skip to main content
10.1145/1921168acmconferencesBook PagePublication PagesconextConference Proceedingsconference-collections
Co-NEXT '10: Proceedings of the 6th International COnference
ACM2010 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
Co-NEXT '10: Conference on emerging Networking EXperiments and Technologies Philadelphia Pennsylvania 30 November 2010- 3 December 2010
ISBN:
978-1-4503-0448-1
Published:
30 November 2010
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to ACM CoNEXT 2010, the 6th International COnference on emerging Networking EXperiments and Technologies. The conference is hosted by Drexel University and is held in the City of Brotherly Love, Philadelphia. We hope that the vibe of the city in combination with an outstanding technical and social program will lead to stimulating discussions and exchange of ideas among the attending members of our world-spanning community.

This year's edition continues the tradition of CoNEXT to foster the scientific and technological intersection between different research communities in networking from both academia and industry. The main conference is preceded by two interesting workshops that reflect the communities' renewed interest in fundamentally rethinking network architecture (ReArch) and what networking elements should and can do (PRESTO). In addition to those, we also have a student workshop to give the next generation of networking researchers a platform to discuss their work in an open and informal setting. The main conference is again organized along a single track of thematically grouped sessions to foster the interaction and discussions among all participants and across different points of views.

CoNEXT strives to be an affordable conference and we managed to keep registration fees at the same level for the third consecutive year, despite a tough climate for attracting supporters. We are especially grateful to CISCO, for its outstanding commitment to research and education by becoming a Gold Supporter of ACM CoNEXT 2010; many thanks to our Bronze Supporter AT&T, and also to our Patrons: INTEL, NICTA and Drexel University. We thank the National Science Foundation and SIGCOMM for providing generous support for student travel grants.

Skip Table Of Content Section
SESSION: Performance analysis
research-article
Verifiable network-performance measurements

In the current Internet, there is no clean way for affected parties to react to poor forwarding performance: to detect and assess Service Level Agreement (SLA) violations by a contractual partner, a domain must resort to ad-hoc monitoring using probes. ...

research-article
Profiling-By-Association: a resilient traffic profiling solution for the internet backbone

Profiling Internet backbone traffic is becoming an increasingly hard problem since users and applications are avoiding detection using traffic obfuscation and encryption. The key question addressed here is: Is it possible to profile traffic at the ...

research-article
Spatio-temporal patterns in network events

Operational networks typically generate massive monitoring data that consist of local (in both space and time) observations of the status of the networks. It is often hypothesized that such data exhibit both spatial and temporal correlation based on the ...

SESSION: Network design and analysis
research-article
Optimal content placement for a large-scale VoD system

IPTV service providers offering Video-on-Demand currently use servers at each metropolitan office to store all the videos in their library. With the rapid increase in library sizes, it will soon become infeasible to replicate the entire library at each ...

research-article
G-RCA: a generic root cause analysis platform for service quality management in large IP networks

As IP networks have become the mainstay of an increasingly diverse set of applications ranging from Internet games and streaming videos, to e-commerce and online-banking, and even to mission-critical 911, best effort service is no longer acceptable. ...

research-article
Declarative configuration management for complex and dynamic networks

Network management and operations are complicated, tedious, and error-prone, requiring signifcant human involvement and domain knowledge. As the complexity involved inevitably grows due to larger scale networks and more complex protocol features, human ...

SESSION: Network management and trouble shooting
research-article
NEVERMIND, the problem is already fixed: proactively detecting and troubleshooting customer DSL problems

Traditional DSL troubleshooting solutions are reactive, relying mainly on customers to report problems, and tend to be labor-intensive, time consuming, prone to incorrect resolutions and overall can contribute to increased customer dissatisfaction. In ...

research-article
MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking

Evaluating anomaly detectors is a crucial task in traffic monitoring made particularly difficult due to the lack of ground truth. The goal of the present article is to assist researchers in the evaluation of detectors by providing them with labeled ...

research-article
Internet traffic classification demystified: on the sources of the discriminative power

Recent research on Internet traffic classification has yield a number of data mining techniques for distinguishing types of traffic, but no systematic analysis on "Why" some algorithms achieve high accuracies. In pursuit of empirically grounded answers ...

SESSION: P2P
research-article
Balancing throughput, robustness, and in-order delivery in P2P VoD
Article No.: 10, pp 1–12https://doi.org/10.1145/1921168.1921182

Peer-to-peer has emerged in recent years as a promising approach to providing Video-on-Demand streaming. The design space, however, is vast and still not well understood---yet choosing the right approach is critical to system performance. This paper ...

research-article
Is content publishing in BitTorrent altruistic or profit-driven?
Article No.: 11, pp 1–12https://doi.org/10.1145/1921168.1921183

BitTorrent is the most popular P2P content delivery application where individual users share various type of content with tens of thousands of other users. The growing popularity of BitTorrent is primarily due to the availability of valuable content ...

research-article
Federation of virtualized infrastructures: sharing the value of diversity
Article No.: 12, pp 1–12https://doi.org/10.1145/1921168.1921184

By federating virtualized computing and network resources one can significantly increase their value thanks to gains from statistical multiplexing and increases in resource diversity (more distinct locations, technologies, etc.). Successful federation ...

SESSION: Data centers
research-article
ICTCP: Incast Congestion Control for TCP in data center networks
Article No.: 13, pp 1–12https://doi.org/10.1145/1921168.1921186

TCP incast congestion happens in high-bandwidth and low-latency networks, when multiple synchronized servers send data to a same receiver in parallel [15]. For many important data center applications such as MapReduce[5] and Search, this many-to-one ...

research-article
LEGUP: using heterogeneity to reduce the cost of data center network upgrades
Article No.: 14, pp 1–12https://doi.org/10.1145/1921168.1921187

Fundamental limitations of traditional data center network architectures have led to the development of architectures that provide enormous bisection bandwidth for up to hundreds of thousands of servers. Because these architectures rely on homogeneous ...

research-article
SecondNet: a data center network virtualization architecture with bandwidth guarantees
Article No.: 15, pp 1–12https://doi.org/10.1145/1921168.1921188

In this paper, we propose virtual data center (VDC) as the unit of resource allocation for multiple tenants in the cloud. VDCs are more desirable than physical data centers because the resources allocated to VDCs can be rapidly adjusted as tenants' ...

research-article
A cost comparison of datacenter network architectures
Article No.: 16, pp 1–12https://doi.org/10.1145/1921168.1921189

There is a growing body of research exploring new network architectures for the data center. These proposals all seek to improve the scalability and cost-effectiveness of current data center networks, but adopt very different approaches to doing so. For ...

SESSION: Privacy, security, and forensics
research-article
Personal data vaults: a locus of control for personal data streams
Article No.: 17, pp 1–12https://doi.org/10.1145/1921168.1921191

The increasing ubiquity of the mobile phone is creating many opportunities for personal context sensing, and will result in massive databases of individuals' sensitive information incorporating locations, movements, images, text annotations, and even ...

research-article
Network-wide deployment of intrusion detection and prevention systems
Article No.: 18, pp 1–12https://doi.org/10.1145/1921168.1921192

Traditional efforts for scaling network intrusion detection (NIDS) and intrusion prevention systems (NIPS) have largely focused on a single-vantage-point view. In this paper, we explore an alternative design that exploits spatial, network-wide ...

research-article
Strengthening forensic investigations of child pornography on P2P networks
Article No.: 19, pp 1–12https://doi.org/10.1145/1921168.1921193

Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and application-level identifiers in the context of forensic measurement, as exemplified in the policing of ...

SESSION: Internet routing
research-article
Scalable routing on flat names
Article No.: 20, pp 1–12https://doi.org/10.1145/1921168.1921195

We introduce a protocol which routes on flat, location-independent identifiers with guaranteed scalability and low stretch. Our design builds on theoretical advances in the area of compact routing, and is the first to realize these guarantees in a ...

research-article
The Internet is flat: modeling the transition from a transit hierarchy to a peering mesh
Article No.: 21, pp 1–12https://doi.org/10.1145/1921168.1921196

Recent measurements and anecdotal evidence indicate that the Internet ecosystem is rapidly evolving from a multi-tier hierarchy built mostly with transit (customer-provider) links to a dense mesh formed with mostly peering links. This transition can ...

research-article
Inferring invisible traffic
Article No.: 22, pp 1–12https://doi.org/10.1145/1921168.1921197

A traffic matrix encompassing the entire Internet would be very valuable. Unfortunately, from any given vantage point in the network, most traffic is invisible. In this paper we describe results that hold some promise for this problem. First, we show a ...

SESSION: Mobility and replication
research-article
Enabling high-bandwidth vehicular content distribution
Article No.: 23, pp 1–12https://doi.org/10.1145/1921168.1921199

We present VCD, a novel system for enabling high-bandwidth content distribution in vehicular networks. In VCD, a vehicle opportunistically communicates with nearby access points (APs) to download the content of interest. To fully take advantage of such ...

research-article
Assessing the vulnerability of replicated network services
Article No.: 24, pp 1–12https://doi.org/10.1145/1921168.1921200

Client-server networks are pervasive, fundamental, and include such key networks as the Internet, power grids, and road networks. In a client-server network, clients obtain a service by connecting to one of a redundant set of servers. These networks are ...

research-article
Exploiting locality of interest in online social networks
Article No.: 25, pp 1–12https://doi.org/10.1145/1921168.1921201

Online Social Networks (OSN) are fun, popular, and socially significant. An integral part of their success is the immense size of their global user base. To provide a consistent service to all users, Facebook, the world's largest OSN, is heavily ...

SESSION: Wireless
research-article
Mobile data offloading: how much can WiFi deliver?
Article No.: 26, pp 1–12https://doi.org/10.1145/1921168.1921203

This paper presents a quantitative study on the performance of 3G mobile data offloading through WiFi networks. We recruited about 100 iPhone users from metropolitan areas and collected statistics on their WiFi connectivity during about a two and half ...

research-article
Auto-configuration of 802.11n WLANs
Article No.: 27, pp 1–12https://doi.org/10.1145/1921168.1921204

Channel Bonding (CB) combines two adjacent frequency bands to form a new, wider band to facilitate high data rate transmissions in MIMO-based 802.11n networks. However, the use of a wider band with CB can exacerbate interference effects. Furthermore, CB ...

research-article
Simple yet efficient, transparent airtime allocation for TCP in wireless mesh networks
Article No.: 28, pp 1–12https://doi.org/10.1145/1921168.1921205

In this paper, we explore a simple yet effective technique for explicitly allocating airtime to each active pair of communicating neighbors in a wireless neighborhood so that TCP starvation in a wireless mesh network is avoided. Our explicit allocation ...

Contributors
  • University of Cambridge
  • Massachusetts Institute of Technology
  1. Proceedings of the 6th International COnference

    Recommendations

    Acceptance Rates

    Overall Acceptance Rate198of789submissions,25%
    YearSubmittedAcceptedRate
    CoNEXT '221512819%
    CoNEXT '19 Companion523465%
    CoNEXT '161603019%
    CoNEXT '141332720%
    CoNEXT Student Workshop '14341750%
    CoNEXT '132264419%
    CoNEXT Student Workhop '13331855%
    Overall78919825%