Dirk Kutscher

Personal web page

Archive for the ‘Events’ Category

ICN Update after IETF-99

without comments

Here is a quick (eclectic) summary of recent events in ICN at/around IETF-99 last week. ICNRG met twice: for a full-day meeting on Sunday and for a regular meeting on Wednesday. (Find a list of all past meeting, agendas, meeting materials, and minutes here.)

Edge Computing and ICN

We presented a summary of the recent Workshop on Information-Centric Fog Computing (ICFC) at IFIP Networking 2017, which featured a few papers on ICN edge computing in IoT and on Named Function Networking, one specific approach to marry access to static data and dynamic computing in ICN.

Moreover, Eve Schooler from Intel announced the three selected projects of the recent Intel/NSF-sponsored call for proposals for projects on ICN in the wireless edge:

Lixia Zhang presented an overview of the first project on Augmented Reality and described how the project conceives AR as one of several applications that can leverage a web of browsable named data, based on decentralized multiparty context-content exchange.

Finally, Yiannis Psaras presented his paper on Keyword-Based Mobile Application Sharing through Information-Centric Connectivity that won the Best Paper Award at ACM MobiArch 2016. In this paper, the authors describe a cloud-independent content and application sharing platform based on ICN.

ICN Demos

Luca Muscariello and Marcel Enguehard presented an overview of the Community ICN (CICN) activity in the Linux Foundation fd.io project and showed a demo of the software and their emulation environment.



CICN consists of several Open Source ICN implementations, including an efficient VPP-based forwarder implementations. Cisco made this software available after acquiring PARC’s implementation earlier this year.

ICN Specifications Moving Forward Towards Publication

ICNRG has completed its (research group) last calls on the two core specifications for the CCNx variant of ICN:

The fd.io CICN implementations are based on these specifications (that are intended to be published as Experimental RFCs).

ICNRG also started the Last Call for an Internet Draft on Research Directions for Using ICN in Disaster Scenarios that is intended to be published as an Informal RFC. There are a few additional documents that are nearing completion — see our Wiki for more information.

Upcoming Things

There a few exciting events around ICN taking place this summer/fall.

The ACM SIGCOMM ICN Conference 2017 is embedded into a week of cool ICN and IoT events:

  1. IRTF Thing-to-Thing-Research-Group meeting on September 23/24 (Saturday/Sunday)
  2. RIOT Summit 2017 on September 25/26  (Monday/Tuesday)
  3. The ICN Conference itself from September 26 through 26 (Tuesday through Thursday)
  4. IRTF ICNRG meeting on September 27 (Friday)

Moreover, ICNRG plans to meet at IETF-100, most likely on Sunday, November 11 and during the following week.

If you are working on ICN Security, there a current Call For Papers for an IEEE Communications Magazine Feature Topic on Information-Centric Networking Security.





Written by dkutscher

July 25th, 2017 at 11:52 am

Posted in Events

2015 ACM SIGCOMM ICN Conference has started

without comments

The 2015 ICN conference has started in San Francisco today!

Program Overview


  • Tutorials on CCN and NDN
  • Posters and demostrations


  • Keynote by Van Jacobson: Improving the Internet with ICN
  • Paper presentations on Routing, Node Architectures
  • Panel: ICN — next two years
  • Poster Presentations


  • Paper presentation on In-Network Caching, Content & Applications, Security
  • Posters and demostrations



Written by dkutscher

September 30th, 2015 at 6:53 pm

Posted in Events

Tagged with , , , , , ,

Managing Radio Networks in an Encrypted World

without comments

I attended last week’s IAB/GSMA Workshop on Managing Radio Networks in an Encrypted World (MaRNEW).

The motivation for this workshop was the increasing trend of applying transport layer end-to-end encryption in major web applications such as Google services, YouTube, Netflix, Facebook and others. This trend will likely increase due to further deployment of HTTP/2 for which client implementations today try to setup TLS connections per default.

In mobile networks, traffic management but also additional services/functions have traditionally relied on being able to leverage knowledge about application type, application specifics. Example for such functions include policing/prioritization, optimized scheduling, caching, filtering, but also tracking, ad-insertion etc. In addition to functions that operators want to apply, there are also regulation requirements (depending on local legislation) for filtering, legal intercepting etc. that would become more difficult in the presence of ubiquitous encryption.

At the MaRNEW workshop, leading experts from network operators, vendors, application service providers, CDN providers and academic institutions discussed the impact of ubiquitous encryption as well as ideas for enabling an effective collaboration between the network, applications and users to enable optimal performance and resource efficiency.

In particular, the workshop addressed the following topics:

  • Understanding the bandwidth optimization use cases particular to radio networks;
  • Understanding existing approaches and how these do not work with encrypted traffic;
  • Understanding reasons why the Internet has not standardised support for legal interception and why mobile networks have;
  • Determining how to match traffic types with bandwidth optimization methods;
  • Discussing minimal information to be shared to manage networks but ensure user security and privacy;
  • Developing new bandwidth optimization techniques and protocols within these new constraints;
  • Discussing the appropriate network layer(s) for each management function; and
  • Cooperative methods of bandwidth optimization and issues associated with these.

Encryption: Technological and Business Aspects

It is not a secret that there are different aspects for discussing end-to-end encryption in public networks. Obviously, encryption helps with user privacy, and with the background of recent and current revelations of privacy breaches through pervasive monitoring, it has become common agreement that more (easily deployable) encryption would be useful to overcome this.

There is however also the business perspective: the Internet and specifically the eco system of mobile communication and service provision has multiple stake holders, each of those with their particular interests: network operators want to provide a useful service, in an economical way and may have an interest to enhance the overall service quality through various technical measures. Application service providers want their particular service to perform well over a range of different networks. Network equipment vendors have their product roadmaps and network architecture preferences etc.

Finally, there are the actual users of the system who have an interest in good quality of experience, cost-efficiency — and privacy. Privacy is not only a concern with respect to (illegal) pervasive monitoring by agencies, but also with respect to maintaining anonymity and confidentiality towards network and service providers. For many applications, user profiles, user-generated data etc. is also a key business asset — so there is a strong interest by different players to either get access to that data — or (depending on the nature of a player) to keep other players from accessing it — through encryption.

The MaRNEW workshop focused on the technological discussion.

Impact of Encryption

During the discussion the following main impacts of ubiquitous encryption on mobile network were identified:

  • Traditional ways of identifying and classifying network traffic (DPI) become more costly and potentially infeasible.
  • Traditional traffic management systems have relied on such classification, for different purpose: optimizing resource usage in access networks according to operator policies, forwarding of traffic through optimizers, caches etc., as well as filtering. Those approaches and the actual requirements behind them need to be revisited.
  • Content and service provisioning in both mobile and fixed networks today is heavily relying on CDN and in-network application functions. In addition, new approaches such as Mobile Edge Computing may shift more of such functions to access networks. The motivation is to provide better performance and cost efficiency through offloading networks (CDN cache hits) and through reducing latency and transport protocol performance (local control loops, reduced RTT to caches). Introducing more and more end-to-end encryption makes it impossible for operators to provide any application (or CDN-provider)-independent optimization functions. The alternative of running individual instances for each individual CDN provider does not seem promising. It could also be a major road block for future network and application innovation — because each of those individual functions might require upgrading to introduce in-network support for it.

Way Forward



(Copyright 2015 NEC)

At the workshop, different solutions were discussed.

  • First, it was agreed that the actual impact needs to be understood better and ought to be quantified. For example, assuming that some knowledge about application types (or corresponding service quality expectations) could be leveraged by base stations for more efficient transmission scheduling (e.g., by delaying packets of non-latency-sensitive flows or by operating multiple queues for different flow types), networks should at least be able to obtain corresponding hints from senders. However, the actual impact and potential benefits have to be demonstrated. Operators will work on that issue.
  • The (Internet) transport protocol community has made significant progress in recent years on several fronts: Active Queue Management (AQM) such as fq_codel and PIE have been demonstrated to be able to improve load balancing and reduce latency in router queues. Moreover, transport protocol research has led to promising results (for example PCC — Performance-oriented Congestion Control). It was suggested that those mechanisms should be implemented and deployed where possible.
  • Several options for Cooperative Traffic Management have been discussed. For example this could included exchanging certain information between the network and senders/receivers. The network could inform endpoints better about congestion and non-congestion-induced problems (for example in an extended ECN fashion), or endpoints could inform the network about relevant meta information (application type, QoS requirements etc.). The latter could leverage existing technologies such as DiffServ. Potentially, it would be sufficient to distinguish delay-sensitive flows (e.g., for interactive real-time) and delay-tolerant flows (file download etc.). One interesting question is how endpoints would be incentivized to use such signaling correctly and how corresponding APIs would look like.
  • Overcoming the general limitations of connection-based security and its tendency to require application-specific (or CDN-provider-specific) in-network functions could require a more fundamental rethinking of network architecture and protocol layering. For example, Information-Centric Networking (ICN) would leverage object-security (authentication, encryption), hence enabling the network to implement functions such as caching, local transport strategies etc. in an application manner. This could be of particular relevance for 5G networks where a higher level of dynamicity in the creation and deployment of new OTT services are expected.

For the discussion of such solutions, I (together with several colleagues) have made two contributions to the workshop: 1) Enabling Traffic Management without DPI, and 2) Maintaining Efficiency and Privacy in Mobile Networks through Information-Centric Networking.

Enabling Traffic Management without DPI

Is DPI really needed for traffic management in mobile networks? Our position is “no”. Traffic management is usually realized through relatively simple mechanisms like rate shaping, prioritization, and dropping packets. Compared to these mechanisms, the semantics of applications that can be exposed through DPI are much richer; traffic classification anyway maps these semantics down to a simple set of categories.

The question then arises whether operators are really helped by brittle, insecure and expensive mechanisms for gaining higher fidelity information for the coarse traffic information for traffic management, or whether simple signaling would suffice for traffic classification for mobile network management purposes.

Obviously, when relying on endpoints to signal information about the underlying application which may be used to change the network’s treatment of that application’s traffic, questions of trust arise: how can the network be sure the endpoints are being honest, and prevent endpoints from gaming the system to their advantage (and the disadvantage of others); can these signaling approaches be used as an attack vector. Here the approach is to define the vocabulary of the signaling protocol to properly incentivize honest cooperation, while allowing the network to verify this cooperation.

We discuss two application-independent approaches for traffic management that are based on network-compatible metrics: ConEx Policing and low latency support with SPUD.

Congestion Exposure (ConEx) is a mechanism that enables senders to inform the network about previously encountered congestion in flows thus enabling senders and network infrastructure to respond to congestion based on operator policies. This information is provided in the IP header and can still be accessed even if the payload is encrypted. ConEx information is auditable by comparing the congestion level at network egress to the ConEx signal which incentivizes the sender to state its congestion contribution correctly.

Using ConEx would allow for a bulk packet traffic management system that does not have to consider application classes. Instead, with ConEx accurate downstream path information on incipient congestion are visible to ingress network operators. This information can be used to base traffic management on the actual current cost (which is the contribution to congestion of each flow) and enable operators to apply congestion-based policing/accounting depending on their preference and independent of application characteristics. Such traffic management would be simpler, more robust (no real-time flow application type identification required, no static configuration of application classes) and provide better performance as decisions can be taken based on the real actual cost contribution at each point in time.

The Substrate Protocol for User Datagrams (SPUD) is a new approach to selective information exposure designed to support transport evolution. SPUD is realized as a shim between UDP and an (encrypted) transport protocol. The basic SPUD protocol provides minimal sub-transport functionality by grouping of packets together into tubes and signaling of the start and end of a tube.

This will assist middleboxes in state setup and teardown along the path. Further, SPUD provides an extensible signaling mechanism based on a type-value encoding for associating properties with individual packets or all packets in a tube. The SPUD protocol can be used to signal low latency requirements from an endpoint to the network, or expose the existence of support for such services from the network to the endpoint. Therefore we propose to provide four SPUD signals: a latency sensitivity flag, a signal to yield to another tube, an application preference for a maximum single queue delay, and a facility to discover the maximum possible single queue length along the path.

Based on the latency-sensitivity flag a network operator can implement an additional service (as compared to today’s best effort service) that uses smaller queues and/or different AQM parameters without changing the service that is provided today. Signaling of lower queue priority or maximum single hop delay can further be used to preferentially drop packets of the same sender or within one flow. Information about expected queuing delays on the path can be used for buffer configuration at the endpoints.

The proposal is not intended as a blueprint for immediate implementation — but it demonstrates how cooperative traffic management could be implemented. In our view, cooperative traffic management requires a solid understanding of the interactions with transport layer and the corresponding performance impacts/improvements.

Maintaining Efficiency and Privacy in Mobile Networks through Information-Centric Networking

We present a solution to overcome the impasse of deploying confidentiality at the cost of breaking most of current network traffic engineering in mobile networks. Our proposition is based on Information-Centric Networking (ICN) which is a data-centric network architecture that gracefully incorporates security and traffic optimization.

Content-based security instead of connection based is the foundation of the Information-Centric Networking (ICN) architecture. In ICN, we provide a network service that directly implements the desired information-access abstraction. The network forwards requests for named data and corresponding responses containing the data. The name can be cryptographically bound to the data for ascertaining authenticity. This enables the network to replicate data objects in arbitrary locations, thus enabling ubiquitous caching. Object data can also be encrypted for user privacy, leaving other network-relevant information such as the name intact – thus maintaining options for traffic management, policing etc. The performance gains of having ICN in the mobile backhaul have been evaluated experimentally (see paper). ICN incorporates these ideas into a novel network layer providing all of the mentioned objectives without using man-in-the-middle like solutions.

ICN secures data itself by requiring producers to cryptographically sign every data packet: the signature constitutes the integrity meta-data. The data is uniquely identified by a name that is bound to the data via the signature. The producer’s public key to implement signature verification can be obtained by using the KeyLocator field which can be the name of the data containing the key of the producer. Authentication is implemented via the producer’s key that makes use of a trust model, e.g. PKI, Web-of-Trust that can be extended using key chaining to delegate trust to different sub-namespaces (for hierarchical naming). Confidentiality is obtained by encryption of the data payload using the producer’s key. Notice that authenticity, integrity and confidentiality are independent features.

Once data is published by the producer it can be stored in any location without affecting the security properties of the data which are location independent. Inter-networking of encrypted data is included by design in ICN and in-network caching is always possible with or without confidentiality. Authenticity might not be necessary in many cases so the authentication of the identity of the producer is optional. It is not mandatory either to verify the integrity of the data by verification of the signature. It is important to remark that ICN disantangles authenticity, privacy and integrity so that they can be handled in different ways and without the interaction of end-hosts.

TLS provides web security by encrypting a layer 4 connection between two hosts. Authenticity is provided by the web of trust (certification authorities and a public key infrastructure) to authenticate the web server and symmetric cypher on the two end points based on a negotiated key. In presence of TLS many networking operations become unfeasible: filtering, caching, acceleration, trans-coding.

ICN takes a radically different approach to guarantee confidentiality, authenticity and integrity by embedding them into a redefined network layer. Indeed, ICN builds on the abstraction of data requested, accessed, cached and forwarded by name: the network forwards requests coming from the consumer for named data and routes back data packets on the identical reverse path (symmetric routing).

The ICN communication model allows network nodes between a web server and a web client to operate as forwarding and storage functions to implement various inter-networking functionalities like caching or load balancing without relaxing any security feature. As a fully fledged data-centric network architecture, ICN incorporates mobility, storage, security and multi-point communication by design.

Written by dkutscher

September 28th, 2015 at 12:49 am

ICN-2015 Conference Program

without comments

Join us for the ICN-2015 Conference in San Francisco from Sep. 30 to Oct. 2.

ACM ICN is an annual conference of the ACM Special Interest Group on Data Communication (SIGCOMM) on information-centric networking.

In a nutshell, this year’s conference includes
– 1 keynote given by Van Jacobson
– 19 full papers presented in single track format
– 8 posters
– 10 demos
– 2 full-day tutorials
– 1 industrial panel

Conference details:

Registration details:

– Van Jacobson, Internet pioneer and core architect of Named Data
Networking (NDN), will talk about “Improving the Internet with ICN”.

– CCN: Practical CCNx – Protocol and Code
– NDN: Security & Synchronization in Named Data Networking (NDN)

– Next Steps for ICN: Research, Applications, Deployment and Economics

Topics of papers, posters, and demos include:
– Architecture design and evaluation
– Comparison of ICN architecture proposals
– Limits and limitations of ICN architectures
– ICN evaluation methodology and metrics
– Evaluation of ICN benefits
– Analysis of scalability issues in ICN
– ICN enabled applications
– Routing in ICN networks
– Mobility support
– Trust management
– Access control mechanisms
– ICN economics and business models
– Tools and experimentation facilities
– Measurement methodologies
– Experience from implementations and experiments
– Specific scenarios and implementation approaches
– Feasibility studies for high speed networking
– Privacy
– ICN Deployment

Check out the program.

Written by dkutscher

August 20th, 2015 at 10:42 am

Posted in Events

Tagged with ,

ICN Researchers Meet in Cambridge, MA

without comments


The ICN Research Group of the IRTF has met for a two day meeting in Cambridge, MA on January 13/14. More than 30 researchers from the US, Europe, China, and Japan gathered to discuss hot research topics in ICN such as:

  • Native ICN-based video streaming
  • Security (authenticated denial in ICN)
  • IoT and ICN
  • Hop-by-hop control messages in CCN
  • Named Function Networking

In addition, different groups presented updates on their current implementations and their design decisions for packet formats and ICN protocols. For CCN-based protocols further steps towards a common format have been made.

The next meeting (planned for the week of March 23rd in Dallas, at IETF-92) will continue the packet format discussion and progress new topics such as Named Function Networking.


Written by dkutscher

January 15th, 2015 at 3:42 pm

Posted in Events

Tagged with , ,

Call for Papers: 2nd ACM Conference on Information-Centric Networking (ICN 2015)

without comments

ACM ICN 2015, September 30 - October 2, 2015, San Francisco, USA

The Call for Papers for the 2nd ACM Conference on ICN is out:


                         Call for Papers

** 2nd ACM Conference on Information-Centric Networking (ICN 2015) **


Sponsored by ACM and ACM SIGCOMM




San Francisco, USA, September 30 – October 2, 2015



Information Centric Networking (ICN) is a new network architecture intended to provide access to information without requiring an explicit binding of that information to a particular location. By directly addressing information, ICN supports mobile users and mobile networked devices, offers a higher-level communication service to applications, and promotes authentication and efficiency in the transmission and dissemination of information. Over the last few years, a global research and development community has grown around the idea of ICN.


ACM ICN 2015 is the second edition of the ACM Conference on Information-Centric Networking, which follows a series of workshops on ICN held in conjunction with the ACM Sigcomm conference.  ACM ICN 2015 is the premier international forum for researchers and practitioners to present and discuss the most recent innovations, trends, experiences, and challenges in information centric networking.  ACM ICN 2015 will be a single-track conference featuring paper and poster presentations, panel discussions, and demonstrations.


The Technical Program Committee of ACM ICN 2015 invites high-quality submissions describing unpublished research results in all aspects of ICN, with particular emphasis on contributions to architectural designs and reproducible experimental evaluations.  Papers submitted for consideration should not have been already published elsewhere and should not be under review or submitted for review elsewhere during the consideration period.

Specifically, authors are required to adhere to the ACM Policy and Procedures on Plagiarism

(http://www.acm.org/publications/policies/plagiarism_policy) and the ACM Policy on Prior Publication and Simultaneous Submissions (http://www.acm.org/publications/policies/sim_submissions).


Topics of interest include:


* Architecture design and evaluation

* Comparison of different ICN architectures

* Interoperability across ICN architectures

* ICN evaluation methodology and metrics

* Analysis of scalability issues in ICN

* ICN enabled applications

* Routing in ICN

* Transport issues in ICN

* Caching

* Mobility support

* Trust management and access control

* Management in ICN

* ICN economics and business models

* Tools, experimentation facilities, and measurement methodology for ICN

* Experience from implementation

* Feasibility studies of ICN for high speed networking

* Privacy

* ICN Deployment




Submission Instructions



Submitted papers can be up to 10 pages in length following the SIGCOMM format. All submissions must be in English and in PDF format. Submissions that do not comply with these instructions will be rejected without review.

Papers must be submitted electronically through the ICN 2015 submission site.


Submissions will be reviewed and evaluated on the basis of originality, importance of contribution, soundness, evaluation, quality of presentation and appropriate comparison to related work. The program committee as a whole will make final decisions about which submissions to accept for presentation at the conference. The program committee may propose that authors present their work with a poster accompanied by a 2-page extended abstract. ACM ICN 2015 also invites proposals for demos, tutorials and panel sessions.



Important Dates



Full Paper Submission: May 22, 2015

Acceptance Notification: July 20, 2015

Camera Ready Due: Aug. 15, 2015

Conference: September 30 – October 2, 2015



Conference General Chairs



– Nacho (Ignacio) Solis (PARC, USA)



Technical Program Committee Chairs



– Antonio Carzaniga (USI, Switzerland)

– K. K. Ramakrishnan (UC Riverside, USA)



Technical Program Committee Members



– Mayutan Arumaithurai (University of Goettingen, Germany)

– Giuseppe Bianchi (University of Rome “Tor Vergata”, Italy)

– Nicola Blefari-Melazzi (University of Rome “Tor Vergata”, Italy)

– Jeff Burke (UCLA, USA)

– Kenneth Calvert (University of Kentuky, USA)

– Giovanna Carofiglio (Cisco)

– Patrick Crowley (Washington University, USA)

– Christian Esteve Rothenberg (UNICAMP, Brazil)

– JJ Garcia-Luna-Aceves (University of California Santa Cruz, USA)

– Toru Hasegawa (Osaka University, Japan)

– Jussi Kangasharju (University of Helsinki, Finland)

– Satyajayant Misra (New Mexico State University, USA)

– Vishal Misra (Columbia University, USA)

– Luca Muscariello (Orange Labs, France)

– Kiran Nagaraja (Ericsson)

– Dave Oran (Cisco, USA)

– Jörg Ott (Aalto University, Finland)

– Christos Papadopoulos (Colorado State University, USA)

– Craig Partridge (BBN, USA)

– Diego Perino (Alcatel Lucent, France)

– George Polyzos (AUEB, Greece)

– Yiannis Psaras (UCL, UK)

– Dipankar Raychaudhuri (Rutgers University, USA)

– Jim Roberts (IRT SystemX, France)

– Dario Rossi (Telecom ParisTech, France)

– Thomas Schmidt (HAW Hamburg, Germany)

– Jan Seedorf (NEC Labs Europe)

– Nacho (Ignacio) Solis (PARC, USA)

– Karen Sollins (MIT, USA)

– Christian Tschudin (Uni Basel, Switzerland)

– Arun Venkataramani (UMass, USA)

– Matthias Wählisch (FU Berlin, Germany)

– Roy Yates (Rutgers University, USA)

– Lixia Zhang (UCLA, USA)




More Details



Please see http://conferences.sigcomm.org/acm-icn/2015


Written by dkutscher

January 9th, 2015 at 9:57 am

Posted in Events

Tagged with , , ,

Open Standards, Open Source, Open Loop

without comments

Dave Ward (Chief Architect at Cisco) gave an interesting lunch talk on the relationship between Open Standards and Open Source Software at IETF-91 today. Technologies such as OpenFlow and NFV are increasingly being advanced through Open Source Software projects that develop both individual components as well as larger systems. The developed artifacts are  sometimes being referred to as de-facto standards.

Dave gave some perspectives on how Open Source Software can help to speed up collaborative technology development and related this to standards work in the IETF and other bodies. Dave emphasized the importance of Open Standards for the development of Internet technologies but he pointed out that Open Standards can leverage Open Source to speed up specification development and to validate architecture and protocol specifications.

The talk suggested embracing Open Source Software development for standards work in the IETF, pointing at new working models and skill sets that were required for that.

Obviously, the IETF has always had a focus on running code for validating specification and several recent efforts have been leveraging OSS succesfully — for example CORE, DTN and many others. Still, there was agreement that there is room for extending and potentially institutionalizing this.





Written by dkutscher

November 14th, 2014 at 4:37 am

Posted in Events

Tagged with , ,

1st ACM Conference on Information-Centric Networking (ICN-2014)

without comments

ICN Conference Logo

Four days to go until our first ICN conference!

It’s going to be a blast of an event with a high-quality program, tutorials, demos, and panel discusions.

Check out the program: http://conferences2.sigcomm.org/acm-icn/2014/

Hope to see you in Paris at the conference.


Written by dkutscher

September 20th, 2014 at 6:25 pm

Posted in Events

SIGCOMM-2014 Workshop on Capacity Sharing (CSWS-2014)

without comments

The program of our Capacity Sharing Workshop at SIGCOMM-2014 (CSWS-2014, August 18th in Chicago) is online. This should be an interesting workshop — we have received many interesting submissions and were able to compile a real good program:


Queuing and Scheduling

  •  Revisiting Old Friends: Is CoDel Really Achieving What RED Cannot? (Nicolas Kuhn, Emmanuel Lochin and Olivier Mehani)
  • Managing Fairness and Application Performance with Active Queue Management in DOCSIS-based Cable Networks (James Martin, Gongbing Hong and James Westall)
  • WQM: An Aggregation-Aware Queue Management Scheme for IEEE 802.11n Based Networks (Ahmad Showail, Kamran Jamshaid and Basem Shihada)

Transport Protocols

  • Coupled Congestion Control for RTP Media (Safiqul Islam, Michael Welzl, Stein Gjessing and Naeem Khademi)
  • Experimental Evaluation of Multipath TCP Schedulers (Christoph Paasch, Simone Ferlin, Özgü Alay and Olivier Bonaventure)

Mobile Networks

  • ConEx Lite for Mobile Networks (Steve Baillargeon and Ingemar Johansson)
  • Mobile Network Sharing Between Operators: A Demand Trace-Driven Study (Paolo Di Francesco, Francesco Malandrino and Luiz Dasilva)
  • Network Assisted Rate Adaptation for Conversational Video over LTE, Concept and performance evaluation (Ylva Timner, Jonas Pettersson, Hans Hannu, Min Wang and Ingemar Johansson)
  • Self-clocked rate adaptation for conversational video in LTE (Ingemar Johansson)
  • Dynamic Bandwidth Allocation for Multiple Network Connections: Improving User QoE and Network Usage of YouTube in Mobile Broadband (Florian Wamser, Thomas Zinner, Phuoc Tran-Gia and Jing Zhu)


Written by dkutscher

June 7th, 2014 at 2:59 pm

Posted in Events

Tagged with , , ,

Capacity Sharing Workshop @ SIGCOMM 2014

without comments

Changing usage behavior, increasing demand for bandwidth as well as a continuous trend towards virtualizing networks and network functions raise questions on how to share limited capacity resources fairly and more efficiently while maintaining the best possible Quality of Experience (QoE) for users. While efficiency is most important when resources are spare, fairness need to be evaluated based on the different quality requirements of the various Internet services that we have today. For example, the Internet, especially the mobile Internet, was mostly engineered to provide a low loss service, low-latency services are not well supported today. In data centers, virtualization and high utilization promise economic benefits. However, effective, yet practical capacity sharing between tenants and applications is an important requirement. This has led to the development of enhancements in capacity sharing, especially congestion control mechanisms — some of these mechanisms are domain-specific, others lend themselves to adoption or generalization for inter-connected networks.

We are running a workshop on Capacity Sharing at SIGCOMM 2014 that invites submissions on these topics.

Written by dkutscher

January 28th, 2014 at 9:12 pm

Posted in Events

Tagged with , ,