Journal ArticleDOI
Smart packets: applying active networks to network management
Beverly Schwartz,Alden W. Jackson,W. Timothy Strayer,Wenyi Zhou,R. Dennis Rockwell,Craig Partridge +5 more
TLDR
Smart Packets improves the management of large complex networks by moving management decision points closer to the node being managed, targeting specific aspects of the node for information rather than exhaustive collection via polling, and abstracting the management concepts to language constructs, allowing nimble network control.Abstract:Â
This article introduces Smart Packets and describes the smart Packets architecture, the packet formats, the language and its design goals, and security considerations. Smart Packets is an Active Networks project focusing on applying active networks technology to network management and monitoring. Messages in active networks are programs that are executed at nodes on the path to one or more target hosts. Smart Packets programs are written in a tightly encoded, safe language specifically designed to support network management and avoid dangerous constructs and accesses. Smart Packets improves the management of large complex networks by (1) moving management decision points closer to the node being managed, (2) targeting specific aspects of the node for information rather than exhaustive collection via polling, and (3) abstracting the management concepts to language constructs, allowing nimble network control.read more
Citations
More filters
Proceedings ArticleDOI
Kandoo: a framework for efficient and scalable offloading of control applications
TL;DR: Kandoo is proposed, a framework for preserving scalability without changing switches that enables network operators to replicate local controllers on demand and relieve the load on the top layer, which is the only potential bottleneck in terms of scalability.
Book
Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems
TL;DR: A comparison of Energy Efficient (E2) Protocols for Wireless Sensor Networks, Q. Rao, R. Reuther, and D. reuther on Computational and Networking Problems in Distributed Sensor Networks.
Patent
Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
TL;DR: In this article, a system (120) detects transmission of potentially unwanted e-mail messages by generating hash values based on one or more portions of the e-mails and then determining whether the generated hash values match hash values associated with prior e-email messages.
Proceedings ArticleDOI
PLAN: a packet language for active networks
TL;DR: This paper has successfully applied the PLAN programming environment to implement an IP-free internetwork and provides a guarantee that PLAN programs use a bounded amount of network resources.
Patent
Hash-based systems and methods for detecting, preventing, and tracing network worms and viruses
Walter Clark Milliken,William Timothy Strayer,Stephen Douglas Milligan,Luis Sanchez,Craig Partridge +4 more
TL;DR: In this article, a system was proposed to detect transmission of potentially malicious packets by comparing the generated hash values to hash values corresponding to prior packets and tracing the path taken by a potentially malicious packet.
References
More filters
Book
The Java Language Specification
TL;DR: The Java Language Specification, Second Edition is the definitive technical reference for the Java programming language and provides complete, accurate, and detailed coverage of the syntax and semantics of the Java language.
Security Architecture for the Internet Protocol
TL;DR: This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer, and obsoletes RFC 2401 (November 1998).
Book
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Bruce Schneier,Phil Sutherland +1 more
TL;DR: This document describes the construction of protocols and their use in the real world, as well as some examples of protocols used in the virtual world.
Book
The Java Virtual Machine Specification
Tim Lindholm,Frank Yellin +1 more
TL;DR: In this article, the authors present a detailed overview of the Java Virtual Machine, including the internal structure of the class file format, the internal form of Fully Qualified Class and Interface names, and the implementation of new class instances.
Book
The Java Programming Language
TL;DR: The Java (TM)Programming Language, Second Edition, is the definitive resource for all serious Java programmers and lets you in on the rationale behind Java's design, direct from the language's creator, as well as the tradeoffs involved in using specific features.