Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Commercially viable active networking

Published: 01 January 2002 Publication History

Abstract

Active Networking is a new technology receiving significant attention from the research community. To this point, however, it has not been examined from the perspective of commercial viability. This paper presents an analysis of active networking issues with a view to its possible uses in a commercial environment. It then describes a prototype system built to address these issues.

References

[1]
D. Scott Alexander, "ALLEN: A generalized computing model of active networks," PhD Thesis, University of Pennsylvania, Philadelphia, December 1998.
[2]
D.S. Alexander, R. Braden, C.A. Gunter, A.W. Jackson, A.D. Keromytis, G.J. Minden, D. Wetherall, "Active Network Encapsulation Protocol (ANEP)," http://www.cis.upenn.edu/~switchware/ANEP, August 1997.
[3]
D.S. Alexander, Jonathan M. Smith, "The architecture of ALIEN," Proceedings of the First International Working Conference, IWAN '99, Berlin, Germany, June/July, 1999, (also appears as Lecture Notes in Computer Science 1653, Springer-Verlag, Berlin).
[4]
Samrat Bhattacharjee, Kenneth J. Calvert, Ellen W. Zegura, "Implementation of an active networking architecture," presented at the Gigabit Switch Technology Workshop, Washington University, St. Louis, July, 1996.
[5]
D. Brent Chapman, "Network (in)security through IP packet filtering," Proceedings of the Third USENIX UNIX Security Symposium, Baltimore, MD., Sept. 1992. 1996.
[6]
Li Gong and Roland Schemers, "Implementing protection domains in the Java development kit 1.2," Proceedings ISOC Symposium on Network and Distributed System Security, San Diego, CA., 1998.
[7]
J. Hartman, U. Manber, L. Peterson, T. Proebsting, "Liquid Software: A new paradigm for networked systems," Technical Report 96-11, Department of Computer Science, University of Arizona, June 1996.
[8]
R. Jaeger, S. Bhattacharjee, J. K. Hollingsworth, R. Duncan, T. Lavarian and F. Travostino, "Integrating active networking and commercial grade routing platforms," Proceedings of the USENIX Special Workshop on Intelligence at the Network Edge, March 20, 2000, San Francisco, CA.
[9]
Anita Jones, "Protection in programmed systems," Ph.D. Thesis, Carnegie-Mellon University, Pittsburg, Pennsylvania, June, 1973.
[10]
P. Menage, "RCANE: A resource controlled framework for active network services," Proceedings of the First International Working Conference, IWAN '99, Berlin, Germany, June/July, 1999, (also appears as Lecture Notes in Computer Science 1653, Springer-Verlag, Berlin).
[11]
Dan Nessett, "Commercial use of active networking," presented at the OpenSIG Workshop, University of Toronto, October 5--6, 1998.
[12]
Dan Nessett and Polar Humenn, "The Multilayer Firewall," Proceedings ISOC Symposium on Network and Distributed System Security, San Diego, CA., 1998.
[13]
L. Peterson, ed., "NodeOS interface specification," AN NodeOS Working Group Draft, July 1999.
[14]
D. Raz, Y. Shavitt, "An active network approach to efficient network management," Proceedings of the First International Working Conference, IWAN '99, Berlin, Germany, June/July, 1999, (also appears as Lecture Notes in Computer Science 1653, Springer-Verlag, Berlin).
[15]
B. Schwartz, W. Zhou, A.W. Jackson, W.T. Strayer, D. Rockwell, C. Partridge, "Smart packets for active networks," 2nd IEEE OPENARCH, 1999.
[16]
D.L. Tennenhouse, J.M. Smith, W.D. Sincoskie, D.J. Wetherall, and G.J. Minden, "A survey of active networking research," IEEE Communications Magazine, Jan., 1997.
[17]
D.J. Wetherall, J.V. Guttag, D.L. Tennenhouse, "ANTS: A toolkit for building and dynamically deploying network protocols," IEEE OPENARCH '98, San Francisco, CA, April 1998.

Cited By

View all
  • (2005)Towards the Safe Use of Dynamically Transformed Itinerant SoftwareMILCOM 2005 - 2005 IEEE Military Communications Conference10.1109/MILCOM.2005.1605697(1-7)Online publication date: 2005
  • (2004)A cooperative agent-based model for active security systemsJournal of Network and Computer Applications10.1016/j.jnca.2004.02.00227:4(201-220)Online publication date: 1-Nov-2004

Index Terms

  1. Commercially viable active networking

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM SIGOPS Operating Systems Review
      ACM SIGOPS Operating Systems Review  Volume 36, Issue 1
      January 2002
      89 pages
      ISSN:0163-5980
      DOI:10.1145/844166
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 01 January 2002
      Published in SIGOPS Volume 36, Issue 1

      Check for updates

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 16 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2005)Towards the Safe Use of Dynamically Transformed Itinerant SoftwareMILCOM 2005 - 2005 IEEE Military Communications Conference10.1109/MILCOM.2005.1605697(1-7)Online publication date: 2005
      • (2004)A cooperative agent-based model for active security systemsJournal of Network and Computer Applications10.1016/j.jnca.2004.02.00227:4(201-220)Online publication date: 1-Nov-2004

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media