- Sponsor:
- sigcomm
We are pleased to present the Proceedings of the 2010 Workshop on Re-Architecting the Internet (ReArch'10), which is held in conjunction with 6th ACM International Conference on emerging Networking EXperiments and Technologies (CoNEXT). The program of ReArch features technical papers that present ideas of new clean-slate Internet architectures, improvements to current Internet protocols, and new internetworking components that integrate into the existing architecture. We are very excited about the number and quality of this year's paper submissions was high.
We received a total of 33 regular paper submissions from around the world. The program you are holding is the result of a rigorous review process in which each paper was reviewed by at least three program committee members. Based on these reviews, we selected 13 papers for presentation at the workshop. The accepted papers cover a wide range of topics including resource management, network path selection, security, and the interaction between the Internet and economic markets and society. The workshop also includes a panel that will explore the fundamental difference between the many proposals for content-centric networking. We hope that the selected papers spark the interest of workshop attendees and broaden the knowledge of the community in existing and new areas.
Proceeding Downloads
Not paying the truck driver: differentiated pricing for the future internet
We are all used to the way we pay for our Internet experience. We buy 'connectivity' from our local Internet Service Provider (ISP) and then consume a variety of Internet-based services. Some of these charge additional fees, mostly without any service ...
Controlling the growth of internet routing tables through market mechanisms
The growth of core Internet routing tables has been such that it is now viewed as an impediment to the continued expansion of the Internet. The main culprit is multi-homing that stems from sites' desire for greater reliability and diversity in ...
A mutualistic resource pooling architecture
Parallelism pervades the Internet, yet efficiently pooling this increasing path diversity has remained elusive. We defend that the inability to progress beyond a single path paradigm is due to an inflexible resource sharing model, rather than a lack of ...
Investigating the deployment and adoption of re-ECN
Networking research aims to design protocols for future Internet architectures that are able to hold end hosts accountable for the congestion they cause. Re-ECN is a protocol that provides valuable information to ISPs about network congestion, and which ...
On content-centric router design and implications
In this paper, we investigate a sample line-speed content-centric router's design, its resources and its usage scenarios. We specifically take a closer look at one of the suggested functionalities for these routers, the content store. The design is ...
A routing architecture for scheduled dynamic circuit services
A wide range of applications in the nascent field of cloud computing and in other fields require stable, low-delay wide-area connectivity together with capabilities of co-scheduling network and server resources. As a result, both research and commercial ...
Taming the triangle inequality violations with network coordinate system on real internet
Network Coordinate (NC) systems are efficient in scalable Internet latency estimation. While most of the focus has been put on how to distort Triangle Inequality Violation (TIV) in metric spaces to relieve the inaccuracy caused by it, TIV is a ...
NAT traversal for LISP mobile node
The Locator/ID Separation Protocol (LISP) is currently being developed and standardized in the IETF aiming to solve the Internet's routing scaling problem. It separates global routing in the Internet from local routing in end-user networks (so-called ...
Application neutrality and a paradox of side payments
The ongoing debate over net neutrality covers a broad set of issues related to the regulation of public networks. In two ways, we extend an idealized usage-priced game-theoretic framework based on a common linear demand-response model [1]. First, we ...
Should specific values be embedded in the internet architecture?
A fundamental disagreement in the Future Internet debate concerns architecture design and value. Should an architecture incorporate inherent values that have been widely accepted through societal debate or be adaptable once deployed to a wider range of ...
The problem isn't attribution: it's multi-stage attacks
As a result of increasing spam, DDoS attacks, cybercrime, and data exfiltration from corporate and government sites, there have been multiple calls for an Internet architecture that enables better network attribution at the packet layer. The intent is ...
Secure naming in information-centric networks
In this paper, we present a secure naming system to locate resources in information-centric networks. The main goal is to allow secure content retrieval from multiple unknown or untrusted sources. The proposal uses a new, flexible naming scheme that is ...