1 / 15

A Flexible and Secure Deployment Framework for Distributed Applications

A Flexible and Secure Deployment Framework for Distributed Applications. Alan Dearle, Graham Kirby, Andrew McCarthy and Juan Carlos Diaz y Carballo School of Computer Science University of St Andrews, North Haugh, St Andrews, Fife KY16 9SS, Scotland {al, graham, ajm, jcd}@dcs.st-and.ac.uk.

Download Presentation

A Flexible and Secure Deployment Framework for Distributed Applications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Flexible and Secure Deployment Framework forDistributed Applications Alan Dearle, Graham Kirby, Andrew McCarthyand Juan Carlos Diaz y Carballo School of Computer Science University of St Andrews,North Haugh, St Andrews, Fife KY16 9SS, Scotland {al, graham, ajm, jcd}@dcs.st-and.ac.uk

  2. This paper describes an implemented system which is designed to support the deployment of applications offering distributed services, comprising a number of distributed components. Overview

  3. Requirements • An architectural description of: • software components • hosts • Interconnections • The ability to enact the architectural description: • the ability to install and execute code on remote hosts • a security mechanism • Support for component implementation using standard programming languages and appropriate programming models • The ability for components to interface with off-the-shelf components already deployed

  4. Cingal Computational Model • Each bundle carries an authentication element with attributes entity and signature. The entity identifies the bundle using a globally unique identifier (GUID) implemented via an MD5 key. The bundle is the only user-level entity that may be executed in Cingal Bundles are passive, consisting of a closure of code and data and a set of bindings naming the data. Bundles are passive, consisting of a closure of code and data and a set of bindings naming the data. The data section of a bundle, known as its payload, comprises data with each datum having a unique id attribute. In the example the bundle carries one datum named ToDoList It is common for bundles to carry other bundles in their payload, in order to install bundles in the store or fire them in other machines. Cingal supports asynchronous message-oriented inter-machine communication via channels. The machine channel is used to communicate with the machine infrastructure The default channel is used to communicate with the bundle running within the machine Cingal also supports named channels between entities Using named channels, individual executing bundles are isolated from the specifics of what components are connected to them This isolation permits channels to be connected, disconnected and reconnected independently of the running program The connection manager is responsible for the management of named channels. It maintains an associative mapping of names to channels What about these?

  5. A Cingal Bundle <BUNDLE> <AUTHENTICATION entity="19730129df7447eb91509" signature="DQoew3rasZ…9wu9ySLGU"/> <CODE entry="uk.ac.stand.cingal.Runner" type="java"> <CLASS name="uk.ac.stand.cingal.Runner"> MamF2YS9sYW5nL09ia… </CLASS> </CODE> <DATA><DATUM id="ToDoList"> <TODOLIST> <TASK guid="urn:cingal:325444"type="RUN"> <DATUM id="StoreGuid"> Lvcxk3wnAIUN… </DATUM> </TASK> </TODOLIST> </DATUM></DATA> </BUNDLE>

  6. Application Deployment • The Cingal system provides the infrastructure for deploying components on arbitrary suitably enabled hosts. • However, additional infrastructure is needed to: • describe distributed architectures, and • deploy components from the description • This infrastructure comprises a description language, a deployment engine, and various mobile code documents and tools.

  7. Deployment Descriptor Documents • The description language is an XML schema • Each DDD contains an architectural description of an application, comprising: • a set of autonomous software components • the hosts on which they are to execute • the interconnections between them • The deployment engine takes a DDD as input • It deploys the components described in the DDD on the appropriate hosts • These application components are pushed to the hosts as Cingal bundles • The deployment engine also pushes various tools to the hosts to carry out local deployment tasks in situ • These tools are also transferred as Cingal bundles.

  8. A DDD <DDDname="ServerAndCacheApplication"> <BUNDLES> <BUNDLEname="Server" source="file://C:\bundles\server.xml" /> <BUNDLEname="Cache" source="file://C:\bundles\cache.xml" /> </BUNDLES> <HOSTS> <HOSTid="A" address="129.127.8.34" /> <HOSTid="B" address ="129.127.8.35" /> </HOSTS> <DEPLOYMENTS> <DEPLOYMENTname="PrimaryServer“bundle="Server" target="A" /> <DEPLOYMENTname="CachingServer“bundle="Cache" target="B" /> </DEPLOYMENTS> <CONNECTIONS> <CONNECTION> <SOURCEdeployment="PrimaryServer" channel="DownstreamCache" /> <DESTINATIONdeployment="CachingServer" channel="UpstreamServer" /> </CONNECTION> </CONNECTIONS> </DDD>

  9. Tools • The three primary tools are: installers, runners and wirers. • An installer installs an arbitrary number of payload bundles into the store of the destination thin server. • A runner starts the execution of a number of bundles previously installed in the store. • A wirer is responsible for making concrete connections between pairs of components using the named channel mechanism.

  10. State Transitions • Under control of these tools, each application component on a thin server moves between the following states: • installed: when the bundle has been installed into the store • running: when the bundle has been fired and started computation; any reads or writes on named channels will block since they are not connected • wired: when the bundle has started computation and all named channels have been connected to other components

  11. Installing DDD

  12. Running

  13. Wiring

  14. Related work – Deladas & Autonomic constraintset randc = constraintset { // 1 router or client per hostforall host h indeployment (card(instancesof Router in h) = 1 orcard(instancesof Client in h) = 1 ) // every client connects to at least 1 router forall Client c indeployment (exists Router r indeployment ( c.out connectsto r.cin c.in connectsto r.cout ) ) // every router connects to at most 2 clients forall Router r indeployment (card(Client c connectedto r) <= 2 ) // every router connects to at least 1 other router forall Router r1 in deployment (exists Router r2 in deployment ( r1.rout connectsto r2.rin r1.rin connectsto r2.rout r1 != r2 ) ) // routers are reachable from each other forall Router r1,r2 indeployment (reachable(r1, r2) )}

  15. Conclusions • The Cingal infrastructure permits bundles to be deployed in arbitrary geographic locations from conventional machines • The runtime infrastructure abstracts over host-specific differences yielding a homogeneous run-time environment for deployed components • The store and binder support content addressed storage which permits code and data to be stored with no possibility of ambiguous retrieval • Deployment Description Documents support the specification of distributed architectures • The deployment engine technology combined with the thin server infrastructure permits distributed deployments to be realised into running instances of component based architectures • The process of deployment from specification through to having a connected collection of running components on distributed hosts is totally automated. • A number of novel evolution mechanisms are provided by the architecture: • the ability to remotely update components • flexible binding between components • distributed architectures may be re-arranged by unbinding and reconnecting named channels • The security mechanisms provided by Cingal prevent unauthorised entities from firing bundles on hosts on which they do not have privilege

More Related