Advertisement

A Brief History of Network Programmability and Related Fields

  • Ralf Wolter
Chapter

Abstract

Network programmability has a long story in the networking world. Routing protocol initially introduced network-embedded concepts; many other functions have been embedded into the network over time. Quality of Service is a good example for an embedded versus central approach: IntServ and DiffServ have clearly illustrated the difference. Embedded monitoring introduced a level of independence from central polling concepts, and zero-touch has introduced a new paradigm of device installation and rollout of new services. Middleware, web services, and the service-oriented architecture (SOA) have extended the range of embedded applications. Autonomic computing and self-management have described the vision and future of network management. Peer-to-peer networks and DHT are implementing self-managing elements already. Network virtualization and cloud computing demonstrate a strong need for embedded management and automation, as the dynamic and virtual infrastructure simply cannot be managed with the traditional approaches.

Keywords

Internet Protocol Network Element Distribute Hash Table Simple Object Access Protocol Common Object Request Broker Architecture 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    RFC 791: Internet protocol, DARPA internet programGoogle Scholar
  2. 2.
    IBM Online Library: SNA technical overview (GC30-3073-04)Google Scholar
  3. 3.
    RFC 2990: Next steps for the IP QoS architectureGoogle Scholar
  4. 4.
    RFC 3714: IAB concerns regarding congestion control for voice traffic in the internetGoogle Scholar
  5. 5.
    Cisco Performance Routing (PfR) design guide. http://www.cisco.com/application/pdf/en/us/guest/netsol/ns483/c649/ccmigration_09186a008094e673.pdf. Accessed on 11 Feb 2008 (publication date)
  6. 6.
    RFC 3954: Cisco Systems NetFlow services export version 9Google Scholar
  7. 7.
    Introduction to Cisco IOS NetFlow – a technical overview. http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6555/ps6601/prod_white_paper0900aecd80406232.pdf. Accessed on Oct 2007 (publication date)
  8. 8.
  9. 9.
    Jacobson V, Smetters DK, Thornton JD, Plass MF, Briggs NH, Braynard RL (2009) Networking named content. In: Proceedings of the 5th international conference on emerging networking experiments and technologies, CoNEXT ‘09, Rome, ItalyGoogle Scholar
  10. 10.
    Wang N-C, Chang S-W (2005) A reliable on-demand routing protocol for mobile ad hoc networks with mobility prediction. Comput Commun 29(1):123CrossRefGoogle Scholar
  11. 11.
    Sahni S, Ramamritham K (2007) Delay tolerant applications for low bandwidth and intermittently connected users: the aAQUA experience. In: Proceedings of the 16th international conference on World Wide Web, WWW ‘07, Banff, Alberta, CanadaGoogle Scholar
  12. 12.
    IPN progress reports. http://tmo.jpl.nasa.gov/index.cfm. Accessed on Nov 2011 (publication date)
  13. 13.
    Delay Tolerant Networking Research Group. http://www.dtnrg.org/wiki. Accessed on 1 March 2011
  14. 14.
    Visca J, Apollonia G, Richart M, Baliosian J, Grampín. Embedded rule-based management for content-based DTNs, Springer Press. Advances in network-embedded management and applicationsGoogle Scholar
  15. 15.
    RFC 1633: Integrated services in the internet architectureGoogle Scholar
  16. 16.
    RFC 2205: Resource ReSerVation protocolGoogle Scholar
  17. 17.
    RFC 2475: An architecture for differentiated servicesGoogle Scholar
  18. 18.
    RFC 1067: A simple network management protocolGoogle Scholar
  19. 19.
    RFC 1441: Introduction to version 2 of the internet-standard network management frameworkGoogle Scholar
  20. 20.
    RFC 2819: Remote network monitoring management information base, RMON v1Google Scholar
  21. 21.
    RFC 2021: Remote network monitoring management information base version 2Google Scholar
  22. 22.
    RFC 3577: Introduction to the remote monitoring (RMON) family of MIB modulesGoogle Scholar
  23. 23.
    sFlow.org consortium. http://www.sflow.org/. Accessed on 1 March 2011
  24. 24.
    IETF IP Flow Information Export (IPFIX) working group. http://datatracker.ietf.org/wg/ipfix/charter/. Accessed on 1 March 2011
  25. 25.
    RFC3954: NetFlow version 9Google Scholar
  26. 26.
    RFC3955: Candidate protocols for IPFIXGoogle Scholar
  27. 27.
    RFC 5982: IP Flow Information Export (IPFIX) mediationGoogle Scholar
  28. 28.
    Hu Y, Chiu D-M, Lui JCS (2009) Entropy based adaptive flow aggregation. IEEE/ACM Trans Netw 17(3):698–711CrossRefGoogle Scholar
  29. 29.
    IP Performance Metrics (IPPM) working group. http://datatracker.ietf.org/wg/ippm/charter/. Accessed on 1 March 2011
  30. 30.
    Performance Metrics for Other Layers (PMOL) working group. https://datatracker.ietf.org/wg/pmol/charter/. Accessed on 3 March 2011
  31. 31.
    RIPE Atlas project. https://labs.ripe.net/atlas. Accessed on 3 March 2011
  32. 32.
  33. 33.
    RFC 3547: The group domain of interpretationGoogle Scholar
  34. 34.
    Yang H-G (2010) Overview: emerging technologies on giga-scale FPGA implementation. In: Proceedings of 2010 IEEE international symposium, Circuits and systems (ISCAS), Paris, France, pp 1428–1431. Issue date 30 May 2010Google Scholar
  35. 35.
    Canon Hack Development Kit (CHDK). http://chdk.wikia.com/wiki/CHDK. Accessed on 3 March 2011
  36. 36.
    RFC 4862: IPv6 stateless address autoconfiguration and the neighbor discovery protocol, specified by RFC 4861 (RFC 4861, neighbor discovery for IP v6)Google Scholar
  37. 37.
    Cerami E (2002) Web services essentials. O’Reilly Press, Beijing. ISBN 0-596-00224-6Google Scholar
  38. 38.
    DNS Service Discovery (DNS-SD). http://www.dns-sd.org. Accessed on 3 March 2011
  39. 39.
    RFC 2782: A DNS RR for specifying the location of servicesGoogle Scholar
  40. 40.
    RFC 4861: Neighbor discovery for IP version 6Google Scholar
  41. 41.
    RFC 5942: IPv6 subnet model: the relationship between links and subnet prefixesGoogle Scholar
  42. 42.
    RFC 3920: Extensible Messaging and Presence Protocol (XMPP) coreGoogle Scholar
  43. 43.
    XEP-0030. http://xmpp.org/extensions/xep-0030.html. Accessed on 3 March 2011
  44. 44.
    jinni.org. http://www.jini.org. Accessed on 3 March 2011
  45. 45.
    UPnP standard: ISO/IEC 29341-1:2008Google Scholar
  46. 46.
    Organization for the Advancement of Structured Information (OASIS): UDDI v3. http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=uddi-spec
  47. 47.
    Goldszmidt G, Yemini Y, Yemini S. (1991) Network management by delegation: the MAD approach. In: Proceedings of the 1991 conference of the centre for advanced studies on collaborative research, CASCON ‘91, Toronto, Ontario, CanadaGoogle Scholar
  48. 48.
    Goldszmidt G, Yemini Y (1995) Distributed management by delegation. In: Proceedings of the 15th international conference on distributed computing systems, ICDCS ‘95 Vancouver, British Columbia, CanadaGoogle Scholar
  49. 49.
    Schönwälder J (1997) Network management by delegation – from research prototypes towards standards. Comput Network ISDN Syst 29(15):1843–1852CrossRefGoogle Scholar
  50. 50.
    RFC 2592: Definitions of managed objects for the delegation of management scriptsGoogle Scholar
  51. 51.
    RFC 3165: Definitions of managed objects for the delegation of management scriptsGoogle Scholar
  52. 52.
    RFC 2925: Definitions of managed objects for remote ping, traceroute, and lookup operationsGoogle Scholar
  53. 53.
    RFC 4560: Definitions of managed objects for remote ping, traceroute, and lookup operationsGoogle Scholar
  54. 54.
    RFC 3175: Aggregation of RSVP for IPv4 and IPv6 reservationsGoogle Scholar
  55. 55.
    RFC 5350: IANA considerations for the IPv4 and IPv6 router alert optionsGoogle Scholar
  56. 56.
    RFC 3140: Per hop behavior identification codesGoogle Scholar
  57. 57.
    RFC 3246: An expedited forwarding PHBGoogle Scholar
  58. 58.
    RFC 4594: Configuration guidelines for diffServ service classesGoogle Scholar
  59. 59.
    RFC 2597: Assured forwarding PHB groupGoogle Scholar
  60. 60.
    RFC 3260: New terminology and clarifications for diffservGoogle Scholar
  61. 61.
    RFC 2638: A two-bit differentiated services architecture for the internetGoogle Scholar
  62. 62.
    RFC 2748: The COPS protocolGoogle Scholar
  63. 63.
    RFC 3084: COPS usage for policy provisioning, COPS-PRGoogle Scholar
  64. 64.
    RFC 4741: NETCONF configuration protocolGoogle Scholar
  65. 65.
    RFC 4743: Using NETCONF over the simple object access protocol (SOAP)Google Scholar
  66. 66.
    Franco TF, Lima WQ, Silvestrin G, Pereira RC, Almeida MJB, Tarouco LMR, Granville LZ, Beller A, Jamhour E, Fonseca M Substituting COPS-PR: an evaluation of NETCONF and SOAP for policy provisioning. In: Seventh IEEE international workshop on policies for distributed systems and networks (POLICY’06), June 05–June 07Google Scholar
  67. 67.
    McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J (2008) OpenFlow: enabling innovation in campus networks. White Paper, OpenFlow Consortium. http://www.openflowswitch.org/. Accessed 14 Mar 2008
  68. 68.
    Open Networking Foundation (ONF). http://www.opennetworkingfoundation.org/. OpenFlow specification v1.1.0. http://www.openflow.org/documents/openflow-spec-v1.1.0.pdf
  69. 69.
    Hurwitz J (1998) Sorting out middleware. DBMS Archiv 11(1):10MathSciNetGoogle Scholar
  70. 70.
    Luckham DC, Frasca B (1998) Complex event processing in distributed systems. Stanford University, 18 Aug 1998Google Scholar
  71. 71.
    Naur P, Randell B (eds) (1968) Software engineering: report of a conference sponsored by the NATO Science Committee. Garmisch, Germany, 7–11 Oct 1968, Brussels, Scientific Affairs Division, NATO (1969) 231 ppGoogle Scholar
  72. 72.
    Birman K, Joseph T (1987) Exploiting virtual synchrony in distributed systems. In: Proceedings of the eleventh ACM symposium on operating systems principles (SOSP ‘87), Austin, Texas, USA, pp 123–138Google Scholar
  73. 73.
  74. 74.
    IBM’s manifesto of “autonomic computing”. http://www.research.ibm.com/autonomic/manifesto. Accessed on 10 March 2011
  75. 75.
    IBM’s 8 elements of autonomic computing. http://www.research.ibm.com/autonomic/overview/elements.html Accessed on 10 March 2011
  76. 76.
    Kephart JO, Chess DM (2003) The vision of autonomic computing. IBM Thomas J. Watson Research Center. Published by the IEEE Computer Society Magazine, Jan 2003. http://www.research.ibm.com/autonomic/research/papers/AC_Vision_Computer_Jan_2003.pdf. Accessed on 10 March 2011
  77. 77.
    Jacob B, Lanyon-Hogg R, Nadgir D, Yassin AF (2004) “A practical guide to the IBM autonomic computing toolkit. Technical report, IBM International Technical Support OrganizationGoogle Scholar
  78. 78.
    Dobson S et al (2006) A survey of autonomic communications. ACM Trans Auton Adapt Syst 1(2):223–259MathSciNetCrossRefGoogle Scholar
  79. 79.
    Dargie W Context-aware computing and self-managing systems. Chapman & Hall/CRC Studies in Informatics, Boca RatonGoogle Scholar
  80. 80.
    Schollmeier R (2001) A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications. In: Proceedings of the IEEE 2001 international conference on peer-to-peer computing (P2P2001), Linköping, 27–29 Aug 2001Google Scholar
  81. 81.
    IETF Peer-to-Peer Session Initiation Protocol (P2PSIP) WG. http://tools.ietf.org/wg/P2Psip/
  82. 82.
    Maymounkov P, Mazieres D (2002) Kademlia: a peer-to-peer information system based on the XOR Metric. In: Electronic proceedings for the 1st international workshop on peer-to-peer systems. MIT Faculty Club, Cambridge, MA, 07 Mar 2002Google Scholar
  83. 83.
    Lua K, Crowcroft J, Pias M, Sharma R, Lim S (2005) A survey and comparison of peer-to-peer overlay network schemes. IEEE Surv 7(2):72–93, second quarterCrossRefGoogle Scholar
  84. 84.
    Morariu C, Racz P, Stiller B (2010) SCRIPT: a framework for scalable real-time IP flow record analysis. In: Network operations and management symposium (NOMS), 2010 IEEE, 19–23 Apr 2010, pp 278–285Google Scholar
  85. 85.
    Gribble SD, et al (2000) Scalable, distributed data structures for internet service construction. In: Proceedings of the 4th conference on symposium on operating system design & implementation, San Diego, California, USA vol 4, pp 22Google Scholar
  86. 86.
    Forestiero A, Leonardi E, Mastroianni C, Meo M (2010) Self-chord: a bio-inspired P2P framework for self-organizing distributed systems. IEEE/ACM Trans Netw 18(5):1651–1664CrossRefGoogle Scholar
  87. 87.
    Chervenak A, Foster I, Kesselman C, Salisbury C, Tuecke S (2000) The data grid: towards an architecture for the distributed management and analysis of large scientific datasets. J Netw Comput Appl 23(3):187–200, 2001 (based on conference publication from Proceedings of NetStore Conference 1999)Google Scholar
  88. 88.
    Foster I, Kesselman C (eds) (1999) The grid: blueprint for a new computing infrastructure. Morgan Kaufmann, San FranciscoGoogle Scholar
  89. 89.
    Foster I, Kasselman C, Tuecke S (2001) The anatomy of the grid: enabling scalable virtual organizations. In: Proceedings of the 1st international symposium on cluster computing and the grid (CCGRID 2001, IEEE), WashingtonGoogle Scholar
  90. 90.
    SETI@home, Berkeley Space Science Lab. http://setiathome.berkeley.edu/. Accessed on 10 March 2011
  91. 91.
    Sandvine. “Fall 2010 global internet phenomena reportGoogle Scholar
  92. 92.
    Jordan S (2009) Implications of Internet architecture on net neutrality. ACM Trans Internet Technol 9(2):5:1–5:28, TOIT homepage archive, MayCrossRefGoogle Scholar
  93. 93.
    Crowcroft J (2007) Net neutrality: the technical side of the debate: a white paper. ACM SIGCOMM Comput Commun Rev Homepage Archiv 37(1):49–56CrossRefGoogle Scholar
  94. 94.
    Soule A, Salamatian K, Taft N, Emilion R, Papagiannaki K (2004) Flow classification by histograms or how to go on safari in the internet. In: Proceedings of ACM sigmetrics, New YorkGoogle Scholar
  95. 95.
    Mori T, Uchida M, Kawahara R (2004) Identifying elephant flows through periodically sampled packets.In: Proceedings ACM SIGCOMM, Seattle, Washington, USA, pp 115–120Google Scholar
  96. 96.
    Skaanning C (2005) The costs and benefits of customer self-service. The Wise Marketer, DenmarkGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.HPCGHildenGermany

Personalised recommendations