|
CONFERENCE PROGRAM Program at a glance Tutorial program Technical program Abstracts Papers Outrageous Opinions Multicast transmission Tutorial Program
Content:
Internet telephony or voice-over-IP (VoIP) is a specialized form of an
Internet multimedia service that transports voice data across the
Internet, replacing traditional circuit-switched telephone network
facilities. It is anticipated that in about a decade, a substantial
fraction of the international and long-distance traffic will be
carried over IP. In addition, traditional PBXs may give way to
Ethernet-based distributed voice networks. The full-day tutorial
describes the motivation, technologies and remaining problems of
providing telephone-like services over IP networks.
We describe possible architectures of an Internet
telephony system, providing examples of an IP centrex or campus-level
service. The major components needed to construct VoIP services are
signaling, quality-of service assurance, multimedia transport and
audio/video compression. The tutorial will address all of these
issues, but, given that this is a topic for a whole tutorial by
itself, will spend less time on resource reservation and will only
mention packet scheduling briefly.
Intended audience:
Researchers, network architects and protocol implementors from
academia and industry looking for an applied introduction to the set
of protocols and architectures likely to be used to form the
foundation of the next-generation telephone network.
Speaker's biography:
Henning Schulzrinne received his undergraduate degree in economics and
electrical engineering from the Darmstadt University of Technology,
Germany, his MSEE degree as a Fulbright scholar from the University of
Cincinnati, Ohio and his Ph.D. degree from the University of
Massachusetts in Amherst, Massachusetts. He was a member of technical
staff at AT&T Bell Laboratories, Murray Hill and an associate
department head at GMD-Fokus (Berlin), before joining the Computer
Science and Electrical Engineering departments at Columbia University,
New York. His research interests encompass real-time, multimedia
network services in the Internet and modelling and performance
evaluation.
He is currently serving as a member of the IAB
(Internet Architecture Board). Protocols co-developed by him are now
Internet standards, used by almost all Internet telephony and
multimedia applications.
Content:
This tutorial will teach you how to use common tools to gain uncommon
insight into network problems, performance, and
bottlenecks. Sophisticated analysis of computer networks doesn't
necessary require expensive software; you can achieve good results
using existing local information sources and readily-available, public
domain software on the Internet. Toward that end, we will discuss the
basics of gathering statistics about network traffic and protocol
behavior, visualizing network and protocol behavior, looking for
problems, and analysing protocol efficiency. We will concentrate on
the use of powerful, public domain programs and analysis tools for an
in-depth study of network behavior with an emphasis on TCP protocol
analysis.
We'll start with a discussion of measurement
techniques and concentrate on capturing network packets and gathering
network information from hosts and routers. In particular, we'll
discuss the mechanics and pitfalls of packet capture (using tcpdump
and snoop) and gathering statistics from sources such as SNMP.
We'll discuss data post processing techniques
including sanitizing packet traces, extracting interesting packets
and/or connections from packet trace files, and aggregating
host/router data. We'll follow up these data collection techniques
with a discussion of several powerful data analysis techniques and
tools with an emphasis on tcptrace.
Intended audience:
This tutorial is aimed primarily at three types of attendees: Protocol
Researchers, Application Designers/Implementors and Network Managers
either working with TCP directly or using TCP as the transport basis
for other research. The tutorial will provide valuable help in
examining and visualizing the intricacies of transport protocols.
Speaker's biography:
Dr. Ostermann is a faculty member at Ohio University specializing in
network protocol research. Since graduating from Purdue University in
1993, he has been actively involved in networking research and
teaching network basics and details at the graduate level. His
experience studying the TCP protocol in interesting environments lead
to the development of tcptrace, a public domain Unix tool for
investigating the macroscopic and microscopic nature of network
traffic. Dr. Ostermann has published many conference papers, journal
articles and RFCs on network characteristics and the analysis of
network traffic.
Content:
Who are you, and should you be doing that? These are the basic
questions that a system connected to a network should be
pondering. Network security protocols help to answer these in a secure
way. This tutorial gives an overview of how such protocols work,
including the basics of cryptography, key distribution, and protocol
design pitfalls. Although there are plenty of standards in terms of
cryptographic algorithms, certificate formats, and protocols, there
are still open problems about how to make a system that will truly
scale to the Internet, and allow mutually distrustful organizations to
interoperate. This tutorial emphasizes the challenges as well as the
well-known technology. Once the generic issues are covered, the
tutorial gives an overview of deployed and emerging standards such as
Kerberos, X.509, IPSec, and SSL.
Intended audience:
Protocol designers, implementers, people deploying security solutions,
students looking for areas for research. The prerequisites for this
course are intellectual curiosity, a sense of humor, and a good
night's sleep inthe recent past.
Speaker's biography:
Radia Perlman is a Distinguished Engineer at Sun Microsystems. She is
known for her contributions to bridging (spanning tree algorithm) and
routing (link state routing) as well as security (sabotage-proof
networks). She is the author of "Interconnections: Bridges, Routers,
Switches, and Internetworking Protocols", and co-author of Network
Security: Private Communication in a Public World", two of the top 10
Networking reference books, according to Network Magazine. She is one
of the networking industry's 25 most influential people, according to
Data Communications Magazine. She has an S.B. and S.M in mathematics
and a Ph.D. in computer science from MIT.
Content:
Intended audience:
Speakers' biographies:
Dr. Richard Gibbens is a Royal Society University
Research Fellow based at the Statistical Laboratory in the University
of Cambridge, England. He works on the mathematical modelling of
communication networks, especially the design and analysis of
distributed control strategies.
http://www.statslab.cam.ac.uk/~richard/
Dr. Peter Key is a Researcher at Microsoft Research,
Cambridge, UK, which he joined in 1998. He was previously at BT Labs,
UK where he lead the Network Performance Group. He was Technical
co-chair of the 16th International Teletraffic Congress in 1999. His
current research interests focus on Distributed Control, Application
Performance and Quality of Service in Stochastic Networks.
http://research.microsoft.com/users/pbk/
|