Emulab is a network testbed, giving researchers a wide range of environments in which to develop, debug, and evaluate their systems. The Emulab facility at the University of Utah has over 600 PCs, a hundred wireless devices, and dozens of switches. It is used by thousands of researchers at hundreds of institutions worldwide. The software that we built to run Emulab is open source, and is used as part of dozens of network testbeds across the globe.
ProtoGENI is an NSF-funded and GPO-funded prototype implementation and deployment of GENI, led by the Flux research group at the University of Utah, and largely based on our Emulab software.
In the TCloud project we are developing a self-defending, self-evolving, and self-accounting trustworthy cloud platform. Our approach in realizing TCloud holds to the following five tenets: defense in depth, least authority, explicit orchestration of security function, moving-target defense, and verifiable accountability.
To enable the fundamental research and innovation demanded to advance mobile networking beyond the state-of-the-art, a new facility called PhantomNet is being developed and coupled with the Emulab testbed at the University of Utah. PhantomNet will be a fully programmable end-to-end testbed with unique features to facilitate research efforts at the intersection of mobile networking, cloud computing and software defined networking.
We are open for business! Go here: PhantomNet Portal.
We are pleased to host the first PhantomNet User's Workshop.
Join us for a PhantomNet based totorial on "4G to 5G and beyond: From theory to practice" at IEEE CCNC 2016.
We are developing an SDN End-to-end Application Containment ArchitecTure (SeaCat).
Our approach involves extending SDN primitives into end-points, adapting existing mechanisms for end-point application containment and orchestrating the creation of these contexts based on policies associated with specific health care applications.
Operational complexity counts among the top challenges faced by network operators. This complexity arises, in part, because of the scale and continued growth of modern networks, the inherent complexity and intricate dependencies of the protocols that these networks run, and the increased expectations of network users due to the increasing importance that network connectivity and networked services play in society.
To address these deficiencies, we propose to realize a Knowledge-Centric Software-Defined Network Management and Operations architecture (KnowOps). Our approach is knowledge-centric in that we aim to systematically capture and reason about the knowledge needed to manage and operate a network. Our approach is software-defined in that we aim to realize a management and operations framework that can easily and safely evolve together with changing networks. As such, we are applying a software-defined approach to the management and operations of all networks, including but not limited to software-defined networks.
Many of the ideas that drive modern cloud computing, such as server virtualization, network slicing, and robust distributed storage, arose from the research community. Despite this success, today’s clouds have become environments that are unsuitable for moving this research agenda forward—they have particular, unmalleable implementations of these ideas “baked in.” CloudLab will not be a cloud; it will be large-scale, distributed scientific infrastructure on top of which many different clouds can be built.
High performance edge networks, such as fiber-to- the-premises (FTTP), are increasingly being deployed by municipalities and communities to support advanced services and applications. The complexity of operating these networks often means that their full potential is not being reached and they are relegated to being fast access pipes to the Internet. In this work we are developing a dynamic and secure open service edge network architecture, called OpenEdge. OpenEdge provides a control architecture that automates the configuration of the edge network in a cloud-like manner to simplify the introduction of new network services and applications.
CapNet, will provide a practical platform for enforcing strong isolation for scientific workflows. Fine-grained nature of CapNet provides support for the principle of least authority. Individual scientific workflows, and even their tasks will run with a minimal set of privileges required for completing their goals, but not more. The basis for CapNet’s design is (1) strong isolation of network activities with the mechanisms of software defined networks (SDN) and (2) mediation of all communication between network hosts by a capability access control model.
University campus infrastructures count among the most complex and sophisticated information technology (IT) deployments; often combining a mix of enterprise, academic, research, and healthcare environments, each having their own distinct security, privacy, and priority policies. In this project we address these challenges through a collaborative research effort, called NetSecOps (Network Security Operations), that attempts to assist IT security teams by automating many of the operational steps that are tedious, error-prone, and otherwise problematic in current campus networks.
This project addresses the unique challenges associated with rural smart and connected cities and specifically the public safety needs of such communities. Our open access/multi-service approach will allow municipalities to deploy a variety of services, thus addressing concerns about the economic feasibility of deploying broadband services in small and rural communities, while at the same time ensuring that public safety applications can function in this environment. Our aim is that our work would serve both as a living lab in which to explore smart and connected applications for rural cities and also to serve as a model deployment for these smaller communities.
This is a collaborative project with the City of Ammon, ID.
recent networking publications (see all)