SlideShare a Scribd company logo
DVTDS
Christian Hollstein, TeraCortex

www.teracortex.com
Presentation of DVTDS
Distributed Virtual Transaction Directory Server
By TeraCortex

●

Background

●

Architecture

●

Virtualization

●

Performance
Background: LDAP in Mobile Networks
4G
network

IMS
domain

HSS
MME

IMSAS

LDAP

CSCF

LDAP
3Com

CoreBuilder 5000TM

Switching Hub

LDAP
Transactions
mgt fb

fb

fb

fb tpl6 tpl6 fb

Media
Server

fb

fb

fb

5302m

SDM
Directory

LDAP

Provisioning
System

3G
HLR network
GGSN
MSC

SGSN
LDAP based Subscriber Data Management
●

3GPP standard rules LDAP as central repository

●

Several hundred mobile operators / deployments worldwide

●

Major vendors: Ericsson, Huawei, NSN, ZTE, Alcatel

●

NSN alone serves 3.2 billion subscriber records

●

Several dozen entries per subscriber record

●

Probably largest directories worldwide
Consequences for Directory Products
●

Millions of subscriber records → billions of entries

●

Data federation / distribution

●

High availability → geo -redundant deployment / replication

●

Consistent provisioning → transaction safeness

●

Update signaling to applications → triggers

●

Multi application environments → data model virtualization

●

High volume traffic → near real time behavior
New Solution Coming Up:

DVTDS
DVTDS Distributed Architecture
Client

Client

Client
LDAP

Possible
session
path

DVTDS

1000 million keys
on 64 GB (mirrored)
machine

...

Client


 > 1000

‱ LDAP protocol for chaining
‱ Multi level hierarchy
‱ Leaves may be any LDAP server
‱ Sessions span over several servers
‱ Servers may be replicated
‱ Distributed transactions

LDAP
Chaining

DVTDS

...

(chained)
(chained,
mirrord)

...
LDAP
Chaining
Client
Session
path

Data Replication

‱ Symmetrical Multi Master Replication
‱ No single point of failure
LDAP
connection to ‱ Logical DSA concept
‱ Compatible with LDAP chaining
any of the
‱ Priority based conflict resolving, real time
mirrors
‱ LDAP protocol
‱ Up to eight servers per DSA, fully meshed
‱ Transaction safe

(Mirror 1)

(Mirror 0)

LDAP Mirror

(Mirror 2)

(Mirror 3)

Logical DSA
Replication and Conflict Resolving
‱ Conflicts recognized and handled in real time
‱ Based on request, user and server priority
‱ Keeps to ACID paradigm
‱ Data consistent across sites under attack
‱ Winner gets “Success”. Looser gets “Busy”

User
Prio 7
LDAP
Delete
Prio 0

Session
path

User
Prio 4
LDAP
Modify
Prio 1

Session
path
Object
Object
Resolver
Resolver

Object
Object
Resolver
Resolver

DVTDS

Site A
Prio 2

LDAP
Mirror

DVTDS

Site B
Prio 5
System Integration
and External Interfaces

Applications /
Provisioning
LDAP

Client Port ...
SOAP/
HTTP
LDIF

Binary
ASN.1

Capture Port

...

Trigger

Log File

...

...

LDAP

CSV Backup / Data
Migration
LDIF

Admin
Port

...

CSV
LDIF

CSV

Reports

...

Restore / Data
Migration

...

Data
Federation
LDAP

... Data
...
Replication
LDAP

LDAP
CSV
LDIF

OAM
System
Internal Architecture
Client Ports
Session

...

Capture Ports
Session, queue
control

...
DVTDS

Protocol Stack

Protocol Stack

Protocol Stack

Object Resolver

Object Resolver

Object Resolver

Execution Unit

Execution Unit

Execution Unit

Interlocking sub system
Directory
Information
Tree

Central
Data
Area

Hard disk sub system

Configuration
Schema
Backup/Restore
Traffic control
Tuning
DNS
Licenses
Logging/Audits

...
Interfaces:
Trigger
Backup
Restore
Migration
Reports
Admin
Log files
Chaining
Replication
Architectural Features
●

Free configurable client ports

●

Each client port serves a number of sessions

●

Each session lives inside its own worker thread

●

Object level locking system

●

Direct data allocation on memory mapped hard disk volumes

●

Volumes maybe cooked or raw file space
LDAP Data Model Virtualization
Data access via
application views

HSS
HLR

MMS

Physical data
access (No views)

AAA

IMS
Application Data

M2M

View
Layer

PCRF

Core
Data

MNP

FixedNet

Provisioning
System
Social Networks
Supported LDAP View Mechanisms
●

Transparent aliases

●

Rule based bidirectional DN conversion

●

Virtual objects

●

Virtual and real attributes can be mixed in any object

●

Soon: Rule based bidirectional attribute/value conversion

●

Integrated in the DVTDS kernel → little overhead

●

Online configurable → no service interruption
Data Aggregation by Virtualization:
Physical Telco Model

dc=Enterprise
dc=IMSI
oc: dcObject

dc=EMAIL
dc=IMSI
oc: dcObject

dc=MSISDN
dc=IMSI
oc: dcObject

o=<BusinessUnit>

dc=IMSI
dc=ACCOUNT

dc=IMSI

oc: organization

oc: dcObject

oc: dcObject

ou=subscriberData
mail=me@teracortex.com
IMSI=777888000000001
oc: imsiUidAlias
mailAlias

IMSI=777888000000001
MSISDN=4916096220958
oc: imsiUidAlias
msisdnAlias

IMSI=262011100000001
IMSI=777888000000001
oc: imsiUidAlias
imsiAlias

account=1234abcd
IMSI=777888000000001
oc: imsiUidAlias
accountlAlias

oc: organizationalUnitt
UID=777888000000001
oc: inetOrgPerson

Access
Path

...
dc=configurableViews
dc=IMSI
oc: dcObject

ou=MOBILE

ou=EMAIL

ou=FiXED

ou=IDENTITY
dc=IDENTITY

Mobile
Data

Email
Data

Fixed
net data

Subscriber
Identities

dc=FIXED

dc=EMAIL

dc=MOBILE
oc: mobileData
param0: real value
param1: real value
...
Mobile: reference

oc: eMailData
param2: real value
param3: real value
...
Email: reference

oc: fixedNetData
param4: real value
param5: real value
...
Fixed Net: reference

oc: identityData
param6: real value
param7: real value
...
Identy: reference
View Mechanism Properties

●

Each subscriber has individual data below uid=...

●

Accessed via transparent aliases

●

Application view data outside of subscriber data

●

Found by two stage resolving algorithm

●

Different applications can share physical data
Example: Server – Side DN Conversion
DN as sent by the client:
ou=mobile,impi=sip:262000000000000@ims.telekom.de,dc=IMPI

Server Side Conversion Rule:
clientDn: *,impi=(sip):([0-9]+)@(ims.telekom.de),dc=IMPI
serverDn: imsi=#3(2),dc=IMSI
DN as used by the server:
ou=mobile,imsi=262000000000000,dc=IMSI
1000000

Throughput in absolute numbers

900000
DVTDS
Intel I7 4960X
6 Cores @4.6 GHz
32 GB RAM
7 x SATA 7200 RPM
28 Million entries

Operations / s

800000
700000
600000

Oracle OID
Sparc T5-2
32 cores @3.6 GHz
512 GB RAM
Flash disk array
50 million entries

500000
400000
300000
200000
100000

Entry
load

LDAP
Add

LDAP
Search

LDAP
Modify

LDAP
Compare
Throughput per GHz CPU speed
27000
DVTDS
Intel I7 4960X
6 Cores @4.6 GHz
= 27.6 GHz

Operations / s

24000
21000
18000

Oracle OID
Sparc T5-2
32 cores @3.6 GHz
= 115.2 GHz

15000
12000
9000
6000
3000

Entry
load

LDAP
Add

LDAP
Search

LDAP
Modify

LDAP
Compare
Throughput Scaling
Notes on 3D Server Throughput Diagram
●

2 Variables: queue length and number of clients

●

Throughput increases with bigger queue length

●

Throughput scales by number of cores and clients

●

Saturation on 6 core machine at 6 clients

●

Degradation when operated beyond saturation

●

Linear scaling if not bottle - necked by memory bandwidth
Scaling the Data
540 Million entries
inetOrgPerson
22 Attributes
LDIF size: 532 bytes

ine
L

rs
a

c

ing
al

‱ 540 million entries in less than 2 hours
‱ Naming attribute was indexed
‱ Indexing time included, no setup time
‱ Multi threaded object loader
‱ LDAP protocol / BER object format
‱ 30 GB RAM, 366 GB data base size

114 Minutes load time
Roadmap 2014
●

Automatic replica reconciliation after mirror network faults

●

Free configurable indices

●

User level documentation

●

Free demo version download
Thank you for your attention!

www.teracortex.com

More Related Content

What's hot (20)

PDF
aclpwn - Active Directory ACL exploitation with BloodHound
DirkjanMollema
 
PDF
Using OpenLDAP
Wildan Maulana
 
PPTX
Silicon Valley JUG - How to generate customized java 8 code from your database
Speedment, Inc.
 
PPTX
Kerberos, Token and Hadoop
Kai Zheng
 
PPTX
Open LDAP vs. Active Directory
Ahmad Haghighi
 
PPTX
Securing Your MongoDB Implementation
MongoDB
 
PDF
Practical-LDAP-and-Linux
Balaji Ravi
 
PPTX
NoSQL - No Security? - The BSides Edition
Gavin Holt
 
PPT
LDAP
Khemnath Chauhan
 
PPTX
JavaOne2016 - Microservices: Terabytes in Microseconds [CON4516]
Malin Weiss
 
PDF
Synchronize AD and OpenLDAP with LSC
LDAPCon
 
PPTX
Webinar: MongoDB 2.6 New Security Features
MongoDB
 
PPTX
Securing Your MongoDB Deployment
MongoDB
 
PPTX
Developing Distributed Web Applications, Where does REST fit in?
Srinath Perera
 
PDF
Mdb dn 2016_11_ops_mgr
Daniel M. Farrell
 
PPTX
Securing Your MongoDB Deployment
MongoDB
 
PDF
DerbyCon 2019 - Kerberoasting Revisited
Will Schroeder
 
PPTX
LDAP - Lightweight Directory Access Protocol
S. Hasnain Raza
 
PDF
OpenLDAP - Installation and Configuration
Wildan Maulana
 
PPTX
powershell-is-dead-epic-learnings-london
nettitude_labs
 
aclpwn - Active Directory ACL exploitation with BloodHound
DirkjanMollema
 
Using OpenLDAP
Wildan Maulana
 
Silicon Valley JUG - How to generate customized java 8 code from your database
Speedment, Inc.
 
Kerberos, Token and Hadoop
Kai Zheng
 
Open LDAP vs. Active Directory
Ahmad Haghighi
 
Securing Your MongoDB Implementation
MongoDB
 
Practical-LDAP-and-Linux
Balaji Ravi
 
NoSQL - No Security? - The BSides Edition
Gavin Holt
 
JavaOne2016 - Microservices: Terabytes in Microseconds [CON4516]
Malin Weiss
 
Synchronize AD and OpenLDAP with LSC
LDAPCon
 
Webinar: MongoDB 2.6 New Security Features
MongoDB
 
Securing Your MongoDB Deployment
MongoDB
 
Developing Distributed Web Applications, Where does REST fit in?
Srinath Perera
 
Mdb dn 2016_11_ops_mgr
Daniel M. Farrell
 
Securing Your MongoDB Deployment
MongoDB
 
DerbyCon 2019 - Kerberoasting Revisited
Will Schroeder
 
LDAP - Lightweight Directory Access Protocol
S. Hasnain Raza
 
OpenLDAP - Installation and Configuration
Wildan Maulana
 
powershell-is-dead-epic-learnings-london
nettitude_labs
 

Similar to Distributed Virtual Transaction Directory Server (20)

PPT
Directory services by SAJID
Sajid khan
 
PDF
CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room ...
CloudIDSummit
 
ODP
Ldap2010
CYJ
 
PPT
The Ldap Protocol
Glen Plantz
 
PPT
Directory Services Nma Unit-1
GPAPassedStudents
 
PPTX
Citrix XenDesktop 7 Performance Monitoring Best Practices
eG Innovations
 
PPTX
Reston Virtualization Group 9-18-2014
VMwareJenn
 
PPT
Ldap system administration
Ali Abdo
 
PDF
08 sdn system intelligence short public beijing sdn conference - 130828
Mason Mei
 
PDF
Directory services
Christalin Nelson
 
PPTX
Directory Introduction
Aidy Tificate
 
PDF
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue
 
PDF
cloud_and_virtualization_concepts.pdf
RAJURAJ111120
 
PDF
Future Network
Marie-Paule Odini
 
PPT
DHCP
viditsir
 
PPTX
Infrastructure for DBAs
PeterShore4
 
PDF
Introduction to Virtualization
Wellshop.pk
 
PDF
Whitepaper: Software Defined Data Center – An Implementation view - Happiest ...
Happiest Minds Technologies
 
PPTX
TECHunplugged Austin 2016
Chris Evans
 
PPTX
cloud_and_virtualization_concepts by Dr Sudha L K Associate Professor BIT Ban...
Dr.Sudha L K
 
Directory services by SAJID
Sajid khan
 
CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room ...
CloudIDSummit
 
Ldap2010
CYJ
 
The Ldap Protocol
Glen Plantz
 
Directory Services Nma Unit-1
GPAPassedStudents
 
Citrix XenDesktop 7 Performance Monitoring Best Practices
eG Innovations
 
Reston Virtualization Group 9-18-2014
VMwareJenn
 
Ldap system administration
Ali Abdo
 
08 sdn system intelligence short public beijing sdn conference - 130828
Mason Mei
 
Directory services
Christalin Nelson
 
Directory Introduction
Aidy Tificate
 
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue
 
cloud_and_virtualization_concepts.pdf
RAJURAJ111120
 
Future Network
Marie-Paule Odini
 
DHCP
viditsir
 
Infrastructure for DBAs
PeterShore4
 
Introduction to Virtualization
Wellshop.pk
 
Whitepaper: Software Defined Data Center – An Implementation view - Happiest ...
Happiest Minds Technologies
 
TECHunplugged Austin 2016
Chris Evans
 
cloud_and_virtualization_concepts by Dr Sudha L K Associate Professor BIT Ban...
Dr.Sudha L K
 
Ad

More from LDAPCon (12)

ODP
Fusiondirectory: your infrastructure manager based on ldap
LDAPCon
 
PDF
Benchmarks on LDAP directories
LDAPCon
 
PDF
Update on the OpenDJ project
LDAPCon
 
PDF
LDAP Development Using Spring LDAP
LDAPCon
 
PDF
What's New in OpenLDAP
LDAPCon
 
PDF
What makes a LDAP server running fast ? An bit of insight about the various b...
LDAPCon
 
PDF
Manage password policy in OpenLDAP
LDAPCon
 
PDF
OpenLDAP configuration brought to Apache Directory Studio
LDAPCon
 
PDF
Making Research "Social" using LDAP
LDAPCon
 
PDF
eSCIMo - User Provisioning over Web
LDAPCon
 
PDF
Give a REST to your LDAP directory services
LDAPCon
 
PDF
IAM to IRM: The Shift to Identity Relationship Management
LDAPCon
 
Fusiondirectory: your infrastructure manager based on ldap
LDAPCon
 
Benchmarks on LDAP directories
LDAPCon
 
Update on the OpenDJ project
LDAPCon
 
LDAP Development Using Spring LDAP
LDAPCon
 
What's New in OpenLDAP
LDAPCon
 
What makes a LDAP server running fast ? An bit of insight about the various b...
LDAPCon
 
Manage password policy in OpenLDAP
LDAPCon
 
OpenLDAP configuration brought to Apache Directory Studio
LDAPCon
 
Making Research "Social" using LDAP
LDAPCon
 
eSCIMo - User Provisioning over Web
LDAPCon
 
Give a REST to your LDAP directory services
LDAPCon
 
IAM to IRM: The Shift to Identity Relationship Management
LDAPCon
 
Ad

Recently uploaded (20)

PDF
🚀 Let’s Build Our First Slack Workflow! 🔧.pdf
SanjeetMishra29
 
PDF
Simplify Your FME Flow Setup: Fault-Tolerant Deployment Made Easy with Packer...
Safe Software
 
PDF
Bridging CAD, IBM TRIRIGA & GIS with FME: The Portland Public Schools Case
Safe Software
 
PPSX
Usergroup - OutSystems Architecture.ppsx
Kurt Vandevelde
 
PPTX
Smarter Governance with AI: What Every Board Needs to Know
OnBoard
 
PDF
Kubernetes - Architecture & Components.pdf
geethak285
 
PDF
ArcGIS Utility Network Migration - The Hunter Water Story
Safe Software
 
PDF
Hello I'm "AI" Your New _________________
Dr. Tathagat Varma
 
PDF
FME as an Orchestration Tool with Principles From Data Gravity
Safe Software
 
PPTX
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Poster...
Michele Kryston
 
PPTX
Paycifi - Programmable Trust_Breakfast_PPTXT
FinTech Belgium
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Understanding AI Optimization AIO, LLMO, and GEO
CoDigital
 
PDF
Dev Dives: Accelerating agentic automation with Autopilot for Everyone
UiPathCommunity
 
PDF
Unlocking FME Flow’s Potential: Architecture Design for Modern Enterprises
Safe Software
 
PDF
Enhancing Environmental Monitoring with Real-Time Data Integration: Leveragin...
Safe Software
 
PDF
Why aren't you using FME Flow's CPU Time?
Safe Software
 
PDF
DoS Attack vs DDoS Attack_ The Silent Wars of the Internet.pdf
CyberPro Magazine
 
PPTX
CapCut Pro PC Crack Latest Version Free Free
josanj305
 
PDF
Darley - FIRST Copenhagen Lightning Talk (2025-06-26) Epochalypse 2038 - Time...
treyka
 
🚀 Let’s Build Our First Slack Workflow! 🔧.pdf
SanjeetMishra29
 
Simplify Your FME Flow Setup: Fault-Tolerant Deployment Made Easy with Packer...
Safe Software
 
Bridging CAD, IBM TRIRIGA & GIS with FME: The Portland Public Schools Case
Safe Software
 
Usergroup - OutSystems Architecture.ppsx
Kurt Vandevelde
 
Smarter Governance with AI: What Every Board Needs to Know
OnBoard
 
Kubernetes - Architecture & Components.pdf
geethak285
 
ArcGIS Utility Network Migration - The Hunter Water Story
Safe Software
 
Hello I'm "AI" Your New _________________
Dr. Tathagat Varma
 
FME as an Orchestration Tool with Principles From Data Gravity
Safe Software
 
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Poster...
Michele Kryston
 
Paycifi - Programmable Trust_Breakfast_PPTXT
FinTech Belgium
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Understanding AI Optimization AIO, LLMO, and GEO
CoDigital
 
Dev Dives: Accelerating agentic automation with Autopilot for Everyone
UiPathCommunity
 
Unlocking FME Flow’s Potential: Architecture Design for Modern Enterprises
Safe Software
 
Enhancing Environmental Monitoring with Real-Time Data Integration: Leveragin...
Safe Software
 
Why aren't you using FME Flow's CPU Time?
Safe Software
 
DoS Attack vs DDoS Attack_ The Silent Wars of the Internet.pdf
CyberPro Magazine
 
CapCut Pro PC Crack Latest Version Free Free
josanj305
 
Darley - FIRST Copenhagen Lightning Talk (2025-06-26) Epochalypse 2038 - Time...
treyka
 

Distributed Virtual Transaction Directory Server

  • 2. Presentation of DVTDS Distributed Virtual Transaction Directory Server By TeraCortex ● Background ● Architecture ● Virtualization ● Performance
  • 3. Background: LDAP in Mobile Networks 4G network IMS domain HSS MME IMSAS LDAP CSCF LDAP 3Com CoreBuilder 5000TM Switching Hub LDAP Transactions mgt fb fb fb fb tpl6 tpl6 fb Media Server fb fb fb 5302m SDM Directory LDAP Provisioning System 3G HLR network GGSN MSC SGSN
  • 4. LDAP based Subscriber Data Management ● 3GPP standard rules LDAP as central repository ● Several hundred mobile operators / deployments worldwide ● Major vendors: Ericsson, Huawei, NSN, ZTE, Alcatel ● NSN alone serves 3.2 billion subscriber records ● Several dozen entries per subscriber record ● Probably largest directories worldwide
  • 5. Consequences for Directory Products ● Millions of subscriber records → billions of entries ● Data federation / distribution ● High availability → geo -redundant deployment / replication ● Consistent provisioning → transaction safeness ● Update signaling to applications → triggers ● Multi application environments → data model virtualization ● High volume traffic → near real time behavior
  • 7. DVTDS Distributed Architecture Client Client Client LDAP Possible session path DVTDS 1000 million keys on 64 GB (mirrored) machine ... Client 
 > 1000 ‱ LDAP protocol for chaining ‱ Multi level hierarchy ‱ Leaves may be any LDAP server ‱ Sessions span over several servers ‱ Servers may be replicated ‱ Distributed transactions LDAP Chaining DVTDS ... (chained) (chained, mirrord) ... LDAP Chaining
  • 8. Client Session path Data Replication ‱ Symmetrical Multi Master Replication ‱ No single point of failure LDAP connection to ‱ Logical DSA concept ‱ Compatible with LDAP chaining any of the ‱ Priority based conflict resolving, real time mirrors ‱ LDAP protocol ‱ Up to eight servers per DSA, fully meshed ‱ Transaction safe (Mirror 1) (Mirror 0) LDAP Mirror (Mirror 2) (Mirror 3) Logical DSA
  • 9. Replication and Conflict Resolving ‱ Conflicts recognized and handled in real time ‱ Based on request, user and server priority ‱ Keeps to ACID paradigm ‱ Data consistent across sites under attack ‱ Winner gets “Success”. Looser gets “Busy” User Prio 7 LDAP Delete Prio 0 Session path User Prio 4 LDAP Modify Prio 1 Session path Object Object Resolver Resolver Object Object Resolver Resolver DVTDS Site A Prio 2 LDAP Mirror DVTDS Site B Prio 5
  • 10. System Integration and External Interfaces Applications / Provisioning LDAP Client Port ... SOAP/ HTTP LDIF Binary ASN.1 Capture Port ... Trigger Log File ... ... LDAP CSV Backup / Data Migration LDIF Admin Port ... CSV LDIF CSV Reports ... Restore / Data Migration ... Data Federation LDAP ... Data ... Replication LDAP LDAP CSV LDIF OAM System
  • 11. Internal Architecture Client Ports Session ... Capture Ports Session, queue control ... DVTDS Protocol Stack Protocol Stack Protocol Stack Object Resolver Object Resolver Object Resolver Execution Unit Execution Unit Execution Unit Interlocking sub system Directory Information Tree Central Data Area Hard disk sub system Configuration Schema Backup/Restore Traffic control Tuning DNS Licenses Logging/Audits ... Interfaces: Trigger Backup Restore Migration Reports Admin Log files Chaining Replication
  • 12. Architectural Features ● Free configurable client ports ● Each client port serves a number of sessions ● Each session lives inside its own worker thread ● Object level locking system ● Direct data allocation on memory mapped hard disk volumes ● Volumes maybe cooked or raw file space
  • 13. LDAP Data Model Virtualization Data access via application views HSS HLR MMS Physical data access (No views) AAA IMS Application Data M2M View Layer PCRF Core Data MNP FixedNet Provisioning System Social Networks
  • 14. Supported LDAP View Mechanisms ● Transparent aliases ● Rule based bidirectional DN conversion ● Virtual objects ● Virtual and real attributes can be mixed in any object ● Soon: Rule based bidirectional attribute/value conversion ● Integrated in the DVTDS kernel → little overhead ● Online configurable → no service interruption
  • 15. Data Aggregation by Virtualization: Physical Telco Model dc=Enterprise dc=IMSI oc: dcObject dc=EMAIL dc=IMSI oc: dcObject dc=MSISDN dc=IMSI oc: dcObject o=<BusinessUnit> dc=IMSI dc=ACCOUNT dc=IMSI oc: organization oc: dcObject oc: dcObject ou=subscriberData [email protected] IMSI=777888000000001 oc: imsiUidAlias mailAlias IMSI=777888000000001 MSISDN=4916096220958 oc: imsiUidAlias msisdnAlias IMSI=262011100000001 IMSI=777888000000001 oc: imsiUidAlias imsiAlias account=1234abcd IMSI=777888000000001 oc: imsiUidAlias accountlAlias oc: organizationalUnitt UID=777888000000001 oc: inetOrgPerson Access Path ... dc=configurableViews dc=IMSI oc: dcObject ou=MOBILE ou=EMAIL ou=FiXED ou=IDENTITY dc=IDENTITY Mobile Data Email Data Fixed net data Subscriber Identities dc=FIXED dc=EMAIL dc=MOBILE oc: mobileData param0: real value param1: real value ... Mobile: reference oc: eMailData param2: real value param3: real value ... Email: reference oc: fixedNetData param4: real value param5: real value ... Fixed Net: reference oc: identityData param6: real value param7: real value ... Identy: reference
  • 16. View Mechanism Properties ● Each subscriber has individual data below uid=... ● Accessed via transparent aliases ● Application view data outside of subscriber data ● Found by two stage resolving algorithm ● Different applications can share physical data
  • 17. Example: Server – Side DN Conversion DN as sent by the client: ou=mobile,impi=sip:[email protected],dc=IMPI Server Side Conversion Rule: clientDn: *,impi=(sip):([0-9]+)@(ims.telekom.de),dc=IMPI serverDn: imsi=#3(2),dc=IMSI DN as used by the server: ou=mobile,imsi=262000000000000,dc=IMSI
  • 18. 1000000 Throughput in absolute numbers 900000 DVTDS Intel I7 4960X 6 Cores @4.6 GHz 32 GB RAM 7 x SATA 7200 RPM 28 Million entries Operations / s 800000 700000 600000 Oracle OID Sparc T5-2 32 cores @3.6 GHz 512 GB RAM Flash disk array 50 million entries 500000 400000 300000 200000 100000 Entry load LDAP Add LDAP Search LDAP Modify LDAP Compare
  • 19. Throughput per GHz CPU speed 27000 DVTDS Intel I7 4960X 6 Cores @4.6 GHz = 27.6 GHz Operations / s 24000 21000 18000 Oracle OID Sparc T5-2 32 cores @3.6 GHz = 115.2 GHz 15000 12000 9000 6000 3000 Entry load LDAP Add LDAP Search LDAP Modify LDAP Compare
  • 21. Notes on 3D Server Throughput Diagram ● 2 Variables: queue length and number of clients ● Throughput increases with bigger queue length ● Throughput scales by number of cores and clients ● Saturation on 6 core machine at 6 clients ● Degradation when operated beyond saturation ● Linear scaling if not bottle - necked by memory bandwidth
  • 22. Scaling the Data 540 Million entries inetOrgPerson 22 Attributes LDIF size: 532 bytes ine L rs a c ing al ‱ 540 million entries in less than 2 hours ‱ Naming attribute was indexed ‱ Indexing time included, no setup time ‱ Multi threaded object loader ‱ LDAP protocol / BER object format ‱ 30 GB RAM, 366 GB data base size 114 Minutes load time
  • 23. Roadmap 2014 ● Automatic replica reconciliation after mirror network faults ● Free configurable indices ● User level documentation ● Free demo version download
  • 24. Thank you for your attention! www.teracortex.com