Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Tilman Wolf is active.

Publication


Featured researches published by Tilman Wolf.


international symposium on performance analysis of systems and software | 2000

CommBench-a telecommunications benchmark for network processors

Tilman Wolf; Mark A. Franklin

The paper presents a benchmark, CommBench, for use in evaluating and designing telecommunications network processors. The benchmark applications focus on small, computationally intense program kernels typical of the network processor environment. The benchmark is composed of eight programs, four of them oriented towards packet header processing and four oriented towards data stream processing. The benchmark is defined and characteristics such as instruction frequencies, computational complexity, and cache performance are presented. These measured characteristics are compared to the standard SPEC benchmark. Three examples are presented indicating how CommBench can aid in the design of a single chip network multiprocessor.


IEEE Network | 1999

A scalable high-performance active network node

Dan Decasper; Bernhard Plattner; Guru M. Parulkar; Sumi Choi; John D. DeHart; Tilman Wolf

Active networking in environments built to support link rates up to several gigabits per second poses many challenges. One such challenge is that the memory bandwidth and individual processing power of the routers microprocessors limit the total available processing power of a router. In this article we identify and describe three components, which promise a high-performance active network solution. This implements the key features typical to active networking, such as automatic protocol deployment and application specific processing, and it is suitable for a gigabit environment. First, we describe the hardware of the active network node (ANN), a scalable high-performance platform based on off-the-shelf CPUs connected to a gigabit ATM switch backplane. Second, we introduce the ANNs modular, extensible, and highly efficient operating system (NodeOS). Third, we describe an execution environment running on top of the NodeOS, which implements a novel large-scale active networking architecture called distributed code caching.


IEEE Journal on Selected Areas in Communications | 2001

Design issues for high-performance active routers

Tilman Wolf; Jonathan S. Turner

Modern networks require the flexibility to support new protocols and network services without changes in the underlying hardware. Routers with general-purpose processors can perform data path packet processing using software that is dynamically distributed. However, custom processing of packets at link speeds requires immense computational power. This paper proposes a design of a scalable, high-performance active router. Multiple network processors with cache and memory on a single application specific integrated circuit are used to overcome the limitations of traditional single processor systems. The proposed design is used as a vehicle for studying the key issues that must be resolved to allow active networking to become a mainstream technology. Benchmark measurements are used to put the design in relation to actual application demands.


international conference on computer communications | 2001

Configuring sessions in programmable networks

Sumi Choi; Jonathan S. Turner; Tilman Wolf

The provision of advanced computational services within networks is rapidly becoming both feasible and economical. We present a general approach to the problem of configuring application sessions that require intermediate processing by showing how the session configuration problem can be transformed to a conventional shortest path problem for unicast sessions or to a conventional Steiner tree problem for multicast sessions. We show, through a series of examples, that the method can be applied to a wide variety of different situations.


IEEE Transactions on Education | 2010

Assessing Student Learning in a Virtual Laboratory Environment

Tilman Wolf

Laboratory experience is a key factor in technical and scientific education. Virtual laboratories have been proposed to reduce cost and simplify maintenance of lab facilities while still providing students with access to real systems. It is important to determine if such virtual labs are still effective for student learning. In the assessment of a graduate computer networks course, the author quantifies the amount of learning that is observed in lectures and labs. The results not only show that learning indeed occurs during lab sessions, but almost equally as much (45.9%) as in lectures (54.1%). Also, it is observed that even students who have prior experience in networking benefit from virtual labs.


international conference on computer communications | 2002

Scheduling processing resources in programmable routers

Prashanth Pappu; Tilman Wolf

To provide flexibility in deploying new protocols and services, general-purpose processing engines are being placed in the datapath of routers. Such network processors are typically simple RISC multiprocessors that perform forwarding and custom application processing of packets. The inherent unpredictability of execution time of an arbitrary instruction code poses a significant challenge in providing QoS guarantees for data flows that compete for such processing resources in the network. However, we show that network processing workloads are highly regular and predictable. Using estimates of execution times of various applications on packets of given lengths, we provide a method for admission control and QoS scheduling of processing resources. We present a processor scheduling algorithm called estimation-based fair queuing (EFQ) which uses these estimates, and provides significantly better delay guarantees than processor scheduling algorithms which do not take packet execution times into consideration.


IEEE Transactions on Computers | 2010

Hardware Support for Secure Processing in Embedded Systems

Shufu Mao; Tilman Wolf

The inherent limitations of embedded systems make them particularly vulnerable to attacks. We have developed a hardware monitor that operates in parallel to an embedded processor and detects any attack that causes the embedded processor to deviate from its originally programmed behavior. We explore several different characteristics that can be used for monitoring and quantify trade-offs between these approaches. Our results show that our proposed hash-based monitoring pattern can detect attacks within one instruction cycle at lower memory requirements than traditional approaches that use control flow information.


IEEE Transactions on Very Large Scale Integration Systems | 2008

Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective

Guy Gogniat; Tilman Wolf; Wayne Burleson; Jean-Philippe Diguet; Lilian Bossuet; Romain Vaslin

Embedded systems present significant security challenges due to their limited resources and power constraints. This paper focuses on the issues of building secure embedded systems on reconfigurable hardware and proposes a security architecture for embedded systems (SAFES). SAFES leverages the capabilities of reconfigurable hardware to provide efficient and flexible architectural support for security standards and defenses against a range of hardware attacks. The SAFES architecture is based on three main ideas: (1) reconfigurable security primitives; (2) reconfigurable hardware monitors; and (3) a hierarchy of security controllers at the primitive, system and executive level. Results are presented for reconfigurable AES and RC6 security primitives and highlight the value of such an architecture. This paper also emphasizes that reconfigurable hardware is not just a technology for hardware accelerators dedicated to security primitives as has been focused on by most studies but a real solution to provide high-security and high-performance for a system.


international conference on computer communications and networks | 2006

Service-Centric End-to-End Abstractions in Next-Generation Networks

Tilman Wolf

Next-generation network architectures will be governed by the need for flexibility. Heterogeneous end-systems, novel communication abstractions, and security and manageability challenges will require networks to provide a broad range of services that go beyond the simple store-and-forward capabilities of todays Internet. This paper introduces new abstractions for information transfer and data services in the network, which overcome the constraints of the end-to-end argument that has dominated current network designs. The explicit separation of communication and processing allows the composition of a variety of information transfer patterns that expand the capabilities of the network to meet its next-generation challenges. We discuss implementation issues that arise in this network architecture and present several examples of how applications can utilize the proposed abstractions. This present a first step towards a unified view of the convergence of networking, processing, and their distributed applications.


automation, robotics and control systems | 2002

Design Tradeoffs for Embedded Network Processors

Tilman Wolf; Mark A. Franklin

Demands for flexible processing have moved general-purpose processing into the data path of networks. With the development of System-On-a-Chip technology, it is possible to put a number of processors with memory and I/O components on a single ASIC. We present a performance model of such a system and show how the number of processors, cache sizes, and the tradeoffs between the use of on-chip SRAM and DRAM can be optimized in terms of computation per unit chip area for a given workload. Based on a telecommunications benchmark the results of such an optimization are presented and design tradeoffs for Systems-on-a-Chip are identified and discussed.

Collaboration


Dive into the Tilman Wolf's collaboration.

Top Co-Authors

Avatar

Shashank Shanbhag

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar

Qiang Wu

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar

Anna Nagurney

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar

Ning Weng

Southern Illinois University Carbondale

View shared research outputs
Top Co-Authors

Avatar

Ramaswamy Ramaswamy

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar

Xin Huang

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Russell Tessier

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar

Abhishek Dwaraki

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar

Hao Cai

University of Massachusetts Amherst

View shared research outputs
Researchain Logo
Decentralizing Knowledge