A Management Architecture for Active Networks

Giuseppe Lo Re, Giuseppe Lo Re, Giuseppe Di Di Fatta

Research output: Contribution to conferenceOtherpeer-review

9 Citations (Scopus)


We present an architecture for network and applications management, which is based on the active networks paradigm and shows the advantages of network programmability. The stimulus to develop this architecture arises from an actual need to manage a cluster of active nodes, where it is often required to redeploy network assets and modify node connectivity. In our architecture, a remote front-end of the managing entity allows the operator to design new network topologies, to check the status of the nodes and to configure them. Moreover, the proposed framework allows to explore an active network, to monitor the active applications, to query each node and to install programmable traps. In order to take advantage of the active networks technology, we introduce active SNMP-like MIBs and agents, which are dynamic and programmable. The programmable management agents make tracing distributed applications a feasible task. We propose a general framework that can interoperate with any active execution environment. In this framework, both the manager and the monitor front-ends communicate with an active node (the Active Network Access Point) through the XML language. A gateway service performs the translation of the queries from XML to an active packet language and injects the code in the network. We demonstrate the implementation of an active network gateway for PLAN (Packet Language for Active Networks) in a forty active nodes testbed. Finally, we discuss an application of the active management architecture to detect the causes of network failures by tracing network events in time.
Original languageEnglish
Number of pages8
Publication statusPublished - 2002

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Hardware and Architecture


Dive into the research topics of 'A Management Architecture for Active Networks'. Together they form a unique fingerprint.

Cite this