Proceedings of
2007 ACM CoNEXT Conference
December 10-13, 2007
3rd International Conference on
emerging Networking EXperiments and Technologies
(CoNEXT)
|
The Association for Computing Machinery, Inc.
1515 Broadway
Copyright © 2007 by the Association for
Computing Machinery, Inc (ACM). Permission to make digital or hard copies of
portions of this work for personal or classroom use is granted without fee
provided that the copies are not made or distributed for profit or commercial
advantage and that copies bear this notice and the full citation on the first
page. Copyrights for components of this work owned by others than ACM must
be honored. Abstracting with credit is permitted.
To copy otherwise, to republish, to post on servers or to redistribute to
lists, requires prior specific permission and/or a fee. Request permission to
republish from: Publications Dept. ACM, Inc. Fax +1-212-869-0481 or E-mail permissions@acm.org.
For other copying of articles that carry a code at the bottom of the first or
last page, copying is permitted provided that the per-copy fee indicated in the
code is paid through the
Notice to Past Authors of ACM-Published Articles
ACM intends to create a complete electronic archive of all articles and/or
other material previously published by ACM. If you have written a work that was
previously published by ACM in any journal or conference proceedings prior to
1978, or any SIG Newsletter at any time, and you do NOT want this work to
appear in the ACM Digital Library, please inform permissions@acm.org, stating the title
of the work, the author(s), and where and when published.
ACM
ISBN: 978-1-59593-770-4
Additional copies may be ordered prepaid from:
ACM Order Department Phone: 1-800-342-6626 |
|
General Chairs’ Message
It’s a great pleasure to welcome everyone to ACM CoNEXT 2007
- the 3rd International Conference on emerging Networking EXperiments and
Technologies (CoNEXT). With the first
two CoNEXT conferences having been held in
CoNEXT 2007 has been made possible only through the hard work of many people. Olivier Bonaventure and Roch Guérin assembled an absolutely outstanding technical program committee that reviewed submitted papers and selected the final program. A huge debt of thanks is due to our program committee members and external reviewers for helping to assemble such a strong technical program. Suman Banerjee, Roger Karrer, and Ashwin Sridharan and their Student Workshop Program Committee did a wonderful job of organizing the student workshop, which has had a special place in CoNEXT. Laurent Mathy did a splendid job of handling the CoNEXT Rising Star Award. Two local networking researchers, Erich Nahum and Lakshmi Subramanian, ably handled aspects of local arrangements and publications, respectively. Warms thanks also to S. Keshav for organizing the panel session on the afternoon of the second conference day. Finally, a great deal of thanks and appreciation are also due to ACM SIGCOMM - this is the first CoNEXT to be sponsored by ACM, and this has only come to pass because of the help and support of SIGCOMM leadership.
We are also very grateful to our sponsors: Cisco, Thomson, Alcatel-Lucent, IBM, and IMDEA. Their generosity, together with a grant provided by the National Science Foundation, has funded travel awards and support for our student workshop, and has helped keep the costs of CoNEXT moderate. Special thanks are due to Cisco and Thomson for their continuing support of CoNEXT, and a “Welcome aboard’ to Alcatel-Lucent, IBM, and IMDEA!
Welcome again to CoNEXT and to
Jim Kurose,
Henning Schulzrinne,
General Co-Chairs,
2007 ACM CoNEXT
Program
Chairs’ Message
After
This year, 138 high quality papers were submitted to the conference. We
received papers written by authors from 29 different countries and covering a
broad and diverse set of topics. Given the high quality of the submissions,
selecting a program was both easy and challenging, as we had a plethora of
worthy candidates but could not accept them all. The selection process was extensive and
thorough and proceeded in three rounds during which all papers received at
least three reviews, and often more.
The first round of the review process took place over the summer shortly after
the submission deadline, at which time three TPC members were assigned to each
paper. As one of CoNEXT's major objectives
is to provide fair and accurate evaluations, TPC members were asked to review
papers themselves (no delegation was allowed) and encouraged to provide
detailed feedback to the authors. Each review was then cross-checked by the
program chairs and a “sanity checker”, who was a TPC member not among the
original reviewers. The sanity check
quickly assessed reviews for fairness and completeness. Based on the evaluations produced by this
first round, the Program Chairs selected 84 papers for the second round that
started in early September.
During the second round, the TPC members assigned to each paper read the other
reviewer's opinions and debated the relative merits of the paper. The outcome
of this discussion was either a unanimous recommendation on how to classify the
paper in preparation for the TPC meeting, or a disagreement in which case
additional reviews were requested inside and outside the TPC. Papers for which agreement could be reached
were assigned to one of three categories: “accept”, “discuss”, and
“reject”. Papers for which no agreement
was reached were assigned to the “discuss” category pending the completion of
the additional reviews that were requested.
The bulk of the papers landed in the “discuss” category, with only a
handful of papers accepted up-front, and the remainder of the papers being
viewed as not yet ready for publication.
The third round of the selection process was the TPC meeting itself, which was
held in
The CoNEXT’07 best paper award goes to the paper entitled “The Diameter of Opportunistic Mobile Networks,” co-authored by A.
Chaintreau, A. Mtibaa, L. Massoulie, and C. Diot from Thomson Paris Research
Lab. The paper was unanimously selected
from a highly competitive field by a committee consisting of three TPC members,
who praised its combination of analysis and experimental validation.
As in 2006, CoNEXT’07 also awarded the “CoNEXT rising star award”, which this
year goes to Ion Stoica from the
In addition to the technical program, Suman Banerjee, Roger Karrer and Ashwin
Sridharan have organized a wonderful workshop for students. It also attracted a record number of
submissions, which both illustrates the high level of current interest in the
field and bodes well for its future.
In parallel to the official CoNEXT TPC, Laurent Mathy, Philippe Owezarski and
Olivier Bonaventure organized a purely educational shadow TCP whose objective
was to allow young Ph.D. graduates to have an inside view into the paper
selection process of a major conference. 78 of the papers submitted to CoNEXT
received additional feedback from the 35 participants in the shadow TPC, who
although coming primarily from Europe, also included members from
Last but not least, we would like to thank and acknowledge the many individuals
whose help and hard work made CoNEXT’07 possible, and in particular the two
general chairs of the conference, Henning Schulzrinne and Jim Kurose, who
oversaw all the details of its organization.
We hope you will enjoy your stay in
Olivier Bonaventure, Université catholique
de Louvain
Roch Guérin, University of Pennsylvania
Program
co-Chairs, 2007 ACM CoNEXT
2007 ACM CoNEXT
Conference Organization
Erich Nahum, IBM
Technical Program Committee
Kevin Almeroth,
Mostafa Ammar, Georgia
Institute of
Christian Bettstetter,
Augustin Chaintreau,
Dah Ming Chiu, The Chinese
Marco Conti,
Mark Crovella,
Kevin Fall, Intel
Nick Feamster, Georgia Institute
of
Hannes Frey,
Lixin Gao,
Timothy Griffin,
Matthias Grossglauser,
Mark Handley,
Peter Key, Microsoft
Research, ,
Lars-Åke Larzon,
Guy Leduc,
Bo Li,
Ibrahim Matta,
Martin May, ETH
Paulo Mendes,
Edmundo Monteiro,
Andrew Moore,
Richard Mortier, Microsoft
Research, ,
Ariel Orda,
Joerg Ott,
Max Ott, NICTA,
Jitendra Padhye, Microsoft
George Polyzos,
Rajeev Rastogi,
Narasimha Reddy,
Pablo Rodriguez,
Anees Shaikh, IBM TJ
Rajeev Shorey, General Motors
Rute Sofia, INESC
Ashwin Sridharan, Sprint
Vikram Srinivasan, National
Ralf Steinmetz, Technische
Shu Tao,
Joe Touch, USC/ISI,
Steve Uhlig,
Darryl Veitch,
Andras Veres, Ericsson
Research,
Ryuji Wakikawa,
Lars Wolf, Technische
Universität Braunschweig, IBR,
Xiaowei Yang,
Zhi-Li Zhang,
External Reviewers
Gildas Avoine
Razvan Cristescu
Christos Gkantsidis
Michael Gyarmati
Youki Kadobayashi
Srinivasan Keshav
Kin-Wah Kwong
Jean-Francois Labourdette
Ratul Mahajan
Laurent Mathy
Jean-Jacques Quisquater
James Roberts
Udo Schilcher
Patrick Thiran
Damon Wischik
Fan Ye
Security
1.
A Hybrid
Finite Automaton for Practical Deep Packet Inspection
Michela Becchi (Washington
University in St. Louis, USA); Patrick Crowley (Washington University in St.
Louis, USA)
2.
Detecting
Worm Variants using Machine Learning
Oliver Sharma (University of
Glasgow, United Kingdom); Joseph Sventek (University of Glasgow, United
Kingdom); Mark Girolami (University of Glasgow, United Kingdom)
3.
Practical
Defenses Against BGP Prefix Hijacking
Zheng Zhang (Purdue University,
USA); Ying Zhang (University of Michigan, USA); Y. Charlie Hu (Purdue
University, USA); Z. Morley Mao (University of Michigan, USA)
4.
Identifying
Dynamic IP Address Blocks Serendipitously through Background Scanning Traffic
Yu Jin (University of Minnesota,
USA); Esam Sharafuddin (University of Minnesota, USA); Zhi-Li Zhang (University
of Minnesota, USA)
New Architectures and their Evaluation
5.
Modeling
the Adoption of New Network Architectures
Dilip Joseph (University C.
Berkeley, USA); Nikhil Shetty (University of California at Berkeley, USA); John
Chuang (University of California at Berkeley, USA); Ion Stoica (University Of
California, Berkeley, USA)
6.
Internet
Economics: The use of Shapley value for ISP settlement
Richard Ma (Columbia University,
USA); Dah Ming Chiu (The Chinese University of Hong Kong, Hong Kong); 0,1 Lui
(Chinese University of Hong Kong, Hong Kong); Vishal Misra (Columbia
University, USA); Dan Rubenstein (Columbia University, USA)
7.
On the
Cost of Caching Locator/ID Mappings
Luigi Iannone (Université Catholique
de Louvain, Belgium); Olivier Bonaventure (Université catholique de Louvain,
Belgium)
Improving Communication Efficiency
8.
ER:
Efficient Retransmission Scheme for Wireless LANs
Eric Rozner (University of Texas,
Austin, USA); Anand Padmanabha Iyer (The University of Texas at Austin, USA);
Yogita Mehta (University of Texas, Austin, USA); Lili Qiu (The University of
Texas at Austin, USA)
9.
Near-Optimal
Co-ordinated Coding in Wireless Multihop Networks
Björn Scheuermann (Heinrich Heine
University Düsseldorf, Germany); Wenjun Hu (University of Cambridge, United
Kingdom); Jon Crowcroft (University of Cambridge, United Kingdom)
10. Multipath Code Casting for Wireless Mesh Networks
Christos Gkantsidis (Microsoft
Research, United Kingdom); Wenjun Hu (University of Cambridge, United Kingdom);
Peter Key (Microsoft Research, United Kingdom); Bozidar Radunovic (Microsoft
Research Cambridge, United Kingdom); Steluta Gheorghiu (Universitat Politecnica
de Catalunya, Spain); Pablo Rodriguez (Telefonica Research, Barcelona, Spain)
11. Multipath Live Streaming via TCP: Scheme, Performance
and Benefits
Bing Wang (University of
Connecticut, USA); Wei Wei (University of Massachusetts, USA); Don Towsley
(University of Massachusetts at Amherst, USA)
Delay Tolerant Networks
12. The Diameter of Opportunistic Mobile Networks
Augustin Chaintreau (Thomson,
France); Abderrahmen Mtibaa (Thomson Paris Research Lab, France); Laurent
Massoulie (Thomson Paris Research Lab, France); Christophe Diot (Thomson,
France)
13. Fair and Efficient Scheduling in Data Ferrying
Networks
Shimin Guo (University of Waterloo,
Canada); Srinivasan Keshav (University of Waterloo, Canada)
14. Otiy: Locators tracking nodes
Mathias Boc (Universite Pierre et
Marie Curie - Paris 6, France); Anne Fladenmuller (University Paris 6 - LIP6,
France); Marcelo Dias de Amorim (Universite Pierre et Marie Curie - Paris 6,
France)
Network Engineering, Monitoring, and Modeling
15. Router Buffer Sizing Revisited: The Role of the
Output/Input Capacity Ratio
Ravi Prasad (Georgia Tech, USA);
Constantinos Dovrolis (Georgia Tech, USA); Marina Thottan (Bell Labs, USA)
16. Improving Service Differentiation in IP Networks
through Dual Topology Routing
Kin-Wah Kwong (University of
Pennsylvania, USA); Roch Guerin (University of Pennsylvania, USA); Anees Shaikh
(IBM TJ Watson Research Center, USA); Shu Tao (IBM T. J. Watson Research
Center, USA)
17. Rethinking Internet Traffic Management: From Multiple
Decompositions to a Practical Protocol
Jiayue He (Princeton University,
USA); Martin Suchara (Princeton University, USA); Ma'ayan Bresler (UC Berkeley,
USA); Mung Chiang (Princeton University, USA); Jennifer Rexford (Princeton
University, USA)
18. NetDiagnoser: Troubleshooting network
unreachabilities using end-to-end probes and routing data
Amogh Dhamdhere (Georgia Tech, USA);
Renata Teixeira (CNRS and Université Pierre et Marie Curie, France);
Constantinos Dovrolis (Georgia Tech, USA); Christophe Diot (Thomson, France)
Mesh Networks
19. Joint MAC-aware Routing and Load Balancing in Mesh
Networks
Vivek Mhatre (Thomson, France);
Francois Baccelli (INRIA-ENS, France); Henrik Lundgren (Thomson Research,
France); Christophe Diot (Thomson, France)
20. Scalable Real-Time Gateway Assignment in Mobile Mesh
Networks
Edward Bortnikov (The Technion,
Israel Institute of Technology, Israel); Israel Cidon (Technion, Israel); Idit
Keidar (Technion, Israel)
21. Practical Service Provisioning for Wireless Meshes
Saumitra Das (Purdue University,
West Lafayette, USA); Dimitrios Koutsonikolas (Purdue University, USA); Y.
Charlie Hu (Purdue University, USA)
Wireless and Ad Hoc Networks
22. An Energy-conscious Transport Protocol for Multi-Hop
Wireless Networks
Niky Riga (Boston University, USA);
Ibrahim Matta (Boston University, USA); Alberto Medina (BBN, USA); Craig
Partridge (BBN Technologies, USA); Jason Redi (BBN Technologies, USA)
23. Backpressure Multicast Congestion Control in Mobile
Ad-Hoc Networks
Björn Scheuermann (Heinrich Heine
University Düsseldorf, Germany); Matthias Transier (University of Mannheim,
Germany); Christian Lochert (Heinrich Heine University Düsseldorf, Germany);
Martin Mauve (Heinrich Heine University Düsseldorf, Germany); Wolfgang
Effelsberg (University of Mannheim, Germany)
24. Experience with an Implementation of the Idle Sense
Wireless Access Method
Yan Grunenberger (Grenoble
Informatics Laboratory, France); Martin Heusse (Grenoble Informatics
Laboratory, France); Franck Rousseau (Grenoble Informatics Laboratory, France);
Andrzej Duda (Grenoble Informatics Laboratory, France)
Resiliency
25. Internet Routing Resilience to Failures: Analysis and
Implications
Jian Wu (University of Michigan,
USA); Ying Zhang (University of Michigan, USA); Z. Morley Mao (University of
Michigan, USA); Kang G. Shin (University of Michigan, USA)
26. On Improving the Efficiency and Manageability of
NotVia
Ang Li (University of California,
Irvine, USA); Pierre Francois (Université catholique de Louvain, Belgium);
Xiaowei Yang (University of California at Irvine, USA)
27. Proactive Replication in Distributed Storage Systems
Using Machine Availability Estimation
Alessandro Duminuco (Institut
EURECOM, France); Ernst Biersack (Institut EURECOM, France); Taoufik En-Najjary
(Institut Eurecom, France)
28. Building a Reliable P2P System Out of Unreliable P2P
Clients: the Case of KAD
Damiano Carra (Institut Eurecom,
France); Ernst Biersack (Institut EURECOM, France)
CoNext Student
Workshop Table of Contents
1.
Promoting Fluidity in the Flow of Packets of
802.11 Wireless Mesh Networks
Adel Aziz;
2.
Fairness Enhancement in Wireless Mesh
Networks
Salim Nahle; Naceur Malouch
3.
Towards the Realization of a Mobile Grid
4.
Do you know what you are generating?
Antonio Pescape'; Alessio Botta; Alberto Dainotti
5.
The BlueGame Project: Ad-hoc Multilayer Mobile Game with Social
Dimension
6.
Reproducing Opportunistic Connectivity
Traces Using Connectivity Models
7.
An AS-level IP Traceback System
8.
BonSwing: A GUI Framework for Ad-Hoc Applications
Using Service Discovery
Suman Srinivasan;
9.
A Quicker Way to Discover Nearby Peers
Gwendal Simon; Yiping CHEN; Ali Boudani;
Gilles Straub
10.
Molecular Architecture for Autonomic
Wireless Mesh Networks
Mohammad Nassiri; Fabrice Theoleyre;
Martin Heusse; Andrzej Duda
11.
Measuring P2P IPTV Traffic on Both Sides of
the World
Thomas Silverston; Olivier Fourmaux;
Kave Salamatian; Kenjiro Cho
Jaeouk Ok; Pedro Morales; Hiroyuki
Morikawa
13.
Automating the iBGP organization in large
IP networks
Virginie Van den Schriek
14.
Can Active Tracking of Inroamer Location
Optimise a Live GSM Network?
Katerina Dufková; Jirí Danihelka; Michal
Ficek; Ivan Gregor; Jan Kouba
15.
Towards next generation network
requirements for next generation gaming
Alberto Hernandez; Enrique Vazquez;
Carolina Garcia
16.
Multiplexing BGP Sessions with BGP-Mux
17.
Implementation and Preliminary Evaluation
of an ISP-Driven Informed Path Selection
Damien Saucez; Benoit Donnet ;
18.
Resource-Efficient Software Delivery Using
Volunteer Assistance
19.
Can we reduce Wi-Fi Energy Consumption
during VoIP Calls?
Vinod Namboodiri; Lixin Gao
20.
Probabilistic Inference of Lossy Links
Using End-to-End Data in Sensor Networks
21.
Folksonomy-based Reasoning in Opportunistic
Networks
22.
Capture-Aware Staggering for Concurrent
Transmissions
Naveen Kumar Santhapuri; Srihari
Nelakuditi; Romit Roy Choudhury
23.
Extending Web Browsers Architectures to
support HTTP Session Mobility
Michael Adeyeye; Neco Ventura
24.
Securing BGP Incrementally
Martin Suchara; Ioannis Avramopoulos;
25.
SWARM: Self Organization of Community
Wireless Mesh Networks
26.
Fairer TCP-Friendly Congestion Control
Protocol for Multimedia Streaming Applications
Soo-Hyun Choi; Mark Handley
27.
A secure role-based address allocation and
distribution mechanism
Damien Leroy;
28.
Characterizing Quality of Content
Distribution from YouTube like Portals
29.
Towards a Clustering Based Data Diffusion
Protocol In Delay Tolerant Networks
Sana Tmar; Eric Fleury
30.
Origin of route explosion in Virtual
Private Networks
Zied Ben-Houidi; Renata Teixeira; Marc Capelle
31.
Characterizing network events and their
impact on routing
Geneviève Amélie Medem Kuatse; Renata Teixeira; Michael Meulle
32.
A gateway for wireless broadcasting
Kristjan Jonsson; Olafur Helgason;
Gunnar Karlsson
33.
A Next Generation Internet Architecture for
Mobility and Multi-homing Support
Walter Wong; Fábio Verdi; Maurício Magalhães
34.
A Novel Approach for Creating Trust to
Reduce Malicious Behavior in MANET
Syed Rizvi; Saroj Poudyal; Varsha Edla;
Ravi Nepal
35.
Daily Walks In Paris: A Practical Analysis
of Wi-Fi Access Points
Guillaume Valadon; Florian Le Goff;
36.
Exploring the Routing Complexity of Mobile
Multicast - A Semi-empirical Study
Matthias Wählisch; Thomas Schmidt
37.
Experimenting with Real-life Opportunistic
Communications using Windows Mobile Devices
Anna-Kaisa Pietiläinen; Christophe Diot
38.
A Networked Virtual Environment over KAD
Matteo Varvello; Ernst Biersack;
Christophe Diot
39.
Identifying statistically anomalous regions
in time series of network traffic
40.
Bootstrapping Large-scale DHT Networks
Jae Lee;
41.
Is Your IP Address Prefix Well-Served by
Internet Routing?
Yibo Wang; Jun Li
42.
Energy-Efficient MAC and Routing Design in
Distributed Beamforming Sensor Networks
Dimitrios Koutsonikolas; Ali Jafri; Y. Charlie Hu
43.
Robust Routing in Networks With
Time-Varying Links
Victoria Manfredi
44.
A cross-layer load-independent link cost
metric for Wireless Mesh Networks
Marianna Carrera; Henrik Lundgren;
Theodoros Salonidis; Christophe Diot
45.
Enabling Seamless Internet Mobility
46.
mod_kaPoW: Mitigating DoS with Transparent
Proof-of-Work
Ed Kaiser; Wu-chang Feng
47.
Application and Desktop Sharing
Omer Boyaci;
48.
Enabling Session Initiation in the Presence
of Middleboxes
Sergio Lembo; Jani Heikkinen
49.
A Next Generation Internet State Management
Framework
Xin Huang; Tilman Wolf
50.
Understanding the Effect of P2P Overlay On
the AS-Level Underlay
Amir Hassan Rasti Ekbatani; Reza Rejaie;
Walter Willinger