The document discusses the ISO-OSI 7-layer reference model and related IEEE standards. It covers the purpose and functions of each layer, including the physical, data link, network, transport, session, presentation and application layers. It also describes how data is formatted and encapsulated as it passes through each layer. Finally, it discusses the IEEE 802 standards group and some of the key standards they developed that apply to networking, particularly at the data link and physical layers.
RINA motivation, introduction and IRATI goals. IEEE ANTS 2012Eleni Trouva
The document discusses the Recursive InterNetwork Architecture (RINA) and the IRATI research project. RINA is a new networking architecture that aims to address shortcomings of the current TCP/IP model such as issues with multihoming and mobility. The IRATI project from 2013-2015 will research and implement RINA prototypes to evaluate its capabilities. It will develop policies to support dynamic creation of Distributed I/O Functions (DIFs) across multiple datacenters and clouds. The goal of RINA is to provide a more flexible and robust networking model compared to the current TCP/IP architecture.
The Challenges of SDN/OpenFlow in an Operational and Large-scale NetworkOpen Networking Summits
Jun Bi
Professor & Director
Tsinghua University
Outline
• Intra-AS (campus level) IPv6 source address validation using OpenFlow (with extension)
– Good for introducing new IP services to network
• Planning next step if we run SDN as a common infrastructure for new services and architectures
– Some personal viewpoints and thoughts on design challenges
– Forwarding abstraction for Post-IP architectures
– Control abstraction for scalable NOS and programmable/manageable virtualization platform
– Inter-AS policies negotiation abstraction
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
The document discusses the importance of taking a top-down approach to network design that begins by analyzing business goals and constraints. It emphasizes understanding the applications used, data flows, and user needs before designing network structures and selecting technologies. The key steps involve gathering information on business priorities, technical requirements, and the existing network, then developing logical and physical network models to meet the identified needs.
This is a presentation on a research work we had done on software defined networking. It involves improving data plane processing in SDN networks by embedding application-level intelligence
This document discusses the ISO-OSI 7-layer reference model and related IEEE standards. It provides an overview of the ISO-OSI model, describing the 7 layers and their functions. It also describes some of the major IEEE 802 committees and their responsibilities in setting standards related to the lower two OSI layers of data link and physical. These standards apply to areas like network cards, cables, and wireless communication protocols.
The document discusses the OSI reference model, which defines 7 layers for network communications: Physical, Data Link, Network, Transport, Session, Presentation, and Application. It describes the functions of each layer, such as the Physical layer handling signals and the Data Link layer organizing bits into frames. The OSI model enables different networks and devices to communicate by standardizing how layers interact, with each layer adding information and passing data to the next layer.
The document discusses how application architects traditionally focused on solving IO bottlenecks in servers by offloading processing to intelligent network interface cards. With modern distributed applications spanning thousands of servers, application architects now must consider network topology, segmentation, and control plane protocols to optimize latency and bandwidth. The rise of virtualization and cloud computing has changed traffic patterns in datacenters from north-south traffic to dominant east-west traffic between servers. This requires new datacenter fabric designs beyond the traditional three-tiered topology.
The document discusses the ISO-OSI 7-layer reference model and related IEEE standards. It covers the purpose and functions of each layer, including the physical, data link, network, transport, session, presentation and application layers. It also describes how data is formatted and encapsulated as it passes through each layer. Finally, it discusses the IEEE 802 standards group and some of the key standards they developed that apply to networking, particularly at the data link and physical layers.
RINA motivation, introduction and IRATI goals. IEEE ANTS 2012Eleni Trouva
The document discusses the Recursive InterNetwork Architecture (RINA) and the IRATI research project. RINA is a new networking architecture that aims to address shortcomings of the current TCP/IP model such as issues with multihoming and mobility. The IRATI project from 2013-2015 will research and implement RINA prototypes to evaluate its capabilities. It will develop policies to support dynamic creation of Distributed I/O Functions (DIFs) across multiple datacenters and clouds. The goal of RINA is to provide a more flexible and robust networking model compared to the current TCP/IP architecture.
The Challenges of SDN/OpenFlow in an Operational and Large-scale NetworkOpen Networking Summits
Jun Bi
Professor & Director
Tsinghua University
Outline
• Intra-AS (campus level) IPv6 source address validation using OpenFlow (with extension)
– Good for introducing new IP services to network
• Planning next step if we run SDN as a common infrastructure for new services and architectures
– Some personal viewpoints and thoughts on design challenges
– Forwarding abstraction for Post-IP architectures
– Control abstraction for scalable NOS and programmable/manageable virtualization platform
– Inter-AS policies negotiation abstraction
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
The document discusses the importance of taking a top-down approach to network design that begins by analyzing business goals and constraints. It emphasizes understanding the applications used, data flows, and user needs before designing network structures and selecting technologies. The key steps involve gathering information on business priorities, technical requirements, and the existing network, then developing logical and physical network models to meet the identified needs.
This is a presentation on a research work we had done on software defined networking. It involves improving data plane processing in SDN networks by embedding application-level intelligence
This document discusses the ISO-OSI 7-layer reference model and related IEEE standards. It provides an overview of the ISO-OSI model, describing the 7 layers and their functions. It also describes some of the major IEEE 802 committees and their responsibilities in setting standards related to the lower two OSI layers of data link and physical. These standards apply to areas like network cards, cables, and wireless communication protocols.
The document discusses the OSI reference model, which defines 7 layers for network communications: Physical, Data Link, Network, Transport, Session, Presentation, and Application. It describes the functions of each layer, such as the Physical layer handling signals and the Data Link layer organizing bits into frames. The OSI model enables different networks and devices to communicate by standardizing how layers interact, with each layer adding information and passing data to the next layer.
The document discusses how application architects traditionally focused on solving IO bottlenecks in servers by offloading processing to intelligent network interface cards. With modern distributed applications spanning thousands of servers, application architects now must consider network topology, segmentation, and control plane protocols to optimize latency and bandwidth. The rise of virtualization and cloud computing has changed traffic patterns in datacenters from north-south traffic to dominant east-west traffic between servers. This requires new datacenter fabric designs beyond the traditional three-tiered topology.
Grid optical network service architecture for data intensive applicationsTal Lavian Ph.D.
Integrated SW System Provide the “Glue”
Dynamic optical network as a fundamental Grid service in data-intensive Grid application, to be scheduled, to be managed and coordinated to support collaborative operations
From Super-computer to Super-network
In the past, computer processors were the fastest part
peripheral bottlenecks
In the future optical networks will be the fastest part
Computer, processor, storage, visualization, and instrumentation - slower "peripherals”
eScience Cyber-infrastructure focuses on computation, storage, data, analysis, Work Flow.
The network is vital for better eScience
This document describes a thesis that proposes a model-based design flow for developing networked embedded systems. The design flow uses the BIP framework to construct system-level models at different levels of abstraction and apply BIP tools for verification and performance evaluation. It also uses code generation for rapid prototyping. The flow aims to provide automated code generation for hardware architectures, construction of faithful system models, and system-level performance evaluation. The thesis applies this design flow on case studies from domains like automotive, industrial automation, and wireless sensor networks.
Application-Aware Acceleration for Wireless Data Networks: Design Elements an...Zhenyun Zhuang
This document discusses an approach called Application-Aware Acceleration (A3) to improve application performance over wireless networks. It finds that while transport layer protocols improve performance for FTP, they provide little benefit for other applications like CIFS, SMTP, and HTTP due to the applications' behaviors. A3 addresses this by using principles like transaction prediction, prioritized fetching, and redundant transmissions to offset applications' typical problems when used over wireless networks. The document presents the motivation and design of A3, and evaluates its effectiveness through emulations and a proof-of-concept prototype using NetFilter.
Common Design Elements for Data Movement Eli DartEd Dodds
Eli Dart, Network Engineer ESnet Science Engagement Lawrence Berkeley National Laboratory Cosmology CrossConnects Workshop Berkeley, CA February 11, 2015
ET3003-2 OSI-TCPIP (Semester II 2013-2014)Tutun Juhana
The document provides an overview of the OSI model and TCP/IP protocol suite for computer networks. It discusses that while the OSI model was intended as a standard, TCP/IP became the dominant model used on the internet. It then describes each layer of the OSI model and its functions. It also summarizes the layers of the TCP/IP protocol suite and how they compare to the OSI layers. Key areas like addressing, encapsulation, and the roles of different address types are also summarized.
RestThing: A Restful Web Service Infrastructure for Mash-up Physical and Web ...Weijun Qin
The document describes RestThing, a RESTful web service infrastructure for integrating physical and web resources. It proposes using REST principles to provide interfaces to heterogeneous physical devices. The key components of RestThing include RESTful APIs, an adaptation layer to handle differences in devices, resources that represent devices and web information, a service provider for accessing resources, and applications that can mash up physical and web resources. The document outlines a prototypical implementation of RestThing using a wireless sensor network, RESTful gateway, and Android application to demonstrate physical-virtual integration.
This document provides an overview of software-defined networking (SDN). It defines SDN as a concept that separates the control plane and data plane in network devices to make network implementation, scalability, and management easier. The document discusses SDN concepts like the OpenFlow protocol, SDN controllers, network applications, and SDN architectures. It also covers SDN use cases and challenges, such as scalability issues and ensuring security in SDN environments.
The document provides an overview of software-defined networking (SDN) fundamentals, including:
- In traditional networks, the control plane and data plane are logically coupled within each network device, whereas SDN separates these planes and centralizes the control plane in an SDN controller.
- The SDN controller holds the entire network description as a graph and can perform optimization calculations. It programs flow entries into forwarding devices using the OpenFlow protocol.
- OpenFlow defines a standard interface that gives access to the forwarding plane of network switches or routers. It separates the data and control planes and allows the control logic to be implemented separately in the SDN controller.
Enabling active flow manipulation in silicon-based network forwarding enginesTal Lavian Ph.D.
A significant challenge arising from today’s increasing Internet traffic is the ability to flexibly incorporate intelligent control in high performance commercial network devices. This paper tackles this challenge by introducing the Active Flow Manipulation (AFM) mechanism to enhance traffic control intelligence of network devices through programmability. With AFM, customer network services can exercise active network
control by identifying distinctive flows and applying specified actions to alter network behavior in real-time. These services are dynamically loaded through Openet by the CPU-based control unit of a network node and are closely coupled with its silicon-based forwarding engines, without negatively impacting forwarding performance. AFM is exposed as a key enabling technology of the programmable networking platform Openet. The effectiveness of our approach is demonstrated by four active network services on commercial network nodes.
Ahmad Arbaz is a computer and networks engineer seeking an opportunity to utilize his engineering skills and experience. He has a B.Sc. in Computer Engineering from the University of Engineering and Technology with a CGPA of 2.42. His professional experience includes an internship at Mobilink GSM where he worked on RF optimization and drive testing. He has technical skills in Microsoft Office, networking, databases, and programming languages. His areas of interest include networking, telecommunications, and databases.
A sdn based application aware and network provisioningStanley Wang
The document discusses application aware SDN network provisioning. It begins with an overview of YARN architecture in Hadoop, including its benefits over earlier Hadoop architectures like improved scalability and utilization. It then discusses how SDN can be integrated with big data and cloud computing workloads by optimizing network topology and routing based on traffic patterns. Two approaches are proposed - reactive, where the SDN controller learns patterns from job logs/endpoints and modifies paths, and proactive where applications directly inform the network of intent. Finally, it proposes a service profile based SDN platform that uses network profiles and APIs to declaratively define logical topologies and provide network services and abstractions to applications.
Presentation at Networkshop46.
FRµIT: Raspberry Pi clusters and other adventures in networking research - by Phil Basford, University of Southampton.
Programmable network infrastructure: what does it mean for the campus? - by Matthew Broadbent, University of Lancaster.
Testing a network design is important to:
1) Verify that key business and technical goals are met;
2) Validate technology and device selections; and
3) Identify any bottlenecks or connectivity problems.
The document discusses network layer models including the OSI model and TCP/IP model. It provides details on each layer of the models and their functions. The OSI model has 7 layers - physical, data link, network, transport, session, presentation and application. The TCP/IP model combines some of these layers and has 5 layers - physical, data link, network, transport and application. Each layer is responsible for distinct networking functions and passes messages to the adjacent layers for delivery. [/SUMMARY]
This document provides an overview of computer networks and protocols. It begins by explaining why computer networks exist and some common communication tasks. It then describes different types of networks, including switching networks, broadcast networks, local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). The document discusses circuit switching and packet switching, including datagram and virtual circuit approaches. It also covers internetworking, the OSI reference model, and examples of link layer protocols. In closing, it defines what a protocol is and discusses relevant standards bodies.
The document describes the OSI model and TCP/IP model. It explains:
- The OSI model has 7 layers (physical, data link, network, transport, session, presentation, application) while TCP/IP has 4 layers (network interface, internet, transport, application).
- The transport layer in TCP/IP includes TCP and UDP protocols which handle segmentation and reassembly of data.
- The network layer adds headers to data segments and handles addressing and routing between hosts using IP addresses.
- The data link and physical layers in OSI correspond to the network interface layer in TCP/IP, which deals with framing data and transmitting bits.
This document provides an overview of an Internetworking course, including details about the instructor, course objectives, synopsis, and teaching plan. The course covers topics such as addressing, binding, routing, Internet protocols, and the TCP/IP protocol suite. It focuses on networking fundamentals like layers, encapsulation, naming, and functions of common protocols. The teaching plan outlines chapters on introduction/overview, underlying network technologies, and TCP/IP architecture.
05 Preparing for Extreme Geterogeneity in HPCRCCSRENKEI
This document summarizes a presentation given by Jeffrey S. Vetter at an international symposium in Kobe on preparing for extreme heterogeneity in high performance computing. The presentation highlights that contemporary HPC systems provide evidence that power constraints are driving rapid changes to processor, node, memory, and I/O architectures. Applications will not be portable across these diverse new architectures, and programming models and performance prediction tools are needed to address this challenge. The presentation also discusses emerging technologies like FPGAs, GPUs, and non-volatile memory and the need for portable programming models to support heterogeneous processing.
Linac Coherent Light Source (LCLS) Data Transfer Requirementsinside-BigData.com
In this deck from the Stanford HPC Conference, Les Cottrell from the SLAC National Accelerator Laboratory, at Stanford University presents: Linac Coherent Light Source (LCLS) Data Transfer Requirements.
"Funded by the U.S. Department of Energy (DOE) the LCLS is the world’s first hard X-ray free-electron laser. Its strobe-like pulses are just a few millionths of a billionth of a second long, and a billion times brighter than previous X-ray sources. Scientists use LCLS to take crisp pictures of atomic motions, watch chemical reactions unfold, probe the properties of materials and explore fundamental processes in living things.
Its performance to date, over the first few years of operation, has already provided a breathtaking array of world-leading results, published in the most prestigious academic journals and has inspired other XFEL facilities to be commissioned around the world.
LCLS-II will build from the success of LCLS to ensure that the U.S. maintains a world-leading capability for advanced research in chemistry, materials, biology and energy. It is planned to see first light in 2020.
LCLS-II will provide a major jump in capability – moving from 120 pulses per second to 1 million pulses per second. This will enable researchers to perform experiments in a wide range of fields that are now impossible. The unique capabilities of LCLS-II will yield a host of discoveries to advance technology, new energy solutions and our quality of life.
Analysis of the data will require transporting huge amounts of data from SLAC to supercomputers at other sites to provide near real-time analysis results and feedback to the experiments.
The talk will introduce LCLS and LCLS-II with a short video, discuss its data reduction, collection, data transfer needs and current progress in meeting these needs."
Watch the video: https://youtu.be/LkwwGh7YdPI
Learn more: https://www6.slac.stanford.edu/
and
http://hpcadvisorycouncil.com
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Grid optical network service architecture for data intensive applicationsTal Lavian Ph.D.
Integrated SW System Provide the “Glue”
Dynamic optical network as a fundamental Grid service in data-intensive Grid application, to be scheduled, to be managed and coordinated to support collaborative operations
From Super-computer to Super-network
In the past, computer processors were the fastest part
peripheral bottlenecks
In the future optical networks will be the fastest part
Computer, processor, storage, visualization, and instrumentation - slower "peripherals”
eScience Cyber-infrastructure focuses on computation, storage, data, analysis, Work Flow.
The network is vital for better eScience
This document describes a thesis that proposes a model-based design flow for developing networked embedded systems. The design flow uses the BIP framework to construct system-level models at different levels of abstraction and apply BIP tools for verification and performance evaluation. It also uses code generation for rapid prototyping. The flow aims to provide automated code generation for hardware architectures, construction of faithful system models, and system-level performance evaluation. The thesis applies this design flow on case studies from domains like automotive, industrial automation, and wireless sensor networks.
Application-Aware Acceleration for Wireless Data Networks: Design Elements an...Zhenyun Zhuang
This document discusses an approach called Application-Aware Acceleration (A3) to improve application performance over wireless networks. It finds that while transport layer protocols improve performance for FTP, they provide little benefit for other applications like CIFS, SMTP, and HTTP due to the applications' behaviors. A3 addresses this by using principles like transaction prediction, prioritized fetching, and redundant transmissions to offset applications' typical problems when used over wireless networks. The document presents the motivation and design of A3, and evaluates its effectiveness through emulations and a proof-of-concept prototype using NetFilter.
Common Design Elements for Data Movement Eli DartEd Dodds
Eli Dart, Network Engineer ESnet Science Engagement Lawrence Berkeley National Laboratory Cosmology CrossConnects Workshop Berkeley, CA February 11, 2015
ET3003-2 OSI-TCPIP (Semester II 2013-2014)Tutun Juhana
The document provides an overview of the OSI model and TCP/IP protocol suite for computer networks. It discusses that while the OSI model was intended as a standard, TCP/IP became the dominant model used on the internet. It then describes each layer of the OSI model and its functions. It also summarizes the layers of the TCP/IP protocol suite and how they compare to the OSI layers. Key areas like addressing, encapsulation, and the roles of different address types are also summarized.
RestThing: A Restful Web Service Infrastructure for Mash-up Physical and Web ...Weijun Qin
The document describes RestThing, a RESTful web service infrastructure for integrating physical and web resources. It proposes using REST principles to provide interfaces to heterogeneous physical devices. The key components of RestThing include RESTful APIs, an adaptation layer to handle differences in devices, resources that represent devices and web information, a service provider for accessing resources, and applications that can mash up physical and web resources. The document outlines a prototypical implementation of RestThing using a wireless sensor network, RESTful gateway, and Android application to demonstrate physical-virtual integration.
This document provides an overview of software-defined networking (SDN). It defines SDN as a concept that separates the control plane and data plane in network devices to make network implementation, scalability, and management easier. The document discusses SDN concepts like the OpenFlow protocol, SDN controllers, network applications, and SDN architectures. It also covers SDN use cases and challenges, such as scalability issues and ensuring security in SDN environments.
The document provides an overview of software-defined networking (SDN) fundamentals, including:
- In traditional networks, the control plane and data plane are logically coupled within each network device, whereas SDN separates these planes and centralizes the control plane in an SDN controller.
- The SDN controller holds the entire network description as a graph and can perform optimization calculations. It programs flow entries into forwarding devices using the OpenFlow protocol.
- OpenFlow defines a standard interface that gives access to the forwarding plane of network switches or routers. It separates the data and control planes and allows the control logic to be implemented separately in the SDN controller.
Enabling active flow manipulation in silicon-based network forwarding enginesTal Lavian Ph.D.
A significant challenge arising from today’s increasing Internet traffic is the ability to flexibly incorporate intelligent control in high performance commercial network devices. This paper tackles this challenge by introducing the Active Flow Manipulation (AFM) mechanism to enhance traffic control intelligence of network devices through programmability. With AFM, customer network services can exercise active network
control by identifying distinctive flows and applying specified actions to alter network behavior in real-time. These services are dynamically loaded through Openet by the CPU-based control unit of a network node and are closely coupled with its silicon-based forwarding engines, without negatively impacting forwarding performance. AFM is exposed as a key enabling technology of the programmable networking platform Openet. The effectiveness of our approach is demonstrated by four active network services on commercial network nodes.
Ahmad Arbaz is a computer and networks engineer seeking an opportunity to utilize his engineering skills and experience. He has a B.Sc. in Computer Engineering from the University of Engineering and Technology with a CGPA of 2.42. His professional experience includes an internship at Mobilink GSM where he worked on RF optimization and drive testing. He has technical skills in Microsoft Office, networking, databases, and programming languages. His areas of interest include networking, telecommunications, and databases.
A sdn based application aware and network provisioningStanley Wang
The document discusses application aware SDN network provisioning. It begins with an overview of YARN architecture in Hadoop, including its benefits over earlier Hadoop architectures like improved scalability and utilization. It then discusses how SDN can be integrated with big data and cloud computing workloads by optimizing network topology and routing based on traffic patterns. Two approaches are proposed - reactive, where the SDN controller learns patterns from job logs/endpoints and modifies paths, and proactive where applications directly inform the network of intent. Finally, it proposes a service profile based SDN platform that uses network profiles and APIs to declaratively define logical topologies and provide network services and abstractions to applications.
Presentation at Networkshop46.
FRµIT: Raspberry Pi clusters and other adventures in networking research - by Phil Basford, University of Southampton.
Programmable network infrastructure: what does it mean for the campus? - by Matthew Broadbent, University of Lancaster.
Testing a network design is important to:
1) Verify that key business and technical goals are met;
2) Validate technology and device selections; and
3) Identify any bottlenecks or connectivity problems.
The document discusses network layer models including the OSI model and TCP/IP model. It provides details on each layer of the models and their functions. The OSI model has 7 layers - physical, data link, network, transport, session, presentation and application. The TCP/IP model combines some of these layers and has 5 layers - physical, data link, network, transport and application. Each layer is responsible for distinct networking functions and passes messages to the adjacent layers for delivery. [/SUMMARY]
This document provides an overview of computer networks and protocols. It begins by explaining why computer networks exist and some common communication tasks. It then describes different types of networks, including switching networks, broadcast networks, local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). The document discusses circuit switching and packet switching, including datagram and virtual circuit approaches. It also covers internetworking, the OSI reference model, and examples of link layer protocols. In closing, it defines what a protocol is and discusses relevant standards bodies.
The document describes the OSI model and TCP/IP model. It explains:
- The OSI model has 7 layers (physical, data link, network, transport, session, presentation, application) while TCP/IP has 4 layers (network interface, internet, transport, application).
- The transport layer in TCP/IP includes TCP and UDP protocols which handle segmentation and reassembly of data.
- The network layer adds headers to data segments and handles addressing and routing between hosts using IP addresses.
- The data link and physical layers in OSI correspond to the network interface layer in TCP/IP, which deals with framing data and transmitting bits.
This document provides an overview of an Internetworking course, including details about the instructor, course objectives, synopsis, and teaching plan. The course covers topics such as addressing, binding, routing, Internet protocols, and the TCP/IP protocol suite. It focuses on networking fundamentals like layers, encapsulation, naming, and functions of common protocols. The teaching plan outlines chapters on introduction/overview, underlying network technologies, and TCP/IP architecture.
05 Preparing for Extreme Geterogeneity in HPCRCCSRENKEI
This document summarizes a presentation given by Jeffrey S. Vetter at an international symposium in Kobe on preparing for extreme heterogeneity in high performance computing. The presentation highlights that contemporary HPC systems provide evidence that power constraints are driving rapid changes to processor, node, memory, and I/O architectures. Applications will not be portable across these diverse new architectures, and programming models and performance prediction tools are needed to address this challenge. The presentation also discusses emerging technologies like FPGAs, GPUs, and non-volatile memory and the need for portable programming models to support heterogeneous processing.
Linac Coherent Light Source (LCLS) Data Transfer Requirementsinside-BigData.com
In this deck from the Stanford HPC Conference, Les Cottrell from the SLAC National Accelerator Laboratory, at Stanford University presents: Linac Coherent Light Source (LCLS) Data Transfer Requirements.
"Funded by the U.S. Department of Energy (DOE) the LCLS is the world’s first hard X-ray free-electron laser. Its strobe-like pulses are just a few millionths of a billionth of a second long, and a billion times brighter than previous X-ray sources. Scientists use LCLS to take crisp pictures of atomic motions, watch chemical reactions unfold, probe the properties of materials and explore fundamental processes in living things.
Its performance to date, over the first few years of operation, has already provided a breathtaking array of world-leading results, published in the most prestigious academic journals and has inspired other XFEL facilities to be commissioned around the world.
LCLS-II will build from the success of LCLS to ensure that the U.S. maintains a world-leading capability for advanced research in chemistry, materials, biology and energy. It is planned to see first light in 2020.
LCLS-II will provide a major jump in capability – moving from 120 pulses per second to 1 million pulses per second. This will enable researchers to perform experiments in a wide range of fields that are now impossible. The unique capabilities of LCLS-II will yield a host of discoveries to advance technology, new energy solutions and our quality of life.
Analysis of the data will require transporting huge amounts of data from SLAC to supercomputers at other sites to provide near real-time analysis results and feedback to the experiments.
The talk will introduce LCLS and LCLS-II with a short video, discuss its data reduction, collection, data transfer needs and current progress in meeting these needs."
Watch the video: https://youtu.be/LkwwGh7YdPI
Learn more: https://www6.slac.stanford.edu/
and
http://hpcadvisorycouncil.com
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
New York is a state located in the northeastern United States, with Albany as its capital city. It borders several other states and the Canadian provinces of Ontario and Quebec. New York has a population of over 19.5 million and was admitted to the Union in 1788. The state has many landmarks, including the Statue of Liberty and Empire State Building in New York City, as well as numerous state parks and forests.
This presentation outlines the tools usually used to influence customers online. The slides outline the stages, and the important things to bear in mind when your custiomer passes through them. It shows a combination of tools/features on your site, and other marketing tools which can be used to influence.
Improving PFM: The need for a Global PFM professionicgfmconference
The document discusses the need for a global public financial management (PFM) profession in response to issues revealed by the sovereign debt crisis. It outlines weaknesses in PFM that contributed to the crisis and proposes developing a global PFM certification and training program through partnerships between organizations. The goals are to improve PFM standards and capacity on a global scale and establish PFM as a sustainable professional field.
Joyce performance informed budgeting in the united states—tastes great or les...icgfmconference
Philip Joyce, George Washington University describes US federal deficit and debt questioning whether the United States will restore fiscal responsibility suggesting that performance management is not as high a priority for the current administration as other issues
Southeast Asia is a subregion of Asia located south of China, east of India, and north of Australia. It consists of two geographic regions - the Asian mainland and island arcs/archipelagos to the east. Politically, it includes 11 countries, 10 of which are members of ASEAN. Culturally, Austronesian peoples predominate and the major religions are Buddhism, Islam, and Christianity, though many local practices also exist.
"Write Once, Run Everywhere" & Windows 10Matt Lacey
The document discusses the concept of "write once, run everywhere" in the context of developing Universal Windows Platform (UWP) apps for Windows 10. It notes that with UWP, a single app package can be built to run on all versions of Windows 10, whether on desktop, mobile or other devices. However, the "everywhere" and "anywhere" in slogans like this refers only to Windows 10, not other platforms like Android and iOS. True cross-platform development allowing an app to run everywhere requires building separate app packages for each desired platform.
F5 Networks' Enterprise Manager™ Version 2.2, a centralized management solution that enables enterprises, service providers, and cloud providers to effectively monitor and manage multiple F5 BIG-IP® Application Delivery Controllers. With this release, the Enterprise Manager solution is also now available as a virtual appliance, giving customers greater flexibility in building hybrid physical-virtual environments to maximize efficiency.
The Supreme Audit Institution for Public Sector (SAI) in the Republic of Srpska aims to provide independent opinions on laws, budgets, financial statements, resource use, and property management in public institutions. It informs relevant bodies and the public of its audit findings and recommendations through published reports. The SAI has authority to perform financial, performance, and other specific audits according to INTOSAI standards, IFAC standards, and internal instructions harmonized with international auditing standards. The SAI is an independent institution that submits audit reports and an annual work report to the National Assembly and its Audit Board, and holds press conferences to communicate its work to media.
Tips & tricks to boost your email marketing campaignsContactlab
ContactLab is an email marketing agency and ESP with over 800 clients. They presented tips for boosting email marketing campaigns, including focusing on deliverability, creating relevant personalized messages, testing content, and measuring ROI beyond traditional email metrics. ContactLab helps clients with strategy, creative content, technology, and campaign management to drive sales and customer engagement through automated email marketing programs.
This document provides an overview of Windows Phone 7 development. It discusses the Windows Phone 7 hardware capabilities, the tools and frameworks available for building applications, including Silverlight and XNA, the application publishing process, and Windows Phone design principles. It also demonstrates key Windows Phone 7 features like the application lifecycle, push notifications, and location awareness. The document encourages developers to learn more about Windows Phone 7 development through Microsoft and community resources.
This document discusses the role of the accountancy profession in economic development and poverty reduction. It outlines how high-quality financial management, reporting, auditing and other services provided by accountants can contribute to attracting investment, increasing transparency, enhancing public services and growing small businesses. However, fully delivering on this potential requires strengthening accountancy infrastructure areas like standards, education, ethics and enforcement. Global partnerships between accountancy organizations and international institutions are seen as key to accelerating progress through more effective capacity building.
The IT department at Six Senses Hideaway Samui is introducing a new hotspot Wi-Fi and security system in May 2009. The system will automatically assign IP addresses to guest laptops and allow internet access by providing usernames and passwords obtained from the hotel butler. The system is designed to be easy for guests to use and understand while complying with Thai law regarding internet services.
Icgfm david ostermeyer keynote new methods of delivering development assistanceicgfmconference
New Methods of Delivering Development Assistance
David Ostermeyer, Chief Financial Officer, US Agency for International Development
This session will cover current thinking of USAID in terms of expanding its model in delivering foreign assistance, including the use of direct support to governments.
The document announces an upcoming meeting of the IT Samui Club Community to be held on April 17th, 2010 from 4-9pm at Nora Beach. The agenda includes introducing new members, summarizing past events, clarifying the purpose and limitations of membership, refunding accumulated member fees, discussing IT problems, and receiving technology service provider instructions in an open question and answer session. Members are invited to attend and contact the chairman by email for any inquiries.
The document discusses programmable network devices and open programmability. Key points include:
1) Programmable network devices allow non-vendor applications to run on network devices through technologies like Java Virtual Machines, enabling new types of applications and local computation on devices.
2) This open programmability enables applications involving distributed computing across network devices and servers, as well as new services like mobile agents, local intelligence for network management systems, and application-layer collaboration between routers and servers.
3) Achieving open programmability requires architectures like programmable networks, active networking, and network services architectures that provide standardized interfaces and safe execution environments for third-party applications on devices.
Open programmable architecture for java enabled network devicesTal Lavian Ph.D.
Supports non-vendor applications
End-user custom application development
Tight interaction between business applications and network devices
Domain experts who understand business goals
Innovative approaches
“Features on Demand”
download software services
dynamically add new capabilities
Open Programmable Architecture for Java-enabled Network DevicesTal Lavian Ph.D.
Programmable Network Devices
Openly Programmable devices enable new types of intelligence on the network.
Changing the Rules of the Game.
The Web Changed Everything
-Introducing JVM to browsers allowed dynamic loading of Java Applets to end stations
-Introducing JVM to routers allows dynamic loading of Java Oplets to routers
This document discusses Software Defined Networking (SDN). It describes how traditional networks have tight coupling between the control and data planes, which causes challenges. SDN separates the control and data planes, making the network programmable. The control plane software can run on general hardware. OpenFlow is the communication interface that allows the control plane to program the data plane switches and routers. This gives operators more flexibility and control over how the network functions.
Creating a Climate for Innovation on Internet2 - Eric Boyd Senior Director, S...Ed Dodds
The document discusses creating an innovation platform for research and education networks. It describes Internet2's role in bringing together leaders to advance network applications and accelerate innovation. The community includes nearly 400 member institutions. The document argues that past investments in research networks led to major economic benefits and innovations. It presents a vision for a new innovation platform that provides abundant bandwidth, software-defined networking, and support for data-intensive science. Finally, it summarizes several projects selected for Internet2's Innovative Application Awards that develop applications taking advantage of these new capabilities.
This document provides an overview of a course on Software Defined Networking (SDN). It discusses:
1. The course format which includes assignments on using SDN environments and writing controller applications, as well as a course project.
2. An introduction to SDN which describes how SDN decouples the network control and forwarding planes using a southbound API. This allows for a global view of the network and programmatic control.
3. Some of the key sections that will be covered in the course, including OpenFlow, network virtualization use cases, and SDN challenges related to controller availability.
Big Data Analytics and Advanced Computer Networking ScenariosStenio Fernandes
The document discusses big data analytics and advanced computer networking scenarios, including research challenges and opportunities. It covers technical background on measurements and analysis in computer networks. It also discusses new networking architectures like Software-Defined Networking (SDN), Information-Centric Networking (ICN), and network visualization. Tools and techniques for high-performance network traffic analysis using visual analytics are also covered. The document provides an agenda for applied research opportunities in computer networking between CIn/UFPE and Dalhousie University.
This document summarizes network softwarization trends, challenges, and research efforts. It discusses how telecommunications companies are shifting their focus from hardware-centric to software-centric networks. This allows for more flexible and agile networks through technologies like Network Functions Virtualization (NFV) and Software-Defined Networking (SDN). NFV aims to virtualize network functions on commodity hardware, while SDN separates the control and data planes for increased programmability. The document outlines trends driving these changes, challenges faced by network operators, and several ongoing research projects exploring NFV, SDN, and their synergies to realize the benefits of software-defined networks.
The document discusses Juniper's WANDL and NorthStar solutions for network operators. It provides an overview of the key capabilities of each solution, including:
- WANDL's IP/MPLS View allows operators to design, plan, monitor and optimize multi-vendor Layer 3 networks. It provides network modeling, traffic analysis and automated provisioning capabilities.
- NorthStar combines WANDL's path computation with Juniper's dynamic IP control plane to enable stateful traffic engineering. It provides optimized routing using a centralized path computation approach.
- Both solutions help operators improve network performance, redundancy and efficiency through capabilities like failure simulation, capacity planning, high availability assessment and traffic engineering.
This document provides a summary of Christian Esteve Rothenberg, a professor researching network functions virtualization and software defined infrastructures. It outlines his professional experience which includes positions at University of Campinas and CPqD R&D Center in Telecommunication. It also lists his research interests such as SDN, NFV, ICN and various open source projects he has led like Mininet-WiFi and libfluid. The document discusses some of his research questions around NFV/SDN including VNF benchmarking and multi-domain orchestration.
The document discusses the Open Data Plane (ODP) project, which aims to create an open source framework for data plane applications. ODP provides a standardized API to enable networking applications across different architectures like ARM, Intel and PowerPC. It is based on the Event Machine model of work-driven processing. ODP implementations optimize the API for different hardware platforms while providing application portability. The project aims to support functions like dynamic load balancing, power management, and virtual switch integration.
“The active network provides a platform on which network services can be experimented with, developed, and deployed”.
Minimize amount of global agreement
Do not require global agreement to support dynamic modification of the network
Support fast-path processing optimization
Scale to very large global active networks
Provide mechanisms to ensure security and robustness of nodes and of the network
Provide mechanisms to support different QoS/CoS
David Meyer
Distinguished Engineer
Cisco
Agenda
• Problem Space
• A Few Use Cases
• Reflections on the Promise of OF/SDN
• A Few Challenges and Open Questions
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
A generic Network Cost provision framework is described, accompanied with a preliminary proofof-concept implementation. Deployment considerations and open research issues are also discussed.
Task allocation on many core-multi processor distributed systemDeepak Shankar
Migration of software from a single to multi-core, single to multi-thread, and integrated into a distributed system requires a knowledge of the system and scheduling algorithms. The system consists of a combination of hardware, RTOS, network, and traffic profiles. Of the 100+ popular scheduling algorithms, the majority use First Come-First Server with priority and preemption, Weight Round Robin, and Slot-based. The task allocation must take into consideration a number of factors including the hardware configuration, the RTOS scheduling, task dependency, parallel partitioning, shared resources, and memory access. Additionally, embedded system architectures always have the possibility of using custom hardware to implement tasks that may be associated with Artificial Intelligence, diagnostic or image processing.
In this Webinar, we will show you how to conduct trade-offs using a system model of the tasks and the target resources. You will learn to make decisions based on the hardware and network statistics. The statistics will assist in identifying deadlocks, bottlenecks, possible failures and hardware requirements. To estimate the best task allocation and partitioning, a discrete-event simulation with both time- and quantity-shared resource modeling is essential. The software must be defined as a UML or a task graph.
Web: www.mirabilisdesign.com
Webinar Youtube Link: https://youtu.be/ZrV39SYTWSc
This document provides an introduction to a data communications networking course. It outlines the course schedule which covers topics like Ethernet, WAN technologies, IP networking and more over 5 days. It also discusses course materials, prerequisites, and objectives which include gaining an understanding of modern datacom technologies. The document provides details on standardization bodies and the OSI reference model, describing each layer and how data is transmitted through the protocol stack. It also covers physical media types like coaxial cable, twisted pair, fiber and their characteristics. Standards for physical layer interfaces like RS-232, RS-422 and V-series are also introduced.
SDN and NFV Value in Business Services - A Presentation By Cox CommunicationsCisco Service Provider
Joint presentation on behalf of the Society of Cable Telecommunications Engineers (SCTE) between Cox Communications (Mazen Khaddem) and Cisco Systems (Dr. Loukas Paraschis). Presentation covers different SDN categories, NFV examples in business services, and use cases for WAN SDN.
This document provides an overview and syllabus for a computer networking course. It will take a top-down approach, beginning with what services distributed applications require from networks and how networks provide those services. The course will cover topics including network edge, access, and core; delay, loss and throughput; protocol layers and models; network programming; and the application, transport, network, link and physical layers of the TCP/IP stack. The instructor is Dr. Nauman Mazhar and the course will include lectures, assignments, quizzes, and exams.
The document provides an overview of Software Defined Networking (SDN). It discusses the history and disadvantages of traditional networking approaches. It then defines SDN, describing its architecture and key components like the data plane, control plane, and management plane. It outlines the needs and benefits of SDN, such as virtualization, orchestration, programmability, and automation. It also covers SDN concepts like the OpenFlow protocol and SDN controllers.
Opal: Simple Web Services Wrappers for Scientific ApplicationsSriram Krishnan
The grid-based infrastructure enables large-scale scientific applications to be run on distributed resources and coupled in innovative ways. However, in practice, grid resources are not very easy to use for the end-users who have to learn how to generate security credentials, stage inputs and outputs, access grid-based schedulers, and install complex client software. There is an imminent need to provide transparent access to these resources so that the end-users are shielded from the complicated details, and free to concentrate on their domain science. Scientific applications wrapped as Web services alleviate some of these problems by hiding the complexities of the back-end security and computational infrastructure, only exposing a simple SOAP API that can be accessed programmatically by application-specific user interfaces. However, writing the application services that access grid resources can be quite complicated, especially if it has to be replicated for every application. In this presentation, we present Opal which is a toolkit for wrapping scientific applications as Web services in a matter of hours, providing features such as scheduling, standards-based grid security and data management in an easy-to-use and configurable manner
Similar to Practical Considerations for Deploying a Java Active Networking Platform (20)
This document describes an ultra low phase noise frequency synthesizer system for wireless communication applications. The system uses a combination of a fractional-N phase locked loop (PLL), sampling reference PLL, and direct digital synthesizer (DDS). It aims to reduce phase noise and enable higher order modulation schemes for increased data rates. The system comprises a front end module, display, and system on chip with the frequency synthesizer. It provides very low phase deviation of 0.04 degrees through a dual loop design, sampling PLL reference, and high frequency digital components.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
Embodiments of the present invention present a method and apparatus for photonic line sharing for high-speed routers. Photonic switches receive high-speed optical data streams and produce the data streams to a router operating according to routing logic and produce optical data streams according to destination addresses stored in the data packets. Each photonic switch can be configured as one of a 1:N multiplexer or an M:N cross-connect switch. In one embodiment, optical data is converted to electrical data prior to routing, while an alternate embodiment routes only optical data. Another embodiment transfers large volumes of high-speed data through an optical bypass line in a circuit switched network to bypass the switch fabric thereby routing the data packets directly to the destination. An edge device selects one of the packet switched network or the circuit switched network. The bypass resources are released when the large volume of high-speed data is transferred.
Systems and methods to support sharing and exchanging in a networkTal Lavian Ph.D.
Embodiments of the invention provide for providing support for sharing and exchanging in a network. The system includes a memory coupled to a processor. The memory includes a database comprising information corresponding to first users and the second users. Each of the first users and the second users are facilitated for sharing or exchanging activity, service or product, based on one or more conditions corresponding thereto. Further, the memory includes one or more instructions executable by the processor to match each of the first users to at least one of the second users. Furthermore, the instructions may inform each of the first users about the match with the at least one of the second users when all the conditions are met by the at least one second user based on the information corresponding to each of the second users.
Systems and methods for visual presentation and selection of IVR menuTal Lavian Ph.D.
Embodiments of the invention provide a system for generating an Interactive Voice Response (IVR) database, the system comprising a processor and a memory coupled to the processor. The memory comprising a list of telephone numbers associated with one or more destinations implementing IVR menus, wherein the one or more destinations are grouped based on a plurality of categories of the IVR menus. Further the memory includes instructions executable by said processor for automatically communicating with the one of more destinations, and receiving at least one customization record from said at least one destination to store in the IVR database.
Various embodiments allow Grid applications to access resources shared in communication network domains. Grid Proxy Architecture for Network Resources (GPAN) bridges Grid services serving user applications and network services controlling network devices through proxy functions. At times, GPAN employs distributed network service peers (NSP) in network domains to discover, negotiate and allocate network resources for Grid applications. An elected master NSP is the unique Grid node that runs GPAN and represents the whole network to share network resources to Grids without Grid involvement of network devices. GPAN provides the Grid Proxy service (GPS) to interface with Grid services and applications, and the Grid Delegation service (GDS) to interface with network services to utilize network resources. In some cases, resource-based XML messaging can be employed for the GPAN proxy communication.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
Systems and methods for electronic communicationsTal Lavian Ph.D.
Embodiments of the invention provide a system for enhancing user interaction with the Internet of Things. The system includes a processor, and a memory coupled to the processor. The memory includes a database having one or more options corresponding to each of the Internet of Things. The memory further includes instructions executable by the processor to share at least one of the one or more options with one or more users of the things. Further, the instructions receive information corresponding to selection of the at least one option by the one or more users. Additionally, the instructions update the database based on the selection of the at least one option by the one or more users. Further, a device for enhancing interaction with the things is also disclosed.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
Radar target detection system for autonomous vehicles with ultra-low phase no...Tal Lavian Ph.D.
An object detection system for autonomous vehicle, comprising a radar unit and at least one ultra-low phase noise frequency synthesizer, is provided. The radar unit configured for detecting the presence and characteristics of one or more objects in various directions. The radar unit may include a transmitter for transmitting at least one radio signal; and a receiver for receiving the at least one radio signal returned from the one or more objects. The ultra-low phase noise frequency synthesizer may utilize Clocking device, Sampling Reference PLL, at least one fixed frequency divider, DDS and main PLL to reduce phase noise from the returned radio signal. This proposed system overcomes deficiencies of current generation state of the art Radar Systems by providing much lower level of phase noise which would result in improved performance of the radar system in terms of target detection, characterization etc. Further, a method for autonomous vehicle is also disclosed.
Various embodiments allow Grid applications to access resources shared in communication network domains. Grid Proxy Architecture for Network Resources (GPAN) bridges Grid services serving user applications and network services controlling network devices through proxy functions. At times, GPAN employs distributed network service peers (NSP) in network domains to discover, negotiate and allocate network resources for Grid applications. An elected master NSP is the unique Grid node that runs GPAN and represents the whole network to share network resources to Grids without Grid involvement of network devices. GPAN provides the Grid Proxy service (GPS) to interface with Grid services and applications, and the Grid Delegation service (GDS) to interface with network services to utilize network resources. In some cases, resource-based XML messaging can be employed for the GPAN proxy communication.
Method and apparatus for scheduling resources on a switched underlay networkTal Lavian Ph.D.
A method and apparatus for resource scheduling on a switched underlay network (18) enables coordination, scheduling, and scheduling optimization to take place taking into account the availability of the data and the network resources comprising the switched underlay network (18). Requested transfers may be fulfilled by assessing the requested transfer parameters, the availability of the network resources required to fulfill the request, the availability of the data to be transferred, the availability of sufficient storage resources to receive the data, and other potentially conflicting requested transfers. In one embodiment, the requests are under-constrained to enable transfer scheduling optimization to occur. The under-constrained nature of the requests enable transfer scheduling optimization to occur. The under-constrained nature of the requests enables requests to be scheduled taking into account factors such as transfer priority, transfer duration, the amount of time it has been since the transfer request was submitted, and many other factors.
Dynamic assignment of traffic classes to a priority queue in a packet forward...Tal Lavian Ph.D.
An apparatus and method for dynamic assignment of classes of traffic to a priority queue. Bandwidth consumption by one or more types of packet traffic received in the packet forwarding device is monitored to determine whether the bandwidth consumption exceeds a threshold. If the bandwidth consumption exceeds the threshold, assignment of at least one type of packet traffic of the one or more types of packet traffic is changed from a queue having a first priority to a queue having a second priority.
Method and apparatus for using a command design pattern to access and configu...Tal Lavian Ph.D.
This patent application describes a method and system for remotely accessing and configuring network devices using XML documents and a common design pattern. An XML request is sent from a client to a network device to request that a service be performed locally on the device. The network device includes a service engine that can parse the XML request using an XML DTD, instantiate the requested service, interact with device hardware and software to execute the service, and optionally return a response to the client. The use of XML documents and a common design pattern allows network devices to be accessed and configured in a flexible manner without needing to be pre-programmed for specific requests.
Embodiments of the invention provide means to the users of the system to provide ratings and corresponding feedback for enhancing the genuineness in the ratings. The system includes a memory coupled to a processor. The memory includes one or more instructions executable by the processor to enable the users of the system to rate each other based on at least one of sharing, exchanging, and selling one of activity, service or product. The system may provide a mechanism to encourage genuineness in ratings provided by the users. Furthermore, the instructions facilitate the rating receivers to provide feedbacks corresponding to the received ratings. The feedback includes accepting or objecting to a particular rating. Moreover, the memory includes instructions executable by the processor to enable the system to determine genuineness of an objection raised by a rating receiver.
Embodiments of the present invention provide a system for enhancing reliability in computation of ratings provided by a user over a social network. The system comprises of a processor and a memory coupled to the processor. The memory further comprises a rater score database, a satisfaction database, a social network registration database, a user profile database, and a plurality of instruction executable by the processor. Said instructions in the memory are enabled to accept a message from at least one user wherein said message comprises a satisfaction score associated with at least one service provider and to retrieve a rater score associated with said at least one user from said rater score database. Further, the memory includes instructions in order to compute a new satisfaction score based on said rater score and said satisfaction score and update said satisfaction database to include said new satisfaction score. In a similar manner, the new satisfaction score can be computed based upon the information stored in the social network registration database and user profile database.
Systems and methods for visual presentation and selection of ivr menuTal Lavian Ph.D.
Embodiments of the invention provide a system for generating an Interactive Voice Response (IVR) database, the system comprising a processor and a memory coupled to the processor. The memory comprising a list of telephone numbers associated with one or more destinations implementing IVR menus, wherein the one or more destinations are grouped based on a plurality of categories of the IVR menus. Further the memory includes instructions executable by said processor for automatically communicating with the one of more destinations, and receiving at least one customization record from said at least one destination to store in the IVR database.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
"IOS 18 CONTROL CENTRE REVAMP STREAMLINED IPHONE SHUTDOWN MADE EASIER"Emmanuel Onwumere
In iOS 18, Apple has introduced a significant revamp to the Control Centre, making it more intuitive and user-friendly. One of the standout features is a quicker and more accessible way to shut down your iPhone. This enhancement aims to streamline the user experience, allowing for faster access to essential functions. Discover how iOS 18's redesigned Control Centre can simplify your daily interactions with your iPhone, bringing convenience right at your fingertips.
Practical Considerations for Deploying a Java Active Networking Platform
1. Rob Jaeger, University of Maryland,
Department of Computer Science
1
Practical Considerations for
Deploying a Java Active
Networking Platform
Robert F. Jaeger
University of Maryland
Department of Computer Science
rfj@cs.umd.edu
2. Programmable Network Devices
Rob Jaeger, University of Maryland,
Department of Computer Science
2
Openly Programmable devices enable
new types of intelligence on the network
3. Rob Jaeger, University of Maryland,
Department of Computer Science
3
Agenda
• Local Computation
• New types of applications
• Programmable and Active Networks
• Network Services Architecture
• Issues
• Summary
4. Changing the Rules of the Game
Rob Jaeger, University of Maryland,
Department of Computer Science
4
• Move Turing Machine onto
device
– Run non-vendor/non-bundled
applications on network device
while (true) {
doLocalProcessingOnDevice()
}
5. Non-vendor/Non-bundled Applications
Applet
Web Server Web Browser
The JVM is in the Browser
DDoowwnnllooaadd aapppplliiccaattiioonnss ffoorr llooccaall pprroocceessssiinngg
non-bundled application
Rob Jaeger, University of Maryland,
Department of Computer Science
5
Reversed Applets
Server
The JVM is in the Device: supports non-bundled apps
6. Rob Jaeger, University of Maryland,
Department of Computer Science
6
The Web Changed Everything
• Browsers
– Introducing JVM to browsers
allowed dynamic loading of Java
Applets to end stations
• Routers
– Introducing JVM to routers allows
dynamic loading of Java Services
to routers
This Capability WILL Change Everything
7. Rob Jaeger, University of Maryland,
Department of Computer Science
7
Architecture to Augment
Vendor-Provided Software
• Supports non-vendor applications
• End-user custom application development
– Tight interaction between business applications and
network devices
• Domain experts who understand business goals
• Innovative approaches
– “Features on Demand”
• download software services
• dynamically add new capabilities
8. Paradigm Shift
Rob Jaeger, University of Maryland,
Department of Computer Science
8
Java-based
Application
• Supports distributed
computing applications in
which network devices
participate
– router to router
– server to router
Java-based
Application
Java-based
Application
9. D Example: Doowwnnllooaaddiinngg IInntteelllliiggeennccee
JVM
OS
Rob Jaeger, University of Maryland,
Department of Computer Science
9
Network Device
Dynamic
loading
HW
Monitor
React
Authentication
Security
Intelligence
application
10. Rob Jaeger, University of Maryland,
Department of Computer Science
10
Device-based Intelligence
• Static-vs-Dynamic Agents
– Static
• SNMP set/get mechanisms
• Telnet, User Interfaces (cli, web, etc…)
– Dynamic closed-loop interaction on nodes
• capable of dealing with new and difficult situations
• autonomous and rational properties
• system monitoring & modification
• report status and trends
11. Rob Jaeger, University of Maryland,
Department of Computer Science
11
Agenda
• Local Computation
• New types of Applications
• Programmable and Active Networks
• Network Services Architecture
• Issues
• Summary
12. Rob Jaeger, University of Maryland,
Department of Computer Science
12
New Types of Applications
• Mobile Agents
• Local Intelligence for NMS
• Application layer collaboration among
routers
• Distributed computing involving network
devices and servers
• E-commerce
13. Rob Jaeger, University of Maryland,
Department of Computer Science
13
Mobile Agents
• Intrusion Detection - Hacker Chaser
• Traceroute for Layer 2
• Mobile Connectivity Mapper
14. Extensive access
to internal resources
Rob Jaeger, University of Maryland,
Department of Computer Science
No more
polling
14
Local Intelligence for NMS:
Diagnostic Agents
• Download Intelligent Agent
monitor from NMS to the
device.
• Wait for threshold.
• Might be complex conditions
• Trend analysis
• Send “condition exceeded”
event to NMS.
• Automatic download
appropriate application
• Application takes action.
Monitor
Appropriate
Application
Download
Download
Complex Condition
Exceeded
NMS
router
15. Application Layer Collaboration
Among Routers and Servers
Rob Jaeger, University of Maryland,
Department of Computer Science
15
• Multicast Caching
• Web Caching
• Server farm load balancing
– server state monitored
– rerouting based on congestion/load
• Auctioning Applications
16. Rob Jaeger, University of Maryland,
Department of Computer Science
16
E-Commerce Example
Matching Customers with Suppliers
– comparing price/capability options
– ISP QoS capabilities & availability
Business logic based operation changes
– Resize forwarding queues
– Modify congestion control algorithm
– Adjust Packet Scheduling
– Change routing table
17. Rob Jaeger, University of Maryland,
Department of Computer Science
17
Agenda
• Local Computation
• New types of applications
• Programmable and Active Networks
• Architecture
• Issues
• Summary
18. Rob Jaeger, University of Maryland,
Department of Computer Science
18
Programmable Networks
• IEEE P1520 Working Group
• Benefits of Standard Network APIs
– separation of service business/vendor business
• ISP resources visible for controlled modification
• 3rd party signaling vendors
– faster standardization
– extensibility
– richer semantics
• e.g. dynamic binding
http://www.ieee-pin.org
19. Rob Jaeger, University of Maryland,
Department of Computer Science
19
Programmable Networks
• IETF - vs- IEEE P1520
– IEFT - Internet standardized algorithms and
protocol semantics
– P1520 standardized programming interfaces
• MPLS Example
– Create IDL that captures the programmability
requirements of IP routers/switches from MPLS
algorithm perspective
– Common interface definitions would be used
by RSVP, LDP, or traffic engineering
20. Rob Jaeger, University of Maryland,
Department of Computer Science
20
The P1520 Reference Model
Algorithms for value-added communication
services created by network operators, users,
and third parties
Algorithms for routing and connection
management, directory services etc.
Value Added
Services Level
Virtual Network Device (software representation)
Physical Elements (hardware, namespace)
L interface
Network Generic
Services Level
Virtual Network
Devices Level
End User Applications
V interface
U interface
CCM interface
PE Level
21. Rob Jaeger, University of Maryland,
Department of Computer Science
21
Active Networking
“The active network provides a
platform on which network
services can be experimented
with, developed, and
deployed”
http://www.darpa.mil/ito/research/anets/index.html
22. Rob Jaeger, University of Maryland,
Department of Computer Science
22
Active Network Objectives
• Minimize amount of global agreement
– Do not require global agreement to support dynamic
modification of the network
• Support fast-path processing optimization
• Scale to very large global active networks
• Provide mechanisms to ensure security and
robustness of nodes and of the network
• Provide mechanisms to support different QoS/CoS
23. Rob Jaeger, University of Maryland,
Department of Computer Science
23
Active Network Architecture
• NodeOS - manages resources for the node
• Execution Environment -
– provides an API to applications or
– a shell interface through which end-to-end
nework services can be accessed.
• Active Applications - implementation of
network services which utilize the local
computation and access to router resources.
24. Rob Jaeger, University of Maryland,
Department of Computer Science
24
Node Operating System
• Latest Specification (June 15, 1999)
• Abstractions
– Channels
– Memory Pools
– Thread Pools
– Files
– Flows
25. Applications Applications . .
.
Execution Environment
InChan OutChan
Rob Jaeger, University of Maryland,
Department of Computer Science
25
NodeOS - Channels
• Flows create channels to
send, receive and forward
packets
– InChan - receives packet
from network to EE
– OutChan - puts packets onto
the network from EE
– CutChan - bypasses the
Execution Environment
• Bandwidth Limitation
• Buffer Pool -- queued pkts
NodeOs
CutChan
Transmission Facilities
26. ANTS
Execution
Environment
typeID=18
Rob Jaeger, University of Maryland,
Department of Computer Science
typeID=19
26
Active Network Encapsulation
Protocol
• Routes AN packets to EEs
• ANEP_PORT = udp 3322
• TypeID identifies EE
• Tag Length Values (TLVs)
– specify source/dest IP addresses
– port numbers
– Payload NodeOS
PLAN
Execution
Environment
ANEPd
Transmission Facilities
27. Rob Jaeger, University of Maryland,
Department of Computer Science
27
NodeOS - Memory Pools
• Combines memory for one or more flows
• Shared by threads within flows
• mmap-style interface to page allocation
• flow in which thread runs charged for
resource
• EE notified when flow exceeds limits
• Flow (and associated threads) terminated
upon violation
28. Rob Jaeger, University of Maryland,
Department of Computer Science
28
NodeOS - Thread Pools
• Computational Abstraction
– Number of threads in Pool
– Scheduler to be used (round robin, … )
– Max execution time between yields
– Per thread stack size
• No explicit operation for creation/
termination -- activated by events
• Termination of flow if thread
misbehaves
29. Rob Jaeger, University of Maryland,
Department of Computer Science
29
NodeOS - File
• Not Manditory
• Provides Persistent Storage
• EE specific view of filesystem
– via namespace(AN/ANTS; AN/PANTS)
• Shared Memory for inter-EE
communication
30. Applications Applications . .
.
Execution Environment
InChan OutChan
Rob Jaeger, University of Maryland,
Department of Computer Science
30
NodeOS - Flows
• Primary abstraction for
accounting, admission
control, and scheduling
• Flow consists of:
– Channels
– Memory
– Threads
• Flow can be
– Execution Environments
– Active Applications
NodeOs
CutChan
Transmission Facilities
31. Mobile Code Multicast Ping
InChan OutChan
Rob Jaeger, University of Maryland,
Department of Computer Science
31
ANTS Execution Environment
• Facilitates deploying
new protocols and
services in network
• Toolkit for
implementing an
active network
ANTS
Execution Environment
– Active Nodes
– Network Nodes NodeOs
CutThru
32. Rob Jaeger, University of Maryland,
Department of Computer Science
32
ANTS Execution Environment
• Capsules are the unit of transfer for data
and code
– source & destination addresses
– previous node address
– resource limits
– encoding and evaluation methods methods
– Protocol/Group/Method ID access methods
• Data Capsule
– source & destination port numbers
– identifies active application
33. Rob Jaeger, University of Maryland,
Department of Computer Science
33
ANTS Code Distribution
• “Node” object is core of Runtime System
– UDP Channels
– Methods to Send/Receive Capsules
– Supports numbers applications identified by
port number
• Consists of Built-in protocols
• Accepts registration of new protocol
– capsule code stored in code cache
– signature (hash) computed for code
34. Rob Jaeger, University of Maryland,
Department of Computer Science
34
ANTS Code Distribution
• Allows Definition of additional protocols
– Protocol
– Code Group (transitive closure of calls)
• Dynamic Code Distribution via Capsules
– Capsule arrives and node can’t evaluate it
• protocol not on active node
• must request packet from previous active node
– DLBootstrap Capsule
– DLRequest Capsule
– DLResponse Capsule
35. Execution Environment
InChan OutChan
DLResponse
Capsule
Rob Jaeger, University of Maryland,
Department of Computer Science
35
ANTS Execution Environment
AN_Ping
Application
ANTS
NodeOS
OutChan
InChan
AN_Ping
Application
ANTS
Execution Environment
Ping
Capsule
NodeOS
DLBootstrap
Capsule
DLRequest
Capsule
36. Rob Jaeger, University of Maryland,
Department of Computer Science
36
Agenda
• Local Computation
• New types of applications
• Programmable and Active Networks
• Architecture
• Issues
• Summary
37. JNI
Operating System
Rob Jaeger, University of Maryland,
Department of Computer Science
37
OOppeenn DDeevviiccee AArrcchhiitteeccttuurree
Service
Download
Device HW
JVM
Java
Service
Java
Service
Java Lib
C/C++
API
Java
API
Device
Code
DataCom API
Native
Code
Device
Drivers
38. SNMP API for Network Mgmt
• API is generated automatically
• Device-based monitoring
– Query MIB
– Identify trends
• Initiate action locally
– Report trends and/or significant events
– Download problem specific diagnostic code
– Take corrective action
Rob Jaeger, University of Maryland,
Department of Computer Science
38
39. Client API
Abstract Variable Interface
MIB Map
Native Variable Interface
Rob Jaeger, University of Maryland,
Department of Computer Science
39
MIB API Example
Java
Virtual
Machine
SNMP PDU Layer
Instrumentation
& Annotation
Layer
Real Time Operating System
Processor and other Hardware
Client Bean
•API uses a MIB Map to
dispatch requests to variable
access routines
•Different parts of the MIB
tree can be serviced by
different mechanisms
•An ad hoc interface to the
SNMP instrumentation
layer
•A generic SNMP
loopback
40. Service 3
Service 1
Java Network Services Environment
Rob Jaeger, University of Maryland,
Department of Computer Science
40
Java Network Services
Environment
Service 2
Java Virtual Machine
JavaResouceManager
dependencies
Service 4
41. Our Prototype Java Environment
• Present RTOS with single unified task that
includes:
– Java VM (JVM)
– Java Resource Manager (JRM)
Rob Jaeger, University of Maryland,
Department of Computer Science
41
• thread scheduling
• manages CPU utilization
– JVM time-slice is managed by the JRM preemptive
thread scheduler
• internal memory manager
• garbage collection with priority based on available
memory
42. Rob Jaeger, University of Maryland,
Department of Computer Science
42
Why Java
• Dynamic class loading
• Reuse security mechanisms
– Byte-code Verifier
– Security Manager
– Class Loader
• System stability
– Constrain applications to the Java VMs
– Prohibit native code applications
• Extensible, portable, & distributable
services
43. Rob Jaeger, University of Maryland,
Department of Computer Science
43
But Java is slooowwwww
• Not appropriate in the fast-path
data forwarding plane
– forwarding is done by ASICs
– packet processing not affected
• Java applications run on the
CPU
– Packets destined for Java
application are pushed into the
control plane
44. Rob Jaeger, University of Maryland,
Department of Computer Science
44
Agenda
• Openness
• Local Computation
• New type of applications
• Programmable and Active Networks
• Architecture
• Issues & Questions
• Summary
45. Rob Jaeger, University of Maryland,
Department of Computer Science
45
Architecture Issues
Approach 1: Native Threads
• One JVM per principle
• One RTOS task per JVM
• Non-interference between Java applications
• Difficult thread-to-thread communication
and sharing of data between threads
• Creates a dependency on underlying RTOS
• Multiple JVM instances consume resources
46. Rob Jaeger, University of Maryland,
Department of Computer Science
46
Architecture Issues
Approach 2: Single JVM - Green Threads
• Present one unified task to the RTOS
• JVM manages CPU & memory resources
between competing threads;
• Propagation of component failure
• Requires modifications to the JVM
• Binding of resources to the JVM
47. Rob Jaeger, University of Maryland,
Department of Computer Science
47
Security Issues
• Old model: Cannot isolate core
router functions
– Dangerous Pointers (C/C++)
• Can touch sensitive memory location
– Risk: Memory allocations and Free
• Allocation without freeing (leaks)
• Free without allocation (core dump !!!!
)
• Limited security in SNMP
48. Rob Jaeger, University of Maryland,
Department of Computer Science
48
Security and Stability
• secure download of Java Applications
• safe execution environment
– insulate core router applications from
dynamically loaded applications
– protect dynamically loaded services from one
another
49. Strong Security in the new model
• The new concept is to securely download
3rd party code to network devices
– Digital Signature
– Administratively Certified Services
– Access only to the published API
– Verifier - only correct code is loaded
– Class loader access list
– No pointers that can do harm
– No access outside the JVM space
– JVM has run time bounds, type, and execution
Rob Jaeger, University of Maryland,
Department of Computer Science
49
checking
50. Rob Jaeger, University of Maryland,
Department of Computer Science
50
Language Based Protection
• Type Safety
– Reference to Objects, not random memory
– Inappropriate accesses to memory not allowed
• Restricts what operations code can perform on what
memory locations
• operations on objects must be valid for that object
– dynamic access control (via reference)
– static access control (via public, private)
51. Rob Jaeger, University of Maryland,
Department of Computer Science
51
Access Control [6]
class A {
private int i;
public int j;
public static void method1() {
A a1 = new A();
A a2 = new A();
B.method2(a1); }
}
class B
public static void method2 (A arg) {
arg.j++;
arg.i++; // illegal
}
- method2 has access to public j
but not to private i
- method2 cannot forge a reference to a2
given the a1 reference
52. Rob Jaeger, University of Maryland,
Department of Computer Science
52
How to Access a Class
1. Must get Class Object
a. Class is in classpath (not secure on net)
b. Class reference is available (visible)
c. Have a ClassLoader Object to load Class
2. Reference to Object
3. Access control (public)
For static methods, need just 1 and 3
53. Rob Jaeger, University of Maryland,
Department of Computer Science
53
Class Loaders
• Load new classes into the JVM at runtime
– fetches code from URL or file
– submits to JVM for verification
– integrates code into JVM for execution
– references to other classes causes additional
class loader invocations
• Enforces protection - expose visibility and
hiding
– classes see classes loaded by same classloader
– can use class loaders to expose classes
54. Rob Jaeger, University of Maryland,
Department of Computer Science
54
NameSpaces
• A namespace is
– a set of unique names of classes loaded by a
Class Loader and the binding of each name to a
specific class object
– variables, methods, & type names are all
different instances in different domains
55. Cross Domain Communication
• Desire that Protection Domains share
classes and NOT require same Class Loader
• How do we achieve this?
– Runtime System to provide communication
Rob Jaeger, University of Maryland,
Department of Computer Science
55
between components.
– Java Network Service Environment
– What is the policy?
56. Rob Jaeger, University of Maryland,
Department of Computer Science
56
Building Protection Domains
• Given multiple namespaces
– Could use Object references for cross-domain
communication:
class FileSystem {
private int accessRights
private Directory rootDirectory
public File open(String fileName) [6]
}
– Enforce protection policies per client
– Problems result
57. Protection Domains - Revocation
• Access to an object reference cannot be
revoked
• Wrap object with revocable object that is a
delegator to real object
– all methods wrapped
• Programmer may forget to wrap objects
referenced by wrapped object (tracking
problem)
Rob Jaeger, University of Maryland,
Department of Computer Science
57
58. Protection Domains: Revocation[6]
Rob Jaeger, University of Maryland,
Department of Computer Science
58
class A { public int method1(int a1, int a2); }
class AWrapper {
private A a;
private boolean revoked;
public int method1(int a1, int a2) {
if (!revoked) return a.meth1(a1, a2) ;
else throw new RevokedException;
}
public void revoke() {revoked=true;}
public AWrapper (A realA) {
a = realA; revoked = false; }
}
59. Rob Jaeger, University of Maryland,
Department of Computer Science
59
Protection Domains: Inter-domain
dependencies
• Sharing Object references between domains
• Mutable shared objects can be changed
• Malious attack:
– pass byte array w/ legal bytecode to classloader
– once verified, overwrite with illegal bytecode
• Should copy bytecode to classloader, not
pass reference
60. Rob Jaeger, University of Maryland,
Department of Computer Science
60
Protection Domains:
Termination
• Upon domain termination:
– should all references obtained be released?
• two Strings in different domains may reference the
same underlying byte array
– should object be kept alive if referenced by
other domains?
• clients could hold onto references to objects of a
dead server
– GC frees objects when NO more references!!
61. Rob Jaeger, University of Maryland,
Department of Computer Science
61
Protection Domains: Threads
• Method invocation for cross domain calls
both execute in same thread
– caller blocks until callee returns
• how does caller back out gracefully?
– untrusted domain calls stop() or suspend
after calling trusted method --
• state left unstable and blocked
– untrusted callee can block caller that may be
in critical section
62. Protection Domains: Accounting
• How do you account for resources obtained
by a domain?
– CPU cycles
– Memory pages
– Bandwidth on a channel
Rob Jaeger, University of Maryland,
Department of Computer Science
62
63. Rob Jaeger, University of Maryland,
Department of Computer Science
63
J Kernel Safety [6]
• Precise definition of protection domains
– local object
– non-local shared objects (capability objects)
• Define communication channels between
protection domains
• Support revocation of capabilities
• Clean termination semantics
64. Rob Jaeger, University of Maryland,
Department of Computer Science
64
J-Kernel Class Loaders
• Each ClassLoader defines a namespace
– must manage & secure namespace
– creates stub code at run-time for cross domain
communication -- use local RMI calls
• simulate thread switching for safe method calls
• contains a revoke method to set handle to null
– substitutes “safe” versions of standard classes
• e.g. file system access
65. Rob Jaeger, University of Maryland,
Department of Computer Science
65
J Kernel Concepts
• Capabilities:
– handles to resources in other domains
– client throws an exception
• Domain:
– each domain has a namespace and threads
under its control
– shared classes
– capabilities access is revoked upon termination
66. Rob Jaeger, University of Maryland,
Department of Computer Science
66
J Kernel Concepts
• Cross domain calls:
– Invoke calls to “capability” methods
• relies upon Java interface classes
• extend remote (stub creation and marshalling code)
– special calling convention
• non capability objects are copied
• capability objects are passed
67. Rob Jaeger, University of Maryland,
Department of Computer Science
67
Observations
• Provides high degree of safety for cross-domain
communication
• Expensive in terms of time
– thread switching (simulated)
– method invocation through stub
– copying of non-capabilities
68. Rob Jaeger, University of Maryland,
Department of Computer Science
68
Questions
• How do you insulate core router
functionality?
• How do you securely download code?
• How do you do resource accounting?
• How do you assure resource safety?
– fair share or priority share quotas?
• CPU
• Memory
• Bandwidth
69. Rob Jaeger, University of Maryland,
Department of Computer Science
69
Questions
• How do you protect services from one
another (trusted -vs- untrusted)?
– stable state for critical sections
• caller dies/is killed while trusted in critical section
– enforce return from untrusted method
– reject forbidden actions
• Native or Green Threads?
70. Rob Jaeger, University of Maryland,
Department of Computer Science
70
Agenda
• Openness
• Local Computation
• New type of applications
• Programmable and Active Networks
• Architecture
• Issues
• Summary
71. Rob Jaeger, University of Maryland,
Department of Computer Science
71
Summary
– Turing Machine on network devices
– dynamic agents vs. static agents
– dynamic loading
– strong security through JVM
– safety among shared components via Java
Network Services Environment
Enabling Technology for the Revolution
72. Rob Jaeger, University of Maryland,
Department of Computer Science
72
References
[1] P.Bernadat, D. Lambright, and F. Travostino, “Towards a Resource-safe Java for Service-
Guarantees in Uncooperative Environments,” IEEE Symposium on Programming Languages
for Real-time Industrial Applications (PLRTIA) ‘98, Madrid, Spain, Dec. ‘98.
[2] Active Networking Node OS Working Group, NodeOS Interface Specification", June 15, 1999
[3] Active Networks Working Group, "Architectural Framework for Active Networks Version 0.9",
August 31, 1999
[4] T. Lavian, R. Jaeger, "Open Programmable Architecture for Java-enable Network Devices",
Stanford Hot Interconnects, August 1999.
[5] D. Wetherall et al. ANTS: A Toolkit for Building andDynamically Deploying Network Protocols.
OPENARACH'98
[6] C. Hawblitzel, C. Chang, G. Czajkowski, D. Hu, T. von Eicken, “Implementing Multiple
Protection Domains in Java”, 1998 USENIX Annual Technical Conference, New Orleans, LA,
June 1998
[7] R. Jaeger, T. Lavian, R. Duncan, “Open Programmable Architecture for Java-enabled Network
Devices”, To be presented at LANMAN ‘99, Sydney, Australia, November 1999
Editor's Notes
Authentication: You are who you say you are --- digital signatures
digital certificate & certificate authority
Security:: authorized to get onto device
access levels
no pointers
where do we accept code from … which types of code
a. separation of services business -- state of netwrok is now visible to external entities and may be manipulated in controlled ways.
- allows for 3rd party software to be employed that can access resources
-
b. separation of vendor business -- signalling sofware and system vendors can emerge … not tightly integrated with underlying hardware vendors
e.g. QoS signalling vendors
c. faster standardization process
a. separation of services business -- state of netwrok is now visible to external entities and may be manipulated in controlled ways.
- allows for 3rd party software to be employed that can access resources
-
b. separation of vendor business -- signalling sofware and system vendors can emerge … not tightly integrated with underlying hardware vendors
e.g. QoS signalling vendors
c. faster standardization process
Label Distribution Protocol
U interface -- provides a means for creating a representation of specific services (DIFF SERV or INT SERV).
Ping Capsule
routines for getting
protocol ID
method ID
Multicast Capsule
each one is in a separate thread
1. Security Manager can still deny access to a resource if all three items are satisfied e.g. ClassLoader