS Deployed in Outerspace

Kai Hwang, September 2011

22

Supply Chain Management supported by the Internet of Things. ( http://www.igd.com)

Kai Hwang, September 2011

23

Some Cloud Services for IoT Applications 1. Smart and pervasive cloud applications for individuals, homes, communities, companies, and governments, etc. 2. Coordinated calendar, itinerary, job management, events, and consumer record management (CRM) services 3. Coordinated word processing, on-line presentations, webbased desktops, sharing on-line documents, datasets, photos, video, and databases, etc. 4. Deploy conventional cluster, grid, P2P, social networking applications in cloud environments, more cost-effectively. 5. Earthbound applications that demand elasticity and parallelism to avoid large data movement Costs

Kai Hwang, September 2011

24

Facebook Apps (550 Millions users)

Kai Hwang, September 2011

25

Kai Hwang, September 2011

26

Avoiding Cyber-Attacks in Anonymized Social Networks

Kai Hwang, September 2011

27







Conclusions: Computing clouds, IoT, and social networks affect the entire service industry and thus the global economy. These systems demand ubiquity, efficiency, security, and trustworthiness. Distributed systems, Clouds and IoT will become a common practice in business, government, education, and entertainment - 50 millions of servers globally in use at thousands of datacenters today and that number grows rapidly in coming years. Effective trust management, guaranteed security, user privacy, data integrity, mobility support, and copyright protection are crucial to the universal acceptance of clouds, IoT and social networks.

Kai Hwang, September 2011

28

High-Bandwidth Interconnect in Tianhe-1A

Latency, Bandwidth and Cost-Effective Performance

Kai Hwang, September 2011

29

(Source : Hwang, Fox and Dongarra, Distributed and Cloud Computing, Kaufmann, 2011)

Kai Hwang, September 2011

30

Elastic Virtual Clustering Physical Cluster 1

Physical Cluster 2

Physical Cluster 3

Virtual Machines deployed on 3 physical clusters Virtual Cluster 1

Virtual Cluster 2

Virtual Cluster 3

Kai Hwang, September 2011

Virtual Cluster 4

31

The Echelon

GPU processor proposed at NVIDIA :

128 cores (160 GFlpos each) plus 8 latency processors (LP) connected to 1024 SRAMs (L2 caches) by a NoC, where MS connects to DRAMS and NI extends to the next level of network (Courtesy of Bill Dally, 2010 ).

Kai Hwang, September 2011

32