2001
DOI: 10.1109/jcn.2001.6596879
|View full text |Cite
|
Sign up to set email alerts
|

Enabling active flow manipulation in silicon-based network forwarding engines

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2004
2004
2006
2006

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…Serviter Oplets are of similar concept to those of Openet's ORE [26], however the structure has been greatly extended in Serviter to enable resource requirement specification, hardware requirement specification, service discovery, automatic dependency fulfilment, and to support statefull services. The Oplets were extended by adding a User Service Descriptor that specifies identity and version information, and the matching criteria for the service discovery process.…”
Section: A Number Of Virtual Machine Processes Calledmentioning
confidence: 99%
See 1 more Smart Citation
“…Serviter Oplets are of similar concept to those of Openet's ORE [26], however the structure has been greatly extended in Serviter to enable resource requirement specification, hardware requirement specification, service discovery, automatic dependency fulfilment, and to support statefull services. The Oplets were extended by adding a User Service Descriptor that specifies identity and version information, and the matching criteria for the service discovery process.…”
Section: A Number Of Virtual Machine Processes Calledmentioning
confidence: 99%
“…The Openet project [27] targets the deployment of the Oplet Runtime Environment onto the Nortel Networks range of commercial platforms [26]. The ORE provides deployment and execution mechanisms for user services onto the platform's control plane.…”
Section: Related Workmentioning
confidence: 99%
“…Another effort [12] defined an interface on a Nortel router by which processing (e.g. encryption) for particular flows could be configured and turned on and off under user control.…”
Section: Related Workmentioning
confidence: 99%
“…[9] Accordingly, we implemented and tested both the functionality of A-BOX and its throughput. Figure 5 shows a diagram of A-BOX as implemented.…”
Section: A Requirementsmentioning
confidence: 99%