SlideShare une entreprise Scribd logo
1  sur  13
Télécharger pour lire hors ligne
Practical Active Network Services within Content-aware Gateways 1
Practical Active Network Services within
Content-aware Gateways
Siva Subramanian1
, Phil Wang, Ramesh Durairaj, Jennifer Rasimas, Franco Travostino
{ssiva, pywang, radurai, jrasimas, travos}@nortelnetworks.com
Advanced Technology Investments, Nortel Networks
Tal Lavian
tlavian@nortelnetworks.com
Computer Science Division, University of California, Berkeley
Doan Hoang
dhoang@it.uts.edu.au
Department of Computer Systems, University of Technology, Sydney
Abstract The Internet has seen an increase in complexity due to the introduction of new types of net-
working devices and services, particularly at points of discontinuity known as network edges. As the net-
working industry continues to add revenue generating services at network edges, there is an increasing
need to provide a systematic method for dynamically introducing and providing these new services in lieu
of the ad-hoc approach that is in use today. To this end we support a phased approach to "activating" the
Internet and suggest that there exists an immediate need for realizing Active Networks concepts at the net-
work edges. In this context, we present our efforts towards the development of a Content-aware Active
Gateway (CAG) architecture. With the help of two practical services running on our initial prototype, built
from commercial networking devices, we give a qualitative and quantitative view of the CAG potential.
Keywords: Active networks, Programmable networking devices, Content Delivery Networks, Content
Networking, Content Transformation, Streaming media, Multicast, Network-edges, Gateways.
1.0 Introduction
The advent of the world wide web and commercialization of the Internet has led to an explosion of content
providers and users. The Internet faces challenges arising from economic factors and legal issues in the
telecom market, deficiencies in the existing network infrastructure and increased demand for bandwidth
and services. This has resulted in the creation of a new concept: Content Networking [25-27]. Content net-
working overcomes the inadequacies of existing networks by introducing intelligence into the network in
order to enhance performance of services and delivery of content to the consumer. It has become important
primarily due to the potential for generating new revenue from such intelligent services [28-30].
Content Delivery Networks (CDN) are typically implemented as overlay networks and contain one or
more nodes that can inspect and/or manipulate information in higher networking layers (four through
seven in the OSI reference model). Examples of CDNs include web cache networks and video streaming
networks. Examples of content networking devices include voice packet gateways, web caches, load-bal-
ancing switches and firewalls [28-30]. Content Networking services are typically introduced into the net-
work in the form of dedicated custom networking devices. Such an approach exhibits increased complexity
and redundancy and also poor manageability and upgradeability.
1. Siva Subramanian is a Ph.D. candidate in the Electrical and Computer Engineering Department at North Carolina
State University, Raleigh
Practical Active Network Services within Content-aware Gateways 2
Content networking devices are used at the edges of networks. The edge of a network indicates a demarca-
tion of network types as shown in Figure 1, and is typically characterized by an impedance mismatch. The
mismatch is typically due to differences in physical network attributes such as network size, link band-
width, network latency, network capacity or abstract attributes such as trust, authority. Some examples of
real-life impedance mismatches are listed below.
• low-speed access networks versus high-speed metro optical networks
• trusted enterprise internal network versus untrusted external network
• electronic networks versus photonic networks
• QoS-enabled networks versus best-effort networks
• secure encrypted network versus unsecured network
• wireless access network versus the wireline network
• circuit-switched network versus packet-switched network
Such discrepancies in the network boundaries can be overcome by additional processing of the traffic
flowing across them. However, this additional processing is often not the same for all traffic types, and is
typically not known a priori. Content Networking applications adapt the processing to the type of the traf-
fic flowing across a given network edge. For instance, firewalls process traffic between trusted and
untrusted domains by filtering and taking actions based on the type of content.
In this paper, we present a new application for active networks research concepts in the form of a Content-
aware Active Gateway (CAG). The hardware and software architectures that we have developed are pre-
sented in section two. We have implemented a CAG protoype using real-world high-performance network-
ing devices augmented with software that we developed. Details of the prototype are described in section
3. We have implemented two simple commercial services on the CAG prototype. These services and the
results from our experiments are described in section 4. Section 5 presents some observations made during
our experiments with the CAG prototype. We discuss related works in active networks in section 6 and
finally present our conclusions in section 7.
2.0 Content-aware Active Gateway
We propose a new type of active networking device, the Content-aware Active Gateway that can be used to
deploy a wide range of services at network edges highlighted in Figure 1. The services deployed on the
gateways are controlled by the service provider or even the user as in case of a residential network edge.
Contractual agreements between one or more service providers and users are part of the business model.
The services are developed by service providers using software technology such as Java and can be
deployed and enabled on-demand on the CAG. In an access network model where the CAG is owned by
the network provider, the service provider leases processing capacity on the CAG in order to serve the
Figure 1: Network model with Edges
Access
Network
Edge
Core
Network
EdgeMetro
Network
Personal
Network
Edge
Personal
Network
Enterprise
Network
Edge
Enterprise
Network
Optical
Core
Network
User Control
Service Provider Control
Practical Active Network Services within Content-aware Gateways 3
users. In the telecom network model, a CAG can support services required for peering networks. In a resi-
dential service provider model it is possible that the user, under authorization of the service provider, may
have control over the services that are "loaded" onto the CAG. The services can be either statically config-
ured on the CAG or alternatively loaded on demand. Examples of dynamic services include content per-
sonalization, firewalling, virus scanning, encryption, compression and video chat servers. The ability to
deploy services on demand into the network can lead to renewed activity in the service provider industry
and new revenue sources for broadband network infrastructure providers. The process of introducing a
new service can be simplified and limited to developing the software application and putting in place the
contractual agreements between the gateway owner and the service owner. Eliminating the need for large
investments needed to introduce new equipment into an existing network can lead to new ventures in the
service development industry.
2.1 CAG Hardware Architecture
The main feature of a content networking device is the ability to filter specific types of traffic by identify-
ing patterns in the header or payload of packets. The redirection capability of such a device enables pro-
cessing of the filtered and redirected traffic. Thus the main components of the CAG Hardware Architecture
are a fast packet forwarding and classification plane, a high-performance compute plane and a flexible
control plane. The difference between a router and the CAG node lies in its distributed processing architec-
ture comprising of multiple compute resources. The processing capability leads to new performance met-
rics such as Compute Quality of Service (CQoS), which, similar to network Quality of Service, can lead to
service differentiation and therefore revenue potential. Routing and forwarding performance of a CAG,
especially for traffic not requiring any transformation, must not be affected by the services executing on
the compute resources. This requirement is similar to that of Active Routers [9,15,19] and can be achieved
by decoupling the network processing resources at layers two and three from the application processing at
higher layers.
Compute requirements for the resources on a CAG node can vary depending on the application. These
functions can be implemented over a range of technologies such as CPUs, NPUs, FPGAs and ASICs to
achieve different levels of performance. A service demanding high CQoS can be allocated an FPGA based
compute resource whereas the same service being offered by another provider at a lower CQoS (and there-
fore cost) can be performed on a general purpose CPU resource. The CAG architecture must allow a mix
NI NI NI NI
CE CE CE CE
Switch
Fabric
Control
Compute Element
Network Interface
(PHY)
Link
Ctrl
Storage
Configrable
Resource
Module
PHY
NPUMEM
CPU
Link Ctrl
MEM
ASICASIC
[2a] [2b] [2c]
CPU
Link Ctrl
MEM
FPGAFPGA
Figure 2: CAG Hardware Architecture:
[2a] Hardware Block Diagram,
[2b] Compute Engine (CE) & Network Interface (NI),
[2c] Configurable Resource Module (CRM) “flavors”
Practical Active Network Services within Content-aware Gateways 4
of these technologies to achieve the desired cost, performance and flexibility targets. The physical port
resource as well as the compute resource on a CAG, is a shared resource enabling traffic from any PHY to
be processed by any compute resource. This eliminates the need to duplicate services on multiple resources
unless demanded by increased processing requirements. The modular architecture of the CAG node,
shown in Figure 2a, consists of Network Interface (NI) modules, Compute Engine (CE) modules, the
Switch Fabric and a Control module. Typically, these modules will be implemented in the form of blades
or cards that sit in a single network equipment shelf connected by a backplane. Backplane connectivity
between the modules will use point-to-point high-speed serial links for increased performance and reliabil-
ity. Alternately the CE modules can be implemented by external hardware if physical port costs on the
switching shelf are high.
The Network Interface module, as shown in Figure 2b, consists of one or more Network Processing Units
(NPU), physical layer ASIC (PHY), packet memory and any additional silicon to perform the functions of
filtering, classification and queuing. The NI module is capable of making all decisions in the layer two and
three domain (switching, forwarding and routing). The CE module, shown in Figure 2b, executes the ser-
vices downloaded to the CAG node. The CE module contains the Configurable Resource Module (CRM),
link interface controller and also some permanent storage. This permanent storage can be flash memory or
miniature hard disk storage and is used to store long-term state for the service. A mandatory component of
the Configurable Resource Module (CRM) is the CPU. The CRM can employ one or more high density
FPGAs and ASICs along with a CPU as shown in Figure 2c. FPGAs and ASICs on the CRM assist in pro-
cessing of compute-intensive functions that cannot be efficiently handled by a CPU. Special purpose
CRMs can also have connections to external peripherals, such as a RAID disk array, for a web cache. The
switch fabric module uses one or more non-blocking high-speed crossbar silicon switching chipsets. The
Control module performs the Operations Administration and Maintenance (OA&M) functions on the
CAG.
2.2 CAG Software Architecture
Extensive research has been done on Active/Programmable Network APIs [2-5,7,10-12,16]. The features
of such APIs include service creation and deployment, security and policy controls. The high-level soft-
ware architecture of the CAG is shown in Figure 3.
In the architecture, application services at the top are built by high-level Service APIs. These Service APIs
provide applications the capabilities to create new services, execute existing services and perform content-
based functionality. Service Creation API is required for service creation, installation and security. Service
Figure 3: CAG Software Architecture
ServicePolicyServicePolicy
M E MM E M
N a t i v e A P I
C P UC P U F P G A A S I CA S I C L CL C
R e s o u r c e
S e c u r i t y
C o d e
E x e c u t i o n
F i l t e r i n g D i v e r t i n g
F o r w a r d i n g
D r o p p i n g
S e r v i c e A P I
A p p l i c a t i o n S e r v i c e s
C r e a t i o n C o n t e n t F u n c t i o nR u n t i m e
Codedownload
ServicerequestServicerequest
ServiceloadServiceload
ServiceconfigureServiceconfigure
ServiceStart/StopServiceStart/Stop
P a r s i n gP a r s i n g
R e d i r e c t i o nR e d i r e c t i o n
F i l t e r i n gF i l t e r i n g
E d i t / I n s e r tE d i t / I n s e r t
R e p l i c a t i o nR e p l i c a t i o n
F o r w a r d i n gF o r w a r d i n g
P a c k e t F u n c t i o n
H e a d e r D e c a pH e a d e r D e c a p
R e c e i v e
N a t i v e A P I
R e c e i v e
H e a d e r
N a t i v e A P IS y s t e m A P I
C o m p u t e F o r w a r d i n g
S e n d
H e a d e r E n c a p
Practical Active Network Services within Content-aware Gateways 5
Runtime API is required for computing or network resource reservation and allocation, configuration, sig-
naling and management. The Content Function APIs provide the services to do various content manipula-
tion, including content filtering, redirection, parsing, editing, insertion, replicating/multicasting and
forwarding. Below the Content Function API is the Packet Function API which receives and decapsulates
individual incoming packets, encapsulates and sends outgoing packets, and sets up any-layer packet fil-
ters, packet data buffer allocation, data capture, data insertion and tagging. Native API provides low-level
access to native resources of computing and forwarding.
The Forwarding API supports the regular networking functions such as packet filtering, diverting and for-
warding/dropping, typically realized in hardware. System APIs provide access to hardware or micro-code.
The Compute API provides the functions required to configure the resources, read and write to memory or
storage and resource-specific functions etc. These APIs are wrapped by the Configurable Content Net-
working API thereby hiding the complexity of the resource modules from the services. The Service APIs
for service creation and runtime APIs are mainly inherited from the Openet SDK (ODK) [12, 15]. The
ODK, is readily available from [28] and can be used to create and deploy Active Networks services onto
commercial network devices.
3.0 CAG Prototype
The first prototype of the CAG was developed using existing commercial high-performance networking
devices. The Nortel Alteon Webswitch [28], referred to here as the Alteon switch, is a commercial-grade
content networking switch. It has line-speed filtering capacity on its Gigabit Ethernet ports and the ability
to redirect traffic to any of the ports. This redirection feature allows for additional processing of traffic on
an external device before being forwarded to the final destination. The switching fabric in the CAG archi-
tecture is implemented by the Alteon switch. The CE modules in our prototype are external devices based
on 1GHz Pentium III CPU servers running Linux. One of the CE module uses an FPGA-based Compute
Resource Module plugin. The FPGA-based CRM uses is a Xilinx Virtex 300E on a daughter card and
plugs into the CE module. The CE modules connect to the Alteon switching fabric via Gigabit Ethernet
links. We augmented the Alteon switch and the CRM with software modules that we developed, enabling it
to behave as an active networking device. The network setup for our experiments is shown in Figure 4. The
setup consists of two CAG node prototypes positioned at the two edges of a LAN. The right edge of the
network in the illustration is the content provider edge and the left edge is the user edge. The API software
we developed on the CRM can configure the Alteon switch to set filters, actions and also supports extrac-
tion and insertion of packets to and from the data path.
4.0 CAG Applications
In this section we present two practical content networking applications implemented on the CAG proto-
type testbed. The first is a streaming media service that can be used for webcasts, large-scale videoconfer-
ences, high-quality videoconferences etc. The second is a web service that transforms web content for
delivery to end systems.
Figure 4: CAG Prototype Testbed
CAG
Prototype
Alteon
L7 Switch
End User
End User
End User
End User
CAG
Prototype
Alteon
L7 Switch
Test
Network
Server
Server
CE CE CE CE
Practical Active Network Services within Content-aware Gateways 6
4.1 Streaming Media Distribution Service
Streaming media is becoming the de facto global media broadcasting and distribution standard, incorporat-
ing other media, including radio, television, and film [25]. IP multicasting allows multiple users of a net-
work to listen to a single live stream, making efficient use of network resources. Multicasting avoids
delivering numerous connections by broadcasting one stream to a certain point in the network where other
users are requesting the same file. IP multicast would have been an ideal technique to broadcast data
stream from a source to multiple destinations if it wasn't for several critical factors. First, the business
model does not adequately cover the cost of replication of data at each intermediate router. ISPs costs for
peering are roughly $700-$1,000 per Mb/s per month leading to an annual investment of about $1M for
peering at 100Mb/s. There is no incentive for Internet Service Providers (ISPs) to deploy the multicast ser-
vice model as it will not add to the revenues. Second, multicasting requires support inside the network in
terms of elaborate control support from IP routers, membership managements (IGMP), and multicast rout-
ing protocols. Third, enterprises do not want to run multicast for fear of degrading the performance of other
mission critical applications. Fourth, WAN connections are extremely expensive. Enterprises are not will-
ing to pay the additional charges incurred from content streaming.
Let us consider a streaming video seminar application where "viewers" attend the e-seminar from multiple
sites of an enterprise on the network shown in the Figure 5. The live video information originates from one
of the sites and is delivered to several clients at different sites. In such a scenario, the access links that con-
nect the edges of the enterprise network sites to the service provider network are typically the bottlenecks
and tend to get congested due to the number of viewers and other interfering traffic such as web, email, etc.
This is a problem when the number of viewers is large and each viewer establishes a separate connection to
the source of the video stream, i.e. when the source has to multicast the video information. Although it is
possible to design a custom solution to this problem, it only makes the network more complex as special
purpose boxes are introduced to solve specific problems. On the other hand we can assume that the enter-
prise has deployed CAG nodes at the edges of its network. As described in this section, the use of the CAG
edge nodes will allow for a manageable solution to the problem along with cost savings.
We introduce a service on the CAG, the Streaming Media Distribution Service (SMDS), that can achieve
the effect of multicasting, but without having to upgrade the networks to support IP multicast or without
having the application perform any multicasting across the access link [26]. The CAG nodes at the edge of
each of the enterprise sites form a logical overlay network. The SMDS on a network architecture employ-
ing CAG nodes can provide high-quality streaming without access-link bottlenecks, and is scalable in
terms of serving a large number of clients. We considered other efforts at solving the multicast problem.
The CMU effort [18] tries to move the complexity of managing multiple streams to the application at the
end system. However, this solution would still suffer from the access link bottlenecks. Other efforts such as
Figure 5: Streaming Video in a Distributed Enterprise Network
Application clientsApplication Server
Enterprise Network Edge
(Enterprise IS Dept.)
Access Network Edge
(Network Service Provider)
Application clients
Access
Link Access
Link
Optical
Core
Network
CAG
CAG
CAG
Practical Active Network Services within Content-aware Gateways 7
REUNITE [14] and HOP-by-HOP methods [20] require upgrading of the core infrastructure which is
beyond the control of the enterprise.
The source video application server sends a single stream to the CAG node at the edge of its enterprise net-
work. The SMDS on the source CAG edge node replicates and unicasts the source video stream to the des-
tination CAG edge device at each of the client sites. Thus, the application does not have to perform any
multicasting and the bottleneck problem at the source access link is avoided. A cluster of clients is always
associated with a destination edge CAG node. Only one copy of the stream needs to be sent across the
overlay network from the source edge to a destination edge. The SMDS on the destination CAG edge node
has to simply replicate and unicast the received data stream to the clients in its cluster. The SMDS "relo-
cates" the locus of video distribution to the edges of the client sites, thereby eliminating the bottleneck at
the destination access links.
We developed and tested the SMDS on our CAG prototype testbed shown in Figure 4. The video source
server used was the Real Server 8 on a Windows NT based system. The clients were off-the-shelf PC end
systems. We deployed the SMDS on only one destination CAG edge node in our experimental enterprise
network while the CAG node at the source edge simply acted as an IP router. The Real video system in our
setup uses port number 554 for the RTSP protocol. The SMDS software makes use of this port number as
well as the IP address of the Real server to detect the streaming media flow.
4.1.1 Operation Details
The SMDS service on the destination CAG operates as follows:
1. Once the SMDS is downloaded and enabled on the destination CAG, it sets up two filters on the Alteon
switch via API calls. One filter is to trap any packets with the Destination IP address of the Real server
on Destination port 554 and redirect the traffic to the SMDS on the CRM. The other filter is to trap all
the content packets from the Source IP address of the Real server and Source port 554 and redirect them
to the SMDS on the CRM.
2. The SMDS software application then binds itself to the end of each of these tunnels (resulting from
each filter) and suspends waiting for the filters to trigger.
3. When the first client attempts to connect to the Real server, the first filter is hit and its request packets
arrive at the SMDS. The SMDS registers the client into a local database using API calls.
4. The SMDS software then forwards the client connection requests on to the Real server and awaits the
response.
5. When the Real server starts streaming video content back to the client, the second filter on the CAG is
triggered and the content packets are redirected to the SMDS.
6. The SMDS software simply forwards the traffic onto the client that originally requested the content.
7. On successive connection requests from other clients for the same content as in step 3, the SMDS inter-
cepts the request packets but does not forward them to the Real server.
8. The SMDS completes handshaking with each requesting client (acting as a proxy for the Real server) to
complete the connection.
9. The SMDS on the CRM then starts duplicating the video content that is being sent by the Real server (to
the first client) and forwards the duplicated traffic to each of the requesting clients.
10.On successful completion of the streaming media content, SMDS closes all the client and server con-
nections and waits for a new request.
The core of the SMDS software, that generates the duplicate packets, (as in step 9) involves creating a new
header with the appropriate destination IP address and port (of the client), filling the packet with payload
from the original content packet and computing the new IP checksum before sending the packet to the
physical link.
Practical Active Network Services within Content-aware Gateways 8
4.1.2 Performance Measurements
We conducted a simple experiment to evaluate the performance of the SMDS on our prototype. Measure-
ments were taken at the client nodes using tcpdump and tcptrace to obtain the throughput. We used a
source file for the video streams encoded at 1.5Mbps. We used four client PCs running RealPlayer soft-
ware to view the streaming media. We measured performance in two scenarios: first using regular unicast
streams and the second using SMDS. The results of the measurements are shown below in Table 1.
The measurements indicate that the SMDS service eliminates the problem of unfair distribution of avail-
able bandwidth which is seen when using multiple unicast streams directly from the server. The unfairness
is partly due to TCP behavior and partly due to the Real Media server. Also the bottleneck with the unicast
scenario is clearly at the access link which was measured at about 4.3 Mbps. As expected, the use of
SMDS on the CAG at the destination edge eliminates the bottleneck, by moving the distribution point
beyond the access link.
4.2 Dynamic Content Adaptation Service
A wide choice of web access devices such as wireless phones, televisions, PDAs and PCs allows almost
ubiquitous web connectivity. The wide ranging display capacities of these devices result in inefficient ren-
dering of content originally intended for display on a PC monitor (typically a 15"-17" SVGA screen). As
the types of access devices in use increases, content providers are faced with the costly proposal of repli-
cating content in multiple formats, a scenario that can quickly become a content management nightmare.
Another attribute that varies among access technologies is the access bandwidth such as wireless access
(from 9.6 kbps to 128 kbps), dialup modem (up to 52 kbps) and broadband access (in the order of Mbps).
Large sized content, such as graphics-rich web pages, results in increased download times over slow access
links. We present the Dynamic Content Adaptation Service (DCAS) that executes on the CAG edge node
and dynamically customizes content for presentation, personalization, or transportation [27].
The Dynamic Content Adaptation Service is deployed on the CAG node at the edge of an internet service
provider (ISP) access network or the content provider (enterprise) network. The service performs two
functions: compression and content manipulation for presentation. Compression is based on the link
speeds between the user and the ISP network. Content manipulation is based on the device display capaci-
ties. These pieces of information are made available to the service in the form of user profiles when the
user subscribes to this service. This service presents significant commercial potential as it eliminates the
need for content replication and simplifies the management of content for the content provider while
enhancing the user experience.
We developed and tested the DCAS on our CAG prototype testbed shown in Figure 4. Apache web servers
on PCs were used for the content provider. The clients were regular PC end systems. We deployed the
DCAS on only one destination CAG edge node in our experimental enterprise network while the CAG
node at the source edge simply acted as an IP router. For the initial proof of concept, the DCAS service
only compresses JPEG graphics images.
TABLE 1. Bandwidth measurements using 1.5Mbps encoded video stream
Client # Avg. Bandwidth
Unicast (Mbps)
Avg. Bandwidth
SMDS (Mbps)
1 1.5 1.5
2 1.3 1.5
3 1.0 1.5
4 0.5 1.5
Practical Active Network Services within Content-aware Gateways 9
4.2.1 Operation Details
The DCAS service on the destination CAG operates as follows:
1. Once the DCAS is downloaded to the CRM on the CAG and enabled, it sets up a filter on the Alteon
switch via API calls, which we will call the request filter. The request filter traps request (HTTP GET)
packets originating from any user to the content provider based on the Destination IP address of the web
server and Destination port 80 (HTTP). The action when the request filter is triggered is set to redirect
the traffic to the DCAS on the CRM via a tunnel. The IP address of the content provider is known ahead
of time based on contractual agreements between the ISP and the content provider.
2. The DCAS software application then binds its receiver function to this tunnel and suspends, awaiting
the filter to be triggered.
3. When a user attempts to connect to the content server, the request filter is triggered and the request
packets arrive at the DCAS. The DCAS can authenticate the user and check subscription information
and preferences as well. It registers the user into a local database. If the user has subscribed to the ser-
vice, the DCAS sets a user-specific content filter on the Alteon switch. The content filter traps any con-
tent packets originating from the content server to that user based on Source IP address, Destination IP
address and port number. The action for this content filter is also set to redirect the content packets to
the DCAS on the CRM.
4. The DCAS software then forwards the client connection requests on to the web server and awaits the
response.
5. When the server starts sending the web content back to the user, the content filter on the CAG is trig-
gered and the content packets are redirected to the DCAS.
6. The DCAS software then looks for JPEG images embedded within the content payload and compresses
the images if required based on the client profile (access bandwidth and access device type). The com-
pression factor (high, medium, low) depends on a selection made by the user during subscription.
7. The DCAS software then forwards the content onto the user that originally requested the content.
8. The images downloaded to the user device are displayed on the web browser.
For the purposes of the experiment, we limited the functionality of the DCAS to JPEG transformation. The
DCAS implements the JPEG standard which uses the Discrete Cosine Transform as the heart of its com-
pression algorithm. The DCT function involves performing matrix multiplications and is well understood
to be a compute intensive task for CPUs. In order to enhance performance of the DCAS, we implemented
the DCT function in hardware on the FPGA-assisted CE module.
4.2.2 Performance Measurements
We conducted experiments to evaluate the performance of DCAS on CAG by varying the size of the JPEG
images, compression factor and processing granularity. The content used for testing involved a simple web
page with one or two JPEG images. The DCAS service was deployed on the CAG edge node at the desti-
nation i.e. close to the user. To eliminate any variations resulting from the Internet, we assumed that the
content was available at a cache at close proximity to the CAG node. We used a 100Mbps connection
between the cache node and the CAG node. Table 2 shows the download times for a web page on various
low speed links that simulate wireless, dialup and ISDN rate data access. The 33Kbyte sized web page
used for the test included 2 JPEG images of 16Kbytes each. Using a high compression factor we achieved
a 4:1 compression ratio. The impact on download times are as expected. The presentation aspect of the
DCAS service is a qualitative measurement that depends on the expectations and preferences of the user
and was therefore left out of the experiment.
An important metric for a Content-aware Active Gateway is the number of sessions that can be processed
per second. Unlike routers, where wire-speed performance of the well-defined routing/forwarding function
is a key requirement, the performance of a CAG depends on the type of services supported by the CAG at
any given time. In many cases, wire speed performance for these services is impossible to achieve using
current technologies. For the DCAS service, a session refers to the transfer of an average sized web page.
Practical Active Network Services within Content-aware Gateways 10
Due to the wide variances in web content, it is important to define a common metric that can be used to
compare performance across applications as well as platforms.
5.0 Discussion
This section presents some of the lessons we learned through our research and development efforts
described in this paper. The SMDS and DCAS content networking applications have a common underlying
flow. This high-level flow, shown in Figure 6, can be used as a template for a wide range of content net-
working applications. The most important block in the flow, the Content Processing block, forms the heart
of the application. In the SMDS, this block performs streaming content replication and in the DCAS, it per-
forms the image compression. Blocks performing the Authentication, Authorization and Accounting are
necessary in a real world commercial service.
We found that hardware processing is of utmost importance for providing real world performance to con-
tent networking applications on a CAG node. This became apparent during our SMDS experiment where
we found that the SMDS on the CAG was unable to support multiple Real video clients when the encoding
rate of the video stream was increased to 5 Mbps. Investigation using the profiling tool, gprof, revealed
TABLE 2. Effect of DCAS on 33Kbyte web page download times
Link Speeds
(Kbps)
Download Time
(sec)
Download Time
with DCAS (sec)
4.8 60 15
9.6 30 8
28.8 10 3
52 5 2
128 2 1
Figure 6: Content Networking Application High Level flow
Response Processing,
Authentication,
Authorization, Accounting
Response_Filter Hit
START
Insert_Packet
Forward to
Destination
WAIT
Set_Request_Filter
Initialization
Bind_Function_to_Filter
OK to
Process
?
Yes
Request_Filter Hit
Request Processing
Authentication
Authorization, Accounting
Insert_Packet
Forward to
DestinationNo
Set_Response_Filter Bind_Function_to_Filter
Content
Processing
WAIT
WAIT
START
START
Practical Active Network Services within Content-aware Gateways 11
that the duplication and checksumming functions within SMDS took about 40% of the CPU time and the
Pentium based CE module could not handle the increased processing requirements of multiple clients
viewing high bit-rate video content. We are working on using custom hardware to perform these functions
on the FPGA-based CE module and will present these results in future publications.
It is important to select the right level of granularity for content processing applications as it can have an
impact on latency, memory requirements and performance. For instance, in the DCAS service which com-
presses images on-the-fly, the granularity refers to the number of image blocks to be processed before
switching to image blocks of another image or user. Given that the service can encounter simultaneous
multiple images from a single page or from multiple users, the granularity size decides the amount of
memory for the queues required to store the image blocks awaiting processing. In content networking
applications this requirement can increase drastically with the number of users. Hardware assisted content
processing can alleviate memory requirements by increasing the rate at which the image blocks are pro-
cessed.
6.0 Related Works
A significant amount of research has been published in the area of intelligent network services through
programmable networking, ranging from networking paradigms and re-programmable hardware to appli-
cation environments. [1,3,6,15,21,22] The Active Networks approach [2,4,5,7,9-11] is a major effort to
incorporate programmability into the network infrastructure. To date, these developments have been
mainly realized in software-based hosts (e.g., Linux-based systems) that offer the required programmabil-
ity but lack the performance required in real networks. The Washington University ANN (Active Network
Node) [9,19] implementation introduces an FPGA-based CPU module that accommodates the active code
into a high performance routing switch. Programmable hardware for routers is explored in [3,4,6,13].
Other works such as Darwin [8], Phoenix [17] and Openet [1,6,9,13,15,19] have investigated mechanisms
for delivering programmability to end-users. The Openet effort [15] describes a use of a real-world routing
switch to achieve programmability at a high level of forwarding performance. However, the implementa-
tion does not provide for scalability of computation performance as it uses a single control plane CPU to
perform the computations. Unlike existing research in Active Networks which are primarily focused on
active routers, we take a practical approach at incorporating active networks research concepts into net-
work gateways. Our efforts towards the CAG architecture, described in this paper, are centered around the
requirements of commerical networking devices and focus on effective transfer of active networks con-
cepts to real world networking devices.
7.0 Conclusion
We have presented a new application for active networking concepts in the form of a Content-aware Active
Gateway. The CAG at the network edge is an important concept in the field of active networks as it repre-
sents a significant step towards realization of active networks research concepts in real-world networks.
We justify the introduction of the CAG at network edges by demonstrating two practical services with
near-term potential, SMDS and DCAS. The increase in the complexity of the Internet architecture at the
network edges, due to the number of commercial content networking applications that have been intro-
duced over the last few years, also justifies the need for the CAG. The software architecture that we have
developed uses key Active Networks concepts to enable service creation and dynamic service deployment
on the CAG. We have implemented a CAG protoype using real-world high-performance networking
devices augmented with software that we developed. Our efforts indicate that our CAG architecture can
support the requirements of a wide range of content networking applications. Performance requirements of
content networking applications are satisfied through the use of FPGA based hardware acceleration within
the CAG processing modules. Further research and development efforts are planned to investigate perfor-
mance requirements for CAG in real networks supporting multiple services and processing thousands of
flows simultaneously.
Practical Active Network Services within Content-aware Gateways 12
8.0 References
1. K. Yamada et.al., "A Novel Approach to Realizing Flexible Transport Systems using Reconfigurable Hardware",
Proceedings of the IEEE Symposium on FPGAs for Custom Computing Machines, April 1995, pp.67-71.
2. D. Tennenhouse, D. Wetherall, "Toward an active network architecture," Multimedia Computing and Network-
ing, Jan 1996.
3. Y. Yemini, S. Da Silva. "Towards Programmable Networks", IFIP/IEEE Intl. Workshop on Distributed Systems:
Operations and Management, L'Aquila, Italy, October 1996.
4. D. L. Tennenhouse, et al, "A Survey of Active Network Research", IEEE Communications Magazine, Vol. 35,
No. 1, January 1997
5. S. Bhattacharjee et al., "An Architecture for Active Networking," Proc. INFOCOM'97, Apr. 1997.
6. I. Hadzic, J. Smith, "On-the-fly Programmable Hardware for Networks", Proceedings of GLOBECOM 1998.
7. D. J. Wetherall, J. Guttag, D. L. Tennenhouse, "ANTS: A Toolkit for Building and Dynamically Deploying Net-
work Protocols", IEEE OPENARCH'98, San Francisco, CA, April 1998.
8. P. Chandra et al, "Darwin: Resource Management for Value-Added Customizable Network Service", Proc. 6th
IEEE ICNP, Austin, Oct. 1998
9. D. Decasper, et al, "A Scalable High Performance Active Networks Node", IEEE Network Magazine. Vol 37,
Jan/Feb 1999, pp 8-19.
10. B. Schwartz, A. Jackson, T. Strayer, W. Zhou, R. Rockwell, C. Partridge, "Smart Packets for Active Networks",
IEEE OpenArch 99, New York, March 1999
11. J. M. Smith, K. L. Calvert, S. L. Murphy, H. K. Orman, L. L. Peterson, "Activating networks: A progress report,"
IEEE Computer, Vol. 32, pp. 32-41, Apr. 1999.
12. T. Lavian, R. Jaeger, J. Hollingsworth, "Open Programmable Architecture for Java-enable Network Devices",
Stanford Hot Interconnects, August 1999.
13. G. Hjalmtysson, S. Bhattacharjee. "Control-on-Demand: An Efficient Approach to Router Programmability,"
IEEE Journal on Selected Areas in Communications, Vol. 17, No. 9, Sept. 1999, pp. 1549-1562.
14. I. Stoica, T.S.E.Ng, H.Zhang, "REUNITE: A recursive unicast approach to multicast", IEEE INFOCOM'2000
Mar.2000.
15. T. Lavian, P. Wang, "Active Networking On A Programmable Networking Platform", IEEE OpenArch'01,
Anchorage, Alaska, April 2001
16. T. Lavian, P. Wang, F. Travostino, S. Subramanian, D. Hoang, V. Sethaput, D. Culler, "Enabling Active Flow
Manipulation in Silicon-based Network Forwarding Engine." IEEE Journal of Communications and Networks,
March 2001, pp.78-87.
17. D. Putzolu, S. Bakshi, S. Yadav, R. Yavatkar, "The Phoenix Framework: A Practical Architecture for Program-
mable Networks", IEEE Communications Magazine, Vol 38, No 1, March 2001.
18. Y.H. Chu, S.G. Rao, S. Seshan, H. Zhang, "Enabling Conference Applications on the Internet using an Overlay
Multicast Architecture", SIGCOMM'01, San Diego, 2001.
19. T. Wolf, J. S. Turner, "Design Issues for High-Performance Active Routers", IEEE Journal on Selected Areas in
Communications, Vol. 19, No. 3, March 2001, pp. 404-409.
20. L. Henrique, M.K. Costa, S. Fdida, Otto Carlos M.B. Duarte, "Hop By Hop Multicast Routing Protocol", SIG-
COMM'01, August 27-31, 2001, San Diego, California, USA.
21. T. Lavian, P. Wang, F. Travostino, S. Subramanian, D. Hoang, V. Sethaput, "Intelligent network services through
active flow manipulation", Intelligent Network Workshop, 2001 IEEE , 2001, pp. 73 -82.
22. D.E. Taylor, J. S. Turner, J. W. Lockwood, "Dynamic Hardware Plugins (DHP): Exploiting Reconfigurable
Hardware for High-Performance Programmable Routers", IEEE Openarch 2001, pp. 25-34.
23. B. D. Davidson, "A Web caching primer", IEEE Internet Computing,, Vol. 5, Issue 4, July-Aug. 2001, pp. 38-45.
24. J. S. Chase, "Server switching: yesterday and tomorrow", WIAPP 2001, Proceedings of the second IEEE work-
shop on Internet Applications 2001, pp. 114-123.
25. J. Lu, "Reactive and proactive approaches to media streaming: from scalable coding to content delivery net-
works", Proceedings of International Conference on Information Technology: Coding and Computing, 2001. pp.
5-9.
Practical Active Network Services within Content-aware Gateways 13
26. T. Lavian, P. Wang, R. Durairaj, D. Hoang, "Application Layer Multi-Unicast from Edge Device," Submitted for
publication.
27. S. Subramanian, G. Boissonnard, C. Gloster, J. Rasimas, "High-Performance Configurable Content Networking",
Submitted for publication.
28. Nortel Networks Inc., www.nortelnetworks.com
29. Volera Inc., www.volera.com
30. Akamai Inc., www.akamai.com

Contenu connexe

Tendances

Optimal Rate Allocation and Lost Packet Retransmission in Video Streaming
Optimal Rate Allocation and Lost Packet Retransmission in Video StreamingOptimal Rate Allocation and Lost Packet Retransmission in Video Streaming
Optimal Rate Allocation and Lost Packet Retransmission in Video StreamingIRJET Journal
 
IRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network ArchitectureIRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network ArchitectureIRJET Journal
 
SDN and NFV Value in Business Services: Innovations in Network Monetization a...
SDN and NFV Value in Business Services: Innovations in Network Monetization a...SDN and NFV Value in Business Services: Innovations in Network Monetization a...
SDN and NFV Value in Business Services: Innovations in Network Monetization a...Alan Sardella
 
Enhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksEnhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksgraphhoc
 
Routing protocol for hetrogeneous wireless mesh network
Routing protocol for hetrogeneous wireless mesh networkRouting protocol for hetrogeneous wireless mesh network
Routing protocol for hetrogeneous wireless mesh networkredpel dot com
 
RichardLaca-Resume-Associate Engineer-Telecom
RichardLaca-Resume-Associate Engineer-TelecomRichardLaca-Resume-Associate Engineer-Telecom
RichardLaca-Resume-Associate Engineer-TelecomRichard Laca
 
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET Journal
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSEditor IJMTER
 
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...TELKOMNIKA JOURNAL
 
Next Generation Internet Over Satellite
Next Generation Internet Over SatelliteNext Generation Internet Over Satellite
Next Generation Internet Over SatelliteReza Gh
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...ijgca
 
ENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERING
ENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERINGENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERING
ENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERINGIJCNCJournal
 
Broad Band technology, Next generation network (NGN),DSLAM
Broad Band technology, Next generation network (NGN),DSLAMBroad Band technology, Next generation network (NGN),DSLAM
Broad Band technology, Next generation network (NGN),DSLAMsabzalee
 
Networking project list for java and dotnet
Networking project list for java and dotnetNetworking project list for java and dotnet
Networking project list for java and dotnetredpel dot com
 
Rapidly IPv6 multimedia management schemes based LTE-A wireless networks
Rapidly IPv6 multimedia management schemes based LTE-A wireless networksRapidly IPv6 multimedia management schemes based LTE-A wireless networks
Rapidly IPv6 multimedia management schemes based LTE-A wireless networksIJECEIAES
 
Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...IJECEIAES
 
NGN Next Generation Networks
NGN Next Generation NetworksNGN Next Generation Networks
NGN Next Generation Networksabdulquyyum
 
Terabit Network- Tbps Network
Terabit Network- Tbps NetworkTerabit Network- Tbps Network
Terabit Network- Tbps Networkvishal gupta
 

Tendances (20)

Optimal Rate Allocation and Lost Packet Retransmission in Video Streaming
Optimal Rate Allocation and Lost Packet Retransmission in Video StreamingOptimal Rate Allocation and Lost Packet Retransmission in Video Streaming
Optimal Rate Allocation and Lost Packet Retransmission in Video Streaming
 
IRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network ArchitectureIRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network Architecture
 
SDN and NFV Value in Business Services: Innovations in Network Monetization a...
SDN and NFV Value in Business Services: Innovations in Network Monetization a...SDN and NFV Value in Business Services: Innovations in Network Monetization a...
SDN and NFV Value in Business Services: Innovations in Network Monetization a...
 
Enhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksEnhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networks
 
Routing protocol for hetrogeneous wireless mesh network
Routing protocol for hetrogeneous wireless mesh networkRouting protocol for hetrogeneous wireless mesh network
Routing protocol for hetrogeneous wireless mesh network
 
RichardLaca-Resume-Associate Engineer-Telecom
RichardLaca-Resume-Associate Engineer-TelecomRichardLaca-Resume-Associate Engineer-Telecom
RichardLaca-Resume-Associate Engineer-Telecom
 
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
 
Cloud ppt
Cloud pptCloud ppt
Cloud ppt
 
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
 
Next Generation Internet Over Satellite
Next Generation Internet Over SatelliteNext Generation Internet Over Satellite
Next Generation Internet Over Satellite
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
 
ENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERING
ENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERINGENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERING
ENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERING
 
Broad Band technology, Next generation network (NGN),DSLAM
Broad Band technology, Next generation network (NGN),DSLAMBroad Band technology, Next generation network (NGN),DSLAM
Broad Band technology, Next generation network (NGN),DSLAM
 
1720 1724
1720 17241720 1724
1720 1724
 
Networking project list for java and dotnet
Networking project list for java and dotnetNetworking project list for java and dotnet
Networking project list for java and dotnet
 
Rapidly IPv6 multimedia management schemes based LTE-A wireless networks
Rapidly IPv6 multimedia management schemes based LTE-A wireless networksRapidly IPv6 multimedia management schemes based LTE-A wireless networks
Rapidly IPv6 multimedia management schemes based LTE-A wireless networks
 
Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...
 
NGN Next Generation Networks
NGN Next Generation NetworksNGN Next Generation Networks
NGN Next Generation Networks
 
Terabit Network- Tbps Network
Terabit Network- Tbps NetworkTerabit Network- Tbps Network
Terabit Network- Tbps Network
 

En vedette

5470721 Authentication Chillispot
5470721 Authentication Chillispot5470721 Authentication Chillispot
5470721 Authentication ChillispotDanai Thongsin
 
2.1 analyzing loans
2.1   analyzing loans2.1   analyzing loans
2.1 analyzing loansGary Ball
 
6th Annual Local Search Usage Study
6th Annual Local Search Usage Study6th Annual Local Search Usage Study
6th Annual Local Search Usage StudyKatie Fellenz
 
CHRISTMAS GREETINGS
CHRISTMAS GREETINGSCHRISTMAS GREETINGS
CHRISTMAS GREETINGSjohn
 
Ncuti aid policy and management, the rwandan experience
Ncuti aid policy and management, the rwandan experienceNcuti aid policy and management, the rwandan experience
Ncuti aid policy and management, the rwandan experienceicgfmconference
 
WITNESSES TO HOPE
WITNESSES TO HOPEWITNESSES TO HOPE
WITNESSES TO HOPEgmasky
 
Legea vieţii.
Legea vieţii.Legea vieţii.
Legea vieţii.Nicky Nic
 
Sss Trenul Vietii
Sss Trenul VietiiSss Trenul Vietii
Sss Trenul VietiiNicky Nic
 
11.Piano Bar
11.Piano Bar11.Piano Bar
11.Piano BarNicky Nic
 

En vedette (9)

5470721 Authentication Chillispot
5470721 Authentication Chillispot5470721 Authentication Chillispot
5470721 Authentication Chillispot
 
2.1 analyzing loans
2.1   analyzing loans2.1   analyzing loans
2.1 analyzing loans
 
6th Annual Local Search Usage Study
6th Annual Local Search Usage Study6th Annual Local Search Usage Study
6th Annual Local Search Usage Study
 
CHRISTMAS GREETINGS
CHRISTMAS GREETINGSCHRISTMAS GREETINGS
CHRISTMAS GREETINGS
 
Ncuti aid policy and management, the rwandan experience
Ncuti aid policy and management, the rwandan experienceNcuti aid policy and management, the rwandan experience
Ncuti aid policy and management, the rwandan experience
 
WITNESSES TO HOPE
WITNESSES TO HOPEWITNESSES TO HOPE
WITNESSES TO HOPE
 
Legea vieţii.
Legea vieţii.Legea vieţii.
Legea vieţii.
 
Sss Trenul Vietii
Sss Trenul VietiiSss Trenul Vietii
Sss Trenul Vietii
 
11.Piano Bar
11.Piano Bar11.Piano Bar
11.Piano Bar
 

Similaire à Practical active network services within content-aware gateways

Towards automated service-oriented lifecycle management for 5G networks
Towards automated service-oriented lifecycle management for 5G networksTowards automated service-oriented lifecycle management for 5G networks
Towards automated service-oriented lifecycle management for 5G networksEricsson
 
Active Network Service Composition
Active Network Service CompositionActive Network Service Composition
Active Network Service CompositionIJERD Editor
 
Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015TTA_TNagar
 
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...IJCNCJournal
 
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...IJCNCJournal
 
A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...
A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...
A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...IJCNCJournal
 
SDN and NFV Value in Business Services: Innovations in Network Monetization a...
SDN and NFV Value in Business Services: Innovations in Network Monetization a...SDN and NFV Value in Business Services: Innovations in Network Monetization a...
SDN and NFV Value in Business Services: Innovations in Network Monetization a...Cisco Service Provider
 
CLOUD RAN- Benefits of Centralization and Virtualization
CLOUD RAN- Benefits of Centralization and VirtualizationCLOUD RAN- Benefits of Centralization and Virtualization
CLOUD RAN- Benefits of Centralization and VirtualizationAricent
 
Proposal of a Transparent Relay System with vNIC for Encrypted Overlay Networks
Proposal of a Transparent Relay System with vNIC for Encrypted Overlay NetworksProposal of a Transparent Relay System with vNIC for Encrypted Overlay Networks
Proposal of a Transparent Relay System with vNIC for Encrypted Overlay NetworksIJCSIS Research Publications
 
Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1IDES Editor
 
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...IRJET Journal
 
An extensible, programmable, commercial-grade platform for internet service a...
An extensible, programmable, commercial-grade platform for internet service a...An extensible, programmable, commercial-grade platform for internet service a...
An extensible, programmable, commercial-grade platform for internet service a...Tal Lavian Ph.D.
 
IRJET- Build SDN with Openflow Controller
IRJET-  	  Build SDN with Openflow ControllerIRJET-  	  Build SDN with Openflow Controller
IRJET- Build SDN with Openflow ControllerIRJET Journal
 
Project DRAC: Creating an applications-aware network
Project DRAC: Creating an applications-aware networkProject DRAC: Creating an applications-aware network
Project DRAC: Creating an applications-aware networkTal Lavian Ph.D.
 
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...ijngnjournal
 
5G Challenges and Opportunities
5G Challenges and Opportunities5G Challenges and Opportunities
5G Challenges and OpportunitiesAliMohamedAhmed2
 

Similaire à Practical active network services within content-aware gateways (20)

Towards automated service-oriented lifecycle management for 5G networks
Towards automated service-oriented lifecycle management for 5G networksTowards automated service-oriented lifecycle management for 5G networks
Towards automated service-oriented lifecycle management for 5G networks
 
Active Network Service Composition
Active Network Service CompositionActive Network Service Composition
Active Network Service Composition
 
Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015
 
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
 
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...
 
A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...
A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...
A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...
 
SDN and NFV Value in Business Services: Innovations in Network Monetization a...
SDN and NFV Value in Business Services: Innovations in Network Monetization a...SDN and NFV Value in Business Services: Innovations in Network Monetization a...
SDN and NFV Value in Business Services: Innovations in Network Monetization a...
 
CLOUD RAN- Benefits of Centralization and Virtualization
CLOUD RAN- Benefits of Centralization and VirtualizationCLOUD RAN- Benefits of Centralization and Virtualization
CLOUD RAN- Benefits of Centralization and Virtualization
 
QoS in an LTE network
QoS in an LTE networkQoS in an LTE network
QoS in an LTE network
 
Proposal of a Transparent Relay System with vNIC for Encrypted Overlay Networks
Proposal of a Transparent Relay System with vNIC for Encrypted Overlay NetworksProposal of a Transparent Relay System with vNIC for Encrypted Overlay Networks
Proposal of a Transparent Relay System with vNIC for Encrypted Overlay Networks
 
Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1
 
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
 
Network Virtualization - A Survey
Network Virtualization - A SurveyNetwork Virtualization - A Survey
Network Virtualization - A Survey
 
An extensible, programmable, commercial-grade platform for internet service a...
An extensible, programmable, commercial-grade platform for internet service a...An extensible, programmable, commercial-grade platform for internet service a...
An extensible, programmable, commercial-grade platform for internet service a...
 
Evolution of internet by Ali Kashif
Evolution of internet  by Ali KashifEvolution of internet  by Ali Kashif
Evolution of internet by Ali Kashif
 
IRJET- Build SDN with Openflow Controller
IRJET-  	  Build SDN with Openflow ControllerIRJET-  	  Build SDN with Openflow Controller
IRJET- Build SDN with Openflow Controller
 
N fv good
N fv goodN fv good
N fv good
 
Project DRAC: Creating an applications-aware network
Project DRAC: Creating an applications-aware networkProject DRAC: Creating an applications-aware network
Project DRAC: Creating an applications-aware network
 
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
 
5G Challenges and Opportunities
5G Challenges and Opportunities5G Challenges and Opportunities
5G Challenges and Opportunities
 

Plus de Tal Lavian Ph.D.

Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerTal Lavian Ph.D.
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerTal Lavian Ph.D.
 
Photonic line sharing for high-speed routers
Photonic line sharing for high-speed routersPhotonic line sharing for high-speed routers
Photonic line sharing for high-speed routersTal Lavian Ph.D.
 
Systems and methods to support sharing and exchanging in a network
Systems and methods to support sharing and exchanging in a networkSystems and methods to support sharing and exchanging in a network
Systems and methods to support sharing and exchanging in a networkTal Lavian Ph.D.
 
Systems and methods for visual presentation and selection of IVR menu
Systems and methods for visual presentation and selection of IVR menuSystems and methods for visual presentation and selection of IVR menu
Systems and methods for visual presentation and selection of IVR menuTal Lavian Ph.D.
 
Grid proxy architecture for network resources
Grid proxy architecture for network resourcesGrid proxy architecture for network resources
Grid proxy architecture for network resourcesTal Lavian Ph.D.
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerTal Lavian Ph.D.
 
Systems and methods for electronic communications
Systems and methods for electronic communicationsSystems and methods for electronic communications
Systems and methods for electronic communicationsTal Lavian Ph.D.
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerTal Lavian Ph.D.
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerTal Lavian Ph.D.
 
Radar target detection system for autonomous vehicles with ultra-low phase no...
Radar target detection system for autonomous vehicles with ultra-low phase no...Radar target detection system for autonomous vehicles with ultra-low phase no...
Radar target detection system for autonomous vehicles with ultra-low phase no...Tal Lavian Ph.D.
 
Grid proxy architecture for network resources
Grid proxy architecture for network resourcesGrid proxy architecture for network resources
Grid proxy architecture for network resourcesTal Lavian Ph.D.
 
Method and apparatus for scheduling resources on a switched underlay network
Method and apparatus for scheduling resources on a switched underlay networkMethod and apparatus for scheduling resources on a switched underlay network
Method and apparatus for scheduling resources on a switched underlay networkTal Lavian Ph.D.
 
Dynamic assignment of traffic classes to a priority queue in a packet forward...
Dynamic assignment of traffic classes to a priority queue in a packet forward...Dynamic assignment of traffic classes to a priority queue in a packet forward...
Dynamic assignment of traffic classes to a priority queue in a packet forward...Tal Lavian Ph.D.
 
Method and apparatus for using a command design pattern to access and configu...
Method and apparatus for using a command design pattern to access and configu...Method and apparatus for using a command design pattern to access and configu...
Method and apparatus for using a command design pattern to access and configu...Tal Lavian Ph.D.
 
Reliable rating system and method thereof
Reliable rating system and method thereofReliable rating system and method thereof
Reliable rating system and method thereofTal Lavian Ph.D.
 
Time variant rating system and method thereof
Time variant rating system and method thereofTime variant rating system and method thereof
Time variant rating system and method thereofTal Lavian Ph.D.
 
Systems and methods for visual presentation and selection of ivr menu
Systems and methods for visual presentation and selection of ivr menuSystems and methods for visual presentation and selection of ivr menu
Systems and methods for visual presentation and selection of ivr menuTal Lavian Ph.D.
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerTal Lavian Ph.D.
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerTal Lavian Ph.D.
 

Plus de Tal Lavian Ph.D. (20)

Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Photonic line sharing for high-speed routers
Photonic line sharing for high-speed routersPhotonic line sharing for high-speed routers
Photonic line sharing for high-speed routers
 
Systems and methods to support sharing and exchanging in a network
Systems and methods to support sharing and exchanging in a networkSystems and methods to support sharing and exchanging in a network
Systems and methods to support sharing and exchanging in a network
 
Systems and methods for visual presentation and selection of IVR menu
Systems and methods for visual presentation and selection of IVR menuSystems and methods for visual presentation and selection of IVR menu
Systems and methods for visual presentation and selection of IVR menu
 
Grid proxy architecture for network resources
Grid proxy architecture for network resourcesGrid proxy architecture for network resources
Grid proxy architecture for network resources
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Systems and methods for electronic communications
Systems and methods for electronic communicationsSystems and methods for electronic communications
Systems and methods for electronic communications
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Radar target detection system for autonomous vehicles with ultra-low phase no...
Radar target detection system for autonomous vehicles with ultra-low phase no...Radar target detection system for autonomous vehicles with ultra-low phase no...
Radar target detection system for autonomous vehicles with ultra-low phase no...
 
Grid proxy architecture for network resources
Grid proxy architecture for network resourcesGrid proxy architecture for network resources
Grid proxy architecture for network resources
 
Method and apparatus for scheduling resources on a switched underlay network
Method and apparatus for scheduling resources on a switched underlay networkMethod and apparatus for scheduling resources on a switched underlay network
Method and apparatus for scheduling resources on a switched underlay network
 
Dynamic assignment of traffic classes to a priority queue in a packet forward...
Dynamic assignment of traffic classes to a priority queue in a packet forward...Dynamic assignment of traffic classes to a priority queue in a packet forward...
Dynamic assignment of traffic classes to a priority queue in a packet forward...
 
Method and apparatus for using a command design pattern to access and configu...
Method and apparatus for using a command design pattern to access and configu...Method and apparatus for using a command design pattern to access and configu...
Method and apparatus for using a command design pattern to access and configu...
 
Reliable rating system and method thereof
Reliable rating system and method thereofReliable rating system and method thereof
Reliable rating system and method thereof
 
Time variant rating system and method thereof
Time variant rating system and method thereofTime variant rating system and method thereof
Time variant rating system and method thereof
 
Systems and methods for visual presentation and selection of ivr menu
Systems and methods for visual presentation and selection of ivr menuSystems and methods for visual presentation and selection of ivr menu
Systems and methods for visual presentation and selection of ivr menu
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 

Dernier

澳洲Deakin学位证,迪肯大学毕业证书1:1制作
澳洲Deakin学位证,迪肯大学毕业证书1:1制作澳洲Deakin学位证,迪肯大学毕业证书1:1制作
澳洲Deakin学位证,迪肯大学毕业证书1:1制作rpb5qxou
 
Kwin - Trang Tải App Game Kwin68 Club Chính Thức
Kwin - Trang Tải App Game Kwin68 Club Chính ThứcKwin - Trang Tải App Game Kwin68 Club Chính Thức
Kwin - Trang Tải App Game Kwin68 Club Chính ThứcKwin68 Club
 
AIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjek
AIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjekAIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjek
AIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjekpavan402055
 
RBS学位证,鹿特丹商学院毕业证书1:1制作
RBS学位证,鹿特丹商学院毕业证书1:1制作RBS学位证,鹿特丹商学院毕业证书1:1制作
RBS学位证,鹿特丹商学院毕业证书1:1制作f3774p8b
 
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls DubaiDubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubaikojalkojal131
 
Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...
Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...
Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...Amil baba
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...Amil Baba Dawood bangali
 
Computer Organization and Architecture 10th - William Stallings, Ch01.pdf
Computer Organization and Architecture 10th - William Stallings, Ch01.pdfComputer Organization and Architecture 10th - William Stallings, Ch01.pdf
Computer Organization and Architecture 10th - William Stallings, Ch01.pdfShahdAbdElsamea2
 
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作ss846v0c
 

Dernier (9)

澳洲Deakin学位证,迪肯大学毕业证书1:1制作
澳洲Deakin学位证,迪肯大学毕业证书1:1制作澳洲Deakin学位证,迪肯大学毕业证书1:1制作
澳洲Deakin学位证,迪肯大学毕业证书1:1制作
 
Kwin - Trang Tải App Game Kwin68 Club Chính Thức
Kwin - Trang Tải App Game Kwin68 Club Chính ThứcKwin - Trang Tải App Game Kwin68 Club Chính Thức
Kwin - Trang Tải App Game Kwin68 Club Chính Thức
 
AIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjek
AIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjekAIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjek
AIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjek
 
RBS学位证,鹿特丹商学院毕业证书1:1制作
RBS学位证,鹿特丹商学院毕业证书1:1制作RBS学位证,鹿特丹商学院毕业证书1:1制作
RBS学位证,鹿特丹商学院毕业证书1:1制作
 
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls DubaiDubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
 
Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...
Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...
Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
 
Computer Organization and Architecture 10th - William Stallings, Ch01.pdf
Computer Organization and Architecture 10th - William Stallings, Ch01.pdfComputer Organization and Architecture 10th - William Stallings, Ch01.pdf
Computer Organization and Architecture 10th - William Stallings, Ch01.pdf
 
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
 

Practical active network services within content-aware gateways

  • 1. Practical Active Network Services within Content-aware Gateways 1 Practical Active Network Services within Content-aware Gateways Siva Subramanian1 , Phil Wang, Ramesh Durairaj, Jennifer Rasimas, Franco Travostino {ssiva, pywang, radurai, jrasimas, travos}@nortelnetworks.com Advanced Technology Investments, Nortel Networks Tal Lavian tlavian@nortelnetworks.com Computer Science Division, University of California, Berkeley Doan Hoang dhoang@it.uts.edu.au Department of Computer Systems, University of Technology, Sydney Abstract The Internet has seen an increase in complexity due to the introduction of new types of net- working devices and services, particularly at points of discontinuity known as network edges. As the net- working industry continues to add revenue generating services at network edges, there is an increasing need to provide a systematic method for dynamically introducing and providing these new services in lieu of the ad-hoc approach that is in use today. To this end we support a phased approach to "activating" the Internet and suggest that there exists an immediate need for realizing Active Networks concepts at the net- work edges. In this context, we present our efforts towards the development of a Content-aware Active Gateway (CAG) architecture. With the help of two practical services running on our initial prototype, built from commercial networking devices, we give a qualitative and quantitative view of the CAG potential. Keywords: Active networks, Programmable networking devices, Content Delivery Networks, Content Networking, Content Transformation, Streaming media, Multicast, Network-edges, Gateways. 1.0 Introduction The advent of the world wide web and commercialization of the Internet has led to an explosion of content providers and users. The Internet faces challenges arising from economic factors and legal issues in the telecom market, deficiencies in the existing network infrastructure and increased demand for bandwidth and services. This has resulted in the creation of a new concept: Content Networking [25-27]. Content net- working overcomes the inadequacies of existing networks by introducing intelligence into the network in order to enhance performance of services and delivery of content to the consumer. It has become important primarily due to the potential for generating new revenue from such intelligent services [28-30]. Content Delivery Networks (CDN) are typically implemented as overlay networks and contain one or more nodes that can inspect and/or manipulate information in higher networking layers (four through seven in the OSI reference model). Examples of CDNs include web cache networks and video streaming networks. Examples of content networking devices include voice packet gateways, web caches, load-bal- ancing switches and firewalls [28-30]. Content Networking services are typically introduced into the net- work in the form of dedicated custom networking devices. Such an approach exhibits increased complexity and redundancy and also poor manageability and upgradeability. 1. Siva Subramanian is a Ph.D. candidate in the Electrical and Computer Engineering Department at North Carolina State University, Raleigh
  • 2. Practical Active Network Services within Content-aware Gateways 2 Content networking devices are used at the edges of networks. The edge of a network indicates a demarca- tion of network types as shown in Figure 1, and is typically characterized by an impedance mismatch. The mismatch is typically due to differences in physical network attributes such as network size, link band- width, network latency, network capacity or abstract attributes such as trust, authority. Some examples of real-life impedance mismatches are listed below. • low-speed access networks versus high-speed metro optical networks • trusted enterprise internal network versus untrusted external network • electronic networks versus photonic networks • QoS-enabled networks versus best-effort networks • secure encrypted network versus unsecured network • wireless access network versus the wireline network • circuit-switched network versus packet-switched network Such discrepancies in the network boundaries can be overcome by additional processing of the traffic flowing across them. However, this additional processing is often not the same for all traffic types, and is typically not known a priori. Content Networking applications adapt the processing to the type of the traf- fic flowing across a given network edge. For instance, firewalls process traffic between trusted and untrusted domains by filtering and taking actions based on the type of content. In this paper, we present a new application for active networks research concepts in the form of a Content- aware Active Gateway (CAG). The hardware and software architectures that we have developed are pre- sented in section two. We have implemented a CAG protoype using real-world high-performance network- ing devices augmented with software that we developed. Details of the prototype are described in section 3. We have implemented two simple commercial services on the CAG prototype. These services and the results from our experiments are described in section 4. Section 5 presents some observations made during our experiments with the CAG prototype. We discuss related works in active networks in section 6 and finally present our conclusions in section 7. 2.0 Content-aware Active Gateway We propose a new type of active networking device, the Content-aware Active Gateway that can be used to deploy a wide range of services at network edges highlighted in Figure 1. The services deployed on the gateways are controlled by the service provider or even the user as in case of a residential network edge. Contractual agreements between one or more service providers and users are part of the business model. The services are developed by service providers using software technology such as Java and can be deployed and enabled on-demand on the CAG. In an access network model where the CAG is owned by the network provider, the service provider leases processing capacity on the CAG in order to serve the Figure 1: Network model with Edges Access Network Edge Core Network EdgeMetro Network Personal Network Edge Personal Network Enterprise Network Edge Enterprise Network Optical Core Network User Control Service Provider Control
  • 3. Practical Active Network Services within Content-aware Gateways 3 users. In the telecom network model, a CAG can support services required for peering networks. In a resi- dential service provider model it is possible that the user, under authorization of the service provider, may have control over the services that are "loaded" onto the CAG. The services can be either statically config- ured on the CAG or alternatively loaded on demand. Examples of dynamic services include content per- sonalization, firewalling, virus scanning, encryption, compression and video chat servers. The ability to deploy services on demand into the network can lead to renewed activity in the service provider industry and new revenue sources for broadband network infrastructure providers. The process of introducing a new service can be simplified and limited to developing the software application and putting in place the contractual agreements between the gateway owner and the service owner. Eliminating the need for large investments needed to introduce new equipment into an existing network can lead to new ventures in the service development industry. 2.1 CAG Hardware Architecture The main feature of a content networking device is the ability to filter specific types of traffic by identify- ing patterns in the header or payload of packets. The redirection capability of such a device enables pro- cessing of the filtered and redirected traffic. Thus the main components of the CAG Hardware Architecture are a fast packet forwarding and classification plane, a high-performance compute plane and a flexible control plane. The difference between a router and the CAG node lies in its distributed processing architec- ture comprising of multiple compute resources. The processing capability leads to new performance met- rics such as Compute Quality of Service (CQoS), which, similar to network Quality of Service, can lead to service differentiation and therefore revenue potential. Routing and forwarding performance of a CAG, especially for traffic not requiring any transformation, must not be affected by the services executing on the compute resources. This requirement is similar to that of Active Routers [9,15,19] and can be achieved by decoupling the network processing resources at layers two and three from the application processing at higher layers. Compute requirements for the resources on a CAG node can vary depending on the application. These functions can be implemented over a range of technologies such as CPUs, NPUs, FPGAs and ASICs to achieve different levels of performance. A service demanding high CQoS can be allocated an FPGA based compute resource whereas the same service being offered by another provider at a lower CQoS (and there- fore cost) can be performed on a general purpose CPU resource. The CAG architecture must allow a mix NI NI NI NI CE CE CE CE Switch Fabric Control Compute Element Network Interface (PHY) Link Ctrl Storage Configrable Resource Module PHY NPUMEM CPU Link Ctrl MEM ASICASIC [2a] [2b] [2c] CPU Link Ctrl MEM FPGAFPGA Figure 2: CAG Hardware Architecture: [2a] Hardware Block Diagram, [2b] Compute Engine (CE) & Network Interface (NI), [2c] Configurable Resource Module (CRM) “flavors”
  • 4. Practical Active Network Services within Content-aware Gateways 4 of these technologies to achieve the desired cost, performance and flexibility targets. The physical port resource as well as the compute resource on a CAG, is a shared resource enabling traffic from any PHY to be processed by any compute resource. This eliminates the need to duplicate services on multiple resources unless demanded by increased processing requirements. The modular architecture of the CAG node, shown in Figure 2a, consists of Network Interface (NI) modules, Compute Engine (CE) modules, the Switch Fabric and a Control module. Typically, these modules will be implemented in the form of blades or cards that sit in a single network equipment shelf connected by a backplane. Backplane connectivity between the modules will use point-to-point high-speed serial links for increased performance and reliabil- ity. Alternately the CE modules can be implemented by external hardware if physical port costs on the switching shelf are high. The Network Interface module, as shown in Figure 2b, consists of one or more Network Processing Units (NPU), physical layer ASIC (PHY), packet memory and any additional silicon to perform the functions of filtering, classification and queuing. The NI module is capable of making all decisions in the layer two and three domain (switching, forwarding and routing). The CE module, shown in Figure 2b, executes the ser- vices downloaded to the CAG node. The CE module contains the Configurable Resource Module (CRM), link interface controller and also some permanent storage. This permanent storage can be flash memory or miniature hard disk storage and is used to store long-term state for the service. A mandatory component of the Configurable Resource Module (CRM) is the CPU. The CRM can employ one or more high density FPGAs and ASICs along with a CPU as shown in Figure 2c. FPGAs and ASICs on the CRM assist in pro- cessing of compute-intensive functions that cannot be efficiently handled by a CPU. Special purpose CRMs can also have connections to external peripherals, such as a RAID disk array, for a web cache. The switch fabric module uses one or more non-blocking high-speed crossbar silicon switching chipsets. The Control module performs the Operations Administration and Maintenance (OA&M) functions on the CAG. 2.2 CAG Software Architecture Extensive research has been done on Active/Programmable Network APIs [2-5,7,10-12,16]. The features of such APIs include service creation and deployment, security and policy controls. The high-level soft- ware architecture of the CAG is shown in Figure 3. In the architecture, application services at the top are built by high-level Service APIs. These Service APIs provide applications the capabilities to create new services, execute existing services and perform content- based functionality. Service Creation API is required for service creation, installation and security. Service Figure 3: CAG Software Architecture ServicePolicyServicePolicy M E MM E M N a t i v e A P I C P UC P U F P G A A S I CA S I C L CL C R e s o u r c e S e c u r i t y C o d e E x e c u t i o n F i l t e r i n g D i v e r t i n g F o r w a r d i n g D r o p p i n g S e r v i c e A P I A p p l i c a t i o n S e r v i c e s C r e a t i o n C o n t e n t F u n c t i o nR u n t i m e Codedownload ServicerequestServicerequest ServiceloadServiceload ServiceconfigureServiceconfigure ServiceStart/StopServiceStart/Stop P a r s i n gP a r s i n g R e d i r e c t i o nR e d i r e c t i o n F i l t e r i n gF i l t e r i n g E d i t / I n s e r tE d i t / I n s e r t R e p l i c a t i o nR e p l i c a t i o n F o r w a r d i n gF o r w a r d i n g P a c k e t F u n c t i o n H e a d e r D e c a pH e a d e r D e c a p R e c e i v e N a t i v e A P I R e c e i v e H e a d e r N a t i v e A P IS y s t e m A P I C o m p u t e F o r w a r d i n g S e n d H e a d e r E n c a p
  • 5. Practical Active Network Services within Content-aware Gateways 5 Runtime API is required for computing or network resource reservation and allocation, configuration, sig- naling and management. The Content Function APIs provide the services to do various content manipula- tion, including content filtering, redirection, parsing, editing, insertion, replicating/multicasting and forwarding. Below the Content Function API is the Packet Function API which receives and decapsulates individual incoming packets, encapsulates and sends outgoing packets, and sets up any-layer packet fil- ters, packet data buffer allocation, data capture, data insertion and tagging. Native API provides low-level access to native resources of computing and forwarding. The Forwarding API supports the regular networking functions such as packet filtering, diverting and for- warding/dropping, typically realized in hardware. System APIs provide access to hardware or micro-code. The Compute API provides the functions required to configure the resources, read and write to memory or storage and resource-specific functions etc. These APIs are wrapped by the Configurable Content Net- working API thereby hiding the complexity of the resource modules from the services. The Service APIs for service creation and runtime APIs are mainly inherited from the Openet SDK (ODK) [12, 15]. The ODK, is readily available from [28] and can be used to create and deploy Active Networks services onto commercial network devices. 3.0 CAG Prototype The first prototype of the CAG was developed using existing commercial high-performance networking devices. The Nortel Alteon Webswitch [28], referred to here as the Alteon switch, is a commercial-grade content networking switch. It has line-speed filtering capacity on its Gigabit Ethernet ports and the ability to redirect traffic to any of the ports. This redirection feature allows for additional processing of traffic on an external device before being forwarded to the final destination. The switching fabric in the CAG archi- tecture is implemented by the Alteon switch. The CE modules in our prototype are external devices based on 1GHz Pentium III CPU servers running Linux. One of the CE module uses an FPGA-based Compute Resource Module plugin. The FPGA-based CRM uses is a Xilinx Virtex 300E on a daughter card and plugs into the CE module. The CE modules connect to the Alteon switching fabric via Gigabit Ethernet links. We augmented the Alteon switch and the CRM with software modules that we developed, enabling it to behave as an active networking device. The network setup for our experiments is shown in Figure 4. The setup consists of two CAG node prototypes positioned at the two edges of a LAN. The right edge of the network in the illustration is the content provider edge and the left edge is the user edge. The API software we developed on the CRM can configure the Alteon switch to set filters, actions and also supports extrac- tion and insertion of packets to and from the data path. 4.0 CAG Applications In this section we present two practical content networking applications implemented on the CAG proto- type testbed. The first is a streaming media service that can be used for webcasts, large-scale videoconfer- ences, high-quality videoconferences etc. The second is a web service that transforms web content for delivery to end systems. Figure 4: CAG Prototype Testbed CAG Prototype Alteon L7 Switch End User End User End User End User CAG Prototype Alteon L7 Switch Test Network Server Server CE CE CE CE
  • 6. Practical Active Network Services within Content-aware Gateways 6 4.1 Streaming Media Distribution Service Streaming media is becoming the de facto global media broadcasting and distribution standard, incorporat- ing other media, including radio, television, and film [25]. IP multicasting allows multiple users of a net- work to listen to a single live stream, making efficient use of network resources. Multicasting avoids delivering numerous connections by broadcasting one stream to a certain point in the network where other users are requesting the same file. IP multicast would have been an ideal technique to broadcast data stream from a source to multiple destinations if it wasn't for several critical factors. First, the business model does not adequately cover the cost of replication of data at each intermediate router. ISPs costs for peering are roughly $700-$1,000 per Mb/s per month leading to an annual investment of about $1M for peering at 100Mb/s. There is no incentive for Internet Service Providers (ISPs) to deploy the multicast ser- vice model as it will not add to the revenues. Second, multicasting requires support inside the network in terms of elaborate control support from IP routers, membership managements (IGMP), and multicast rout- ing protocols. Third, enterprises do not want to run multicast for fear of degrading the performance of other mission critical applications. Fourth, WAN connections are extremely expensive. Enterprises are not will- ing to pay the additional charges incurred from content streaming. Let us consider a streaming video seminar application where "viewers" attend the e-seminar from multiple sites of an enterprise on the network shown in the Figure 5. The live video information originates from one of the sites and is delivered to several clients at different sites. In such a scenario, the access links that con- nect the edges of the enterprise network sites to the service provider network are typically the bottlenecks and tend to get congested due to the number of viewers and other interfering traffic such as web, email, etc. This is a problem when the number of viewers is large and each viewer establishes a separate connection to the source of the video stream, i.e. when the source has to multicast the video information. Although it is possible to design a custom solution to this problem, it only makes the network more complex as special purpose boxes are introduced to solve specific problems. On the other hand we can assume that the enter- prise has deployed CAG nodes at the edges of its network. As described in this section, the use of the CAG edge nodes will allow for a manageable solution to the problem along with cost savings. We introduce a service on the CAG, the Streaming Media Distribution Service (SMDS), that can achieve the effect of multicasting, but without having to upgrade the networks to support IP multicast or without having the application perform any multicasting across the access link [26]. The CAG nodes at the edge of each of the enterprise sites form a logical overlay network. The SMDS on a network architecture employ- ing CAG nodes can provide high-quality streaming without access-link bottlenecks, and is scalable in terms of serving a large number of clients. We considered other efforts at solving the multicast problem. The CMU effort [18] tries to move the complexity of managing multiple streams to the application at the end system. However, this solution would still suffer from the access link bottlenecks. Other efforts such as Figure 5: Streaming Video in a Distributed Enterprise Network Application clientsApplication Server Enterprise Network Edge (Enterprise IS Dept.) Access Network Edge (Network Service Provider) Application clients Access Link Access Link Optical Core Network CAG CAG CAG
  • 7. Practical Active Network Services within Content-aware Gateways 7 REUNITE [14] and HOP-by-HOP methods [20] require upgrading of the core infrastructure which is beyond the control of the enterprise. The source video application server sends a single stream to the CAG node at the edge of its enterprise net- work. The SMDS on the source CAG edge node replicates and unicasts the source video stream to the des- tination CAG edge device at each of the client sites. Thus, the application does not have to perform any multicasting and the bottleneck problem at the source access link is avoided. A cluster of clients is always associated with a destination edge CAG node. Only one copy of the stream needs to be sent across the overlay network from the source edge to a destination edge. The SMDS on the destination CAG edge node has to simply replicate and unicast the received data stream to the clients in its cluster. The SMDS "relo- cates" the locus of video distribution to the edges of the client sites, thereby eliminating the bottleneck at the destination access links. We developed and tested the SMDS on our CAG prototype testbed shown in Figure 4. The video source server used was the Real Server 8 on a Windows NT based system. The clients were off-the-shelf PC end systems. We deployed the SMDS on only one destination CAG edge node in our experimental enterprise network while the CAG node at the source edge simply acted as an IP router. The Real video system in our setup uses port number 554 for the RTSP protocol. The SMDS software makes use of this port number as well as the IP address of the Real server to detect the streaming media flow. 4.1.1 Operation Details The SMDS service on the destination CAG operates as follows: 1. Once the SMDS is downloaded and enabled on the destination CAG, it sets up two filters on the Alteon switch via API calls. One filter is to trap any packets with the Destination IP address of the Real server on Destination port 554 and redirect the traffic to the SMDS on the CRM. The other filter is to trap all the content packets from the Source IP address of the Real server and Source port 554 and redirect them to the SMDS on the CRM. 2. The SMDS software application then binds itself to the end of each of these tunnels (resulting from each filter) and suspends waiting for the filters to trigger. 3. When the first client attempts to connect to the Real server, the first filter is hit and its request packets arrive at the SMDS. The SMDS registers the client into a local database using API calls. 4. The SMDS software then forwards the client connection requests on to the Real server and awaits the response. 5. When the Real server starts streaming video content back to the client, the second filter on the CAG is triggered and the content packets are redirected to the SMDS. 6. The SMDS software simply forwards the traffic onto the client that originally requested the content. 7. On successive connection requests from other clients for the same content as in step 3, the SMDS inter- cepts the request packets but does not forward them to the Real server. 8. The SMDS completes handshaking with each requesting client (acting as a proxy for the Real server) to complete the connection. 9. The SMDS on the CRM then starts duplicating the video content that is being sent by the Real server (to the first client) and forwards the duplicated traffic to each of the requesting clients. 10.On successful completion of the streaming media content, SMDS closes all the client and server con- nections and waits for a new request. The core of the SMDS software, that generates the duplicate packets, (as in step 9) involves creating a new header with the appropriate destination IP address and port (of the client), filling the packet with payload from the original content packet and computing the new IP checksum before sending the packet to the physical link.
  • 8. Practical Active Network Services within Content-aware Gateways 8 4.1.2 Performance Measurements We conducted a simple experiment to evaluate the performance of the SMDS on our prototype. Measure- ments were taken at the client nodes using tcpdump and tcptrace to obtain the throughput. We used a source file for the video streams encoded at 1.5Mbps. We used four client PCs running RealPlayer soft- ware to view the streaming media. We measured performance in two scenarios: first using regular unicast streams and the second using SMDS. The results of the measurements are shown below in Table 1. The measurements indicate that the SMDS service eliminates the problem of unfair distribution of avail- able bandwidth which is seen when using multiple unicast streams directly from the server. The unfairness is partly due to TCP behavior and partly due to the Real Media server. Also the bottleneck with the unicast scenario is clearly at the access link which was measured at about 4.3 Mbps. As expected, the use of SMDS on the CAG at the destination edge eliminates the bottleneck, by moving the distribution point beyond the access link. 4.2 Dynamic Content Adaptation Service A wide choice of web access devices such as wireless phones, televisions, PDAs and PCs allows almost ubiquitous web connectivity. The wide ranging display capacities of these devices result in inefficient ren- dering of content originally intended for display on a PC monitor (typically a 15"-17" SVGA screen). As the types of access devices in use increases, content providers are faced with the costly proposal of repli- cating content in multiple formats, a scenario that can quickly become a content management nightmare. Another attribute that varies among access technologies is the access bandwidth such as wireless access (from 9.6 kbps to 128 kbps), dialup modem (up to 52 kbps) and broadband access (in the order of Mbps). Large sized content, such as graphics-rich web pages, results in increased download times over slow access links. We present the Dynamic Content Adaptation Service (DCAS) that executes on the CAG edge node and dynamically customizes content for presentation, personalization, or transportation [27]. The Dynamic Content Adaptation Service is deployed on the CAG node at the edge of an internet service provider (ISP) access network or the content provider (enterprise) network. The service performs two functions: compression and content manipulation for presentation. Compression is based on the link speeds between the user and the ISP network. Content manipulation is based on the device display capaci- ties. These pieces of information are made available to the service in the form of user profiles when the user subscribes to this service. This service presents significant commercial potential as it eliminates the need for content replication and simplifies the management of content for the content provider while enhancing the user experience. We developed and tested the DCAS on our CAG prototype testbed shown in Figure 4. Apache web servers on PCs were used for the content provider. The clients were regular PC end systems. We deployed the DCAS on only one destination CAG edge node in our experimental enterprise network while the CAG node at the source edge simply acted as an IP router. For the initial proof of concept, the DCAS service only compresses JPEG graphics images. TABLE 1. Bandwidth measurements using 1.5Mbps encoded video stream Client # Avg. Bandwidth Unicast (Mbps) Avg. Bandwidth SMDS (Mbps) 1 1.5 1.5 2 1.3 1.5 3 1.0 1.5 4 0.5 1.5
  • 9. Practical Active Network Services within Content-aware Gateways 9 4.2.1 Operation Details The DCAS service on the destination CAG operates as follows: 1. Once the DCAS is downloaded to the CRM on the CAG and enabled, it sets up a filter on the Alteon switch via API calls, which we will call the request filter. The request filter traps request (HTTP GET) packets originating from any user to the content provider based on the Destination IP address of the web server and Destination port 80 (HTTP). The action when the request filter is triggered is set to redirect the traffic to the DCAS on the CRM via a tunnel. The IP address of the content provider is known ahead of time based on contractual agreements between the ISP and the content provider. 2. The DCAS software application then binds its receiver function to this tunnel and suspends, awaiting the filter to be triggered. 3. When a user attempts to connect to the content server, the request filter is triggered and the request packets arrive at the DCAS. The DCAS can authenticate the user and check subscription information and preferences as well. It registers the user into a local database. If the user has subscribed to the ser- vice, the DCAS sets a user-specific content filter on the Alteon switch. The content filter traps any con- tent packets originating from the content server to that user based on Source IP address, Destination IP address and port number. The action for this content filter is also set to redirect the content packets to the DCAS on the CRM. 4. The DCAS software then forwards the client connection requests on to the web server and awaits the response. 5. When the server starts sending the web content back to the user, the content filter on the CAG is trig- gered and the content packets are redirected to the DCAS. 6. The DCAS software then looks for JPEG images embedded within the content payload and compresses the images if required based on the client profile (access bandwidth and access device type). The com- pression factor (high, medium, low) depends on a selection made by the user during subscription. 7. The DCAS software then forwards the content onto the user that originally requested the content. 8. The images downloaded to the user device are displayed on the web browser. For the purposes of the experiment, we limited the functionality of the DCAS to JPEG transformation. The DCAS implements the JPEG standard which uses the Discrete Cosine Transform as the heart of its com- pression algorithm. The DCT function involves performing matrix multiplications and is well understood to be a compute intensive task for CPUs. In order to enhance performance of the DCAS, we implemented the DCT function in hardware on the FPGA-assisted CE module. 4.2.2 Performance Measurements We conducted experiments to evaluate the performance of DCAS on CAG by varying the size of the JPEG images, compression factor and processing granularity. The content used for testing involved a simple web page with one or two JPEG images. The DCAS service was deployed on the CAG edge node at the desti- nation i.e. close to the user. To eliminate any variations resulting from the Internet, we assumed that the content was available at a cache at close proximity to the CAG node. We used a 100Mbps connection between the cache node and the CAG node. Table 2 shows the download times for a web page on various low speed links that simulate wireless, dialup and ISDN rate data access. The 33Kbyte sized web page used for the test included 2 JPEG images of 16Kbytes each. Using a high compression factor we achieved a 4:1 compression ratio. The impact on download times are as expected. The presentation aspect of the DCAS service is a qualitative measurement that depends on the expectations and preferences of the user and was therefore left out of the experiment. An important metric for a Content-aware Active Gateway is the number of sessions that can be processed per second. Unlike routers, where wire-speed performance of the well-defined routing/forwarding function is a key requirement, the performance of a CAG depends on the type of services supported by the CAG at any given time. In many cases, wire speed performance for these services is impossible to achieve using current technologies. For the DCAS service, a session refers to the transfer of an average sized web page.
  • 10. Practical Active Network Services within Content-aware Gateways 10 Due to the wide variances in web content, it is important to define a common metric that can be used to compare performance across applications as well as platforms. 5.0 Discussion This section presents some of the lessons we learned through our research and development efforts described in this paper. The SMDS and DCAS content networking applications have a common underlying flow. This high-level flow, shown in Figure 6, can be used as a template for a wide range of content net- working applications. The most important block in the flow, the Content Processing block, forms the heart of the application. In the SMDS, this block performs streaming content replication and in the DCAS, it per- forms the image compression. Blocks performing the Authentication, Authorization and Accounting are necessary in a real world commercial service. We found that hardware processing is of utmost importance for providing real world performance to con- tent networking applications on a CAG node. This became apparent during our SMDS experiment where we found that the SMDS on the CAG was unable to support multiple Real video clients when the encoding rate of the video stream was increased to 5 Mbps. Investigation using the profiling tool, gprof, revealed TABLE 2. Effect of DCAS on 33Kbyte web page download times Link Speeds (Kbps) Download Time (sec) Download Time with DCAS (sec) 4.8 60 15 9.6 30 8 28.8 10 3 52 5 2 128 2 1 Figure 6: Content Networking Application High Level flow Response Processing, Authentication, Authorization, Accounting Response_Filter Hit START Insert_Packet Forward to Destination WAIT Set_Request_Filter Initialization Bind_Function_to_Filter OK to Process ? Yes Request_Filter Hit Request Processing Authentication Authorization, Accounting Insert_Packet Forward to DestinationNo Set_Response_Filter Bind_Function_to_Filter Content Processing WAIT WAIT START START
  • 11. Practical Active Network Services within Content-aware Gateways 11 that the duplication and checksumming functions within SMDS took about 40% of the CPU time and the Pentium based CE module could not handle the increased processing requirements of multiple clients viewing high bit-rate video content. We are working on using custom hardware to perform these functions on the FPGA-based CE module and will present these results in future publications. It is important to select the right level of granularity for content processing applications as it can have an impact on latency, memory requirements and performance. For instance, in the DCAS service which com- presses images on-the-fly, the granularity refers to the number of image blocks to be processed before switching to image blocks of another image or user. Given that the service can encounter simultaneous multiple images from a single page or from multiple users, the granularity size decides the amount of memory for the queues required to store the image blocks awaiting processing. In content networking applications this requirement can increase drastically with the number of users. Hardware assisted content processing can alleviate memory requirements by increasing the rate at which the image blocks are pro- cessed. 6.0 Related Works A significant amount of research has been published in the area of intelligent network services through programmable networking, ranging from networking paradigms and re-programmable hardware to appli- cation environments. [1,3,6,15,21,22] The Active Networks approach [2,4,5,7,9-11] is a major effort to incorporate programmability into the network infrastructure. To date, these developments have been mainly realized in software-based hosts (e.g., Linux-based systems) that offer the required programmabil- ity but lack the performance required in real networks. The Washington University ANN (Active Network Node) [9,19] implementation introduces an FPGA-based CPU module that accommodates the active code into a high performance routing switch. Programmable hardware for routers is explored in [3,4,6,13]. Other works such as Darwin [8], Phoenix [17] and Openet [1,6,9,13,15,19] have investigated mechanisms for delivering programmability to end-users. The Openet effort [15] describes a use of a real-world routing switch to achieve programmability at a high level of forwarding performance. However, the implementa- tion does not provide for scalability of computation performance as it uses a single control plane CPU to perform the computations. Unlike existing research in Active Networks which are primarily focused on active routers, we take a practical approach at incorporating active networks research concepts into net- work gateways. Our efforts towards the CAG architecture, described in this paper, are centered around the requirements of commerical networking devices and focus on effective transfer of active networks con- cepts to real world networking devices. 7.0 Conclusion We have presented a new application for active networking concepts in the form of a Content-aware Active Gateway. The CAG at the network edge is an important concept in the field of active networks as it repre- sents a significant step towards realization of active networks research concepts in real-world networks. We justify the introduction of the CAG at network edges by demonstrating two practical services with near-term potential, SMDS and DCAS. The increase in the complexity of the Internet architecture at the network edges, due to the number of commercial content networking applications that have been intro- duced over the last few years, also justifies the need for the CAG. The software architecture that we have developed uses key Active Networks concepts to enable service creation and dynamic service deployment on the CAG. We have implemented a CAG protoype using real-world high-performance networking devices augmented with software that we developed. Our efforts indicate that our CAG architecture can support the requirements of a wide range of content networking applications. Performance requirements of content networking applications are satisfied through the use of FPGA based hardware acceleration within the CAG processing modules. Further research and development efforts are planned to investigate perfor- mance requirements for CAG in real networks supporting multiple services and processing thousands of flows simultaneously.
  • 12. Practical Active Network Services within Content-aware Gateways 12 8.0 References 1. K. Yamada et.al., "A Novel Approach to Realizing Flexible Transport Systems using Reconfigurable Hardware", Proceedings of the IEEE Symposium on FPGAs for Custom Computing Machines, April 1995, pp.67-71. 2. D. Tennenhouse, D. Wetherall, "Toward an active network architecture," Multimedia Computing and Network- ing, Jan 1996. 3. Y. Yemini, S. Da Silva. "Towards Programmable Networks", IFIP/IEEE Intl. Workshop on Distributed Systems: Operations and Management, L'Aquila, Italy, October 1996. 4. D. L. Tennenhouse, et al, "A Survey of Active Network Research", IEEE Communications Magazine, Vol. 35, No. 1, January 1997 5. S. Bhattacharjee et al., "An Architecture for Active Networking," Proc. INFOCOM'97, Apr. 1997. 6. I. Hadzic, J. Smith, "On-the-fly Programmable Hardware for Networks", Proceedings of GLOBECOM 1998. 7. D. J. Wetherall, J. Guttag, D. L. Tennenhouse, "ANTS: A Toolkit for Building and Dynamically Deploying Net- work Protocols", IEEE OPENARCH'98, San Francisco, CA, April 1998. 8. P. Chandra et al, "Darwin: Resource Management for Value-Added Customizable Network Service", Proc. 6th IEEE ICNP, Austin, Oct. 1998 9. D. Decasper, et al, "A Scalable High Performance Active Networks Node", IEEE Network Magazine. Vol 37, Jan/Feb 1999, pp 8-19. 10. B. Schwartz, A. Jackson, T. Strayer, W. Zhou, R. Rockwell, C. Partridge, "Smart Packets for Active Networks", IEEE OpenArch 99, New York, March 1999 11. J. M. Smith, K. L. Calvert, S. L. Murphy, H. K. Orman, L. L. Peterson, "Activating networks: A progress report," IEEE Computer, Vol. 32, pp. 32-41, Apr. 1999. 12. T. Lavian, R. Jaeger, J. Hollingsworth, "Open Programmable Architecture for Java-enable Network Devices", Stanford Hot Interconnects, August 1999. 13. G. Hjalmtysson, S. Bhattacharjee. "Control-on-Demand: An Efficient Approach to Router Programmability," IEEE Journal on Selected Areas in Communications, Vol. 17, No. 9, Sept. 1999, pp. 1549-1562. 14. I. Stoica, T.S.E.Ng, H.Zhang, "REUNITE: A recursive unicast approach to multicast", IEEE INFOCOM'2000 Mar.2000. 15. T. Lavian, P. Wang, "Active Networking On A Programmable Networking Platform", IEEE OpenArch'01, Anchorage, Alaska, April 2001 16. T. Lavian, P. Wang, F. Travostino, S. Subramanian, D. Hoang, V. Sethaput, D. Culler, "Enabling Active Flow Manipulation in Silicon-based Network Forwarding Engine." IEEE Journal of Communications and Networks, March 2001, pp.78-87. 17. D. Putzolu, S. Bakshi, S. Yadav, R. Yavatkar, "The Phoenix Framework: A Practical Architecture for Program- mable Networks", IEEE Communications Magazine, Vol 38, No 1, March 2001. 18. Y.H. Chu, S.G. Rao, S. Seshan, H. Zhang, "Enabling Conference Applications on the Internet using an Overlay Multicast Architecture", SIGCOMM'01, San Diego, 2001. 19. T. Wolf, J. S. Turner, "Design Issues for High-Performance Active Routers", IEEE Journal on Selected Areas in Communications, Vol. 19, No. 3, March 2001, pp. 404-409. 20. L. Henrique, M.K. Costa, S. Fdida, Otto Carlos M.B. Duarte, "Hop By Hop Multicast Routing Protocol", SIG- COMM'01, August 27-31, 2001, San Diego, California, USA. 21. T. Lavian, P. Wang, F. Travostino, S. Subramanian, D. Hoang, V. Sethaput, "Intelligent network services through active flow manipulation", Intelligent Network Workshop, 2001 IEEE , 2001, pp. 73 -82. 22. D.E. Taylor, J. S. Turner, J. W. Lockwood, "Dynamic Hardware Plugins (DHP): Exploiting Reconfigurable Hardware for High-Performance Programmable Routers", IEEE Openarch 2001, pp. 25-34. 23. B. D. Davidson, "A Web caching primer", IEEE Internet Computing,, Vol. 5, Issue 4, July-Aug. 2001, pp. 38-45. 24. J. S. Chase, "Server switching: yesterday and tomorrow", WIAPP 2001, Proceedings of the second IEEE work- shop on Internet Applications 2001, pp. 114-123. 25. J. Lu, "Reactive and proactive approaches to media streaming: from scalable coding to content delivery net- works", Proceedings of International Conference on Information Technology: Coding and Computing, 2001. pp. 5-9.
  • 13. Practical Active Network Services within Content-aware Gateways 13 26. T. Lavian, P. Wang, R. Durairaj, D. Hoang, "Application Layer Multi-Unicast from Edge Device," Submitted for publication. 27. S. Subramanian, G. Boissonnard, C. Gloster, J. Rasimas, "High-Performance Configurable Content Networking", Submitted for publication. 28. Nortel Networks Inc., www.nortelnetworks.com 29. Volera Inc., www.volera.com 30. Akamai Inc., www.akamai.com