Active Networks – The Network Future By Samatha Gangapuram Prashant Shanti Kumar Harish Kumar Maringanti.

Slides:



Advertisements
Similar presentations
NetServ Dynamic in-network service deployment Henning Schulzrinne (Columbia University) Srinivasan Seetharaman (Georgia Tech) Volker Hilt (Bell Labs)
Advertisements

Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
SDN and Openflow.
1 Improving the Performance of Distributed Applications Using Active Networks Mohamed M. Hefeeda 4/28/1999.
8.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Resource Management – a Solution for Providing QoS over IP Tudor Dumitraş, Frances Jen-Fung Ning and Humayun Latif.
CS 268: Active Networks Ion Stoica May 6, 2002 (* Based on David Wheterall presentation from SOSP ’99)
Department of Computer Science, Purdue University Active Networks: Applications, Security, Safety and Architectures Author: Konstantinos Psounis Stanford.
1 Network Management Active Networks. 2 Network Management.
Rob Jaeger, University of Maryland, Department of Computer Science 1 Active Networking “ The active network provides a platform on which network services.
Multimedia Applications r Multimedia requirements r Streaming r Phone over IP r Recovering from Jitter and Loss r RTP r Diff-serv, Int-serv, RSVP.
Course Review i206 Fall 2010 John Chuang. 2 Outline  Test 3 topics  Course review  Course evaluation.
Research Gísli Hjálmtýsson - AT&T Research - 1 Programmable Networks of Tomorrow (Pronto): The Programmable Interface of Pronto.
CIS679: RTP and RTCP r Review of Last Lecture r Streaming from Web Server r RTP and RTCP.
Active Network Applications Tom Anderson University of Washington.
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Chapter Two Application Layer Prepared by: Dr. Bahjat Qazzaz CS Dept. Sept
Protocols and the TCP/IP Suite
M3UA Patrick Sharp.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
1 Liquid Software Larry Peterson Princeton University John Hartman University of Arizona
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Defense by Amit Saha March 25 th, 2004, Rice University ANTS : A Toolkit for Building and Dynamically Deploying Network Protocols David Wetherall, John.
Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 17 This presentation © 2004, MacAvon Media Productions Multimedia and Networks.
Fundamentals of Computer Networks ECE 478/578 Lecture #19: Transport Layer Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Management for IP-based Applications Mike Fisher BTexaCT Research
1 Mobile Networks logica Contents Confidential & Proprietary to Logica © 2001 Application-Level Active Networks Presented at Dublin Breakfast Briefing,
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
A Survey of Active Network Research By:Tennehouse,Smith,Sincoskie,Wettherall,Minden Presented By:Prashant, Ravikiran, Ashutosh.
Operating System Principles And Multitasking
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
July 12th 1999Kits Workshop 1 Active Networking at Washington University Dan Decasper.
IWAN2005:L. Sacks 1 On the manipulation of JPEG2000, in-flight, using active components on next generation satellites ` UCL –Peter Kirstein –Saleem Bhatti.
Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 17 This presentation © 2004, MacAvon Media Productions Multimedia and Networks.
End-to-End Principle Brad Karp UCL Computer Science CS 6007/GC15/GA07 25 th February, 2009.
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
A Scalable High-Performance Active Network Node Dan S. Decasper and Bernhard Plattner, EETH Zurich Guru M. Parulkar, Sumi Chai, John D. Dehart, and Tilman.
Copyright 2002 Stephen F. Bush1 Three Points to Remember Active Networks Are Cool Active Networks Are Cool Active Networks Can Be At Least As Secure As.
Anetd and the Abone SRI International Livio Ricciulli.
K. Salah1 Security Protocols in the Internet IPSec.
Active Networks Jennifer Rexford. Nice Quotation from the Tennenhouse Paper There is presently a disconnect between what users consider to be “inside”
Multimedia Communication Systems Techniques, Standards, and Networks Chapter 4 Distributed Multimedia Systems.
Fault – Tolerant Distributed Multimedia Streaming Web Application By Nirvan Sagar – Srishti Ganjoo – Syed Shahbaaz Safir
CompTIA Security+ Study Guide (SY0-401)
SwitchWare Active Network Architecture
Distributed Systems.
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
CHAPTER 3 Architectures for Distributed Systems
CompTIA Security+ Study Guide (SY0-401)
Chapter 2 Introduction Application Requirements VS. Transport Services
Multimedia and Networks
Network Core and QoS.
Active Networking at Washington Univ.
The Active Node Transfer System By Chris McAnally & Manu Mittal
System Models and Networking Chapter 2,3
Cloud-Enabling Technology
CSE 542: Operating Systems
CSE 542: Operating Systems
Network Basics and Architectures Neil Tang 09/05/2008
Network Core and QoS.
Presentation transcript:

Active Networks – The Network Future By Samatha Gangapuram Prashant Shanti Kumar Harish Kumar Maringanti

Assigned Unenviable task  What  Why  How  Where

Active Networks – What ? No general agreement beyond buzz phrases. “Active networks explore the idea of allowing routing elements to be extensively programmed by the packets passing through them.”

Legacy Vs Active Legacy Networks  Passive packet.  Rely on agreement about protocols.  Functionality built into each router.  Change is a long and wrenching process. Active Networks  Active Packet.  General agreement on model of computation.  Functionality in each packet.  Improved resilience to change.

AN - Services

Active Networks – Why ?  Rapid deployment and development.  Creating and Tailoring network services.  Better performance.  Open to deploy and administer.

Active Networks – How ? AN Paradigms  Programmable Switch Model  Capsule Model  Ad – hoc Model

Active Networks – How ? Programmable Switch :  Code is first transferred to the nodes, out – of – band.  Packets are treated as data or input to the code.

Active Networks – How ? Capsule Model :  Each packet is a program.  Each intermediate node executes the packet.

Active Networks – How ? Ad – hoc Model :  Packet contains flags.  Node contains in-built routines.  Based on flag, routines are executed.

A N - Terminologies  User Application (UA)  Active Application (AA)  Execution Environment (EE)  Node Operating System (NodeOS)

 The NodeOS is the base layer of any AN architecture.  It manages the resources of the active node and co-ordinates the resource demands.  NodeOS is also responsible for the enforcement of security policies. Examples SANE OS, JANOS, SCOUT, ExoKernel NodeOS

E E Nerve Center of the Active Node  Responsible for all aspects of user-network interface.  Nature of programming model and abstractions supported.  Addressing and Naming facilities. Examples SmartPackets, ANTS, CANE

A A  AA is a program and associated state capable of executing one or more active activities in a node, to perform some particular service.  AA is necessarily “portable” and dynamically installable or removable. Examples Active Reliable Multicasts, Protocol Boosters, Active Congestion Control.

A N - Architecture App 1App 2App 3App 1App 4App 3 Execution Environment A Execution Environment B Execution Environment A Execution Environment B Node OS Transmission Facilities

Packet Transition EE 3 EE 1 EE 2 ANEPIP ANEPIPUDP IP TCP IP UDPANEP I PUDP I P TCP I P ANEP

Implementation Challenges  The network should be usable  The network should have high flexibility  The implementation should be secure  The network should have high performance

Killer Arguments  Efficiency  Resource Allocation  Security

Efficiency Hiccups:  Bandwidth demand is growing faster than CPU speed – bad idea to execute arbitrary programs on packets.  Most programming languages are interpreted – JAVA byte code, plain interpreter. Cure:  Don’t propose AN for the core of the Internet.  Use just-in-time compilation, native code.  Hybrid architectures (high speed AN!)

Resource Allocation Hiccups:  Fairness in queuing is a problem.  Cannot guarantee QoS.  Cannot control Looping packets. Cure:  Provide distributed control (Scaling).  resource reservation in advance, resource preemption.  Limit capabilities of the active packet.

Security  Security cannot be limited to peripheral nodes.  Possible threats: Overload based Denial of Service Unauthorized access to the exposed control plane.  Secure Node doesn’t mean Secure Network.

Security at NodeOS  Security Enforcement through Authorizations.  Authorization policies are expressed in terms of Access Control Lists, which is a logical 3 - tuple of the form :  NodeOS has a security policy database and a policy enforcement engine.

Security at EE  Each EE has it's own protection policy, possibly a security database and an enforcement engine.  The programming model that an EE supports must also be restricted to ensure network security.  No broad consensus on the division of responsibility for policy enforcement between the NodeOS and the EE.

Security in SwitchWare  Uses ALIEN active loader.  Code Modules loaded on the fly.  Restricts access using namespaces.  Uses a language specification called CAML.

AN – APPLICATIONS  Network Management  Multicasting  Caching  Active Congestion Control  Security

Network Management  No polling required  "Patrol" and "first-aid" packets can track a problem and rectify it respectively.  Code moved to node rather than data to management center Example:Delegated Management. Decentralization helps in scalability, reducing delays from responses and effective bandwidth utilization.

Multicasting Active internal nodes elegantly solve many current problems such as:  NACK implosion.  Concentrated load of retransmissions.  Duplication of packets. Example: ARM Suppression of NACK & effective retransmission

Active Congestion Control  Selective dropping of units, packets or cells can be held very efficiently.  Multi-stream interaction. Example: APCI Backward compatibility with non-active nodes & on the fly routing employed.

Caching  Tradeoff between network based storage & bandwidth.  Location & time of storage crucial. Example: Self-organizing wide-Area Network caches: small number of caches within routers form large virtual cache.

Security  Node – Packet conflict.  Node security by authentication of active packets & PCC(Proof Correct Code).  Packet security by Fault-tolerance & Encryption. Example:SANE

AN - Services  Video on Demand  VPN  Multimedia Conferencing  VoIP / IP Telephony  Active Firewalling

AN - Services Web Browser Web Cache Web Server Proxylet Server Dynamic Proxy Server WebCache Proxylet Request Response Dynamic Proxy Server Audio Transcoder Remote Method Invocation Call Request Audio Response Proxylet Request Proxylet Response Audio File Request Audio File Response RTP Streamed Audio New Content-type or Redirection Header

“Retrofitting" AN to IP The Active IP Option:  Option in the IP header alerts the router to look at the packet payload more closely. Active Network Encapsulation Protocol (ANEP):  Adds a header that directs the router.

AN & Legacy

SmartPackets – A Case Study Uses Capsule model: Code with IP packet  Programs must be completely self-contained.  Operating environment provides security. Languages: Sprocket – A high level language Spanner – An assembly level language

SmartPackets – A Case Study Uses ANEP to fit with Legacy Networks NodeOs – JanOs EE – CANES/ASP AA - Network Management

SmartPackets – A Case Study Network Management Defines 4 types of packets:  Program  Data  Error  Message

SmartPackets – A Case Study Security For Nodes:  Authentication of packet  Cryptographic hash of non-mutable fields For packets:  Redirection  Encryption

SmartPackets – A Case Study Limitations  Packet size  Applications adaptability Scope Extending for other applications

Current Work  Active Nets at DARPA Active Nets  ActiveNets at MIT ActiveNets  ANTS at Washington ANTS  SwitchWare at UPenn SwitchWare  JANOS & OSkit at Utah JANOS & OSkit  Liquid Software at Arizona Liquid Software  Panda at UCLA Panda  NetScript at Columbia NetScript  CANES at Georgia Tech CANES  Smart Packets at BBN Smart Packets

Conclusion Is Active Network really the future ?

References Darpa Switchware CANES