From craig at aland.bbn.com Fri Nov 3 08:13:37 2006 From: craig at aland.bbn.com (Craig Partridge) Date: Fri, 03 Nov 2006 11:13:37 -0500 Subject: [e2e] modularity of address lookup and management In-Reply-To: Your message of "Mon, 23 Oct 2006 11:54:58 PDT." <453D1002.9070605@isi.edu> Message-ID: <20061103161337.9768868@aland.bbn.com> In message <453D1002.9070605 at isi.edu>, Joe Touch writes: >> If address control is done in the MAC/device driver layer, >> then a datagram could trigger one lookup per interface. If address con= >trol >> is done by the IP layer, then there are challenges of mapping IP addres= >ses >> to MAC layers/interfaces (required, as I recall, on outbound where the >> source IP address usually must but that of the outbound interface). > >When is this 'address control' happening? There's already one lookup per >packet on arrival to see if it matches one of the interfaces. On >departure, that typically happens only for packets whose source >addresses are unassigned. Hi Joe: Thanks for a very helpful note. On this point. I'm actually looking at trying to create a unified addressing subsystem for software defined radios. So the lookup on arrival at the interface is also part of the problem. The broad issue I'm struggling with is whether one needs to manage addresses separately at each layer, or whether there's a way to unify all the address management. A perhaps, less hair raising version of the question is whether one can devise a way that MACs can trivially run using any address scheme. So I could retool the 802.11 MAC to use IP addressing and all would work fine. Thanks! Craig From braden at ISI.EDU Sun Nov 19 13:58:54 2006 From: braden at ISI.EDU (Bob Braden) Date: Sun, 19 Nov 2006 13:58:54 -0800 Subject: [e2e] Fwd: Request to send notice of FIND Info mtg 2 on end2end-interest Message-ID: <5.1.0.14.2.20061119135758.00adb278@boreas.isi.edu> > > > >________________________________ > > >Subject: Second NeTS FIND Informational Meeting > >The NSF NeTS program will be holding a second one-day informational >meeting for the FIND (Future Internet Design) programmatic area on >December 7, 2006 from 9:00 am to 3:00 pm in room 375 at NSF. Only >informal registration is required prior to the meeting; please send an >email to either of the FIND Program Directors (contact information >below) to make sure you have a badge to attend the meeting. We hope >that you can make this meeting if you are interested in submitting a >proposal to the FIND programmatic area of NeTS and did not make the >November 7, 2006 meeting. Please note that if you cannot make this >meeting the webcast from the November 7th meeting will soon be available >on the CRA website www.cra.org. > > > >FIND (Future Internet Design) is a major new long-term initiative of the >NSF NeTS research program. FIND invites the research community to >consider what the requirements should be for a global network of 15 >years from now, and how we could build such a network if we are not >constrained by the current Internet-if we could design it from scratch. >FIND solicits research across the broad area of network architecture, >principles, and mechanism design, aimed at answering these questions. >The philosophy of the program is to help conceive the future by >momentarily letting go of the present - freeing our collective minds >from the constraints of the current state of networking. > >The intellectual scope of the FIND program is wide. FIND research might >address questions such as: > >* How can we design a network that is fundamentally more secure and >available than today's Internet? > How would we conceive the security problem if we could start from >scratch? >* How might such functions as information dissemination, location >management or identity management > best fit into a new network architecture? >* What will be the long-term impact of new technologies such as advanced >wireless and optics? >* How will economics and technology interact to shape the overall design >of a future network? >* How do we design a network that preserves a free and open society? > >________________________________ > > >The meeting > >The first set of FIND awards has now been made. This meeting will >discuss these awards as examples of architectural ideas, provide >guidance for potential proposers about the program's goals, structure, >and review process, and offer community discussion and feedback about >this exciting new initiative in networking research. > >The goals, structure, and emphasis of the FIND initiative differ >somewhat from other NETS programs. For this reason, researchers >interested in these topics are particularly encouraged to attend this >informational meeting. > > > >Location: National Science Foundation, 4201 Wilson Boulevard, Arlington >VA 22230 > >Time and Meeting Room: 9 AM-3 PM, Room 375 > >Program Directors: Darleen Fisher dlfisher at nsf.gov > , Allison Mankin amankin at nsf.gov > > > > >The agenda will include presentations by NSF and by currently funded PIs >as well as ample time for questions and answers. > > From Jon.Crowcroft at cl.cam.ac.uk Wed Nov 22 00:39:45 2006 From: Jon.Crowcroft at cl.cam.ac.uk (Jon Crowcroft) Date: Wed, 22 Nov 2006 08:39:45 +0000 Subject: [e2e] GENIus and Eu - a Modest Viewpoint Message-ID: So the Global Endless Network Initiative rolls on either side of the pond, and it occurs to me that we should celebrate the emergent differences : In the US, the network wil be truly global which means it will be endless - this puts paid to arguments about the end-to-end principle, and finally means we can see if a network without ends is better than one only with ends - this will justify the huge MEANS that the US is asking its taxpayers to put up to fund the initiative. Such a Global iniative will entail wrapping a sphere around the planet (or several, for 3D sonet like resilience; indeed, several around the solar system, for celestial spherical mechanics reasons). Of course, European critics (mainly myself) have been quick to point out, Hans_Christian_Anderson small-child-like, that "the net has no ends", but others in search of funding have said "yeah, but look at the spherical means on that"... So being better at theory, in the Eu, allegedly (although in only in theory, while in practice the Eu aint bad at practice, and in practice the US is better in theory), the Eu will have an initiative (well, we call it an instrument, often shaped quite like a trumpet) to tap the zero point energy thus: It has been oberseved (by MIT recently) that we can induce power by resonance at a distance:- Thus we can power cell phones from other cell phones - taking Tim Shepherd's argument about the capacity of a dense mode multi-hop wireless network growing with the number of nodes, clearly the power grows too; thus we can dispense both with the towers for the cellular net, AND with the power grid, to recharge batteries - instead, cell phones and pdas will _recharge each other_. This will lead to the FP7 (Free the Pointless seven) networking stack initiative in europe. So the race is on - will US endless networking or Eu pointless networking be the dominant technology of the 22nd century? jon p.s. To quote the 17th Francisican Guitarist and Philosopher, Dom Zappa, "But I got a crystal ball"... ack: This goes out after a requirements discussion with Andy Warfield... From Jon.Crowcroft at cl.cam.ac.uk Fri Nov 24 07:33:38 2006 From: Jon.Crowcroft at cl.cam.ac.uk (Jon Crowcroft) Date: Fri, 24 Nov 2006 15:33:38 +0000 Subject: [e2e] trading acks...TRACKS Message-ID: so a very simple scheme for rate controlling the internet occurs to me based on the idea by christian and andy reported in hotnets last year in: "Using Packet Symmetry to Curtail Malicious Traffic" Christian Kreibich, Andrew Warfield, Jon Crowcroft, Steven Hand, and Ian Pratt (reminder: hotnets this year/next week in UC Irvine has some fine papers - see the web already!) so its this: we don't have to send acks to the sender of a data packet - of course, if we don't, then a well behaved TCP source will simply timeout and rtx, although we could fix this if we sent a prior ack with zero window meanwhile, we _could_ send the same acks to someone else. i.e. acks are "permits to travel" - with packet symmetry, of course, this is even enforced... how would we do this? well, if the "someone else's permit" field was simply an IP address, this is simply a question of chaning a mapping in a NAT box at two clients - i.e. we need NATs at two sites to swap which global reachable addr they are using for whom and you're done this could coordinate through many of the NAT traversal hacks that are in superpeers (for example in skype and varius other apps way of getting thru NATs) so for TCP based apps, one could control the aggregate load towards a set of downloaders at the tracker/superpeer sites.... for UDP sources doing TCP emulation at receiver, (TEAR) the same thing would work (actually you could do it to RTCP reports, redirecting those too) - leading to the TRACKS of the TEARs hmmm....smokin j. From lijun at cs.uoregon.edu Wed Nov 22 00:08:21 2006 From: lijun at cs.uoregon.edu (Jun Li) Date: Wed, 22 Nov 2006 00:08:21 -0800 (PST) Subject: [e2e] CFP: 10th IEEE Global Internet Symposium 2007 (deadline February 5, 2007) Message-ID: 10th IEEE Global Internet Symposium 2007 (in conjunction with IEEE Infocom 2007 ) Anchorage, AK, May 11-12, 2007 Paper Submission Deadline: February 5, 2007 *** with a new open review process *** Call for Papers The 10th IEEE Global Internet Symposium will be held in conjunction with IEEE Infocom 2007. All relevant dates, location, and travel information are available from the IEEE Infocom 2007 conference site: http://www.ieee-infocom.org/2007. Symposium Topics IEEE Global Internet 2007 aims to provide a forum for researchers and practitioners to present and discuss advances in Internet-related technologies. The focus of the symposium is on experimental systems and on emerging Internet technologies. The Program Committee encourages original submissions describing promising work in progress, speculations about the future of the Internet, and progressive position papers. Authors are invited to submit papers on any issue related to Internet technology, including but not limited to the following topics: * P2P networking and overlay networks * Privacy and/or security issues in the Internet * Provisioning, monitoring, and management of IP services (VPNs, traffic engineering, mobility support, etc.) * Content networking (caching, content distribution, content routing, content services, load balancing, etc.) * Distributed Internet applications including games, VoIP, and video conferencing * Novel applications and new paradigms (telephony, streaming media, etc.) * Handling Internet dynamics/heterogeneity (by applications and/or the network) * Routing (unicast, multicast, anycast, etc.) * Flow management (fairness/sharing, congestion control, differentiated services, etc.) * The Internet and mobility/mobile devices * Traffic measurement, analysis, modeling, and visualization * Anomaly, intrusion and attack detection Important Dates Paper Registration Due: January 29, 2007 Paper Submissions Due: February 5, 2007 Notification of Acceptance: March 19, 2007 Final Manuscript Due: April 9, 2007 Symposium: May 11-12, 2007 Open Review Process The review process will follow a radically different format: the reviewers' names will be made known to the authors. In addition, if the authors of the paper consent, the reviews and the names of the reviewers will be posted on our website. The goal is to put more stress on the reviewers to be gentle and thorough in their reviews. Note that GI 2007 is arguably the first forum to implement this approach in the recent past. Executive Committee - TPC Chairs: Michalis Faloutsos, UC Riverside Reza Rejaie, University of Oregon - Web Chair: Jun Li, University of Oregon - Publication Chair: Jakob Eriksson, MIT - Local Arrangement: Jun-Hong Cui, University of Connecticut, Storrs Technical Program Committee Kevin Almeroth, University of California, Santa Barbara Sujata Banerjee, HP Labs Anup Basu, University of Alberta Azer Bestavros, Boston University Georg Carle, University of Tuebingen Jon Crowcroft, University of Cambridge Michael Devetsikiotis, North Carolina State University Christos Douligeris, University of Piraeus Sonia Fahmy, Purdue University Paul Francis, Cornell University Christos Gkantsidis, Microsoft Tim Griffin, University of Cambridge, UK Ahmed Helmy, Univ. Florida Kevin Jeffay, UNC Anestis Karasaridis, AT&T Jorg Liebeherr, University of Virginia Bin Liu, Tsinghua University John Lui, Chinese University of Hong Kong Christos Papadopoulos, University of Colorado Craig Partridge, BBN, USA George C. Polyzos, Athens University of Economics and Business, Greece Peter Reiher, University of California, Los Angeles Henning Schulzrinne, Columbia University Samar Singh, La Trobe University, Australia George Stamoulis, Athens University of Economics and Business, Greece James Sterbenz, The University of Kansas Ljiljana Trajkovic, Simon Fraser University Walter Willinger, AT&T Labs Daniel Zappala, BYU Zhi-Li Zhang, University of Minnesota Taieb Znati, University of Pittsburgh From detlef.bosau at web.de Sat Nov 25 08:49:05 2006 From: detlef.bosau at web.de (Detlef Bosau) Date: Sat, 25 Nov 2006 17:49:05 +0100 Subject: [e2e] trading acks...TRACKS In-Reply-To: References: Message-ID: <45687401.7020308@web.de> Jon Crowcroft wrote: > so a very simple scheme for rate controlling the internet > occurs to me based on the idea by christian and andy reported in > hotnets last year in: > "Using Packet Symmetry to Curtail Malicious Traffic" > Christian Kreibich, Andrew Warfield, Jon Crowcroft, Steven Hand, and Ian Pratt > > just a very spontaneous, perhaps stupid, question: What is the difference between "packet symmetry" and the well known principle of packet conservation here? Aren?t these ideas at least quite similar? Perhaps, I just don?t get the clue here. Detlef From christian.kreibich at cl.cam.ac.uk Mon Nov 27 23:44:24 2006 From: christian.kreibich at cl.cam.ac.uk (Christian Kreibich) Date: Mon, 27 Nov 2006 23:44:24 -0800 Subject: [e2e] trading acks...TRACKS In-Reply-To: <45687401.7020308@web.de> References: <45687401.7020308@web.de> Message-ID: <1164699864.2453.31.camel@strangepork> Hi Detlef, On Sat, 2006-11-25 at 17:49 +0100, Detlef Bosau wrote: > just a very spontaneous, perhaps stupid, question: What is the > difference between "packet symmetry" and the well known principle of > packet conservation here? Aren?t these ideas at least quite similar? the packet conservation principle states that in a steady-state TCP flow, a new packet is not to enter the network before another one has left -- this is *much* more rigid than what we frame, both in terms of enforcement as well as flow granularity. We are considering a variety of flow granularities, don't necessarily care about TCP at all, and are happy to permit short-lived bursts of packets as long as the source remains "well-tempered" overall. -- Cheers, Christian. From griff at ifi.uio.no Thu Nov 30 22:27:36 2006 From: griff at ifi.uio.no (Carsten Griwodz) Date: Fri, 1 Dec 2006 07:27:36 +0100 (CET) Subject: [e2e] CFP for NOSSDAV 2007 Message-ID: Dear Colleague, please forward this call for papers for NOSSDAV 2007 to colleagues who may be interested, and excuse us if you receive multiple copies of this email. ========================================================================== CALL FOR PAPER The 17th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV 2007) Urbana-Champaign, IL, USA June 4-5, 2007 Sponsored by ACM SIGMM http://www.nossdav.org/2007 Paper Submission Deadline: February 5, 2007 For seventeen years, NOSSDAV has fostered cutting-edge, state-of-the-art research in multimedia and newly emerging areas such as networked games and peer-to-peer streaming. The workshop environment encourages lively discussion among participants and invites strong feedback for work in progress. In 2007, NOSSDAV will be held at the University of Illinois at Urbana-Champaign, IL, USA. NOSSDAV invites submissions on all areas of multimedia computing and networking and strongly encourages work in progress in emerging areas. Papers grounded in high quality experimental research based on prototype and real systems are highly valued. NOSSDAV will give extra consideration to papers that aim to comprehensively validate previous work in some topic within multimedia, propose new directions for research or call into question existing conventional wisdom. Topics of interest include, but are not limited to: - Peer-to-peer streaming - Networked games - Sensor networks and architectures - In-network stream processing - Wireless and mobile multimedia systems - 3D multimedia and tele-immersion - Streaming 3D graphics and virtual worlds - Application-level multicast - Multimedia security - Digital rights management - Real-time operating system support for multimedia - Multimedia middleware and frameworks - Multimedia grids - Programmable and GPU/SPU-enabled multimedia A broad view will be taken in deciding what topics are within scope. Please feel free to contact the workshop co-chairs if you are unsure and wish to check if a particular paper or topic is within the workshop scope. As always, student participation is strongly encouraged. To encourage a good mix of seasoned researchers as well as students, we will be offering discounted registration for non-student co-authors of a paper or other non-student participants associated with the author of a paper (participants from the same institution). Submissions (as well as the camera ready final versions of accepted papers) should be no longer than 6 pages. We expect these submissions to be the kernel of what will eventually lead to full-length papers at high-quality conferences or journals. This year, a few of accepted NOSSDAV papers with highest quality are selected and their authors are invited to submit an extended version of their papers to a special issue of ACM/Springer Multimedia Systems Journal (MMSJ). MMSJ is a well-known International journal, published by the Springer Verlag, and sponsored by the ACM SIGMM organization. This journal publishes new research results in the areas of multimedia systems, multimedia networking, multimedia applications, multimedia security, multimedia education, multimedia coding, and multimedia retrieval systems. Program Co-chairs: Reza Rejaie (University of Oregon) Klara Nahrstedt (UIUC) Important Dates: Paper registration: February 5, 2007 Paper submission: February 12, 2007 Notification: March 31, 2007 Camera ready: April 19, 2007 Workshop: June 4-5, 2007