The proceedings contain 13 papers. The topics discussed include: VERA: an extensible router architecture;an access control architecture for programmable routers;dynamic hardware plugins (DHP): exploiting reconfigurabl...
ISBN:
(纸本)0780370643
The proceedings contain 13 papers. The topics discussed include: VERA: an extensible router architecture;an access control architecture for programmable routers;dynamic hardware plugins (DHP): exploiting reconfigurable hardware for high-performance programmable routers;building multicast services from unicast forwarding and ephemeral state;active reliable multicast on CANEs: a case study;strong security in active networks;securing distributed adaptation;new models and algorithms for programmable networks;active networking on a programmable networking platform;regatta: a framework for automated supervision of network clouds;constructing end-to-end paths for playing media objects;providing applications with mobile agent technology;and implementing configurable signaling in the MULTE-ORB.
Active networks are an exciting development in networking services in which the infrastructure provides customizable network services to packets. These custom network services can be deployed by the user inside the pa...
详细信息
ISBN:
(纸本)0780370643
Active networks are an exciting development in networking services in which the infrastructure provides customizable network services to packets. These custom network services can be deployed by the user inside the packets themselves. Furthermore, the custom network services require that the infrastructure perform much more sophisticated operations on packets than the traditional forwarding. Consequently, there are heightened concerns from users and network operators about security. This paper discusses security requirements and issues in active networks with respect to authentication and authorisation in a node. We describe our prototype implementation of a solution to those issues. We go on to describe a security architecture derived from our experience and relate our prototype to the architecture.
As network technology has become more powerful and complex, it has become increasingly difficult to monitor the well-being of a network. Failure semantics, media, network equipment, and topologies are quickly evolving...
详细信息
ISBN:
(纸本)0780370643
As network technology has become more powerful and complex, it has become increasingly difficult to monitor the well-being of a network. Failure semantics, media, network equipment, and topologies are quickly evolving towards greater sophistication and lesser serviceability. We often wish that the locus of our network supervision were inside the network, as close as possible to the suspect faulty equipment, in order to perform unit verification and real-time in situ repairs of network equipment. Unlike simple end-to-end "pings," this directional, sub-end-to-end supervision requires a wide range of data concerning topologies, type of network nodes, node contingencies, and proven test suites for them. Our "Regatta" framework makes supervision of network nodes (for example, switches, routers, firewalls) and node aggregates (clouds) practical by automating the acquisition and utilization of this data. The resulting platform marries the ease of end-to-end monitoring (the operator does not know about intervening network nodes or topologies) with the merits of unit supervision into the network (highly specialized coverage). Regatta overcomes key weaknesses in both end-to-end monitoring (wherein a whole end-to-end extent is the sole testing scope of choice) and unit supervision into the network (that is, multi-dimensional dependencies on the network itself). A Regatta's limiting factor is in the availability of Java runtimes inside the network - such runtimes are required in order to dynamically inflate and customize Regatta's artifacts. Short of Active networks or Mobile Agents infrastructures supporting Regatta's widespread application, the Regatta framework already yields an appealing supervision resolution when attached to actual networks, and scales up to the finest resolution in experimental settings with all Java-enabled network nodes.
Over the last couple of years we have been working on the development of mobile agents systems and its application to the areas of telecommunications and network management. This work path produced positive results: a...
详细信息
ISBN:
(纸本)0780370643
Over the last couple of years we have been working on the development of mobile agents systems and its application to the areas of telecommunications and network management. This work path produced positive results: a competitive mobile agent platform was built, the run-time benefits of mobile agents were proved, and our industrial partners have developed practical applications that are being integrated into commercial products. However, despite the positive results, we feel that mobile agent technology is still not ready to enter the path of mainstream software development. In our perspective, one of the main reasons for this situation arises from the traditional approach to mobile agent technology. This approach, based on the familiar concept of the mobile-agent distributed platform as an extension of the operating system, focuses too much on the mobile agents and associated issues (mobility, agent lifecycle, security, coordination, etc.) and provides poor support for the development of applications where mobile agents are just one of several available technologies. Learning from past experience, we are now working on a new approach where the focus is brought back to the applications and mobile agents become just one the tools available to develop distributed systems. This provides a much lighter framework for application-based mobile agent systems. This paper presents the lessons learned from our previous project and discusses the new concept we are developing: application-centric mobile agent systems.
Based on an analysis of the heterogeneous systems for interconnecting distributed infrastructural devices. such as low-bandwidth sensor/actuator-networks and tire research prototype experience, the paper describes a p...
详细信息
ISBN:
(纸本)0769513212
Based on an analysis of the heterogeneous systems for interconnecting distributed infrastructural devices. such as low-bandwidth sensor/actuator-networks and tire research prototype experience, the paper describes a production-level implementation of an integrating architecture for accessing various infranets via intranets and the Internet as well as telecommunication networks. Its modularity allows the rapid deployment of new application scenarios.
Active networks are an exciting development in networking services in which the infrastructure provides customizable network services to packets. These custom network services can be deployed by the user inside the pa...
详细信息
ISBN:
(纸本)0780370643
Active networks are an exciting development in networking services in which the infrastructure provides customizable network services to packets. These custom network services can be deployed by the user inside the packets themselves. Furthermore, the custom network services require that the infrastructure performs much more sophisticated operations on packets than the traditional forwarding. Consequently, there are heightened concerns from users and network operators about security. We discuss security requirements and issues in active networks with respect to authentication and authorization in a node. We describe our prototype implementation of a solution to those issues. We go on to describe a security architecture derived from our experience and relate our prototype to the architecture.
Nowadays PC-cluster architectures are widely accepted for parallel computing. In a PC-cluster system, memories are physically distributed. To harness the computational power of a distributed-memory PC-cluster, a user ...
详细信息
In today's IP networks most of the network control and management tasks are performed at the end points. As a result, many important network functions cannot be optimized due to lack of sufficient support from the...
详细信息
ISBN:
(纸本)0780370643
In today's IP networks most of the network control and management tasks are performed at the end points. As a result, many important network functions cannot be optimized due to lack of sufficient support from the network. The growing need for quality guaranteed services brought on suggestions to add more computational power to the network elements. This paper studies the algorithmic power of networks whose routers are capable of performing complex tasks. It presents a new model that captures the hop-by-hop datagram forwarding mechanism deployed in today's IP networks, as well as the ability to perform complex computations in network elements as proposed in the active networks paradigm. Using our framework, we present and analyze distributed algorithms for basic problems that arise in the control and management of IP networks. These problems include: route discovery, message dissemination, topology discovery, and bottleneck detection. Our results prove that, although adding computation power to the routers increases the message delay, it shortens the completion time for many tasks. The suggested model can be used to evaluate the contribution of added features to a router, and allows the formal comparison of different proposed architectures.
暂无评论