簡易檢索 / 詳目顯示

研究生: 黃祖基
Huang, Tzu-Chi
論文名稱: 為主動式網際網路的瓶頸主動式結點繞道
Bottleneck Active Node Detouring for Active Internet
指導教授: 苗育本
Miao, Yu-Ben
謝錫堃
Shieh, Ce-Kuen
學位類別: 博士
Doctor
系所名稱: 電機資訊學院 - 電機工程學系
Department of Electrical Engineering
論文出版年: 2009
畢業學年度: 97
語文別: 英文
論文頁數: 85
中文關鍵詞: 通訊協定主動式結點可程式化網路主動式網路
外文關鍵詞: Protocol, Active Network, Active Node, Programmable Network
相關次數: 點閱:165下載:1
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 今日的網際網路非常的成功因為它簡單。網際網路是以盡力,不可靠,且自動化的方式來運作。感謝這樣地簡單,網際網路造就了一個堅固且全域性的公用設施,人們可以隨意地藉以傳送封包不須要事先得到同意。然而,網際網路常須要花長的時間去讓人們在其中設置一個新的通訊協定或服務,因為冗長的通訊協定標準化過程,高價的網路設備升級費用,和麻煩地世界性服務的設置與管理。
    為了加速通訊協定的培養和使容易在網路中設置服務,主動式網路社群提出了用主動式結點去建構一個可程式化網路環境名為「膠囊式主動式網路」。主動式結點是一個網路裝置,不但能夠傳遞封包也能在傳遞的同時提供計算的服務。當負載過重時,然而,主動式結點對於所有封包經過此主動式結點的主動式應用程式,會變成一個吞吐量的瓶頸。主動式結點可以加上本論文所提出的「瓶頸主動式結點繞道」來免於造成不良的吞吐量,因為並不是所有的主動式應用程式都須要這已成為瓶頸的主動式結點提供計算服務。此外,主動式結點可以加上「瓶頸主動式結點繞道」來得到其它於本論文中驗證的好處。

    Today, the Internet succeeds tremendously because of the simplicity. The Internet works in best-effort, unreliable, and automatic manners. Thanks to the simplicity, the Internet makes a solid global infrastructure whereby people can transmit packets at will without acquiring permission in prior. However, the Internet often takes a long time to accommodate people with a new protocol or service due to the slow protocol standardization progress, the costly upgrade of network devices, and the troublesome deployment and management of world-wide services.

    In order to speed up the development of a protocol and facilitate the deployment of a service inside networks, the Active Node is proposed by the Active Network community to construct a programmable network environment named Capsule-based Active Network. The Active Node is a network device capable of forwarding packets and giving them the computation service in the meantime. When getting overloaded, however, the Active Node becomes a throughput bottleneck to all Active Applications whose packets traverse the Active Node. The Active Node can enable the Bottleneck Active Node Detouring proposed in this thesis to free Active Applications from the penalty of poor throughput because not all Active Applications need the computation service in the bottleneck Active Node. Besides, the Active Node can enable the Bottleneck Active Node Detouring to give Active Applications other benefits identified in this thesis.

    1. Introduction…………………………………………………..…………………....1 1.1. Motivation………………………………………………………………...............1 1.2. Present Solutions against Poor Throughput in Bottleneck Active Node………….3 1.3. Brief of Our Contributions……………………………………………………..…6 2. Background……………………………………………...…………………………8 2.1. Discrete Approach………………………………………………………………...8 2.2. Integrated Approach………………………………………………………………9 2.3. Active Node Overview………………………………………………………..…11 3. Bottleneck Active Node Detouring (BAND) ……………………………..……..14 3.1. Overview………………………………………………………………...………14 3.2. System Components…………………………………………………...………...16 3.2.1. Queue Monitor……………………………………………………...……........17 3.2.2. Workload Collector…………………………………………………………....17 3.2.3. Detour Manager………………………………………………………………..18 3.2.4. Detour Executor……………………………………………………………….19 3.3. Manipulating Packet Flow………………………………………………………19 3.3.1. Predicting Poor Throughput of Packet Flow…………………………………..19 3.3.2. Restoring Computation Service to Packet Flow………………………………24 4. Implementation………………………………………..……………………….…27 4.1. BAND Architecture in Windows 2000…………………………………………..27 4.2. Supporting Handmade C Interpreter…………………………………………….29 4.3. Supporting Off-the-shelf Java Virtual Machine…………………………………30 4.4. Diverting Packet…………………………………………………………………30 4.5. Collecting Metadata of BAND…………………………………………………..31 5. Performance………………………………………...…………………………….33 5.1. Experiment Configuration…………………………………………………….…33 5.2. AN Overhead Breakdown……………………………………………………….34 5.3. Impacts of Parameters , Ts, Tw, and Dm……………………………………...38 5.4. Throughput Experiment…………………………………....................................45 5.5. Observation on Immunity against Resource Shortage…......................................47 5.6. Observation on Gentleness in Resource Use….....................................................50 5.7. Observation on Multiple Homogeneous Packet Flows’ Access to AN.................54 5.8. Observation on Resource Utilization among ANs................................................57 5.9. Observation on Impact on Voice over IP Application...........................................62 6. Security....................................................................................................................68 7. Conclusion...............................................................................................................73 References...................................................................................................................78 Biography....................................................................................................................85

    Alexander DS, Braden B, Gunter CA, Jackson AW, Keromytis AD, Minden GJ, et al. Active Network Encapsulation Protocol (ANEP). Active Networks Group Draft, July 1997.
    Alexander DS, Shaw M, Nettles SM, Smith JM. Active Bridging. In: Proceedings of the ACM SIGCOMM’97 conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, p. 101-111, September 1997(b).
    Alexander DS, Arbaugh WA, Keromytis AD, Smith JM. A Secure Active Network Environment Architecture. IEEE Network, Vol. 12(3), p. 37-45, 1998.
    AN Node OS Working Group. NodeOS Interface Specification. http://protocols.netlab.uky.edu/~calvert/nodeos-latest.ps, November 2001.
    Baker F. Requirements for IP Version 4 Routers. Internet RFC 1812, June 1995.
    Bhattacharjee S, Calvert KL, Zegura EW. On Active Networking and Congestion. Technical Report GIT-CC-96-02, 1996.
    Bhattacharjee S, Calvert KL, Zegura EW. Self-organizing wide-area network caches. In: Proceedings of IEEE INFOCOM 1998, p. 600-608, March 1998.
    Braden R, Lindell B, Berson S, Faber T. The ASP EE: An Active Network Execution Environment. In: Proceedings of 2002 DARPA Active Networks Conference and Exposition, May 2002.
    Bradner S. Benchmarking Terminology for Network Interconnection Devices. Internet RFC 1242, July 1991.
    Calvert K. Reflections on network architecture: an active networking perspective. ACM SIGCOMM Computer Communication Review, Vol. 36(2), p. 27-30, 2006.
    Calvert KL. Architectural framework for active networks (version 1.0). http://protocols.netlab.uky.edu/~calvert/arch-latest.ps, July 1999.
    Calvert KL, Griffioen J, Mullins BC, Sehgal A, Wen S. Concast: Design and Implementation of an Active Network Service. In: Proceedings of Proceedings. Seventh International Conference on Network Protocols, p. 335-344, November 1999.
    Campbell RH, Liu Z, Mickunas MD, Naldurg P, Yi S. Seraphim: dynamic interoperable security architecture for activenetworks. In: Proceedings of 2000 IEEE Third Conference on Open Architectures and Network Programming, p. 55-64, March 2000.
    Cheng L, Galis A. Simple key exchange for active networks. In: Proceedings of 13th IEEE International Conference on Networks, p. 6-11, Nov. 2005.
    Cheng L, Galis A. Security Protocol for Active Networks. In: Proceedings of 14th IEEE International Conference on Networks, p. 1-6, 2006.
    Chong CW, Ramachandran V, Eswarau C. Web navigation efficiency analysis. In: Proceedings of the 1999 IEEE International Conference on Systems, Man, and Cybernetics, p. 69-73, October 1999.
    Christensen KJ, Molle M, Li S. Comparison of the Gigabit Ethernet Full-Duplex Repeater, CSMA/CD, and 1000/100-Mbps Switched Ethernet. In: Proceedings of 23rd Annual Conference on Local Computer Networks, p. 336-344, October 1998.
    Cooper I, Dilley J. Known HTTP Proxy/Caching Problems. Internet RFC 3143, June 2001.
    Decasper D, Dittia Z, Parulkar G, Plattner B. Router plugins: a software architecture for next-generation routers. IEEE/ACM Transactions on Networking (TON), Vol. 8(1), p. 2-15, 2000.
    Decasper D, Parulkar G, Choi S, DeHart J, Wolf T, Plattner B. A Scalable High-Performance Active Network Node. IEEE Network, Vol. 31(1), p. 8-19, 1999.
    Dieckman D, Alexander P, Wilsey PA. ActiveSpec: A Framework for the Specification and Verification of Active Network Services and Security Policies. In: Proceedings of Workshop on Formal Methods and Security Protocols, June 1998.
    Duysburgh B, Lambrecht T, Turck FD, Dhoedt B, Demeester P. An Active Networking Based Service for Media Transcoding in Multicast Sessions. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, Vol. 34(1), p. 19-31, 2004.
    Floyd S. Congestion Control Principles. Internet RFC 2914, September 2000.
    Freed N. Behavior of and Requirements for Internet Firewalls. Internet RFC 2979, October 2000.
    Fry M, Ghosh A. Application Level Active Networking. Computer Networks, Vol. 31(7), p. 655-667, 1999.
    Goodman J, Greenberg AG, Madras N, March P. Stability of binary exponential backoff. Journal of the ACM (JACM), Vol. 35(3), p. 579-602, 1988.
    Handley M, Rescorla E. Internet Denial-of-Service Considerations. Internet RFC 4732, November 2006.
    Hansen PB. Operating system principles. ACM Classic Books Series (ISBN: 0-13-637843-9), 1973.
    Harari E. A Look at the Buffer-Overflow Hack. Linux Journal, Vol. 1999(61), p. 25, 1999.
    Hedrick C. Routing Information Protocol. Internet RFC 1058, June 1988.
    Hoffman P. Algorithms for Internet Key Exchange version 1 (IKEv1). Internet RFC 4109, May 2005.
    Husaini SF. Using the Java Native Interface. ACM Crossroads, Vol. 4(2), p. 18-23, 1997.
    IEEE 802 Working Groups. IEEE 802.11. ISO/IEC 8802-11, 1999.
    ITU-T G.114, http://www.itu.int
    James JH, Chen B, Garrison L. Implementing VoIP: a voice transmission performance progress report. IEEE Communications Magazine, Vol. 42(7), p. 36-41, 2004.
    JDK, http://java.sun.com
    Karnouskos S, Busse I, Covaci S. Agent Based Security for the Active Network Infrastructure. In: Proceedings of the First International Working Conference on Active Networks, p. 330-44, 1999.
    Katz D. IP Router Alert Option. Internet RFC 2113, February 1997.
    Kent S, Seo K. Security Architecture for the Internet Protocol. Internet RFC 4301, December 2005.
    Krishnaswamy S, Evans JB, Minden GJ. A prototype framework for providing hop-by-hop security in an experimentally deployed active network. In: Proceedings of 2002 DARPA Active Networks Conference and Exposition, p. 216-222, May 2002.
    Kulkarni AB, Minden GJ, Hill R, Wijata Y, Sheth S, Pindi H, et al. Implementation of a Prototype Active Network. In: Proceedings of IEEE Open Architectures and Network Programming, p. 130-143, April 1998.
    Legedza U, Wetherall D, Guttag J. Improving the Performance of Distributed Applications Using Active Networks. In: Proceedings of IEEE INFOCOM 1998, p. 213-219, March 1998.
    Lehman LW, Garland SJ, Tennenhouse DL. Active Reliable Multicast. In: Proceedings of IEEE INFOCOM 1998, p. 581-589, March 1998.
    Li LQ. Java Virtual Machine - Present And Near Future. In. Proceedings of Technology of Object-Oriented Languages, p. 480, August 1998.
    Lindell B. Active Networks Protocol Specification for Hop-By-Hop Message Authentication and Integrity. http://www.isi.edu/abone/DOCUMENTS/OSsec.txt, April 2000.
    Maughan D, Schertler M, Schneider M, Turner J. Internet Security Association and Key Management Protocol (ISAKMP). Internet RFC 2408, November 1998.
    Mogul J, Deering S. Path MTU Discovery. Internet RFC 1191, November 1990.
    Mogul JC, Ramakrishnan KK. Eliminating receive livelock in an interrupt-driven kernel. ACM Transactions on Computer Systems (TOCS), Vol. 15(3), p. 217-252, 1997.
    Moore JT, Hicks M, Nettles S. Practical Programmable Packets. In: Proceedings of IEEE INFOCOM 2001, p. 41-50, April 2001.
    Murphy S. Security Architecture for Active Nets. DARPA Active Networks Working Group Draft, November 2001.
    Murphy S, Lewis E, Puga R, Watson R, Yee R. Strong security for active networks. In: Proceedings of the Open Architectures and Network Programming, p. 63-70, April 2001.
    Murphy S, Hayatnagarkar A, Krishnaswamy S, Morrison W, Watson R. Prophylactic, treatment and containment techniques for ensuring active network security. In: Proceedings of DARPA Information Survivability Conference and Exposition, p. 22-24, April 2003.
    NDIS, http://www.microsoft.com
    Neamtiu I, Foster JS, Hicks M. Understanding source code evolution using abstract syntax tree matching. ACM SIGSOFT Software Engineering Notes, Vol. 30(4), p. 1-5, 2005.
    Neogi A, Chiueh TC, Stirpe P. Performance Analysis of an RSVP-Capable Router. IEEE Network, Vol. 13(5), p. 56-63, 1999.
    Nguyen C, Platt D, Safaei F. Design of Processing Resources Scheduling in Programmable Networks. In: Proceedings of 2003 Australian Telecommunications, Networks and Applications Conference, December 2003.
    Nygren EL, Garland SJ, Kaashoek MF. PAN: A High-Performance Active Network Node Supporting Multiple Mobile Code Systems. In: Proceedings of IEEE Open Architectures and Network Programming, p. 78-89, March 1999.
    Perlman R. An algorithm for distributed computation of a spanningtree in an extended LAN. ACM SIGCOMM Computer Communication Review, Vol. 15(4), p. 44-53, 1985.
    Postel J. User Datagram Protocol. Internet STD 6, August 1980.
    Postel J. Transmission Control Protocol. Internet STD 7, September 1981.
    Postel J. Internet Protocol. Internet STD 5, September 1981(b).
    Postel J. Internet Official Protocol Standards. Internet RFC 2000, February 1997.
    Prabhavalkar N, Parashar M. Controlling unresponsive connections in an active network architecture. International Journal of Network Management, Vol. 13(4), p. 289-305, 2003.
    Qie X, Bavier A, Peterson L, Karlin S. Scheduling Computations on a Programmable Router. Technical Report TR-615-00, November 2000.
    Ramachandran V, Pandey R, Chan SG. Fair Resource Allocation in Active Networks. In: Proceedings of the IEEE International Conference on Computer Communications and Networks, p. 468-475, October 2000.
    Reid GC. Thinking in Postscript. Addison-Wesley (C) (ISBN: 0201523728), 1990.
    Ruf L, Pletka R, Erni P, Droz P, Plattner B. Towards High-performance Active Networking. In: Proceedings of the Fifth Annual International Working Conference on Active Networks, p. 32-43, December 2003.
    Sabrina F, Jha S. An Adaptive Resource Management Architecture for Active Networks. Telecommunication Systems, Vol. 24, p. 139-166, 2003.
    Sander T, Tschudin CF. Protecting Mobile Agents Against Malicious Hosts. Lecture Notes In Computer Science, Vol. 1419, p. 44-60, 1998.
    Schwartz B, Jackson AW, Strayer WT, Zhou W, Rockwell RD, Partridge C. Smart packets: applying active networks to network management. ACM Transactions on Computer Systems (TOCS), Vol. 18(1), p. 67-88, 2000.
    Srisuresh P, Egevang K. Traditional IP Network Address Translator (Traditional NAT). Internet RFC 3022, January 2001.
    Tennenhouse D, Smith J, Sincoskie W, Wetherall D, Minden G. A Survey of Active Network Research. IEEE Communications Magazine, Vol. 35(1), p. 80-86, 1997.
    Tennenhouse DL, Wetherall DJ. Towards an active network architecture. ACM SIGCOMM Computer Communication Review, Vol. 37(5), p. 81-94, 2007.
    Tullmann P, Hibler M, Lepreau J. Janos: A Java-oriented OS for Active Network Nodes. IEEE Journal on Selected Areas in Communications, Active and Programmable Networks, Vol. 19(3), p. 501-510, 2001.
    Welty CA. Augmenting abstract syntax trees for program understanding. In: Proceedings of 12th IEEE International Conference on Automated Software Engineering, November, p. 126-133, 1997.
    Wenzel Z, Klensin J, Bush R, Huter S. Guide to Administrative Procedures of the Internet Infrastructure. Internet RFC 2901, August 2000.
    Wetherall D. Active network vision and reality: lessons from a capsule-based system. Operating Systems Review, Vol. 34(5), p. 64-79, 1999.
    Williams D, Nguyen C, Fekete A, Hitchens M, Kummerfeld B. An Active Network Bandwidth Reservation Scheme. In: Proceedings of IEEE Open Architectures and Network Programming, p. 59-66, March 1999.
    Wolf T, Turner J. Design Issues for High Performance Active Routers. In: Proceedings of the International Zurich Seminar on Broadband Communications, p. 199-205, February 2000.
    Wu Y, Xu K, Wu J, Xu M. The Research on Security Architecture for Active Networks and Security Mechanism for Active Nodes. In: Proceedings of 10th International Conference on Telecommunications, p. 58-65, February 2003.

    下載圖示
    2009-12-22公開
    QR CODE