1998
DOI: 10.1109/65.690955
|View full text |Cite
|
Sign up to set email alerts
|

Introducing new Internet services: why and how

Abstract: Active networks permit applications to inject programs into the nodes of local and, more importantly, wide area networks. This supports faster service innovation by making it easier to deploy new network services. In this paper, we discuss both the potential impact of active network services on applications and how such services can be built and deployed. We explore the impact by suggesting sample uses and arguing how such uses would improve application performance. We explore the design of active networks by … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0
2

Year Published

1999
1999
2008
2008

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 111 publications
(37 citation statements)
references
References 9 publications
0
35
0
2
Order By: Relevance
“…In this section, we will evaluate the cost of providing security to the active network inside a typical Internet scenario, composed of 15 routers, four of which are Active Routers, with an average end-to-end delay of 60ms 1 . We will state the following additional suppositions: average packet size 512B; average active code size 2KB and all Active Routers modify active packets (so they must compute HMAC twice, one time to verify the received packet and another time to send the packet).…”
Section: Security Cost Of An End-to-end Typical Communicationmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we will evaluate the cost of providing security to the active network inside a typical Internet scenario, composed of 15 routers, four of which are Active Routers, with an average end-to-end delay of 60ms 1 . We will state the following additional suppositions: average packet size 512B; average active code size 2KB and all Active Routers modify active packets (so they must compute HMAC twice, one time to verify the received packet and another time to send the packet).…”
Section: Security Cost Of An End-to-end Typical Communicationmentioning
confidence: 99%
“…Active networking technology [1] has already proven to be a powerful approach when fast deployment of new protocols and services is needed. However, security risks introduced by its own nature are a major concern when evaluating the usage of this technology in public environments.…”
Section: Introductionmentioning
confidence: 99%
“…There are currently three main application domains for programmable NIs, which can be roughly categorized into Server NI software, Web Switching software [1], and Active Networking software [15,18]. The first two are product niches in their own right and are driving the development of programmable NIs.…”
Section: Workloadsmentioning
confidence: 99%
“…Examples of this new potentiality are given by existing applications such as web proxies [13], stock quotes and on line auction applications [15], distributed firewalls [13], and the distributed management of multicast trees [10].…”
Section: Availability Of Information Held By Intermediatementioning
confidence: 99%