The call for tutorial proposals is here: html, pdf. The deadline for tutorial proposals was October 15, 2004.

All questions should be addressed to the tutorials chair, Debanjan Saha at .

The following tutorials will be held in conjunction with SIGCOMM 2005. For more information please click on the individual descriptions.

Note that lunch will be provided in conjunction with all tutorials.

T1: Infrastructure Attack Detection and Mitigation Methodologies

Monday, August 22, 2005, morning

Intended audience: Security and network engineers, as well as researchers who want to understand attack detection and mitigation methodologies employed by Internet network operators and large enterprises today. Attendees will be introduced to a six phased incident response methodology derived from the collective best practices of the Internet community. This tutorial helps bridge the gap between the theoretical foundations of network security and the real-world practical limitations network providers face. Basic familiarity with IP routing and routed protocols and Internet architecture is assumed, though not required.

Read more about this tutorial here.

T2: Operations and Management of IP Networks: What Researchers Should Know

Monday, August 22, 2005, afternoon

Intended audience: Anyone interested in real world, IP network operations and management: from people who actually operate IP networks to researchers and academics interested and/or working in networking, security, performance, statistics, protocols, automation, fault and anomaly detection. Basic knowledge of IP networks is expected.

Read more about this tutorial here.

T3: Broadband Wireless Access and High-Speed Wireless Data Applications

Friday August 26, 2005, morning

Intended audience: Researchers and engineers who want to understand the complete range of broadband wireless technology spanning local area, metro area and wide area networks. Attendees will learn the fundamental differences between different wireless access technologies, and be able to appreciate why some of the technologies do and do not work in certain environments and how best to make them interoperate. Familiarity with basic protocols and IP networks is assumed, but not required.

Read more about this tutorial here.

  Valid XHTML 1.0! Valid CSS!