The proceedings contain 13 papers. The topics discussed include: VERA: an extensible router architecture;an access control architecture for programmable routers;dynamic hardware plugins (DHP): exploiting reconfigurabl...
ISBN:
(纸本)0780370643
The proceedings contain 13 papers. The topics discussed include: VERA: an extensible router architecture;an access control architecture for programmable routers;dynamic hardware plugins (DHP): exploiting reconfigurable hardware for high-performance programmable routers;building multicast services from unicast forwarding and ephemeral state;active reliable multicast on CANEs: a case study;strong security in active networks;securing distributed adaptation;new models and algorithms for programmable networks;active networking on a programmable networking platform;regatta: a framework for automated supervision of network clouds;constructing end-to-end paths for playing media objects;providing applications with mobile agent technology;and implementing configurable signaling in the MULTE-ORB.
The proceedings contain 12 papers. The topics discussed include: controlling the XenoServer open platform;code revocation for active networks;hybrid resource control of active extensions;dynamic packet processors- a n...
ISBN:
(纸本)0780377648
The proceedings contain 12 papers. The topics discussed include: controlling the XenoServer open platform;code revocation for active networks;hybrid resource control of active extensions;dynamic packet processors- a new abstraction for router extensibility;run-time support for extensible protocol stacks:;OPCA: robust interdomain policy routing and traffic control;efficient programmable middleboxes for scaling large distributed applications;an open service platform for deploying and managing services at network edges;user-specified adaptive scheduling in a streaming media network;bees: a secure, resource-controlled, Java-based execution environment;a generic set-formation service;and transparent and scalable client-side server selection using netlets.
The proceedings contain 15 papers. The topics discussed include: NetBind: a binding tool for constructing data paths in network processor-based routers;topology discovery service for router-assisted multicast transpor...
ISBN:
(纸本)0780374576
The proceedings contain 15 papers. The topics discussed include: NetBind: a binding tool for constructing data paths in network processor-based routers;topology discovery service for router-assisted multicast transport;opus: an overlay peer utility service;CALM: congestion-aware layered multicast;a framework for efficient and programmable sensor networks;network layer support for overlay networks;PAMcast : programmable any-multicast for scalable message delivery;global flow control for wide area overlay networks: a cost-benefit approach;the potential of just-in-time compilation in active networks based on network processors;safe kernel programming in the OKE;modular components for network address translation;ape: fast and secure active networking architecture for active packet editing;and forwarding without loops in Icarus.
By implementing an extensible network protocol stack in the AMP Operating System, we have demonstrated support for fine-grained replacement of low-level network processing components. Furthermore, our compiler technol...
详细信息
ISBN:
(纸本)0780377648
By implementing an extensible network protocol stack in the AMP Operating System, we have demonstrated support for fine-grained replacement of low-level network processing components. Furthermore, our compiler technology approach provides the means to support multiple hardware architectures and a framework for enforcing safety and security properties during runtime code generation. Our preliminary results indicate that our approach is feasible, has comparable per-packet processing costs to static code, and has acceptable per-module loading and code generation costs.
Over the past several years, in response to demands from users that access to networked information and services be both customized and rapid, services and content have increasingly been 'pushed' towards netwo...
详细信息
ISBN:
(纸本)0780377648
Over the past several years, in response to demands from users that access to networked information and services be both customized and rapid, services and content have increasingly been 'pushed' towards network edges by Providers. In turn, this has resulted in an increased need for a software framework that provides an open and systematic way for Providers to deploy and manage such network edge services. We have implemented and tested such a framework in our Lab, called the Telcordia Edge Services Node. Inspired by the foundations built in the IETF OPES-related drafts, it is beneficial to Access, Service, and Content Providers alike. This paper reports on the design, implementation, and lessons-learned from our edge service node framework and management tools.
Active networks are placed at considerable risk by running code that arrives over the network. Careful crafting of authorization policy and stringent enforcement provide considerable protection against such risks. How...
详细信息
ISBN:
(纸本)0780377648
Active networks are placed at considerable risk by running code that arrives over the network. Careful crafting of authorization policy and stringent enforcement provide considerable protection against such risks. However, there still might be reasons why a packet that is executing in accordance with the authorization policy might cause damage. For example, the code might have bugs or may have been improperly configured or the packet might have been unintentionally launched. For the safety of the network, a mechanism is needed that would permit users and networks to find faulty, misconfigured, or misbehaving active code and revoke its ability to execute. This paper I considers the important issues and features of providing for revocation of code and an architecture that will support it in a wide-scale active network. It describes the parameters that identify the entities that issue the revocation notice and the entities that are to be revoked. It also describes an approach for policy composition from multiple entities, which eventually decides whether a revocation notice is authorized to act on a particular piece of code. Finally, this paper presents an innovative approach towards revocation in traditional networks using active networking as the transporting mechanism.
In disaster and combat situations, mobile cameras and other sensors transmit real-time data, used by many operators or analysis tools. Unfortunately, in the face of limited, unreliable resources, and varying demands, ...
详细信息
ISBN:
(纸本)0780377648
In disaster and combat situations, mobile cameras and other sensors transmit real-time data, used by many operators or analysis tools. Unfortunately, in the face of limited, unreliable resources, and varying demands, not all users may be able to get the fidelity they require. This paper describes MediaNet, a distributed stream processing system designed with the above scenarios in mind. Unlike past approaches, MediaNet's users can intuitively specify how the system should adapt based on their individual needs. MediaNet uses both local and online global resource scheduling to improve user performance and network utilization, and adapts without requiring underlying support for resource reservations. Performance experiments show that our scheduling algorithm is reasonably fast, and that user performance and network utilization are both significantly improved.
Dynamic group formation and discovery is an important component of several emerging end system applications and network services including peer-to-peer and overlay systems, network storage/caching systems, and reliabl...
详细信息
ISBN:
(纸本)0780377648
Dynamic group formation and discovery is an important component of several emerging end system applications and network services including peer-to-peer and overlay systems, network storage/caching systems, and reliable multicast/distribution services. In our previous work, we proposed a programmable, scalable grouping service based on multicast and concast. In this paper, we present a generalized abstraction that subsumes the earlier service and can be implemented using other forms of network support in addition to (or apart from) multicast/concast. In designing the new grouping abstraction, we have attempted to separate the policies governing set formation from the network mechanisms (multicast, concast, distributed hash tables, etc.) used to implement those policies. In addition, we allow policies to be specified in terms of both application-specific criteria and networkbased criteria. We describe how the service can be used to solve grouping problems from different application areas, and give an example showing how it can leverage different network support mechanisms, including ephemeral state processing.
暂无评论