Abstract
The trend towards value-added Internet services causes network providers to deploy new network based quality-of-service and security services. Today, however, the customer has only limited means of controlling the service delivery. For example the network security guaranteed by virtual private network providers cannot be checked with a traditional static approach. This paper presents a novel approach for controlling new IP services using mobile code, and motivates the approach with two examples of new IP services proposed by the Internet engineering task force (IETF).
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35522-1_37
Chapter PDF
Similar content being viewed by others
Keywords
References
Baldi, M., Gai, S., and Picco, G. P. (1997). Exploiting code mobility in decentralized and flexible network management. In Proceedings of the 1st International Workshop on Mobile Agents,Berlin, Germany.
Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z., and Weiss, W. (1998). An architecture for differentiated services. RFC 2475.
Bolot, J.-C. (1993). End-to-end packet delay and loss behavior in the Internet. In Proc. SIGCOMM ‘93, pages 289 – 298.
Braun, T., Günter, M., Khalil, I., and Liu, L. (2000). Performance evaluation of virtual private networks. Technical report, Institute for Applied Mathematics and Computer Science.
Calvert, K., Bhattacharjee, S., Zegura, E., and Sterbenz, J. (1998). Directions in active networks. IEEE Communications, 36 (10).
Case, J., Fedor, M., Schoffstall, M., and Davin, J. (1990). A simple network management protocol ( SNMP ). RFC 1157.
Chess, D., Harrison, C., and Kershenbaum, A. (1997). Mobile agents: Are they a good idea? In Vitek, J. and Tschudin, C., editors, Mobile Object Systems: Towards the Programmable Internet, number 1222 in LNCS, pages 25 – 45.
Cisco, 2000] Cisco (20001. Network management. http://www.cisco.com/univercd/cc/td/doc/product/rtrmgmt/.
Ferguson, P. and Huston, G. (1998a). What is a VPN - part I. The Internet Protocol Journal, 1 (1).
Ferguson, P. and Huston, G. (1998b). What is a VPN - part II. The Internet Protocol Journal, 1 (2).
Fünfrocken, 1998] Fünfrocken, S. (1998). Transparent migration of Java-based mobile agents: Capturing and reestabilshing the state of Java programs. In Rothermel, K. and Fritz, H., editors, Proc. Mobile Agents MA ‘98.
Gray, R. S. (1998). Agent Tel: A flexible and secure mobile-agent system. Technical report, Darhmouth College. PCS-TR98-327.
Günter and Braun, 1999] Günter, M. and Braun, T. (1999). Evaluation of bandwidth broker signaling. In Proceedings of the International Conference on Network Protocols ICNP’99,pages 145–152. IEEE Computer Society.
Günter et al., 1999] Günter, M., Braun, T., and Khalil, I. (1999). An architecture for managing QoS-enabled VPNs over the Internet. In Proceedings of the 24th Conference on Local Computer Networks LCN’99,pages p.122–131. IEEE Computer Society.
Hulaas et al., 1999] Hulaas, J., Gannoune, L., Francioli, J., Chachkov, S., Schtz, F., and Harms, J. (1999). Electronic commerce of Internet domain names using mobile agents. In Proceedings of the Second International Conference on Telecommunications and Electronic Commerce (ICTEC’99).
Jacobson, V., Leres, C., and McCanne, S. (1989). Tcpdump. available via ftp to: ftp.ee.lbl.gov.
Jansen, W., Mell, P., Karygiannis, T., and Marks, D. (1999). Applying mobile agents to intrusion detection and response. Technical report, National Institute of Standards and Technology.
Kato et al.. 1999] Kato, A., Murai, J., Katsuno, S., and Asami, T. (1999). An Internet traffic data repository: The architecture and the design policy. In Proc. INET ‘99. http://www.isoc.org/inet99/proceedings/4h/4h_Lhtm.
Kent, S. and Atkinson, R. (1998). Security architecture for the internet protocol. RFC 2401.
Knuth, 1981] Knuth, D. E. (1981). The art of computer programming,volume 2 Seminumerical Algorithms. Addison-Wesley, 2 edition.
Lange and Oshima, 1998] Lange, D. and Oshima, M. (1998). Programming and Deploying Java Mobile Agents with Aglets. Addison-Wesley.
Murch and Johnson, 1999] Murch, R. and Johnson, T. (1999). Intelligent Software Agents. Prentice Hall.
National Laboratory For Applied Network Research, 2000] National Laboratory For Applied Network Research (2000). Network analysis infrastructure. http://moat.nlanr.net/.
Paxson, 1997] Paxson, V. (1997). End-to-end Internet packet dynamics. In Proc. SIGCOMM ‘97.
Paxson, V., Almts, G., Mandavi, J., and Mathis, M. (1998). Framework for IP performance metrics. RFC 2330.
Teitelbaum, B., Hares, S., Dunn, L., Neilson, R., Narayan, V., and Reichmeyer, F. (1999). Internet2 QBone: Building a testbed for differentiated services. IEEE Network, 13 (5): 8 – 16.
Tennenhouse, D. L., Smith, J. M., Sincoskie, W. D., Wetherall, D. J., and Minden, G. J. (1997). A survey of active network research. IEEE Communications Magazine, 35 (1): 80 – 86.
Terzis et al., 1999] Terzis, A., Wang, L., Ogawa, J., and Zhang, L. (1999). A two-tier resource management model for the Internet. In IEEE Global Internet’99.
Vitek and Bryce, 1999] Vitek, J. and Bryce, C. (1999). The JavaSeal mobile agent kernel. In Proc Symposium on Agent systems (ASA ‘99) and Applications and Symposium on Mobile Agents (MA ‘99).
Wetherall et al., 1998] Wetherall, D., Guttag, J., and Tennenhouse, D. L. (1998). ANTS: A toolkit for building and dynamically deploying network protocols. In IEEE OPENARCH ‘98. San Francisco.
White, J. (1994). Telescript technology: The foundation for the electronic marketplace. General Magic White Paper.
Wooldridge, M. J. and Jennings, N. R. (1999). Software engineering with agents: Pitfalls and pratfalls. IEEE Internet Computing, pages 20 – 27.
Zimmermann, P. (2000). Pretty good privacy. http://www.pgpi.org/.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Günter, M., Braun, T. (2000). Internet Service Delivery Control with Mobile Code. In: van As, H.R. (eds) Telecommunication Network Intelligence. SMARTNET 2000. IFIP — The International Federation for Information Processing, vol 50. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35522-1_1
Download citation
DOI: https://doi.org/10.1007/978-0-387-35522-1_1
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-6693-6
Online ISBN: 978-0-387-35522-1
eBook Packages: Springer Book Archive