Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1921233acmconferencesBook PagePublication PagesconextConference Proceedingsconference-collections
ReARCH '10: Proceedings of the Re-Architecting the Internet Workshop
ACM2010 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
Co-NEXT '10: Conference on emerging Networking EXperiments and Technologies Philadelphia Pennsylvania 30 November 2010
ISBN:
978-1-4503-0469-6
Published:
30 November 2010
Sponsors:
Next Conference
Reflects downloads up to 12 Nov 2024Bibliometrics
Skip Abstract Section
Abstract

We are pleased to present the Proceedings of the 2010 Workshop on Re-Architecting the Internet (ReArch'10), which is held in conjunction with 6th ACM International Conference on emerging Networking EXperiments and Technologies (CoNEXT). The program of ReArch features technical papers that present ideas of new clean-slate Internet architectures, improvements to current Internet protocols, and new internetworking components that integrate into the existing architecture. We are very excited about the number and quality of this year's paper submissions was high.

We received a total of 33 regular paper submissions from around the world. The program you are holding is the result of a rigorous review process in which each paper was reviewed by at least three program committee members. Based on these reviews, we selected 13 papers for presentation at the workshop. The accepted papers cover a wide range of topics including resource management, network path selection, security, and the interaction between the Internet and economic markets and society. The workshop also includes a panel that will explore the fundamental difference between the many proposals for content-centric networking. We hope that the selected papers spark the interest of workshop attendees and broaden the knowledge of the community in existing and new areas.

Skip Table Of Content Section
SESSION: Resource management and markets
research-article
Not paying the truck driver: differentiated pricing for the future internet
Article No.: 1, Pages 1–6https://doi.org/10.1145/1921233.1921235

We are all used to the way we pay for our Internet experience. We buy 'connectivity' from our local Internet Service Provider (ISP) and then consume a variety of Internet-based services. Some of these charge additional fees, mostly without any service ...

research-article
Controlling the growth of internet routing tables through market mechanisms
Article No.: 2, Pages 1–6https://doi.org/10.1145/1921233.1921236

The growth of core Internet routing tables has been such that it is now viewed as an impediment to the continued expansion of the Internet. The main culprit is multi-homing that stems from sites' desire for greater reliability and diversity in ...

research-article
A mutualistic resource pooling architecture
Article No.: 3, Pages 1–6https://doi.org/10.1145/1921233.1921237

Parallelism pervades the Internet, yet efficiently pooling this increasing path diversity has remained elusive. We defend that the inability to progress beyond a single path paradigm is due to an inflexible resource sharing model, rather than a lack of ...

research-article
Investigating the deployment and adoption of re-ECN
Article No.: 4, Pages 1–6https://doi.org/10.1145/1921233.1921238

Networking research aims to design protocols for future Internet architectures that are able to hold end hosts accountable for the congestion they cause. Re-ECN is a protocol that provides valuable information to ISPs about network congestion, and which ...

SESSION: Network paths and forwarding
research-article
On content-centric router design and implications
Article No.: 5, Pages 1–6https://doi.org/10.1145/1921233.1921240

In this paper, we investigate a sample line-speed content-centric router's design, its resources and its usage scenarios. We specifically take a closer look at one of the suggested functionalities for these routers, the content store. The design is ...

research-article
A routing architecture for scheduled dynamic circuit services
Article No.: 6, Pages 1–6https://doi.org/10.1145/1921233.1921241

A wide range of applications in the nascent field of cloud computing and in other fields require stable, low-delay wide-area connectivity together with capabilities of co-scheduling network and server resources. As a result, both research and commercial ...

research-article
Taming the triangle inequality violations with network coordinate system on real internet
Article No.: 7, Pages 1–6https://doi.org/10.1145/1921233.1921242

Network Coordinate (NC) systems are efficient in scalable Internet latency estimation. While most of the focus has been put on how to distort Triangle Inequality Violation (TIV) in metric spaces to relieve the inaccuracy caused by it, TIV is a ...

research-article
NAT traversal for LISP mobile node
Article No.: 8, Pages 1–6https://doi.org/10.1145/1921233.1921243

The Locator/ID Separation Protocol (LISP) is currently being developed and standardized in the IETF aiming to solve the Internet's routing scaling problem. It separates global routing in the Internet from local routing in end-user networks (so-called ...

SESSION: Society, markets and security
research-article
Application neutrality and a paradox of side payments
Article No.: 9, Pages 1–6https://doi.org/10.1145/1921233.1921245

The ongoing debate over net neutrality covers a broad set of issues related to the regulation of public networks. In two ways, we extend an idealized usage-priced game-theoretic framework based on a common linear demand-response model [1]. First, we ...

research-article
Should specific values be embedded in the internet architecture?
Article No.: 10, Pages 1–6https://doi.org/10.1145/1921233.1921246

A fundamental disagreement in the Future Internet debate concerns architecture design and value. Should an architecture incorporate inherent values that have been widely accepted through societal debate or be adaptable once deployed to a wider range of ...

research-article
The problem isn't attribution: it's multi-stage attacks
Article No.: 11, Pages 1–6https://doi.org/10.1145/1921233.1921247

As a result of increasing spam, DDoS attacks, cybercrime, and data exfiltration from corporate and government sites, there have been multiple calls for an Internet architecture that enables better network attribution at the packet layer. The intent is ...

research-article
Secure naming in information-centric networks
Article No.: 12, Pages 1–6https://doi.org/10.1145/1921233.1921248

In this paper, we present a secure naming system to locate resources in information-centric networks. The main goal is to allow secure content retrieval from multiple unknown or untrusted sources. The proposal uses a new, flexible naming scheme that is ...

Contributors
  • British Telecom Research Lab
  • Carnegie Mellon University
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations