scispace - formally typeset
Journal ArticleDOI

Smart packets: applying active networks to network management

TLDR
Smart Packets improves the management of large complex networks by moving management decision points closer to the node being managed, targeting specific aspects of the node for information rather than exhaustive collection via polling, and abstracting the management concepts to language constructs, allowing nimble network control.
Abstract: 
This article introduces Smart Packets and describes the smart Packets architecture, the packet formats, the language and its design goals, and security considerations. Smart Packets is an Active Networks project focusing on applying active networks technology to network management and monitoring. Messages in active networks are programs that are executed at nodes on the path to one or more target hosts. Smart Packets programs are written in a tightly encoded, safe language specifically designed to support network management and avoid dangerous constructs and accesses. Smart Packets improves the management of large complex networks by (1) moving management decision points closer to the node being managed, (2) targeting specific aspects of the node for information rather than exhaustive collection via polling, and (3) abstracting the management concepts to language constructs, allowing nimble network control.

read more

Citations
More filters
Proceedings ArticleDOI

Kandoo: a framework for efficient and scalable offloading of control applications

TL;DR: Kandoo is proposed, a framework for preserving scalability without changing switches that enables network operators to replicate local controllers on demand and relieve the load on the top layer, which is the only potential bottleneck in terms of scalability.
Book

Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems

TL;DR: A comparison of Energy Efficient (E2) Protocols for Wireless Sensor Networks, Q. Rao, R. Reuther, and D. reuther on Computational and Networking Problems in Distributed Sensor Networks.
Patent

Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail

TL;DR: In this article, a system (120) detects transmission of potentially unwanted e-mail messages by generating hash values based on one or more portions of the e-mails and then determining whether the generated hash values match hash values associated with prior e-email messages.
Proceedings ArticleDOI

PLAN: a packet language for active networks

TL;DR: This paper has successfully applied the PLAN programming environment to implement an IP-free internetwork and provides a guarantee that PLAN programs use a bounded amount of network resources.
Patent

Hash-based systems and methods for detecting, preventing, and tracing network worms and viruses

TL;DR: In this article, a system was proposed to detect transmission of potentially malicious packets by comparing the generated hash values to hash values corresponding to prior packets and tracing the path taken by a potentially malicious packet.
References
More filters
Book

The Java Language Specification

TL;DR: The Java Language Specification, Second Edition is the definitive technical reference for the Java programming language and provides complete, accurate, and detailed coverage of the syntax and semantics of the Java language.

Security Architecture for the Internet Protocol

R. Atkinson
TL;DR: This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer, and obsoletes RFC 2401 (November 1998).
Book

Applied Cryptography: Protocols, Algorithms, and Source Code in C

TL;DR: This document describes the construction of protocols and their use in the real world, as well as some examples of protocols used in the virtual world.
Book

The Java Virtual Machine Specification

Tim Lindholm, +1 more
TL;DR: In this article, the authors present a detailed overview of the Java Virtual Machine, including the internal structure of the class file format, the internal form of Fully Qualified Class and Interface names, and the implementation of new class instances.
Book

The Java Programming Language

TL;DR: The Java (TM)Programming Language, Second Edition, is the definitive resource for all serious Java programmers and lets you in on the rationale behind Java's design, direct from the language's creator, as well as the tradeoffs involved in using specific features.
Related Papers (5)