OCALA: An Architecture for Supporting Legacy Applications over Overlays

نویسندگان

  • Dilip Antony Joseph
  • Jayanthkumar Kannan
  • Ayumu Kubota
  • Karthik Lakshminarayanan
  • Ion Stoica
  • Klaus Wehrle
چکیده

The ever increasing demand of new applications has led researchers to propose new network architectures that address limitations of the current Internet. Given the rigidity of the Internet today, overlay networks are used to implement such architectures, in the hope of gaining a large user base. Despite sustained efforts to test and deploy new network architectures (on testbeds such as Planetlab), few of these efforts have attracted a significant number of users. We believe that chances of user acceptance of overlays, and eventually new network architectures, will be substantially improved by enabling users to leverage their functionality without any modifications to their applications and operating systems. In this paper, we present our design, implementation, and experience with OCALA, an overlay convergence architecture that achieves this goal. OCALA interposes an overlay convergence layer below the transport layer, that is composed of an overlay independent sub-layer that interfaces with legacy applications, and an overlay dependent sub-layer that delivers packets to the overlay. Unlike previous efforts, this design enables: (a) simultaneous access to multiple overlays (b) communication between hosts in different overlays (c) communication between overlay hosts and legacy hosts (d) extensibility, allowing researchers to incorporate their overlays into OCALA. We currently support three overlays, i3 [29], RON [1] and HIP [17], on Linux and Windows XP/2000. We (and a few other research groups and end-users) have used OCALA for over a year with many legacy applications ranging from web browsers to remote desktop applications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Supporting Legacy Applications over i 3

Providing support for legacy applications is a crucial component of many overlay networks, as it allows end-users to instantly benefit from the functionality introduced by these overlays. This paper presents the design and implementation of a proxy-based solution to support legacy applications in the context of the i3 overlay [24]. The proxy design relies on an address virtualization technique ...

متن کامل

Trading Off Resources Between Overlapping Overlays

Many different overlays with different properties have been proposed. Rather than using one overlay for all applications, it is likely that multiple overlapping overlays will be deployed on the same computing resources for different purposes. We present an architecture, called ODIN-S, for mediating the resources used by overlapping overlays. We can specify priorities for different overlays, and...

متن کامل

An Architecture for Multi-View Information Overlays

This paper describes an architecture for supporting multiview information overlays within the InVision visualisation framework. The concept of an information overlay is defined as well its key benefits, including the ability to support coordination of presentation across differing views. We describe how we can then abstract a view to being simply the lowest overlay in a generalised stack of inf...

متن کامل

An Architecture for Homogenizing Federated Databases

Many large organizations have a number of heterogeneous localized databases that are maintained and managed to support a set of local applications. One of the main difficulties in supporting global applications over a number of localized databases and migrating legacy ISs to modern computing environment is to cope with the heterogeneities of these systems. We propose a novel flexible architectu...

متن کامل

Reverse Engineering: Why and How to Reverse Engineer Software

Today especially large organizations are not only faced with the problem of replacing their information systems with completely new ones, but they have to maintain and to gain control over their legacy applications. Reverse engineering provides the means for this purpose supporting in recapturing lost information, restructuring complex systems or transforming old systems to a new and more maint...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006