Title: A Survey on Active Packets in Active Networks

Author: Nouman Bantan
email: mailto:nbantan@cs.kent.edu, homepage: http://www.aegis.mcs.kent/~nbantan

Prepared for Prof. Javed I. Khan
Department of Computer Science, Kent State University
Date: November 2001



Abstract: A new way of thinking about the role of network packets must invoked. Active packet produces such mindset where network packet will decide on their fate. Active packets can invoke a program at its destination in the physical layer. This invocation will balance the processing of the transfer data between routers and host machines(computes)



Other Survey's on Internetwork-based Applications
Back to Javed I. Khan's Home Page


Table of Contents: 

Introduction

What is active network?

Active network components

Active Packets

SMART packets

PLAN 
ANTS

General Active Packet Processing

Active Packets Control

Characterizing Active Packets

Conclusion

References

Research Papers for More Information on Active Packets

Research Groups
Other Relevant Links


 

Introduction:

A major motivation behind Active Networks was the theory that there is an exponential growth of computing power in the network suggested by Moore’s Law, which states that, the speed of electronic components doubles every 18 months. Unfortunately, in most parts of the Internet, the traffic growth rates far exceed the growth rate of Moore’s Law. As a result, there is typically less effective computing power per packet every year [SJS+00].

What is Active Network?

The concept of active networking emerged from discussion within the broad DARPA research community in 1994 and 1995 on the future directions of networking systems [TSS+97]. A new paradigm in communication was born. The network plays the role of the computer, which is simultaneously shared among many parties and which is owned and operated by the network providers [BrPS01]. Those routers will process customized packets, called active packets, to perform certain computation within the router. One would say that active packets have programs within them waiting to be invoked by the router.

New applications continue to emerge rapidly and often benefit from new network services that better accommodate their modes of use. Active Network recoups network services from the underlying hardware and by allowing new services to be demand loaded into the infrastructure [TGSK96]. Implementing them at nodes interior to the network or at the network layer often offers better functionality and performance. Active network permit applications to support faster service innovation by making it easier to deploy new network services which has a potential impact of active network services on application and how such services can be built and how such service can be built and deployed [WeLG98]. Also, Active networking allows customized packet processing inside the network on a per-packet, per-flow, or per-service basis [HiMA99]. 

From the management perspective, active networking technology facilitates rapid service deployment and flexible service management in which dynamically generating fast path programs that streamline the execution of the most common packets. Active networks will leverage middleware services that support the coordination of network management functions, such as the installation of new software and hardware, load balancing, fault tolerance, accounting and auditing, [TGSK96].
 

Furthermore, users can "program" the network, by supplying their own programs to perform computations according to their need. Active networks will allow users to deploy new services by tailoring components of the shared infrastructure to suit their requirements. For example, users could request that a router execute an application-specific compression algorithm during the processing of their packets [TGSK96]

Active network components

An active network consists of a set of nodes connected by a variety of technologies. Each active node runs a Node Operating System (NOS) and one or more Execution Environment (EE). The NOS’s responsibilities are allocating and scheduling the nodes’ resources (bandwidth, CPU, and memory). Each EE create a virtual machine that interprets active packets that arrive at the node. Virtual Machines (VM) can be general or specific to a certain task like packet forwarding. Users obtain services from the active network via Active Application (AAs), which program the VM provided by an EE to proved an end-to-end service [Calv99].

Active Packets

There have been various types of projects in Active Networks. In this survey, we will deal mainly with the active packet only. Of course total understanding of the role of Active Packet in active networks can’t be fulfilled without explaining all aspects of active networks. We will touch on the total picture very modestly without going into details.

The projects, which we will discuss in this survey, are:

SMART Packets

Smart Packets is an Active Networks project focusing on applying active networks technology to network management and monitoring. Smart Packets programs are written in a tightly encoded, safe language specifically designed to support network management and avoid dangerous constructs and accesses.

The Smart Packets architecture consists of four parts:

1-A specification for smart packet formats and their encapsulation into some network data delivery service.

2-The specification of a high-level language, its assembly language, and a compressed encoding representing that portion of a smart packet that gets executed.

3-A virtual machine resident in each networking element to provide a context for executing the program within the smart packet, and

4-A security architecture.

Users inject programs contained in messages into an active network. Routers along the network receive these messages, execute the programs within, and (possibly) return values or forward the messages along to other routers [SJS+00]. The program seeks to increase user and application control over how packets are handled, and to increase the flexibility of computer networks and the ability to upgrade them.

Packets has a few requirements:

User-written network management and monitoring programs generate smart packets—encapsulated in Active Network Encapsulation Protocol (ANEP) [Alexander et al. 1997] frames—and give them to the ANEP Daemon process. The ANEP Daemon process has two responsibilities:


Figure 1. IP and ANEP encapsulation

A smart packet consists of a Smart Packets header followed by payload. The smart packet is encapsulated within an ANEP packet, which, in turn, is carried within IPv4, IPv6, or, in some Active Networks tests bed situations, UDP. For a smart packet, however, the router must process the contents of the datagram before forwarding it. As a further complication, the router should examine the contents of the datagram only if the router supports Smart Packets. Otherwise, the router should pass the datagram through by modifying an IP option

Smart packets contain either a program, resulting data, or messages wrapped within a common Smart Packets header and encapsulated within ANEP. The Program Packet carries the code to be executed at the appropriate hosts. The Data Packet carries the results of the execution back to the originating network management program. The Message Packet carries informational messages rather than executable code. Error Packets return error conditions if the transport of a Program Packet or the execution of its code encounters exceptions. Only Program Packets use the IP Router Alert option.

When a Program Packet arrives at a router, the daemon authenticates the identity of the sender, verifies the data origin and data integrity, and checks if the sender is authorized to run the smart packet’s program. Then an instance of the virtual machine is instantiated, and the code within the packet is executed.

As part of the security architecture, the virtual machine is made aware of resource limits such as maximum number of instructions to be executed, and how much memory can be used, and privileges such as whether access to MIB sets is allowed.

PLAN

PLAN (Packet Language for Active Networks) is a new language for programs that form the packets of a programmable network. These programs replace the packet headers used in current networks. PLAN programs are lightweight and have restricted functionality. PLAN code call node-resident service routines written in other, more powerful languages. PLAN programming environment can implement an IP-free internetwork. PLAN defines a special construct called a chunk used to describe the remote execution of PLAN programs on other nodes. Primitive operations on chunks are used to provide basic data transport in the network and to support layering of protocols. PLAN provides strong static guarantees to the programmer.

The primary component of each packet is its chunk (short for code hunk), which consists of code, a function name to serve as an entry point, and values to serve as bindings for the arguments of the entry function.The other components are the destination address, the global resource bound (a counter), the routing function, the source address, and the function for error handling.

Figure 2. An example of PLAN packet journey (traceroute packet).

A host application constructs a PLAN packet and injects it into the active network via a port connected to the local PLAN interpreter. This injection port is used by PLAN to provide output to the application, and allows the application to create new packets. Once a packet is created, it is sent to its destination for evaluation. If the destination is many hops away, so intermediate nodes need a way to determine the ‘next hop.’ This is done using the packet’s routing function field, which names a service function that takes the destination as an argument and returns the next hop towards that destination. At each hop, the resource bound field is decremented by one; if the resource bound is exhausted, the packet is terminated.

Specific components of PLAN:

The PLAN programming environment is used to build an active internetwork, PLANet. PLANet’s basic protocols are based on ones used in IP, but with a key difference: all packets are PLAN programs. In PLANet, distributed protocols used to maintain the network, such as routing and address resolution protocols, are implemented as a combination of PLAN programs and services [HKM+98].

PLAN is implementation

When choosing an, we had several specific requirements. First, to make the claim that the network is programmable,

The implementation language for PLAN must be

1-Dynamically loadable,

2-Easily portable, and

3-Strongly typed.

The authors chose OCaml [Caml] and the Pizza [Pizz] extension to Java [GoJG96].

ANTS

The ANTS (Active Node Transfer System) uses active packet called capsules, which conceptually contain both a data payload and the code for handling that payload. ANTS active protocols can enhance application performance. However, the ANTS implementation was done in Java, relying heavily upon the safety properties of the language and requiring heavyweight verification at each hop [Moor99].

Each capsule consists of the following:

Capsules are like mobile agents in that they direct themselves through the network by using a custom forwarding routine. The type of forwarding is indicated by the value of the type field and is selected by end-user software when it injects a capsule into the network. The corresponding forwarding routine is transferred using mobile code techniques to active nodes that the capsule visits as it passes through the network. The routine is executed at each active node that is encountered along the forwarding

Path. At conventional nodes, IP forwarding occurs using the IP header fields.

ANTS do not restrict who can program which nodes. Instead, ANTS aims to allow each user to construct new data transfer services across the wide-area, such as routing for host mobility, by controlling the handling of their own packets. Within the network. This is analogous to extensible operating system approaches that aim to offer entrusted applications as much control over the way system resources are managed as possible while still being able to protect the underlying resources and arbitrate between competing demands. ANTS is based on an aggressive “capsule” approach in which code is associated with packets and run at selected IP routers that are extensible. We sketch its design in the following [Weth99]:


Figure 3. ANTS entities

The entities in an ANTS network are shown in Figure 3. Applications obtain customized network services by sending and receiving special types of packets called capsules via a programmable router referred to as an active node. Each active node is connected to its neighbors, some of who can be conventional IP routers, by link layer channels. The innovative properties of an ANTS network stem from the interaction of capsules and active nodes; the application and channel components are simply modeled on those of conventional networks.

The first step is to write a new set of forwarding routines that implement the desired behavior. This is done in a subset of Java in our reference implementation, the ANTS toolkit. Each different forwarding routine corresponds to a different type of capsule and can carry different header fields. The kinds of forwarding routines that can be constructed depend on the capabilities of the active node; routines are further restricted in the amounts of node resources they can consume.

It provides three categories of calls that: query the node environment; manipulate a soft-store of service-defined objects that are cached for a short time and then expired; and route capsules towards other nodes or applications in terms of shortest paths. Once the code is written, it is signed by a trusted authority (an IETF-equivalent) to certify that the service makes use of overall network resources in a “reasonable” fashion. Finally, the code is registered with a directory service using a human-readable name to make it available to other network users.

General Active Packet Processing

Execution environment send and receive packets over communication channels using raw network links (e.g. ATM, Ethernet) and higher-level protocols (e.g. TCP, IP)

The general flow of the packets through an active node is shown in figure 2. When

Figure 4: Packet flow through an active node.

When a packet is received on a physical link, it is first classified based on information in the packet (i.e. headers); this classification deter-mines the input channel —including protocol processing— to which the packet is directed. Classification of incoming packets is controlled by patterns specified by the EEs.

After input channel processing the packet is handed off to the EE that requested creation of the channel.

It is the responsibility of the NOS and security engine to ensure that the requesting principal is permitted access to the set of packets implied by the pattern associated with a channel creation request. Incoming packets that match no pattern are dropped.

On the output side, EEs transmit packets by submitting them to output channels, which include protocol processing as well as output scheduling. Thus, the general progression is link input, classification, input protocol processing, EE/AA processing, output protocol processing, scheduling, and link transmission. Each transmitted packet corresponds to some received packet; EEs may aggregate or generate them spontaneously [Calv99].

Active Packets Control

Some means is required to allow users to control the routing of packets to a particular EE. The Active Network Encapsulation Protocol (ANEP) provides this capability. The ANEP header includes a “Type Identifier” field assigned to specific execution environments, provided they do not match some more-specific classification pattern. EEs may also process “legacy” traffic—originated by end systems that are not active-aware— which will perform IPv4 forwarding behavior.

The Active Network Encapsulation Protocol also provides a vehicle for other communications with the NOS, including:

Characterizing Active Packets

We will compare the three chosen project according to the following characteristics:

Safety: We define the safety of an active packet system as the degree to which it protects the overall network from attack or misuse, whether deliberate or accidental. We contend that an active packet system should strive to provide at least the level of safety of IP. Failure to do so would be a very sizeable barrier to deployment in the Internet. Ideally, an active packet system should provide an even higher level of safety than IP.

Efficiency: We define the efficiency of an active packet system as the ratio of network work performed (perhaps in terms of bandwidth, or packets processed) to CPU cycles used. IP provides us with a natural reference point for efficiency; we expect most active packet systems to be less efficient than IP. We draw a distinction, however, between efficiency and performance.

Flexibility: We define the flexibility of an active packet system as the amount of new functionality made possible by the system as contrasted to IP. It may be the case that it is hard to compare the flexibility of any two active packet systems, so our discussion of related work in Section 3 will be a partial ordering of the systems in question.

The following table illiterate the degree of each characterization on each project.

 

Safety
Efficiency
Flexibility
Smart Packets
To control network-wide resource use, ANTS provides a TTL field, which is decremented at each hop, and duplicated when packets create a child packet. Since packets can create any number of child packets, the TTL limits the distance a packet’s children can travel, but not the total work in the network. Currently ANTS requires that some authority certify capsules before being deployed to limit the possibility of malicious packets. This significantly reduces the speed at which new capsule programs can be deployed, and of course raises the question of the correctness of the certification.

However, Wetherall argues that capsules in a given network flow will likely require similar processing, so at 16 Mbps for the in-cache case, this early ANTS prototype already achieves performance adequate to T1 line rates [Moor99].

There could be multiple copies of the same code residing in a given cache, which would be problematic if a proliferation of application protocols resulted in widespread cache contention.

PLAN
Network bandwidth is governed by a strictly decreasing resource bound carried by each packet. When a packet spawns a child packet, it must donate some of its remaining resource bound to the child, thus bounding the total number of network hops which a packet and its descendants can take. Unfortunately, it is difficult to know how to set this bound, and there is currently no provision for preventing the bound being set unreasonably high when the packet is first injected. Finally, PLAN’s service namespace may be dynamically restricted or expanded based upon cryptographic credentials [MoNe01].

The main savings here was being able to avoid packet-marshalling costs on the routers where PLAN evaluation did not occur. The main overheads identified in PLANet were kernel crossings, thread scheduling, and garbage collection.

One awkward point, however, is that the resource bound conservation properties make it difficult (from programmer’s point of view) to apportion a packet’s resource bound among multiple children.

ANTS
These certificates may be omitted, in which case the packet runs in a very resource-limited environment that is nonetheless sufficient to perform simple diagnostic functions such as ping or traceroute.
Smart Packets may nonetheless be fast enough. Unfortunately, basic performance numbers are not available at this time.
Providing MIB operations means that Smart Packets should be able to perform most SNMP-style management tasks.

Active Packets Application

Active packets are the most important element in Active networks. Active packets, or Active networks, seek to address the problem of slow network services evolution by building programmability into the network infrastructure itself, thus allowing many new network services to be introduced much more rabidly [Murp97]. The following are just a few examples of the need for Active Network

Conclusion

In Smart Packet project, network packets are used for network management and diagnostics via an SNMP-like interface to the nodes. This reduces the network management-related traffic by reacting to local conditions without having the communication overhead of a centralized remote management center [Moor99].

The PLAN project attempts to address safety concern via language design. The PLAN packet language has limited expressivities, so that authentication is not required to execute packet programs. Notably, all PLAN program are guaranteed to terminate [Moor99]. ANTS packets add extensibility at the network layer and allows for incremental deployment of active nodes within the internet. ANTS tackles the challenges of ensuring that the flexibility offered by active networks does not adversely impact performance or security.

References

Research Papers for More Information on Active Packet/Active Network.

D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Steve Muir and Jonathan M. Smith. Secure Quality of Service Handling (SqoSH), IEEE Communications Magazine . April 2000. http://citeseer.nj.nec.com/311767.html

M. Brunner, B. Plattner, R. Stadler, Service Creation and Management in Active Telecom Environments. Communications of the ACM, April 2001. http://www.tik.ee.ethz.ch/~brunner/papers/CACM_Camera_Ready_final.pdf

K. L. Calvert. Architectural framework for active networks, version 1.0, University of Kentucky, July 1999. http://www.dcs.uky.edu/~calvert/arch-latest.ps

Caml home page. http://pauillac.inria.fr/caml/index-eng.html.

James Gosling, Bill Joy, and Guy Steele. The Java Language Specification. Addison Wesley, 1996. http://java.sun.com/docs/books/jls/

Michael Hicks, Jonathan T. Moore, and D. Scott Alexander. PLANet: An Active Internetwork. In IEEE Intl. Conf. On Computer Communications (INFOCOM '99), pages 1124--1133, 1999. http://citeseer.nj.nec.com/hicks99planet.html

J. T. Moore. Safe and efficient active packets. Technical Report MS-CIS-99-24, Department of Computer and Information Science, University of Pennsylvania, October 1999, http://citeseer.nj.nec.com/moore99safe.html

J. Moore and S. Nettles. Towards Practical Programmable Packets. Proceedings of the 20th Conference on Computer Communications (INFOCOM). IEEE, Anchorage, Alaska, April 2001. http://citeseer.nj.nec.com/294052.html

David Murphy, Building an Active Node on the Internet. Technical Report MIT-LCS-TR-723. Master of Engineering thesis, May 1997. http://citeseer.nj.nec.com/murphy97building.html

Pizza home page. http://pizzacompiler.sourceforge.net/

Beverly Schwartz and Alden W. Jackson and W. Timothy Strayer and Wenyi Zhou and R. Dennis Rockwell and Craig Partbridge. Smart packets: applying active networks to network management. ACM Transactions on Computer Systems. Volume 18, number 1, pages 67--88, 2000. http://citeseer.nj.nec.com/schwartz00smart.html

D.L. Tennenhouse, S.J. Garland, L. Shrira, and M.F. Kaashoek. From Internet to ActiveNet. Request for Comments, January 1996. http://citeseer.nj.nec.com/tennenhouse96from.html

D. L. Tennenhouse, J. M. Smith, W. D. Sincoskie, D. J. Wetherall, and G. J. Minden. A survey of active network research. IEEE Communications Magazine, pages 80--86, January 1997. http://citeseer.nj.nec.com/tennenhouse97survey.html

David Wetherall. Active network vision and reality: lessons form a capsule-based system. Symposium on Operating Systems Principles, pages 64-79,1999. http://citeseer.nj.nec.com/wetherall99active.html

David J. Wetherall, Ulana Legedza, and John Guttag. Introducing New Internet Services: Why and How. IEEE Network Magazine. July/August 1998. http://www.sds.lcs.mit.edu/publications/network98.html

M. Hicks, P. Kakkar, J. T. Moore, C. A. Gunther, and S. Nettles. PLAN: A Packet Language for Active Networks. In Proceedings of the Third ACM International Conference on Functional Programming Languages (SIGPLAN'98), pages 86-93, May 1998. http://citeseer.nj.nec.com/hicks98plan.html

Research Groups 

Active Network is an ongoing project that is taking place in many universities and laboratories. MIT has a special groups dedicate for this research. They can be reached at this location http://www.sds.lcs.mit.edu/activeware/

Other Relevant Links 

Created By Nouman Bantan
Last Modified on November 28th, 2001