액티브네트워크보안및관리 채기준 이화여자대학교컴퓨터학과. KRnet

Size: px
Start display at page:

Download "액티브네트워크보안및관리 채기준 이화여자대학교컴퓨터학과. KRnet"

Transcription

1 액티브네트워크보안및관리 채기준 이화여자대학교컴퓨터학과 1

2 Contents Network Management Technology Active Network Management Network Management using Active Network Technology Active Network Security Conclusions References 2

3 Network Management Technology 3

4 Network Management the process of controlling a complex data network to maximize its efficiency and productivity the ability to sustain a certain quality of service to end users under both normal and abnormal operating conditions the ability to improve network performance according to criteria of both robustness and efficient use of network resources 4

5 NM Functional Requirements Fault Management Detection, isolation and correction of abnormal operations Configuration Management Identify managed resources and their connectivity discovery Account Management Keep track of resource usage for charging Performance Management Monitor and evaluate the behavior of managed resources Security Management Allow only authorized access and control 5

6 Standard Management Frameworks Internet Network Management Framework (IETF) SNMPv1, SNMPv2, SNMPv3 OSI Network Management Framework(ISO/ITU-T) CMIP (X.700 Series) Object Oriented Approach Telecommunication Management Network (ITU-T) TMN (M.3000 Series) Use OSI CMIP for the management protocol B, S, N, NE, E : layered concept 6

7 Architectural Model of NMS NMS is a collection of tools for network monitoring and control based on the manager-agent paradigm. User Presentation Software Network Management Software Communication and Database Support Software 7

8 Current Network Management Current System and Network Management Mostly Manual Management Centralized Management Applications Management by remote access to instrumentation Stand-alone Management Static Persistent Management Reactive Management SNMP based 8

9 Active Network Management Router Sender Active Router Receiver 9

10 Issues & Requirements for ANM 10 Dynamically Composable Management Backward Compatibility With SNMP Applications-Controlled Management Automation of Configuration Management Automation of Problem Management Providing Semantically Richer Network Data Generation of Active Element Management Data & Instrumentation Secure Management Proactive Management

11 ANM Architecture Active Network Node Manager Consists of SW to monitor, configure, analyze and control a node Interacts with local node instrumentation via NodeOS API Interacts with EEs Interacts with the NMS 11

12 Node Manager Architecture (1/2) sync. access async. interaction network event 12

13 Node Manager Architecture (2/2) A Three-Layer Architecture Instrumentation Layer Access to event and management data provided by various node components Active MIB (AMIB) Data Modeling Layer Organize management data Local Manager Software Manage specific node functions and components Access mechanism and protocol to interact with the NMS 13

14 Automating Management of Active Components CMF(Common Management Framework) Management of EEs Discovery mechanism to probe newly deployed EEs INIT/EXPORT 14

15 Network Management using Active Network Technology SENCOMM ABLE/ABLE++ NESTOR AVNMP 15

16 SENCOMM Smart Environment for Network Control, Monitoring and Management BBN Technologies(funded by DARPA) Sep Feb

17 General Requirements (1/2) Packet delivery IP Heterogeneous network not all active nodes Packet handling SENCOMM probes must be able to request any incoming packet or a copy from any interface Probes must be able to re-insert a packet into forwarding path before initial demux before normal routing decision directly into an output interface queue 17

18 General Requirements (2/2) Message Size Control messages small enough to fit in a single datagram MIB Access on active node Persistent Storage Bootstrapping and long-term storage of loadable libraries Distributed Time Service Correlation of distributed data or synchronized action Secure Management Secure access to its management functions 18

19 SENCOMM Architecture Major Component SENCOMM Management SMEE ASP AA EEs ASP/ISI Execution Environment loadable libraries (SMEE) Smart Probes(SPs) Loadable Libraries(LLs) Management API Smart Packet : smart packet smart probes NodeOS fast forwarding Anetd/ABone smart packet Installing Loadable Libraries Transporting SENCOMM Smart Probes Exchanging Control and Security Messages 19

20 SMEE SENCOMM Management Execution Environment Two Primary Functions Provide the EE for smart probes Active node management, including other EE s and the NodeOS (responsibility may lie or share with NodeOS) Active Network Management IP Router Notification of status changes in network interfaces and kernel routing table Access to router configuration Active Node Smart probes collect and process active networking info. SMEE requires enhanced packet copying and handling from active node 20

21 Smart Probes(SPs) Executable Programs that perform management functions Requirements Residence : Operation after Packet forwarded Globally Unique Name Single datagram Access to Loadable Libraries Hibernate until occurrence of registered event Soft-state can determine life of probe Encapsulated in ANEP datagram Transported using UDP/IP or TCP/IP 21 SMEE loadable libraries smart probes NodeOS

22 Loadable Libraries(LLs) Invoked by a smart probe to be executed Provide classes, methods and data structures used by one or more smart probes Shared among multiple probes Requirements Sharable Dynamically Loadable Globally Unique Name Version Number Separation of State Sharable State 22 SMEE loadable libraries smart probes

23 Management API for EEs and AAs SMEE access to EEs Mechanism EEs provide LL of function wrappers to internal management functions Wrappers provide interface for smart probes Probe calls function in the EE SMEE loadable library smart probes NodeOS EEs AA 23

24 ABLE Active Bell Lab Engine Bell Labs, Lucent Technologies Primary Component: Active Engine AE : Written in C, Execute Programs : Java code Isolation of the active mechanism Easily deployed in current IP networks ABLE Design Principles Generality and Simplicity Modularity Inter-operability and heterogeneity Long Lasting Sessions Cost Visibility Safety and Security 24

25 ABLE Architecture (1/2) 25

26 ABLE Architecture (2/2) Diverter Part of Router Active packet -> Active Engine Active manager The Core of AE Session generation, management, termination Session resource usage management(cpu, Bandwidth, ) Security stream module Monitoring of Network Usage by Session Router Interface Session router MIB Using SNMP Java object 26

27 ABLE++ Architecture (1/3) 27 Extension to the ABLE architecture Active Engine for ABLE++ Session Broker Creates, manages, and cleans up Active Sessions Controls communication and mobility Info Broker Export local device information to Active Session Provides efficient monitoring channel Engine, Cache, Interface Control Broker Active Session controls router Provides secure channel for control operation Engine, Security module, Interface

28 ABLE++ Architecture (2/3) AS1 AS2 AS3 ASn Active Sessions Active Engine Session Info Control Brokers Security Module Filter SNMP CLI OS API Managed Device 28

29 ABLE++ Architecture (3/3) Local Cache Data classification by volatility Volatile Quasi-volatile Static Quasi-volatile, Static -> Cache Reduce the load from the router Shortens the retrieval time Info Broker Session Interface Engine Cache Router SNMP, DeviceOS, etc 29

30 Active Network Security SANE(Secure AN Environment) Seraphim Safetynet PLAN(A Packet Language for AN) 30

31 Why is Security necessary in AN? To maintain the availability of the shared network infrastructure To grant correctness of the service To detect possible modification and to prevent malicious sniffing To avoid the possibility of combined attacks performed by colluding active packets 31

32 Security in Active network 4 types of exposure Corruption of information Disclosure of information Theft of service Denial of service Security Services Authentication Authorization Secrecy Integrity 32

33 Active Network Security Method Active Packet approach Performance problem Smart Packets, Active IP Option Active Node approach Good performance but poor security Limited flexibility ANTS, DAN. Appropriate balance is required. Two Approaches for AN Security System point of view : SANE, Seraphim, Smart Packets Programming point of view : Safetynet, PLAN 33

34 Active Packet Approach Early active network architecture. Code is carried by the packets. Active packet may misuse active packets. Proposed Techniques Fault tolerance Replication : packets replicate at each node Redirection : packets may seek alternative routes Persistence : packets are temporarily stored against node failure Encryption 34

35 Active Node Approach 35 Packets do not carry the actual code, but instead carry some identifiers or references. Actual code resides in active node. Motivation Performance problem Capability problem Active packets may misuse network resources and other active packets. Proposed Techniques Authentication of Active packets Monitoring and Control on resource usage Proof Carrying Code(PCC)

36 SANE Secure Active Network Environment University of Pennsylvania SwitchWare(1996 ) environment Component : Active Packet, Switchlet, SANE SwitchWare Layers Active Network Active Extension Packets Active Router Infrastructure Packet Language and Services 36

37 SANE Architecture (1/3) 2 concepts of Security Integrity Trust Security Services Cryptographic Primitives Public Key Infrastructure Key Establishment Protocol Packet Authentication Packet Encryption Naming 37

38 SANE Architecture (2/3) Layered architecture Lower layer (Static check) Higher layer (Dynamic check) Security Maintenance Ways Perform remote authentication for node-to-node authentication Provide restricted execution environment Use novel naming scheme to partition the node s service name space between users 38

39 SANE Architecture (3/3) PLAN Packet PLAN Packet Caml Switchlet Caml Switchlet Node-Node Authentication PLAN ALIEN Library ALIEN/Caml/OS Dynamic Integrity Checks Recovery AEGIS Static Integrity Checks 39

40 Seraphim University of Illinois Cherubim project based (mobile agent) A universal policy is inadequate for active networks Allow varied security schemes for anticipated unknown applications -> Dynamic security policies 40

41 Seraphim Architecture (1/4) 41

42 Seraphim Architecture (2/4) 42 Reference Monitor(RM) The RM is implemented as a co-located extension to the NodeOS. Every node has a RM, through which all access to the node resource occur. Core security services verify the signature on the active capability RM evaluates the active capability to check access. The policy framework is a component of RM. Four different types of access control policy. Mandatory access control(mac) Discretionary access control(dac) Double discretionary access control(ddac) Role-based access control(rbac)

43 Seraphim Architecture (3/4) Active Capability(AC) Mobile Agent carrying security policies used in the access control decision making process Executable Java bytecode Protected by digital signature Active Capsule Certificate Active Code Active Capability Signature Certificate Active Code Signature 43

44 Seraphim Architecture (4/4) RM & Policy Administrator Application Obtain AC Request AC AC Evaluation AC Cache Policy Framework Component Reference Monitor Request AC Obtain AC Policy Administrator AC Repository Policy Server Componentized Policy Framework Policy Administrator 44

45 Seraphim : Performance Ping App Active Node A Active Node B Active Node C RM RM RM 5 4 Policy Server 45 System Configuration Avg. RTT (ms) No RM 10 RM without Cache 1494 RM with Cache 21 RM with Decisions in Cache 10

46 Conclusions Active Network Management 위한아키텍처제시필요 기존 IP 망에 ANM Technology 적용 기존라우터에장착 / 연결하여기능수행 새로운 ANM 프레임워크제시 Policy based Management New Security Services can be deployed. Tradeoffs Security-performance tradeoff Usability/flexibility-complexity tradeoff AN Management와 Security에필요한새로운이슈들과기술도출 AN Service 구현을위한테스트베드기반필요 46

47 References D. S. Alexander, W. A. Arbaugh, A. D. Keromytis, J. M. Smith, "Security in Active Networks ", D. S. Alexander, W. A. Arbaugh, A. D. Keromytis, J. M. Smith, "A Secure Active Network Environment Architecture: Realization in SwitchWare," IEEE Network Magazine, special issue on Active and Programmable Networks, 12(3), R. H. Campbell, et al., "Seraphim: Dynamic Interoperable Security Architecture for Active Networks", IEEE OPENARCH 2000, Tel- Aviv, Israel, Mar Alden W. Jackson, James P.G. Sterbenz, Matthew N. Condell, David J. Waitzman, "SENCOMM Architecture", Technology Document of BBN Tech., April Danny Raz and Yuval Shavitt., An Active Network Approach to Efficient Network Management.,IWAN'99, July 1999, Berlin, Germany. 47

KRnet Active Network 관리기술

KRnet Active Network 관리기술 KRnet 2001 Active Network 관리기술 전남대학교 최덕재 Contents Overview of Network Management Toward Active Network Network Management Using Active Network Technology BBN 의 SmartPacket 및 SENCoMM(Smart Environ- ment

More information

A Secure PLAN (extended version)

A Secure PLAN (extended version) A Secure PLAN (extended version) Michael Hicks, Cornell University Angelos D. Keromytis, Columbia University Jonathan M. Smith, U. Penn DARPA Active Networks Conference and Exposition (DANCE), San Francisco

More information

Secure Active Network Environment (SANE) Trust, but Verify

Secure Active Network Environment (SANE) Trust, but Verify Secure Active Network Environment (SANE) Trust, but Verify Old Russian Saying Scott Alexander Bill Arbaugh Angelos Keromytis Jonathan Smith University of Pennsylvania Network Infrastructures Shared, so

More information

Security in Active Networks: Problems, Approaches, Results and Challenges

Security in Active Networks: Problems, Approaches, Results and Challenges Security in Active Networks: Problems, Approaches, Results and Challenges IWAN 99 Tutorial June 30th, 1999 Jonathan M. Smith University of Pennsylvania http://www.cis.upenn.edu/~jms Tutorial Outline: Introduction

More information

Rule based Forwarding (RBF): improving the Internet s flexibility and security. Lucian Popa, Ion Stoica, Sylvia Ratnasamy UC Berkeley Intel Labs

Rule based Forwarding (RBF): improving the Internet s flexibility and security. Lucian Popa, Ion Stoica, Sylvia Ratnasamy UC Berkeley Intel Labs Rule based Forwarding (RBF): improving the Internet s flexibility and security Lucian Popa, Ion Stoica, Sylvia Ratnasamy UC Berkeley Intel Labs Motivation Improve network s flexibility Middlebox support,

More information

A Scalable High-Performance Active Network Node

A Scalable High-Performance Active Network Node A Scalable High-Performance Active Network Node D. Decasper, B. Plattner ETH Zurich G. Parulkar, S. Choi, J. DeHart, T. Wolf Washington U Presented by Jacky Chu Motivation Apply Active Network over gigabits

More information

Announcements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris

Announcements.  me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,

More information

Introduction to Systems and Network Management

Introduction to Systems and Network Management Introduction to Systems and Network Management Shang Juh Kao Dept. of Computer Science and Engineering National Chung Hsing University Tel: 04-2284-0497 x 708 Email: sjkao@cs.nchu.edu.tw 1 This course

More information

Rule-Based Forwarding

Rule-Based Forwarding Building Extensible Networks with Rule-Based Forwarding Lucian Popa Norbert Egi Sylvia Ratnasamy Ion Stoica UC Berkeley/ICSI Lancaster Univ. Intel Labs Berkeley UC Berkeley Making Internet forwarding flexible

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Feature and Technical Overview SWDT305802-524791-0331031644-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...

More information

Security Issues in Active Networking

Security Issues in Active Networking Security Issues in Active Networking IWAN 01 Tutorial September 30th, 2001 Jonathan M. Smith University of Pennsylvania http://www.cis.upenn.edu/~jms Tutorial Outline: Security Challenges Principles of

More information

WDM network management

WDM network management IO2654 Optical Networking WDM network management Paolo Monti Optical Networks Lab (ONLab), Communication Systems Department (COS) http://web.it.kth.se/~pmonti/ For some material in this lecture check the

More information

A Mobile Agent-based Model for Service Management in Virtual Active Networks

A Mobile Agent-based Model for Service Management in Virtual Active Networks A Mobile Agent-based Model for Service Management in Virtual Active Networks Fábio Luciano Verdi and Edmundo R. M. Madeira Institute of Computing, University of Campinas (UNICAMP), Campinas-SP, Brazil

More information

Network Management. Network Management: Goals, Organization and Functions

Network Management. Network Management: Goals, Organization and Functions Network Management Network Management: Goals, Organization and Functions Telecomm/Data Network A telecommunication/data network is composed from many network elements (switching systems, terminals, circuits

More information

Active Networks. Bob Braden (ISI) with Craig Partridge, Alden Jackson (BBN) 7 August 2002

Active Networks. Bob Braden (ISI) with Craig Partridge, Alden Jackson (BBN) 7 August 2002 Active Networks Bob Braden (ISI) with Craig Partridge, Alden Jackson (BBN) 7 August 2002 DARPA Workshop Programmable Packets for Intelligent Networks Menlo Park, CA 1 Outline A. What is active networking?

More information

What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1

What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 PB478675 Product Overview The Cisco ACE Application Control Engine 4710 represents the next generation of application switches

More information

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING QUESTION BANK SUBJECT : NE7007 - NETWORK MANAGEMENT SEM / YEAR : III / II year M.E. (Communication Systems ) UNIT I FUNDAMENTALS OF COMMON NETWORK

More information

Programmable Network Node: Applications

Programmable Network Node: Applications Programmable Network Node: Applications Tal Lavian 1 tlavian@ieee.org Rob Jaeger 1,2 rojaeger@nortelnetworks.com rfj@cs.umd.edu 1 Technology Center, Enterprise Solutions, Nortel Networks 2 Department of

More information

F O U N D A T I O N. OPC Unified Architecture. Specification. Part 1: Concepts. Version 1.00

F O U N D A T I O N. OPC Unified Architecture. Specification. Part 1: Concepts. Version 1.00 F O U N D A T I O N Unified Architecture Specification Part 1: Concepts Version 1.00 July 28, 2006 Unified Architecture, Part 1 iii Release 1.00 CONTENTS Page FOREWORD... vi AGREEMENT OF USE... vi 1 Scope...

More information

Lecture 5: Foundation of Network Management

Lecture 5: Foundation of Network Management Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information

More information

Smart Packets: Applying Active Networks to Network Management

Smart Packets: Applying Active Networks to Network Management Smart Packets: Applying Active Networks to Network Management Beverly Schwartz et. al. BBN Technologies Presented by Jinghua Hu 09/17/2002 ECE697J, UMASS Amherst 1 Outline Introduction Smart Packets System

More information

Active Networks for Efficient Distributed Network Management

Active Networks for Efficient Distributed Network Management ACTIVE, PROGRAMMABLE, AND MOBILE CODE NETWORKING Active Networks for Efficient Distributed Network Management Danny Raz and Yuval Shavitt, Bell Laboratories, Lucent Technologies ABSTRACT The emerging next

More information

Distributed Object-Based Systems The WWW Architecture Web Services Handout 11 Part(a) EECS 591 Farnam Jahanian University of Michigan.

Distributed Object-Based Systems The WWW Architecture Web Services Handout 11 Part(a) EECS 591 Farnam Jahanian University of Michigan. Distributed Object-Based Systems The WWW Architecture Web Services Handout 11 Part(a) EECS 591 Farnam Jahanian University of Michigan Reading List Remote Object Invocation -- Tanenbaum Chapter 2.3 CORBA

More information

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Administration Guide SWDT487521-636611-0528041049-001 Contents 1 Overview: BlackBerry Enterprise Server... 21 Getting started in your BlackBerry

More information

Network Management. Stuart Johnston 08 November 2010

Network Management. Stuart Johnston 08 November 2010 Network Management Stuart Johnston stuart.johnston@inmon.com 08 November 2010 Slides from: Computer Networking: A Top Down Approach, 4th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007 All material

More information

Cross Layer Protocol Design. Radio Communication III

Cross Layer Protocol Design. Radio Communication III Cross Layer Protocol Design Radio Communication III The layered world of protocols The ISO OSI model OSI model Introduction» The open systems interconnection reference model (OSI model) describes a layered

More information

Request for Comments: 1901

Request for Comments: 1901 Network Working Group Request for Comments: 1901 Category: Experimental SNMPv2 Working Group J. Case SNMP Research, Inc. K. McCloghrie Cisco Systems, Inc. M. Rose Dover Beach Consulting, Inc. S. Waldbusser

More information

IP Mobility Support for QoS over Heterogeneous Networks

IP Mobility Support for QoS over Heterogeneous Networks IP Mobility Support for QoS over Heterogeneous Networks Eun Kyoung PAIK Feb. 7-9, 2007 Future Technology Lab. KT Contents Introduction Network Topology Perspective Multihoming Network Layer Perspective

More information

Control Plane Security Overview

Control Plane Security Overview Control Plane Security Overview Wes Doonan Control Plane R&D Hybrid Networks Packet-based Delivery ( ) Packets delivered via standard IP infrastructure Routes configured or learned, packets forwarded per

More information

Extensible Routers. Jeff Chase Duke University

Extensible Routers. Jeff Chase Duke University Extensible Routers Jeff Chase Duke University Motivation We ve looked at many different proposals for router extensions and changes. There are many others (multicast, anycast, IPv6) There are huge obstacles

More information

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals:

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals: Managing and Securing Computer Networks Guy Leduc Chapter 2: Software-Defined Networks (SDN) Mainly based on: Computer Networks and Internets, 6 th Edition Douglas E. Comer Pearson Education, 2015 (Chapter

More information

Safety and Security of Programmable Network. infrastructure.

Safety and Security of Programmable Network. infrastructure. Safety and Security of Programmable Network Infrastructures D. Scott Alexander William A. Arbaugh Angelos D. Keromytis Jonathan M. Smith University of Pennsylvania September 7, 1998 Abstract Safety and

More information

SOA S90-20A. SOA Security Lab. Download Full Version :

SOA S90-20A. SOA Security Lab. Download Full Version : SOA S90-20A SOA Security Lab Download Full Version : https://killexams.com/pass4sure/exam-detail/s90-20a protocol. Before invoking Service A, Service Consumer A must request a ticket granting ticket and

More information

Network Management. Stuart Johnston 13 October 2011

Network Management. Stuart Johnston 13 October 2011 Network Management Stuart Johnston stuart.johnston@inmon.com 13 October 2011 Slides from: Computer Networking: A Top Down Approach, 4th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007 All material

More information

Active Networks: A Tutorial

Active Networks: A Tutorial Active Networks: A Tutorial Spring School, Lenk, CH March 6-10th, 2000 Jonathan M. Smith University of Pennsylvania http://www.cis.upenn.edu/~jms Tutorial Outline: Introduction to Active Networks Security

More information

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Feature and Technical Overview

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Feature and Technical Overview BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Feature and Technical Overview SWDT305802-525776-0331031530-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...

More information

SNMP Agent Setup. Simple Network Management Protocol Support. SNMP Basics

SNMP Agent Setup. Simple Network Management Protocol Support. SNMP Basics Simple Network Management Protocol Support, page 1 SNMP Basics, page 1 SNMP Management Information Base (MIB), page 2 Set Up SNMP, page 3 Import Previously Configured Windows SNMP v1 Community Strings,

More information

Policy-Driven DISTRIBUTED MANAGEMENT ARCHITECTURES. (Towards Open Distributed Management Architecture) Kazi Farooqui

Policy-Driven DISTRIBUTED MANAGEMENT ARCHITECTURES. (Towards Open Distributed Management Architecture) Kazi Farooqui Policy-Driven DISTRIBUTED MANAGEMENT ARCHITECTURES (Towards Open Distributed Management Architecture) Integrating Management and Distributed Object Technology Kazi Farooqui (farooqui@csi.uottawa.ca) Department

More information

SNMP. Simple Network Management Protocol

SNMP. Simple Network Management Protocol SNMP Simple Network Management Protocol Network Management The network management is to Monitor the network Ensure the operations over the network are functional Assure the network works efficiently An

More information

, Network Management, Future

, Network Management, Future Tik-110.350 Computer Networks (3 cr) Spring 2000 E-mail, Network Management, Future Professor Arto Karila Helsinki University of Technology E-mail: Arto.Karila@hut.fi Tik-110.350 Computer Networks, 19.4.2000,

More information

Operating Systems Design Exam 3 Review: Spring Paul Krzyzanowski

Operating Systems Design Exam 3 Review: Spring Paul Krzyzanowski Operating Systems Design Exam 3 Review: Spring 2012 Paul Krzyzanowski pxk@cs.rutgers.edu 1 Question 1 An Ethernet device driver implements the: (a) Data Link layer. (b) Network layer. (c) Transport layer.

More information

products. OSI is an ISO Standard: OSI was officially adopted as an international standard by the International Organisation of Standards (ISO).

products. OSI is an ISO Standard: OSI was officially adopted as an international standard by the International Organisation of Standards (ISO). CBCN4103 Open Systems Interconnection (OSI) is a standard d description or "reference model" for how messages should be transmitted between any two points in a telecommunication network. Its purpose is

More information

PNUTS: Yahoo! s Hosted Data Serving Platform. Reading Review by: Alex Degtiar (adegtiar) /30/2013

PNUTS: Yahoo! s Hosted Data Serving Platform. Reading Review by: Alex Degtiar (adegtiar) /30/2013 PNUTS: Yahoo! s Hosted Data Serving Platform Reading Review by: Alex Degtiar (adegtiar) 15-799 9/30/2013 What is PNUTS? Yahoo s NoSQL database Motivated by web applications Massively parallel Geographically

More information

High Speed Communication Protocols. ECE 677, High Speed Protocols 1

High Speed Communication Protocols. ECE 677, High Speed Protocols 1 High Speed Communication Protocols 1 Why? High Speed Transport Protocols Distributed processing - Generally characterized by client-server interactions - operating Systems provide Transparent and highperformance

More information

Today: Distributed Middleware. Middleware

Today: Distributed Middleware. Middleware Today: Distributed Middleware Middleware concepts Case study: CORBA Lecture 24, page 1 Middleware Software layer between application and the OS Provides useful services to the application Abstracts out

More information

The Y-Comm Framework. A new way

The Y-Comm Framework. A new way The Y-Comm Framework A new way Mobility within Domains Mobile IP is good for moving between large defined domains But we also have to consider mobility issues within a domain which may have a number of

More information

70-532: Developing Microsoft Azure Solutions

70-532: Developing Microsoft Azure Solutions 70-532: Developing Microsoft Azure Solutions Objective Domain Note: This document shows tracked changes that are effective as of January 18, 2018. Create and Manage Azure Resource Manager Virtual Machines

More information

02 - Distributed Systems

02 - Distributed Systems 02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/60 Definition Distributed Systems Distributed System is

More information

Lecture 18: Network Management

Lecture 18: Network Management Lecture 18: Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4183 18-1 Objective Manage a network by managing its components: routers, bridges,

More information

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication

More information

NET311 Computer Networks Management Standards, Models and Language

NET311 Computer Networks Management Standards, Models and Language NET311 Computer Networks Management Standards, Models and Language Dr. Mostafa H. Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud University mdahshan@ksu.edu.sa

More information

Secure Quality of Service Handling: SQoSH

Secure Quality of Service Handling: SQoSH ACTIVE, PROGRAMMABLE, AND MOBILE CODE NETWORKING Secure Quality of Service Handling: SQoSH D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Steve Muir, and Jonathan M. Smith, University of

More information

Dr. Atiq Ahmed. Network. Management. Introduction. Management. OSI Key Areas of Network Management 1/27. Dr. Atiq Ahmed. Network Management

Dr. Atiq Ahmed. Network. Management. Introduction. Management. OSI Key Areas of Network Management 1/27. Dr. Atiq Ahmed. Network Management Course Outline Course Structure Credit Hours: 3 (3, 0) Prerequisites: Computer Communication and s Evolution in Architectures Evolution of Protocols Evolution in Functions in Department of Computer Science

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

2. System Models Page 1. University of Freiburg, Germany Department of Computer Science. Distributed Systems. Chapter 2 System Models

2. System Models Page 1. University of Freiburg, Germany Department of Computer Science. Distributed Systems. Chapter 2 System Models 2. System Models Page 1 University of Freiburg, Germany Department of Computer Science Distributed Systems Chapter 2 System Models Christian Schindelhauer 27. April 2012 2. System Models 2.1. Introduction

More information

CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS

CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS What is an operating system? A collection of software modules to assist programmers in enhancing system efficiency, flexibility, and robustness An Extended Machine

More information

Chapter 4 Communication

Chapter 4 Communication DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 4 Communication Layered Protocols (1) Figure 4-1. Layers, interfaces, and protocols in the OSI

More information

CHAPTER. Introduction

CHAPTER. Introduction CHAPTER 1 Network management takes place between two major types of systems: those in control, called managing systems, and those observed and controlled, called managed systems. The most common managing

More information

CS 640: Introduction to Computer Networks. Today s Lecture. Page 1

CS 640: Introduction to Computer Networks. Today s Lecture. Page 1 CS 640: Introduction to Computer Networks Aditya Akella Lecture 2 Layering, Protocol Stacks, and Standards 1 Today s Lecture Layers and Protocols A bit about s 2 Network Communication: Lots of Functions

More information

Web as a Distributed System

Web as a Distributed System Web as a Distributed System The World Wide Web is a large distributed system. In 1998 comprises 70-75% of Internet traffic. With large transfers of streaming media and p2p, no longer a majority of bytes,

More information

Security Philosophy. Humans have difficulty understanding risk

Security Philosophy. Humans have difficulty understanding risk Android Security Security Philosophy Humans have difficulty understanding risk Safer to assume that Most developers do not understand security Most users do not understand security Security philosophy

More information

Extensible Network Security Services on Software Programmable Router OS. David Yau, Prem Gopalan, Seung Chul Han, Feng Liang

Extensible Network Security Services on Software Programmable Router OS. David Yau, Prem Gopalan, Seung Chul Han, Feng Liang Extensible Network Security Services on Software Programmable Router OS David Yau, Prem Gopalan, Seung Chul Han, Feng Liang System Software and Architecture Lab Department of Computer Sciences Purdue University

More information

Open Network Operating System

Open Network Operating System Open Network Operating System Michele Santuari msantuari@fbk.eu FBK CREATE-NET - Future Networks research unit April 28, 2017 Agenda Short introduction to SDN and network programmability Introduction to

More information

Configure SNMP. Understand SNMP. This chapter explains Simple Network Management Protocol (SNMP) as implemented by Cisco NCS 4000 series.

Configure SNMP. Understand SNMP. This chapter explains Simple Network Management Protocol (SNMP) as implemented by Cisco NCS 4000 series. This chapter explains Simple Network Management Protocol (SNMP) as implemented by Cisco NCS 4000 series. Understand SNMP, page 1 Basic SNMP Components, page 2 SNMPv3 Support, page 3 SNMP Traps, page 4

More information

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing JAVA IEEE TRANSACTION ON CLOUD COMPUTING 1. ITJCC01 Nebula: Distributed Edge for Data Intensive Computing 2. ITJCC02 A semi-automatic and trustworthy scheme for continuous cloud service certification 3.

More information

SNMP. Simple Network Management Protocol

SNMP. Simple Network Management Protocol SNMP Simple Network Management Protocol Outline Overview Protocol MIB Net-SNMP Network Management Tools Client Application Development 2 Network Management How to monitor your servers? Trying to use the

More information

Software Architecture Patterns

Software Architecture Patterns Software Architecture Patterns *based on a tutorial of Michael Stal Harald Gall University of Zurich http://seal.ifi.uzh.ch/ase www.infosys.tuwien.ac.at Overview Goal Basic architectural understanding

More information

NETFUSION DISCOVERY SYSTEM DESCRIPTION

NETFUSION DISCOVERY SYSTEM DESCRIPTION NETFUSION DISCOVERY SYSTEM DESCRIPTION White Paper Contents NetFusion Discovery Overview... 3 Network Discovery... 3 Design Principles... 3 NetFusion Discovery Architecture... 4 Topology and State Changes...

More information

02 - Distributed Systems

02 - Distributed Systems 02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/58 Definition Distributed Systems Distributed System is

More information

Operating Systems Design Exam 3 Review: Spring 2011

Operating Systems Design Exam 3 Review: Spring 2011 Operating Systems Design Exam 3 Review: Spring 2011 Paul Krzyzanowski pxk@cs.rutgers.edu 1 1. Why does an IP driver need to use ARP, the address resolution protocol? IP is a logical network. An IP address

More information

Connecting Securely to the Cloud

Connecting Securely to the Cloud Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico

More information

Distributed Systems Principles and Paradigms. Chapter 01: Introduction. Contents. Distributed System: Definition.

Distributed Systems Principles and Paradigms. Chapter 01: Introduction. Contents. Distributed System: Definition. Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 01: Version: February 21, 2011 1 / 26 Contents Chapter 01: 02: Architectures

More information

Borland AppServer. Borland

Borland AppServer. Borland Borland AppServer An Integrated Solution for Developing, Deploying, and Managing Distributed Multi-tier Applications. August 1998 Borland PAGE 1 Contents Introduction 4 Enterprises Shift to the Middle-tier

More information

Grid Computing Systems: A Survey and Taxonomy

Grid Computing Systems: A Survey and Taxonomy Grid Computing Systems: A Survey and Taxonomy Material for this lecture from: A Survey and Taxonomy of Resource Management Systems for Grid Computing Systems, K. Krauter, R. Buyya, M. Maheswaran, CS Technical

More information

20-CS Cyber Defense Overview Fall, Network Basics

20-CS Cyber Defense Overview Fall, Network Basics 20-CS-5155 6055 Cyber Defense Overview Fall, 2017 Network Basics Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter

More information

Distributed Systems Principles and Paradigms. Chapter 01: Introduction

Distributed Systems Principles and Paradigms. Chapter 01: Introduction Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 01: Introduction Version: October 25, 2009 2 / 26 Contents Chapter

More information

One Platform Kit: The Power to Innovate

One Platform Kit: The Power to Innovate White Paper One Platform Kit: The Power to Innovate What Could You Do with the Power of the Network? What if you could: Reach into your network and extract the information you need, when you need it? Directly

More information

DS 2009: middleware. David Evans

DS 2009: middleware. David Evans DS 2009: middleware David Evans de239@cl.cam.ac.uk What is middleware? distributed applications middleware remote calls, method invocations, messages,... OS comms. interface sockets, IP,... layer between

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 16512-2 Third edition 2016-04-01 Information technology Relayed multicast protocol: Specification for simplex group applications Technologies de l'information Protocole de

More information

Open Networking through Programmability Tal Lavian Nortel Network, Advanced Technology Lab

Open Networking through Programmability Tal Lavian Nortel Network, Advanced Technology Lab Openet: Open Networking through Programmability Tal Lavian tlavian@nortelnetworks.com Nortel Network, Advanced Technology Lab Agenda Two Evolutions: computer vs network Openet: open networking ORE and

More information

Architectures for Carrier Network Evolution

Architectures for Carrier Network Evolution Architectures for Carrier Network Evolution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Talk at Docomo USA Labs, Palo Alto, CA, May 14, 2011 Audio/Video Recordings

More information

Framework of Vertical Multi-homing in IPv6-based NGN

Framework of Vertical Multi-homing in IPv6-based NGN ITU-T Recommendation Y.ipv6-vmh Framework of Vertical Multi-homing in IPv6-based NGN Summary This Recommendation describes a framework of vertical multi-homing in IPv6-based NGN. This Recommendation identifies

More information

Overview of the ML-Series Card

Overview of the ML-Series Card CHAPTER 1 This chapter provides an overview of the ML-100T-8 card for Cisco ONS 15310-CL and the Cisco ONS 15310-MA. It lists Ethernet and SONET capabilities and Cisco IOS and Cisco Transport Controller

More information

Industrial Challenges in Working with Events

Industrial Challenges in Working with Events Industrial Challenges in Working with Events Prof. Dr., Senior Technical Leader, NMTG Manageability Cisco Systems, Inc. pdini@cisco.com petre@iaria.org 1 The Road Ahead Positioning Issues - Event definition

More information

Motivation for File Integrity

Motivation for File Integrity Motivation for File Integrity Overview Existing Frameworks Intrusion Detection System (IDS) goals include the ability to: characterize and identify computer system attacks, identify occurrences of security

More information

Chapter 2 System Models

Chapter 2 System Models CSF661 Distributed Systems 分散式系統 Chapter 2 System Models 吳俊興國立高雄大學資訊工程學系 Chapter 2 System Models 2.1 Introduction 2.2 Physical models 2.3 Architectural models 2.4 Fundamental models 2.5 Summary 2 A physical

More information

70-532: Developing Microsoft Azure Solutions

70-532: Developing Microsoft Azure Solutions 70-532: Developing Microsoft Azure Solutions Exam Design Target Audience Candidates of this exam are experienced in designing, programming, implementing, automating, and monitoring Microsoft Azure solutions.

More information

Configuring SNMP. Information About SNMP CHAPTER

Configuring SNMP. Information About SNMP CHAPTER CHAPTER 8 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. This chapter describes how to configure Simple Network Management Protocol (SNMP)

More information

Lecture 11: Introduction to Network Management

Lecture 11: Introduction to Network Management Lecture 11: Introduction to Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 11-1 Objective Manage a network by managing its components: routers,

More information

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest

More information

NEWNET COMMUNICATION TECHNOLOGIES PRODUCT BRIEF

NEWNET COMMUNICATION TECHNOLOGIES PRODUCT BRIEF STGd - THE MARKET LEADING SECURE HIGH SPEED DIAL PAYMENT TRANSACTION TRANS- PORT SYSTEM FOR CARRIER CLASS TRANSACTION NETWORKS Overview The Total Control Secure Transaction Gateway-Dial version 3.0d (STGd)

More information

CUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE

CUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE Instructor: Prof Aftab Ahmad Office: NB 612 Telephone No. (212)393-6314 Email Address: aahmad@jjay.cuny.edu Office Hours: By appointment TEXT & REFERENCE MATERIAL Text Notes from instructor posted on Blackboard

More information

Security and Privacy in the Internet of Things : Antonio F. Skarmeta

Security and Privacy in the Internet of Things : Antonio F. Skarmeta Security and Privacy in the Internet of Things : Antonio F. Skarmeta University of Murcia (UMU) SPAIN Motivation Security and privacy concerns were always there but we need to move from

More information

Operating Systems. Week 13 Recitation: Exam 3 Preview Review of Exam 3, Spring Paul Krzyzanowski. Rutgers University.

Operating Systems. Week 13 Recitation: Exam 3 Preview Review of Exam 3, Spring Paul Krzyzanowski. Rutgers University. Operating Systems Week 13 Recitation: Exam 3 Preview Review of Exam 3, Spring 2014 Paul Krzyzanowski Rutgers University Spring 2015 April 22, 2015 2015 Paul Krzyzanowski 1 Question 1 A weakness of using

More information

CSC 4900 Computer Networks: Security Protocols (2)

CSC 4900 Computer Networks: Security Protocols (2) CSC 4900 Computer Networks: Security Protocols (2) Professor Henry Carter Fall 2017 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message Integrity 8.4 End point Authentication

More information

Hands-On TCP/IP Networking

Hands-On TCP/IP Networking Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Cisco Virtual Networking Solution for OpenStack

Cisco Virtual Networking Solution for OpenStack Data Sheet Cisco Virtual Networking Solution for OpenStack Product Overview Extend enterprise-class networking features to OpenStack cloud environments. A reliable virtual network infrastructure that provides

More information

CS 416: Operating Systems Design April 22, 2015

CS 416: Operating Systems Design April 22, 2015 Question 1 A weakness of using NAND flash memory for use as a file system is: (a) Stored data wears out over time, requiring periodic refreshing. Operating Systems Week 13 Recitation: Exam 3 Preview Review

More information

Carrier SDN for Multilayer Control

Carrier SDN for Multilayer Control Carrier SDN for Multilayer Control Savings and Services Víctor López Technology Specialist, I+D Chris Liou Vice President, Network Strategy Dirk van den Borne Solution Architect, Packet-Optical Integration

More information