Invited talk: Active networks

被引:1
|
作者
Tennenhouse, D
机构
关键词
D O I
10.1145/238721.238764
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Active networks allow individual users, or groups of users, to inject customized programs into the nodes of the network. This approach to network architecture will enable a massive increase in the sophistication and customization of the computation that is performed within the network. In this talk I will discuss the overall motivation for our work, the approach we have adopted, and a prototype implementation that leverages the existing IP options mechanism. Our work is motivated by both technology push and user pull. The ''pull'' comes from the ad hoc collection of fire walls, web proxies, multicast routers, mobile proxies, video gateways, etc.,that perform user-driven computation at nodes within the network. We are developing the architectural support and common programming platforms to support the diversity and dynamic deployment requirements of these inter-posed services. The ''push'' is the emergence of active technologies, compiled and interpreted, supporting the encapsulation, transfer, inter-position, and safe and efficient execution of program fragments. Today, these technologies are applied above the end-to-end network layer, e.g., to allow clients and servers to exchange fragments. Our innovation is to leverage and extend these technologies for use within the network in ways that will fundamentally change today's model of what is ''in'' the network. Architecturally, we are bumping up the level of abstraction at which inter-operability is achieved: today's routers support the agreed syntax and semantics of IP e.g., they all perform ''equivalent'' computations. In contrast, active nodes perform many different computations but must all support an equivalent and inter-operable computational model.
引用
收藏
页码:89 / 89
页数:1
相关论文
共 50 条
  • [41] Invited Talk: The Coming AI Hackers
    Schneier, Bruce
    CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING, 2021, 12716 : 336 - 360
  • [42] Security, functionality and scale? (Invited talk)
    Anderson, Ross
    DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 64 - 64
  • [43] Scrap your boilerplate -: Invited talk
    Jones, SP
    Lämmel, R
    PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2003, 2895 : 357 - 357
  • [44] Invited Talk Memory: The Center of the Universe
    Murphy, Richard
    2013 IEEE WORKSHOP ON MICROELECTRONICS AND ELECTRON DEVICES (WMED), 2013, : XIX - XIX
  • [45] Invited Talk Networks on Chips - Keeping up with Rent's Rule and Moore's Law
    Kolodny, Avi
    PROCEEDINGS OF SLIP '07: 2007 INTERNATIONAL WORKSHOP ON SYSTEM LEVEL INTERCONNECT PREDICTION, 2007, : 55 - 55
  • [46] Broadcast with hitch-hiking in wireless ad-hoc networks - (Invited talk abstract)
    Calinescu, Gruia
    SNPD 2006: Seventh ACIS International Conference on Software Engineering Artificial Intelligence, Networking, and Parallel/Distributed Computing, Proceedings, 2006, : 225 - 225
  • [47] Mathematics and Cryptography: A Marriage of Convenience? INVITED TALK
    Silverberg, Alice
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 3 - 9
  • [48] A Brief Introduction to Probabilistic Argumentation (Invited Talk)
    Hunter, Anthony
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT (KSEM 2018), PT I, 2018, 11061 : XI - XIII
  • [49] Strong secrecy for wireless channels (Invited talk)
    Barros, Joao
    Bloch, Matthieu
    INFORMATION THEORETIC SECURITY, PROCEEDINGS, 2008, 5155 : 40 - +
  • [50] The CaPiTo Approach to Protocol Validation (Invited Talk)
    Nielson, Flemming
    Gao, Han
    Nielson, Hanne Riis
    AUTOMATED REASONING FOR SECURITY PROTOCOL ANALYSIS AND ISSUES IN THE THEORY OF SECURITY, 2010, 6186 : 1 - 1