SlideShare a Scribd company logo
Tal Lavian August , 1999_ Hot Interconnects, Stanford
1 Open Programmable Architecture for Java-enabled Network Devices Page 1
Open Programmable Architecture
for Java-enabled Network Devices
Tal Lavian, Nortel Networks - Advanced Technology Center
Robert F. Jaeger, University of Maryland
Jeffrey K. Hollingsworth, University of Maryland
Keywords: Open Architecture, Programmable Networks, Java-enabled Networking,
JVM, Active Networks, Mobile Agents, Intelligent Agents.
1 Overview
Current network devices enable connectivity between end systems given a set of protocol
software bundled with vendor hardware. It is impossible for customers to add software
functionality running locally on top of network devices to augment vendor software. Our
vision is to open network devices so that customized software can be downloaded,
allowing for more flexibility and with a focus on industry and customer specific
solutions. This brings considerable value to the customer.
We have chosen to use Java because we can reuse its security mechanism and
dynamically download software. We can isolate the Java VM and downloaded Java
programs from the core router functionality.
We implemented Java Virtual Machines (JVMs) on a family of network devices,
implemented an Open Services framework, and developed an SNMP MIB API and a
Network API upon which we can demonstate the value of openness and programmability
of network devices.
2 Open Network Services
2.1 New Programmable Paradigm
We are entering a new era where servers, switches, and routers are participating in
applications. The IEEE P1520 recognized the need for a software infrastructure for
programming networks and has initiatives which propose standard APIs to networking
devices. [28-29].
Programmable network technology allows dynamic downloading of software programs to
network devices and moving intelligence to these devices. Downloading software
enables customized application level computational interconnectivity between servers
and network devices as well as among network devices. Programmable networks is an
enabling technology for a new type of distributed applications that are not technically
possible today.
Tal Lavian August , 1999_ Hot Interconnects, Stanford
1 Open Programmable Architecture for Java-enabled Network Devices Page 2
2.2 PC-ifications of Programmable Devices
In network devices like switches and routers, the software and the hardware are bundled
and not openly programmable. We have created an Open Service Architecture that allows
dynamic downloading of programs to theses devices.
Our vision is that network devices will be open like software for PCs. For example, we
buy software and hardware for PCs from different vendors, and then we install and
customize the software on the computer. Network devices like switches and routers are
also computers of a different type. We have implemented programmability
characteristics on these types of computers like the PCs so that additional functionality
can be provided to these devices.
2.3 Enabling Technology
Now, we are able to securely download and run Java applications on network devices.
We can distribute the intelligence to network devices for close-loop interaction on the
nodes. This allows for new types of applications that were not possible until now because
of scalability issues.
We have implemented technology that allows for a class of downloadable applications
which are not bundled with the vendor hardware including enhanced multicast services,
application level filtering, and mobile/intelligent agents [4] [13] [17]. The platform
supports the Active Networking reference architecture upon which multiple non-
interfering Execution Environments can run concurrently [2-7] [9] [12] [14-18] [25].
Operating systems for computers have recently been developed to allow user
customization of services and policies. Exokernel[1]] and Spin[8] provide new kernel
architectures to support safety and extensibility.
2.4 Static Agent vs. Dynamic Agents
Usually, we are managing network devices via “get” and “set”, as static requests to
SNMP agents. Having a dynamic agent on the device opens us to a new set of
applications. Instead of external SNMP requests, we can download software that use
SNMP calls via an internal device loop.
The direction is to open network devices to 3rd
party developers. To facilitate this, we
have created an Open Service Interface[26] using Java with additional security
mechanisms. The interface opens the network devices to 3rd
party vendors and allow
other domain experts to add value to network devices.
Java has taken the computer world by storm. However, it is mainly used by client s and
servers for browser and business applications. Until now, Java did not run on the network
devices.
Tal Lavian August , 1999_ Hot Interconnects, Stanford
1 Open Programmable Architecture for Java-enabled Network Devices Page 3
2.5 New type of Applications
We can add value to network infrastructure by allowing tight code interaction between
business applications and network devices. This new paradigm allows a new type of
distributed applications between servers and swiches/routers. All software in the
applications can be dynamically loaded on to the servers and network devices.
2.6 Domain Experts
Domain experts that work closely with customers know the problems the customer faces
and may bring ideas from other business domains to the development of solutions.
Allowing 3rd
party experts to write custom applications allows for innovative solutions to
customer business requirements.
2.7 Feature-on-demand
Java beans with specific plug-in features can be developed and released quickly
providing feature-on-demand capability to address changing customer needs. This
approach circumvents the need for vendor support to add customer desired capabilities to
network devices and avoids the need for the customer to wait for new features from the
vendor in order to realize capabilities. Also, features can be ported quickly to other
products implementing the Open Service Interface.
3 Open Architecture
3.1 What have we implemented?
We have implemented JVMs on the Nortel Networks Routing and L3 Routing Switch
family of products. We can securely download and safely run Java applications on these
devices and access native code running on these devices [1]. We developed an
architecture that allows for downloading of new code to implement desired features. We
developed several APIs including an SNMP API and a Network API. The SNMP API
allows reading and writing of MIB variables [27]. The Network API allows Java
applications to control the hardware based forwarding and selection of packets to be
delivered to Java applications based on packet signatures. Consequently, our network
devices are programmable allowing for customers to safely run dynamically downloaded
Java code to realize additional functionality.
3.2 Scalability
Network Management via SNMP suffers scalability in applications with massive close-
loop interactions. For example, assume an NMS application that monitors some network
device parameters. Lets assume that we want to gather information on 10 parameters per
port on a device with 100 ports and we want to sample 100 times per second. These
types of applications are not practical in the current SNMP model of centralized
management.
Current technology like RMON provides an interface to allow network devices to collect
statistics locally. It is restricted to a set of predefined types of data that can be collected
and it does not address the scalability problem.
Tal Lavian August , 1999_ Hot Interconnects, Stanford
1 Open Programmable Architecture for Java-enabled Network Devices Page 4
We overcome these limitations in our distributed intelligence approach. The data
samples are local calls with no need for SNMP call for each sample. The NMS will be
notified only when needed based on thresholds or trends. This allows an intelligent event
notification mechanism rather than a polling mechanism.
3.3 Security
Computer networks have become vital to businesses. It is critical that the network
functions properly and a loss of operation is not tolerable. To allow the openness that we
are proposing, we needed to implement a strong security architecture. Security is a key
component of the Open Service Interface architecture. It includes security for
downloadable applications and for the device’s code interface. In addition to the Java
language security features, the architecture provides additional security including digital
signatures and code certification.
3.4 The JVM
Implementing a JVM for embedded and real-time environments presents several
challenges. Such environments are especially concerned with reliability, determinism,
and restricted memory. It is also crucially important that new Java programs must work
without disturbing the existing non-Java functionality.
Our JVM design satisfies these requirements by encapsulating the JVM into one
framework. This JVM manages the Java threads and their memory usage within this
framework and presents one unified task to the RTOS. The Open Services Architecture
was designed to insulate core router functionality from Java and JVM failures. Even if
the JVM crashes, the router remains operational.
3.5 But Java is SLOW
Java has often been criticized for its speed and its use in a routing device has been
questioned. With the advent of ASIC technology for fast path data forwarding engines
that achieve Gigabit forwarding rates, no serious routing platform is based on a software
forwarding engine. An active network platform that touches all network packets is
doomed to fail. However, control and management applications are well suited for Java
based network services locally on the network device as well as active applications which
don't require high packet per second rates to operate.
3.6 Java MIB API
The goal is to provide an interface that transparently gives access to the SNMP data,
while hiding the SNMP machinery of PDUs, object identifiers and table iterations. The
MIB gives a fairly object-oriented model to the data, which fits quite naturally onto Java
class decomposition.
The MIB is structured as a collection of groups, with each group containing a number of
variables. Each group is modeled as a Java class, and each variable is modeled with
accessory methods.
Tal Lavian August , 1999_ Hot Interconnects, Stanford
1 Open Programmable Architecture for Java-enabled Network Devices Page 5
3.7 Inter-operating with SNMP MIB Compiler
There are a large number of variables in the MIB and it is tedious and error prone to
generate the Java bindings for them all by hand. To automate the binding, we provide a
MIB compiler that takes the standard ASN.1 textual representation of the MIB and
generates the necessary Java code. This approach is similar to other mibgen tools and
results in a Java API which represents the MIB tree. Javadoc pages document the Java
MIB API that results from the input MIB definition.
An incremental strategy for MIB variable access is the result of this research. MIB
variables are queried and set by constructing SNMP PDUs that are sent to the loopback
interface of the device and delivered to the underlying SNMP stack. This approach
allows us to evolve from the loopback strategy by incrementally adding direct low-level
implementations of selected time-critical methods.
4 Applications Examples
4.1 Close-loop Applications
Creating a closed-loop mechanism on the device itself allows for the development of
tight local management applications. We can develop applications utilizing tight
interactions with the traffic pattern and the device capabilities. We can move some of the
intelligence of NMS and policy servers to the network devices. This allows for new types
of applications that are not feasible with centralized management schemes.
4.2 Example 1: Interactions with Business Applications
Currently, business applications are running on servers and networking applications are
running separately on network devices. There is very limited interconnection at the
application level. Downloading and running Java applications on network devices
enables collaborations between network devices and applications running on other
servers. Business applications can take advantage of distributed computing in an
environment consisting of applications running on network devices which leverage the
local-loop directly on the device. For instance, an electronic auctioning service can use
routers to filter bids which are no longer acceptable given that the bid price has already
been surpassed [10]. Another application can dynamically configure the output priority
queues on the network device as part of the application needs.
4.3 Example 2: Interactions with other network devices
Currently, network devices interact using a pre-defined set of protocols bundled with the
hardware. There are no interactions or sharing variables that is not within the confines of
bundled vendor software. In the Open Service Interface architecture, network devices
can run non-bundled distributed applications that interact at the application layer with
applications running on other devices. For example, a community of routers can make a
dynamic configuration decision based on bottlenecks or load. The decision making
process can be done as part of a distributed application within this community.
Tal Lavian August , 1999_ Hot Interconnects, Stanford
1 Open Programmable Architecture for Java-enabled Network Devices Page 6
4.4 Example 3: Mobile Agents
The architecture provides a platform for mobile agent technology. Mobile agents to
perform information gathering such as L2 connectivity or traceroute are made possible
through the Network API. The mobile agent performs some work on the local device
and moves to the next device to continue the work. For example, roaming diagnostic
agents can gather performance information along the path from a client to the server. This
mobile agent can identify and even solve problems along the network path.
4.5 Example 4: Active Networks
By developing an Open Services Interface, we provide a platform upon which Active
Networking Execution Environments (EEs) can be hosted. We allow for running Java-
based EEs as services on the router that can host active applications downloaded in the
Active Network Encapsulation Protocol for distribution to EEs.
4.6 Example 4: Local QoS implementation
Instead of configuring the QoS mechanisms from remote station, we can do it locally on
the network device. For example, we can monitor locally the traffic patterns and
configure the QoS parameters based on policy that is pushed to the device as an
application.
5 Conclusion
We are entering a new era where servers, switches, and routers participate in networking
applications. This is a powerful new technology that enables dynamic downloading of
end-user applications. We provide an open set of network services upon which new
applications can be built to customize the behavior of network devices as well as
management networks. We provide tools to developers enabling them to use their
domain expertise to create solutions to specific business challenges. Introducing domain
expertise into the development process creates a virtual community of developers that can
bring innovation to networking customers.
The Nortel Open Service Interface functional prototype implements this enabling-
technology which is the foundation of this paradigm shift. The ability to download
dynamic agents to network devices is much more powerful than the current use of static
agents. Dynamic program loading into the switching and routing elements of a network
bring new opportunities for configuring and managing large, complex, and high
performance networks. Pushing intelligence into the network elements themselves solves
the scalability problems inherent in a centrally managed network.
6 References
  ¡ ¢ £ ¤ ¥ ¦ § ¨ ©  ©    ¤  ©   §      © ¨  ¤ ! § ©  # $   ¨ #  % ! #  © §  $ © ' ¦ $ # ( § ) ¦ 0 1 2 3 4 5 2 6 2 3 7 8 9 4 8 6 @ A 4 B C D E F E G H I I P Q R S R T U U V I W X Y Q ` I
a b c d e f b g h b i p q r s a a a t u g v f p d w g f b x e f y e € g g d b y  € b y w € y h p ‚ f e ƒ h € „ … † ‡ ˆ ‰  ‘ ’ “ ” † • ‡ – — ˜ ™ ™ — ‡ d – † ‡ e ‘ ” f g h i j  ˜ k l m n o
p q r s t r u v w q t x u y z { | } ~  |
€  ‚ ƒ „ „ … † ‡ ˆ ‰ Š … ‹ Œ  Ž   ‹ … ‘ ’ “ „ … † ‡ ˆ ‰ ” Ž • ‡ ‹ – — ˜ ‡ ‰ ’ ‡ ˜  –  ˜ — •  … Ž ™ “ š ‘ Ž ‡ › œ “ ›   
Tal Lavian August , 1999_ Hot Interconnects, Stanford
1 Open Programmable Architecture for Java-enabled Network Devices Page 7
ž Ÿ   ¡ ¢ £ ¤ ¥ ¦ § ¦ £ ¨ © ª « ¬ ­ ® ¯ ° ± ² ³ ´ ¯ ® µ ¶ · ¸ ¹ ¯ º » ± ¼ ½ º ¼ µ ¯ ¾ ¿ À ¯ ¾ Á ½ Â ® ¯ ° Ã ® ¯ ¹ º ¼ ± Ä ½ Å ½ ¼ Â ® ¯ ° Æ Ç ½ ¯ Æ ± ® ² È É Ê ¸ · ¹ µ ³ µ Æ ¼ Ë Ì · Ì Ê Ê Ê
Í Î Ï Ð Ñ Ò Ó Ô Õ Ó Ö × Ø Ø Ó Ô × Ø Ñ Ù Ú Û Ü Ý Ù Û Þ Þ Ø ß à Ô á Þ Ö â ã à Ø ä à å æ × å ä Ð ç å × è à é × Ø Ø ç Ð Ó ê Ø Þ ç à å æ Ú Ó Ô ë Þ Ö ß ì Ö Þ Ô Þ é Þ Ø í Ñ î ì ï Ú Ù ð Ù ñ ò ó ô õ
ö ÷ ø ù ú û ü ý þ þ ý ÿ ü ý   ¡ ¢ ¢ ¢ þ ý £ ú ¤ ¥ ¦ ÿ þ § ¨ ¢ © ¢ þ      § ¥  ý ¥    ¥  ¢  þ §  ¥ ú  ¢ ÿ ü ¥ § ÿ ý £  ¢     þ !      # $ %  ' ( ) 0 1 1 2 3 2 0 4 ) 0 5 6 7 8 9 @ 3 (
A
2 0 B 3 9 C D @ E 8 9 8 7 8 2 0 4 F 2 G H @ 0 1 0 3 I ( P # # $ Q
R $ S T Q U Q F 2 @ @ 2 @ H 0 7 E 2 C @ V T Q W 2 8 H 2 B C 1 1 Q F 0 X C B V E C @ C G 8 9 Y 2 @ 2 8 X 0 B ` C B G H 9 8 2 G 8 7 B 2 Q D @ a 7 1 8 9 5 2 V 9 C ) 0 5 6 7 8 9 @ 3 C @ V
b 2 8 X 0 B ` 9 @ 3 # $ ( c C @ d 0 E 2 ( ) e ( d C @ P # # $ Q
f g h i p i q r s t s u t v w p v u w s x y u p €  ‚ u ƒ v „ … ƒ  † ƒ u r r u ‡ x q ˆ q ‰ ‚  ƒ  „ p ‘ t ‘ ’ ‘ … “ ‘ ” ” ” ‘ t ‰ x p •  ƒ  „ –  —  t ˜ s „ ‰ ƒ s ‡ ™ ‰ q v w d „ ‰ q r „ e
f
— q ƒ u ‰ s  t „ u t v g u t u † q r q t ‰ h i j j k p
l m n o p o q r s t u v q w u x p y z w q { s | } | x | w ~  € u  q w ~ u { v ‚ q r  ƒ r „ u { … q | { w t q € ‚ † ‡ ˆ ‰ q r u w | { Š € ~ s w q „ p † { ‹ Œ w t € ~ „ ‰ p ƒ { ˆ ‰ q r u w | { Š
€ ~ s w q „ s ‚ r | { … | ‰ x q s   q … p ‹ Ž Ž Œ p
  ‘ ’ “ ’ “ ” • – — ˜ ™ ’ “ š “ › œ   œ  ž Ÿ   ¡ œ “ ¢ — £ ž ¤ ¥ œ £ ¥   — – • ” Ÿ  ¡ ¤ ¦ œ — – ¥ ¤ Ÿ  ¡ § Ÿ — – ¨ œ © ª œ  œ — – ¥ ¤ Ÿ  Ÿ § « — Ÿ ¥ Ÿ £ Ÿ • ¡ “ ¬ ­ ª ” ® ¯ ¯ °  ± ² ³   ± “
 ³ ± ‘ œ ´ – µ ­  £ “ ¢   £ ¥ ¤ Ÿ  ¶ œ · ¡ œ — ¸ œ — “ ž ¥ ¥ ¹ º » » © © © “ œ · – µ “ £ Ÿ ¼ » ½
¾ ¿ ¿ À Á ½ Â ½ Ã Ä Å Æ Ç È Ç É Ê Æ ½ Ã Ë Ì Í Ç È Ä Ç Æ Î Ï Ä Ð Ñ Ç È Ê É Ò Ä Å Ó Ô Õ É Ç Ö Ï È × Ø Ò É Ç × É Ù È Ç Ú Ì È Ï Ñ Ñ Æ Ò × Ê É Ò Ì Ä Û Ü Ç Ý Ç Æ Â Ç Õ Ì Ù È × Ç Þ Ê Ä Ê Å Ç Ö Ç Ä É ½ ß Ä ¿ à É Ø
Ó Ô Ö Ñ ½ Ì Ä Ð Ñ Ç È Ê É Ò Ä Å Ó Ô Õ É Ç Ö Õ á È Ò Ä × Ò Ñ Æ Ç Õ â ¿ ã ã à ½
ä å æ ç è é ê é ë ì í î ï ð ñ ò ó ì ô ñ õ ö é ÷ é ö ø ù ò ú ô õ é û ñ ø ü ý ø ñ ò ì þ ÿ ø   ù ¡ ý ¡ î ¡ ÿ ô ù î ú ì ý ø î ý í ù ø ¢ ¡ ù ô     ÿ ì î ô ý ì ¡ ñ £ ò   ø î ¢ ì î ñ ø ý ¤ ¡ ù ó ì ñ ¥ é
¦ § ¨ ©        ¨      !      § # $ %  ' ( ) ¨    §   ©  0  ! 1
2  3 4 $ 1 5 6 ¨ 7    8 6 1 9 @  6  8 A 6  B C 6   © 8   5 § 8 D  E ¨ § F  ¨ § G     H E      $     ¨   8   9 I I 6  © 8   ¨  G  P  6 5 § 8 D    1 9 ) B
$ ' Q ) R B B S T 0  T 1
2  U 4 G 1 H  1 G   D 8    8 6 1 9 ©   P  @  6  8 A 6  B C 6   © 8   1 0 '  5 R ) R B S V 0  V 1
2  T 4 9 1 B 8 6 6     8 6 1 R I  § 8     $ 7    D $ C I I ¨ §   ¨ § ¦ § ¨  ¨ © ¨ 6 W ¨ ¨    §  1 X  ©    © 8 6 @  I ¨ §  B $ H ) ' $ H ! H  3 0 ) ' $ Y  I  1 0 #   P 1 ¨ 
¦     7 6 P 8   8 0  ! 1
2  ! 4 ` 1 $ D      8 6 1 $ E   ©   8 §  9 © ©  6  § 8        E ¨ § F % P ¨ 6 C   ¨  1 X  ©    © 8 6 @  I ¨ §  B $ H ) ' $ H ! H 3 V 0 ) ' $ Y  I  1 0 #   P 1 ¨ 
¦     7 6 P 8    8 0 B 8 7  ! 1
2  a 4 Y 1 X       ¨ C     8 6 1 9 $ C § P  7 ¨  9 ©   P     E ¨ § F @    8 § ©  1 ' % % % ) ¨ D D C   © 8   ¨   B 8  8 b    0  a 1
2  V 4 Y 1 G 1 X       ¨ C   8   Y 1      § 8 6 6 1 X ¨ E 8 §   8  8 ©   P     E ¨ § F 8 § ©     ©  C §  1 '  B C 6   D    8 ) ¨ D I C     8  
   E ¨ § F    ! 0 $ 8  ` ¨   0 ) 9 0 ` 8   ! 1
2 c T 4 ` ¨  8   8  $ D    0   8 6 0 9 ©   P 8        E ¨ § F  d 9 ¦ § ¨  §    @  I ¨ §  0 ) R B ¦ # % @ 0 9 I §  6  1
2 c ! 4 X 1 G 8 P  8  0 $ 1 G 8 C 0 e ` 8 P 8 H W 8    R I   $  § P  ©  '    §  8 ©  0 f W 8 7 9 § ©     ©  C §  G 8 A X @ V H g  g 1 B 8 § ©  3 g 0  V 0 W 8 7
   E ¨ § F  1 W 9 G E  A     d    I d h i p q r s t u v w x y €  ‚ ƒ q r „ u v … q t i † q w w y i t x ‡ € i ˆ ‡ u ‰ x ‚ …  v … ‘ ‡ i ’ “ ’ … q r ‰ ’ x r …  † x w ’ ˆ q … u  x r 
” • – — ˜ ™ d e f g h f i j k h l m h f i ˜ ™ k n n i o p q r e ™ s o h l h t u n f v w x y x z { | y z ™ } { h ~ |  g q m € n g € e  n k h  j ˜ ‚ ƒ „ … † ƒ ™ d n g n ‡  n 
ˆ ‚ ‚ ƒ ™
” • ƒ — z ‰ ‰ ‰ y ˆ Š • … ˜ n ‹ n  n f g n x r Œ n  i Ž Ž Ž ™ m n n n „ u m f ™ r  
” • ‚ — { m  Ž h  i o ™ i k h ‘ h  i | ™ | ™ i ’ e h  Œ o ™ „ “ ” • – — ˜ • ™ ” • š › œ  ž Ÿ   ¡ ” • ¢ › Ÿ – ” £ “ ” • ¡ Ÿ ¤ Ÿ ¥ — • š ” • ¦ ž § ¨ © ª « ¨ ¨ ž « ¡ ” • ¬ › « ­ ¬ ” › « ®
¬ ª — « ¨ © ª — « ¡ ” ¯ ¦ œ ª ° ± ± ± ¢ ² ³ ´ µ ¡ © › « ® › § ® ¨ ° « — © — › © — ¶ ª · ž § ¢ § ž ­ § › ˜ ˜ ›   ¸ ª ¹ ª © º ž § ¥ ° « © ª § · › » ª ¨ ¼ • ° ± ± ± ½ ž ˜ ˜ Ÿ « — » › © — ž « ¨
š › ­ › ¤ — « ª • ¾ ž ¸ ¿ À ”

More Related Content

What's hot

Connected World in android - Local data sharing and service discovery
Connected World in android - Local data sharing and service discoveryConnected World in android - Local data sharing and service discovery
Connected World in android - Local data sharing and service discovery
Talentica Software
 
WWT Software-Defined Networking Guide
WWT Software-Defined Networking GuideWWT Software-Defined Networking Guide
WWT Software-Defined Networking Guide
Joel W. King
 
SDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSrinivasa Addepalli
 
Introduction to Software-defined Networking
Introduction to Software-defined NetworkingIntroduction to Software-defined Networking
Introduction to Software-defined Networking
Anees Shaikh
 
Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined Networks
Shreeya Shah
 
BreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetBreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetIxia
 
Software Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefSoftware Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology Brief
Zivaro Inc
 
Software-Defined Networking (SDN): Unleashing the Power of the Network
Software-Defined Networking (SDN): Unleashing the Power of the NetworkSoftware-Defined Networking (SDN): Unleashing the Power of the Network
Software-Defined Networking (SDN): Unleashing the Power of the Network
Robert Keahey
 
BreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data SheetBreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data Sheet
Ixia
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
Sagar Rai
 
Wifi chat code explaination
Wifi chat code explainationWifi chat code explaination
Wifi chat code explaination
geniushkg
 
Routing & Switching report
Routing & Switching reportRouting & Switching report
Routing & Switching report
Express News
 
Hp nni installation guide
Hp nni installation guideHp nni installation guide
Hp nni installation guide
najeeb625
 
Software-Defined Networking(SDN):A New Approach to Networking
Software-Defined Networking(SDN):A New Approach to NetworkingSoftware-Defined Networking(SDN):A New Approach to Networking
Software-Defined Networking(SDN):A New Approach to NetworkingAnju Ann
 
SDN Fundamentals - short presentation
SDN Fundamentals -  short presentationSDN Fundamentals -  short presentation
SDN Fundamentals - short presentation
Azhar Khuwaja
 
IRJET- Build SDN with Openflow Controller
IRJET-  	  Build SDN with Openflow ControllerIRJET-  	  Build SDN with Openflow Controller
IRJET- Build SDN with Openflow Controller
IRJET Journal
 
Juniper Unified SDN Technical Presentation (SDN Day ITB 2016)
Juniper  Unified SDN Technical Presentation (SDN Day ITB 2016)Juniper  Unified SDN Technical Presentation (SDN Day ITB 2016)
Juniper Unified SDN Technical Presentation (SDN Day ITB 2016)
SDNRG ITB
 

What's hot (20)

Connected World in android - Local data sharing and service discovery
Connected World in android - Local data sharing and service discoveryConnected World in android - Local data sharing and service discovery
Connected World in android - Local data sharing and service discovery
 
WWT Software-Defined Networking Guide
WWT Software-Defined Networking GuideWWT Software-Defined Networking Guide
WWT Software-Defined Networking Guide
 
SDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_Networks
 
Introduction to Software-defined Networking
Introduction to Software-defined NetworkingIntroduction to Software-defined Networking
Introduction to Software-defined Networking
 
19 23
19 2319 23
19 23
 
Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined Networks
 
BreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetBreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data Sheet
 
Software Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefSoftware Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology Brief
 
Software-Defined Networking (SDN): Unleashing the Power of the Network
Software-Defined Networking (SDN): Unleashing the Power of the NetworkSoftware-Defined Networking (SDN): Unleashing the Power of the Network
Software-Defined Networking (SDN): Unleashing the Power of the Network
 
BreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data SheetBreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data Sheet
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
 
Wifi chat code explaination
Wifi chat code explainationWifi chat code explaination
Wifi chat code explaination
 
Jvvnl 071108
Jvvnl 071108Jvvnl 071108
Jvvnl 071108
 
Routing & Switching report
Routing & Switching reportRouting & Switching report
Routing & Switching report
 
Hp nni installation guide
Hp nni installation guideHp nni installation guide
Hp nni installation guide
 
Pankaj_Joshi_Resume
Pankaj_Joshi_ResumePankaj_Joshi_Resume
Pankaj_Joshi_Resume
 
Software-Defined Networking(SDN):A New Approach to Networking
Software-Defined Networking(SDN):A New Approach to NetworkingSoftware-Defined Networking(SDN):A New Approach to Networking
Software-Defined Networking(SDN):A New Approach to Networking
 
SDN Fundamentals - short presentation
SDN Fundamentals -  short presentationSDN Fundamentals -  short presentation
SDN Fundamentals - short presentation
 
IRJET- Build SDN with Openflow Controller
IRJET-  	  Build SDN with Openflow ControllerIRJET-  	  Build SDN with Openflow Controller
IRJET- Build SDN with Openflow Controller
 
Juniper Unified SDN Technical Presentation (SDN Day ITB 2016)
Juniper  Unified SDN Technical Presentation (SDN Day ITB 2016)Juniper  Unified SDN Technical Presentation (SDN Day ITB 2016)
Juniper Unified SDN Technical Presentation (SDN Day ITB 2016)
 

Similar to Open Programmable Architecture for Java-enabled Network Devices

Secure Computing With Java
Secure Computing With JavaSecure Computing With Java
Secure Computing With Javawhite paper
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_AppajiAppaji K
 
08 sdn system intelligence short public beijing sdn conference - 130828
08 sdn system intelligence   short public beijing sdn conference - 13082808 sdn system intelligence   short public beijing sdn conference - 130828
08 sdn system intelligence short public beijing sdn conference - 130828
Mason Mei
 
Sdn pres v2-Software-defined networks
Sdn pres v2-Software-defined networksSdn pres v2-Software-defined networks
Sdn pres v2-Software-defined networks
ahmad abdelhafeez
 
Remote Web Desk
Remote Web DeskRemote Web Desk
Remote Web Desk
Satish Chandra
 
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET Journal
 
Network emulation with data rates
Network emulation with data ratesNetwork emulation with data rates
Network emulation with data rates
Packet Storm
 
SDN: A New Approach to Networking Technology
SDN: A New Approach to Networking TechnologySDN: A New Approach to Networking Technology
SDN: A New Approach to Networking Technology
IRJET Journal
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus Cloud
Swapna Shetye
 
Draft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | SlideshareDraft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | Slideshare
Selena829218
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
Shakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
Shakas Technologies
 
En35793797
En35793797En35793797
En35793797
IJERA Editor
 
Sdn primer pdf
Sdn primer pdfSdn primer pdf
Sdn primer pdf
Pooja Patel
 
Lecture 1 - Introduction.pptx
Lecture 1 - Introduction.pptxLecture 1 - Introduction.pptx
Lecture 1 - Introduction.pptx
aida alsamawi
 
How to use SDN to Innovate, Expand and Deliver for your business
How to use SDN to Innovate, Expand and Deliver for your businessHow to use SDN to Innovate, Expand and Deliver for your business
How to use SDN to Innovate, Expand and Deliver for your business
Napier University
 
TFI2014 Session I - State of SDN - John Giacomoni
TFI2014 Session I - State of SDN - John GiacomoniTFI2014 Session I - State of SDN - John Giacomoni
TFI2014 Session I - State of SDN - John Giacomoni
Colorado Internet Society (CO ISOC)
 
Privacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES AlgorithmPrivacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES Algorithm
IRJET Journal
 
Dattatray Resume
Dattatray ResumeDattatray Resume
Dattatray Resume
Dattatray Kamble
 
APManagement_FeatureGuide
APManagement_FeatureGuideAPManagement_FeatureGuide
APManagement_FeatureGuideEugene Yu
 

Similar to Open Programmable Architecture for Java-enabled Network Devices (20)

Secure Computing With Java
Secure Computing With JavaSecure Computing With Java
Secure Computing With Java
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_Appaji
 
08 sdn system intelligence short public beijing sdn conference - 130828
08 sdn system intelligence   short public beijing sdn conference - 13082808 sdn system intelligence   short public beijing sdn conference - 130828
08 sdn system intelligence short public beijing sdn conference - 130828
 
Sdn pres v2-Software-defined networks
Sdn pres v2-Software-defined networksSdn pres v2-Software-defined networks
Sdn pres v2-Software-defined networks
 
Remote Web Desk
Remote Web DeskRemote Web Desk
Remote Web Desk
 
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
 
Network emulation with data rates
Network emulation with data ratesNetwork emulation with data rates
Network emulation with data rates
 
SDN: A New Approach to Networking Technology
SDN: A New Approach to Networking TechnologySDN: A New Approach to Networking Technology
SDN: A New Approach to Networking Technology
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus Cloud
 
Draft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | SlideshareDraft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | Slideshare
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
En35793797
En35793797En35793797
En35793797
 
Sdn primer pdf
Sdn primer pdfSdn primer pdf
Sdn primer pdf
 
Lecture 1 - Introduction.pptx
Lecture 1 - Introduction.pptxLecture 1 - Introduction.pptx
Lecture 1 - Introduction.pptx
 
How to use SDN to Innovate, Expand and Deliver for your business
How to use SDN to Innovate, Expand and Deliver for your businessHow to use SDN to Innovate, Expand and Deliver for your business
How to use SDN to Innovate, Expand and Deliver for your business
 
TFI2014 Session I - State of SDN - John Giacomoni
TFI2014 Session I - State of SDN - John GiacomoniTFI2014 Session I - State of SDN - John Giacomoni
TFI2014 Session I - State of SDN - John Giacomoni
 
Privacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES AlgorithmPrivacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES Algorithm
 
Dattatray Resume
Dattatray ResumeDattatray Resume
Dattatray Resume
 
APManagement_FeatureGuide
APManagement_FeatureGuideAPManagement_FeatureGuide
APManagement_FeatureGuide
 

More from Tal Lavian Ph.D.

Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
Tal Lavian Ph.D.
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
Tal Lavian Ph.D.
 
Photonic line sharing for high-speed routers
Photonic line sharing for high-speed routersPhotonic line sharing for high-speed routers
Photonic line sharing for high-speed routers
Tal Lavian Ph.D.
 
Systems and methods to support sharing and exchanging in a network
Systems and methods to support sharing and exchanging in a networkSystems and methods to support sharing and exchanging in a network
Systems and methods to support sharing and exchanging in a network
Tal Lavian Ph.D.
 
Systems and methods for visual presentation and selection of IVR menu
Systems and methods for visual presentation and selection of IVR menuSystems and methods for visual presentation and selection of IVR menu
Systems and methods for visual presentation and selection of IVR menu
Tal Lavian Ph.D.
 
Grid proxy architecture for network resources
Grid proxy architecture for network resourcesGrid proxy architecture for network resources
Grid proxy architecture for network resources
Tal Lavian Ph.D.
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
Tal Lavian Ph.D.
 
Systems and methods for electronic communications
Systems and methods for electronic communicationsSystems and methods for electronic communications
Systems and methods for electronic communications
Tal Lavian Ph.D.
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
Tal Lavian Ph.D.
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
Tal Lavian Ph.D.
 
Radar target detection system for autonomous vehicles with ultra-low phase no...
Radar target detection system for autonomous vehicles with ultra-low phase no...Radar target detection system for autonomous vehicles with ultra-low phase no...
Radar target detection system for autonomous vehicles with ultra-low phase no...
Tal Lavian Ph.D.
 
Grid proxy architecture for network resources
Grid proxy architecture for network resourcesGrid proxy architecture for network resources
Grid proxy architecture for network resources
Tal Lavian Ph.D.
 
Method and apparatus for scheduling resources on a switched underlay network
Method and apparatus for scheduling resources on a switched underlay networkMethod and apparatus for scheduling resources on a switched underlay network
Method and apparatus for scheduling resources on a switched underlay network
Tal Lavian Ph.D.
 
Dynamic assignment of traffic classes to a priority queue in a packet forward...
Dynamic assignment of traffic classes to a priority queue in a packet forward...Dynamic assignment of traffic classes to a priority queue in a packet forward...
Dynamic assignment of traffic classes to a priority queue in a packet forward...
Tal Lavian Ph.D.
 
Method and apparatus for using a command design pattern to access and configu...
Method and apparatus for using a command design pattern to access and configu...Method and apparatus for using a command design pattern to access and configu...
Method and apparatus for using a command design pattern to access and configu...
Tal Lavian Ph.D.
 
Reliable rating system and method thereof
Reliable rating system and method thereofReliable rating system and method thereof
Reliable rating system and method thereof
Tal Lavian Ph.D.
 
Time variant rating system and method thereof
Time variant rating system and method thereofTime variant rating system and method thereof
Time variant rating system and method thereof
Tal Lavian Ph.D.
 
Systems and methods for visual presentation and selection of ivr menu
Systems and methods for visual presentation and selection of ivr menuSystems and methods for visual presentation and selection of ivr menu
Systems and methods for visual presentation and selection of ivr menu
Tal Lavian Ph.D.
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
Tal Lavian Ph.D.
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
Tal Lavian Ph.D.
 

More from Tal Lavian Ph.D. (20)

Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Photonic line sharing for high-speed routers
Photonic line sharing for high-speed routersPhotonic line sharing for high-speed routers
Photonic line sharing for high-speed routers
 
Systems and methods to support sharing and exchanging in a network
Systems and methods to support sharing and exchanging in a networkSystems and methods to support sharing and exchanging in a network
Systems and methods to support sharing and exchanging in a network
 
Systems and methods for visual presentation and selection of IVR menu
Systems and methods for visual presentation and selection of IVR menuSystems and methods for visual presentation and selection of IVR menu
Systems and methods for visual presentation and selection of IVR menu
 
Grid proxy architecture for network resources
Grid proxy architecture for network resourcesGrid proxy architecture for network resources
Grid proxy architecture for network resources
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Systems and methods for electronic communications
Systems and methods for electronic communicationsSystems and methods for electronic communications
Systems and methods for electronic communications
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Radar target detection system for autonomous vehicles with ultra-low phase no...
Radar target detection system for autonomous vehicles with ultra-low phase no...Radar target detection system for autonomous vehicles with ultra-low phase no...
Radar target detection system for autonomous vehicles with ultra-low phase no...
 
Grid proxy architecture for network resources
Grid proxy architecture for network resourcesGrid proxy architecture for network resources
Grid proxy architecture for network resources
 
Method and apparatus for scheduling resources on a switched underlay network
Method and apparatus for scheduling resources on a switched underlay networkMethod and apparatus for scheduling resources on a switched underlay network
Method and apparatus for scheduling resources on a switched underlay network
 
Dynamic assignment of traffic classes to a priority queue in a packet forward...
Dynamic assignment of traffic classes to a priority queue in a packet forward...Dynamic assignment of traffic classes to a priority queue in a packet forward...
Dynamic assignment of traffic classes to a priority queue in a packet forward...
 
Method and apparatus for using a command design pattern to access and configu...
Method and apparatus for using a command design pattern to access and configu...Method and apparatus for using a command design pattern to access and configu...
Method and apparatus for using a command design pattern to access and configu...
 
Reliable rating system and method thereof
Reliable rating system and method thereofReliable rating system and method thereof
Reliable rating system and method thereof
 
Time variant rating system and method thereof
Time variant rating system and method thereofTime variant rating system and method thereof
Time variant rating system and method thereof
 
Systems and methods for visual presentation and selection of ivr menu
Systems and methods for visual presentation and selection of ivr menuSystems and methods for visual presentation and selection of ivr menu
Systems and methods for visual presentation and selection of ivr menu
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 

Recently uploaded

Cyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber securityCyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber security
perweeng31
 
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
PinkySharma900491
 
web-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jerweb-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jer
freshgammer09
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
kywwoyk
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
eemet
 
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
kywwoyk
 
F5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptxF5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptx
ArjunJain44
 
Drugs used in parkinsonism and other movement disorders.pptx
Drugs used in parkinsonism and other movement disorders.pptxDrugs used in parkinsonism and other movement disorders.pptx
Drugs used in parkinsonism and other movement disorders.pptx
ThalapathyVijay15
 
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
Amil baba
 

Recently uploaded (9)

Cyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber securityCyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber security
 
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
 
web-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jerweb-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jer
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
 
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
 
F5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptxF5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptx
 
Drugs used in parkinsonism and other movement disorders.pptx
Drugs used in parkinsonism and other movement disorders.pptxDrugs used in parkinsonism and other movement disorders.pptx
Drugs used in parkinsonism and other movement disorders.pptx
 
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
 

Open Programmable Architecture for Java-enabled Network Devices

  • 1. Tal Lavian August , 1999_ Hot Interconnects, Stanford 1 Open Programmable Architecture for Java-enabled Network Devices Page 1 Open Programmable Architecture for Java-enabled Network Devices Tal Lavian, Nortel Networks - Advanced Technology Center Robert F. Jaeger, University of Maryland Jeffrey K. Hollingsworth, University of Maryland Keywords: Open Architecture, Programmable Networks, Java-enabled Networking, JVM, Active Networks, Mobile Agents, Intelligent Agents. 1 Overview Current network devices enable connectivity between end systems given a set of protocol software bundled with vendor hardware. It is impossible for customers to add software functionality running locally on top of network devices to augment vendor software. Our vision is to open network devices so that customized software can be downloaded, allowing for more flexibility and with a focus on industry and customer specific solutions. This brings considerable value to the customer. We have chosen to use Java because we can reuse its security mechanism and dynamically download software. We can isolate the Java VM and downloaded Java programs from the core router functionality. We implemented Java Virtual Machines (JVMs) on a family of network devices, implemented an Open Services framework, and developed an SNMP MIB API and a Network API upon which we can demonstate the value of openness and programmability of network devices. 2 Open Network Services 2.1 New Programmable Paradigm We are entering a new era where servers, switches, and routers are participating in applications. The IEEE P1520 recognized the need for a software infrastructure for programming networks and has initiatives which propose standard APIs to networking devices. [28-29]. Programmable network technology allows dynamic downloading of software programs to network devices and moving intelligence to these devices. Downloading software enables customized application level computational interconnectivity between servers and network devices as well as among network devices. Programmable networks is an enabling technology for a new type of distributed applications that are not technically possible today.
  • 2. Tal Lavian August , 1999_ Hot Interconnects, Stanford 1 Open Programmable Architecture for Java-enabled Network Devices Page 2 2.2 PC-ifications of Programmable Devices In network devices like switches and routers, the software and the hardware are bundled and not openly programmable. We have created an Open Service Architecture that allows dynamic downloading of programs to theses devices. Our vision is that network devices will be open like software for PCs. For example, we buy software and hardware for PCs from different vendors, and then we install and customize the software on the computer. Network devices like switches and routers are also computers of a different type. We have implemented programmability characteristics on these types of computers like the PCs so that additional functionality can be provided to these devices. 2.3 Enabling Technology Now, we are able to securely download and run Java applications on network devices. We can distribute the intelligence to network devices for close-loop interaction on the nodes. This allows for new types of applications that were not possible until now because of scalability issues. We have implemented technology that allows for a class of downloadable applications which are not bundled with the vendor hardware including enhanced multicast services, application level filtering, and mobile/intelligent agents [4] [13] [17]. The platform supports the Active Networking reference architecture upon which multiple non- interfering Execution Environments can run concurrently [2-7] [9] [12] [14-18] [25]. Operating systems for computers have recently been developed to allow user customization of services and policies. Exokernel[1]] and Spin[8] provide new kernel architectures to support safety and extensibility. 2.4 Static Agent vs. Dynamic Agents Usually, we are managing network devices via “get” and “set”, as static requests to SNMP agents. Having a dynamic agent on the device opens us to a new set of applications. Instead of external SNMP requests, we can download software that use SNMP calls via an internal device loop. The direction is to open network devices to 3rd party developers. To facilitate this, we have created an Open Service Interface[26] using Java with additional security mechanisms. The interface opens the network devices to 3rd party vendors and allow other domain experts to add value to network devices. Java has taken the computer world by storm. However, it is mainly used by client s and servers for browser and business applications. Until now, Java did not run on the network devices.
  • 3. Tal Lavian August , 1999_ Hot Interconnects, Stanford 1 Open Programmable Architecture for Java-enabled Network Devices Page 3 2.5 New type of Applications We can add value to network infrastructure by allowing tight code interaction between business applications and network devices. This new paradigm allows a new type of distributed applications between servers and swiches/routers. All software in the applications can be dynamically loaded on to the servers and network devices. 2.6 Domain Experts Domain experts that work closely with customers know the problems the customer faces and may bring ideas from other business domains to the development of solutions. Allowing 3rd party experts to write custom applications allows for innovative solutions to customer business requirements. 2.7 Feature-on-demand Java beans with specific plug-in features can be developed and released quickly providing feature-on-demand capability to address changing customer needs. This approach circumvents the need for vendor support to add customer desired capabilities to network devices and avoids the need for the customer to wait for new features from the vendor in order to realize capabilities. Also, features can be ported quickly to other products implementing the Open Service Interface. 3 Open Architecture 3.1 What have we implemented? We have implemented JVMs on the Nortel Networks Routing and L3 Routing Switch family of products. We can securely download and safely run Java applications on these devices and access native code running on these devices [1]. We developed an architecture that allows for downloading of new code to implement desired features. We developed several APIs including an SNMP API and a Network API. The SNMP API allows reading and writing of MIB variables [27]. The Network API allows Java applications to control the hardware based forwarding and selection of packets to be delivered to Java applications based on packet signatures. Consequently, our network devices are programmable allowing for customers to safely run dynamically downloaded Java code to realize additional functionality. 3.2 Scalability Network Management via SNMP suffers scalability in applications with massive close- loop interactions. For example, assume an NMS application that monitors some network device parameters. Lets assume that we want to gather information on 10 parameters per port on a device with 100 ports and we want to sample 100 times per second. These types of applications are not practical in the current SNMP model of centralized management. Current technology like RMON provides an interface to allow network devices to collect statistics locally. It is restricted to a set of predefined types of data that can be collected and it does not address the scalability problem.
  • 4. Tal Lavian August , 1999_ Hot Interconnects, Stanford 1 Open Programmable Architecture for Java-enabled Network Devices Page 4 We overcome these limitations in our distributed intelligence approach. The data samples are local calls with no need for SNMP call for each sample. The NMS will be notified only when needed based on thresholds or trends. This allows an intelligent event notification mechanism rather than a polling mechanism. 3.3 Security Computer networks have become vital to businesses. It is critical that the network functions properly and a loss of operation is not tolerable. To allow the openness that we are proposing, we needed to implement a strong security architecture. Security is a key component of the Open Service Interface architecture. It includes security for downloadable applications and for the device’s code interface. In addition to the Java language security features, the architecture provides additional security including digital signatures and code certification. 3.4 The JVM Implementing a JVM for embedded and real-time environments presents several challenges. Such environments are especially concerned with reliability, determinism, and restricted memory. It is also crucially important that new Java programs must work without disturbing the existing non-Java functionality. Our JVM design satisfies these requirements by encapsulating the JVM into one framework. This JVM manages the Java threads and their memory usage within this framework and presents one unified task to the RTOS. The Open Services Architecture was designed to insulate core router functionality from Java and JVM failures. Even if the JVM crashes, the router remains operational. 3.5 But Java is SLOW Java has often been criticized for its speed and its use in a routing device has been questioned. With the advent of ASIC technology for fast path data forwarding engines that achieve Gigabit forwarding rates, no serious routing platform is based on a software forwarding engine. An active network platform that touches all network packets is doomed to fail. However, control and management applications are well suited for Java based network services locally on the network device as well as active applications which don't require high packet per second rates to operate. 3.6 Java MIB API The goal is to provide an interface that transparently gives access to the SNMP data, while hiding the SNMP machinery of PDUs, object identifiers and table iterations. The MIB gives a fairly object-oriented model to the data, which fits quite naturally onto Java class decomposition. The MIB is structured as a collection of groups, with each group containing a number of variables. Each group is modeled as a Java class, and each variable is modeled with accessory methods.
  • 5. Tal Lavian August , 1999_ Hot Interconnects, Stanford 1 Open Programmable Architecture for Java-enabled Network Devices Page 5 3.7 Inter-operating with SNMP MIB Compiler There are a large number of variables in the MIB and it is tedious and error prone to generate the Java bindings for them all by hand. To automate the binding, we provide a MIB compiler that takes the standard ASN.1 textual representation of the MIB and generates the necessary Java code. This approach is similar to other mibgen tools and results in a Java API which represents the MIB tree. Javadoc pages document the Java MIB API that results from the input MIB definition. An incremental strategy for MIB variable access is the result of this research. MIB variables are queried and set by constructing SNMP PDUs that are sent to the loopback interface of the device and delivered to the underlying SNMP stack. This approach allows us to evolve from the loopback strategy by incrementally adding direct low-level implementations of selected time-critical methods. 4 Applications Examples 4.1 Close-loop Applications Creating a closed-loop mechanism on the device itself allows for the development of tight local management applications. We can develop applications utilizing tight interactions with the traffic pattern and the device capabilities. We can move some of the intelligence of NMS and policy servers to the network devices. This allows for new types of applications that are not feasible with centralized management schemes. 4.2 Example 1: Interactions with Business Applications Currently, business applications are running on servers and networking applications are running separately on network devices. There is very limited interconnection at the application level. Downloading and running Java applications on network devices enables collaborations between network devices and applications running on other servers. Business applications can take advantage of distributed computing in an environment consisting of applications running on network devices which leverage the local-loop directly on the device. For instance, an electronic auctioning service can use routers to filter bids which are no longer acceptable given that the bid price has already been surpassed [10]. Another application can dynamically configure the output priority queues on the network device as part of the application needs. 4.3 Example 2: Interactions with other network devices Currently, network devices interact using a pre-defined set of protocols bundled with the hardware. There are no interactions or sharing variables that is not within the confines of bundled vendor software. In the Open Service Interface architecture, network devices can run non-bundled distributed applications that interact at the application layer with applications running on other devices. For example, a community of routers can make a dynamic configuration decision based on bottlenecks or load. The decision making process can be done as part of a distributed application within this community.
  • 6. Tal Lavian August , 1999_ Hot Interconnects, Stanford 1 Open Programmable Architecture for Java-enabled Network Devices Page 6 4.4 Example 3: Mobile Agents The architecture provides a platform for mobile agent technology. Mobile agents to perform information gathering such as L2 connectivity or traceroute are made possible through the Network API. The mobile agent performs some work on the local device and moves to the next device to continue the work. For example, roaming diagnostic agents can gather performance information along the path from a client to the server. This mobile agent can identify and even solve problems along the network path. 4.5 Example 4: Active Networks By developing an Open Services Interface, we provide a platform upon which Active Networking Execution Environments (EEs) can be hosted. We allow for running Java- based EEs as services on the router that can host active applications downloaded in the Active Network Encapsulation Protocol for distribution to EEs. 4.6 Example 4: Local QoS implementation Instead of configuring the QoS mechanisms from remote station, we can do it locally on the network device. For example, we can monitor locally the traffic patterns and configure the QoS parameters based on policy that is pushed to the device as an application. 5 Conclusion We are entering a new era where servers, switches, and routers participate in networking applications. This is a powerful new technology that enables dynamic downloading of end-user applications. We provide an open set of network services upon which new applications can be built to customize the behavior of network devices as well as management networks. We provide tools to developers enabling them to use their domain expertise to create solutions to specific business challenges. Introducing domain expertise into the development process creates a virtual community of developers that can bring innovation to networking customers. The Nortel Open Service Interface functional prototype implements this enabling- technology which is the foundation of this paradigm shift. The ability to download dynamic agents to network devices is much more powerful than the current use of static agents. Dynamic program loading into the switching and routing elements of a network bring new opportunities for configuring and managing large, complex, and high performance networks. Pushing intelligence into the network elements themselves solves the scalability problems inherent in a centrally managed network. 6 References   ¡ ¢ £ ¤ ¥ ¦ § ¨ © © ¤ © § © ¨ ¤ ! § © # $ ¨ # % ! # © § $ © ' ¦ $ # ( § ) ¦ 0 1 2 3 4 5 2 6 2 3 7 8 9 4 8 6 @ A 4 B C D E F E G H I I P Q R S R T U U V I W X Y Q ` I a b c d e f b g h b i p q r s a a a t u g v f p d w g f b x e f y e € g g d b y  € b y w € y h p ‚ f e ƒ h € „ … † ‡ ˆ ‰  ‘ ’ “ ” † • ‡ – — ˜ ™ ™ — ‡ d – † ‡ e ‘ ” f g h i j  ˜ k l m n o p q r s t r u v w q t x u y z { | } ~  | €  ‚ ƒ „ „ … † ‡ ˆ ‰ Š … ‹ Œ  Ž   ‹ … ‘ ’ “ „ … † ‡ ˆ ‰ ” Ž • ‡ ‹ – — ˜ ‡ ‰ ’ ‡ ˜  –  ˜ — •  … Ž ™ “ š ‘ Ž ‡ › œ “ ›   
  • 7. Tal Lavian August , 1999_ Hot Interconnects, Stanford 1 Open Programmable Architecture for Java-enabled Network Devices Page 7 ž Ÿ   ¡ ¢ £ ¤ ¥ ¦ § ¦ £ ¨ © ª « ¬ ­ ® ¯ ° ± ² ³ ´ ¯ ® µ ¶ · ¸ ¹ ¯ º » ± ¼ ½ º ¼ µ ¯ ¾ ¿ À ¯ ¾ Á ½  ® ¯ ° à ® ¯ ¹ º ¼ ± Ä ½ Å ½ ¼  ® ¯ ° Æ Ç ½ ¯ Æ ± ® ² È É Ê ¸ · ¹ µ ³ µ Æ ¼ Ë Ì · Ì Ê Ê Ê Í Î Ï Ð Ñ Ò Ó Ô Õ Ó Ö × Ø Ø Ó Ô × Ø Ñ Ù Ú Û Ü Ý Ù Û Þ Þ Ø ß à Ô á Þ Ö â ã à Ø ä à å æ × å ä Ð ç å × è à é × Ø Ø ç Ð Ó ê Ø Þ ç à å æ Ú Ó Ô ë Þ Ö ß ì Ö Þ Ô Þ é Þ Ø í Ñ î ì ï Ú Ù ð Ù ñ ò ó ô õ ö ÷ ø ù ú û ü ý þ þ ý ÿ ü ý   ¡ ¢ ¢ ¢ þ ý £ ú ¤ ¥ ¦ ÿ þ § ¨ ¢ © ¢ þ   § ¥ ý ¥ ¥ ¢ þ § ¥ ú ¢ ÿ ü ¥ § ÿ ý £ ¢   þ ! # $ % ' ( ) 0 1 1 2 3 2 0 4 ) 0 5 6 7 8 9 @ 3 ( A 2 0 B 3 9 C D @ E 8 9 8 7 8 2 0 4 F 2 G H @ 0 1 0 3 I ( P # # $ Q R $ S T Q U Q F 2 @ @ 2 @ H 0 7 E 2 C @ V T Q W 2 8 H 2 B C 1 1 Q F 0 X C B V E C @ C G 8 9 Y 2 @ 2 8 X 0 B ` C B G H 9 8 2 G 8 7 B 2 Q D @ a 7 1 8 9 5 2 V 9 C ) 0 5 6 7 8 9 @ 3 C @ V b 2 8 X 0 B ` 9 @ 3 # $ ( c C @ d 0 E 2 ( ) e ( d C @ P # # $ Q f g h i p i q r s t s u t v w p v u w s x y u p €  ‚ u ƒ v „ … ƒ  † ƒ u r r u ‡ x q ˆ q ‰ ‚  ƒ  „ p ‘ t ‘ ’ ‘ … “ ‘ ” ” ” ‘ t ‰ x p •  ƒ  „ –  —  t ˜ s „ ‰ ƒ s ‡ ™ ‰ q v w d „ ‰ q r „ e f — q ƒ u ‰ s  t „ u t v g u t u † q r q t ‰ h i j j k p l m n o p o q r s t u v q w u x p y z w q { s | } | x | w ~  € u  q w ~ u { v ‚ q r  ƒ r „ u { … q | { w t q € ‚ † ‡ ˆ ‰ q r u w | { Š € ~ s w q „ p † { ‹ Œ w t € ~ „ ‰ p ƒ { ˆ ‰ q r u w | { Š € ~ s w q „ s ‚ r | { … | ‰ x q s   q … p ‹ Ž Ž Œ p   ‘ ’ “ ’ “ ” • – — ˜ ™ ’ “ š “ › œ   œ  ž Ÿ   ¡ œ “ ¢ — £ ž ¤ ¥ œ £ ¥   — – • ” Ÿ  ¡ ¤ ¦ œ — – ¥ ¤ Ÿ  ¡ § Ÿ — – ¨ œ © ª œ  œ — – ¥ ¤ Ÿ  Ÿ § « — Ÿ ¥ Ÿ £ Ÿ • ¡ “ ¬ ­ ª ” ® ¯ ¯ °  ± ² ³   ± “  ³ ± ‘ œ ´ – µ ­  £ “ ¢   £ ¥ ¤ Ÿ  ¶ œ · ¡ œ — ¸ œ — “ ž ¥ ¥ ¹ º » » © © © “ œ · – µ “ £ Ÿ ¼ » ½ ¾ ¿ ¿ À Á ½  ½ Ã Ä Å Æ Ç È Ç É Ê Æ ½ Ã Ë Ì Í Ç È Ä Ç Æ Î Ï Ä Ð Ñ Ç È Ê É Ò Ä Å Ó Ô Õ É Ç Ö Ï È × Ø Ò É Ç × É Ù È Ç Ú Ì È Ï Ñ Ñ Æ Ò × Ê É Ò Ì Ä Û Ü Ç Ý Ç Æ Â Ç Õ Ì Ù È × Ç Þ Ê Ä Ê Å Ç Ö Ç Ä É ½ ß Ä ¿ à É Ø Ó Ô Ö Ñ ½ Ì Ä Ð Ñ Ç È Ê É Ò Ä Å Ó Ô Õ É Ç Ö Õ á È Ò Ä × Ò Ñ Æ Ç Õ â ¿ ã ã à ½ ä å æ ç è é ê é ë ì í î ï ð ñ ò ó ì ô ñ õ ö é ÷ é ö ø ù ò ú ô õ é û ñ ø ü ý ø ñ ò ì þ ÿ ø   ù ¡ ý ¡ î ¡ ÿ ô ù î ú ì ý ø î ý í ù ø ¢ ¡ ù ô     ÿ ì î ô ý ì ¡ ñ £ ò   ø î ¢ ì î ñ ø ý ¤ ¡ ù ó ì ñ ¥ é ¦ § ¨ © ¨ ! § # $ % ' ( ) ¨ § © 0 ! 1 2 3 4 $ 1 5 6 ¨ 7 8 6 1 9 @ 6 8 A 6 B C 6 © 8 5 § 8 D E ¨ § F ¨ § G H E $ ¨ 8 9 I I 6 © 8 ¨ G P 6 5 § 8 D 1 9 ) B $ ' Q ) R B B S T 0 T 1 2 U 4 G 1 H 1 G D 8 8 6 1 9 © P @ 6 8 A 6 B C 6 © 8 1 0 ' 5 R ) R B S V 0 V 1 2 T 4 9 1 B 8 6 6 8 6 1 R I § 8 $ 7 D $ C I I ¨ § ¨ § ¦ § ¨ ¨ © ¨ 6 W ¨ ¨ § 1 X © © 8 6 @ I ¨ § B $ H ) ' $ H ! H 3 0 ) ' $ Y I 1 0 # P 1 ¨ ¦ 7 6 P 8 8 0 ! 1 2 ! 4 ` 1 $ D 8 6 1 $ E © 8 § 9 © © 6 § 8 E ¨ § F % P ¨ 6 C ¨ 1 X © © 8 6 @ I ¨ § B $ H ) ' $ H ! H 3 V 0 ) ' $ Y I 1 0 # P 1 ¨ ¦ 7 6 P 8 8 0 B 8 7 ! 1 2 a 4 Y 1 X ¨ C 8 6 1 9 $ C § P 7 ¨ 9 © P E ¨ § F @ 8 § © 1 ' % % % ) ¨ D D C © 8 ¨ B 8 8 b 0 a 1 2 V 4 Y 1 G 1 X ¨ C 8 Y 1 § 8 6 6 1 X ¨ E 8 § 8 8 © P E ¨ § F 8 § © © C § 1 ' B C 6 D 8 ) ¨ D I C 8 E ¨ § F ! 0 $ 8 ` ¨ 0 ) 9 0 ` 8 ! 1 2 c T 4 ` ¨ 8 8 $ D 0 8 6 0 9 © P 8 E ¨ § F d 9 ¦ § ¨ § @ I ¨ § 0 ) R B ¦ # % @ 0 9 I § 6 1 2 c ! 4 X 1 G 8 P 8 0 $ 1 G 8 C 0 e ` 8 P 8 H W 8 R I $ § P © ' § 8 © 0 f W 8 7 9 § © © C § G 8 A X @ V H g g 1 B 8 § © 3 g 0 V 0 W 8 7 E ¨ § F 1 W 9 G E A d I d h i p q r s t u v w x y €  ‚ ƒ q r „ u v … q t i † q w w y i t x ‡ € i ˆ ‡ u ‰ x ‚ …  v … ‘ ‡ i ’ “ ’ … q r ‰ ’ x r …  † x w ’ ˆ q … u  x r  ” • – — ˜ ™ d e f g h f i j k h l m h f i ˜ ™ k n n i o p q r e ™ s o h l h t u n f v w x y x z { | y z ™ } { h ~ |  g q m € n g € e  n k h  j ˜ ‚ ƒ „ … † ƒ ™ d n g n ‡  n  ˆ ‚ ‚ ƒ ™ ” • ƒ — z ‰ ‰ ‰ y ˆ Š • … ˜ n ‹ n  n f g n x r Œ n  i Ž Ž Ž ™ m n n n „ u m f ™ r   ” • ‚ — { m  Ž h  i o ™ i k h ‘ h  i | ™ | ™ i ’ e h  Œ o ™ „ “ ” • – — ˜ • ™ ” • š › œ  ž Ÿ   ¡ ” • ¢ › Ÿ – ” £ “ ” • ¡ Ÿ ¤ Ÿ ¥ — • š ” • ¦ ž § ¨ © ª « ¨ ¨ ž « ¡ ” • ¬ › « ­ ¬ ” › « ® ¬ ª — « ¨ © ª — « ¡ ” ¯ ¦ œ ª ° ± ± ± ¢ ² ³ ´ µ ¡ © › « ® › § ® ¨ ° « — © — › © — ¶ ª · ž § ¢ § ž ­ § › ˜ ˜ ›   ¸ ª ¹ ª © º ž § ¥ ° « © ª § · › » ª ¨ ¼ • ° ± ± ± ½ ž ˜ ˜ Ÿ « — » › © — ž « ¨ š › ­ › ¤ — « ª • ¾ ž ¸ ¿ À ”