액티브네트워크보안및관리 채기준 이화여자대학교컴퓨터학과. KRnet
|
|
- Damian Doyle
- 6 years ago
- Views:
Transcription
1 액티브네트워크보안및관리 채기준 이화여자대학교컴퓨터학과 1
2 Contents Network Management Technology Active Network Management Network Management using Active Network Technology Active Network Security Conclusions References 2
3 Network Management Technology 3
4 Network Management the process of controlling a complex data network to maximize its efficiency and productivity the ability to sustain a certain quality of service to end users under both normal and abnormal operating conditions the ability to improve network performance according to criteria of both robustness and efficient use of network resources 4
5 NM Functional Requirements Fault Management Detection, isolation and correction of abnormal operations Configuration Management Identify managed resources and their connectivity discovery Account Management Keep track of resource usage for charging Performance Management Monitor and evaluate the behavior of managed resources Security Management Allow only authorized access and control 5
6 Standard Management Frameworks Internet Network Management Framework (IETF) SNMPv1, SNMPv2, SNMPv3 OSI Network Management Framework(ISO/ITU-T) CMIP (X.700 Series) Object Oriented Approach Telecommunication Management Network (ITU-T) TMN (M.3000 Series) Use OSI CMIP for the management protocol B, S, N, NE, E : layered concept 6
7 Architectural Model of NMS NMS is a collection of tools for network monitoring and control based on the manager-agent paradigm. User Presentation Software Network Management Software Communication and Database Support Software 7
8 Current Network Management Current System and Network Management Mostly Manual Management Centralized Management Applications Management by remote access to instrumentation Stand-alone Management Static Persistent Management Reactive Management SNMP based 8
9 Active Network Management Router Sender Active Router Receiver 9
10 Issues & Requirements for ANM 10 Dynamically Composable Management Backward Compatibility With SNMP Applications-Controlled Management Automation of Configuration Management Automation of Problem Management Providing Semantically Richer Network Data Generation of Active Element Management Data & Instrumentation Secure Management Proactive Management
11 ANM Architecture Active Network Node Manager Consists of SW to monitor, configure, analyze and control a node Interacts with local node instrumentation via NodeOS API Interacts with EEs Interacts with the NMS 11
12 Node Manager Architecture (1/2) sync. access async. interaction network event 12
13 Node Manager Architecture (2/2) A Three-Layer Architecture Instrumentation Layer Access to event and management data provided by various node components Active MIB (AMIB) Data Modeling Layer Organize management data Local Manager Software Manage specific node functions and components Access mechanism and protocol to interact with the NMS 13
14 Automating Management of Active Components CMF(Common Management Framework) Management of EEs Discovery mechanism to probe newly deployed EEs INIT/EXPORT 14
15 Network Management using Active Network Technology SENCOMM ABLE/ABLE++ NESTOR AVNMP 15
16 SENCOMM Smart Environment for Network Control, Monitoring and Management BBN Technologies(funded by DARPA) Sep Feb
17 General Requirements (1/2) Packet delivery IP Heterogeneous network not all active nodes Packet handling SENCOMM probes must be able to request any incoming packet or a copy from any interface Probes must be able to re-insert a packet into forwarding path before initial demux before normal routing decision directly into an output interface queue 17
18 General Requirements (2/2) Message Size Control messages small enough to fit in a single datagram MIB Access on active node Persistent Storage Bootstrapping and long-term storage of loadable libraries Distributed Time Service Correlation of distributed data or synchronized action Secure Management Secure access to its management functions 18
19 SENCOMM Architecture Major Component SENCOMM Management SMEE ASP AA EEs ASP/ISI Execution Environment loadable libraries (SMEE) Smart Probes(SPs) Loadable Libraries(LLs) Management API Smart Packet : smart packet smart probes NodeOS fast forwarding Anetd/ABone smart packet Installing Loadable Libraries Transporting SENCOMM Smart Probes Exchanging Control and Security Messages 19
20 SMEE SENCOMM Management Execution Environment Two Primary Functions Provide the EE for smart probes Active node management, including other EE s and the NodeOS (responsibility may lie or share with NodeOS) Active Network Management IP Router Notification of status changes in network interfaces and kernel routing table Access to router configuration Active Node Smart probes collect and process active networking info. SMEE requires enhanced packet copying and handling from active node 20
21 Smart Probes(SPs) Executable Programs that perform management functions Requirements Residence : Operation after Packet forwarded Globally Unique Name Single datagram Access to Loadable Libraries Hibernate until occurrence of registered event Soft-state can determine life of probe Encapsulated in ANEP datagram Transported using UDP/IP or TCP/IP 21 SMEE loadable libraries smart probes NodeOS
22 Loadable Libraries(LLs) Invoked by a smart probe to be executed Provide classes, methods and data structures used by one or more smart probes Shared among multiple probes Requirements Sharable Dynamically Loadable Globally Unique Name Version Number Separation of State Sharable State 22 SMEE loadable libraries smart probes
23 Management API for EEs and AAs SMEE access to EEs Mechanism EEs provide LL of function wrappers to internal management functions Wrappers provide interface for smart probes Probe calls function in the EE SMEE loadable library smart probes NodeOS EEs AA 23
24 ABLE Active Bell Lab Engine Bell Labs, Lucent Technologies Primary Component: Active Engine AE : Written in C, Execute Programs : Java code Isolation of the active mechanism Easily deployed in current IP networks ABLE Design Principles Generality and Simplicity Modularity Inter-operability and heterogeneity Long Lasting Sessions Cost Visibility Safety and Security 24
25 ABLE Architecture (1/2) 25
26 ABLE Architecture (2/2) Diverter Part of Router Active packet -> Active Engine Active manager The Core of AE Session generation, management, termination Session resource usage management(cpu, Bandwidth, ) Security stream module Monitoring of Network Usage by Session Router Interface Session router MIB Using SNMP Java object 26
27 ABLE++ Architecture (1/3) 27 Extension to the ABLE architecture Active Engine for ABLE++ Session Broker Creates, manages, and cleans up Active Sessions Controls communication and mobility Info Broker Export local device information to Active Session Provides efficient monitoring channel Engine, Cache, Interface Control Broker Active Session controls router Provides secure channel for control operation Engine, Security module, Interface
28 ABLE++ Architecture (2/3) AS1 AS2 AS3 ASn Active Sessions Active Engine Session Info Control Brokers Security Module Filter SNMP CLI OS API Managed Device 28
29 ABLE++ Architecture (3/3) Local Cache Data classification by volatility Volatile Quasi-volatile Static Quasi-volatile, Static -> Cache Reduce the load from the router Shortens the retrieval time Info Broker Session Interface Engine Cache Router SNMP, DeviceOS, etc 29
30 Active Network Security SANE(Secure AN Environment) Seraphim Safetynet PLAN(A Packet Language for AN) 30
31 Why is Security necessary in AN? To maintain the availability of the shared network infrastructure To grant correctness of the service To detect possible modification and to prevent malicious sniffing To avoid the possibility of combined attacks performed by colluding active packets 31
32 Security in Active network 4 types of exposure Corruption of information Disclosure of information Theft of service Denial of service Security Services Authentication Authorization Secrecy Integrity 32
33 Active Network Security Method Active Packet approach Performance problem Smart Packets, Active IP Option Active Node approach Good performance but poor security Limited flexibility ANTS, DAN. Appropriate balance is required. Two Approaches for AN Security System point of view : SANE, Seraphim, Smart Packets Programming point of view : Safetynet, PLAN 33
34 Active Packet Approach Early active network architecture. Code is carried by the packets. Active packet may misuse active packets. Proposed Techniques Fault tolerance Replication : packets replicate at each node Redirection : packets may seek alternative routes Persistence : packets are temporarily stored against node failure Encryption 34
35 Active Node Approach 35 Packets do not carry the actual code, but instead carry some identifiers or references. Actual code resides in active node. Motivation Performance problem Capability problem Active packets may misuse network resources and other active packets. Proposed Techniques Authentication of Active packets Monitoring and Control on resource usage Proof Carrying Code(PCC)
36 SANE Secure Active Network Environment University of Pennsylvania SwitchWare(1996 ) environment Component : Active Packet, Switchlet, SANE SwitchWare Layers Active Network Active Extension Packets Active Router Infrastructure Packet Language and Services 36
37 SANE Architecture (1/3) 2 concepts of Security Integrity Trust Security Services Cryptographic Primitives Public Key Infrastructure Key Establishment Protocol Packet Authentication Packet Encryption Naming 37
38 SANE Architecture (2/3) Layered architecture Lower layer (Static check) Higher layer (Dynamic check) Security Maintenance Ways Perform remote authentication for node-to-node authentication Provide restricted execution environment Use novel naming scheme to partition the node s service name space between users 38
39 SANE Architecture (3/3) PLAN Packet PLAN Packet Caml Switchlet Caml Switchlet Node-Node Authentication PLAN ALIEN Library ALIEN/Caml/OS Dynamic Integrity Checks Recovery AEGIS Static Integrity Checks 39
40 Seraphim University of Illinois Cherubim project based (mobile agent) A universal policy is inadequate for active networks Allow varied security schemes for anticipated unknown applications -> Dynamic security policies 40
41 Seraphim Architecture (1/4) 41
42 Seraphim Architecture (2/4) 42 Reference Monitor(RM) The RM is implemented as a co-located extension to the NodeOS. Every node has a RM, through which all access to the node resource occur. Core security services verify the signature on the active capability RM evaluates the active capability to check access. The policy framework is a component of RM. Four different types of access control policy. Mandatory access control(mac) Discretionary access control(dac) Double discretionary access control(ddac) Role-based access control(rbac)
43 Seraphim Architecture (3/4) Active Capability(AC) Mobile Agent carrying security policies used in the access control decision making process Executable Java bytecode Protected by digital signature Active Capsule Certificate Active Code Active Capability Signature Certificate Active Code Signature 43
44 Seraphim Architecture (4/4) RM & Policy Administrator Application Obtain AC Request AC AC Evaluation AC Cache Policy Framework Component Reference Monitor Request AC Obtain AC Policy Administrator AC Repository Policy Server Componentized Policy Framework Policy Administrator 44
45 Seraphim : Performance Ping App Active Node A Active Node B Active Node C RM RM RM 5 4 Policy Server 45 System Configuration Avg. RTT (ms) No RM 10 RM without Cache 1494 RM with Cache 21 RM with Decisions in Cache 10
46 Conclusions Active Network Management 위한아키텍처제시필요 기존 IP 망에 ANM Technology 적용 기존라우터에장착 / 연결하여기능수행 새로운 ANM 프레임워크제시 Policy based Management New Security Services can be deployed. Tradeoffs Security-performance tradeoff Usability/flexibility-complexity tradeoff AN Management와 Security에필요한새로운이슈들과기술도출 AN Service 구현을위한테스트베드기반필요 46
47 References D. S. Alexander, W. A. Arbaugh, A. D. Keromytis, J. M. Smith, "Security in Active Networks ", D. S. Alexander, W. A. Arbaugh, A. D. Keromytis, J. M. Smith, "A Secure Active Network Environment Architecture: Realization in SwitchWare," IEEE Network Magazine, special issue on Active and Programmable Networks, 12(3), R. H. Campbell, et al., "Seraphim: Dynamic Interoperable Security Architecture for Active Networks", IEEE OPENARCH 2000, Tel- Aviv, Israel, Mar Alden W. Jackson, James P.G. Sterbenz, Matthew N. Condell, David J. Waitzman, "SENCOMM Architecture", Technology Document of BBN Tech., April Danny Raz and Yuval Shavitt., An Active Network Approach to Efficient Network Management.,IWAN'99, July 1999, Berlin, Germany. 47
KRnet Active Network 관리기술
KRnet 2001 Active Network 관리기술 전남대학교 최덕재 Contents Overview of Network Management Toward Active Network Network Management Using Active Network Technology BBN 의 SmartPacket 및 SENCoMM(Smart Environ- ment
More informationA Secure PLAN (extended version)
A Secure PLAN (extended version) Michael Hicks, Cornell University Angelos D. Keromytis, Columbia University Jonathan M. Smith, U. Penn DARPA Active Networks Conference and Exposition (DANCE), San Francisco
More informationSecure Active Network Environment (SANE) Trust, but Verify
Secure Active Network Environment (SANE) Trust, but Verify Old Russian Saying Scott Alexander Bill Arbaugh Angelos Keromytis Jonathan Smith University of Pennsylvania Network Infrastructures Shared, so
More informationSecurity in Active Networks: Problems, Approaches, Results and Challenges
Security in Active Networks: Problems, Approaches, Results and Challenges IWAN 99 Tutorial June 30th, 1999 Jonathan M. Smith University of Pennsylvania http://www.cis.upenn.edu/~jms Tutorial Outline: Introduction
More informationRule based Forwarding (RBF): improving the Internet s flexibility and security. Lucian Popa, Ion Stoica, Sylvia Ratnasamy UC Berkeley Intel Labs
Rule based Forwarding (RBF): improving the Internet s flexibility and security Lucian Popa, Ion Stoica, Sylvia Ratnasamy UC Berkeley Intel Labs Motivation Improve network s flexibility Middlebox support,
More informationA Scalable High-Performance Active Network Node
A Scalable High-Performance Active Network Node D. Decasper, B. Plattner ETH Zurich G. Parulkar, S. Choi, J. DeHart, T. Wolf Washington U Presented by Jacky Chu Motivation Apply Active Network over gigabits
More informationAnnouncements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris
Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,
More informationIntroduction to Systems and Network Management
Introduction to Systems and Network Management Shang Juh Kao Dept. of Computer Science and Engineering National Chung Hsing University Tel: 04-2284-0497 x 708 Email: sjkao@cs.nchu.edu.tw 1 This course
More informationRule-Based Forwarding
Building Extensible Networks with Rule-Based Forwarding Lucian Popa Norbert Egi Sylvia Ratnasamy Ion Stoica UC Berkeley/ICSI Lancaster Univ. Intel Labs Berkeley UC Berkeley Making Internet forwarding flexible
More informationBlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Feature and Technical Overview SWDT305802-524791-0331031644-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...
More informationSecurity Issues in Active Networking
Security Issues in Active Networking IWAN 01 Tutorial September 30th, 2001 Jonathan M. Smith University of Pennsylvania http://www.cis.upenn.edu/~jms Tutorial Outline: Security Challenges Principles of
More informationWDM network management
IO2654 Optical Networking WDM network management Paolo Monti Optical Networks Lab (ONLab), Communication Systems Department (COS) http://web.it.kth.se/~pmonti/ For some material in this lecture check the
More informationA Mobile Agent-based Model for Service Management in Virtual Active Networks
A Mobile Agent-based Model for Service Management in Virtual Active Networks Fábio Luciano Verdi and Edmundo R. M. Madeira Institute of Computing, University of Campinas (UNICAMP), Campinas-SP, Brazil
More informationNetwork Management. Network Management: Goals, Organization and Functions
Network Management Network Management: Goals, Organization and Functions Telecomm/Data Network A telecommunication/data network is composed from many network elements (switching systems, terminals, circuits
More informationActive Networks. Bob Braden (ISI) with Craig Partridge, Alden Jackson (BBN) 7 August 2002
Active Networks Bob Braden (ISI) with Craig Partridge, Alden Jackson (BBN) 7 August 2002 DARPA Workshop Programmable Packets for Intelligent Networks Menlo Park, CA 1 Outline A. What is active networking?
More informationWhat is New in Cisco ACE 4710 Application Control Engine Software Release 3.1
What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 PB478675 Product Overview The Cisco ACE Application Control Engine 4710 represents the next generation of application switches
More informationDEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING QUESTION BANK SUBJECT : NE7007 - NETWORK MANAGEMENT SEM / YEAR : III / II year M.E. (Communication Systems ) UNIT I FUNDAMENTALS OF COMMON NETWORK
More informationProgrammable Network Node: Applications
Programmable Network Node: Applications Tal Lavian 1 tlavian@ieee.org Rob Jaeger 1,2 rojaeger@nortelnetworks.com rfj@cs.umd.edu 1 Technology Center, Enterprise Solutions, Nortel Networks 2 Department of
More informationF O U N D A T I O N. OPC Unified Architecture. Specification. Part 1: Concepts. Version 1.00
F O U N D A T I O N Unified Architecture Specification Part 1: Concepts Version 1.00 July 28, 2006 Unified Architecture, Part 1 iii Release 1.00 CONTENTS Page FOREWORD... vi AGREEMENT OF USE... vi 1 Scope...
More informationLecture 5: Foundation of Network Management
Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information
More informationSmart Packets: Applying Active Networks to Network Management
Smart Packets: Applying Active Networks to Network Management Beverly Schwartz et. al. BBN Technologies Presented by Jinghua Hu 09/17/2002 ECE697J, UMASS Amherst 1 Outline Introduction Smart Packets System
More informationActive Networks for Efficient Distributed Network Management
ACTIVE, PROGRAMMABLE, AND MOBILE CODE NETWORKING Active Networks for Efficient Distributed Network Management Danny Raz and Yuval Shavitt, Bell Laboratories, Lucent Technologies ABSTRACT The emerging next
More informationDistributed Object-Based Systems The WWW Architecture Web Services Handout 11 Part(a) EECS 591 Farnam Jahanian University of Michigan.
Distributed Object-Based Systems The WWW Architecture Web Services Handout 11 Part(a) EECS 591 Farnam Jahanian University of Michigan Reading List Remote Object Invocation -- Tanenbaum Chapter 2.3 CORBA
More informationBlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide
BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Administration Guide SWDT487521-636611-0528041049-001 Contents 1 Overview: BlackBerry Enterprise Server... 21 Getting started in your BlackBerry
More informationNetwork Management. Stuart Johnston 08 November 2010
Network Management Stuart Johnston stuart.johnston@inmon.com 08 November 2010 Slides from: Computer Networking: A Top Down Approach, 4th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007 All material
More informationCross Layer Protocol Design. Radio Communication III
Cross Layer Protocol Design Radio Communication III The layered world of protocols The ISO OSI model OSI model Introduction» The open systems interconnection reference model (OSI model) describes a layered
More informationRequest for Comments: 1901
Network Working Group Request for Comments: 1901 Category: Experimental SNMPv2 Working Group J. Case SNMP Research, Inc. K. McCloghrie Cisco Systems, Inc. M. Rose Dover Beach Consulting, Inc. S. Waldbusser
More informationIP Mobility Support for QoS over Heterogeneous Networks
IP Mobility Support for QoS over Heterogeneous Networks Eun Kyoung PAIK Feb. 7-9, 2007 Future Technology Lab. KT Contents Introduction Network Topology Perspective Multihoming Network Layer Perspective
More informationControl Plane Security Overview
Control Plane Security Overview Wes Doonan Control Plane R&D Hybrid Networks Packet-based Delivery ( ) Packets delivered via standard IP infrastructure Routes configured or learned, packets forwarded per
More informationExtensible Routers. Jeff Chase Duke University
Extensible Routers Jeff Chase Duke University Motivation We ve looked at many different proposals for router extensions and changes. There are many others (multicast, anycast, IPv6) There are huge obstacles
More informationManaging and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals:
Managing and Securing Computer Networks Guy Leduc Chapter 2: Software-Defined Networks (SDN) Mainly based on: Computer Networks and Internets, 6 th Edition Douglas E. Comer Pearson Education, 2015 (Chapter
More informationSafety and Security of Programmable Network. infrastructure.
Safety and Security of Programmable Network Infrastructures D. Scott Alexander William A. Arbaugh Angelos D. Keromytis Jonathan M. Smith University of Pennsylvania September 7, 1998 Abstract Safety and
More informationSOA S90-20A. SOA Security Lab. Download Full Version :
SOA S90-20A SOA Security Lab Download Full Version : https://killexams.com/pass4sure/exam-detail/s90-20a protocol. Before invoking Service A, Service Consumer A must request a ticket granting ticket and
More informationNetwork Management. Stuart Johnston 13 October 2011
Network Management Stuart Johnston stuart.johnston@inmon.com 13 October 2011 Slides from: Computer Networking: A Top Down Approach, 4th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007 All material
More informationActive Networks: A Tutorial
Active Networks: A Tutorial Spring School, Lenk, CH March 6-10th, 2000 Jonathan M. Smith University of Pennsylvania http://www.cis.upenn.edu/~jms Tutorial Outline: Introduction to Active Networks Security
More informationBlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Feature and Technical Overview
BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Feature and Technical Overview SWDT305802-525776-0331031530-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...
More informationSNMP Agent Setup. Simple Network Management Protocol Support. SNMP Basics
Simple Network Management Protocol Support, page 1 SNMP Basics, page 1 SNMP Management Information Base (MIB), page 2 Set Up SNMP, page 3 Import Previously Configured Windows SNMP v1 Community Strings,
More informationPolicy-Driven DISTRIBUTED MANAGEMENT ARCHITECTURES. (Towards Open Distributed Management Architecture) Kazi Farooqui
Policy-Driven DISTRIBUTED MANAGEMENT ARCHITECTURES (Towards Open Distributed Management Architecture) Integrating Management and Distributed Object Technology Kazi Farooqui (farooqui@csi.uottawa.ca) Department
More informationSNMP. Simple Network Management Protocol
SNMP Simple Network Management Protocol Network Management The network management is to Monitor the network Ensure the operations over the network are functional Assure the network works efficiently An
More information, Network Management, Future
Tik-110.350 Computer Networks (3 cr) Spring 2000 E-mail, Network Management, Future Professor Arto Karila Helsinki University of Technology E-mail: Arto.Karila@hut.fi Tik-110.350 Computer Networks, 19.4.2000,
More informationOperating Systems Design Exam 3 Review: Spring Paul Krzyzanowski
Operating Systems Design Exam 3 Review: Spring 2012 Paul Krzyzanowski pxk@cs.rutgers.edu 1 Question 1 An Ethernet device driver implements the: (a) Data Link layer. (b) Network layer. (c) Transport layer.
More informationproducts. OSI is an ISO Standard: OSI was officially adopted as an international standard by the International Organisation of Standards (ISO).
CBCN4103 Open Systems Interconnection (OSI) is a standard d description or "reference model" for how messages should be transmitted between any two points in a telecommunication network. Its purpose is
More informationPNUTS: Yahoo! s Hosted Data Serving Platform. Reading Review by: Alex Degtiar (adegtiar) /30/2013
PNUTS: Yahoo! s Hosted Data Serving Platform Reading Review by: Alex Degtiar (adegtiar) 15-799 9/30/2013 What is PNUTS? Yahoo s NoSQL database Motivated by web applications Massively parallel Geographically
More informationHigh Speed Communication Protocols. ECE 677, High Speed Protocols 1
High Speed Communication Protocols 1 Why? High Speed Transport Protocols Distributed processing - Generally characterized by client-server interactions - operating Systems provide Transparent and highperformance
More informationToday: Distributed Middleware. Middleware
Today: Distributed Middleware Middleware concepts Case study: CORBA Lecture 24, page 1 Middleware Software layer between application and the OS Provides useful services to the application Abstracts out
More informationThe Y-Comm Framework. A new way
The Y-Comm Framework A new way Mobility within Domains Mobile IP is good for moving between large defined domains But we also have to consider mobility issues within a domain which may have a number of
More information70-532: Developing Microsoft Azure Solutions
70-532: Developing Microsoft Azure Solutions Objective Domain Note: This document shows tracked changes that are effective as of January 18, 2018. Create and Manage Azure Resource Manager Virtual Machines
More information02 - Distributed Systems
02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/60 Definition Distributed Systems Distributed System is
More informationLecture 18: Network Management
Lecture 18: Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4183 18-1 Objective Manage a network by managing its components: routers, bridges,
More informationThe OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).
Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication
More informationNET311 Computer Networks Management Standards, Models and Language
NET311 Computer Networks Management Standards, Models and Language Dr. Mostafa H. Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud University mdahshan@ksu.edu.sa
More informationSecure Quality of Service Handling: SQoSH
ACTIVE, PROGRAMMABLE, AND MOBILE CODE NETWORKING Secure Quality of Service Handling: SQoSH D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Steve Muir, and Jonathan M. Smith, University of
More informationDr. Atiq Ahmed. Network. Management. Introduction. Management. OSI Key Areas of Network Management 1/27. Dr. Atiq Ahmed. Network Management
Course Outline Course Structure Credit Hours: 3 (3, 0) Prerequisites: Computer Communication and s Evolution in Architectures Evolution of Protocols Evolution in Functions in Department of Computer Science
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More information2. System Models Page 1. University of Freiburg, Germany Department of Computer Science. Distributed Systems. Chapter 2 System Models
2. System Models Page 1 University of Freiburg, Germany Department of Computer Science Distributed Systems Chapter 2 System Models Christian Schindelhauer 27. April 2012 2. System Models 2.1. Introduction
More informationCHAPTER 1: OPERATING SYSTEM FUNDAMENTALS
CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS What is an operating system? A collection of software modules to assist programmers in enhancing system efficiency, flexibility, and robustness An Extended Machine
More informationChapter 4 Communication
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 4 Communication Layered Protocols (1) Figure 4-1. Layers, interfaces, and protocols in the OSI
More informationCHAPTER. Introduction
CHAPTER 1 Network management takes place between two major types of systems: those in control, called managing systems, and those observed and controlled, called managed systems. The most common managing
More informationCS 640: Introduction to Computer Networks. Today s Lecture. Page 1
CS 640: Introduction to Computer Networks Aditya Akella Lecture 2 Layering, Protocol Stacks, and Standards 1 Today s Lecture Layers and Protocols A bit about s 2 Network Communication: Lots of Functions
More informationWeb as a Distributed System
Web as a Distributed System The World Wide Web is a large distributed system. In 1998 comprises 70-75% of Internet traffic. With large transfers of streaming media and p2p, no longer a majority of bytes,
More informationSecurity Philosophy. Humans have difficulty understanding risk
Android Security Security Philosophy Humans have difficulty understanding risk Safer to assume that Most developers do not understand security Most users do not understand security Security philosophy
More informationExtensible Network Security Services on Software Programmable Router OS. David Yau, Prem Gopalan, Seung Chul Han, Feng Liang
Extensible Network Security Services on Software Programmable Router OS David Yau, Prem Gopalan, Seung Chul Han, Feng Liang System Software and Architecture Lab Department of Computer Sciences Purdue University
More informationOpen Network Operating System
Open Network Operating System Michele Santuari msantuari@fbk.eu FBK CREATE-NET - Future Networks research unit April 28, 2017 Agenda Short introduction to SDN and network programmability Introduction to
More informationConfigure SNMP. Understand SNMP. This chapter explains Simple Network Management Protocol (SNMP) as implemented by Cisco NCS 4000 series.
This chapter explains Simple Network Management Protocol (SNMP) as implemented by Cisco NCS 4000 series. Understand SNMP, page 1 Basic SNMP Components, page 2 SNMPv3 Support, page 3 SNMP Traps, page 4
More informationJAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing
JAVA IEEE TRANSACTION ON CLOUD COMPUTING 1. ITJCC01 Nebula: Distributed Edge for Data Intensive Computing 2. ITJCC02 A semi-automatic and trustworthy scheme for continuous cloud service certification 3.
More informationSNMP. Simple Network Management Protocol
SNMP Simple Network Management Protocol Outline Overview Protocol MIB Net-SNMP Network Management Tools Client Application Development 2 Network Management How to monitor your servers? Trying to use the
More informationSoftware Architecture Patterns
Software Architecture Patterns *based on a tutorial of Michael Stal Harald Gall University of Zurich http://seal.ifi.uzh.ch/ase www.infosys.tuwien.ac.at Overview Goal Basic architectural understanding
More informationNETFUSION DISCOVERY SYSTEM DESCRIPTION
NETFUSION DISCOVERY SYSTEM DESCRIPTION White Paper Contents NetFusion Discovery Overview... 3 Network Discovery... 3 Design Principles... 3 NetFusion Discovery Architecture... 4 Topology and State Changes...
More information02 - Distributed Systems
02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/58 Definition Distributed Systems Distributed System is
More informationOperating Systems Design Exam 3 Review: Spring 2011
Operating Systems Design Exam 3 Review: Spring 2011 Paul Krzyzanowski pxk@cs.rutgers.edu 1 1. Why does an IP driver need to use ARP, the address resolution protocol? IP is a logical network. An IP address
More informationConnecting Securely to the Cloud
Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico
More informationDistributed Systems Principles and Paradigms. Chapter 01: Introduction. Contents. Distributed System: Definition.
Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 01: Version: February 21, 2011 1 / 26 Contents Chapter 01: 02: Architectures
More informationBorland AppServer. Borland
Borland AppServer An Integrated Solution for Developing, Deploying, and Managing Distributed Multi-tier Applications. August 1998 Borland PAGE 1 Contents Introduction 4 Enterprises Shift to the Middle-tier
More informationGrid Computing Systems: A Survey and Taxonomy
Grid Computing Systems: A Survey and Taxonomy Material for this lecture from: A Survey and Taxonomy of Resource Management Systems for Grid Computing Systems, K. Krauter, R. Buyya, M. Maheswaran, CS Technical
More information20-CS Cyber Defense Overview Fall, Network Basics
20-CS-5155 6055 Cyber Defense Overview Fall, 2017 Network Basics Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter
More informationDistributed Systems Principles and Paradigms. Chapter 01: Introduction
Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 01: Introduction Version: October 25, 2009 2 / 26 Contents Chapter
More informationOne Platform Kit: The Power to Innovate
White Paper One Platform Kit: The Power to Innovate What Could You Do with the Power of the Network? What if you could: Reach into your network and extract the information you need, when you need it? Directly
More informationDS 2009: middleware. David Evans
DS 2009: middleware David Evans de239@cl.cam.ac.uk What is middleware? distributed applications middleware remote calls, method invocations, messages,... OS comms. interface sockets, IP,... layer between
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 16512-2 Third edition 2016-04-01 Information technology Relayed multicast protocol: Specification for simplex group applications Technologies de l'information Protocole de
More informationOpen Networking through Programmability Tal Lavian Nortel Network, Advanced Technology Lab
Openet: Open Networking through Programmability Tal Lavian tlavian@nortelnetworks.com Nortel Network, Advanced Technology Lab Agenda Two Evolutions: computer vs network Openet: open networking ORE and
More informationArchitectures for Carrier Network Evolution
Architectures for Carrier Network Evolution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Talk at Docomo USA Labs, Palo Alto, CA, May 14, 2011 Audio/Video Recordings
More informationFramework of Vertical Multi-homing in IPv6-based NGN
ITU-T Recommendation Y.ipv6-vmh Framework of Vertical Multi-homing in IPv6-based NGN Summary This Recommendation describes a framework of vertical multi-homing in IPv6-based NGN. This Recommendation identifies
More informationOverview of the ML-Series Card
CHAPTER 1 This chapter provides an overview of the ML-100T-8 card for Cisco ONS 15310-CL and the Cisco ONS 15310-MA. It lists Ethernet and SONET capabilities and Cisco IOS and Cisco Transport Controller
More informationIndustrial Challenges in Working with Events
Industrial Challenges in Working with Events Prof. Dr., Senior Technical Leader, NMTG Manageability Cisco Systems, Inc. pdini@cisco.com petre@iaria.org 1 The Road Ahead Positioning Issues - Event definition
More informationMotivation for File Integrity
Motivation for File Integrity Overview Existing Frameworks Intrusion Detection System (IDS) goals include the ability to: characterize and identify computer system attacks, identify occurrences of security
More informationChapter 2 System Models
CSF661 Distributed Systems 分散式系統 Chapter 2 System Models 吳俊興國立高雄大學資訊工程學系 Chapter 2 System Models 2.1 Introduction 2.2 Physical models 2.3 Architectural models 2.4 Fundamental models 2.5 Summary 2 A physical
More information70-532: Developing Microsoft Azure Solutions
70-532: Developing Microsoft Azure Solutions Exam Design Target Audience Candidates of this exam are experienced in designing, programming, implementing, automating, and monitoring Microsoft Azure solutions.
More informationConfiguring SNMP. Information About SNMP CHAPTER
CHAPTER 8 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. This chapter describes how to configure Simple Network Management Protocol (SNMP)
More informationLecture 11: Introduction to Network Management
Lecture 11: Introduction to Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 11-1 Objective Manage a network by managing its components: routers,
More informationUsing the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway
Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest
More informationNEWNET COMMUNICATION TECHNOLOGIES PRODUCT BRIEF
STGd - THE MARKET LEADING SECURE HIGH SPEED DIAL PAYMENT TRANSACTION TRANS- PORT SYSTEM FOR CARRIER CLASS TRANSACTION NETWORKS Overview The Total Control Secure Transaction Gateway-Dial version 3.0d (STGd)
More informationCUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE
Instructor: Prof Aftab Ahmad Office: NB 612 Telephone No. (212)393-6314 Email Address: aahmad@jjay.cuny.edu Office Hours: By appointment TEXT & REFERENCE MATERIAL Text Notes from instructor posted on Blackboard
More informationSecurity and Privacy in the Internet of Things : Antonio F. Skarmeta
Security and Privacy in the Internet of Things : Antonio F. Skarmeta University of Murcia (UMU) SPAIN Motivation Security and privacy concerns were always there but we need to move from
More informationOperating Systems. Week 13 Recitation: Exam 3 Preview Review of Exam 3, Spring Paul Krzyzanowski. Rutgers University.
Operating Systems Week 13 Recitation: Exam 3 Preview Review of Exam 3, Spring 2014 Paul Krzyzanowski Rutgers University Spring 2015 April 22, 2015 2015 Paul Krzyzanowski 1 Question 1 A weakness of using
More informationCSC 4900 Computer Networks: Security Protocols (2)
CSC 4900 Computer Networks: Security Protocols (2) Professor Henry Carter Fall 2017 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message Integrity 8.4 End point Authentication
More informationHands-On TCP/IP Networking
Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationCisco Virtual Networking Solution for OpenStack
Data Sheet Cisco Virtual Networking Solution for OpenStack Product Overview Extend enterprise-class networking features to OpenStack cloud environments. A reliable virtual network infrastructure that provides
More informationCS 416: Operating Systems Design April 22, 2015
Question 1 A weakness of using NAND flash memory for use as a file system is: (a) Stored data wears out over time, requiring periodic refreshing. Operating Systems Week 13 Recitation: Exam 3 Preview Review
More informationCarrier SDN for Multilayer Control
Carrier SDN for Multilayer Control Savings and Services Víctor López Technology Specialist, I+D Chris Liou Vice President, Network Strategy Dirk van den Borne Solution Architect, Packet-Optical Integration
More information