Author : David Wetherall Presented By : Gokul Nadathur

Slides:



Advertisements
Similar presentations
NetServ Dynamic in-network service deployment Henning Schulzrinne (Columbia University) Srinivasan Seetharaman (Georgia Tech) Volker Hilt (Bell Labs)
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Using Capability to prevent Internet Denial-of-Service attacks  Tom Anderson  Timothy Roscoe  David Wetherall  Offense Team –Khoa To –Amit Saha.
1 Improving the Performance of Distributed Applications Using Active Networks Mohamed M. Hefeeda 4/28/1999.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
CS 268: Active Networks Ion Stoica May 6, 2002 (* Based on David Wheterall presentation from SOSP ’99)
Department of Computer Science, Purdue University Active Networks: Applications, Security, Safety and Architectures Author: Konstantinos Psounis Stanford.
A DoS-Limiting Network Architecture Presented by Karl Deng Sagar Vemuri.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Capsule-based Active Networks: What have we learned? David Wetherall University of Washington.
CS335 Networking & Network Administration Tuesday, May 11, 2010.
CS682 Session 6 Prof. Katz. Firewalls An intelligent router? Used as a traffic control mechanism Based on information in the Layer 3 and 4 headers Administrator.
In-Band Flow Establishment for End-to-End QoS in RDRN Saravanan Radhakrishnan.
Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.
Firewalls Screen packets coming into the Privet Networks from external, Untrusted Networks (Internet) Ingress Packet Filtering  Firewall examine incoming.
A DoS Limiting Network Architecture An Overview by - Amit Mondal.
A global, public network of computer networks. The largest computer network in the world. Computer Network A collection of computing devices connected.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
QualNet 2014/05/ 尉遲仲涵. Outline Directory Structure QualNet Basic Message & Event QualNet simulation architecture Protocol Model Programming.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
1 Chapter06 Mobile IP. 2 Outline What is the problem at the routing layer when Internet hosts move?! Can the problem be solved? What is the standard solution?
These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Presented by Xiaoyu Qin Virtualized Access Control & Firewall Virtualization.
Defense by Amit Saha March 25 th, 2004, Rice University ANTS : A Toolkit for Building and Dynamically Deploying Network Protocols David Wetherall, John.
Programmable Networks: Active Networks + SDN. How to Introduce new services Overlays: user can introduce what-ever – Ignores physical network  perf overhead.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
PR SM A Secure Code Deployment Scheme for Active Networks Amdjed Mokhtari Leïla Kloul 22 November 2005.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Other Security Issues Multi-Layer Security Firewalls Total Security Intrusion Detection Trust.
Firewall Security.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
The Intranet.
Multimedia & Mobile Communications Lab.
A Survey of Active Network Research By:Tennehouse,Smith,Sincoskie,Wettherall,Minden Presented By:Prashant, Ravikiran, Ashutosh.
How to use DNS during the evolution of ICN? Zhiwei Yan.
Introduction to Active Network Technology Bernhard Plattner Computer Engineering and Networks Laboratory ETH Zurich, Switzerland.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Security fundamentals Topic 10 Securing the network perimeter.
15-744: Computer Networking L-19 Active Networks.
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
A Scalable High-Performance Active Network Node Dan S. Decasper and Bernhard Plattner, EETH Zurich Guru M. Parulkar, Sumi Chai, John D. Dehart, and Tilman.
Networking (Cont’d). Congestion Control l Is achieved by informing nodes along a route that congestion has occurred and asking them to reduce their packet.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Active Networks Jennifer Rexford. Nice Quotation from the Tennenhouse Paper There is presently a disconnect between what users consider to be “inside”
Mobility With IP, implicit assumption that there is no mobility. Addresses -- network part, host part -- so routers determine how to get to correct network.
I3 and Active Networks Supplemental slides Aditya Akella 03/23/2007.
Security fundamentals
Authors: Jiang Xie, Ian F. Akyildiz
Introduction Wireless devices offering IP connectivity
The Intranet.
SwitchWare Active Network Architecture
Mobile IP.
Cellular IP: A New Approach to Internet Host Mobility
Zueyong Zhu† and J. William Atwood‡
Computer Data Security & Privacy
Prepared By : Pina Chhatrala
ANTS Goals Today’s networks lack flexibility …
Programming with ANTS ANTS facilitates protocols construction and deployment Demonstrate some examples using Mobility services Multicasting.
EA C451 Vishal Gupta.
Internet Networking recitation #4
2018 Huawei H Real Questions Killtest
COS 561: Advanced Computer Networks
The Active Node Transfer System By Chris McAnally & Manu Mittal
JINI ICS 243F- Distributed Systems Middleware, Spring 2001
Calypso Service Architecture
Requirements of Computing in Network
Presentation transcript:

Author : David Wetherall Presented By : Gokul Nadathur

Active Networks : Visions and Reality2 Tour Guide... zIntroduction zDesign of ANTS zImplementation of ANTS zProtection and resource management issues zWhat’s beyond active networks …

Active Networks : Visions and Reality3 What is an Active Network ? Network architecture that allows : Application Customized Code – Application Customized Code to be dynamically deployed in the network – Code to be Executed in a controlled framework within the network Similar to extensible operating systems (SPIN, Synthesize etc) Packet = Code + data

Active Networks : Visions and Reality4 Server Client Bid Result Client zDynamic deployment of new Internet services zOnline Auctions yClient submits bids yCentral Server processes bids yResponds to requests for current price yDuring high load on server, current price may become invalid by the time it reaches the client Schema for Auction Service Motivation

Active Networks : Visions and Reality5 Auction Service in an Active Network Active Router Client Server Bid Fail Filter Bid zCustomized forwarding routine in active router yif (bid is valid) success else fail yFilters low bids in the network before they reach server zServer periodically updates current prices to active routers zLowers load on server

Active Networks : Visions and Reality6 Apprehensions zSecurity Is it safe yUntrusted user code executing in core routers - Is it safe ? zEfficiency yDynamic code distribution consumes bandwidth yEvery packet now requires additional processing yAuction Service example :- yEvery router has to check if ( user bid > current bid ) yKills packet forwarding performance

Active Networks : Visions and Reality7 ANTS zArchitecture designed to provide extensible network layer service zRouters are active zExtendable at packet level in the form of Capsules zA code distribution scheme

Active Networks : Visions and Reality8 Entities in ANTS zActive Nodes : y Programmable routers connected to IP routers through network channels yMaintain a cache of forwarding code (protocols) and data used by different services yResponsible for secure execution of forwarding code

Active Networks : Visions and Reality9 Capsules zType yIdentifier for the forwarding routine to be executed (carries code by reference) zPrevious address yWhere to get the forwarding routine from if it is not available in the present node (Code Distribution) z Dependent Fields y Parameters for the forwarding code zPayload y Header + data of higher layers IP headerVersionTypePrevious AddressDep fieldsPayload ANTS Header

Active Networks : Visions and Reality10 Example zOnline Auction : zFILTER Capsule : Sent periodically by server to update current bids zBID Capsule : Used by client to submit bid zForwarding Code not found ? zCode provided by end user software zLight weight Code Distribution within the network Server Active Router (Caches Forwarding Code) Client Bid Code Request Code Previous Address field

Active Networks : Visions and Reality11 Code Distribution Extract Type Check in Cache Suspend Execution Fetch code from Previous Addr Receive Response Bootstrap code to cache Wake up Capsule Continue Execution Capsule No Yes Discard on Timeout

Active Networks : Visions and Reality12 Code Distribution (Contd)... zNeed for Bootstrap Capsules to transfer code zWell known type (System Capsules) zDirectory service for selecting protocols zAdvantages yAdapts to packet loss, node failures, changing routes zDisadvantages yHigh Latency of loading can trigger end-system timeouts

Active Networks : Visions and Reality13 Implementation Application Active Node Runtime Soft Store Cached code + data CH 1 CH 2 Capsule User level process in Java Node Runtime : – Schedules and executes capsule instances – Controlled access of soft store using restricted API Channel Class : Creates Capsule instance from IP packet Capsule : Execute custom forwarding routines from cache Node API IP Packet

Active Networks : Visions and Reality14 MD5 fingerprint zType : MD5 fingerprint of forwarding routine code spoofing yPrevents code spoofing yProvides authentication free foundation zJava SandBox yPrevents untrusted code from corrupting node runtime ytype field is defined as constant Firewall yImpossible to create a Firewall yVery Slow ( PLANet - 3 times faster) Protection Schema

Active Networks : Visions and Reality15 Protection Schema... zCode is read-only zData is protected by hashing the store on the type of service to which it belongs

Active Networks : Visions and Reality16 Shared State Protection zR/W sharing of Cached state between related capsule types zAuction Example : yFILTER Capsule sent by server updates current bids yBID Capsule sent by client uses this data to validate its bid zHierarchical Fingerprint for shared state : yComplex Type identifiers for shared state yForwarding routines A and B share state (A,(A, B) H ) H (B,(A, B) H ) H yType identifier for shared state: (A,(A, B) H ) H and (B,(A, B) H ) H (A, B) H yIdentifies a single service (A, B) H to which both A and B belong

Active Networks : Visions and Reality17 Resource Management zUnbounded utilization of yComputing resources (Long forwarding routines) yNetwork Bandwidth ( Flooding child capsules ) zSolutions : yWatchdog timers for breaking long forwarding routines yTTL to limit number of hops yStatic limit on fanouts zApplication floods Network ynetwork based resource allocation

Active Networks : Visions and Reality18 Open Issues zAdministrative Issues y Who can introduce new services ? yHackers Paradise zOpen Research Area : A Killer Application ?

Active Networks : Visions and Reality19 And Beyond And Beyond … zRadio Active Networks yAdaptable Wireless Network Architecture yExtend programmability to physical layer Software Radios Active Networks yUses Software Radios and Active Networks yHigher layers interact with physical layer to observe changing conditions yBased on the change appropriate physical layer is selected zExample : Basestation to mobile system yDynamically create channels according to mobile host population yCreate channels of different priority and QoS