It is a great pleasure to welcome you all to the ACM SIGCOMM 2004 Workshops!We are pleased to present an outstanding program consisting of four workshops: (1) Future Directions in Network Architecture (FDNA); (2) Network and System Support for Games (NetGames); (3) Practice and Theory of Incentives in Networked Systems (PINS); and (4) Network Troubleshooting: Research, Theory, and Operations Practice Meet Malfunctioning Reality (NetTs).Workshops were first introduced as a part of the ACM SIGCOMM week-long Data Communications Festival in 2003 to enhance the ACM SIGCOMM conference technical program; this is the second year for this effort. In response to the call for proposals, we received 6 workshop proposals, 4 of which were accepted. FDNA, the highly successful workshop from 2003, is repeated for the second year. This is the first year for NetGames, PINS, and NetTs; a key feature of all of these workshops is their outreach to other communities. NetGames -- organized for the first time in conjunction with the ACM SIGCOMM conference -- brings together multimedia and gaming community with networking; PINS (organized in collaboration with ACM SIGecom) crosses the boundaries between economics, game theory, and networking; and NetTs exposes challenges in network operations to networking researchers.Organizing such a diverse set of workshops requires a great deal of effort and organization and I want to thank all the members of the SIGCOMM 2004 organizing committee and several volunteers who made it possible. I would like to thank Craig Partridge, Jennifer Rexford, John Wroclawski, and Jim Kurose for their suggestions and help in soliciting exciting workshop proposals. I also thank the SIGCOMM 2004 organizing committee, and in particular, Raj Yavatkar, Jennifer Rexford, Chris Edmondson-Yurkanan and Joe Touch for all the support and guidance they provided throughout the workshop organization process. The local arrangements for the workshops are a result of efforts of Wu-chang Feng. Prashant Chandra, Andreas Terzis, Marcel Waldvogel, and Allyn Romanow handled the web pages, registration, and publicity for the workshops.
Proceeding Downloads
The case for separating routing from routers
Over the past decade, the complexity of the Internet's routing infrastructure has increased dramatically. This complexity and the problems it causes stem not just from various new demands made of the routing infrastructure, but also from fundamental ...
Simplified layering and flexible bandwidth with TWIN
This paper describes a novel network architecture with simplified layering, called Time-domain Wavelength Interleaved Networking (TWIN), that scales end-to-end bandwidth granularity exibly up to the wavelength capacity. In TWIN, all packet and complex ...
Secure routerless routing
Suppose that there are n Senders and r Receivers. Our goal is to design a communication network such that long messages can be sent from Sender i to Receiver π(i) such that no other receiver can retrieve the message intended for Receiver π(i). The task ...
A virtualized link layer with support for indirection
The current Internet today hosts several extensions for indirection like Mobile IP, NAT, proxies, route selection and various network overlays. At the same time, user-controlled indirection mechanisms foreseen in the Internet architecture (e.g., loose ...
On demand label switching for spontaneous edge networks
We consider the problem of interconnecting hosts in spontaneous edge networks composed of various types of wired or wireless physical and link layer technologies. All or some hosts in a spontaneous network can be organized as a multi-hop ad hoc network, ...
NUTSS: a SIP-based approach to UDP and TCP network connectivity
The communications establishment capability of the Session Initiation Protocol is being expanded by the IETF to include establishing network layer connectivity for UDP for a range of scenarios, including where hosts are behind NAT boxes, and host are ...
Steps towards a DoS-resistant internet architecture
Defending against DoS attacks is extremely difficult; effective solutions probably require significant changes to the Internet architecture. We present a series of architectural changes aimed at preventing most flooding DoS attacks, and making the ...
Loose source routing as a mechanism for traffic policies
Internet packet delivery policies have been of concern since the earliest times of the Internet, as witnessed by the presence of the Type of Service (ToS) field in the IPv4 header. Efforts continue today with Differentiated Services (DiffServ) and ...
Invariants: a new design methodology for network architectures
The first age of Internet architectural thinking concentrated on defining the correct principles for designing a packet-switched network and its application protocol suites. Although these same principles remain valid today, they do not address the ...
Cited By
-
Oh Y, Ning P, Liu Y and Reiter M (2009). Authenticated data compression in delay tolerant wireless sensor networks 2009 Sixth International Conference on Networked Sensing Systems (INSS), 10.1109/INSS.2009.5409933, 978-1-4244-6313-8, (1-8)
-
LeBrun J, Chen-Nee Chuah , Ghosal D and Michael Zhang Knowledge-Based Opportunistic Forwarding in Vehicular Wireless Ad Hoc Networks 2005 IEEE 61st Vehicular Technology Conference, 10.1109/VETECS.2005.1543743, 0-7803-8887-9, (2289-2293)
-
Musolesi M, Hailes S and Mascolo C Adaptive Routing for Intermittently Connected Mobile Ad Hoc Networks Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, 10.1109/WOWMOM.2005.17, 0-7695-2342-0, (183-189)
- Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture