CONFERENCE PROGRAM
Program at a glance    Tutorial program    Technical program    Abstracts    Papers    Outrageous Opinions    Multicast transmission

Tutorial Program


M1   Voice over IP
M2   Analysis of Network and Protocol Behavior with Common Tools
T1   Network Security Protocols
T2   Distributed control and resource pricing


M1   Voice over IP
Monday, August 28, 2000, 09.00 - 16.30
 
Prof. Henning Schulzrinne  <schulzrinne@cs.columbia.edu>
 
Columbia University, New York, NY, USA

Content: Internet telephony or voice-over-IP (VoIP) is a specialized form of an Internet multimedia service that transports voice data across the Internet, replacing traditional circuit-switched telephone network facilities. It is anticipated that in about a decade, a substantial fraction of the international and long-distance traffic will be carried over IP. In addition, traditional PBXs may give way to Ethernet-based distributed voice networks. The full-day tutorial describes the motivation, technologies and remaining problems of providing telephone-like services over IP networks.

We describe possible architectures of an Internet telephony system, providing examples of an IP centrex or campus-level service. The major components needed to construct VoIP services are signaling, quality-of service assurance, multimedia transport and audio/video compression. The tutorial will address all of these issues, but, given that this is a topic for a whole tutorial by itself, will spend less time on resource reservation and will only mention packet scheduling briefly.

Intended audience: Researchers, network architects and protocol implementors from academia and industry looking for an applied introduction to the set of protocols and architectures likely to be used to form the foundation of the next-generation telephone network.

Speaker's biography: Henning Schulzrinne received his undergraduate degree in economics and electrical engineering from the Darmstadt University of Technology, Germany, his MSEE degree as a Fulbright scholar from the University of Cincinnati, Ohio and his Ph.D. degree from the University of Massachusetts in Amherst, Massachusetts. He was a member of technical staff at AT&T Bell Laboratories, Murray Hill and an associate department head at GMD-Fokus (Berlin), before joining the Computer Science and Electrical Engineering departments at Columbia University, New York. His research interests encompass real-time, multimedia network services in the Internet and modelling and performance evaluation.

He is currently serving as a member of the IAB (Internet Architecture Board). Protocols co-developed by him are now Internet standards, used by almost all Internet telephony and multimedia applications.


M2   Analysis of Network and Protocol Behavior with Common Tools
Monday, August 28, 2000, 09.00 - 16.30
 
Prof. Shawn Ostermann  <ostermann@cs.ohiou.edu>
 
Ohio University, Athens, OH, USA

Content: This tutorial will teach you how to use common tools to gain uncommon insight into network problems, performance, and bottlenecks. Sophisticated analysis of computer networks doesn't necessary require expensive software; you can achieve good results using existing local information sources and readily-available, public domain software on the Internet. Toward that end, we will discuss the basics of gathering statistics about network traffic and protocol behavior, visualizing network and protocol behavior, looking for problems, and analysing protocol efficiency. We will concentrate on the use of powerful, public domain programs and analysis tools for an in-depth study of network behavior with an emphasis on TCP protocol analysis.

We'll start with a discussion of measurement techniques and concentrate on capturing network packets and gathering network information from hosts and routers. In particular, we'll discuss the mechanics and pitfalls of packet capture (using tcpdump and snoop) and gathering statistics from sources such as SNMP.

We'll discuss data post processing techniques including sanitizing packet traces, extracting interesting packets and/or connections from packet trace files, and aggregating host/router data. We'll follow up these data collection techniques with a discussion of several powerful data analysis techniques and tools with an emphasis on tcptrace.

Intended audience: This tutorial is aimed primarily at three types of attendees: Protocol Researchers, Application Designers/Implementors and Network Managers either working with TCP directly or using TCP as the transport basis for other research. The tutorial will provide valuable help in examining and visualizing the intricacies of transport protocols.

Speaker's biography: Dr. Ostermann is a faculty member at Ohio University specializing in network protocol research. Since graduating from Purdue University in 1993, he has been actively involved in networking research and teaching network basics and details at the graduate level. His experience studying the TCP protocol in interesting environments lead to the development of tcptrace, a public domain Unix tool for investigating the macroscopic and microscopic nature of network traffic. Dr. Ostermann has published many conference papers, journal articles and RFCs on network characteristics and the analysis of network traffic.


T1   Network Security Protocols
Tuesday, August 29, 2000, 09.00 - 16.30
 
Dr. Radia Perlman  <Radia.Perlman@East.Sun.COM>
 
Sun Microsystems, Boston Center for Networking, Boston, MA, USA

Content: Who are you, and should you be doing that? These are the basic questions that a system connected to a network should be pondering. Network security protocols help to answer these in a secure way. This tutorial gives an overview of how such protocols work, including the basics of cryptography, key distribution, and protocol design pitfalls. Although there are plenty of standards in terms of cryptographic algorithms, certificate formats, and protocols, there are still open problems about how to make a system that will truly scale to the Internet, and allow mutually distrustful organizations to interoperate. This tutorial emphasizes the challenges as well as the well-known technology. Once the generic issues are covered, the tutorial gives an overview of deployed and emerging standards such as Kerberos, X.509, IPSec, and SSL.

Intended audience: Protocol designers, implementers, people deploying security solutions, students looking for areas for research. The prerequisites for this course are intellectual curiosity, a sense of humor, and a good night's sleep inthe recent past.

Speaker's biography: Radia Perlman is a Distinguished Engineer at Sun Microsystems. She is known for her contributions to bridging (spanning tree algorithm) and routing (link state routing) as well as security (sabotage-proof networks). She is the author of "Interconnections: Bridges, Routers, Switches, and Internetworking Protocols", and co-author of Network Security: Private Communication in a Public World", two of the top 10 Networking reference books, according to Network Magazine. She is one of the networking industry's 25 most influential people, according to Data Communications Magazine. She has an S.B. and S.M in mathematics and a Ph.D. in computer science from MIT.


T2   Distributed control and resource pricing
Tuesday, August 29, 2000, 09.00 - 16.30
 
Dr. Richard Gibbens  <R.J.Gibbens@statslab.cam.ac.uk>
Dr. Peter Key  <peterkey@microsoft.com>
 
University of Cambridge, UK
Microsoft Research, Cambridge, UK

Content:

  • Distributed control algorithms
  • QoS in IP networks
  • End-to-end flow control
  • Congestion pricing
  • Adaptive and non-adaptive applications
  • Applications based on TCP and UDP Internet protocols
  • Router drop/marking strategies (RED, ECN)
  • Distributed connection admission control
  • Multi-user games and flow control strategies
  • Service Level Agreements
  • Network modelling techniques
  • Simulation and demonstrations of control algorithms

Intended audience:

  • Scientists and engineers developing IP networks
  • Managers in network operators
  • Managers in Internet Service Providers
  • General mathematical and engineering community with modelling interests.

Speakers' biographies:

Dr. Richard Gibbens is a Royal Society University Research Fellow based at the Statistical Laboratory in the University of Cambridge, England. He works on the mathematical modelling of communication networks, especially the design and analysis of distributed control strategies. http://www.statslab.cam.ac.uk/~richard/

Dr. Peter Key is a Researcher at Microsoft Research, Cambridge, UK, which he joined in 1998. He was previously at BT Labs, UK where he lead the Network Performance Group. He was Technical co-chair of the 16th International Teletraffic Congress in 1999. His current research interests focus on Distributed Control, Application Performance and Quality of Service in Stochastic Networks. http://research.microsoft.com/users/pbk/