Invited talk: Active networks

被引:1
|
作者
Tennenhouse, D
机构
关键词
D O I
10.1145/238721.238764
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Active networks allow individual users, or groups of users, to inject customized programs into the nodes of the network. This approach to network architecture will enable a massive increase in the sophistication and customization of the computation that is performed within the network. In this talk I will discuss the overall motivation for our work, the approach we have adopted, and a prototype implementation that leverages the existing IP options mechanism. Our work is motivated by both technology push and user pull. The ''pull'' comes from the ad hoc collection of fire walls, web proxies, multicast routers, mobile proxies, video gateways, etc.,that perform user-driven computation at nodes within the network. We are developing the architectural support and common programming platforms to support the diversity and dynamic deployment requirements of these inter-posed services. The ''push'' is the emergence of active technologies, compiled and interpreted, supporting the encapsulation, transfer, inter-position, and safe and efficient execution of program fragments. Today, these technologies are applied above the end-to-end network layer, e.g., to allow clients and servers to exchange fragments. Our innovation is to leverage and extend these technologies for use within the network in ways that will fundamentally change today's model of what is ''in'' the network. Architecturally, we are bumping up the level of abstraction at which inter-operability is achieved: today's routers support the agreed syntax and semantics of IP e.g., they all perform ''equivalent'' computations. In contrast, active nodes perform many different computations but must all support an equivalent and inter-operable computational model.
引用
收藏
页码:89 / 89
页数:1
相关论文
共 50 条
  • [1] New Passive and Active Attacks on Deep Neural Networks Medical Applications Invited Talk
    Gongye, Cheng
    Li, Hongjia
    Zhang, Xiang
    Sabbagh, Majid
    Yuan, Geng
    Lin, Xue
    Wahl, Thomas
    Fei, Yunsi
    2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD), 2020,
  • [2] Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk)
    Kurosawa, Kaoru
    CRYPTOLOGY AND NETWORK SECURITY, 2010, 6467 : 43 - 43
  • [3] Invited Talk: Models and Methods for Maintaining Connectivity in Sensor Networks
    Nikoletseas, Sotiris
    2011 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS AND WORKSHOPS (DCOSS), 2011,
  • [4] Kernelization (Invited Talk)
    Fomin, Fedor V.
    COMPUTER SCIENCE - THEORY AND APPLICATIONS, 2010, 6072 : 107 - 108
  • [5] RF MEMS for wireless-bands tunable networks (Invited talk)
    Rebeiz, GM
    2006 TOPICAL MEETING ON SILICON MONOLITHIC INTEGRATED CIRCUITS IN RF SYSTEMS, DIGEST OF PAPERS, 2006, : 23 - 23
  • [6] 2-connected dominating set in wireless networks - (Invited talk abstract)
    Thai, My T.
    SNPD 2006: Seventh ACIS International Conference on Software Engineering Artificial Intelligence, Networking, and Parallel/Distributed Computing, Proceedings, 2006, : 227 - 227
  • [7] Climbing Algorithms (Invited Talk)
    Levin, Leonid A.
    STOC '21: PROCEEDINGS OF THE 53RD ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2021, : 2 - 3
  • [8] Semantic Search (Invited talk)
    Baeza-Yates, Ricardo
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 3570 - 3570
  • [9] Recursion and probability (Invited talk)
    Yannakakis, Mihalis
    Fourth IFIP International Conference on Theoretical Computer Science - TCS 2006, 2006, 209 : 13 - 13
  • [10] Problem-based learning as an example of active learning and student engagement - Invited talk
    Grabinger, S
    Dunlap, JC
    ADVANCES IN INFORMATION SYSTEMS, 2002, 2457 : 375 - 384