Active network vision and reality: lessions from a capsule-based system
Proceedings of the seventeenth ACM symposium on Operating systems principles
Network infrastructure for massively distributed games
NetGames '02 Proceedings of the 1st workshop on Network and system support for games
A mobile agent-based active network architecture for intelligent network control
Information Sciences—Informatics and Computer Science: An International Journal - Special issue: Intelligent multimedia computing and networking
Active Management Framework for Distributed Multimedia Systems
Journal of Network and Systems Management
Programmable Agents for Active Distributed Monitoring
DSOM '99 Proceedings of the 10th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management: Active Technologies for Network and Service Management
Transport-Level Protocol Coordination in Cluster-to-Cluster Applications
IDMS '01 Proceedings of the 8th International Workshop on Interactive Distributed Multimedia Systems
Server Load Balancing with Network Support: Active Anycast
IWAN '00 Proceedings of the Second International Working Conference on Active Networks
A Flexible IP Active Networks Architecture
IWAN '00 Proceedings of the Second International Working Conference on Active Networks
Managing Complexity of Designing Routing Protocols Using a Middleware Approach
CAiSE '02 Proceedings of the 14th International Conference on Advanced Information Systems Engineering
Informatics - 10 Years Back. 10 Years Ahead.
A perspective on how ATM lost control
ACM SIGCOMM Computer Communication Review
Evolution of Operation Support Systems in Public Data Networks
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
How to lease the internet in your spare time
ACM SIGCOMM Computer Communication Review
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Integrating active networking and commercial-grade routing platforms
SWINE'00 Proceedings of the Workshop on Intelligence at the Network Edge
Self-contextual network management system
International Journal of Internet Protocol Technology
Resonance: dynamic access control for enterprise networks
Proceedings of the 1st ACM workshop on Research on enterprise networking
Network virtualization: state of the art and research challenges
IEEE Communications Magazine
Supporting communities in programmable grid networks: gTBN
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
A survey of network virtualization
Computer Networks: The International Journal of Computer and Telecommunications Networking
Management and performance of virtual and execution environments in FAIN
IWAN'04 Proceedings of the 6th IFIP TC6 international working conference on Active networks
A better way to negotiate for testbed resources
Proceedings of the Second Asia-Pacific Workshop on Systems
Queue - Large-Scale Implementations
Hi-index | 0.00 |
The Tempest framework provides a programmable network environment by allowing the dynamic introduction and modification of network services at two levels of granularity. First, the switchlet and associated virtual network concepts enable the safe introduction of alternative control architectures into an operational network. The timescales over which such new control architectures can be introduced might vary from, for example, a video conferencing specific control architecture, which is active only for the duration of the conference, to a new version of a general purpose control architecture, which might be active for several months or longer. Second, the Tempest framework allows refinement of services at a finer level of granularity by means of the connection closure concept. In this case modification of services can be performed at an application-specific level. These attributes of the Tempest framework allows service providers to effectively become network operators for some well defined partition of the physical network. This enables them to take advantage of the knowledge they possess about how the network resources are to be used, by programming their own specially tailored control architecture. This, as our work with the Tempest shows, is a spur to creativity allowing many of the constraints imposed on operators and end users to be rethought and for new techniques to be quickly and safely introduced into working networks