{"title":"ANTS: a toolkit for building and dynamically deploying network protocols","authors":"D. Wetherall, J. Guttag, D. Tennenhouse","doi":"10.1109/OPNARC.1998.662048","DOIUrl":null,"url":null,"abstract":"The authors present a novel approach to building and deploying network protocols. The approach is based on mobile code, demand loading, and caching techniques. The architecture of the system allows new protocols to be dynamically deployed at both routers and end systems, without the need for coordination and without unwanted interaction between co-existing protocols. They describe the architecture and its realization in a prototype implementation. To demonstrate how to exploit the architecture, they present two simple protocols that operate within the prototype to introduce multicast and mobility services into a network that initially lacks them.","PeriodicalId":143696,"journal":{"name":"1998 IEEE Open Architectures and Network Programming","volume":"179 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1998-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"746","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"1998 IEEE Open Architectures and Network Programming","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/OPNARC.1998.662048","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 746
Abstract
The authors present a novel approach to building and deploying network protocols. The approach is based on mobile code, demand loading, and caching techniques. The architecture of the system allows new protocols to be dynamically deployed at both routers and end systems, without the need for coordination and without unwanted interaction between co-existing protocols. They describe the architecture and its realization in a prototype implementation. To demonstrate how to exploit the architecture, they present two simple protocols that operate within the prototype to introduce multicast and mobility services into a network that initially lacks them.