1 010/02 Aspect-Oriented Interceptors Pattern 1/4/2016 ACP4IS 2003John Zinky BBN Technologies Aspect-Oriented Interceptors Pattern Dynamic Cross-Cutting.

Slides:



Advertisements
Similar presentations
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Advertisements

Introduction 1-1 Chapter 3 Transport Layer Intro and Multiplexing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
OSI MODEL Maninder Kaur
Traffic Shaping Why traffic shaping? Isochronous shaping
CSE Computer Networks Prof. Aaron Striegel Department of Computer Science & Engineering University of Notre Dame Lecture 20 – March 25, 2010.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
CSIS0402 System Architecture K.P. Chow University of Hong Kong.
1 Improving the Performance of Distributed Applications Using Active Networks Mohamed M. Hefeeda 4/28/1999.
1 Quality Objects: Advanced Middleware for Wide Area Distributed Applications Rick Schantz Quality Objects: Advanced Middleware for Large Scale Wide Area.
© nCode 2000 Title of Presentation goes here - go to Master Slide to edit - Slide 1 Reliable Communication for Highly Mobile Agents ECE 7995: Term Paper.
OSMOSIS Final Presentation. Introduction Osmosis System Scalable, distributed system. Many-to-many publisher-subscriber real time sensor data streams,
1 8/99 IMIC Workshop 6/22/2015 New Network ServicesJohn Zinky BBN Technologies The Need for A Network Resource Status Service IMIC Workshop 1999 Boston.
Highly Dynamic Destination- Sequenced Distance-Vector Routing (DSDV) for Mobile Computers C. E. Perkins & P. Bhagwat Presented by Paul Ampadu.
Multicast Communication
Or, Providing High Availability and Adaptability in a Decentralized System Tapestry: Fault-resilient Wide-area Location and Routing Issues Facing Wide-area.
Network Topologies.
Distributed Process Implementation Hima Mandava. OUTLINE Logical Model Of Local And Remote Processes Application scenarios Remote Service Remote Execution.
Network Architecture and Protocol Concepts. Network Architectures (1) The network provides one or more communication services to applications –A service.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
1 4/20/98ISORC ‘98 BBN Technologies Specifying and Measuring Quality of Service in Distributed Object Systems Joseph P. Loyall, Richard E. Schantz, John.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 12 Slide 1 Distributed Systems Architectures.
Internet Traffic Management. Basic Concept of Traffic Need of Traffic Management Measuring Traffic Traffic Control and Management Quality and Pricing.
PA3: Router Junxian (Jim) Huang EECS 489 W11 /
Item 2005 L A Rønningen. Reservation Model Pessimistic or Optimistic Approach 1-N Senders and 1-M Receivers Sender-oriented or Receiver-oriented Immediate.
I T & S A e r o s p a c eD e f e n c e Content adaptation for gradual Quality of Service Vania Conan, Arnaud Pierre Thales
BBN Technologies Craig Rodrigues Gary Duzan QoS Enabled Middleware: Adding QoS Management Capabilities to the CORBA Component Model Real-time CCM Meeting.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
MILCOM 2001 October page 1 Defense Enabling Using Advanced Middleware: An Example Franklin Webber, Partha Pal, Richard Schantz, Michael Atighetchi,
1 06/00 Questions 10/6/2015 QoS in DOS ECOOP 2000John Zinky BBN Technologies ECOOP 2000 Workshop on Quality of Service in Distributed Object Systems
The OSI Model An ISO (International standard Organization) that covers all aspects of network communications is the Open System Interconnection (OSI) model.
Defense by Amit Saha March 25 th, 2004, Rice University ANTS : A Toolkit for Building and Dynamically Deploying Network Protocols David Wetherall, John.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
WDMS 2002 June page 1 Middleware Policies for Intrusion Tolerance QuO Franklin Webber, Partha Pal, Chris Jones, Michael Atighetchi, and Paul Rubel.
The OSI Model.
1 APOD 10/19/2015 DOCSEC 2002Christopher Jones Defense Enabling Using QuO: Experience in Building Survivable CORBA Applications Chris Jones Partha Pal,
1 06/ /21/2015 ECOOP 2000 Workshop QoS in DOSJohn Zinky BBN Technologies Quality Objects (QuO) Middleware Framework ECOOP 2000 Workshop QoS in DOS.
Heavy and lightweight dynamic network services: challenges and experiments for designing intelligent solutions in evolvable next generation networks Laurent.
© 2002, Cisco Systems, Inc. All rights reserved..
MODULE I NETWORKING CONCEPTS.
© 2004 Mercury Computer Systems, Inc. FPGAs & Software Components Graham Bardouleau & Jim Kulp Mercury Computer Systems, Inc. High Performance Embedded.
SCALABLE EVOLUTION OF HIGHLY AVAILABLE SYSTEMS BY ABHISHEK ASOKAN 8/6/2004.
Client Call Back Client Call Back is useful for multiple clients to keep up to date about changes on the server Example: One auction server and several.
1 Integrating security in a quality aware multimedia delivery platform Paul Koster 21 november 2001.
Module 10: How Middleboxes Impact Performance
Routing and Routing Protocols
Coordination Artifacts in Multi-Agent Systems April 19, 2005 IEEE KIMAS 2005 Sarah Siracuse, John Zinky, Richard Shapiro
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
Anonymity - Background R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
1 BBN Technologies Quality Objects (QuO): Adaptive Management and Control Middleware for End-to-End QoS Craig Rodrigues, Joseph P. Loyall, Richard E. Schantz.
Complementary Methods for QoS Adaptation in Component-based Multi-Agent Systems MASS 2004 August 30, 2004 John Zinky, Richard Shapiro, Sarah Siracuse BBN.
SelfCon Foil no 1 Variability in Self-Adaptive Systems.
AMQP, Message Broker Babu Ram Dawadi. overview Why MOM architecture? Messaging broker like RabbitMQ in brief RabbitMQ AMQP – What is it ?
1 Java-enable Network Devices Programmable Network Node: Applications 1 Technology Center, Enterprise Solutions, Nortel Networks 2 Department of Computer.
Institute for Visualization and Perception Research 1 © Copyright 1999 Haim Levkowitz Java-based mobile agents.
QoS in Mobile IP by Preethi Tiwari Chaitanya Deshpande.
Designing a Middleware Server for Abstract Database Connection.
CEN-4015, Software Project, Spring 2006 Transparent Shaping of Existing Software to Support Pervasive and Autonomic Computing S. Masoud Sadjadi Autonomic.
EE 122: Integrated Services Ion Stoica November 13, 2002.
Chapter 5 Network and Transport Layers
Middleware Policies for Intrusion Tolerance
Programming with ANTS ANTS facilitates protocols construction and deployment Demonstrate some examples using Mobility services Multicasting.
Network Load Balancing Topology
EE 122: Lecture 16/17 (Integrated Services)
Network Virtualization
Presentation transcript:

1 010/02 Aspect-Oriented Interceptors Pattern 1/4/2016 ACP4IS 2003John Zinky BBN Technologies Aspect-Oriented Interceptors Pattern Dynamic Cross-Cutting Using Conventional Languages ACP4IS 2003 March 17, 2003 John Zinky Richard Shapiro BBN Technologies This work was sponsored by the DARPA Ultralog Program under Contract MDA C

2 010/02 Aspect-Oriented Interceptors Pattern 1/4/2016 ACP4IS 2003John Zinky BBN Technologies Problem: Add Denial of Service (DOS) Protection to the Cougaar Distributed Agent Middleware DOS Sub-system is developed and modified by multiple groups DOS Sub-systems must be removable at config-time DOS Sub-systems dynamically changes defenses at run-time Sensors Socket Fuse CPU Capacity Detection Bandwidth Detection Defenses Compression Bandwidth Reservation Encryption Traffic Masking Policy External Threat Level Network Properties Host Node Agent Message Transport Thread Service Links Intrusion Detection Links DOS Policy Firewall Security Policy

3 010/02 Aspect-Oriented Interceptors Pattern 1/4/2016 ACP4IS 2003John Zinky BBN Technologies DOS Protection Must be Inserted in Multiple Places in the Message Processing Flow DOS functionality cross-cuts the decomposition based on processing messages Node Message Transport Service (Send-side) Agent BB Logic Provider Message Manager Agent BB Logic Provider Message Manager Send Queue Router Destination Queue Link Protocol Destination Transport Destination Transport RMI Link Protocol Destination Link Destination Transport Destination Transport Destination Link Node Message Transport Service (Receive-side) Agent BB Logic Provider Message Manager Agent BB Logic Provider Message Manager Deliverer RMI Link Protocol Link Protocol MTImpl Receive Port RMIRMI Registry Name Support Loop Back LP Generic Link Aspect Support Receive Link Receive Link SendLink MTMT RMIRMI Destination Queue Link Protocol Factory

4 010/02 Aspect-Oriented Interceptors Pattern 1/4/2016 ACP4IS 2003John Zinky BBN Technologies Aspect Component Inserts Itself into the Data Flow and Maintains its Own State and Services Node Agent BBBB Message Transport Service Provider Link Protocol (e.g RMI) ServiceBroker Route Send Transport Message Transport Receiver Node Agent Receive Deliver Message Transport Sender Agent Binder Message Transport Service Provider Service Broker Agent Binder LPLP MMMM SendQSendQ RouteRoute DestQDestQ Dest Link BBBB LPLP MMMM RecvLRecvL DelivrDelivr MTImpl Hold Forward RMIOutput Stream Deliver Link Protocol MTSPrxMTSPrx Service Broker Aspect Services MT RM Input Stream

5 010/02 Aspect-Oriented Interceptors Pattern 1/4/2016 ACP4IS 2003John Zinky BBN Technologies When A Station is Created, Aspects Are Allowed to Insert a Delegate into the Call Tree The Client is given a pointer to the Delegate, not original Station The Delegate is usually an inner class of the Aspect Client Station Substrate Station Factory Create Station() Service Station Initialize Station() Enhanced Service Service Delegate Add Delegate() Aspect Initialize Delegate()

6 010/02 Aspect-Oriented Interceptors Pattern 1/4/2016 ACP4IS 2003John Zinky BBN Technologies Multiple Aspects can be Inserted Each Handling Some Facet QoS Adaptation Interactions between Aspects is –Direct via services –Indirect via delegate behavior Order may be important Station Aspect Object QoS State QoS Services Work-flow between stations Station Aspect Object QoS State QoS Services Aspect Delegates

7 010/02 Aspect-Oriented Interceptors Pattern 1/4/2016 ACP4IS 2003John Zinky BBN Technologies Quality Objects (QuO) Can Be Used to Structure the Implementation of Aspects Delegates can be used to or observe or add behavior QuO uses Quality Description Languages to code generate Delegates and Contracts QuO Delegate QuO Delegate Station Sys Cond QuO Contract QuO Contract external Sys Cond Sys Cond external Station See Aspect

8 010/02 Aspect-Oriented Interceptors Pattern 1/4/2016 ACP4IS 2003John Zinky BBN Technologies Example 1: Statistics can easily be collected between any of the Stations The Aspect Contains all statistics Processing and storage Statistics can be Correlated from multiple Stations –Delay measurements, Outstanding Messages, HeardFrom Client Station Aspect Service Station Observed Service Statistics Collection Statistic Storage Statistic Processing Statistic Export External Service

9 010/02 Aspect-Oriented Interceptors Pattern 1/4/2016 ACP4IS 2003John Zinky BBN Technologies Example 2: Multicast Aspect Implements Both the Sender and Receiver Sides of the Protocol The sender side transforms the clients multicast request into many copies addressed to all the nodes (in the group). The receiver side copy the message again and delivers it to all the local clients (in the group) While the code is in one place, the instances are distributed RouterDeliverer Send Link Message Copy Message Copy Receive Link Receive Link Receive Link Remote Node Lookup Local Agent Lookup SenderReceiver

10 010/02 Aspect-Oriented Interceptors Pattern 1/4/2016 ACP4IS 2003John Zinky BBN Technologies Example 3: Message Compression Must Coordinate Processing on Both sides Compression is enable by considering the network bandwidth and CPU capacity. Attributes are added to the message, so the remote compression aspect can dynamically add a Delegate to decompress. Serialize De Serialize Dest LinkCompress De Compress Deliverer Compress Policy Sender Receiver Tag Message Metrics Service In-band Meta Data added by Aspect

11 010/02 Aspect-Oriented Interceptors Pattern 1/4/2016 ACP4IS 2003John Zinky BBN Technologies At Config Time, Aspects are Mixed and Matched to Get the Desired Adaptive Behavior Agent BBBB Message Transport Server Impl Link Protocol Impl Route Send Receive Deliver LPLP MMMM SendQSendQ RouteRoute DestQDestQ Dest Link BBBB LPLP MMMM RecvLRecvL RecvQRecvQ MTImpl Hold Forward Deliver MTSPrxMTSPrx Statistic Signature Topology Order Name Support Compress

12 010/02 Aspect-Oriented Interceptors Pattern 1/4/2016 ACP4IS 2003John Zinky BBN Technologies Agent Technology is used to Distribute the Management of DOS Protection

13 010/02 Aspect-Oriented Interceptors Pattern 1/4/2016 ACP4IS 2003John Zinky BBN Technologies Conclusions 1.The Aspect-oriented Interceptors Pattern allows the dynamic insertion of behavior using conventional programming language 2.28 Aspects were use in the 2002 Ultralog assessment 1.100s Agent, 50 hosts and nodes = 2.Security, mobility, robustness, load balancing 3.The Aspects were developed by different groups 4.The Aspects can be mixed and matched to configure the desired behavior 1.Embedded Cougaar can remove 90% of code, run on iPAQ class processor 5.The DOS protection system changes its defenses based on the current running environment of the system 6.DOS Adaptive Behavior Injected at three Level 1.Language Level -> Generation of QuO Delegates and Contracts 2.Component Level -> Aspect Interceptors Pattern 3.Agent Level -> Distributed DOS policy management