1 / 42

Active Networks – The Network Future

Active Networks – The Network Future. By Samatha Gangapuram Prashant Shanti Kumar Harish Kumar Maringanti. Assigned Unenviable task. What Why How Where. Active Networks – What ?. No general agreement beyond buzz phrases.

andres
Télécharger la présentation

Active Networks – The Network Future

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Active Networks – The Network Future By Samatha Gangapuram Prashant Shanti Kumar Harish Kumar Maringanti

  2. Assigned Unenviable task • What • Why • How • Where

  3. Active Networks – What ? No general agreement beyond buzz phrases. “Active networks explore the idea of allowing routing elements to be extensively programmed by the packets passing through them.”

  4. Legacy Networks Passive packet. Rely on agreement about protocols. Functionality built into each router. Change is a long and wrenching process. Active Networks Active Packet. General agreement on model of computation. Functionality in each packet. Improved resilience to change. Legacy Vs Active

  5. AN - Services

  6. Active Networks – Why ? • Rapid deployment and development. • Creating and Tailoring network services. • Better performance. • Open to deploy and administer.

  7. Active Networks – How ? AN Paradigms • Programmable Switch Model • Capsule Model • Ad – hoc Model

  8. Programmable Switch : Code is first transferred to the nodes, out – of – band. Packets are treated as data or input to the code. Active Networks – How ?

  9. Capsule Model : Each packet is a program. Each intermediate node executes the packet. Active Networks – How ?

  10. Ad – hoc Model : Packet contains flags. Node contains in-built routines. Based on flag, routines are executed. Active Networks – How ?

  11. A N - Terminologies • User Application (UA) • Active Application (AA) • Execution Environment (EE) • Node Operating System (NodeOS)

  12. NodeOS • The NodeOS is the base layer of any AN architecture. • It manages the resources of the active node and co-ordinates the resource demands. • NodeOS is also responsible for the enforcement of security policies. Examples SANE OS, JANOS, SCOUT, ExoKernel

  13. E E Nerve Center of the Active Node • Responsible for all aspects of user-network interface. • Nature of programming model and abstractions supported. • Addressing and Naming facilities. Examples SmartPackets, ANTS, CANE

  14. A A • AA is a program and associated state capable of executing one or more active activities in a node, to perform some particular service. • AA is necessarily “portable” and dynamically installable or removable. Examples Active Reliable Multicasts, Protocol Boosters, Active Congestion Control.

  15. Execution Environment A Execution Environment A Execution Environment B Execution Environment B A N - Architecture App 1 App 2 App 3 App 1 App 4 App 3 Node OS Node OS Transmission Facilities

  16. I P UDP ANEP EE 1 ANEP UDP IP UDP IP I P UDP I P I P EE 2 I P ANEP ANEP IP I P I P EE 3 I P TCP TCP IP Packet Transition

  17. Implementation Challenges • The network should be usable • The network should have high flexibility • The implementation should be secure • The network should have high performance

  18. Killer Arguments • Efficiency • Resource Allocation • Security

  19. Efficiency Hiccups: • Bandwidth demand is growing faster than CPU speed – bad idea to execute arbitrary programs on packets. • Most programming languages are interpreted – JAVA byte code, plain interpreter. Cure: • Don’t propose AN for the core of the Internet. • Use just-in-time compilation, native code. • Hybrid architectures (high speed AN!)

  20. Resource Allocation Hiccups: • Fairness in queuing is a problem. • Cannot guarantee QoS. • Cannot control Looping packets. Cure: • Provide distributed control (Scaling). • resource reservation in advance, resource preemption. • Limit capabilities of the active packet.

  21. Security • Security cannot be limited to peripheral nodes. • Possible threats: Overload based Denial of Service Unauthorized access to the exposed control plane. • Secure Node doesn’t mean Secure Network.

  22. Security at NodeOS • Security Enforcement through Authorizations. • Authorization policies are expressed in terms of Access Control Lists, which is a logical 3 - tuple of the form : <resource, user, permissions> • NodeOS has a security policy database and a policy enforcement engine.

  23. Security at EE • Each EE has it's own protection policy, possibly a security database and an enforcement engine. • The programming model that an EE supports must also be restricted to ensure network security. • No broad consensus on the division of responsibility for policy enforcement between the NodeOS and the EE.

  24. Security in SwitchWare • Uses ALIEN active loader. • Code Modules loaded on the fly. • Restricts access using namespaces. • Uses a language specification called CAML.

  25. AN – APPLICATIONS • Network Management • Multicasting • Caching • Active Congestion Control • Security

  26. Network Management • No polling required • "Patrol" and "first-aid" packets can track a problem and rectify it respectively. • Code moved to node rather than data to management center Example:Delegated Management. Decentralization helps in scalability, reducing delays from responses and effective bandwidth utilization.

  27. Multicasting Active internal nodes elegantly solve many current problems such as: • NACK implosion. • Concentrated load of retransmissions. • Duplication of packets. Example: ARM Suppression of NACK & effective retransmission

  28. Active Congestion Control • Selective dropping of units, packets or cells can be held very efficiently. • Multi-stream interaction. Example: APCI Backward compatibility with non-active nodes & on the fly routing employed.

  29. Caching • Tradeoff between network based storage & bandwidth. • Location & time of storage crucial. Example: Self-organizing wide-Area Network caches: small number of caches within routers form large virtual cache.

  30. Security • Node – Packet conflict. • Node security by authentication of active packets & PCC(Proof Correct Code). • Packet security by Fault-tolerance & Encryption. Example:SANE

  31. AN - Services • Video on Demand • VPN • Multimedia Conferencing • VoIP / IP Telephony • Active Firewalling

  32. Dynamic Proxy Server Remote Method Invocation Call New Content-type or Redirection Header WebCache Proxylet Request RTP Streamed Audio Audio File Response Audio Response Proxylet Response Request Proxylet Request AudioFile Request Web Browser Request Response Web Cache Web Server Proxylet Server AN - Services Dynamic Proxy Server Audio Transcoder

  33. “Retrofitting" AN to IP The Active IP Option: • Option in the IP header alerts the router to look at the packet payload more closely. Active Network Encapsulation Protocol (ANEP): • Adds a header that directs the router.

  34. AN & Legacy

  35. SmartPackets – A Case Study Uses Capsule model: Code with IP packet • Programs must be completely self-contained. • Operating environment provides security. Languages: Sprocket – A high level language Spanner – An assembly level language

  36. SmartPackets – A Case Study Uses ANEP to fit with Legacy Networks NodeOs – JanOs EE – CANES/ASP AA - Network Management

  37. SmartPackets – A Case Study Network Management Defines 4 types of packets: • Program • Data • Error • Message

  38. SmartPackets – A Case Study Security For Nodes: • Authentication of packet • Cryptographic hash of non-mutable fields For packets: • Redirection • Encryption

  39. SmartPackets – A Case Study Limitations • Packet size • Applications adaptability Scope Extending for other applications

  40. Current Work • Active Nets at DARPA • ActiveNets at MIT • ANTS at Washington • SwitchWare at UPenn • JANOS & OSkit at Utah • Liquid Software at Arizona • Panda at UCLA • NetScript at Columbia • CANES at Georgia Tech • Smart Packets at BBN

  41. Conclusion Is Active Network really the future ?

  42. References Darpa http://www.darpa.mil/ito/psum1999/J044-0.html Switchware http://www.cis.upenn.edu/~switchware/ CANES http://www.cc.gatech.edu/projects/canes/ www.ieee.org www.citeseer.com

More Related