Towards an active network architecture

Active networks allow their users to inject customized programs into the nodes of the network. An extreme case, in which we are most interested, replaces packets with "capsules" - program fragments that are executed at each network router/switch they traverse.Active architectures permit a massive increase in the sophistication of the computation that is performed within the network. They will enable new applications, especially those based on application-specific multicast, information fusion, and other services that leverage network-based computation and storage. Furthermore, they will accelerate the pace of innovation by decoupling network services from the underlying hardware and allowing new services to be loaded into the infrastructure on demand.In this paper, we describe our vision of an active network architecture, outline our approach to its design, and survey the technologies that can be brought to bear on its implementation. We propose that the research community mount a joint effort to develop and deploy a wide area ActiveNet.

[1]  K.M. Adams,et al.  Packet reassembly during cell loss , 1993, IEEE Network.

[2]  Colusa Software White Paper Omniware: A Universal Substrate for Mobile Code , 1995 .

[3]  Proceedings of the 1988 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 18-21, 1988 , 1988, IEEE Symposium on Security and Privacy.

[4]  Margo I. Seltzer,et al.  The case for geographical push-caching , 1995, Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V).

[5]  Alexandros Eleftheriadis,et al.  Constrained and general dynamic rate shaping of compressed digital video , 1995, Proceedings., International Conference on Image Processing.

[6]  Larry L. Peterson,et al.  Scout: a communications-oriented operating system , 1995, Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V).

[7]  Brian N. Bershad,et al.  Extensibility safety and performance in the SPIN operating system , 1995, SOSP.

[8]  Maurice V. Wilkes,et al.  The Cambridge CAP computer and its operating system (Operating and programming systems series) , 1979 .

[9]  Matt Blaze,et al.  Dynamic hierarchical caching in large-scale distributed file systems , 1992, [1992] Proceedings of the 12th International Conference on Distributed Computing Systems.

[10]  Dawson R. Engler,et al.  C: a language for high-level, efficient, and machine-independent dynamic code generation , 1995, POPL '96.

[11]  Dawson R. Engler,et al.  Exokernel: an operating system architecture for application-level resource management , 1995, SOSP.

[12]  Huifang Sun,et al.  Architectures for MPEG compressed bitstream scaling , 1995, Proceedings., International Conference on Image Processing.

[13]  N. Georganas,et al.  Analysis of an Atm Buuer with Self-similar("fractal") Input Traac , 1995 .

[14]  Leonard Kleinrock,et al.  Nomadic computing (keynote address) , 1997, Telecommun. Syst..

[15]  Robert Wahbe,et al.  Efficient software-based fault isolation , 1994, SOSP '93.

[16]  Butler W. Lampson,et al.  Virtual Infrastructure: Putting Information Infrastructure on the Technology Curve , 1996, Comput. Networks ISDN Syst..

[17]  Michael B. Jones,et al.  Interposition agents: transparently interposing user code at the system interface , 1994, SOSP '93.

[18]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[19]  Walter Willinger,et al.  Self-similarity through high-variability: statistical analysis of Ethernet LAN traffic at the source level , 1997, TNET.

[20]  David A. Patterson,et al.  A case for networks of workstations (now) , 1994, Symposium Record Hot Interconnects II.

[21]  Nathaniel S. Borenstein,et al.  EMail With A Mind of Its Own: The Safe-Tcl Language for Enabled Mail , 1994, ULPAA.

[22]  David D. Clark,et al.  Architectural considerations for a new generation of protocols , 1990, SIGCOMM '90.

[23]  Srinivasan Seshan,et al.  Improving TCP/IP performance over wireless networks , 1995, MobiCom '95.

[24]  F. Bonomi,et al.  The rate-based flow control framework for the available bit rate ATM service , 1995, IEEE Netw..

[25]  Donald Yeung,et al.  The MIT Alewife machine: architecture and performance , 1995, ISCA '98.

[26]  James A. Gosling,et al.  The java language environment: a white paper , 1995 .

[27]  David C. Feldmeier A Data Labelling Technique for High-Performance Protocol Processing and Its Consequences , 1993, SIGCOMM.

[28]  Srinivasan Seshan,et al.  Software Architecture of the Infopad System , 1994 .

[29]  Steven McCanne,et al.  Joint source/channel coding for multicast packet video , 1995, Proceedings., International Conference on Image Processing.

[30]  Luis Ferreira Pires Introduction to LOTOS , 1992 .

[31]  Mark S. Manasse,et al.  The Millicent Protocols for Electronic Commerce , 1995, USENIX Workshop on Electronic Commerce.

[32]  Jerome H. Saltzer,et al.  End-to-end arguments in system design , 1984, TOCS.

[33]  Walter Willinger,et al.  On the self-similar nature of Ethernet traffic , 1993, SIGCOMM '93.

[34]  James Gosling Java intermediate bytecodes: ACM SIGPLAN workshop on intermediate representations (IR'95) , 1995, IR '95.

[35]  Larry L. Peterson,et al.  A dynamic network architecture , 1992, TOCS.

[36]  George C. Polyzos,et al.  Filter Propagation in Dissemination Trees: Trading Off Bandwidth and Processing in Continuous Media Networks , 1993, NOSSDAV.

[37]  Miguel Castro,et al.  Safe and efficient sharing of persistent objects in Thor , 1996, SIGMOD '96.

[38]  Karen R. Sollins,et al.  Cascaded authentication , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[39]  David Clark,et al.  Services or infrastructure: why we need a network service model , 1994, Proceedings of lst IEEE International Workshop on Community Networking.

[40]  Seth Copen Goldstein,et al.  Active messages: a mechanism for integrating communication and computation , 1998, ISCA '98.

[41]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[42]  GoslingJames Java intermediate bytecodes , 1995 .

[43]  V. Jacobson,et al.  Congestion avoidance and control , 1988, CCRV.

[44]  NetworksAllyn Romanow,et al.  Dynamics of Tcp Traac over Atm Networks , 1994 .

[45]  Peter B. Danzig,et al.  A Hierarchical Internet Object Cache , 1996, USENIX ATC.

[46]  Steven McCanne,et al.  An application level video gateway , 1995, MULTIMEDIA '95.

[47]  David D. Clark,et al.  The design philosophy of the DARPA internet protocols , 1988, SIGCOMM '88.

[48]  Sally Floyd,et al.  Dynamics of TCP Traffic over ATM Networks , 1995, IEEE J. Sel. Areas Commun..

[49]  Liuba Shrira,et al.  Distributed Object Management in Thor , 1992, IWDOM.

[50]  L TennenhouseDavid,et al.  Towards an active network architecture , 1996 .