the openais architecture
play

The openais Architecture An inside look at an implementation of SA - PowerPoint PPT Presentation

The openais Architecture An inside look at an implementation of SA Forum's AIS Steven Dake Presented by Tim Anderson 14 September 2004 1 History of openais Started life as cmgr in February 2002 Hotswap manager for ATCA


  1. The openais Architecture An inside look at an implementation of SA Forum's AIS Steven Dake Presented by Tim Anderson 14 September 2004 1

  2. History of openais � Started life as “cmgr” in February 2002 � Hotswap manager for ATCA � Converted to AIS in May 2003 � AIS released as MontaVista product in Dec 2003 � Rearchitected to use virtual synchrony Jan 2004 � Released under Revised BSD license July 2004 � Mark Haverkamp contributed EVT service Aug/Sept 2004 14 September 2004 2

  3. Setup and Configuration Create shared key: linux# ./keygen OpenAIS Authentication key generator. Gathering 1024 bits for key from /dev/random. Writing openais key to /etc/ais/authkey. Save /etc/ais/network.conf: bindnetaddr: 192.168.1.0 mcastaddr: 226.94.1.1 mcastport:6000 Read QUICKSTART in source package for more details 14 September 2004 3

  4. The Architecture CLM EVT AMF CKPT EVS Libais.a Nodes(1..16), instances (1..n) IPC CLM EVT AMF CKPT EVS Group Aispoll Service Messaging Manager Interface Interface openais Executive Nodes(1..16) 14 September 2004 4

  5. Definitions � Group Messaging � Sending messages from 1 sender to many receivers. � Processor � The entity responsible for executing group messaging and membership protocols. � Configuration � A view, or description, of the processors within a group. � Agreed Order � All processors agree upon delivery order of messages delivered using group messaging. � Virtual Synchrony � A model of group messaging whereby all messages within a configuration view are delivered in agreed order. Configuration changes are delivered in the same order relative to messages to every processor. 14 September 2004 5

  6. Group Messaging Interface � Implements Extended Virtual Synchrony � Compile-time configuration of maximum message size � Encryption and Authentication of all messages � 4 Priority Levels � Uses multicast � Implemented using UDP � Multipathing in progress 14 September 2004 6

  7. The Ring Protocol • Sequence Number • Retransmit List • flow control count • group arut ORF Token Processor #1 Processor #3 Processor #2 14 September 2004 7

  8. The Ring Protocol • Sequence Number • Retransmit List • flow control count • group arut ORF Token Processor #1 Seq No #1 Processor #3 Processor #2 14 September 2004 8

  9. The Ring Protocol • Sequence Number • Retransmit List • flow control count • group arut ORF Token Processor #1 MCAST #1, #2 Seq No #1 Processor #3 Processor #2 14 September 2004 9

  10. The Ring Protocol • Sequence Number • Retransmit List • flow control count • group arut ORF Token Processor #1 MCAST #1, #2 Seq No #1 Seq No #3 Processor #3 Processor #2 14 September 2004 10

  11. The Ring Protocol • Sequence Number • Retransmit List • flow control count • group arut ORF Token Processor #1 MCAST #3, #4, #5 MCAST #1, #2 Seq No #1 Seq No #3 Processor #3 Processor #2 14 September 2004 11 Detects Missing #2

  12. The Ring Protocol • Sequence Number • Retransmit List (RTR) • flow control count • group arut ORF Token Processor #1 Seq #6, RTR #2 MCAST #3, #4, #5 MCAST #1, #2 Seq No #1 Seq No #3 Processor #3 Processor #2 14 September 2004 12 Detects Missing #2

  13. The Ring Protocol • Sequence Number • Retransmit List (RTR) • flow control count • group arut Detects Missing #5 ORF Token Processor #1 Seq #6, RTR #2 MCAST #2, #6 MCAST #3, #4, #5 MCAST #1, #2 Seq No #3 Processor #3 Processor #2 14 September 2004 13 Detects Missing #2

  14. The Ring Protocol • Sequence Number • Retransmit List (RTR) • flow control count • group arut Detects Missing #5 ORF Token Processor #1 Seq #6, RTR #2 MCAST #2, #6 Seq #7, RTR #5 MCAST #3, #4, #5 Seq No #3 Processor #3 Processor #2 14 September 2004 14 Detects Missing #2

  15. The Ring Protocol • Sequence Number • Retransmit List (RTR) • flow control count • group arut Detects Missing #5 ORF Token Processor #1 Seq #6, RTR #2 MCAST #2, #6 Seq #7, RTR #5 MCAST #3, #4, #5 MCAST #5 Processor #3 Processor #2 14 September 2004 15 Detects Missing #2

  16. Why Virtual Synchrony � Integrated Membership � Strong Membership Guarantees � Agreed Ordering of Messages � Self Delivery � Use of multicast � Group Wide Flow Control � Performance 14 September 2004 16

  17. Why Virtual Synchrony – Integrated Membership gmi_join (struct gmi_groupname *groupname, void (*deliver_fn) ( struct gmi_groupname *groupname, struct in_addr source_addr, struct iovec *iovec, int iov_len), void (*confchg_fn) ( struct sockaddr_in *member_list, int member_list_entries, struct sockaddr_in *left_list, int left_list_entries, struct sockaddr_in *joined_list, int joined_list_entries), gmi_join_handle *handle_out); Messages delivered with deliver_fn, configuration changes delivered with confchg_fn 14 September 2004 17

  18. Why Virtual Synchrony – Strong Membership Guarantees Example: A bank stores money in a distributed fashion based how many banks are in its “network”. The account starts with $300 and $99 is deposited. One bank closed forever around the time of the deposit. What could happen without strong membership guarantees? Account = $100 Account = $100 Account = $100 Confchg from 4 to 3 Deposits $25 Confchg from 4 to 3 Confchg from 4 to 3 Deposits $33 Deposits $33 Account = $133 Account = $133 Account = $125 Bank #3 Bank #2 Bank #1 14 September 2004 18

  19. Why Virtual Synchrony – Agreed Ordering of Messages Object Creation occurs on two seperate processors with the same “name”. What happens without agreed ordering of messages? Race conditions! Created Object “A” Created Object “A” Send A to other processors Send A to other processors Receives create, but already exists Receives create, but already exists Processor #1 Processor #2 14 September 2004 19

  20. Why Virtual Syncrhony – self delivery Library Request Library Request Library Response Executive Library Intelligence Here Handler Handler Executive Request Executive Request Group Messaging Interface 14 September 2004 20

  21. Why Virtual Syncrhony – Use of Multicast int gmi_mcast ( struct gmi_groupname *groupname, struct iovec *iovec, int iov_len, int priority); 14 September 2004 21

  22. The Service Handler � Service Manager Manages service handlers. � Every Service has 1 or more service handlers. � Handles requests from library connections. � Handles requests from group messaging delivery. � Handles partitions and merges. � Initializes the service for a new library connection � Exits the service for a departing library connection. � Initializes the service for the first time. 14 September 2004 22

  23. The Service Handler – Details struct service_handler { struct libais_handler *libais_handlers; int libais_handlers_count; int (**aisexec_handler_fns) (void *msg, struct in_addr source_addr); int aisexec_handler_fns_count; int (*confchg_fn) ( struct sockaddr_in *member_list, int member_list_entries, struct sockaddr_in *left_list, int left_list_entries, struct sockaddr_in *joined_list, int joined_list_entries); int (*libais_init_fn) (struct conn_info *conn_info, void *msg); int (*libais_exit_fn) (struct conn_info *conn_info); int *aisexec_init_fn) (void); } 14 September 2004 23

  24. Flow Control � Group Messaging Interface uses flow control on network � Library can access executive much faster then network can transmit requests � Library is flow controlled by group messaging interface. 14 September 2004 24

  25. Flow Control – Details int gmi_send_ok ( int priority, int msg_size); If gmi_send_ok is zero, library request receives SA_ERR_TRY_AGAIN. This support is handled by the service manager. The library handler is not concerned with flow control. 14 September 2004 25

  26. Performance / No Encryption or Auth Checkpoint Write from One Processor (100 mbit network) Throughput Total Available Bandwidth 10 9 8 7 MB / SEC 6 5 4 3 2 1 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 KB / MSG Transactions Per Second 2250 2000 1750 TRANS / SEC 1500 1250 1000 750 500 250 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 14 September 2004 26 KB / MSG

  27. Performance / With Encryption and Auth Checkpoint Write from One Processor (100 mbit network) Throughput 9 8 7 6 MB / SEC 5 4 3 2 1 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 KB / MSG Transactions Per Second 1600 1400 1200 TRANS / SEC 1000 800 600 400 200 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 KB / MSG 14 September 2004 27

  28. Performance / Group Messaging Scalability with more Processors Group Messaging Throughput 10 9 8 7 MB / SEC 6 No Encryption 5 Encryption 4 3 2 1 0 1 2 3 4 5 6 7 8 9 10 11 12 Processor Count 14 September 2004 28

  29. Project Statistics � Executive LOC: 16229 � Library LOC: 5951 � Include LOC: 2819 � Total LOC: 24999 (wc -l) � BK Changesets since openais inception: 65 14 September 2004 29

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend