Active networks: Applications, security, safety, and architectures

Active networks represent a new approach to network architecture. Routers can perform computations on user data, while packets can carry programs to be executed on routers and possibly change their state. Currently, the research community is divided concerning the usefulness of active networks. On the one hand, active networks provide a much more flexible network infrastructure, with increased capabilities. On the other hand, they are obviously more complex than traditional networks and raise considerable security issues. The purpose of this article is to provide a broad survey on active networks. The first goal is to highlight their efficiency in a variety of applications. After presenting some key points on each application, we discuss some current experimental technologies and assess the usefulness of active networks in congestion control, multicasting, caching, and network management. The second goal is to address the security issues that active networks raise: the problem is defined, and techniques for solving it are presented and elaborated upon with a description of a specific implementation of a secure environment and related performance measures. Issues related to the design of a programming language for active networks are also discussed. The third goal is to classify active network architectures based on their design approach. Thus an inclusive presentation of currently proposed architectures, which focuses on their design attributes, capabilities, performance, and security, is given.

[1]  Ellen W. Zegura,et al.  Self-organizing wide-area network caches , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[2]  George C. Necula,et al.  Proof-carrying code , 1997, POPL '97.

[3]  Ahmed Karmouch,et al.  Mobile software agents: an overview , 1998, IEEE Commun. Mag..

[4]  Ellen W. Zegura,et al.  An architecture for active networking , 1997, HPN.

[5]  R. D. Rockwell,et al.  Smart Packets for active networks , 1999, 1999 IEEE Second Conference on Open Architectures and Network Programming. Proceedings. OPENARCH '99 (Cat. No.99EX252).

[6]  Carl A. Gunter,et al.  PLAN: a packet language for active networks , 1998, ICFP '98.

[7]  Craig Partridge,et al.  Host Anycasting Service , 1993, RFC.

[8]  George Pavlou,et al.  Active Objects in TMN , 1997, Integrated Network Management.

[9]  Angelos D. Keromytis,et al.  Automated Recovery in a Secure Bootstrap Process , 1998, NDSS.

[10]  G.J. Minden,et al.  A survey of active network research , 1997, IEEE Communications Magazine.

[11]  Bernhard Plattner,et al.  DAN: distributed code caching for active networks , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[12]  J. C. Byington,et al.  Mobile agents and security , 1998, IEEE Commun. Mag..

[13]  William A. Arbaugh,et al.  The SwitchWare active network architecture , 1998, IEEE Netw..

[14]  David L. Tennenhouse,et al.  Toward an active network architecture , 1996, Electronic Imaging.

[15]  David Wetherall,et al.  Active pages: Intelligent nodes on the World Wide Web , 1994, WWW Spring 1994.

[16]  Y. Yemini,et al.  Delegated agents for network management , 1998, IEEE Commun. Mag..

[17]  Joseph B. Evans,et al.  An Active Network Architecture for ATM WANS , 1997 .

[18]  David L. Tennenhouse,et al.  The ACTIVE IP option , 1996, EW 7.

[19]  Peter Steenkiste,et al.  Darwin: customizable resource management for value-added network services , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).

[20]  Angelos D. Keromytis,et al.  A Secure Active Network Environment Architecture , 1997 .

[21]  Marianne Shaw,et al.  Active bridging , 1997, SIGCOMM '97.

[22]  John V. Guttag,et al.  ANTS: a toolkit for building and dynamically deploying network protocols , 1998, 1998 IEEE Open Architectures and Network Programming.

[23]  Alden W. Jackson,et al.  Commentaries on "Active networking and end-to-end arguments" , 1998, IEEE Netw..

[24]  Christian F. Tschudin,et al.  Towards mobile cryptography , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[25]  Stephen J. Garland,et al.  Active reliable multicast , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[26]  David Wetherall,et al.  Improving the performance of distributed applications using active networks , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[27]  Ellen W. Zegura,et al.  Active networking and the end-to-end argument , 1997, Proceedings 1997 International Conference on Network Protocols.

[28]  Wolfgang Effelsberg,et al.  Multicasting multimedia streams with active networks , 1998, Proceedings 23rd Annual Conference on Local Computer Networks. LCN'98 (Cat. No.98TB100260).