Flux Research Group / School of Computing

networking people

Sneha Kumar Kasera
Sneha Kumar Kasera
Affiliated Faculty
Aki Nakao
Aki Nakao
Affiliated Faculty
Jonathon Duerig
Jonathon Duerig
Research staff
Mike Hibler
Mike Hibler
Research staff
David Johnson
David Johnson
Research staff
Leigh Stoller
Leigh Stoller
Research staff
Kirk Webb
Kirk Webb
Research staff
Gary Wong
Gary Wong
Research staff
Ghazal Abdollahi
Ghazal Abdollahi
PhD student
Zahra Emadi
Zahra Emadi
PhD student
Pavani Kuppili
Pavani Kuppili
PhD student
Axe Tang
Axe Tang
Undergraduate student

networking projects

Emulab Emulab

Emulab is a network testbed, giving researchers a wide range of environments in which to develop, debug, and evaluate their systems. The Emulab facility at the University of Utah has over 600 PCs, a hundred wireless devices, and dozens of switches. It is used by thousands of researchers at hundreds of institutions worldwide. The software that we built to run Emulab is open source, and is used as part of dozens of network testbeds across the globe.

ProtoGENI ProtoGENI

ProtoGENI is an NSF-funded and GPO-funded prototype implementation and deployment of GENI, led by the Flux research group at the University of Utah, and largely based on our Emulab software.

TCloud TCloud

In the TCloud project we are developing a self-defending, self-evolving, and self-accounting trustworthy cloud platform. Our approach in realizing TCloud holds to the following five tenets: defense in depth, least authority, explicit orchestration of security function, moving-target defense, and verifiable accountability.

PhantomNet PhantomNet

To enable the fundamental research and innovation demanded to advance mobile networking beyond the state-of-the-art, a new facility called PhantomNet is being developed and coupled with the Emulab testbed at the University of Utah. PhantomNet will be a fully programmable end-to-end testbed with unique features to facilitate research efforts at the intersection of mobile networking, cloud computing and software defined networking.   

We are open for business! Go here: PhantomNet Portal.

We are pleased to host the first PhantomNet User's Workshop.

Join us for a PhantomNet based totorial on "4G to 5G and beyond: From theory to practice" at IEEE CCNC 2016.

SDN End-to-end Application Containment SDN End-to-end Application Containment

We are developing an SDN End-to-end Application Containment ArchitecTure (SeaCat).

Our approach involves extending SDN primitives into end-points, adapting existing mechanisms for end-point application containment and orchestrating the creation of these contexts based on policies associated with specific health care applications.

KnowOps: Network Management, Software Defined KnowOps: Network Management, Software Defined

Operational complexity counts among the top challenges faced by network operators. This complexity arises, in part, because of the scale and continued growth of modern networks, the inherent complexity and intricate dependencies of the protocols that these networks run, and the increased expectations of network users due to the increasing importance that network connectivity and networked services play in society.

To address these deficiencies, we propose to realize a Knowledge-Centric Software-Defined Network Management and Operations architecture (KnowOps). Our approach is knowledge-centric in that we aim to systematically capture and reason about the knowledge needed to manage and operate a network. Our approach is software-defined in that we aim to realize a management and operations framework that can easily and safely evolve together with changing networks. As such, we are applying a software-defined approach to the management and operations of all networks, including but not limited to software-defined networks.

CloudLab CloudLab

Many of the ideas that drive modern cloud computing, such as server virtualization, network slicing, and robust distributed storage, arose from the research community. Despite this success, today’s clouds have become environments that are unsuitable for moving this research agenda forward—they have particular, unmalleable implementations of these ideas “baked in.” CloudLab will not be a cloud; it will be large-scale, distributed scientific infrastructure on top of which many different clouds can be built.

OpenEdge: Open Service Edge Network OpenEdge: Open Service Edge Network

 

High performance edge networks, such as fiber-to- the-premises (FTTP), are increasingly being deployed by municipalities and communities to support advanced services and applications. The complexity of operating these networks often means that their full potential is not being reached and they are relegated to being fast access pipes to the Internet. In this work we are developing a dynamic and secure open service edge network architecture, called OpenEdge. OpenEdge provides a control architecture that automates the configuration of the edge network in a cloud-like manner to simplify the introduction of new network services and applications.

 

CapNet: Capability Enabled Networking

CapNet, will provide a practical platform for enforcing strong isolation for scientific workflows. Fine-grained nature of CapNet provides support for the principle of least authority. Individual scientific workflows, and even their tasks will run with a minimal set of privileges required for completing their goals, but not more. The basis for CapNet’s design is (1) strong isolation of network activities with the mechanisms of software defined networks (SDN) and (2) mediation of all communication between network hosts by a capability access control model.

 

NetSecOps : Network Security Operations NetSecOps : Network Security Operations

University campus infrastructures count among the most complex and sophisticated information technology (IT) deployments; often combining a mix of enterprise, academic, research, and healthcare environments, each having their own distinct security, privacy, and priority policies. In this project we address these challenges through a collaborative research effort, called NetSecOps (Network Security Operations), that attempts to assist IT security teams by automating many of the operational steps that are tedious, error-prone, and otherwise problematic in current campus networks.

SafeEdge: Public Safety with an Open Muni Network SafeEdge: Public Safety with an Open Muni Network

This project addresses the unique challenges associated with rural smart and connected cities and specifically the public safety needs of such communities. Our open access/multi-service approach will allow municipalities to deploy a variety of services, thus addressing concerns about the economic feasibility of deploying broadband services in small and rural communities, while at the same time ensuring that public safety applications can function in this environment. Our aim is that our work would serve both as a living lab in which to explore smart and connected applications for rural cities and also to serve as a model deployment for these smaller communities.

This is a collaborative project with the City of Ammon, ID.

recent networking publications (see all)

An NSF REU Site Based on Trust and Reproducibility of Intelligent Computation: Experience Report
Mary Hall, Ganesh Gopalakrishnan, Eric Eide, Johanna Cohoon, Jeff M. Phillips, Mu Zhang, Shireen Y. Elhabian, Aditya Bhaskara, Harvey Dam, Artem Yadrov, Tushar Kataria, Amir Mohammad Tavakkoli, Sameeran Joshi, and Mokshagna Sai Teja Karanam
In SC-W 2023 [ bibtex ]
OZTrust: An O-RAN Zero-Trust Security System
Hao (Harry) Jiang, Hyunseok Chang, Sarit Mukherjee, and Jacobus (Kobus) Van der Merwe
In IEEE NFV-SDN 2023 [ pdf :: bibtex ]