We are facing a trend towards ubiquitous connectivity where users demand access at anytime, anywhere. This has lead to the deployment of public network ports and wireless networks. Current solutions to network access control are in exible and only provide all-or-nothing access. It is also increasing important to protect Intranet hosts from other mobile and static hosts on the same
Intranet, in order to contain damages in the case that a host gets compromised. We present an architecture that addresses these issues by using a programmable router to provide dynamic
ne-grained network access control. The Javaenabled router dynamically generates and enforces
access control rules using policies and user proles as input, reducing administrative overhead. Our modular design integrates well with existing authentication and directory servers, further reducing admininstrative costs. Our prototype is implemented using Nortel's Accelar router and moves users to VLANs with the appropriate access privilege.
Open Programmable Architecture for Java-enabled Network DevicesTal Lavian Ph.D.
Current network devices enable connectivity between end systems given a set of protocol software bundled with vendor hardware. It is impossible for customers to add software functionality running locally on top of network devices to augment vendor software. Our vision is to open network devices so that customized software can be downloaded, allowing for more flexibility and with a focus on industry and customer specific solutions. This brings considerable value to the customer. We have chosen to use Java because we can reuse its security mechanism and
dynamically download software. We can isolate the Java VM and downloaded Java programs from the core router functionality. We implemented Java Virtual Machines (JVMs) on a family of network devices,
implemented an Open Services framework, and developed an SNMP MIB API and a Network API upon which we can demonstate the value of openness and programmability of network devices.
Implementing vpn using direct access technologyferasfarag
This document provides an overview of traditional VPN technology and its problems, and proposes Direct Access technology as a better solution for remote access. It defines VPN and how it uses encryption over public networks, but notes issues like optional connections, firewall compatibility, and proprietary software requirements. Direct Access provides always-on, seamless access without user interaction by using Windows technologies like Active Directory and IPsec. It establishes more reliable connections than VPN, enables bidirectional management, and has fewer authentication and licensing requirements. The document concludes Direct Access may be a superior alternative to traditional VPNs for remote access.
Carrier grade wi fi integration architectureSatish Chavan
The document discusses Wi-Fi technology, including its use of radio waves to connect devices to wireless access points and the internet. It describes how users connect to open Wi-Fi networks in public places like airports and cafes. It also discusses security measures for Wi-Fi like WEP, WPA, and WPA2 encryption, and notes that while Wi-Fi is convenient, it is more vulnerable to attacks than wired connections.
Security Advantages of Software-Defined NetworkingPriyanka Aash
Current practices using wide-area routing over Internet infrastructure decentralize the control of how information is transferred. Software-Defined Networking (SDN) centralizes network control functions, offering more holistic network security management and allowing for dynamic divisioning, multivendor end-to-end security and reduced dependence on the traditional perimeter approach.
(Source: RSA USA 2016-San Francisco)
Security of software defined networking (sdn) and cognitive radio network (crn)Ameer Sameer
Security of Software Defined Networking (SDN)
Overview
Definition Software Defined Networking (SDN)
SDN security & Security Challenges
SDN Attack Surface & Attacks Examples
SDN Threat Model
Open Research issues SDN
Future Research Directions
Simulator for Software Defined Networking
Security of Cognitive Radio Network (CRN)
Overview
Definition Cognitive Network
Security of Cognitive Radios & Threats
Security issues in cognitive radio
Attacks and the proposed defense mechanisms
Open Research issues in Cognitive Radio
Evaluation Methodologies for Cognitive Networking
Future Research Directions
Simulator for Cognitive Radio
This document summarizes the key aspects of software defined networking (SDN) and discusses associated security issues. SDN separates the control plane and data plane to allow for centralized network control and programmability. While SDN enables more effective security through visibility and automation, it also introduces new vulnerabilities related to the centralized control plane, virtualized environment, and application access. The document outlines security challenges in SDN infrastructure and potential attack vectors, as well as recommendations for protecting the data, control, and application layers through measures like role-based access policies and in-line security functions.
This document discusses using SDN and NFV technologies to achieve visibility and security in IoT networks. It describes typical IoT network topologies using IP connectivity. It then discusses how SDN can provide centralized control of network functions through a controller. NFV allows network functions to run as virtual machines on common hardware. The document proposes using SDN to implement security applications like traffic filtering and monitoring. It suggests using NFV to run security services like WAF and APIs as docker containers on IoT edge gateways. Together SDN and NFV provide a way to flexibly add and manage new security services in IoT networks.
The document discusses the need for middleware in wireless sensor networks. It describes some of the challenges in designing middleware for sensor networks, including limited resources, scalability, and heterogeneity. It then summarizes several approaches to sensor network middleware, including virtual machine approaches, modular programming approaches, database approaches, and message-oriented middleware.
SDN: A New Approach to Networking TechnologyIRJET Journal
This document summarizes SDN (Software Defined Networking) and its relationship to network virtualization and NFV (Network Function Virtualization). It discusses how SDN separates the control plane from the data plane to make networks programmable. It also describes how network virtualization allows multiple virtual networks to run simultaneously on top of a physical network. NFV aims to virtualize network functions like firewalls and load balancers that were traditionally hardware-based. The document argues that SDN, network virtualization, and NFV work together to provide flexible, easily reconfigurable networks and reduce costs. When combined, they allow networks to be centrally programmed and abstracted from physical hardware.
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...Sagar Rai
Software, Software Defined Network, Network Function Virtualization, SDN, NFV, Internet of things, Basics of Internet of things, Network Basics, Virtualization, Limitation of Conventional Network, Open flow, Basics of conventional network,
Middleware is software that lies between an operating system and applications. It hides the complexity of operating systems and networks from application developers. Middleware systems provide services like remote communication and distributed computing. They allow applications to communicate across networks in a heterogeneous environment. Middleware reduces the burden on developers to build distributed applications directly on top of network protocols and operating systems.
Microsoft Network Monitor is a tool for viewing network packet contents that are being sent and received over a live network or from a captured file. It provides filtering options and can capture traffic to/from its own interface or, in an enhanced version, all network traffic. OpenNMS is an open source network management system that can monitor tens of thousands of devices from a single server or unlimited devices using a cluster. It includes discovery, event management, service assurance, and performance measurement. Capsa is a free network management solution that integrates traffic capture, analysis, fault diagnosis, and performance evaluation to help troubleshoot, secure, and optimize networks.
This document discusses SDN (Software Defined Networking) concepts including controllers, applications, and components. It provides brief descriptions of popular open source SDN controllers like NOX, POX, Ryu, Floodlight, Opendaylight, and ONOS. It also summarizes common SDN applications like routing protocols and security applications. Key SDN characteristics and benefits are outlined as well.
Air defense wireless_vulnerability_assessement_module_spec_sheetAdvantec Distribution
The document describes Motorola's Wireless Vulnerability Assessment module. It allows remote testing of wireless network security by automatically logging into access points and simulating a hacker to identify vulnerabilities. This eliminates expensive on-site security scans. The module integrates with Motorola's AirDefense Services Platform to provide centralized and comprehensive wireless vulnerability testing across entire networks. It helps validate firewall policies and identify potential entry points to protect sensitive wired systems and data.
This document provides an overview of software-defined networking (SDN) and the HPE VAN SDN Controller. It defines SDN and describes its key concepts including the separation of the control plane and data plane. The benefits of SDN like centralization, dynamism, and optimization are outlined. The architecture of the HPE SDN Controller is presented along with the core applications it provides for network discovery, path selection, topology management and more. In conclusion, SDN is positioned to transform static networks into scalable, programmable platforms.
This document discusses next-generation firewall security updates for 2015. It covers using dynamic user and server lists instead of static IP addresses in firewall policies, the adoption of new IPSec protocols like Suite B, using commercial firewalls approved for classified networks, and blocking threats in real-time using reputation-based intelligence from sources like DISA. Modern firewalls examine network traffic more thoroughly, integrate intrusion detection and prevention, and support programming for advanced customization and integration.
Software Defined Networking (SDN) Technology BriefZivaro Inc
An overview of Software-Defined Networking (SDN) and the key benefits of moving to a virtualized network, including:
- Improved time to market through automation
- Optimal trafficking with a global view of the network
- Quicker enablement of new services
- Reduced operating costs
- Improved management and visibility
- Simplified operation of network devices
From "Introduction to Software Defined Networking" webinar presented by GTRI CTO Scott Hogg on March 10, 2016. Webinar recording: https://youtu.be/gRXnctYDBjE
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...Jiunn-Jer Sun
This document discusses defending a DHCP infrastructure against cyber attacks. It describes how DHCP works to assign IP addresses via a client-server model. It then outlines common attacks like DHCP spoofing and starvation. It recommends deploying DHCP Snooping on switches to validate DHCP messages and filter invalid ones to prevent attacks and ensure correct network configuration.
This document discusses software defined networks (SDN). SDN separates the network control plane from the data plane, allowing a control plane to control multiple devices. The SDN architecture has three layers - the infrastructure layer consists of switches and routers that collect network status and process packets, the control layer bridges the application and infrastructure layers using a high-level language and network status information, and the application layer offers services through the control layer like load balancing and security. OpenFlow is a protocol that exchanges messages between controllers and switches to implement SDN functionality. SDN provides benefits like improved performance, flexibility, and reduced costs compared to traditional networks.
1) The document provides a summary of a lecture on Software Defined Networking (SDN) and its history and components.
2) SDN is defined as separating the network control plane from the data plane, allowing network administrators to manage network services through abstraction.
3) The lecture traces the history of SDN from 2004 research through the founding of the Open Networking Foundation in 2011 and increasing commercial adoption.
Software defined networking(sdn) vahid sadriVahid Sadri
This document provides an overview of software-defined networking (SDN) and network functions virtualization (NFV). It discusses the motivation for SDN and NFV, including making networks more flexible and reducing costs. Key benefits mentioned are reduced equipment costs, increased speed of service deployment, and more flexible allocation of network resources. OpenFlow is introduced as an SDN protocol. The relationship between SDN and NFV is explored, noting they are complementary approaches. Examples of potential applications of NFV are listed.
The document provides an overview of software-defined networking (SDN) fundamentals, including:
- In traditional networks, the control plane and data plane are logically coupled within each network device, whereas SDN separates these planes and centralizes the control plane in an SDN controller.
- The SDN controller holds the entire network description as a graph and can perform optimization calculations. It programs flow entries into forwarding devices using the OpenFlow protocol.
- OpenFlow defines a standard interface that gives access to the forwarding plane of network switches or routers. It separates the data and control planes and allows the control logic to be implemented separately in the SDN controller.
The document discusses Juniper network solutions for financial organizations. It outlines key network architecture requirements for financial services including segmentation, security, performance, and high availability. It then describes Juniper products that can meet these requirements, including routers, firewalls, VPN appliances, and application acceleration solutions.
Optimal software-defined network topology for distributed denial of service a...journalBEEI
Distributed denial of service (DDoS) attacks are a major threat to all internet services. The main goal is to disrupt normal traffic and overwhelms the target. Software-defined networking (SDN) is a new type of network architecture where control and data plane are separated. A successful attack may block the SDN controller which may stop processing the new request and will lead to a total disruption of the whole network. The main goal of this paper is to find the optimal network topology and size which can handle Distributed denial of service attack without management channel bandwidth exhaustion or run out of SDN controller CPU and memory. Through simulations, it is shown that mesh topologies with more connections between switches are more resistant to DDoS attacks than liner type network topologies.
Introduction to SDN: Software Defined NetworkingAnkita Mahajan
SDN is the next big thing in networking. It focuses on separating the intelligence from the hardware. OpenFlow is one of the ways (currently the open standard followed by all Datacenters) to implement SDN.
State of the network
Plenty of bandwidth
Optical core
Increasing demand for services
Gateways
Network Service nodes
Content Switches
Network Caches
Evolving network
Enabling Active Networks Services on A Gigabit Routing SwitchTal Lavian Ph.D.
Active Networks:
A “programmable” user-networking approach
injects network services to the network “on-the-fly”
supports per-flow service customization
enables ISPs and individuals to add their services
To support AN, hardware should provide
Fast processing ability to compete AN computation
the programmability with open networking APIs
SDN: A New Approach to Networking TechnologyIRJET Journal
This document summarizes SDN (Software Defined Networking) and its relationship to network virtualization and NFV (Network Function Virtualization). It discusses how SDN separates the control plane from the data plane to make networks programmable. It also describes how network virtualization allows multiple virtual networks to run simultaneously on top of a physical network. NFV aims to virtualize network functions like firewalls and load balancers that were traditionally hardware-based. The document argues that SDN, network virtualization, and NFV work together to provide flexible, easily reconfigurable networks and reduce costs. When combined, they allow networks to be centrally programmed and abstracted from physical hardware.
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...Sagar Rai
Software, Software Defined Network, Network Function Virtualization, SDN, NFV, Internet of things, Basics of Internet of things, Network Basics, Virtualization, Limitation of Conventional Network, Open flow, Basics of conventional network,
Middleware is software that lies between an operating system and applications. It hides the complexity of operating systems and networks from application developers. Middleware systems provide services like remote communication and distributed computing. They allow applications to communicate across networks in a heterogeneous environment. Middleware reduces the burden on developers to build distributed applications directly on top of network protocols and operating systems.
Microsoft Network Monitor is a tool for viewing network packet contents that are being sent and received over a live network or from a captured file. It provides filtering options and can capture traffic to/from its own interface or, in an enhanced version, all network traffic. OpenNMS is an open source network management system that can monitor tens of thousands of devices from a single server or unlimited devices using a cluster. It includes discovery, event management, service assurance, and performance measurement. Capsa is a free network management solution that integrates traffic capture, analysis, fault diagnosis, and performance evaluation to help troubleshoot, secure, and optimize networks.
This document discusses SDN (Software Defined Networking) concepts including controllers, applications, and components. It provides brief descriptions of popular open source SDN controllers like NOX, POX, Ryu, Floodlight, Opendaylight, and ONOS. It also summarizes common SDN applications like routing protocols and security applications. Key SDN characteristics and benefits are outlined as well.
Air defense wireless_vulnerability_assessement_module_spec_sheetAdvantec Distribution
The document describes Motorola's Wireless Vulnerability Assessment module. It allows remote testing of wireless network security by automatically logging into access points and simulating a hacker to identify vulnerabilities. This eliminates expensive on-site security scans. The module integrates with Motorola's AirDefense Services Platform to provide centralized and comprehensive wireless vulnerability testing across entire networks. It helps validate firewall policies and identify potential entry points to protect sensitive wired systems and data.
This document provides an overview of software-defined networking (SDN) and the HPE VAN SDN Controller. It defines SDN and describes its key concepts including the separation of the control plane and data plane. The benefits of SDN like centralization, dynamism, and optimization are outlined. The architecture of the HPE SDN Controller is presented along with the core applications it provides for network discovery, path selection, topology management and more. In conclusion, SDN is positioned to transform static networks into scalable, programmable platforms.
This document discusses next-generation firewall security updates for 2015. It covers using dynamic user and server lists instead of static IP addresses in firewall policies, the adoption of new IPSec protocols like Suite B, using commercial firewalls approved for classified networks, and blocking threats in real-time using reputation-based intelligence from sources like DISA. Modern firewalls examine network traffic more thoroughly, integrate intrusion detection and prevention, and support programming for advanced customization and integration.
Software Defined Networking (SDN) Technology BriefZivaro Inc
An overview of Software-Defined Networking (SDN) and the key benefits of moving to a virtualized network, including:
- Improved time to market through automation
- Optimal trafficking with a global view of the network
- Quicker enablement of new services
- Reduced operating costs
- Improved management and visibility
- Simplified operation of network devices
From "Introduction to Software Defined Networking" webinar presented by GTRI CTO Scott Hogg on March 10, 2016. Webinar recording: https://youtu.be/gRXnctYDBjE
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...Jiunn-Jer Sun
This document discusses defending a DHCP infrastructure against cyber attacks. It describes how DHCP works to assign IP addresses via a client-server model. It then outlines common attacks like DHCP spoofing and starvation. It recommends deploying DHCP Snooping on switches to validate DHCP messages and filter invalid ones to prevent attacks and ensure correct network configuration.
This document discusses software defined networks (SDN). SDN separates the network control plane from the data plane, allowing a control plane to control multiple devices. The SDN architecture has three layers - the infrastructure layer consists of switches and routers that collect network status and process packets, the control layer bridges the application and infrastructure layers using a high-level language and network status information, and the application layer offers services through the control layer like load balancing and security. OpenFlow is a protocol that exchanges messages between controllers and switches to implement SDN functionality. SDN provides benefits like improved performance, flexibility, and reduced costs compared to traditional networks.
1) The document provides a summary of a lecture on Software Defined Networking (SDN) and its history and components.
2) SDN is defined as separating the network control plane from the data plane, allowing network administrators to manage network services through abstraction.
3) The lecture traces the history of SDN from 2004 research through the founding of the Open Networking Foundation in 2011 and increasing commercial adoption.
Software defined networking(sdn) vahid sadriVahid Sadri
This document provides an overview of software-defined networking (SDN) and network functions virtualization (NFV). It discusses the motivation for SDN and NFV, including making networks more flexible and reducing costs. Key benefits mentioned are reduced equipment costs, increased speed of service deployment, and more flexible allocation of network resources. OpenFlow is introduced as an SDN protocol. The relationship between SDN and NFV is explored, noting they are complementary approaches. Examples of potential applications of NFV are listed.
The document provides an overview of software-defined networking (SDN) fundamentals, including:
- In traditional networks, the control plane and data plane are logically coupled within each network device, whereas SDN separates these planes and centralizes the control plane in an SDN controller.
- The SDN controller holds the entire network description as a graph and can perform optimization calculations. It programs flow entries into forwarding devices using the OpenFlow protocol.
- OpenFlow defines a standard interface that gives access to the forwarding plane of network switches or routers. It separates the data and control planes and allows the control logic to be implemented separately in the SDN controller.
The document discusses Juniper network solutions for financial organizations. It outlines key network architecture requirements for financial services including segmentation, security, performance, and high availability. It then describes Juniper products that can meet these requirements, including routers, firewalls, VPN appliances, and application acceleration solutions.
Optimal software-defined network topology for distributed denial of service a...journalBEEI
Distributed denial of service (DDoS) attacks are a major threat to all internet services. The main goal is to disrupt normal traffic and overwhelms the target. Software-defined networking (SDN) is a new type of network architecture where control and data plane are separated. A successful attack may block the SDN controller which may stop processing the new request and will lead to a total disruption of the whole network. The main goal of this paper is to find the optimal network topology and size which can handle Distributed denial of service attack without management channel bandwidth exhaustion or run out of SDN controller CPU and memory. Through simulations, it is shown that mesh topologies with more connections between switches are more resistant to DDoS attacks than liner type network topologies.
Introduction to SDN: Software Defined NetworkingAnkita Mahajan
SDN is the next big thing in networking. It focuses on separating the intelligence from the hardware. OpenFlow is one of the ways (currently the open standard followed by all Datacenters) to implement SDN.
State of the network
Plenty of bandwidth
Optical core
Increasing demand for services
Gateways
Network Service nodes
Content Switches
Network Caches
Evolving network
Enabling Active Networks Services on A Gigabit Routing SwitchTal Lavian Ph.D.
Active Networks:
A “programmable” user-networking approach
injects network services to the network “on-the-fly”
supports per-flow service customization
enables ISPs and individuals to add their services
To support AN, hardware should provide
Fast processing ability to compete AN computation
the programmability with open networking APIs
Network services are services that specialize in the handling of network-related or network-resident resources. Examples of network services are data transport service, network advance reservation service, network Quality of Service (QoS) service, network information service, network monitoring service, and AAA1 service.
This informational draft describes how several network services combine and yield a rich mediation function—a resource manager—between grid applications and legacy networks. Complements of these services, the network resource is seen joining CPU and storage as a first-class, grid-managed resource (and handled, as such, by a community scheduler, or other OGSA services).
Dynamic classification in silicon-based forwarding engine environmentsTal Lavian Ph.D.
Current network devices enable connectivity between end systems with support for routing with a defined set of protocol software bundled with the hardware. These devices do not support user customization or the introduction of new software applications. Programmable network devices allow for the dynamic downloading of customized programs into network devices allowing for the introduction of new protocols and network services. The Oplet Runtime Environment (ORE) is a programmable network architecture built on a Gigabit Ethernet L3 Routing Switch to support downloadable services. Complementing the ORE, we introduce the JFWD API, a uniform, platform-independent portal through which application programmers control the forwarding engines of heterogeneous network nodes (e.g., switches and routers). Using the JFWD API, an ORE service has been implemented to classify and dynamically adjust packet handling on silicon-based network devices.
Edge Device Multi-unicasting for Video StreamingTal Lavian Ph.D.
Multicast data stream from a server to multiple clients at the application level.
Overlay network structure must be constructed at the application layer to connect participating end systems
Mechanisms for adapting the overlay structure are necessary to provide and maintain adequate level of QoS of the application
Yoid – generic structure for overaly networks for content distribution
Overcast – single-source multicast
End System Multicast – small-scale multicast for teleconference
ALMI – an ALM infrastructure for multi-sender multicast that scales to a large number of groups with small number of members
Edge devices form overlay structure
Edge devices can replicate and multi-unicast to multiple clients
Overcome bottleneck problem over access link
Impact of Grid Computing on Network Operators and HW VendorsTal Lavian Ph.D.
The “Network” is a Prime Resource for Large- Scale Distributed System.
Integrated SW System Provide the “Glue”
Dynamic optical network as a fundamental Grid service in data-intensive Grid application, to be scheduled, to be managed and coordinated to support collaborative operations
Technology & Society – More Questions Than AnswersTal Lavian Ph.D.
Specific current technologies and their impact on society:
Big-Bandwidth Pipes:
Video conferencing
Virtual Presence (Holograms)
Last Mile - Optical Network availability
Big Disk availability
Video files, storage capacity
Huge Computation Power
Silicon and Consumer Electronics
New applications
An extensible, programmable, commercial-grade platform for internet service a...Tal Lavian Ph.D.
With their increasingly sophisticated applications, users promote the notion that there is more to a network (be it an intranet, or the Internet) than mere L1-3 connectivity. In what shapes a next generation service contract between users and the network, users want the network to offer services that are as ubiquitous and dependable as dial tones. Typical services include application-aware firewalls, directories, nomadic support, virtualization, load balancing, alternate site failover, etc. To fulfill this vision, a service architecture is needed. That is, an architecture wherein end-to-end services compose, on-demand, across network domains, technologies, and administration boundaries. Such an architecture requires programmable mechanisms and programmable network devices for service enabling, service negotiation, and service management. The bedrock foundation of the architecture, and also the key focus of the paper, is an open-source programmable service platform that is explicitly designed to best exploit commercial-grade network devices. The platform predicates a full separation of concerns, in that control-intensive operations are executed in software, whereas, data-intensive operations are delegated to hardware. This way, the platform is capable of performing wire-speed content filtering, and activating network services according to the state of data and control flows. The paper describes the platform and some distinguishing services realized on the platform.
Enabling Active Flow Manipulation In Silicon-based Network Forwarding EnginesTal Lavian Ph.D.
A significant challenge in today’s Internet is the ability to efficiently incorporate customizable network intelligence in commercial high performance network devices.
Framework for introducing services
API for programming network devices
Intelligent Network Services through Active Flow ManipulationTal Lavian Ph.D.
Active Flow Manipulation Abstractions:
Aggregate data into traffic flows
Flows whose characteristics can be identified in real-time
E.g., “all UDP packets to a particular service”, “all TCP packets from a particular machine”.
Actions to be performed in the traffic flows
Actions that can be performed in real-time
E.g., “Change the priority of all traffic destined to a particular service on a particular machine”, “Stop all traffic out of a particular link of a router”.
Impact on Society – the Light at the end of the TunnelTal Lavian Ph.D.
The document discusses emerging technologies and their potential impacts. It covers topics like abundant bandwidth enabled by optical networking, large disk storage capacities, and increased computing power. The author notes these technological advances will likely reshape distributed systems and how services are deployed. However, there are still many open questions around how these technologies will ultimately change our lives and applications.
Open programmable architecture for java enabled network devicesTal Lavian Ph.D.
Supports non-vendor applications
End-user custom application development
Tight interaction between business applications and network devices
Domain experts who understand business goals
Innovative approaches
“Features on Demand”
download software services
dynamically add new capabilities
Portable across a range of devices
Extensible
Simple and convenient for client use
Consistent with SNMP model
Hide unnecessary SNMP details
Permit optimized access
Re-use MIB documentation
Services and applications’ infrastructure for agile optical networksTal Lavian Ph.D.
Huge advancements in optical devices, components and networking.
The underline of the Internet is optical – How can we take advantage of this?
How can the applications take advantage of this?
Agile Optical Network is starting to appear. What services and interfaces we’ll need between the optical control and the applications?
What are the applications?
The Internet architecture was built on some 15-20 years old assumptions. Are some modifications needed?
Is packet switching good for all? In some cases, is circuit switching better? (move TeraBytes of SAN date, P2P, Streaming)
End-to-End Argument – Is is valid for all cases?
What cases not? What instead?
The current Internet architecture is based on L3. What is needed in order to offer services in L1-L2?
Computation vs. Bandwidth 10X in 5 years
Implementation of a quality of service feedback control loop on programmable ...Tal Lavian Ph.D.
Current Diffserv architecture lacks mechanisms for network path discovery with specific service performance.Our aim is to introduce an enhanced-Diffserv scheme utilizing a feedback loop to gather path information and allow better flexibility in managing Diffserv flows. We utilize state-of-the-art programmable routers that can host the control loop operation without compromising their normal routing and switching functionalities. Furthermore, the control feedback loop implemented on the control plane of the router can selectively alter the behaviour of a specific data flow in real-time.
DWDM-RAM:Enabling Grid Services with Dynamic Optical NetworksTal Lavian Ph.D.
Packet-switching technology
Great solution for small-burst communication, such as email, telnet, etc.
Data-intensive grid applications
Involves moving massive amounts of data
Requires high and sustained bandwidth
DWDM
Basically circuit switching
Enable QoS at the Physical Layer
Provide
High bandwidth
Sustained bandwidth
DWDM based on dynamic wavelength switching
Enable dedicated optical paths to be allocated dynamically
An Architecture for Data Intensive Service Enabled by Next Generation Optical...Tal Lavian Ph.D.
DWDM-RAM - An architecture for data intensive Grids enabled by next generation dynamic optical networks, incorporating new methods for lightpath provisioning.
DWDM-RAM: An architecture designed to meet the
networking challenges of extremely large scale Grid applications.
Traditional network infrastructure cannot meet these demands,
especially, requirements for intensive data flows
DWDM-RAM Components Include:
Data management services
Intelligent middleware
Dynamic lightpath provisioning
State-of-the-art photonic technologies
Wide-area photonic testbed implementation
Popeye – Fine-grained Network Access Control for Mobile UsersTal Lavian Ph.D.
Design:
Authentication Manager and Profile Manager
stores the user credentials such as passwords and authenticates users
and stores the user profiles
Policy Manager
stores policies and generates access control rules given a profile
system-wide (e.g. no Napster traffic)
group-wide (e.g. visitors only get Internet access)
user-specific (e.g. Adj gets the best QoS for video conferencing apps)
Network Access Manager
configures the routers to enforce policies on packets and physical ports
e.g. setup packet filtering rules, move users to appropriate VLANs
This document discusses firewalls and intrusion prevention systems. It begins by outlining the need for firewalls due to the evolution of networked systems and increased internet connectivity. It then describes different types of firewalls including packet filtering firewalls, stateful inspection firewalls, application-level gateways, and circuit-level gateways. It also discusses firewall basing options and configurations such as DMZ networks, VPNs, and distributed firewalls. The document concludes by covering intrusion prevention systems and their host-based, network-based, and distributed implementations.
Firewall provides security for networks by controlling access between internal and external networks. There are different types of firewalls including packet filters, application-level gateways, and circuit-level gateways. A packet filter firewall applies rules to IP packets to determine whether to forward or discard them based on information like source/destination addresses and ports. An application-level gateway provides additional security over a packet filter by requiring traffic to go through a proxy for each application/protocol. A network-based firewall protects all computers on an internal network, while a host-based firewall protects only an individual computer.
The document discusses different types of firewalls and their characteristics. It describes packet filtering routers, application level gateways, and circuit level gateways. It also covers firewall configurations, concepts of trusted systems including multilevel security and the reference monitor concept. Limitations of firewalls include not protecting against attacks that bypass the firewall or internal threats.
Network security is important to protect systems from attacks. Firewalls act as the first line of defense, blocking unauthorized incoming and outgoing network traffic based on security rules. Different types of firewalls operate at different layers of the OSI model and provide varying levels of security. No single security measure can guarantee protection, so a defense-in-depth approach using firewalls along with other tools like intrusion detection systems is recommended.
Coming to this issue we have Network Security in Tool Gyan which will put light on how to set up a secured network, Who wants to be a Millionaire in Tool Gyan, check out yourself of what exactly its all about ;)TOR in Mom's guide for all those who thought 'It sounds very complicated to use, I’m not a hacker! I can’t use it!' by our Author- Federico from Italy.
Ch13 Protecting Networks with Security Devicesphanleson
The document describes various network security devices including routers, firewalls, intrusion detection systems, and honeypots. It discusses how routers direct network traffic, common firewall technologies like network address translation and stateful packet inspection, and examples of firewall products from Cisco and Microsoft. It also covers how intrusion detection systems monitor network traffic for attacks and how honeypots are used to trap hackers by appearing vulnerable but containing no important data.
- Palo Alto Networks provides a next-generation firewall platform that can identify applications, users, and content to enable safe application usage while protecting against both known and unknown threats. This is achieved through technologies like App-ID, User-ID, Content-ID, WildFire, and SP3 architecture.
- The platform offers high performance, visibility, control, and threat prevention across applications, users, and content to replace traditional firewalls and security tools in a single device. This allows for a simplified security posture.
- Palo Alto Networks has seen strong revenue growth and increased its global customer base significantly in recent years, showing the success of its disruptive next-generation firewall approach.
Firewalls are used to protect organizational networks from internet threats. They act as a single controlled access point between internal networks and the internet. Firewalls use various techniques like service control, direction control, user control and behavior control to enforce an organization's security policy by filtering traffic, controlling access to services, and monitoring usage. While firewalls provide protection, their limitations include not preventing attacks that bypass the firewall or protecting against internal threats.
The document discusses firewall design principles, characteristics, and types. It describes three common firewall configurations: screened host with single-homed bastion host, screened host with dual-homed bastion host, and screened subnet. It also covers trusted systems, access control, and defending against Trojan horse attacks.
- Palo Alto Networks builds next-generation firewalls that can identify over 1,100 applications regardless of port or protocol, restoring visibility and control to the firewall.
- Traditional firewalls cannot control applications effectively as applications change but firewalls have not. Next-generation firewalls from Palo Alto Networks address this by identifying applications, users, and scanning content.
- These firewalls provide comprehensive visibility and policy control over application access and functionality with high-performance processing capabilities.
Firewalls monitor incoming and outgoing network traffic and allow only authorized traffic according to a security policy. There are different types of firewalls including packet filters, application-level gateways, and circuit-level gateways. Packet filters apply rules to IP packets to forward or discard them, while application-level gateways provide end-to-end connections and additional security through proxy services. Circuit-level gateways limit connections between internal and external hosts. Firewall configurations can include screened host or screened subnet designs with dual-homed bastion hosts for added security.
A presentation discusses different types of firewalls and how they work. Firewalls are devices that control network access by enforcing rules on transmission of data based on things like source/destination addresses and protocols. Common types include packet filters, stateful packet filters, application-level gateways, and circuit-level gateways. Firewalls can be configured in different ways depending on network needs and are used to implement access control policies to protect networks and resources.
In computing, a firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on a rule set. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted.
Firewalls are hardware or software tools that control access between private networks and public networks like the internet. There are several types of firewalls including packet filtering, circuit-level gateways, application gateways, and stateful multilayer inspection firewalls. Packet filtering firewalls work at the network layer and filter based on packet attributes. Application gateways filter at the application layer using proxies. Stateful multilayer inspection firewalls combine aspects of the other types and track communication sessions. Firewalls provide security benefits like blocking vulnerable services, enforcing access policies, and concentrating security management, but also have disadvantages like potentially limiting network access and concentrating risk.
Securing network switches at the layer 2 level is important to prevent various attacks. The document outlines steps to secure administrative access to switches, protect the management port, turn off unused services and interfaces, and use features like DHCP snooping, dynamic ARP inspection (DAI), port security, and VLANs to mitigate attacks like VLAN hopping, STP manipulation, DHCP spoofing, ARP spoofing, CAM table overflows, and MAC address spoofing. Following configuration best practices and securing switches at layer 2 helps strengthen network security.
This document summarizes a proposed robust campus wide network defender system. It begins with an introduction to network security and the role of firewalls and intrusion detection systems. It then describes various attack generation and detection algorithms proposed as part of the system. These include algorithms for generating and detecting ICMP floods, SYN floods, LAND attacks, and XMAS attacks. The system is intended to integrate firewall and IDS capabilities to better defend against known attacks. The document concludes with discussions of the software development process and programming tools used to implement the proposed system.
The document discusses firewall implementation for a company called Acme. It describes how Acme can set up firewalls to restrict access between internal and external networks and between different internal departments. Packet filtering, proxy servers, and demilitarized zones are implemented to enforce access controls and monitor network traffic flow while protecting sensitive data. The completed Acme intranet design includes multiple firewalls configured in screened subnets and dual-homed gateways to secure remote access and internal information flows.
This document describes an ultra low phase noise frequency synthesizer system for wireless communication applications. The system uses a combination of a fractional-N phase locked loop (PLL), sampling reference PLL, and direct digital synthesizer (DDS). It aims to reduce phase noise and enable higher order modulation schemes for increased data rates. The system comprises a front end module, display, and system on chip with the frequency synthesizer. It provides very low phase deviation of 0.04 degrees through a dual loop design, sampling PLL reference, and high frequency digital components.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
Embodiments of the present invention present a method and apparatus for photonic line sharing for high-speed routers. Photonic switches receive high-speed optical data streams and produce the data streams to a router operating according to routing logic and produce optical data streams according to destination addresses stored in the data packets. Each photonic switch can be configured as one of a 1:N multiplexer or an M:N cross-connect switch. In one embodiment, optical data is converted to electrical data prior to routing, while an alternate embodiment routes only optical data. Another embodiment transfers large volumes of high-speed data through an optical bypass line in a circuit switched network to bypass the switch fabric thereby routing the data packets directly to the destination. An edge device selects one of the packet switched network or the circuit switched network. The bypass resources are released when the large volume of high-speed data is transferred.
Systems and methods to support sharing and exchanging in a networkTal Lavian Ph.D.
Embodiments of the invention provide for providing support for sharing and exchanging in a network. The system includes a memory coupled to a processor. The memory includes a database comprising information corresponding to first users and the second users. Each of the first users and the second users are facilitated for sharing or exchanging activity, service or product, based on one or more conditions corresponding thereto. Further, the memory includes one or more instructions executable by the processor to match each of the first users to at least one of the second users. Furthermore, the instructions may inform each of the first users about the match with the at least one of the second users when all the conditions are met by the at least one second user based on the information corresponding to each of the second users.
Systems and methods for visual presentation and selection of IVR menuTal Lavian Ph.D.
Embodiments of the invention provide a system for generating an Interactive Voice Response (IVR) database, the system comprising a processor and a memory coupled to the processor. The memory comprising a list of telephone numbers associated with one or more destinations implementing IVR menus, wherein the one or more destinations are grouped based on a plurality of categories of the IVR menus. Further the memory includes instructions executable by said processor for automatically communicating with the one of more destinations, and receiving at least one customization record from said at least one destination to store in the IVR database.
Various embodiments allow Grid applications to access resources shared in communication network domains. Grid Proxy Architecture for Network Resources (GPAN) bridges Grid services serving user applications and network services controlling network devices through proxy functions. At times, GPAN employs distributed network service peers (NSP) in network domains to discover, negotiate and allocate network resources for Grid applications. An elected master NSP is the unique Grid node that runs GPAN and represents the whole network to share network resources to Grids without Grid involvement of network devices. GPAN provides the Grid Proxy service (GPS) to interface with Grid services and applications, and the Grid Delegation service (GDS) to interface with network services to utilize network resources. In some cases, resource-based XML messaging can be employed for the GPAN proxy communication.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
Systems and methods for electronic communicationsTal Lavian Ph.D.
Embodiments of the invention provide a system for enhancing user interaction with the Internet of Things. The system includes a processor, and a memory coupled to the processor. The memory includes a database having one or more options corresponding to each of the Internet of Things. The memory further includes instructions executable by the processor to share at least one of the one or more options with one or more users of the things. Further, the instructions receive information corresponding to selection of the at least one option by the one or more users. Additionally, the instructions update the database based on the selection of the at least one option by the one or more users. Further, a device for enhancing interaction with the things is also disclosed.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
Radar target detection system for autonomous vehicles with ultra-low phase no...Tal Lavian Ph.D.
An object detection system for autonomous vehicle, comprising a radar unit and at least one ultra-low phase noise frequency synthesizer, is provided. The radar unit configured for detecting the presence and characteristics of one or more objects in various directions. The radar unit may include a transmitter for transmitting at least one radio signal; and a receiver for receiving the at least one radio signal returned from the one or more objects. The ultra-low phase noise frequency synthesizer may utilize Clocking device, Sampling Reference PLL, at least one fixed frequency divider, DDS and main PLL to reduce phase noise from the returned radio signal. This proposed system overcomes deficiencies of current generation state of the art Radar Systems by providing much lower level of phase noise which would result in improved performance of the radar system in terms of target detection, characterization etc. Further, a method for autonomous vehicle is also disclosed.
Various embodiments allow Grid applications to access resources shared in communication network domains. Grid Proxy Architecture for Network Resources (GPAN) bridges Grid services serving user applications and network services controlling network devices through proxy functions. At times, GPAN employs distributed network service peers (NSP) in network domains to discover, negotiate and allocate network resources for Grid applications. An elected master NSP is the unique Grid node that runs GPAN and represents the whole network to share network resources to Grids without Grid involvement of network devices. GPAN provides the Grid Proxy service (GPS) to interface with Grid services and applications, and the Grid Delegation service (GDS) to interface with network services to utilize network resources. In some cases, resource-based XML messaging can be employed for the GPAN proxy communication.
Method and apparatus for scheduling resources on a switched underlay networkTal Lavian Ph.D.
A method and apparatus for resource scheduling on a switched underlay network (18) enables coordination, scheduling, and scheduling optimization to take place taking into account the availability of the data and the network resources comprising the switched underlay network (18). Requested transfers may be fulfilled by assessing the requested transfer parameters, the availability of the network resources required to fulfill the request, the availability of the data to be transferred, the availability of sufficient storage resources to receive the data, and other potentially conflicting requested transfers. In one embodiment, the requests are under-constrained to enable transfer scheduling optimization to occur. The under-constrained nature of the requests enable transfer scheduling optimization to occur. The under-constrained nature of the requests enables requests to be scheduled taking into account factors such as transfer priority, transfer duration, the amount of time it has been since the transfer request was submitted, and many other factors.
Dynamic assignment of traffic classes to a priority queue in a packet forward...Tal Lavian Ph.D.
An apparatus and method for dynamic assignment of classes of traffic to a priority queue. Bandwidth consumption by one or more types of packet traffic received in the packet forwarding device is monitored to determine whether the bandwidth consumption exceeds a threshold. If the bandwidth consumption exceeds the threshold, assignment of at least one type of packet traffic of the one or more types of packet traffic is changed from a queue having a first priority to a queue having a second priority.
Method and apparatus for using a command design pattern to access and configu...Tal Lavian Ph.D.
This patent application describes a method and system for remotely accessing and configuring network devices using XML documents and a common design pattern. An XML request is sent from a client to a network device to request that a service be performed locally on the device. The network device includes a service engine that can parse the XML request using an XML DTD, instantiate the requested service, interact with device hardware and software to execute the service, and optionally return a response to the client. The use of XML documents and a common design pattern allows network devices to be accessed and configured in a flexible manner without needing to be pre-programmed for specific requests.
Embodiments of the invention provide means to the users of the system to provide ratings and corresponding feedback for enhancing the genuineness in the ratings. The system includes a memory coupled to a processor. The memory includes one or more instructions executable by the processor to enable the users of the system to rate each other based on at least one of sharing, exchanging, and selling one of activity, service or product. The system may provide a mechanism to encourage genuineness in ratings provided by the users. Furthermore, the instructions facilitate the rating receivers to provide feedbacks corresponding to the received ratings. The feedback includes accepting or objecting to a particular rating. Moreover, the memory includes instructions executable by the processor to enable the system to determine genuineness of an objection raised by a rating receiver.
Embodiments of the present invention provide a system for enhancing reliability in computation of ratings provided by a user over a social network. The system comprises of a processor and a memory coupled to the processor. The memory further comprises a rater score database, a satisfaction database, a social network registration database, a user profile database, and a plurality of instruction executable by the processor. Said instructions in the memory are enabled to accept a message from at least one user wherein said message comprises a satisfaction score associated with at least one service provider and to retrieve a rater score associated with said at least one user from said rater score database. Further, the memory includes instructions in order to compute a new satisfaction score based on said rater score and said satisfaction score and update said satisfaction database to include said new satisfaction score. In a similar manner, the new satisfaction score can be computed based upon the information stored in the social network registration database and user profile database.
Systems and methods for visual presentation and selection of ivr menuTal Lavian Ph.D.
Embodiments of the invention provide a system for generating an Interactive Voice Response (IVR) database, the system comprising a processor and a memory coupled to the processor. The memory comprising a list of telephone numbers associated with one or more destinations implementing IVR menus, wherein the one or more destinations are grouped based on a plurality of categories of the IVR menus. Further the memory includes instructions executable by said processor for automatically communicating with the one of more destinations, and receiving at least one customization record from said at least one destination to store in the IVR database.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
Buy B1 GOETHE German language certificate,TELC b2 Deutsch certificate b1 Online German Language Course – A1 , b1 Level ,Best place to buy TELC certificates b2 Registered TELC b2 certificates India
Buy original Goethe, TestDaF, TELC B2 Without exam TELC b1 certificate Austria WITHOUT Exam.
Purchase valid TELC, GOETHE certificates Deutsch
Pass without Exam, TELC certificate English
Purchase Genuine GOETHE and TELC, GOETHE certificate b2 Austria, Switzerland.WHATSAPP: +44 7405-780569
Pass DSH-1, DSH-2 and DSH-3 Deutsch Certifications Online.
DSH-1, DSH-2 and DSH-3 German Certificates For Sale
Buy DSH-2 level (67%), for graduates, German universities.
Buy Goethe-Zertifikat A1, Deutsch 1 for basic language skills.
Buy TELC Deutsch C1 Hochschule Exams.
Buy GOETHE, Telc b1 German language zertifikat without test in Germany, apply b2 goethe certificates b2 TELC b2 certificates Dubai ,We Offer Valid b2 Goethe Certificate Without Exams A1-A2-B1-B2-C1-C2 For German Buy b1 language TELC certificates b2 TELC b2 certificates India
Contact us via
WHATSAPP: +44 7405-780569
https://www.certifiedieltscertification.com/buy-goethe-certificate-without-exam/
TYPES AND HIERARCHY OF COMPUTER MEMORY.pptxsamina khan
This presentation provides a clear and organized overview of Computer Memory, focusing on its classification and the distinction between primary and secondary memory.
The slides guide learners through the hierarchical structure of memory in computer systems, showing how each type serves a specific role in processing, storing, and managing data. Through diagrams, comparisons, and structured flow, the presentation simplifies complex ideas and builds a strong foundational understanding.This resource is ideal for students, educators, and anyone looking to grasp how data is stored and accessed in computing environments. Whether you're studying for an exam or teaching the basics of computer architecture, this presentation is a concise and effective visual aid.
Catalog of power sockets 2025 version.pdfJohn Auyeung
This is the 2025 edition catalogue from Shenzhen Bellcheyy. It includes a brief introduction to Shenzhen Bellcheyy company and its power outlets & desk outlets.
国外大学毕业证(ISU毕业证书)爱荷华州立大学毕业证毕业证书电子版【q微1954292140】Buy Iowa State University Diploma《正式成绩单论文没过》有文凭却得不到认证。又该怎么办???美国毕业证购买,美国文凭购买,【q微1954292140】美国文凭购买,美国文凭定制,美国文凭补办。专业在线定制美国大学文凭,定做美国本科文凭,【q微1954292140】复制美国Iowa State University completion letter。在线快速补办美国本科毕业证、硕士文凭证书,购买美国学位证、爱荷华州立大学Offer,美国大学文凭在线购买。
主营项目:
1、真实教育部国外学历学位认证《美国毕业文凭证书快速办理爱荷华州立大学文凭购买》【q微1954292140】《论文没过爱荷华州立大学正式成绩单》,教育部存档,教育部留服网站100%可查.
2、办理ISU毕业证,改成绩单《ISU毕业证明办理爱荷华州立大学学历认证制作代办流程》【Q/WeChat:1954292140】Buy Iowa State University Certificates《正式成绩单论文没过》,爱荷华州立大学Offer、在读证明、学生卡、信封、证明信等全套材料,从防伪到印刷,从水印到钢印烫金,高精仿度跟学校原版100%相同.
3、真实使馆认证(即留学人员回国证明),使馆存档可通过大使馆查询确认.
4、留信网认证,国家专业人才认证中心颁发入库证书,留信网存档可查.
美国爱荷华州立大学毕业证(ISU毕业证书)ISU文凭【q微1954292140】高仿真还原美国文凭证书和外壳,定制美国爱荷华州立大学成绩单和信封。国外学历认证ISU毕业证【q微1954292140】修改成绩单爱荷华州立大学offer/学位证学位证书网上查询、留信官方学历认证(永久存档真实可查)采用学校原版纸张、特殊工艺完全按照原版一比一制作。帮你解决爱荷华州立大学学历学位认证难题。
帮您解决在美国爱荷华州立大学未毕业难题(Iowa State University)文凭购买、毕业证购买、大学文凭购买、大学毕业证购买、买文凭、日韩文凭、英国大学文凭、美国大学文凭、澳洲大学文凭、加拿大大学文凭(q微1954292140)新加坡大学文凭、新西兰大学文凭、爱尔兰文凭、西班牙文凭、德国文凭、教育部认证,买毕业证,毕业证购买,买大学文凭,【q微1954292140】学位证1:1完美还原海外各大学毕业材料上的工艺:水印,阴影底纹,钢印LOGO烫金烫银,LOGO烫金烫银复合重叠。文字图案浮雕、激光镭射、紫外荧光、温感、复印防伪等防伪工艺。《爱荷华州立大学假文凭制作美国毕业证书办理ISU成绩单购买办理》
【办理爱荷华州立大学成绩单Buy Iowa State University Transcripts】
购买日韩成绩单、英国大学成绩单、美国大学成绩单、澳洲大学成绩单、加拿大大学成绩单(q微1954292140)新加坡大学成绩单、新西兰大学成绩单、爱尔兰成绩单、西班牙成绩单、德国成绩单。成绩单的意义主要体现在证明学习能力、评估学术背景、展示综合素质、提高录取率,以及是作为留信认证申请材料的一部分。
爱荷华州立大学成绩单能够体现您的的学习能力,包括爱荷华州立大学课程成绩、专业能力、研究能力。(q微1954292140)具体来说,成绩报告单通常包含学生的学习技能与习惯、各科成绩以及老师评语等部分,因此,成绩单不仅是学生学术能力的证明,也是评估学生是否适合某个教育项目的重要依据!
爱荷华州立大学offer/学位证、留信官方学历认证(永久存档真实可查)采用学校原版纸张、特殊工艺完全按照原版一比一制作【q微1954292140】Buy Iowa State University Diploma购买美国毕业证,购买英国毕业证,购买澳洲毕业证,购买加拿大毕业证,以及德国毕业证,购买法国毕业证(q微1954292140)购买荷兰毕业证、购买瑞士毕业证、购买日本毕业证、购买韩国毕业证、购买新西兰毕业证、购买新加坡毕业证、购买西班牙毕业证、购买马来西亚毕业证等。包括了本科毕业证,硕士毕业证。
特殊原因导致无法毕业,也可以联系我们帮您办理相关材料:
1:在爱荷华州立大学挂科了,不想读了,成绩不理想怎么办?
2:打算回国了,找工作的时候,需要提供认证《ISU成绩单购买办理爱荷华州立大学毕业证书范本》
购买日韩毕业证、英国大学毕业证、美国大学毕业证、澳洲大学毕业证、加拿大大学毕业证(q微1954292140)新加坡大学毕业证、新西兰大学毕业证、爱尔兰毕业证、西班牙毕业证、德国毕业证,回国证明,留信网认证,留信认证办理,学历认证。从而完成就业。爱荷华州立大学毕业证办理,爱荷华州立大学文凭办理,爱荷华州立大学成绩单办理和真实留信认证、留服认证、爱荷华州立大学学历认证。学院文凭定制,爱荷华州立大学原版文凭补办,留信网认证,扫描件文凭定做,100%文凭复刻。
Static timing analysis (STA) is a method of validating the timing performance of a design by checking all possible paths for timing violations. STA breaks a design down into timing paths, calculates the signal propagation delay along each path, and checks for violations of timing constraints inside the design and at the input/output interface.
Popeye - Using Fine-grained Network Access Control to Support Mobile Users and Protect Intranet Hosts
1. Popeye - Using Fine-grained Network Access Control to Support
Mobile Users and Protect Intranet Hosts
Mike Chen
[email protected]
Barbara Hohlt
[email protected]
Tal Lavian
[email protected]
11 December, 2000
Abstract
We are facing a trend towards ubiquitous connectiv-
ity where users demand access at anytime, anywhere.
This has lead to the deployment of public network
ports and wireless networks. Current solutions to
network access control are inflexible and only provide
all-or-nothing access.
It is also increasing important to protect Intranet
hosts from other mobile and static hosts on the same
Intranet, in order to contain damages in the case that
a host gets compromised.
We present an architecture that addresses these is-
sues by using a programmable router to provide dy-
namic fine-grained network access control. The Java-
enabled router dynamically generates and enforces
access control rules using policies and user profiles as
input, reducing administrative overhead. Our modu-
lar design integrates well with existing authentication
and directory servers, further reducing admininstra-
tive costs. Our prototype is implemented using Nor-
tel’s Accelar router and moves users to VLANs with
the appropriate access privilege.
1 Introduction
Many organizations, such as UC Berkeley, would like
to provide ubiquitous connectivity to its users as well
as visitors. In order to deploy such connectivity, ac-
cess control is required so that only authorized users
have access to network resources. If unauthorized
users gain access to the network, they could cause
damage by abusing resources or attacking machines
on the Intranet, they can also launch attacks against
systems outside the organization. Current solutions
to secure network access provide only all-or-nothing
access, and often have high administrative costs.
Network access control is more than just protecting
against unauthorized mobile hosts. Even static hosts
on an Intranet may pose as a security threat. Take
the recent Microsoft break-in [?] as an example:
a host on the Microsoft Intranet was compromised
through an email virus, then it was used to attack
other hosts on the Intranet. This attack exploits the
fact that most Intranet are fully reachable by all In-
tranet hosts1
. The damage of this type of break-in
would have been greatly reduced if a network access
control system were in place on every port within the
organisation to limit the networks that a host can
reach.
A fine-grained and flexible network access control sys-
tem with low administrative costs is clearly desirable,
but today’s solutions fall short in one or more areas.
The following are important properties that a net-
work access control system should have:
Flexible and fine-grained access control It should be
able to prevent source spoofing and support desti-
nation filtering. It should also support per-user and
per-application policies.
Modular design It is important to be able to integrate
well with existing services such as RADIUS and Ker-
beros for authentication and LDAP for user profiles.
Easy to manage Administrative cost is a major con-
cern in any organization. The access control policy
must be easy to specify and get right. Administra-
tors should be able to specify system-wide, group-
wide, and user-specific policies using some high level
language, and have the system configure the com-
ponents and enfore the policies automatically. To
further lower administrative cost, different modules
should be able to be managed by different adminis-
1Microsoft’s Intranet was manually partitioned so that
highly sensitive data such as source code was on a network
unreachable from the compromised host. This type of manual
partitioning is inflexible and does not support mobile hosts.
1
2. trators.
Support for mobile user It should dynamically con-
figure network ports to give the right network access
to the user.
High performance The access control system must be
able to scale up to support many users with little
performance impact.
Easy to use The system must be easy to use to be
adopted by users. It should present familiar UI to
the user and require little or no special software.
In this paper, we describe the design and implemen-
tation of Popeye, a network access control system.
In Section 2, we describe related work. In Section
3, we discuss the design principles and architecture
components. In Section 4, we discuss our prototype
implementation. In Section 5, we evaluate our sys-
tem using our design goals. In Section 6, we discuss
our initial results and future works. In Section 7, we
state our conclusions.
2 Related Work
SPINACH [8] provides access control on public net-
work ports to allow only authorized users onto
the network. Users authenticate themselves using
kerberos-enabled telnet. The SPINACH router fil-
ters everything except DHCP traffic (so all users can
get an IP address), SPINACH server traffic (so all
users can authenticate), and authorized user traffic.
SPINACH II [5] extends the work to use web-based
authentication. It is deployed in the CS department
of Stanford, and has been integrated with an existing
authentication server.
SPINACH II’s strengths are low cost, easy to use,
and modular design. However, it only providies all-
or-nothing network access control. A SPINACH user,
including visitors, either gets full access to the net-
work or no access at all. Second, SPINACH II fil-
ters packets based on MAC address which is prone
to MAC address spoofing attacks, especially on eth-
ernet networks where ARP reveals MAC addresses of
other hosts. As a result, SPINACH II is useful in set-
tings where network access control is necessary but
not critical. Third, SPINACH II is software based
and does not scale as well as hardware solutions.
Carnegie Melon’s AuthNet [9] is similar to SPINACH
in using MAC address filtering to allow only authen-
ticated user traffic onto the campus network. A user
registers his MAC address with a centralized server,
and the Cisco VLAN switch filters everything but the
packets with the registered MAC addresses. All “au-
thenticated” users appear on the same VLAN even
though they may be connected to different VLAN
switches. It also offers all-or-nothing access to the
network and suffers from the same MAC spoofing at-
tacks.
Carnegie Melon’s NetBar system [7] uses a Cisco Cat-
alyst VLAN switch to isolate all the public ports on a
“un-authenticated” VLAN with limited connectivity
to the authentication server and the DHCP server.
Once the user obtains an IP address through DHCP,
the user authenticate themselves using their Kerberos
password. Once authenticated, the server sends an
SNMP message to the VLAN switch to move the
port to a VLAN with full connectivity. When the
client disconnects from a port, the VLAN switch de-
tects the drop in link status, and moves the port back
to the “un-authenticated” VLAN. NetBar prevents
MAC address spoofing attacks but it also only pro-
vides all-or-nothing network access control.
InSite’s [6] design requires the use of NetBar VLANs
and custom software on the client. To support all
possible client platforms, administrators would need
to support multiple versions of the client software.
The administrative cost and support overhead of the
design makes it unrealistic for deployment.
UC Berkeley has proposed a design [10] that requires
special DHCP software on the clients, intelligent hubs
that can turn ports on and off, and a modified DHCP
server that only hands out configuration to authen-
ticated clients. The custom software requirement
makes it vulnerable to the same kinds of deployment
problem as InSite.
All five solutions discussed above offer all-or-nothing
access control, and they don’t offer protection be-
tween hosts on the Intranet. They may be suitable
for university campuses where secure network access
is not critical and the requirement is to reduce un-
authorized access to the network. For organizations
that need stronger access control, we prefer Popeye
to the Stanford, CMU, UCB, and U of Michigan de-
signs.
In the above related work the additional functionality
was done by software base routers. We can differen-
tiate our work by using the capabilities of hardware
base routing. This allows us have wire speed, fine
grain filtering, and scalability. Figure 1 shows the
separation of the control plane and forwarding plane
in hardware based routers. This is the difference of
combining forwarding and control in software based
2
3. Figure 1: Software-Based and Hardware-Based Rout-
ing
routing. In software based routing all packets are pro-
cessed by the main cpu. This puts some load on the
performance and the capabilities of previously related
work. Our approach results in enhancing the forward-
ing capabilities in about two orders of magnitude and
the number of ports in about one order of magnitude.
In our approach the filtering is done by the hardware
without additional load on the cpu. The cpu can be
idle while the router is doing the above work in wire
speed. This allows scalability and fine grain filtering
that was limited in previous work.
3 Design
This section describes the design of Popeye, a network
access control system. Popeye has a modular design
comprised of five components which are a mix of our
own Popeye services and existing services. Figure 2
illustrates the architecture with the five components;
Java Web Server, Policy Manager, Network Access
Manager, external Security services, and an external
DHCP server.
The overall design approach is to run our custom Pop-
eye services on a programmable router, and to run the
existing services on host machines. We choose a pro-
grammable router solution for its high performance
and the ability to do flexible, fine-grained access con-
trol. This includes access control at the IP, protocol
and applications layers. In our design, we assume
all ports are directly connected to a programmable
router.
For our design to be effective, it must be easy to use.
We want to allow a visitor network access, but at
the same time we want to protect the organisation’s
Intranet. Below we present a scenario which illustrate
Figure 2: Popeye Architecture
our expectations from a user’s perspective.
3.1 A Usage Scenario
A visitor comes to Berkely and wants to connect to
the network. He connects his machine to a physical
port or uses a wireless NIC card and gets an IP ad-
dress through DHCP. He then points his web browser
to a specific web site and is asked to enter a username
and password. Whereupon, the system gives him the
right permission to use the network. The type of per-
mission can be no access, access to the internet, or
access to certain security domains within the organi-
sation.
3.2 Web Server
Because it is a simple way to access our system, we
decided to use a web interface for the mobile clients.
However, as we will explain later, we need to pro-
tect the visitor’s IP address. The solution is to have
the web server run directly on the Accelar as an
HttpServlet. The Web Server validates the user with
the Authentication Server, records the physcial port
and MAC address of the user, and grants a lease to
the user. The lease must be periodically renewed by
the user.
3.3 Policy Manager
The Policy Manager simplifies the task of authoriza-
tion. It presents a high level language which makes
it easy for administrators to specify policies and ex-
presses these policies as rules to be manipulated by
the low level Network Access Manager.
3
4. The Policy Manager takes a user profile from the Pro-
file Server and a policy from the Policy Server as in-
put, and generates the security rules for a particular
user. The rules are then passed to the Network Ac-
cess Manager for enforcement.
3.4 Network Access Manager
The Network Access Manager dynamically enforces
the security rules it receives from the Policy Manager.
This is a low level service which is able to configure
the router, set packet filters, and set QoS parameters
on demand.
One of the features we implemented, discussed in
Section 4, is dynamic control of virtual lans, vlans.
Even though, many vlans may be on the same router,
no packets are allowed to cross the vlan boundaries.
This is supported directly by the hardware. This can
be viewed as several networks that are not attached,
even though they are on the same router.
IP filtering, another feature discussed in Section 4,
can also be dynamically controlled by the Network
Access Manager. With dynamic IP filtering we can
modify a user’s access on the fly. For example, we
can block the access of a specific source, destination,
or application.
3.5 Security Services
Popeye uses existing services to manage authoriza-
tion, user profiles, and security policies. This allows
for a modular design and separation of privilege[sec],
as the different security services can be managed by
different security domains.
3.5.1 Authentication Server
The Authentication Server is an external service
which validates users. The Web Server queries the
Authentication Server to validate users requesting
network access. RADIUS or Kerberos could be used
for this service.
3.5.2 Profile Server
The Profile Server is an external service which stores
user profiles. The Policy Manager queries the Profile
Server for instances of user profiles. LDAP could be
used for this service.
3.5.3 The Policy Server
The Policy Server is an external service that stores
the policies of security domains. The Policy Manager
queries the Policy Server for policies which match
user profiles.
3.6 DHCP Server
The DHCP Server is used to give a visitor an IP ad-
dress in order to use the network. It can be configured
to issue a particular range of IP addresses on specific
subnets. In Section 4 we discuss our use of DHCP in
more detail.
4 Implementation
This section describes a prototype implementation
of Popeye. The key technology we use is the Oplet
Runtime Environment (ORE) from Nortel Networks
OpenetLab [2].
Our prototype is implemented using a Nortel Net-
works Accelar 1100-B router, a Linux server, and
the research software from Nortel Networks Openet-
Labs. ORE is a Java-based software platform for de-
ploying services on network elements such as routers,
switches and hosts. ORE runs on the network ele-
ment as a Java virtual machine and enables services,
called oplets, to be dynamically downloaded to to
the network element. These oplets can provide new
functionality, such as traffic monitoring and intrusion
detection. Since ORE can run on a host, oplets are
developed on a host machine and then downloaded
to the desired network element.
For our project, Popeye, ORE runs on the Accelar
and oplets are developed on a Linux server. The Ac-
celar is booted from an image on the Linux server
using tftp. Oplets are installed from an http server
running on the Linux server. The Linux server has
two network interfaces: one to the Berkeley Intranet
and one to the Accelar.
Our goal as described above is to enforce per-user ac-
cess control to support mobile users and protect the
Intranet from outsiders. We focus our efforts on dif-
ferentiating ourselves from previous research: mainly
the dynamic hardware configuration. We bypass the
authentication step. For policy management we as-
sume a single policy, as a proof of concept, which is
to grant all visitors access to the Internet only. We
4
5. also assume an environment where mobile clients are
directly connected to a physical port on the Accelar.
4.1 Web Server
The web server is implemented as a Java
HttpServlet [3] oplet running on ORE. The advantage
of running the Web Server on the Accelar is that we
can get the visitor IP address directly from the client
and keep it secret. As we will show later, the IP ad-
dress is used to identify what physical port a visitor is
connected to. The Popeye servlet serves a web page
which requests a user’s name and password. It then
calls the Network Access Manager.
4.2 Network Access Manager
We considered two approaches for implementing the
Network Access Manager; IP packet filtering and vlan
access control.
4.2.1 IP Packet Filtering
The Java Forwarding API, JFwd, is a low-level ORE
service, which allows customized oplets to alter rout-
ing and forwarding behaviors by accessing the hard-
ware instrumentation. It includes a number of generic
service mappings such as MAC address, ARP, IP
routing, IP filters, IP Diffserv and VLAN (Virtual
LAN). A typical use of the JFwd API is to in-
struct the forwarding engine to alter packet process-
ing through the installation of IP filters.
Early in the project, we tried to use the ORE JFwd
service to do packet filtering by application and pro-
tocol. This would allow us to distinguish the applica-
tions the user may have access to and provide a secu-
rity mechanism on the type of applications we want
to allow. For example, visitors might be prevented
from using a Napster application , but allowed to use
the http protocol. Unfortunately, we discovered that
the JFwd service was not working properly in the
latest version of the Accelar so, we abandoned that
approach and pursued another approach.
4.2.2 Vlan Approach
The Accelar supports virtual local area networks,
vlans. Vlan is a way to separate a single physical
lan into several virtual networks. We configured the
Figure 3: Popeye Setup
Figure 4: MIB Tables
5
6. Accelar to have four vlans: Administration, Visitor,
Intranet and Internet vlan. Except for the Admin-
istration vlan, routing is not allowed between vlans.
In this way we partition the network into security
domains. No packets, other than configuration and
those setting vlans, are allowed by the hardware to
move between vlans.
Figure 3 shows our configuration. The dhcpd, httpd,
and tftpd servers are on the Administration vlan.
One port of the Intranet vlan is connected to the
Berkeley Intranet. One port of the Internet vlan is
connected to the Internet. All the remaining ports
are connected to the Visitor vlan.
When a user initially signs in to Popeye, they are
physically connected to a port on the Visitor vlan. In
this approach we want to move a guest user from the
Visitor vlan to the Internet vlan. This is done by ac-
cessing the Management Information Base, MIB, on
the Accelar. The MIB is a collection of managed ob-
jects that together form a virtual information store.
It is made available through a set of generic APIs
exported by ORE called JMIB.
Figure 4 shows some of the virtual tables available
from the JMIB. There are two ways we know of to
change the vlan of a port. One is to update the
vlanIds attribute of the Port table and the other is to
update the portMembers attribute of the Vlan table.
However, to update either of these tables we need to
discern which port our guest is connected to. The
ifIndex attribute of the NetToMedia table stores the
port in its two right most bytes. From the ip address
we received from the http connection we can index
into the NetToMedia table and get the port number.
4.3 DHCP Server
We configured a DHCP server on the Linux host to
serve several networks from the separated vlans. We
connected the dhcp server to the Administration vlan
and we set a dhcp-relay between the Visitor, Intranet
and Internet vlans, to the Administration vlan. This
design allows us to assign different subnets to the
different vlans. In the initiation of a new mobile user,
the dhcp server assigns an ip address from the Visitor
vlan subnet. In the second stage, after the visitor is
authenticated and his port has been moved to the
destination vlan (in our example the Internet vlan)
he will get a new ip address. The DHCP lease is set
really short on the Visitor subnet, so the client’s ip
address will automatically change.
5 Evaluation
5.1 Measurements
We measured the vlan setup latency with calls to
java.lang.System.currentTimeMillis() [4]. The la-
tency of the vlan setup is 2.0 seconds.
We measured bandwidth with the Iperf [1] tool, by
sending udp packets between vlans. Actual packets
are routed at wire speed, switched 100Mbps.
The Accelar supports up to 384 physical ports.
5.2 JMIB and JFWD
To access the low level instrumentation of the router
we are using the JMIB, a Java API for the MIB vari-
ables. JMIB is based on the published MIB definition
of the router. The advantage of doing so is that we
can get easy access from the application running on
the router to the device instrumentations. However,
this is slow. In our measurement it takes two sec-
onds to dynamically configure a physical port from
one vlan to another vlan. This is on the slow path,
and for our application, two seconds is OK. Using
JMIB might not be acceptable for applications that
need better response (e.g. reading a value 100 times
a second). For fast access monitoring we will need to
bypass the JMIB API and add low level optimizations
which access low level C wrappers and JNI access to
the router hardware.
JFwd is defined as an API to access the forward-
ing engine. JFWD performs mapping for underline
hardware functionality like MAC addresses, ARP, IP
routing, IP filters, IP DiffServ, and VLANs. The
forwarding engine performs at wire speed with no la-
tency. Some monitoring needs to be done in wire
speed, or at least sampling in high frequencies. As
a result, some control features need to be optimized.
JMIB as an underline API for JFWD might not be
acceptable to some applications. In these cases we
will need to optimize JFWD to have direct access to
the forwarding engine and bypass the JMIB.
6 Discussion and Future Work
Popeye also supports MAC address based access con-
trol for wireless clients. Since wireless LANs are es-
sentially a shared ethernet, MAC address spoofing
6
7. may be a problem. For organizations such as univer-
sities that desire some access control but don’t require
strong security, Popeye is perfect for the task. For or-
ganizations that require strong security, one approach
may be to put the wireless LAN on an outside net-
work and require users to use Virtual Private Network
(VPN), such as IPSec, to get back into the Intranet.
This approach has its own problems in that the hosts
on the WLAN may still be compromised through the
wireless interface while connected to the VPN, al-
lowing an attacker to hop to other machines on the
Intranet. Popeye can compliment such an approach
by containing the damage.
Another approach is to have base stations perform
user authentication and prevent MAC spoofing. This
can be achieved through the use of per-user keys
rather than network keys and is supported by 802.11
vendors such as Lucent and Ericsson. When coupled
with Popeye, the approach provides as good as secu-
rity as wired networks.
For future work, we believe the policy specification
deserves more research. We plan to design (or use an
existing) policy language and build tools that sim-
plify policy specification. Perhaps conflict resolution
is important as conflicting policies may need to be
specified. For example, a policy may specify that
no customer service representitives, other than the
manager of customer service, may have access to the
product developement hosts. Our intuition is that
the more specific policy overrides more general ones.
We plan to look into packet filtering policy languages
and tools and reuse as much as possible. We also plan
to implement the Policy Manager that can interpret
policies and generate rules.
As we discovered during the Popeye implementation,
the ORE service, JFwd, which implements IP filter-
ing, does not work properly on the latest version of
the Accelar router. We have reported this problem to
Nortel and hope to incorporate IP filtering into our
prototype once it becomes available. We also hope to
add support for RADIUS as the authentication server
and LDAP as the profile server.
Additionally, we hope to deploy it on the UC Berkeley
campus-wide wireless network. The deployment will
allow us to validate the modular design and study the
performance of our system.
Last, maybe Nortel will turn this into a commercial
product one day.
7 Conclusion
Many of today’s organisations use firewalls to pro-
tect their Intranets from outside attacks. Within the
Intranet, although assets are protected through au-
thentication and permissions, attackers still have ac-
cess to the local area network and can try to attack.
Frequently, visitors are not able to have Internet ac-
cess with their mobile computers for company secu-
rity reasons.
We propose a mechanism which would provide pro-
tection within the organization. It would block at-
tackers within from attempting attacks by inhibit-
ting their ability to send packets to the network. We
would also would like to allow visitors to safely access
(from the organisation’s perspective) the network and
Internet.
This will be done by dynamic IP filtering and dy-
namic vlan configuration. We can add fine-grain QoS
to applications, users, and destinations. Dynamic
network access control allows for more flexibility and
innovation on the type of services that can be pro-
vided. The fact that new features and services can
be added to the router on the fly, allows for flexibility,
customization, and innovation.
In essence we want to provide not only an external
firewall, but an internal firewall for each subnet on the
network. Programmable routers will provide filtering
mechanisms to enable this type of security. For in-
stance, the hardware can filter by source, destination,
port, and protocol. An access matrix can be built for
any combination of accesses between subnets.
Currently organisations protect themselves from the
outside world by firewalls on the edge of their organ-
isations. However, they are not protected from the
inside. The Popeye prototype demonstrates a way
to provide partial firewall functionality on every port
inside an organisation.
References
[1] Iperf. http://dast.nlanr.net/Projects/Iperf/index.html.
[2] Nortel networks openetlab.
http://www.openetlab.org .
[3] Sun httpservlet. http://java.sun.com/products/servlet/.
[4] Sun java.lang.system.currenttimemillis().
http://java.sun.com/products/jdk/1.1/docs/api/java.lang.System
7
8. [5] M. Roussopoulos G. Appenzeller and Mary
Baker. User-friendly access control for public
network ports. In Proceedings of IEEE INFO-
COM, 1999.
[6] Peter Honeyman. Workstation authorization.
http://www.citi.umich.edu/u/honey/talks/insite/,
1997.
[7] Erikas Aras Napjus. Netbar -
carnegie mellon’s solution to authen-
ticated access for mobile machines.
http://www.net.cmu.edu/docs/arch/netbar.html,
1997.
[8] Elliot Poger and Mary Baker. Secure public in-
ternet access handler (spinach). In Proceedings
of the USENIX Symposium on Internet Tech-
nologies and Systems, 1997.
[9] Ryan Troll. http://www.citi.umich.edu/u/honey/talks/insite/.
http://www.citi.umich.edu/u/honey/talks/insite/,
May 1998.
[10] D. L. Wasley. Authenticating aperiodic connec-
tions to the campus network, 1996.
8