Skip to:Content
|
Bottom
Cover image for Programmable networks for IP service deployment
Title:
Programmable networks for IP service deployment
Series:
Artech House telecommunications library
Publication Information:
Norwood, MA : Artech House, 2004
ISBN:
9781580537452
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010082497 TK5105.5 P76 2004 Open Access Book Book
Searching...

On Order

Summary

Summary

The purpose of this book is to introduce readers to the current state of the art and the future challenges of programmable networks as an enabling step towards rapid, autonomic and flexible service deployment, and to present a novel programmable network and management approach.


Author Notes

Alex Galis is a visiting professor at University College, London. He has co-authored and published more than 100 articles and technical reports on various networking topics.

050


Table of Contents

Forewordp. xiii
Prefacep. xv
Acknowledgmentsp. xxi
1 Introductionp. 1
1.1 The Importance of Programmable Networksp. 1
1.2 Structure of the Bookp. 3
1.3 The FAIN Project and Consortiump. 4
2 Programmable Networks: Backgroundp. 5
2.1 Motivationp. 5
2.2 Trends and Expected Evolutionp. 7
2.3 Open Signalingp. 8
2.3.1 The IEEE P1520p. 8
2.3.2 The IETF ForCESp. 12
2.4 DARPA Active Networksp. 13
2.5 Node Operating Systemsp. 15
2.6 Execution Environmentsp. 18
2.7 Conclusionsp. 21
Referencesp. 23
3 Programmable Networks' Security: Backgroundp. 27
3.1 Introductionp. 27
3.2 Requirements for Securityp. 29
3.3 Programmability Versus Securityp. 30
3.4 Programming Language or Operating System?p. 31
3.5 Trusted Networking Requires Trusted Computingp. 33
3.6 Authorization in the Absence of Identitiesp. 35
3.7 Resource Controlsp. 36
3.8 Putting It All Togetherp. 37
3.9 Conclusion and Thoughts for the Futurep. 40
Referencesp. 42
4 Programmable Network Management and Services: Backgroundp. 47
4.1 State of the Artp. 47
4.1.1 Network and Element Managementp. 47
4.1.2 Active Service Provisioningp. 55
4.2 Trends and Expected Evolutionp. 59
4.2.1 Element and Network Managementp. 59
4.2.2 Active Service Provisioningp. 61
Referencesp. 61
5 Switch Ware Active Platformp. 65
5.1 Introductionp. 65
5.2 Why Switch Ware?p. 66
5.3 Precedents and Possibilitiesp. 67
5.4 Switch Versus Capsule: A Misleading Dichotomyp. 71
5.5 It Starts with the Node: Active Bridging, ALIEN, SANE, SQOSH, and RCANEp. 72
5.6 Active Packet Languages: PLAN, SNAP, and Camlp. 76
5.7 Resultsp. 78
5.8 Reflections and Conclusionsp. 80
Referencesp. 81
6 Peer-to-Peer Programmabilityp. 87
6.1 Introductionp. 87
6.2 What Are P2P Services?p. 88
6.2.1 Architectural Conceptsp. 88
6.2.2 Components, Structure, and Algorithms of Peer-to-Peer Servicesp. 92
6.3 Requirements for P2P Programmabilityp. 94
6.4 Objectives and Requirements for P2P Overlay Managementp. 94
6.5 P2P Overlay Management Using Application-Layer Active Networkingp. 96
6.5.1 The Active Virtual Peer Conceptp. 96
6.5.2 Implementation of AVPsp. 99
6.6 Conclusionp. 104
Referencesp. 105
7 Programmable Networks' Requirementsp. 109
7.1 Introductionp. 109
7.2 Operators' Expectations of Active Networksp. 110
7.2.1 Overviewp. 110
7.2.2 Speeding Service Deployment and Customizationp. 110
7.2.3 Leveraging Network and Service Managementp. 111
7.2.4 Decreasing Vendor Dependencyp. 112
7.2.5 Integrating Information Networks and Servicesp. 113
7.2.6 Diversification of Services and Novel Business Opportunitiesp. 114
7.3 FAIN Enterprise Modelp. 114
7.3.1 Rolesp. 115
7.3.2 Reference Pointsp. 118
7.4 Network Programmability and Active Applicationsp. 119
7.4.1 Introductionp. 119
7.4.2 Active Web Servicesp. 121
7.4.3 Active Multicastingp. 126
7.4.4 Active VPNp. 131
7.5 Generic Requirements for the FAIN Architecturep. 136
7.5.1 Service Architecturep. 136
7.5.2 Service Access Requirementsp. 136
7.5.3 Service-to-Network Adaptation/Managementp. 137
7.5.4 IP-Based Network Modelsp. 137
7.5.5 Service Level Agreementsp. 137
7.5.6 Quality of Servicep. 138
7.5.7 Charging/Billingp. 138
7.5.8 Securityp. 138
7.5.9 Active Node/Network Controlp. 138
7.5.10 Generic Framework Requirementsp. 139
7.6 Requirements from Operators' Expectationsp. 139
7.6.1 Impact of Speeding Service Deployment and Customizationp. 139
7.6.2 Impact of Leveraging Network and Service Managementp. 140
7.6.3 Impact of Decreasing the Dependence on Vendorsp. 140
7.6.4 Impact of Networks and Service Integration and Information Networkingp. 141
7.6.5 Impact of Diversifying Services and Business Opportunitiesp. 142
7.7 Application Requirementsp. 142
7.7.1 RP1: SCP-SPp. 142
7.7.2 RP2: SP-ANSPp. 143
7.7.3 RP3: ANSP-NIPp. 144
7.7.4 RP4: Consumer-SPp. 144
7.7.5 RP5, RP6, and RP7: Federation among SPs, ANSPs, and NIPsp. 145
7.8 Conclusionp. 145
Referencesp. 146
8 FAIN Network Overviewp. 149
8.1 FAIN Enterprise Modelp. 150
8.1.1 Rolesp. 152
8.1.2 Reference Pointsp. 153
8.2 FAIN Reference Architectural Modelp. 154
8.2.1 Discussion on the FAIN Reference Architecturep. 158
8.3 FAIN Networking Architecturep. 159
8.3.1 Networking Issues in FAINp. 159
8.3.2 Components in the FAIn Programmable Networkp. 160
8.4 FAIN Active Service Provisioningp. 170
8.4.1 Introductionp. 170
8.4.2 FAIN Approachp. 170
8.4.3 Actorsp. 172
8.4.4 Use Casesp. 172
8.4.5 ASP Architecturep. 173
8.5 FAIN Testbedp. 175
8.5.1 Network Topology and Interconnectionp. 175
8.5.2 Sites Overviewp. 178
8.6 FAIN Scenariosp. 179
8.6.1 DiffServ Scenariop. 179
8.6.2 WebTV Scenariop. 180
8.6.3 Web Service Distribution Scenariop. 181
8.6.4 Video on Demand Scenariop. 183
8.6.5 Mobile FAIN Demonstratorp. 184
8.6.6 Managed Accessp. 186
8.6.7 Security Scenariop. 187
8.7 Concluding Remarksp. 188
Referencesp. 190
9 Virtual Environments and Managementp. 195
9.1 Requirementsp. 196
9.2 Designp. 196
9.2.1 Basic Componentp. 199
9.2.2 Configurable Componentp. 199
9.2.3 Component Managerp. 199
9.2.4 Template Managerp. 200
9.2.5 Resource Managerp. 201
9.2.6 Special Managersp. 201
9.3 Implementationp. 202
9.3.1 Basic Componentp. 204
9.3.2 Portp. 204
9.3.3 IIOP Portp. 205
9.3.4 SNMP Portp. 205
9.3.5 Configurable Componentp. 205
9.3.6 Component Managerp. 205
9.3.7 Resource Managerp. 206
9.3.8 Virtual Environmentp. 206
9.3.9 Virtual Environment Managerp. 206
9.3.10 Security Contextp. 206
9.3.11 Security Managerp. 206
9.3.12 Execution Environmentp. 206
9.3.13 Java Execution Environmentp. 207
9.3.14 Java Execution Environment Managerp. 207
9.3.15 PromethOS Execution Environmentp. 207
9.3.16 PromethOS Execution Environment Managerp. 207
9.3.17 SNAP Execution Environmentp. 207
9.3.18 SNAP Execution Environment Managerp. 207
9.3.19 Channelp. 208
9.3.20 Channel Managerp. 208
9.3.21 DiffServ Controllerp. 208
9.3.22 DiffServ Managerp. 208
9.3.23 Traffic Controllerp. 208
9.3.24 Traffic Managerp. 208
9.4 Use Casesp. 209
9.4.1 Booting the Management Layerp. 209
9.4.2 Creating a Virtual Environmentp. 209
9.4.3 Deploying a Servicep. 210
9.5 Conclusionp. 210
Referencesp. 211
10 Demultiplexingp. 213
10.1 Introduction to De/MUXp. 213
10.2 Requirementsp. 214
10.2.1 Requirements for Active Packet Format for De/Multiplexingp. 214
10.2.2 Requirements for De/MUX Mechanismp. 214
10.3 Active Packet Formatp. 215
10.3.1 VE ID Option Datap. 216
10.3.2 EE ID Option Datap. 217
10.4 Framework, Components, Interfacesp. 217
10.4.1 Active Channelp. 219
10.4.2 Data Channelp. 220
10.4.3 Interface Between De/MUX Components and Security Componentp. 221
10.5 Conclusionsp. 224
Referencesp. 224
11 Security Managementp. 227
11.1 Introductionp. 227
11.2 System Relationships and Entitiesp. 228
11.3 Threats, Security Requirements, and Architecture Goalsp. 230
11.4 Security Issuesp. 232
11.4.1 Authorization and Policy Enforcementp. 232
11.4.2 Authenticationp. 233
11.4.3 Packet Integrityp. 234
11.4.4 System Integrityp. 234
11.4.5 Code and Service Verificationp. 235
11.4.6 Limiting Resource Usagep. 235
11.4.7 Accountabilityp. 236
11.5 High-Level Security Architecturep. 236
11.5.1 Fain Architectural Model and Security Architecturep. 237
11.6 Security Architecture Design and Implementationp. 239
11.6.1 Building the Components' Security Contextp. 240
11.6.2 Enforcement Layer, Authorization, and Policy Enforcementp. 240
11.6.3 External Security Representationp. 241
11.6.4 Cryptographic Subsystem and Secure Storep. 242
11.6.5 Connection Managerp. 243
11.6.6 Verification Managerp. 243
11.7 General Active Packet Security Eventsp. 243
11.8 Security Architecture Performancep. 244
11.9 Architecture Applicabilityp. 246
11.10 Evaluation of the Security Architecturep. 248
11.11 Conclusionsp. 249
Referencesp. 250
12 Resource Control Frameworkp. 253
12.1 Requirementsp. 253
12.2 RCF Designp. 254
12.3 RCF Main Functionalitiesp. 256
12.3.1 Admission Controlp. 256
12.3.2 Resource Controlp. 258
12.4 Model RCF Implementationp. 260
12.4.1 Traffic Control and Management for Linuxp. 261
12.4.2 DiffServ Control and Management for a Gigabit Routerp. 263
12.5 Conclusionsp. 264
Referencesp. 265
13 Control Execution Environmentsp. 267
13.1 Introductionp. 267
13.1.1 Management for Evolving and Adapting Networksp. 268
13.1.2 Extending the Control Planep. 271
13.1.3 Operation of the Control EEp. 271
13.1.4 Safety, Predictability, and Securityp. 271
13.2 Active Packet Interceptorp. 272
13.2.1 Intercepting and Injectingp. 272
13.2.2 Executingp. 272
13.2.3 IP Protocols as Active Packetsp. 273
13.2.4 Constrained Language: Forward Branching Languagesp. 275
13.3 Operational Design of SNAP Interpreterp. 277
13.3.1 Instruction Classesp. 277
13.3.2 Marshaling and Execution in Placep. 278
13.3.3 Segmentsp. 279
13.3.4 Stack and Heap Addressingp. 279
13.3.5 Expanding Execution Buffersp. 280
13.3.6 The Send Primitivep. 280
13.4 SNAP Activatorp. 281
13.4.1 Packet Interception Mechanismsp. 281
13.4.2 Other Servicesp. 282
13.4.3 SNMP Interfacep. 284
13.5 Security in the Control EEp. 285
13.5.1 Introductionp. 285
13.5.2 Active Networks Authenticationp. 286
13.5.3 FAIN Solutionp. 287
13.6 Control EE in DiffServp. 289
13.7 Conclusionp. 289
Referencesp. 290
14 High-Performance Execution Environmentsp. 293
14.1 Motivationp. 293
14.2 Initiatives in High-Performance Active Networkingp. 295
14.2.1 Practical Active Network: The First Step Toward High Performancep. 296
14.2.2 Active Network Node with Hardware Supportp. 296
14.2.3 Simple Active Router Assistantp. 296
14.2.4 Cluster-Based Active Nodep. 297
14.2.5 Composable Active Network Elementsp. 298
14.2.6 Active Packets Editionp. 298
14.2.7 Protocol Boosters: Programmable Protocol Processing Pipelinep. 299
14.2.8 Kernel Servicesp. 299
14.2.9 AMPp. 299
14.2.10 Magician: Resource Management and Allocationp. 300
14.2.11 AMnet: Flexinet Projectp. 300
14.2.12 Safe and Nimble Active Packetsp. 300
14.2.13 TAGS: Optimizing Active Packet Formatp. 301
14.3 Toward an Architecture of High-Performance Active Networks and Nodesp. 301
14.3.1 Proposing an Architecture for a High-Performance Active Networkp. 301
14.3.2 Proposing an Architecture for a High-Performance Active Nodep. 303
14.4 Tamanoir: A Practical Framework for High-Performance Active Networkingp. 307
14.4.1 High-Level Multithreaded Execution Environmentp. 307
14.4.2 User Space and Implementation Issuesp. 308
14.4.3 Kernel Space Execution Environmentp. 309
14.4.4 Distributed Service Processing: Tamanoir on a Clusterp. 309
14.5 Tamanoir Performance Evaluationp. 310
14.5.1 Hardware and Software Descriptions of the Testbedsp. 310
14.5.2 Latency Measuresp. 311
14.5.3 Data Path Optimization in a Tamanoir Active Nodep. 312
14.5.4 Throughput Measuresp. 313
14.6 Conclusionp. 321
Referencesp. 321
15 Network Managementp. 325
15.1 Introductionp. 325
15.2 Design and Functionalityp. 326
15.3 The FAIN PBNM Core Components Descriptionp. 330
15.3.1 Common Use Casesp. 331
15.3.2 Core Componentsp. 334
15.3.3 ANSP Proxyp. 334
15.3.4 PDP Managerp. 334
15.3.5 PDPp. 338
15.3.6 Monitoring Systemp. 340
15.3.7 Policy Parserp. 342
15.3.8 Policy Repositoryp. 344
15.4 Network-Level Management Systemp. 346
15.4.1 Use Casesp. 346
15.4.2 NMS Componentsp. 347
15.5 Element-Level Management Systemp. 357
15.5.1 Use Casesp. 357
15.5.2 EMS Componentsp. 360
15.6 Conclusionp. 370
Referencesp. 371
16 Service Deployment in Programmable Networksp. 373
16.1 ASP Functionalitiesp. 374
16.1.1 Actorsp. 375
16.1.2 Use Case Diagramsp. 375
16.2 Design Overviewp. 377
16.3 Service Descriptionp. 379
16.3.1 Basic Conceptsp. 380
16.3.2 Network-Level Service Descriptorp. 381
16.3.3 Node-Level Service Descriptorp. 383
16.4 ASP Componentsp. 385
16.4.1 Network ASPp. 385
16.4.2 Node ASPp. 387
16.5 Conclusionp. 390
Referencesp. 392
17 DiffServ Scenariop. 393
17.1 Introductionp. 393
17.2 Architecturep. 394
17.2.1 Traffic Controllerp. 396
17.2.2 DiffServ Controllerp. 397
17.3 Scenariop. 398
17.3.1 HIT/HEL Testbed Configurationp. 400
17.3.2 FHG Testbed Configurationp. 401
17.3.3 Active Proxy Configurationp. 402
17.4 Conclusionp. 404
Referencesp. 404
18 WebTV Scenariop. 405
18.1 Motivation and Key Conceptsp. 405
18.2 General Descriptionp. 406
18.3 FAIN PBNM and ASP Revisited: Detailed Scenario Descriptionp. 407
18.4 WebTV Componentsp. 409
18.4.1 Reconfiguration of the Transcoderp. 410
18.4.2 How the Controller Worksp. 411
18.4.3 Testbed Configuration for WebTV Demonstrationp. 414
18.5 Conclusionsp. 414
Referencesp. 415
19 The Outlookp. 417
19.1 Reference Architecture for Programmable Service Networksp. 417
19.2 Requirements Analysis for Further Development in Programmable Service Networksp. 421
19.3 Expected Key Novel Features and Benefitsp. 422
Referencesp. 423
About the Editorsp. 425
Indexp. 427
Go to:Top of Page