Photos courtesy of San Francisco Convention & Visitors Bureau

Executive Committee
Program Committee
Call for Papers
Author's Kit
Technical Program
Best Paper
Other Meetings
Hotel Reservation
Travel Grants
Corporate Patrons
Local Attactions

Infocom 2003 will be held at the 
Hyatt Regency
San Francisco

5 Embarcadero Centre
San Francisco
California, USA
(Tel)+1- 415-988-1234


Time Tutorial
March 30, 1PM - 5PM
T1: Engineering for QoS: applying traffic theory to the Internet  
March 30, 1PM - 5PM
T2: Future Technologies in the Metro Edge  [Cancelled]
March 31, 9AM - 5PM
T3: Data Mining the Internet
March 31, 9AM - 5PM
T4: The Network Security Integrity Problem
March 31, 9AM - 5PM
T5: Optical Networking: Recent Developments, Issues, and Trends
March 31, 9AM - 5PM
T6: Peer-to-Peer Systems


Tutorial Descriptions: 

Tutorial 1:

Engineering for QoS: Applying Traffic Theory to the Internet
Speaker Jim Roberts
Date: Sunday March 30, 2003
Time: 1PM - 5PM


The Internet is still largely engineered using empirical rules of thumb that make little or no reference to the kind of traffic theory that has guided the design of traditional telecommunications networks. Planned evolutions to the network architecture aiming to ensure more dependable and differentiated qualities of service are also being determined with little regard to the fundamental probabilistic relation between demand, capacity and realized performance. In this tutorial we argue that this omission is regrettable and that the lessons provided by traffic theory are primordial both in defining the network architecture and in exploiting that architecture through effective traffic engineering. The emphasis is on the qualitative results derived rather than on a detailed description of the underlying mathematical models.

We first discuss essential traffic characteristics, identifying the notions of flow and session as more appropriate for modeling than the datagram or the broadly defined traffic aggregate. We then successively describe performance models developed for the two main types of flow: streaming (mainly audio and video applications) and elastic (document transfers). Streaming traffic relies on open loop control and the models in question are those of statistical multiplexing. Elastic traffic, on the other hand, is subject to closed loop control and its performance is evaluated using the more recent theory of statistical bandwidth sharing. Qualitative results derived from the models are used to critically appraise the network architectures (notably, Diffserv and Intserv) currently proposed as Internet enhancements. We also discuss the application of the performance results in traditional traffic engineering activities of sizing, routing and overload control. We examine the link between QoS and pricing since this has a clear impact on the economic viability of the different architectures

Presenter biography:

Jim Roberts has a BSc in mathematics from the University of Surrey, UK and a PhD from the University of Paris . Since graduating he has worked in the field of teletraffic engineering and performance evaluation, with the British Post Office, the French company Socotel and, since 1978, the research labs of France Telecom, now known as France Telecom R&D. He currently leads a team working on traffic modeling and performance evaluation for high speed packet networks.

His research has been mainly in the field of performance evaluation and design of traffic controls for multiservice networks: initially the circuit switched narrowband ISDN, then ATM-based broadband ISDN and presently the integrated services and differentiated service architectures proposed for the Internet. He was chairman of successive European COST projects on the performance of multiservice networks, this activity culminating in the publication by Springer in 1996 of the book "Broadband Network Teletraffic".

He has published quite extensively and is or has been a member of a several journal editorial boards including Computer Networks and IEEE/ACM Transactions on Networking. He received the best paper award at Infocom'99 for a paper on bandwidth sharing co-authored with L. Massoulié. He was a guest editor for the IEEE JSAC issue on Internet QoS in 2000. He is member of many conference program committees in the networking field including Infocom and SIGCOMM. He is TPC co-chair for Infocom 2003. 

back to top  


Tutorial 2:

Future Technologies in the Metro Edge
Speakers: Ed Knightly and Hui Zhang
Date: Sunday, March 30, 2003
Time: 1PM – 5PM

[Tutorial 2 is Cancelled]


As congestion points increasingly move to the network edges, metropolitan backbones become an increasingly critical, but often misunderstood, part of the end-to-end path.  Today, SONET rings are the most widely deployed metropolitan network technology, with Metro Ethernet rapidly emerging as a competing technology. Since SONET is based on circuit-switching, there is a widely held belief that it may not be the optimal technology given the increasing fraction of bandwidth consumed by data traffic. While Metro Ethernet addresses some efficiency problems of SONET, it encounters a number of challenges in ring topologies, including fault recovery, fairness, quality of service, and inefficiencies of the spanning tree protocol. The emerging Resilient Packet Ring standard (IEEE 802.17) seeks to address the shortcomings of Metro Ethernet but encounters its own challenges of overcoming Ethernet's momentum. Finally, Metro DWDM seeks to provide such high bandwidth to largely mitigate the need for sophisticated technologies all together.

In this tutorial, we will present SONET, Metro Ethernet, Resilient Packet Ring, and DWDM technologies from both technical and marketing perspectives. We will answer questions such as: (1) How does Metro Ethernet differ from the enterprise Ethernet that we are familiar with?  (2) What are the performance and fault-tolerance limitations of Ethernet that are motivating alternate technologies?  (3) How will RPR try to overcome the poor track record of packet ring technologies (recall token ring, DQDB, FDDI, ATM VP ring)? (4) What are the objectives of fairness and spatial reuse in packet rings and how do they differ from the "classical" ring problems of the 1980's?  (5) How will GigE evolve and compete with RPR?  (6) How will SONET survive despite being a circuit technology?

A high-level outline follows:

Existing Metro Network Services, Technologies, and Architectures
Metro Ethernet
Metro DWDM
Resilient Packet Ring
Next Generation SONET
Case Studies: Phonoscope Metro ISP and Example Enterprise Networks
Future directions

Presenter Biographies:

Edward W. Knightly received the B.S. degree from Auburn University in 1991, the M.S. degree from the University of California at Berkeley in 1992, and the Ph.D. degree from the University of California at Berkeley in 1996, all in Electrical Engineering.  Since 1996, he has been an assistant professor in the Department of Electrical and Computer Engineering at Rice University .  He is an editor of the Computer Networks Journal, IEEE/ACM Transactions on Networking, IEEE Transactions on Multimedia, and previously, IEEE Network Magazine. He served as co-guest editor of IEEE Network Magazine's special issue on integrated and differentiated services for the Internet.  He served as co-chair for the 1998 IEEE/IFIP International Workshop on Quality of Service and served on its steering committee.  He received the National Science Foundation CAREER Award in 1997 and the Sloan Fellowship in 2001. His research interests are in the areas of quality-of-service, scheduling, admission control, and media access protocols in wireless and wireline networks.

Hui Zhang is the Chief Technical Officer of Turin Networks and the Finmeccanica Associate Professor in Computer Science at Carnegie Mellon University.He received his B.S. degree in Computer Science from Beijing University in 1988, his M.S.  degree in Computer Engineering from Rensselaer Polytechnic Institute in 1989, and his Ph.D. degree in Computer Science from University of California at Berkeley in 1993.  He served on the Editorial Board of IEEE/ACM Transactions on Networking, ACM Computer Communication Review, and Computer Communications Journal. He was the guest editor of IEEE Network Magazine Special Issue on "Integrated and Differentiated Services over the Internet", and IEEE Journal on Selected Areas in Communications Special Issues on "QoS In the Internet".  He was the Program Committee Co-Chair for OPENSIG'99 and IWQOS'00. He has also served on the program committees of most leading ACM/IEEE networking, real-time, and multimedia conferences including SIGCOMM, INFOCOM, ICNP, SIMETRICS, NOSSDAV, IWQoS, RTSS, RTAS, ACM Multimedia, IEEE Multimedia, and MNCN.  He was the recipient of the National Science Foundation CAREER Award in 1996 and the Alfred Sloan Fellowship in 2000.

back to top 


Tutorial 3:

Data Mining the Internet:
Speakers Michalis Faloutsos and Christos Faloustos
Date: Monday, March 31, 2003
Time: 9AM - 5PM


In this tutorial, we address two questions: what do we know about the Internet? And, how can you learn more about it? First, we present the state of the art of what we know about modeling and simulating the Internet. Second, we present cutting edge techniques of how to further our understanding of the network.

The motivation is that despite the significant research efforts, we know very little al)out the Internet. Furthermore, most network researchers are unaware of the wealth of analysis tools from the areas of data mining and statistics. Data analysis based on averages, standard derivation and Poisson processes has exhausted its capabilities.

We present two scenarios that describe eloquently the two main thrusts of this tutorial.

  1. Scenario one (i.e., what): You want to simulate your new protocol. What topology should you use:? What is the distribution of sources and destinations? What is the traffic intensity of each connection? What kind of background traffic should you use?
  2. Scenario two (i.e., how): You just obtained large measurement data of round trip delays among several node pairs over a few hours. How can you characterize? How do you compare the delays between different end-points? How do you cluster "similar"' round-trip behavior? How can you identify abnormal behavior such as a Distributed Denial of Service Attack (DDoS)?

In a nutshell, the main goal of this tutorial is to present what we know about modeling the Internet, and how we can learn more, The tutorial intends to bridge the gap between network researchers and datamining research.  

Presenter Biographies:  

The instructors have been in collaboration for 4 years, with multiple joint papers. This joint work has been a fusion of the two research areas of the collaborators: networks and datamining. The work has focused on Internet modeling using the advanced data-mining techniques and has lead to discoveries that would not have been feasible otherwise.

Michalis Faloutsos received the B.Sc. degree in Electrical engineering (1993) from the national Technical University of Athens, Greece and the M.Sc. and Ph.D. degrees in Computer Science from the University of Toronto, Canada (1999). he is currently an assistant professor at the University of California Riverside. He has received the CAREER award from NSF (2000), and two major DARPA grants. He has co-authored with Christos and Petros Faloutsos the highly-cite paper "On Powerlaws and the Internet
Topology" (SIGCOMM '99), which renewed the interest of the community in modeling the Internet topology. hes interests include Internet measurements, multicast protocols, real-time communications, and wireless networks.

Christos Faloutsos received the B.Sc. degree in Electrical Engineering (1981) from the National Technical University of Athens, Greece and the M.Sc. and Ph.D. degrees in Computer Science from the University of Toronto, Canada. he is currently a professor at Carnegie Mellon University. He has received the Presidential Young Investigator Award by the National science Foundation (1989), three "best paper" awards (SIGMOD 94, VLDB 97, KDD01 (runner-up)), and four teaching awards. He has published over 100 refereed articles, one monograph, and holds four patents. His research interests include data mining, network analysis, indexing in relational and multimedia databases.

back to top 


Tutorial 4:

Securing the Enterprise : The Network Security – Integrity Problem
Speaker John Kerivan
Date: Monday, March 31, 2003
Time: 9AM - 5PM


Detecting enterprise security problems in high-speed switched networks has become a very difficult problem in the past decade. This tutorial session is devoted to describing the Network Security – Integrity Problem based on how we regularly organize our behaviors and perceptions to deal with numerous unknowns in our daily lives. We suggest that a Detection-Discrimination-Recognition paradigm is very well suited to a distributed security analysis and responder system capable of making complex decisions, near real-time correlations and taking appropriate counter measures to protect the assets of Enterprise Networks.

We will demonstrate generic prototypes that can respond to complex security attacks in near real time using techniques to properly quantify network security versus integrity problems. The topics to be covered in this session are;

Platform Requirements for Security Analyzers
Configuration of Behavioral Analysis Engines
Deployment Options of Security Analyzers in Complex Networks
Analyzer Correlation Techniques to compensate for Switched Network Designs
Data Management Issues including storage and refinement concepts
Notification Integration with point solution network and security tools
Utilization of System Monitors to validate the “Smoking Gun”

We will outline and discuss the technical requirements and high level specifications for such a system in such a manner as to engage the debate of balancing network security and integrity issues. Behavioral analysis techniques based on Detection- Discrimination-Recognition processes are superior to other methods that are statically based and cannot adapt to the resolution of complex network security and integrity problems.  

Participants are encouraged to bring laptops to the session. Connections to a local network will be provided to demonstrate the tools and techniques that will be covered. Participants can also take copies of the attack test scripts and tools with them. Their laptops should have the following configuration:

Operating System: Microsoft Windows 2000 Professional, SP2 or higher.
Processor: AMD K6/750 Intel PIII/750 or higher
Memory: 128MB
Disk Space: 25.5MB free space for programs - 2GB local storage for scripts & data
Recommended Adapter Cards: PCI Bus0, NetGear FA312 10/100, SMC 9432 10/100, 
3Com 3C920 Fast Ethernet Controller, Xircom CardBus Ethernet II 10/100 or equivalent cards that can run in promiscuous modes.

For those without laptops, CDs with the tools and test scripts will be available.

Presenter biography:

Dr. John Kerivan (Jack) is the CTO of Heroix Security. Jack has been providing network and security solutions to numerous companies for the past 15 years. He has worked as a senior executive in startups, as well as in major corporations, developing many network security based applications for large multi vendor networks. Prior to Heroix, Jack founded nGran, a network security solutions provider. Jack has also served as a Senior Manager for Deloitte & Touché, LLP focused on e-Business Technologies and Security for the New England Practice. Jack was also the Senior Director of Professional Services for NEC. In that capacity, he was responsible for establishing and managing NEC’s Computer Systems Division global professional services business. Prior to that position, he was the Eastern Territory Networking Services Resource Manager for Digital Equipment Corporation. In that position he developed and ran the Network Services PC Integration business in Eastern Territory for the Digital MCS business. Jack also developed the business plan for Network Services Operations for Groupe Bull and as a Vice President and General Manager ran the operations in North America and PAC rim. While at Bull, Jack held a variety of positions including lead developer for the NCIA programs and Director of Network Consulting Services.

He has held a variety of management posts in government and industry and is an active member of the IEEE, Communications and Computer Societies. He has held technical & management positions in Cabot Corporation and worked as a Member of the Technical Staff at AT&T Bell Laboratories. Jack received a B.A. in 1971 from the University of Massachusetts , an M.A. in 1975 from the University of Connecticut and completed his formal training with a Ph.D. in Communications Sciences at the University of Connecticut in 1978.

back to top 


Tutorial 5:

Optical Networking: Recent Developments, Issues, and Trends
Speaker Raj Jain
Date: Monday, March 31, 2003
Time: 9AM - 5PM


The year 2002 has brought a turn around in the optical networking. Several technologies that were hot until last year are no longer so. In this tutorial, beginning with networking trends and recent DWDM records, a sample of recent optical networking products and applications will be presented. Key technological developments that made optical networking a hot topic will be explained.  Upcoming optical technologies will also be briefly described. The role of 10 Gigabit Ethernet standard in unifying the local and wide area networks will be presented. While Ethernet is trying to replace SONET/SDH in the carrier networks, SONET itself is changing to better meet the new demands of data traffic. The features that make Next Generation SONET a tough competitor for Ethernet in the carrier networks will be explained.

The latest debate on all-optical switching along with the introductionof IP control plane will be presented. Multiprotocol Label Switching (MPLS), Multiprotocol Lambda Switching, and Generalized Multiprotocol Label Switching (GMPLS) will be explained.  New standards activities to change IP protocols to enable optical networking will be presented.


Networking Trends: Life Cycles of Technologies, Traffic vs CapacityGrowth, Ethernet Everywhere, Technology Failures vs Successes, LAN-WAN Convergence, Ethernet vs SONET, Everything over IP.
Carrier Networking Technologies: SONET, SONET Components, Protection, Rings, Virtual Concatenation, Generic Framing Protocol (GFP), Link Capacity Adjustment Scheme (LCAS), SDH, OTN.
Gigabit and 10 Gb Ethernet: Distance-B/W Principle, 10 GbE: KeyFeatures, PMD Types, 1G/10G Ethernet Switch Features, Flow Control, Link Aggregation, Jumbo Frames, Resilient Packet Ring (RPR), Beyond 10 GbE.
Recent Developments in Optical Networking: Recent DWDM Records and Product Announcements, All-Optical Networking, IP over DWDM, Changes in IP, UNI, ASON, MPLS, MPL(ambda)S, GMPLS, Martini Drafts, Upcoming optical technologies.

Presenter Biography:

Raj Jain is a Co-founder and Chief Technology Officer of Nayna Networks, Inc - an optical systems company in Milpitas , CA . He is currently on a leave of absence from Ohio State University in Columbus , Ohio , where he is a Professor of Computer and Information Sciences.

He is a Fellow of IEEE, a Fellow of ACM.  He is currently aDistinguished Lecturer for the IEEE Communications Society.  He is on the Editorial Boards of Computer Networks: The International Journal of Computer and Telecommunications Networking, Computer Communications (UK), Journal of High Speed Networks (USA), Mobile Networks and Applications, and International Journal of Wireless and OpticalCommunications ( Singapore ).

Raj Jain is on the Board of Technical Advisors to EdgeNet Communications Corporation, Burlingame, CA, Corona Networks, Inc., Milpitas, CA, Chip Engines, Inc., Sunnyvale, CA, Teradiant Networks, San Jose, CA, Tivre Networks, San Jose, CA, Irvine Networks, Irvine, CA, Beacon Telco, Boston, MA, Avatar Networks, Fremont, CA, Rhonet Systems, Columbus, OH, and on the Board of Research Advisors to iBEAM Broadcasting Corporation, Sunnyvale, CA. Previously, he was also on the Board of Advisors to Nexabit Networks, Westboro, MA, which was acquired by Lucent Corporation and to Amber Networks, Fremont, CA, which was acquired by Nokia.

back to top 


Tutorial 6:

Peer-to-Peer Systems
Speaker Keith W. Ross and Dan Rubenstein
Date: Monday, March 31, 2003
Time: 9AM - 5PM


A P2P application is an application that (1) has significant autonomy from central servers and (2) exploits the resources – including content, bandwidth and CPU cycles – in a large number of intermittently-connected peers.  P2P applications are be used for file sharing, distributed file systems, distributed computing, messaging, and real-time communication.

In this tutorial, we will explore in detail the unstructured "industrial" P2P systems as well as the structured Dynamic Hash Table (DHT)-based P2P systems. We will devote special attention to describing the wide-range of networking applications that can be built from DHT substrates. The tutorial will also include an important mathematical analysis component, drawing on tools from probability theory, optimization, and algorithms. We will also survey experimental observations of P2P performance.

Presenter Biographies:

Keith W. Ross is a Professor in the Multimedia Communications Department at Institut Eurecom. Before joining Institut Eurecom, he was a professor in the Department of Systems Engineering at the University of Pennsylvania from 1985 through 1997. He will be joining the Polytechnic University in Brooklyn as the Leonard Shustek Chair of Computer Science in January 2003.

Professor Ross has made significant research contributions to the theory and practice of computer networking throughout his career, including work in P2P systems, audio and video streaming, content distribution, quality of service, traffic engineering, loss networks, and Markov decision processes. His work on Web caching includes the co-development of the CARP protocol, which has been implemented in Microsoft and Netscape caching products. He has been on numerous program committees and editorial boards in the areas of computer networking and applied probability.  His interests in streaming technologies and eLearning lead to the creation in 1999 of Wimba, for which he is the founding CEO. Wimba is a venture-capital funded start-up that develops and markets asynchronous voice technologies, accessible both through the Web and through mobile phones.

Professor Ross is co-author (with James Kurose) of the leading networking textbook, "Computer Networking: A Top-Down Approach Featuring the Internet," which is being used by over 200 universities in North America and is being translated into several languages. Professor Ross is also the author of the book "Multiservice Loss Models for Telecommunication Networks," published by Springer in 1995.

Dan Rubenstein has been an Assistant Professor of Electrical Engineering and Computer Science at Columbia University since 2000.  He received a B.S. degree in mathematics from M.I.T., an M.A. in math from UCLA, and a PhD in computer science from University of Massachusetts , Amherst .  His research interests are in network technologies, applications, and performance analysis, with an emphasis on large-scale Internet design for continuous media transmission.  He received a Best Student Paper Award for his ACM SIGMETRICS 2000 paper entitled "Detecting Shared Points of Congestion via End-to-end Measurement" and an NSF CAREER Award in 2002 to continue his investigation of peer-to-peer and overlay networking systems.

back to top 


Home ] Executive Committee ] Program Committee ] Call for Papers ] Author's Kit ] Technical Program ] Best Paper ] [ Tutorials ] Panels ] Other Meetings ] Registration ] Hotel Reservation ] Travel Grants ] Corporate Patrons ] Local Attactions ]