A Survey of Active Network Research By:Tennehouse,Smith,Sincoskie,Wettherall,Minden Presented By:Prashant, Ravikiran, Ashutosh.

Slides:



Advertisements
Similar presentations
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Active Network A Survey of Active Network Research Direction in Active Networks Protocol Boosters : Applying Programmability to Network Interfaces 指導老師.
CS 408 Computer Networks Congestion Control (from Chapter 05)
1 Improving the Performance of Distributed Applications Using Active Networks Mohamed M. Hefeeda 4/28/1999.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Internetworking Fundamentals (Lecture #1) Andres Rengifo Copyright 2008.
CS 268: Active Networks Ion Stoica May 6, 2002 (* Based on David Wheterall presentation from SOSP ’99)
Department of Computer Science, Purdue University Active Networks: Applications, Security, Safety and Architectures Author: Konstantinos Psounis Stanford.
1 Network Management Active Networks. 2 Network Management.
Data Communications Architecture Models. What is a Protocol? For two entities to communicate successfully, they must “speak the same language”. What is.
Tesseract A 4D Network Control Plane
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
Active Networks Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
Copyright 2003 CCNA 1 Chapter 7 TCP/IP Protocol Suite and IP Addressing By Your Name.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Internet Traffic Management Prafull Suryawanshi Roll No - 04IT6008.
1 Content Distribution Networks. 2 Replication Issues Request distribution: how to transparently distribute requests for content among replication servers.
Client/Server Architectures
Network Layer4-1 NAT: Network Address Translation local network (e.g., home network) /24 rest of.
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Exercises for Chapter 3: Networking.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Midterm Review - Network Layers. Computer 1Computer 2 2.
Jennifer Rexford Fall 2010 (TTh 1:30-2:50 in COS 302) COS 561: Advanced Computer Networks Programmable.
Integrated Services (RFC 1633) r Architecture for providing QoS guarantees to individual application sessions r Call setup: a session requiring QoS guarantees.
Chapter 6: Packet Filtering
I T & S A e r o s p a c eD e f e n c e Content adaptation for gradual Quality of Service Vania Conan, Arnaud Pierre Thales
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Web Application Firewall (WAF) RSA ® Conference 2013.
Dynamic Reconfiguration Dynamic selection of handler functionality: currently through use of parameterizable handlers or by selecting from a set of existing.
Active Networks – The Network Future By Samatha Gangapuram Prashant Shanti Kumar Harish Kumar Maringanti.
Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32.
Module 4: Designing Routing and Switching Requirements.
Defense by Amit Saha March 25 th, 2004, Rice University ANTS : A Toolkit for Building and Dynamically Deploying Network Protocols David Wetherall, John.
Information-Centric Networks07a-1 Week 7 / Paper 1 Internet Indirection Infrastructure –Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh.
Management for IP-based Applications Mike Fisher BTexaCT Research
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Distributed Information Systems. Motivation ● To understand the problems that Web services try to solve it is helpful to understand how distributed information.
Doc.: IEEE /0617r0 Submission May 2008 Tony Braskich, MotorolaSlide 1 Refining the Security Architecture Date: Authors:
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Introduction to Active Network Technology Bernhard Plattner Computer Engineering and Networks Laboratory ETH Zurich, Switzerland.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
High-Speed Policy-Based Packet Forwarding Using Efficient Multi-dimensional Range Matching Lakshman and Stiliadis ACM SIGCOMM 98.
Overlay Networks : An Akamai Perspective
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
A Scalable High-Performance Active Network Node Dan S. Decasper and Bernhard Plattner, EETH Zurich Guru M. Parulkar, Sumi Chai, John D. Dehart, and Tilman.
Danilo Florissi, Yechiam Yemini (YY), Sushil da Silva, Hao Huang Columbia University, New York, NY 10027
Intrusion Tolerant Distributed Object Systems Joint IA&S PI Meeting Honolulu, HI July 17-21, 2000 Gregg Tally
Active Networks Jennifer Rexford. Nice Quotation from the Tennenhouse Paper There is presently a disconnect between what users consider to be “inside”
Road to SDN Review the main features of SDN
SwitchWare Active Network Architecture
WWW and HTTP King Fahd University of Petroleum & Minerals
Instructor Materials Chapter 1 Ever Wonder How It Works?
ANTS Goals Today’s networks lack flexibility …
Congestion Control, Internet transport protocols: udp
Design Unit 26 Design a small or home office network
Data Path through host/ANP.
The Active Node Transfer System By Chris McAnally & Manu Mittal
Anup K.Talukdar B.R.Badrinath Arup Acharya
EE 122: Lecture 22 (Overlay Networks)
10th International Conference on Telecommunication, ICT’2003,
Computer Networks Protocols
Presentation transcript:

A Survey of Active Network Research By:Tennehouse,Smith,Sincoskie,Wettherall,Minden Presented By:Prashant, Ravikiran, Ashutosh

Objective Introduction to Active Networks - Motivation - Aims - Impact How to Implement Active Network - Discrete Approach - Integrated Approach Snapshot of current research

Active Network Active network is an approach to network architecture in which the nodes of the network perform customized computations on the message flowing through them. This concept permit applications to inject programs into the nodes of network.

Example : 1)One can load “trace” program to routers and program will be executed then and there when his packets are processed at that router(active).

Origin of Active Networks It is the result of discussion within Defense Advance Research Projects Agency(DARPA) research community in

Motivation for Active Network Difficulty of Integrating new technologies and Standards. Poor performance because of redundant operations at several protocol layers. Problems in accommodating new services.

Existing Applications : Many application use a sort of Active Network approach to handle current network related problems. e.g. Firewall Web Proxies Nomadic Routers Application Services

Technology Advancement: Recent advances in programming languages, compiler, and operating systems provides the safe and efficient execution of mobile programs.

Aim of Active Network: Programmable nodes. Standard execution environment No Standard functions

Impact of Active Networking Accelerating infrastructure innovation A new technology from prototype demonstration to large scale deployment takes about 10 years.Current backlog are:. RSVP. IPv6. Multicast services But Active networks eliminate the need for formal standardization.

Enabling new technologies Merging and Distribution of information

N sources sending signals to M destinations. End nodes does all of its mixing,work With Active networks, work

Stock Quotes: At present generally web caches do not cache the stock quotes because of its dynamic nature and even if it caches, the granularity of the object(entire web page) is inappropriate. Active networks can cache quotes at network nodes using a per-stock name granularity.So, all client request can be fulfilled with specified degree of currency

Online Auctions: Servers responds to the current price requests but due to delay in the network the information carried by the packet may become outdated when it reach the client. Then, the auction server will receive bids that are too low and need to be rejected and this imposes overhead on the heavily busy server. With active networks these bids can be filtered out before they reach the server. So the response time of bid rejection to the client and server processing overhead is reduced.

User Aware Network Protection Active network may admit the design of integrated mechanism to govern network resources and information flowing through them. So, program in Network security policy for the network on a per- user or per-use basis is allowed.

Active Network Management Active technologies could be used to implement sophisticated approaches to do network monitoring and uninteresting event filtering.

Rethinking Performance Despite increasing the amount of processing at nodes, Active network will lead to improved performance. i.e. Reduced throughput and increasing latency appear to degrade the performance, they may actually improve performance because of reduce demand of bandwidth at endpoints, network congestion. Network performance is not always positively related to the Application performance.

Caching in the memory as in the stock quote example can reduce latency of data access when the server is busy. When network nodes in the auction application reject low bids, they inform the “losing” end nodes than could the overloaded (and farther away) server.

Performance also depends on the location where the active node is deployed. In the sensor fusion example, the greatest decrease in bandwidth utilization occurs when the splitting of multicast streams is performed as late as possible and mixing as early as possible In stock quote example, it is important to place the caches where they will serve the large number of client request. In online auction,filter should be far enough from the server to turn back low bids asap, but close enough to the server to get proper up-to date price.

Approaches to implement the Active Network Programmable Switches- A discrete approach: User would first inject their custom processing routines into the required routers. Then they would send there packets through such “programmable” nodes. When the packet arrives at the node its header is examined and the appropriate program is executed.

Capsules-An Integrated Approach: In this approach ‘program’ is integrated in the packet along with the data. When these capsule arrive at the active nodes then it interprets the program and sends the embedded data depending on its interpretation. This is same to the Postscript code, where actual data is embedded in program fragments that the printer understands.

Active IP: Active option is in the payload of the packet, the legacy router can route the packet transparently to active node where the ACTIVE Option code will be evaluated and executed.

Common Programming model Program Encoding:Our objectives of program encoding are that they support Mobility-transfer programs and to execute them on different platforms Safety-restrict resources that program can access Efficiency-enabling above without compromising network performance.

Mobility can be achieved at different level of program representation. Source level- Use of scripting language say TCL. Intermediate level- Use of Byte code virtual instruction say in JAVA. Object level- Use binary formats as in Omniware.

Common Primitives: The services built into each node might include several categories of operations: primitives that provide access to the node’s environment (e.g node address, time of day and so on). Node resources and their allocation: There must be a common model of node resources like bandwidth, processing capacity and the means by which policies governing their allocation are communicated.Safe resource allocation is a considerable research area.

Current research The goal of research is to develop: Languages and compiler for “active” software. Platforms for deploying Active Network nodes. Architecture for capsule and programmable switches Safe resource allocation schemes.

Massachusetts Institute of Technology-This team is prototyping an architecture based on the capsule approach and studying “active storage”, NACK fusion and filtering.Demand loading is also a concern. University of Pennsylvania-The “Switch Ware” project proposes a switch, which has a programmable element performing switching function. Bell Communication Research- Several aspects of the Penn design will be studied jointly with Bellcore using different infrastructure OPCV2.

Columbia University-Netscript architecture which uses encapsulation approach along with scripting language is developed. Carnegie Mellon University-It is developing resource management mechanism in support of “application aware” networks. Other Sites-University of Arizona, Georgia institute of technology, University of Kansas, BBN, University of Cincinnati.