scispace - formally typeset
Search or ask a question

Showing papers on "Virtual network published in 1999"


Patent
21 Jul 1999
TL;DR: In this article, the authors propose a network security center (NSC) and security network interface cards or devices to prevent unauthorized users from gaining access to confidential information in virtual private networks.
Abstract: A network prevents unauthorized users from gaining access to confidential information. The network has various workstations (14) and servers (16) connected by a common medium (20) and through a router (22) to the Internet (30). The network has two major components, a Network Security Center (NSC) and security network interface cards or devices (5). The NSC is an administrative workstation through which the network security officer manages the network as a whole as well as the individual security devices. The security devices are interposed between each of the workstations, including the NSC, and the common medium and operate at a network layer (layer 3) of the protocol hierarchy. The network allows trusted users to access outside information, including the Internet, while stopping outside attackers at their point of entry. At the same time, the network limits an unauthorized insider to information defined in their particular security profile. The user may select which virtual network to access at any given time. The result is trusted access to multiple secure Virtual Private Networks (VPN), all from a single desktop machine.

416 citations


Patent
15 Jan 1999
TL;DR: In this article, a method and apparatus for providing enhanced functionality to product webpages is described, which can be used to create a gift registry across multiple retailers, automate purchases, create an inter-retailer advertising network, and create a virtual network of retailers with a multitude of services spanning them.
Abstract: A method and apparatus for providing enhanced functionality to product webpages is described. This method and apparatus may be used to provide a unified toolbar across product webpages of multiple, independent retailers. This toolbar may be used to create a gift registry across multiple retailers, to create an inter-retailer shopping cart and automate purchases, to create an inter-retailer advertising network, and to create a virtual network of retailers with a multitude of services spanning them.

147 citations


Patent
15 Jan 1999
TL;DR: In this article, a virtual network tag and a network address assigned by a network other than a data-over-cable system is used to provide virtual network to one or more network devices, such as cable modems via a data overcables system.
Abstract: A method and system for virtual network administration with a data-over-cable system. A virtual networking tag and a network address (e.g., an Internet Protocol address) assigned by a network other than a data-over-cable system is used to provide a virtual network to one or more network devices, such as cable modems via a data-over-cable system. The virtual networking tag may also be used to request a desired service class (e.g., Class-of-Service, Quality-of-Service, Type-of-Service, Service Level Agreements, etc.), for a desired end-to-end networking service (e.g., Voice over Internet Protocol). The virtual networking tag can be mapped to a data-over-cable service class. The data-over-cable service class can be mapped into a transport service class for a transport network. The virtual networking tag is used to provide a desired end-to-end networking service from a network device on a first external network (e.g., an Ethernet Local Area Network), through the data-over-cable system, through a transport network (e.g., Asymmetric Digital Subscriber Line, Asynchronous Transfer Mode, Frame Relay, Integrated Services Digital Network, Synchronous Optical Network, Voice over Internet Protocol, etc.) and to a second external network (e.g., another Ethernet Local Area Network). The method and system are used to provide a variety of networking services via and through a data-over-cable system.

138 citations


Patent
14 Jul 1999
TL;DR: In this article, a virtual network consists of many distributed virtual computers interconnected over a communication network of individual links, such as optical fibers or electrical conductors, for example, each distributed virtual computer has at least two ports connected over respective links to other respective virtual computers on the network.
Abstract: A virtual network consists of many distributed virtual computers interconnected over a communication network of individual links, such as optical fibers or electrical conductors, for example. Each distributed virtual computer has at least two ports connected over respective links to other respective distributed virtual computers on the network. Each distributed virtual computer is connected to or resident within its own host, each host typically being a conventional computer such as a personal computer or a work station, for example, although at least one of the hosts may itself be another virtual computer. Each distributed virtual computer has reconfigurable logic elements such as an FPGA or an array of FPGAs.

136 citations


Journal ArticleDOI
TL;DR: The results show how the virtual organization and its members can realize significant improvements in operating costs and throughput times when applying ICT to link and reallocate their modular production tasks in response to customized orders.
Abstract: The increased interest in customer service and the trend towards customization gives rise to new organizational forms such as the virtual organization. This paper introduces the Modular Network Design (MND) approach to complement Mowshowitz' (1997) theory of virtual organization. This theory focuses on metamanagement of the virtual organization and consists of four activities: (1) determine and analyze customer requirements, (2) track the possibilities for satisfying these requirements, (3) develop and allocate production tasks among the members of the virtual organization, and (4) assess and adjust tasks and allocation procedures. The MND approach elaborates on this theory by breaking down both the requirements and the production tasks into modular entities, and by measuring the performance of the resulting virtual network in terms of operating costs and throughput time. The major contribution of the MND approach lies in its ability to support the assessment of alternative allocations of production tasks among the members of a virtual organization, using Information and Communication Technology (ICT) as enabler. The assessment of such alternative designs is illustrated by an application of MND in the air cargo industry. The results show how the virtual organization and its members can realize significant improvements in operating costs and throughput times when applying ICT to link and reallocate their modular production tasks in response to customized orders.

119 citations


Patent
Osama S. Aboul-Magd1, Sameh Rabie1
30 Nov 1999
TL;DR: In this article, the authors propose an adaptive method and apparatus for regulating connection admission of traffic for networks, which includes a limiter that limits a volume of traffic admitted to a network through a connection admission control (CAC) procedure; and basing the CAC procedure at least in part on a pure measurement CAC that is solely based on measurements of actual traffic levels on the network.
Abstract: An adaptive method and apparatus for regulating connection admission of traffic for networks, which includes a limiter that limits a volume of traffic admitted to a network through a connection admission control (CAC) procedure; and basing the connection admission control procedure at least in part on a pure measurement CAC that is solely based on measurements of actual traffic levels on the network. The connection admission control is based both on the pure measurement-based CAC and on a pure mathematical-based CAC that is solely dependent on user-supplied traffic parameters, thereby combining both types of the CAC to form a hybrid admission criterion. Where the network offers different services, managing link resources for CAC is effected by regulating the CAC procedure based on capacities assigned to service bandwidth pools that are defined for the different services offered by the network. The CAC procedure may take place on a virtual network (VN) environment.

73 citations


Journal ArticleDOI
TL;DR: This article presents a framework for the realization of spawning networks based on the notion of the Genesis Kernel, a virtual network operating system capable of creating distinct virtual network architectures on the fly.
Abstract: The deployment of new network architectures, services, and protocols is often manual, ad hoc, and time-consuming. We introduce "spawning networks," a new class of programmable networks that automate the life cycle process for the creation, deployment, and management of network architectures. These networks are capable of spawning distinct "child" virtual networks with their own transport, "parent's" network resources and in isolation from other spawned networks. Spawned child networks represent programmable virtual networks and support the controlled access to communities at users with specific connectivity, security, and quality of service requirements. In this article we present a framework for the realization of spawning networks based on the notion of the Genesis Kernel, a virtual network operating system capable of creating distinct virtual network architectures on the fly. We discuss the motivation and principles that underpin spawning networks and focus on the design of the transport, programming and life cycle environments, which comprise the main architectural components of the Genesis Kernel.

68 citations


Patent
01 Jun 1999
TL;DR: A network management system for managing a computer network in which media switching type infrastructures and media sharing type infrastructure are combined coexistently includes a database destined for network management in which correspondences established among information concerning physical interconnections of individual equipment on the network, information concerning logical network configuration such as virtual network, and information concerning the users who make use of the network are stored as discussed by the authors.
Abstract: A network management system for managing a computer network in which media switching type infrastructures and media sharing type infrastructures are combined coexistently includes a database destined for network management in which correspondences established among information concerning physical interconnections of individual equipment on the network, information concerning logical network configuration such as that of virtual network, and information concerning the users who make use of the network are stored, identifying devices for identification of the individual equipment on the network and physical addresses intrinsic to network ports, respectively, and retrieval engines for searching information of the physical addresses of the network ports with queries for the logical addresses.

55 citations


Proceedings ArticleDOI
26 Mar 1999
TL;DR: A new paradigm for automating the life cycle process for the creation, deployment and management of network architectures is introduced and programmable networks capable of spawning distinct "child" virtual networks with their own transport, control and management systems are envisioned.
Abstract: The deployment of network architectures is often manual, ad hoc and time consuming. In this paper we introduce a new paradigm for automating the life cycle process for the creation, deployment and management of network architectures and envision programmable networks capable of spawning distinct "child" virtual networks with their own transport, control and management systems. A child network operates on a subset of its "parent's" network resources and in isolation from other virtual networks. Child networks support the controlled access to communities of users with specific connectivity, security and quality of service requirements. In this paper we introduce the Genesis Kernel, a virtual network operating system capable of profiling, spawning and managing virtual network architectures on-the-fly.

49 citations


Patent
05 Aug 1999
TL;DR: In this paper, a multi-cast session table entry is generated based on the list of downstream virtual sub-networks and the multicast group membership, which is then downloaded to the edge devices.
Abstract: A method and apparatus that includes processing for providing multi-cast transmissions within a data network begins by determining, for a source virtual network, a list of downstream virtual sub-networks for multi-cast traffic based on a multi-cast routing protocol. The processing then continues by determining multi-cast group membership on as per downstream virtual sub-network, edge device, and port basis. The process continues when a data packet is received via the source virtual network. The processing then continues by generating a multi-cast session table entry based on the list of downstream virtual sub-networks and the multi-cast group membership. The process continues by establishing virtual connections between the source virtual network and edge devices coupled to virtual sub-networks identified in the list of downstream virtual sub-networks. Having generated the virtual connections, the processing continues by downloading the multi-cast session table to the edge devices. The edge devices utilize the multi-cast session table entry to determine where the received data packets are to be forwarded.

44 citations


Proceedings ArticleDOI
11 Oct 1999
TL;DR: This paper describes an implementation of the proposed framework, a conceptually simpler and better semantics switching techniques that eliminates the need for explicit stack operations and packet fragmentation.
Abstract: Switching techniques are capable of providing scalable forwarding performance, traffic engineering and quality of service, which are necessary for the next-generation Internet. Switching techniques achieve this by forwarding packets below the network layer, setting up aggregated flows, and laying explicit routes. The proposed framework improves on the current switching techniques. A virtual network port provides a conduit below layer-3 to network ports on remote nodes. It eliminates the need for explicit stack operations and packet fragmentation. It has active controls that allow processing of packets flowing through. We feel that it is conceptually simpler and has better semantics than the other techniques. In this paper we describe an implementation of the framework.

Proceedings ArticleDOI
01 May 1999
TL;DR: The design of a large-scale virtual network system is presented and the integration of communication programming interface, system resource management, and network interface operation is examined, showing full hardware performance is delivered to dedicated applications and time-shared workloads.
Abstract: Virtual networks provide applications with the illusion of having their own dedicated, high-performance networks, although network interfaces posses limited, shared resources. We present the design of a large-scale virtual network system and examine the integration of communication programming interface, system resource management, and network interface operation. Our implementation on a cluster of 100 workstations quantifies the impact of virtualization on small message latencies and throughputs, shows full hardware performance is delivered to dedicated applications and time-shared workloads, and shows robust performance under demanding workloads that overcommit interface resources.

Patent
04 Jun 1999
TL;DR: In this paper, a method and apparatus for establishing wireless communications between standardized and non-standardized information devices is provided, in association with a network of standardized information devices, a virtual network is formed which includes a virtual node representing each of the nonstandardized devices.
Abstract: A method and apparatus are provided for establishing wireless communications between standardized and non-standardized information devices. In association with a network of standardized information devices, a virtual network is formed which includes a virtual node representing each of the non-standardized information devices.

Patent
25 May 1999
TL;DR: In this paper, a network management system for managing a computer network in which media switching type infrastructures and media sharing type infrastructure are combined is presented, and correspondences established among correspondences concerning physical interconnections (1010) ofindividual equipment (25) on the network, information concerning logical network configuration (1020) such as virtual network, and information concerning the users (1045) who make use of the network are stored.
Abstract: A network management system for managing a computer network in which media switching type infrastructures and media sharing type infrastructures are combined coexistently includes a database (221) destined for network management in which correspondences established among information concerning physical interconnections (1010) of individual equipment (25) on the network (20), information concerning logical network configuration (1020) such as that of virtual network, and information concerning the users (1045) who make use of the network are stored, identifying means (22; 221) for identification of the individual equipment (25) on the network (20) and physical addresses (53) intrinsic to network ports, respectively, and retrieval means (22; 50) for searching information of the physical addresses of the network ports with queries for the logical addresses

Proceedings ArticleDOI
W.F. Ng1, D.S. Jun1, H.K. Chow1, Raouf Boutaba1, Alberto Leon-Garcia1 
24 May 1999
TL;DR: The partitioning of network resources into MIBlets is mainly addressed within the scope of the ATM testbed as a part of the network resources management (NRM) project of the Network Architecture Laboratory at the University of Toronto.
Abstract: This paper introduces the MIBlet concept as a means for effectively designing and managing virtual networks (VN). MIBlets are logical structures providing abstract and selective views of the physical network resources allocated to VN customers. They result from the partitioning of the network resources (their MIB representations) and restrict customers' access only to those resources allocated to them. Different partitioning schemes are supported to provide virtual network services with different quality of service requirements. Customer control/management functions are implemented through MIBlet controllers located at every network node involved in the customer network. MIBlet controllers enforce customers' access control and resource usage policing strategies and are invoked to set up, monitor and control the customer connections. In this paper the partitioning of network resources into MIBlets is mainly addressed within the scope of the ATM testbed as a part of the network resources management (NRM) project of the Network Architecture Laboratory at the University of Toronto.

Proceedings ArticleDOI
Stephen F. Bush1
01 May 1999
TL;DR: The concept of a streptichron and autoanaplasis are introduced as mechanisms which take advantage of the enhanced flexibility and intelligence of active packets and it is demonstrated that the Active Virtual Network Management Protocol is a feasible concept.
Abstract: This paper introduces a novel algorithm, the Active Virtual Network Management Protocol (AVNMP), for predictive network management. It explains how the Active Virtual Network Management Protocol facilitates the management of an active network by allowing future predicted state information within an active network to be available to network management algorithms. This is accomplished by coupling ideas from optimistic discrete event simulation with active networking. The optimistic discrete event simulation method used is a form of self-adjusting Time Warp. It is self-adjusting because the system adjusts for predictions which are inaccurate beyond a given tolerance. The concept of a streptichron and autoanaplasis are introduced as mechanisms which take advantage of the enhanced flexibility and intelligence of active packets. Finally, it is demonstrated that the Active Virtual Network Management Protocol is a feasible concept.

Patent
Ken Chow1, Lee C. Himbeault1
30 Nov 1999
TL;DR: In this article, a virtual network map view of all nodes is provided in a network which is portrayed as a representation of VoIP utilization of the network, and information is stored or logged for use by a network manager.
Abstract: A virtual network map view of all nodes is provided in a network which is representative of VoIP utilization of the network. As VoIP packets traverse elements of the network, information is stored or logged for use by a network management service. Combined with knowledge of the physical manifestation of the network, the virtual network map is created and used to manage the network as it relates to VoIP traffic. Other modeled devices such as routers, frame relay access devices (FRADs) and switches complete the picture by representing the logical virtual connections between nodes. A virtual link between communicating ICS devices is modeled, managed and configured independent of actual multiple and complex real interfaces or links.

Proceedings ArticleDOI
31 May 1999
TL;DR: Virtuosity is described, a virtual network resource management system that minimizes the complexity of handling multiple spawned virtual networks that operate over multiple timescales and forms an integral part of the virtual network kernel being developed within the Genesis project at Columbia University.
Abstract: The creation, deployment and management of network architecture is manual, time consuming and costly. To the network architect the creation process is ad-hoc in nature, based on hand crafting small-scale network prototypes that evolve toward wide scale deployment. We envision a different paradigm where 'spawning networks' are capable of profiling, spawning, architecting and managing distinct virtual network architecture on-the-fly. This paper provides an overview of a virtual network kernel and its life cycle of spawning virtual networks, and focuses particularly on the role of resource management of virtual networks. We describe virtuosity, a virtual network resource management system that minimizes the complexity of handling multiple spawned virtual networks that operate over multiple timescales. Virtuosity is driven by per-virtual network policy exerting control and management over multiple spawned virtual networks (characterized by a set of resources) and their spawned architecture (defined as a set of interacting controllers objects) by dynamically influencing the behavior of resource controllers over slow timescales. Virtuosity provides a foundation for the management of virtual networks and forms an integral part of the virtual network kernel being developed within the Genesis project at Columbia University.

Patent
10 May 1999
TL;DR: In this article, the authors propose a security policy setting method by which even a person not having much intelligence about security policy can automatically set the security policy by having only to make a simple operation on a menu without paying attention to a communication condition.
Abstract: PROBLEM TO BE SOLVED: To provide a security policy setting method by which even a person not having much intelligence about security policy can automatically set the security policy by having only to make a simple operation on a menu without paying attention to a communication condition and to provide a security policy manager and a communication network. SOLUTION: In this security policy setting method, a plurality of communication terminals that are objects of a virtual network to be built up are selected on a menu where a network map is displayed to specify a setting range. A communication condition to be set is selected from a security policy information storage table in which a communication condition including an encryption algorithm is stored in advance in crow-reference with a specified setting range (S102). Thus, communication paths required for the network are retrieved in response to the specified setting range and the selected communication condition, communication terminals being components of the respectively retrieved communication paths are retrieved furthermore, and a communication condition selected from the security policy information storage table is sequentially and automatically set in response to the respective communication terminals. COPYRIGHT: (C)2000,JPO

Patent
Jung-Ho Song1, Ki-Won Lee1, Dong-Il Han1
30 Aug 1999
TL;DR: In this article, the authors propose a method of generating an IEEE 1394 virtual network in which a virtual network is constructed on the IEEE1394 network and respective nodes sense the virtual network and a controller for generating the virtual networks.
Abstract: A method of generating an IEEE 1394 virtual network in which a virtual network is constructed on the IEEE 1394 network and respective nodes sense the virtual network and a controller for generating the virtual network. The method steps of connecting a virtual network controller for generating a virtual self ID packet including a virtual node ID information required for constructing a virtual network to a predetermined IEEE 1394 network, the respective nodes and the virtual network controller constructing the IEEE 1394 network for determining whether they are branches or leaves by performing virtual bus initialization, determining parent ports and child ports with respect to the ports of the respective nodes and a root node by performing a virtual tree identification, and determining the physical node IDs of the respective nodes by sending the prepared virtual self ID packet.

01 Jan 1999
TL;DR: This document explains how the different types of YANG models defined in the Operations and Management Area and in the Routing Area are applicable to the ACTN framework and highlights where new data models may need to be developed.
Abstract: ion and Control of TE Networks (ACTN) refers to the set of virtual network operations needed to orchestrate, control and manage large-scale multi-domain TE networks, so as to facilitate network programmability, automation, efficient resource sharing, and end-to- end virtual service aware connectivity and network function virtualization services. This document explains how the different types of YANG models defined in the Operations and Management Area and in the Routing Area are applicable to the ACTN framework. This document also shows how the ACTN architecture can be satisfied using classes of data model that have already been defined, and discusses the applicability of specific data models that are under development. It also highlights where new data models may need to be developed.

Book ChapterDOI
TL;DR: A kernel plug-in module called “virtuosity” is described for the management of multiple spawned virtual networks by dynamically influencing the behavior of a set of resource controllers operating over management-level timescales.
Abstract: The creation, deployment and management of network architecture is manual, ad hoc and slow to evolve to meet new service requirements resulting in costly and inflexible deployment cycles. In the Genesis Project (genesis@comet.columbia.edu), Columbia University, we envision a different paradigm where new network architectures are dynamically created and deployed in an automated fashion based on the notion of ”spawning networks”, a new class of open programmable networks. Spawning networks support a virtual network operating system called the Genesis Kernel that is capable of profiling, spawning, architecting and managing distinct virtual network architectures on-the-fly. In this paper, we describe a kernel plug-in module called “virtuosity” for the management of multiple spawned virtual networks. Virtuosity exerts control and manages multiple spawned virtual network architectures by dynamically influencing the behavior of a set of resource controllers operating over management-level timescales.

Journal ArticleDOI
TL;DR: This work investigates how to exploit multiple heterogeneous communication networks that interconnect the same set of processing nodes using a set of techniques the authors call performance-based path determination (PBPD), and finds that PBPS can reduce communication overhead in applications compared to using either network alone, while aggregating networks into a single virtual network can reduced communication latency for bandwidth-limited applications.
Abstract: The different types of messages used by a parallel application program executing in a distributed computing system can each have unique characteristics so that no single communication network can produce the lowest latency for all messages. For instance, short control messages may be sent with the lowest overhead on one type of network, such as Ethernet, while bulk data transfers may be better suited to a different type of network, such as Fibre Channel or HIPPI. This work investigates how to exploit multiple heterogeneous communication networks that interconnect the same set of processing nodes using a set of techniques we call performance-based path determination (PBPD). The performance-based path selection (PBPS) technique selects the best (lowest latency) network among several for each individual message to reduce the communication overhead of parallel programs. The performance-based path aggregation (PBPA) technique, on the other hand, aggregates multiple networks into a single virtual network to increase the available bandwidth. We test the PBPD techniques on a cluster of SGI multiprocessors interconnected with Ethernet, Fibre Channel, and HiPPI networks using a custom communication library built on top of the TCP/IP protocol layers. We find that PBPS can reduce communication overhead in applications compared to using either network alone, while aggregating networks into a single virtual network can reduce communication latency for bandwidth-limited applications. The performance of the PBPD techniques depends on the mix of message sizes in the application program and the relative overheads of the networks, as demonstrated in our analytical models.

Book ChapterDOI
TL;DR: An overlay network for the Internet was built to ease the interconnection of active nodes at a global scale and set up a global ANON-based ABONE, enabling the first active packet ever to physically circumnavigate the globe.
Abstract: In this paper we report on an overlay network for the Internet that was built to ease the interconnection of active nodes at a global scale. A simple “Active Networks Overlay Network” (ANON) protocol was defined and implemented that enables to create virtual network segments. This overlay abstraction was complemented by simple tools for the automated management of a distributed ANON-based testbed. The HTTP protocol, enhanced with a CGI-script based security protocol (ASD2), is used for code distribution, log file inspection and steering of the active network execution environments. We have set up a global ANON-based ABONE consisting of multiple segments in Europe, the USA, and Japan, enabling the first active packet ever to physically circumnavigate the globe.

Proceedings ArticleDOI
27 Sep 1999
TL;DR: An open architecture for the integration of VoIP exemplified by a prototype of a lightweight contact center for distributed virtual networks of professionals is proposed.
Abstract: Wireless and positioning technologies in combination with Internet's demonstrated capability to integrate voice and data, further leveraged by the use of software agents, allows for rapid introduction, at low cost, of a rich communication space where artifacts, people, and non-physical entities are integral parts. Given these benefits, we propose an open architecture for the integration of VoIP exemplified by a prototype of a lightweight contact center for distributed virtual networks of professionals.

Proceedings ArticleDOI
24 May 1999
TL;DR: This paper addresses the provision and customization of virtual networks, and discusses how a virtual network can be programmed to support different approaches for integration of ATM and IP.
Abstract: This paper addresses the provision and customization of virtual networks, and discusses how a virtual network can be programmed to support different approaches for integration of ATM and IP First, the virtual network concept is introduced, followed by a discussion of a management system architecture for the control of the virtual network Then, the paper discusses how a virtual network can be provided and customized through the partitioning of network resources and the programmability of the management system This paper proceeds with a discussion of how the management system can support the integration of ATM and IP in order to demonstrate the capability of full customization of the network environment support Finally, the partitioning of our NAL (Network Architecture Laboratory) testbed network is presented

Posted Content
TL;DR: In this paper, the authors describe the design of a control and management network (orderwire) for a mobile wireless Asynchronous Transfer Mode (ATM) network, which is part of the Rapidly Deployable Radio Network (RDRN).
Abstract: This paper describes the design of a control and management network (orderwire) for a mobile wireless Asynchronous Transfer Mode (ATM) network. This mobile wireless ATM network is part of the Rapidly Deployable Radio Network (RDRN). The orderwire system consists of a packet radio network which overlays the mobile wireless ATM network, each network element in this network uses Global Positioning System (GPS) information to control a beamforming antenna subsystem which provides for spatial reuse. This paper also proposes a novel Virtual Network Configuration (VNC) algorithm for predictive network configuration. A mobile ATM Private Network-Network Interface (PNNI) based on VNC is also discussed. Finally, as a prelude to the system implementation, results of a Maisie simulation of the orderwire system are discussed.

Proceedings Article
03 May 1999
TL;DR: JMAS is a prototype network computing infrastructure based on mobile actors using Java technology that allows a programmer to create mobile actors, initialize their behaviors, and send them messages using constructs provided by the JMAS Mobile Actor API.
Abstract: JMAS is a prototype network computing infrastructure based on mobile actors [10] using Java technology. JMAS requires a programming style different from commonly used approaches to distributed computing. JMAS allows a programmer to create mobile actors, initialize their behaviors, and send them messages using constructs provided by the JMAS Mobile Actor API. Applications are decomposed by the programmer into small, self-contained sub-computations and distributed among a virtual network of Distributed Run-Time Managers (D-RTM); which execute and manage all mobile computations. This system is well suited for course grain computations for network computing clusters. Performance evaluation is done using two benchmarks: a Mersenne Prime Application, and the Traveling Salesman Problem.

Proceedings ArticleDOI
05 Dec 1999
TL;DR: It is shown that latency rate servers with bounded output burstiness, may be used in a virtual network to provide bounded delay service and this gives a method to design a generic class of scheduling algorithms for virtual networks.
Abstract: With their widespread deployment, the need to provide QoS in virtual networks is being realized. We show that traditional scheduling algorithms like WFQ are incapable of providing a bounded delay service in a virtual network. The problem arises because traffic of a number of sessions sharing a virtual link in a virtual network is aggregated and tunneled through the physical network, which cannot isolate the traffic of well behaved sessions from that of misbehaving sessions. We show that this problem can be solved by regulating output burstiness on virtual links. Using the theory of latency rate servers, we show that latency rate servers with bounded output burstiness, may be used in a virtual network to provide bounded delay service. This gives a method to design a generic class of scheduling algorithms for virtual networks. Finally, we discuss how to integrate best effort and real-time traffic in a virtual network.

Book ChapterDOI
01 Jun 1999
TL;DR: An overview of Nomad's Personal Access System (NPAS), OSI application layer software that provides a personal mobility environment within a virtual network, and focuses on the part of NPAS, called Site Profile Agent.
Abstract: Personal mobility — a fundamental characteristic of Nomadic Computing — creates an environment in which a user roams without a wireless laptop or a mobile phone and yet enjoys anytime, anywhere network accessibility. This paper gives an overview of Nomad's Personal Access System (NPAS), OSI application layer software that provides a personal mobility environment within a virtual network. In addition, it focuses on the part of NPAS, called Site Profile Agent. Site Profile Agent is an inter-site negotiating agent that communicates with its peer to decide services for a nomad. This work is motivated by the larger project of the Mobile Agents Alliance, a collaboration that includes the National Research Council of Canada, the University of Ottawa, and Mitel Corp.