Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1544012acmconferencesBook PagePublication PagesconextConference Proceedingsconference-collections
CoNEXT '08: Proceedings of the 2008 ACM CoNEXT Conference
ACM2008 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
Madrid Spain December 9 - 12, 2008
ISBN:
978-1-60558-210-8
Published:
09 December 2008
Sponsors:
Next Conference
Reflects downloads up to 03 Oct 2024Bibliometrics
Skip Abstract Section
Abstract

It's a great pleasure to welcome everyone to ACM CoNEXT 2008 - the 4th International Conference on emerging Networking EXperiments and Technologies. The first three CoNEXT conferences were held in Toulouse, Lisbon and New York, and this year returned to its roots in Europe. This year's edition has been co-organized by IMDEA Networks and University of Carlos III, and held in Madrid: one of the world's leading cities in terms of cultural and artistic activity along with a lively nightlife. We hope that this conference facilitates a stimulating exchange of ideas among many of the members of our international research community.

The ACM CoNEXT '08 Conference received 166 papers of high quality, of which 29 were selected for publication after a thorough peer review process. The ACM CoNEXT Student Workshop received 66 poster submissions out of which 30 were accepted; ReArch'08 --- Re-Architecting the Internet workshop received 50 papers submitted and 13 accepted; and ROADS'08---3rd International Workshop on Real Overlays & Distributed Systems received 20 paper submissions out of which 6 were accepted.

research-article
Is there life in Second Life?
Article No.: 1, Pages 1–12https://doi.org/10.1145/1544012.1544013

Social virtual worlds such as Second Life are digital representations of the real world where human-controlled avatars evolve and interact through social activities. Understanding the characteristics of existing virtual worlds can be extremely valuable ...

research-article
Troubleshooting chronic conditions in large IP networks
Article No.: 2, Pages 1–12https://doi.org/10.1145/1544012.1544014

Chronic network conditions are caused by performance impairing events that occur intermittently over an extended period of time. Such conditions can cause repeated performance degradation to customers, and sometimes can even turn into serious hard ...

research-article
Packet doppler: network monitoring using packet shift detection
Article No.: 3, Pages 1–12https://doi.org/10.1145/1544012.1544015

Due to recent large-scale deployments of delay and loss-sensitive applications, there are increasingly stringent demands on the monitoring of service level agreement metrics. Although many end-to-end monitoring methods have been proposed, they are ...

research-article
Online estimation of RF interference
Article No.: 4, Pages 1–12https://doi.org/10.1145/1544012.1544016

Increased AP density in enterprise WLANs leads to increasing RF interference and decreasing performance. An important step towards mitigating this problem is to construct precise RF maps in the form of a conflict graph. Prior work on conflict graph ...

research-article
MOSAIC: unified declarative platform for dynamic overlay composition
Article No.: 5, Pages 1–12https://doi.org/10.1145/1544012.1544017

Overlay networks create new networking services across nodes that communicate using pre-existing networks. MOSAIC is a unified declarative platform for constructing new overlay networks from multiple existing overlays, each possessing a subset of the ...

research-article
EGOIST: overlay routing using selfish neighbor selection
Article No.: 6, Pages 1–12https://doi.org/10.1145/1544012.1544018

A foundational issue underlying many overlay network applications ranging from routing to peer-to-peer file sharing is that of connectivity management, i.e., folding new arrivals into an existing overlay, and re-wiring to cope with changing network ...

research-article
On cooperative settlement between content, transit and eyeball internet service providers
Article No.: 7, Pages 1–12https://doi.org/10.1145/1544012.1544019

Internet service providers (ISPs) depend on one another to provide global network services. However, the profit-seeking nature of the ISPs leads to selfish behaviors that result in inefficiencies and disputes in the network. This concern is at the heart ...

research-article
On the scalability of BGP: the roles of topology growth and update rate-limiting
Article No.: 8, Pages 1–12https://doi.org/10.1145/1544012.1544020

The scalability of BGP routing is a major concern for the Internet community. Scalability is an issue in two different aspects: increasing routing table size, and increasing rate of BGP updates. In this paper, we focus on the latter. Our objective is to ...

research-article
Instability free routing: beyond one protocol instance
Article No.: 9, Pages 1–12https://doi.org/10.1145/1544012.1544021

Today, a large body of research exists regarding the correctness of routing protocols. However, many reported global disruptions of Internet connectivity, e.g., inter-AS persistent loops, cannot be explained by looking at a single routing protocol at a ...

research-article
Balancing performance, robustness and flexibility in routing systems
Article No.: 10, Pages 1–12https://doi.org/10.1145/1544012.1544022

Modern networks face the daunting task of handling increasingly diverse traffic that is displaying a growing intolerance to disruptions. This has given rise to many initiatives, and in this paper we focus on multiple topology routing as the primary ...

research-article
Internet traffic classification demystified: myths, caveats, and the best practices
Article No.: 11, Pages 1–12https://doi.org/10.1145/1544012.1544023

Recent research on Internet traffic classification algorithms has yield a flurry of proposed approaches for distinguishing types of traffic, but no systematic comparison of the various algorithms. This fragmented approach to traffic classification ...

research-article
Observing slow crustal movement in residential user traffic
Article No.: 12, Pages 1–12https://doi.org/10.1145/1544012.1544024

It is often argued that rapidly increasing video content along with the penetration of high-speed access is leading to explosive growth in the Internet traffic. Contrary to this popular claim, technically solid reports show only modest traffic growth ...

research-article
Capacity estimation of ADSL links
Article No.: 13, Pages 1–12https://doi.org/10.1145/1544012.1544025

Most tools designed to estimate the capacity of an Internet path require access on both end hosts of the path, which makes them difficult to deploy and use. In this paper we present a single-sided technique for measuring the capacity without the active ...

research-article
A priority-layered approach to transport for high bandwidth-delay product networks
Article No.: 14, Pages 1–12https://doi.org/10.1145/1544012.1544026

High-speed organizational networks running over leased fiber-optic lines or VPNs suffer from the well-known limitations of TCP over long-fat pipes. High-performance protocols like XCP require changes in the network. Other protocols like FastTCP assume ...

research-article
DaVinci: dynamically adaptive virtual networks for a customized internet
Article No.: 15, Pages 1–12https://doi.org/10.1145/1544012.1544027

Running multiple virtual networks, customized for different performance objectives, is a promising way to support diverse applications over a shared substrate. Despite being simple, a static division of resources between virtual networks can be highly ...

research-article
Implementation of end-to-end abstractions in a network service architecture
Article No.: 16, Pages 1–12https://doi.org/10.1145/1544012.1544028

To support the increasing diversity of systems and protocols in the Internet, modern routers offer a variety of data path processing functions. Such "network services" are easy to implement on a single node, but a network-wide deployment is difficult. ...

research-article
Peer-assisted content distribution with prices
Article No.: 17, Pages 1–12https://doi.org/10.1145/1544012.1544029

Peer-assisted content distribution matches user demand for content with available supply at other peers in the network. Inspired by this supply-and-demand interpretation of the nature of content sharing, we employ price theory to study peer-assisted ...

research-article
Uplink allocation beyond choke/unchoke: or how to divide and conquer best
Article No.: 18, Pages 1–12https://doi.org/10.1145/1544012.1544030

Motivated by emerging cooperative P2P applications we study new uplink allocation algorithms for substituting the rate-based choke/unchoke algorithm of BitTorrent which was developed for non-cooperative environments. Our goal is to shorten the download ...

research-article
Maintaining replicas in unstructured P2P systems
Article No.: 19, Pages 1–12https://doi.org/10.1145/1544012.1544031

Replication is widely used in unstructured peer-to-peer systems to improve search or achieve availability. We identify and solve a subclass of replication problems where each object is associated with a maintainer node, and its replicas should only be ...

research-article
Towards high performance virtual routers on commodity hardware
Article No.: 20, Pages 1–12https://doi.org/10.1145/1544012.1544032

Modern commodity hardware architectures, with their multiple multi-core CPUs and high-speed system interconnects, exhibit tremendous power. In this paper, we study performance limitations when building both software routers and software virtual routers ...

research-article
Efficient IP-address lookup with a shared forwarding table for multiple virtual routers
Article No.: 21, Pages 1–12https://doi.org/10.1145/1544012.1544033

Virtual routers are a promising way to provide network services such as customer-specific routing, policy-based routing, multi-topology routing, and network virtulization. However, the need to support a separate forwarding information base (FIB) for ...

research-article
Towards systematic design of enterprise networks
Article No.: 22, Pages 1–12https://doi.org/10.1145/1544012.1544034

Enterprise networks are important, with size and complexity even surpassing carrier networks. Yet, the design of enterprise networks is ad-hoc and poorly understood. In this paper, we show how a systematic design approach can handle two key areas of ...

research-article
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
Article No.: 23, Pages 1–12https://doi.org/10.1145/1544012.1544035

Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in such networks quintessentially depends on mechanisms to verify the ...

research-article
Packet-dropping adversary identification for data plane security
Article No.: 24, Pages 1–12https://doi.org/10.1145/1544012.1544036

Until recently, the design of packet dropping adversary identification protocols that are robust to both benign packet loss and malicious behavior has proven to be surprisingly elusive. In this paper, we propose a secure and practical packet-dropping ...

research-article
Extending finite automata to efficiently match Perl-compatible regular expressions
Article No.: 25, Pages 1–12https://doi.org/10.1145/1544012.1544037

Regular expression matching is a crucial task in several networking applications. Current implementations are based on one of two types of finite state machines. Non-deterministic finite automata (NFAs) have minimal storage demand but have high memory ...

research-article
Quality of monitoring of stochastic events by periodic & proportional-share scheduling of sensor coverage
Article No.: 26, Pages 1–12https://doi.org/10.1145/1544012.1544038

We analyze the quality of monitoring (QoM) of stochastic events by a periodic sensor which monitors a point of interest (PoI) for q time every p time. We show how the amount of information captured at a PoI is affected by the proportion q/p, the time ...

research-article
Improving the performance of multi-hop wireless networks using frame aggregation and broadcast for TCP ACKs
Article No.: 27, Pages 1–12https://doi.org/10.1145/1544012.1544039

As data rates supported by the physical layer increase, PHY and especially MAC overheads increasingly dominate the throughput achievable by wireless networks. A promising approach for reducing these overheads is to aggregate a number of frames together ...

research-article
TDM MAC protocol design and implementation for wireless mesh networks
Article No.: 28, Pages 1–12https://doi.org/10.1145/1544012.1544040

We present the design, implementation, and evaluation of a Time Division Multiplex (TDM) MAC protocol for multi-hop wireless mesh networks using a programmable wireless platform. Extensive research has been devoted to optimal scheduling algorithms for ...

research-article
Opportunistic use of client repeaters to improve performance of WLANs
Article No.: 29, Pages 1–12https://doi.org/10.1145/1544012.1544041

Currently deployed IEEE 802.11 WLANs (Wi-Fi networks) share access point (AP) bandwidth on a per-packet basis. However, the various stations communicating with the AP often have different signal qualities, resulting in different transmission rates. This ...

research-article
Distributed event delivery model for collaborative virtual simulations
Article No.: 30, Pages 1–2https://doi.org/10.1145/1544012.1544042

Networked Virtual Environments (NVEs) are computer generated, synthetic worlds that allow simultaneous interactions of multiple participants. IP multicast and application layer multicasting has been used for supporting collaborative virtual simulations. ...

Contributors
  • Carlos III University of Madrid
  • The University of Texas at Austin
  • New York University
  • Yale University
  1. Proceedings of the 2008 ACM CoNEXT Conference

    Recommendations

    Acceptance Rates

    Overall Acceptance Rate 198 of 789 submissions, 25%
    YearSubmittedAcceptedRate
    CoNEXT '221512819%
    CoNEXT '19 Companion523465%
    CoNEXT '161603019%
    CoNEXT '141332720%
    CoNEXT Student Workshop '14341750%
    CoNEXT '132264419%
    CoNEXT Student Workhop '13331855%
    Overall78919825%