| |
Tutorial Descriptions:
Tutorial
1:
|
Engineering
for QoS: Applying Traffic Theory to
the Internet
|
Speaker
|
Jim
Roberts
|
Date:
|
Sunday March 30,
2003
|
Time:
|
1PM
- 5PM
|
Abstract:
The
Internet is still largely engineered using empirical rules of thumb that
make little or no reference to the kind of traffic theory that has guided
the design of traditional telecommunications networks. Planned evolutions
to the network architecture aiming to ensure more dependable and
differentiated qualities of service are also being determined with little
regard to the fundamental probabilistic relation between demand, capacity
and realized performance. In this tutorial we argue that this omission is
regrettable and that the lessons provided by traffic theory are primordial
both in defining the network architecture and in exploiting that
architecture through effective traffic engineering. The emphasis is on the
qualitative results derived rather than on a detailed description of the
underlying mathematical models.
We
first discuss essential traffic characteristics, identifying the notions
of flow and session as more appropriate for modeling than the datagram or
the broadly defined traffic aggregate. We then successively describe
performance models developed for the two main types of flow: streaming
(mainly audio and video applications) and elastic (document transfers).
Streaming traffic relies on open loop control and the models in question
are those of statistical multiplexing. Elastic traffic, on the other hand,
is subject to closed loop control and its performance is evaluated using
the more recent theory of statistical bandwidth sharing. Qualitative
results derived from the models are used to critically appraise the
network architectures (notably, Diffserv and Intserv)
currently proposed as Internet enhancements. We also discuss the
application of the performance results in traditional traffic engineering
activities of sizing, routing and overload control. We examine the link
between QoS and pricing since this has a clear
impact on the economic viability of the different architectures
Presenter
biography:
Jim
Roberts has a BSc in mathematics from the
University of Surrey, UK and a PhD from the
University
of
Paris
. Since graduating he
has worked in the field of teletraffic
engineering and performance evaluation, with the British Post Office, the
French company Socotel and, since 1978, the
research labs of France Telecom, now known as France Telecom R&D. He
currently leads a team working on traffic modeling and performance
evaluation for high speed packet networks.
His
research has been mainly in the field of performance evaluation and design
of traffic controls for multiservice networks:
initially the circuit switched narrowband ISDN, then ATM-based broadband
ISDN and presently the integrated services and differentiated service
architectures proposed for the Internet. He was chairman of successive
European COST projects on the performance of multiservice
networks, this activity culminating in the publication by Springer in 1996
of the book "Broadband Network Teletraffic".
He
has published quite extensively and is or has been a member of a several
journal editorial boards including Computer Networks and IEEE/ACM
Transactions on Networking. He received the best paper award at Infocom'99
for a paper on bandwidth sharing co-authored with L. Massoulié.
He was a guest editor for the IEEE JSAC issue on Internet QoS
in 2000. He is member of many conference program committees in the
networking field including Infocom and SIGCOMM. He is TPC co-chair for
Infocom 2003.
back to top
Tutorial
2:
|
Future
Technologies in the Metro Edge
|
Speakers:
|
Ed
Knightly and Hui Zhang
|
Date:
|
Sunday, March
30, 2003
|
Time:
|
1PM – 5PM
|
[Tutorial 2 is Cancelled]
Abstract:
As
congestion points increasingly move to the network edges, metropolitan
backbones become an increasingly critical, but often misunderstood, part
of the end-to-end path. Today,
SONET rings are the most widely deployed metropolitan network technology,
with Metro Ethernet rapidly emerging as a competing technology. Since
SONET is based on circuit-switching, there is a widely held belief that it
may not be the optimal technology given the increasing fraction of
bandwidth consumed by data traffic. While Metro Ethernet addresses some
efficiency problems of SONET, it encounters a number of challenges in ring
topologies, including fault recovery, fairness, quality of service, and
inefficiencies of the spanning tree protocol. The emerging Resilient
Packet Ring standard (IEEE 802.17) seeks to address the shortcomings of
Metro Ethernet but encounters its own challenges of overcoming Ethernet's
momentum. Finally, Metro DWDM seeks to provide such high bandwidth to
largely mitigate the need for sophisticated technologies all together.
In
this tutorial, we will present SONET, Metro Ethernet, Resilient Packet
Ring, and DWDM technologies from both technical and marketing
perspectives. We will answer questions such as: (1) How does Metro
Ethernet differ from the enterprise Ethernet that we are familiar with?
(2) What are the performance and fault-tolerance limitations of
Ethernet that are motivating alternate technologies?
(3) How will RPR try to overcome the poor track record of packet
ring technologies (recall token ring, DQDB, FDDI, ATM VP ring)? (4) What
are the objectives of fairness and spatial reuse in packet rings and how
do they differ from the "classical" ring problems of the 1980's?
(5) How will GigE evolve and compete
with RPR? (6) How will SONET
survive despite being a circuit technology?
A
high-level outline follows:
 | Existing
Metro Network Services, Technologies, and Architectures
 | Metro
Ethernet
 | Metro
DWDM
 | Resilient
Packet Ring
 | Next
Generation SONET
 | Case
Studies: Phonoscope Metro ISP and Example
Enterprise
Networks
 | Future
directions
|
| | | | | |
Presenter
Biographies:
Edward
W. Knightly received the B.S. degree from
Auburn
University
in 1991, the M.S.
degree from the
University
of
California
at
Berkeley
in 1992, and the Ph.D.
degree from the
University
of
California
at Berkeley in 1996,
all in Electrical Engineering. Since
1996, he has been an assistant professor in the Department of Electrical
and Computer Engineering at
Rice
University
.
He is an editor of the Computer Networks Journal, IEEE/ACM
Transactions on Networking, IEEE Transactions on Multimedia, and
previously, IEEE Network Magazine. He served as co-guest editor of IEEE
Network Magazine's special issue on integrated and differentiated services
for the Internet. He served
as co-chair for the 1998 IEEE/IFIP International Workshop on Quality of
Service and served on its steering committee.
He received the National Science Foundation CAREER Award in 1997
and the Sloan Fellowship in 2001. His research interests are in the areas
of quality-of-service, scheduling, admission control, and media access
protocols in wireless and wireline networks.
Hui
Zhang is the Chief Technical Officer of Turin Networks and the Finmeccanica
Associate Professor in Computer Science at Carnegie Mellon University.He
received his B.S. degree in Computer Science from
Beijing
University
in 1988, his M.S.
degree in Computer Engineering from Rensselaer Polytechnic
Institute in 1989, and his Ph.D. degree in Computer Science from
University of California at Berkeley in 1993.
He served on the Editorial Board of IEEE/ACM Transactions on
Networking, ACM Computer Communication Review, and Computer Communications
Journal. He was the guest editor of IEEE Network Magazine Special Issue on
"Integrated and Differentiated Services over the Internet", and
IEEE Journal on Selected Areas in Communications Special Issues on "QoS
In the Internet". He was
the Program Committee Co-Chair for OPENSIG'99 and IWQOS'00. He has also
served on the program committees of most leading ACM/IEEE networking,
real-time, and multimedia conferences including SIGCOMM, INFOCOM, ICNP,
SIMETRICS, NOSSDAV, IWQoS, RTSS, RTAS, ACM
Multimedia, IEEE Multimedia, and MNCN.
He was the recipient of the National Science Foundation CAREER
Award in 1996 and the Alfred Sloan Fellowship in 2000.
back to top
Tutorial
3:
|
Data Mining the Internet:
|
Speakers
|
Michalis
Faloutsos and Christos
Faloustos
|
Date:
|
Monday, March
31, 2003
|
Time:
|
9AM - 5PM
|
Abstract:
In
this tutorial, we address two questions: what do we know about the
Internet? And, how can you learn more about it? First, we present the
state of the art of what we
know about modeling and simulating the Internet. Second, we present
cutting edge techniques of how to
further our understanding of the network.
The
motivation is that despite the significant research efforts, we know very
little al)out the Internet. Furthermore, most
network researchers are unaware of the wealth of analysis tools from the
areas of data mining and statistics. Data analysis based on averages,
standard derivation and Poisson processes has exhausted its capabilities.
We
present two scenarios that describe eloquently the two main thrusts of
this tutorial.
- Scenario
one (i.e., what): You want
to simulate your new protocol. What topology should you use:?
What is the distribution of sources and destinations? What is the
traffic intensity of each connection? What kind of background traffic
should you use?
- Scenario
two (i.e., how): You just
obtained large measurement data of round trip delays among several
node pairs over a few hours. How can you characterize? How
do you compare the delays between different end-points? How do
you cluster "similar"' round-trip behavior? How can you
identify abnormal behavior such as a Distributed Denial of Service
Attack (DDoS)?
In
a nutshell, the main goal of this tutorial is to present what we know
about modeling the Internet, and how we can
learn more, The tutorial intends to bridge the gap between network
researchers and datamining research.
Presenter
Biographies:
The instructors have been in collaboration for 4 years, with multiple
joint papers. This joint work has been a fusion of the two research areas of the collaborators: networks and datamining. The work has focused on
Internet modeling using the advanced data-mining techniques and has lead to discoveries that would not have been feasible otherwise.
Michalis Faloutsos received the B.Sc. degree in Electrical engineering (1993) from the national Technical University of Athens, Greece and the
M.Sc. and Ph.D. degrees in Computer Science from the University of Toronto, Canada (1999). he is currently an assistant professor at the
University of California Riverside. He has received the CAREER award from NSF (2000), and two major DARPA grants. He has co-authored with Christos
and Petros Faloutsos the highly-cite paper "On Powerlaws and the Internet
Topology" (SIGCOMM '99), which renewed the interest of the community in modeling the Internet topology. hes interests include Internet
measurements, multicast protocols, real-time communications, and wireless networks.
Christos Faloutsos received the B.Sc. degree in Electrical Engineering (1981) from the National Technical University of Athens, Greece and the
M.Sc. and Ph.D. degrees in Computer Science from the University of Toronto, Canada. he is currently a professor at Carnegie Mellon
University. He has received the Presidential Young Investigator Award by the National science Foundation (1989), three "best paper" awards
(SIGMOD 94, VLDB 97, KDD01 (runner-up)), and four teaching awards. He has published over 100 refereed articles, one monograph, and holds four
patents. His research interests include data mining, network analysis, indexing in relational and multimedia databases.
back to top
Tutorial
4:
|
Securing
the
Enterprise
: The Network
Security – Integrity Problem
|
Speaker
|
John
Kerivan
|
Date:
|
Monday, March
31, 2003
|
Time:
|
9AM - 5PM
|
Abstract:
Detecting
enterprise security problems in high-speed switched networks has become a
very difficult problem in the past decade. This tutorial session is
devoted to describing the Network Security – Integrity Problem based on
how we regularly organize our behaviors and perceptions to deal with
numerous unknowns in our daily lives. We suggest that a
Detection-Discrimination-Recognition paradigm is very well suited to a
distributed security analysis and responder system capable of making
complex decisions, near real-time correlations and taking appropriate
counter measures to protect the assets of Enterprise Networks.
We
will demonstrate generic prototypes that can respond to complex security
attacks in near real time using techniques to properly quantify network
security versus integrity problems. The topics to be covered in this
session are;
 | Platform
Requirements for Security Analyzers
|
 | Configuration
of Behavioral Analysis Engines
 | Deployment
Options of Security Analyzers in Complex Networks
 | Analyzer
Correlation Techniques to compensate for Switched Network Designs
 | Data
Management Issues including storage and refinement concepts
 | Notification
Integration with point solution network and security tools
 | Utilization
of System Monitors to validate the “Smoking Gun”
|
| | | | |
We
will outline and discuss the technical requirements and high level
specifications for such a system in such a manner as to engage the debate
of balancing network security and integrity issues. Behavioral analysis
techniques based on Detection- Discrimination-Recognition processes are
superior to other methods that are statically based and cannot adapt to
the resolution of complex network security and integrity problems.
Participants are encouraged to bring laptops to the session. Connections to a
local network will be provided to demonstrate the tools and techniques that
will be covered. Participants can also take copies of the attack test scripts
and tools with them. Their laptops should have the following configuration:
Operating System: Microsoft Windows 2000 Professional, SP2 or higher.
Processor: AMD K6/750 Intel PIII/750 or higher
Memory: 128MB
Disk Space: 25.5MB free space for programs - 2GB local storage for scripts & data
Recommended Adapter Cards: PCI Bus0, NetGear FA312 10/100, SMC 9432 10/100,
3Com 3C920 Fast Ethernet Controller, Xircom CardBus Ethernet II 10/100 or equivalent cards that can run in promiscuous modes.
For those without laptops, CDs with the tools and test scripts will be available.
Presenter
biography:
Dr.
John Kerivan (Jack) is the CTO of Heroix
Security. Jack has been providing network and security solutions to
numerous companies for the past 15 years. He has worked as a senior
executive in startups, as well as in major corporations, developing many
network security based applications for large multi vendor networks. Prior
to Heroix, Jack founded nGran,
a network security solutions provider. Jack has also served as a Senior
Manager for Deloitte & Touché, LLP focused on e-Business Technologies
and Security for the New England Practice. Jack was also the Senior
Director of Professional Services for NEC. In that capacity, he was
responsible for establishing and managing NEC’s Computer Systems
Division global professional services business. Prior to that position, he
was the Eastern Territory Networking Services Resource Manager for Digital
Equipment Corporation. In that position he developed and ran the Network
Services PC Integration business in
Eastern
Territory
for the
Digital MCS business. Jack also developed the business plan for Network
Services Operations for Groupe Bull and as a
Vice President and General Manager ran the operations in
North
America
and PAC
rim. While at Bull, Jack held a variety of positions including lead
developer for the NCIA programs and Director of Network Consulting
Services.
He
has held a variety of management posts in government and industry and is
an active member of the IEEE, Communications and Computer Societies. He
has held technical & management positions in Cabot Corporation and
worked as a Member of the Technical Staff at AT&T Bell Laboratories.
Jack received a B.A. in 1971 from the
University
of
Massachusetts
, an M.A.
in 1975 from the
University
of
Connecticut
and
completed his formal training with a Ph.D. in Communications Sciences at
the
University
of
Connecticut
in 1978.
back to top
Tutorial
5:
|
Optical
Networking: Recent Developments, Issues, and Trends
|
Speaker
|
Raj
Jain
|
Date:
|
Monday, March
31, 2003
|
Time:
|
9AM - 5PM
|
Abstract:
The year 2002 has brought a turn around in the optical networking. Several
technologies that were hot until last year are no longer so. In this
tutorial, beginning with networking trends and recent DWDM records, a
sample of recent optical networking products and applications will be
presented. Key technological developments that made optical networking a
hot topic will be explained. Upcoming
optical technologies will also be briefly described. The role of 10
Gigabit Ethernet standard in unifying the local
and wide area networks will be presented. While Ethernet is trying to
replace SONET/SDH in the carrier networks, SONET itself is changing to
better meet the new demands of data traffic. The features that make Next
Generation SONET a tough competitor for Ethernet in the carrier networks
will be explained.
The
latest debate on all-optical switching along with the introductionof
IP control plane will be presented. Multiprotocol
Label Switching (MPLS), Multiprotocol Lambda
Switching, and Generalized Multiprotocol Label
Switching (GMPLS) will be explained.
New standards activities to change IP protocols to enable optical
networking will be presented.
Syllabus:
 | Networking
Trends: Life Cycles of Technologies, Traffic vs
CapacityGrowth, Ethernet Everywhere,
Technology Failures vs Successes, LAN-WAN
Convergence, Ethernet vs SONET, Everything
over IP.
 | Carrier
Networking Technologies: SONET, SONET Components, Protection, Rings,
Virtual Concatenation, Generic Framing Protocol (GFP), Link Capacity
Adjustment Scheme (LCAS), SDH, OTN.
 | Gigabit
and 10 Gb Ethernet: Distance-B/W Principle,
10 GbE: KeyFeatures,
PMD Types, 1G/10G Ethernet Switch Features, Flow Control, Link
Aggregation, Jumbo Frames, Resilient Packet Ring (RPR), Beyond 10 GbE.
 | Recent
Developments in Optical Networking: Recent DWDM Records and Product
Announcements, All-Optical Networking, IP over DWDM, Changes in IP,
UNI, ASON, MPLS, MPL(ambda)S, GMPLS,
Martini Drafts, Upcoming optical technologies.
|
| | |
Presenter
Biography:
Raj
Jain is a Co-founder and Chief Technology Officer of Nayna
Networks, Inc - an optical systems company in
Milpitas
,
CA
. He is currently on a
leave of absence from
Ohio
State
University
in
Columbus
,
Ohio
, where he is a
Professor of Computer and Information Sciences.
He
is a Fellow of IEEE, a Fellow of ACM.
He is currently aDistinguished Lecturer
for the IEEE Communications Society.
He is on the Editorial Boards of Computer Networks: The
International Journal of Computer and Telecommunications Networking,
Computer Communications (UK), Journal of High Speed Networks (USA), Mobile
Networks and Applications, and International Journal of Wireless and OpticalCommunications
(
Singapore
).
Raj
Jain is on the Board of Technical Advisors to EdgeNet
Communications Corporation, Burlingame, CA, Corona Networks, Inc.,
Milpitas, CA, Chip Engines, Inc., Sunnyvale, CA, Teradiant
Networks, San Jose, CA, Tivre Networks, San
Jose, CA, Irvine Networks, Irvine, CA, Beacon Telco, Boston, MA, Avatar
Networks, Fremont, CA, Rhonet Systems,
Columbus, OH, and on the Board of Research Advisors to iBEAM
Broadcasting Corporation, Sunnyvale, CA. Previously, he was also on the
Board of Advisors to Nexabit Networks, Westboro,
MA, which was acquired by Lucent Corporation and to Amber Networks,
Fremont, CA, which was acquired by Nokia.
back to top
Tutorial
6:
|
Peer-to-Peer
Systems
|
Speaker
|
Keith
W. Ross and Dan Rubenstein
|
Date:
|
Monday, March
31, 2003
|
Time:
|
9AM - 5PM
|
Abstract:
A
P2P application is an application that (1) has significant autonomy from
central servers and (2) exploits the resources – including content,
bandwidth and CPU cycles – in a large number of intermittently-connected
peers. P2P applications are
be used for file sharing, distributed file systems, distributed computing,
messaging, and real-time communication.
In
this tutorial, we will explore in detail the unstructured
"industrial" P2P systems as well as the structured Dynamic Hash
Table (DHT)-based P2P systems. We will devote special attention to
describing the wide-range of networking applications that can be built
from DHT substrates. The tutorial will also include an important
mathematical analysis component, drawing on tools from probability theory,
optimization, and algorithms. We will also survey experimental
observations of P2P performance.
Presenter
Biographies:
Keith
W. Ross is a Professor in the Multimedia Communications Department at Institut
Eurecom. Before joining Institut
Eurecom, he was a professor in the Department
of Systems Engineering at the
University
of
Pennsylvania
from 1985 through 1997.
He will be joining the
Polytechnic
University
in
Brooklyn
as the Leonard Shustek
Chair of Computer Science in January 2003.
Professor
Ross has made significant research contributions to the theory and
practice of computer networking throughout his career, including work in
P2P systems, audio and video streaming, content
distribution, quality of service, traffic engineering, loss networks, and
Markov decision processes. His work on Web caching includes the
co-development of the CARP protocol, which has been implemented in
Microsoft and Netscape caching products. He has been on numerous program
committees and editorial boards in the areas of computer networking and
applied probability. His
interests in streaming technologies and eLearning
lead to the creation in 1999 of Wimba, for
which he is the founding CEO. Wimba is a
venture-capital funded start-up that develops and markets asynchronous
voice technologies, accessible both through the Web and through mobile
phones.
Professor Ross is co-author (with James Kurose) of the leading networking
textbook, "Computer Networking: A Top-Down Approach Featuring the
Internet," which is being used by over 200 universities in
North America
and is being translated
into several languages. Professor Ross is also the author of the book
"Multiservice Loss Models for
Telecommunication Networks," published by Springer in 1995.
Dan Rubenstein has been an Assistant Professor of Electrical Engineering
and Computer Science at
Columbia
University
since 2000.
He received a B.S. degree in mathematics from M.I.T., an M.A. in
math from UCLA, and a PhD in computer science from
University
of
Massachusetts
,
Amherst
.
His research interests are in network technologies, applications,
and performance analysis, with an emphasis on large-scale Internet design
for continuous media transmission. He
received a Best Student Paper Award for his ACM SIGMETRICS 2000 paper
entitled "Detecting Shared Points of Congestion via End-to-end
Measurement" and an NSF CAREER Award in 2002 to continue his
investigation of peer-to-peer and overlay networking systems.
back to top
|
|
[ Home ] [ Executive Committee ] [ Program Committee ] [ Call for Papers ] [ Author's Kit ] [ Technical Program ] [ Best Paper ] [ Tutorials ] [ Panels ] [ Other Meetings ] [ Registration ] [ Hotel Reservation ] [ Travel Grants ] [ Corporate Patrons ] [ Local Attactions ] |
|
|