Collection of network information in active networks
ACM SIGOPS Operating Systems Review
A mobile agent-based active network architecture for intelligent network control
Information Sciences—Informatics and Computer Science: An International Journal - Special issue: Intelligent multimedia computing and networking
Using the Cross-Entropy Method to Guide/Govern Mobile Agent's Path Finding in Networks
MATA '01 Proceedings of the Third International Workshop on Mobile Agents for Telecommunication Applications
Dynamic Load-Balancing for Distibuted Management in Active Networks
IWAN '00 Proceedings of the Second International Working Conference on Active Networks
The Active Process Interaction with Its Environment
IWAN '00 Proceedings of the Second International Working Conference on Active Networks
IWAN '00 Proceedings of the Second International Working Conference on Active Networks
Data Transcoding in Multicast Sessions in Active Networks
IWAN '00 Proceedings of the Second International Working Conference on Active Networks
AEGIS: An Active-Network-Powered Defense Mechanism against DDoS Attacks
IWAN '01 Proceedings of the IFIP-TC6 Third International Working Conference on Active Networks
IWAN '01 Proceedings of the IFIP-TC6 Third International Working Conference on Active Networks
Fast and Secure Packet Processing Environment for Per-Packet QoS Customization
IWAN '01 Proceedings of the IFIP-TC6 Third International Working Conference on Active Networks
IWAN '01 Proceedings of the IFIP-TC6 Third International Working Conference on Active Networks
Active Networks for 4G Mobile Communication: Motivation, Architecture, and Application Scenarios
IWAN '02 Proceedings of the IFIP-TC6 4th International Working Conference on Active Networks
Active Technology as an Efficient Approach to Control DiffServ Networks: The DACA Architecture
MMNS '02 Proceedings of the 5th IFIP/IEEE International Conference on Management of Multimedia Networks and Services: Management of Multimedia on the Internet
An Active Network Architecture: Distributed Computer or Transport Medium
ICN '01 Proceedings of the First International Conference on Networking-Part 2
New Mechanisms for Extending PLAN Functionality in Active Networks
IWAN '00 Proceedings of the Second International Working Conference on Active Networks
Considering processing cost in network simulations
MoMeTools '03 Proceedings of the ACM SIGCOMM workshop on Models, methods and tools for reproducible network research
Active security management based on secure zone cooperation
Future Generation Computer Systems - Special issue: Modeling and simulation in supercomputing and telecommunications
SRIRAM: A scalable resilient autonomic mesh
IBM Systems Journal
Optimizing multimedia transcoding multicast trees
Computer Networks: The International Journal of Computer and Telecommunications Networking
IEEE/ACM Transactions on Networking (TON)
Information fusion for wireless sensor networks: Methods, models, and classifications
ACM Computing Surveys (CSUR)
Design and analysis of a stable set-up protocol for transcoding multicast trees in active networks
Journal of Network and Computer Applications
CompSysTech '07 Proceedings of the 2007 international conference on Computer systems and technologies
A security architecture for active networks
AIC'04 Proceedings of the 4th WSEAS International Conference on Applied Informatics and Communications
Computational intelligence and active networks
TELE-INFO'05 Proceedings of the 4th WSEAS International Conference on Telecommunications and Informatics
Optimizing content distribution through adaptive distributed caching
Computer Communications
Formalizing active networks security with seal-calculus
ISPA'03 Proceedings of the 2003 international conference on Parallel and distributed processing and applications
Active congestion control using available bandwidth-based congestion detection
ICAI'05/MCBC'05/AMTA'05/MCBE'05 Proceedings of the 6th WSEAS international conference on Automation & information, and 6th WSEAS international conference on mathematics and computers in biology and chemistry, and 6th WSEAS international conference on acoustics and music: theory and applications, and 6th WSEAS international conference on Mathematics and computers in business and economics
Multipath routing slice experiments in federated testbeds
The future internet
Managing trust for secure active networks
CEEMAS'05 Proceedings of the 4th international Central and Eastern European conference on Multi-Agent Systems and Applications
An active node management system for secure active networks
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
FSKD'05 Proceedings of the Second international conference on Fuzzy Systems and Knowledge Discovery - Volume Part I
On achieving efficiency and fairness in video transportation
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part I
Secure dynamic anycasting for 'best' server selection using active networks
Computer Communications
Hi-index | 0.00 |
Active networks represent a new approach to network architecture. Routers can perform computations on user data, while packets can carry programs to be executed on routers and possibly change their state. Currently, the research community is divided concerning the usefulness of active networks. On the one hand, active networks provide a much more flexible network infrastructure, with increased capabilities. On the other hand, they are obviously more complex than traditional networks and raise considerable security issues. The purpose of this article is to provide a broad survey on active networks. The first goal is to highlight their efficiency in a variety of applications. After presenting some key points on each application, we discuss some current experimental technologies and assess the usefulness of active networks in congestion control, multicasting, caching, and network management. The second goal is to address the security issues that active networks raise: the problem is defined, and techniques for solving it are presented and elaborated upon with a description of a specific implementation of a secure environment and related performance measures. Issues related to the design of a programming language for active networks are also discussed. The third goal is to classify active network architectures based on their design approach. Thus an inclusive presentation of currently proposed architectures, which focuses on their design attributes, capabilities, performance, and security, is given.