IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D....

20
IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. SERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical Academy Bucharest, Romania

Transcript of IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D....

Page 1: IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.

IMPROUVEMENT OF COMPUTER NETWORKS

SECURITY BY USING FAULT TOLERANT CLUSTERS

Prof. SERB AUREL Ph. D.Prof. PATRICIU VICTOR-VALERIU Ph. D.

Military Technical AcademyBucharest, Romania

Page 2: IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.

FAULT TOLERANT SYSTEMS A fault tolerant system is one that can continue to

operate reliably by producing acceptable outputs in spite of occasional occurrences of component failures.

The basic principle of fault tolerant design is the use of redundancy.

A fault tolerant system can be viewed as a nested set of subsystems.

Fault tolerant architectures package redundant partitions into replaceable units.

Page 3: IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.

CLUSTERS AND FAULT TOLERANT CLUSTERS

A cluster is a set of computers connected over a local network, that function as a single large multicomputer. The cluster software is a layer that runs on top of local operating systems running on each computer.

A fault tolerant cluster is a cluster with external storage devices connected to the nodes on a common input/output bus. Clients are connected over the networks to a server application that is executing on the nodes.

Page 4: IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.

SINGLE POINTS OF FAILURE OF A CLUSTER

nodes in the cluster; disks used to store application or data, adapters,

controllers and cables used to connect the nodes to the disks;

the network backbones over which the users are accessing the cluster nodes and network adapters attached to each node;

power sources; applications.

Page 5: IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.

A SAMPLE CONFIGURATION FOR A FAULT TOLERANT

CLUSTER

Page 6: IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.

ELIMINATING NODES AS SINGLE POINTS OF FAILURE

When a node providing critical services in a cluster fails, another node in the cluster takes over its resources and provides the same services to the end user, in a process known as failover.

After the failover, clients can access the second node as easily as the first.

The process of failover is handled by special high availability software running at the top level cluster operating system.

Page 7: IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.

ELIMINATING DISKS AS SINGLE POINTS OF FAILURE

Disks are physically connected to all nodes, so that applications and data are also accessible by another node in the event of failover.

There are two methods available for providing disk redundancy:– using disk arrays in a RAID configuration;

– using software mirroring.

Page 8: IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.

ELIMINATING NETWORKS AS SINGLE POINTS OF FAILURE

For eliminating network failure can be provided fully redundant LAN connections, and configured local switching of LAN interfaces.

For eliminating cable failures, can be configured redundant cabling and redundant LAN interface cards on each node.

For eliminating the loss of client connectivity, can be configured redundant routers or redundant hubs or switches through which clients can access the services of the cluster.

Page 9: IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.

ELIMINATING POWER SOURCES AS SINGLE POINTS

OF FAILURE

The use of multiple power circuits with different circuit breakers reduces the likelihood of a complete power outage.

An uninterruptible power supply provides standby in the event of an interruption to the power source.

Small local uninterruptible power supply can be used to protect individual system processor units and data disks.

Page 10: IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.

ELIMINATING APPLICATIONS AND DATA AS SINGLE POINTS

OF FAILURE The cluster management software provides services like

as failure detection, recovery, load balancing, and the ability to manage the servers as a single system.

If there is a node failure, the cluster reconfigures itself and the applications that were running on the failed node and data used by these applications are made available on another node.

Another approach is to provide different instances of the same application running on multiple nodes.

Page 11: IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.

INTEROPERABILITY BETWEEN M&S AND C4ISR SYSTEMS

A key task for the M&S community is to link M&S systems with live or real C4ISR systems.

Within the C4ISR community there is a similar pressing need to link C4ISR equipments with simulations.

Page 12: IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.

COMMON KEY CONCEPTS IN M&S SYSTEMS, C4ISR SYSTEMS, AND FAULT TOLERANT CLUSTERS

open and distributed systems; networks; high level operating systems; segments, federates (federations) and packages; hierarchical architecture; commercial standards, specifications, and products interoperability and reusability; high availability systems.

Page 13: IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.

OPEN AND DISTRIBUTED SYSTEMS

All modern systems used for modeling and simulation and C4ISR are open and distributed systems.

The architecture of all modern fault tolerant systems is that of a cluster, which is one of the best open and distributed systems.

Page 14: IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.

NETWORKS

A fault tolerant cluster is a set of independent computers connected over a network, and always with external storage devices, containing applications and data, connected to the nodes on a common input/output bus. Clients are connected over the networks to a server application that is executing on the nodes.

The basic High Level Architecture protocol establishes that the communications path between any federates is over the network.

Page 15: IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.

HIGH LEVEL OPERATING SYSTEMS

In a fault tolerant system the cluster software is a layer that runs on top of local operating systems running on each computer.

The high availability applications in the fault tolerant cluster run at the top level cluster software.

In the High Level Architecture the Runtime Infrastructure is a high level distributed operating system for the federation.

Page 16: IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.

SEGMENTS, FEDERATES (FEDERATIONS) AND PACKAGES

The basic components of the High Level Architecture are the simulations themselves, or more generally, the federates.

In DII-COE-based systems, all software and data are packaged in self-contained units called segments.

By using the high-level cluster software, application services and all the resources needed to support the application can be putted together into special entities called application packages.

Page 17: IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.

HIERARCHICAL ARCHITECTURE All fault-tolerant clusters are partitioned at several

levels, but in addition it contains redundant components and recovery mechanisms which may be employed in different ways at different levels.

Simulations that use the HLA are modular in nature allowing federates to join and resign from the federation as the simulation executes.

At top of any fault tolerant cluster, command and control, and High Level Architecture compliant system there is a distributed operating system that runs on top of local operating systems running on each computer or on top of federates and federations.

Page 18: IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.

COMMERCIAL STANDARDS, SPECIFICATIONS, AND PRODUCTS

The commercial marketplace generally moves at a faster pace than the military marketplace

Using already built items lowers production costs The probability of product enhancements is increased

because the marketplace is larger The probability of standardization is increased

because a larger customer base drives it

Page 19: IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.

INTEROPERABILITY AND REUSABILITY

The High Level Architecture can be seen as a “software bus” that allow applications and data to communicate with one another, regardless of who designed them, the platform they are running on, and the language they are written in.

The fault tolerant cluster can offer a good architecture for High Level Architecture to work with these federations or for applications running on C4ISR systems.

Page 20: IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.

HIGH AVAILABILITY SYSTEMS The military systems used in M&S and command and

control must not succumb to different faults and must continue to operate reliably in spite of occasional occurrences of component failures.

High availability and security must be designed into the architecture.

Fault tolerance is the best guarantee that the system will be high available, and the essential services will be offered in real-time to the users of M&S systems or C4ISR systems.