Proceedings of the Posters and Demos

Adaptive Video Encoder for Network Bandwidth Drops in Real-Time Communication

Hua Meng, Xiangjie Huang, Zili Meng (HKUST)

PDF

Abstract: Real-time communication (RTC) is crucial in digital life, with latency significantly affecting user experience. Latency spikes often occur due to mismatches between video codec bitrates and network capacity, especially during sudden bandwidth drops. Current video encoders adjust bitrates too slowly, increasing latency. This poster suggests that encoders should adapt more quickly to network changes by dynamically adjusting codec parameters, maintaining compression efficiency. Preliminary tests with the x264 codec show these strategies can reduce latency by 28.66% to 78.87% while slightly improving video quality by 0.8% to 3%.

An Adaptive Bidirectional Traffic Shaping Mechanism for Service Mesh

Xue Leng, Kai Cao (Hangzhou Institute of Technology, Xidian University); Xing Li (Zhejiang University); Jianguo Sun (Hangzhou Institute of Technology, Xidian University); Keqiang Duan (Wuhan Ship Communication Research Institute)

PDF

Abstract: The cloud-native microservice architecture provides flexibility and scalability. However, communications between microservices create privacy risks. Attackers can infer sensitive information about microservices by analyzing network side-channel metrics such as packet sizes and arrival time. Current traffic shaping methods lack service-level control, bidirectional shaping, and adaptability to fluctuating traffic. In this paper, we propose TrafficGuard, an adaptive bidirectional traffic shaping mechanism. Specifically, we design a WASM-based service-level bidirectional traffic shaping mechanism to hide the actual traffic characteristics of services and achieve strategy hot updates without service interruption. In addition, we design a sliding window-based adaptive traffic shaping method and a target service identification method to achieve effective traffic shaping with minimal resource overhead.

Astraea: Enforcing DPU Performance Isolation in Public Clouds

Qiyang Peng, Menghao Zhang, Feiyang Wang (Beihang University); Guanyu Li (Unafflicted); Chunming Hu (Beihang University)

PDF

Abstract: The absence of effective performance isolation mechanisms hinders deploying Data Processing Units (DPUs) in public clouds for multi-application co-location scenarios. To address this challenge, we introduce Astraea, an efficient DPU performance isolation framework targeting DPU-specific computational resources. Astraea overcomes significant obstacles posed by proprietary, high-level SDK interfaces and coarse-grained First-Come-First-Served (FCFS) scheduling via resource occupation profiling, task splitting and workload-guided scheduling. Our open-source prototype on NVIDIA BlueField-3 DPUs reduces SLA violation rates for latency-sensitive applications from 47.66% to just 14.84% versus natives, while introducing less than 4% performance overhead.

Better QUIC implementations with Nesquic

Laurin Brandner, Kevin Marti, Bas Niekel, Ayush Mishra (ETH Zürich); Gianni Antichi (Politecnico di Milano); Laurent Vanbever (ETH Zürich)

PDF

Abstract: QUIC represents a re-design of the transport stack in response to the requirements of modern applications. While it provides a myriad of benefits, studies have shown that its performance penalties in several contexts keep it from being more widely adopted. While these studies provide a good overview of when QUIC can lack performance compared to TCP, they do little to specifically pinpoint where in the QUIC stack these slowdowns come from and how they can be fixed. To address this gap, we present Nesquic, a testing infrastructure for QUIC stacks. It collects library-internal metrics of each stack component without changing the library's source code. Our preliminary findings show that not only can Nesquic help developers pinpoint which components of their QUIC stacks are less performant, but it also gives them actionable insights into fixing these issues.

Bringing Memory Safety Close to the Wire

Leonardo Giovannoni, Giuseppe Lettieri (University of Pisa); Gregorio Procissi (Università di Pisa)

PDF

Abstract: Memory safety is critical in network programming to prevent vulnerabilities like buffer overflows and use-after-free. Rust's memory-safe design eliminates common bugs, making secure software a necessity. We present nethuns-rs, a Rust-based, memory-safe socket library for high-performance network I/O.

Challenges in VM Scheduling and Placement: Insights from a Real-World SAP Cloud Dataset

Arno Uhlig (TU Dresden and SAP SE); Iris Braun, Matthias Wählisch (TU Dresden)

PDF

Abstract: Resource allocation in distributed environments remains a key challenge. In this study, we analyze VM scheduling and placement in the SAP cloud platform, the infrastructure behind the world's largest enterprise resource planning provider. Using observability data from approximately 1,800 hypervisors and 48,000 VMs over a 30-day period, we identify inefficiencies in workload management. Unlike existing datasets, our dataset provides fine-grained time series of fully virtualized, enterprise-grade workloads, including long-running, memory-intensive SAP HANA instances as well as general-purpose VMs.

Characterizing Container Performance in Edge Computing

Ragini Gupta (University of Illinois at Urbana-Champaign); Claudiu Danilov, Josh Eckhardt, Keyshla Bernard (The Boeing Company); Klara Nahrstedt (University of Illinois at Urbana-Champaign)

PDF

Abstract: Edge computing reduces latency and network congestion by offloading computation from the cloud to edge devices. However, deploying software across heterogeneous edge platforms presents portability and dependency challenges. Containerization with Docker offers lightweight isolation but introduces overheads on resource-constrained devices. In this work, we empirically evaluate Docker performance on Raspberry Pi nodes using microbenchmarks (CPU, memory, network) and macrobenchmarks including AI workloads with sensor/camera interaction, compression, and encryption tasks. Our measurements highlight key limitations: insecure sensor access, spin-up delays for short tasks, and isolation-performance tradeoffs. These insights inform container use for stable, long-running edge workloads and guide future tuning for real-time, resource-constrained environments.

Clouded Comparisons - On the Impact of Virtual Machines on TCP-BBR Performance

Kathrin Elmenhorst, Nils Aschenbruck (Osnabrück University)

PDF

Abstract: Recently, TCP performance studies [1, 3, 4, 8] have focused on BBR which estimates the available bandwidth based on packet delay - instead of strictly reacting to packet loss as a sign of congestion. In contrast to packet loss, delay is more susceptible to jitter induced by the various system components in experimental setups and real-world deployments, including virtualization. Considering that BBR deployments in the wild are often running in Cloud-based virtualized environments, we measure how the choice of virtualization affects BBR v1-3 throughput in different BBR-enabled Linux kernels. Our results reveal that when using Google's custom kernels - the only publicly available source of BBRv2/v3 - BBR performance deteriorates under virtualized scheduling conditions, reducing throughput to almost zero in VirtualBox-based VMs. Overall, our work raises questions about the robustness of BBR under certain sub-optimal scheduling conditions.

Continual Benchmarking of LLM-Based Systems on Networking Operations

Ioannis Protogeros, Laurent Vanbever (ETH Zürich)

PDF

Abstract: The inherent complexity of operating modern network infrastructures has led to growing interest in using Large Language Models (LLMs) to support network operators, particularly in the area of Incident Management (IM). Yet, the absence of standardized benchmarks for evaluating such systems poses challenges in tracking progress, comparing approaches, and uncovering their limitations. As LLM-based tools become widespread, there is a clear need for a comprehensive benchmarking suite that reflects the diversity and complexity of operational tasks encountered in real-world networks. This poster outlines our vision for designing such a modular benchmarking suite. We describe an approach for generating operational tasks of varying complexity and discuss how to evaluate LLMs on these tasks and assess system-level performance. As a preliminary evaluation, we benchmark three LLMs --- GPT-4.1, Gemini 2.5-Pro, and Claude 3.7 Sonnet --- across over 100 test cases and two pipeline variants.

Crawling Alice Looking Glasses at IXPs to Quantify BGP Route Diversity

Yasin Alhamwy, Bashar Khoulani, Oliver Hohlfeld (University of Kassel)

PDF

Abstract: Internet Exchange Points (IXPs) are essential for enhancing regional Internet performance by enabling efficient connections between ASes. In this poster, we show that BGP routes can be easily obtained from Alice Looking Glass servers and use this data set to study route diversity at IXPs. We develop a scraper that periodically collects route information from 16 major IXPs, maintaining a historical view through periodic snapshots. Our preliminary analysis, conducted on one of the largest European IXPs, reveals that approximately 50% of prefixes have alternative paths.

DACE: Dynamic Adaptive Complexity Encoding for Real Time Communication on Heterogeneous Devices

Man Hin Yeung, Benedictus Harris Hutama, Jonas III Miranda LAGADE, Xiangjie Huang, Zili Meng (The Hong Kong University of Science and Technology)

PDF

Abstract: DACE is a novel algorithm to improve real-time video quality by dynamically adjusting the complexity of the encoding to maximize resource utilization. It uniquely adapts the feedback control logic from network congestion algorithms such as RENO, using prior frame encoding time to select the highest sustainable complexity for the next frame. A saturation mechanism prevents stalls by throttling complexity as it approaches the time budget. Our evaluation using the x264 encoder shows significant SSIM gains across diverse content, demonstrating DACE's effectiveness in converting available computational power into improved visual fidelity on heterogeneous devices.

Distributed Quantum Computing Across Heterogeneous Hardware with Hybrid Dependency Hypergraphs

Maria Gragera Garces, Chris Heunen, Mahesh Marina (University of Edinburgh)

PDF

Abstract: Distributing quantum computations across heterogeneous devices introduces communication and coordination costs that depend on both quantum and classical operations. We present an architecture-aware approach using Hybrid Dependency Hypergraphs (HDHs) to model space, time, and type dependencies in distributed execution. This poster explores how HDHs support network-level reasoning about communication patterns, and how they can expose cost trade-offs across circuit-based, measurement-based, and quantum walk models. We highlight patterns in HDH structure that inform scheduling, device assignment, and cut placement in heterogeneous quantum clusters.

DNSSEC in the Car - Towards an Agile Management of Automotive Service Security

Timo Salomon (TU Dresden and HAW Hamburg); Philipp Meyer, Thomas C. Schmidt (HAW Hamburg)

PDF

Abstract: Current automotive designs lack security solutions that span the vehicle lifetime. Future Service-Oriented Architectures (SOAs) in cars will enable post-sale updates and functional upgrades, which require prevalent proof of authenticity for the service suppliers as well as the manufacturer (OEM). In this poster, we decouple the cryptographic authentication of the service suppliers from that of OEMs with the help of DNSSEC. We propose to authenticate in-vehicle services by certificates that are solely generated by the service suppliers but published via DNSSEC TLSA records solely signed by the OEM. Building on the well-established Internet standard DNSSEC ensures updatability and interoperability with various protocols. Our approach enables credential management for millions of connected vehicles with proven security.

Enhancing and Comparing Fast Reroute Algorithms with eBPF

Marvin Weiler, Stephanie Althoff, Klaus-Tycho Foerster (TU Dortmund University, Department of Computer Science)

PDF

Abstract: We introduce a framework for comparing the performance of fast failover algorithms, with a particular focus on implementations using Extended Berkeley Packet Filter (eBPF) and eXpress Data Path within the Linux kernel. The study addresses the limitations of traditional failover methods, which often result in suboptimal routing and increased latency, by proposing an eBPF- and Netfilter-based solution that offers finer control and faster recovery from network failures. Through testing in both virtualized environments and on hardware platforms, this work demonstrates that the eBPF implementation significantly outperforms traditional Netfilter-based approaches in terms of latency, throughput, and system load. Our work hence provides insights for the further development of fast failover algorithms in the data plane and the potential for future research in hardware offloading.

Ensuring Low Latency When Number of Flows Increases over Bottleneck Link

Satoshi Utsumi, Keisuke Kano, Salahuddin Muhammad Salim Zabir (Fukushima University); Go Hasegawa (Tohoku University)

PDF

Abstract: In this paper, we propose and evaluate a new congestion control algorithm, Multiplicity-Robust Congestion Control (MRCC), that predicts the buffering delay based on queueing theory. MRCC alleviates the increase in buffering delay when multiple flows share a bottleneck link.

Exploring Reinforcement Learning for Adaptive Key Refresh in IoT Networks

Nor El Imane Heddadji, Nirmine Bougrine (École nationale Supérieure d'Informatique (ESI), Oued Smar, Algiers, Algeria); Mohamed-Lamine Messai (Université Lumière Lyon 2, Universite Claude Bernard Lyon 1, ERIC, 69007, Lyon, France); Hamida Seba (Université Claude Bernard Lyon 1, CNRS, INSA Lyon, LIRIS, UMR5205, 69622 Villeurbanne, France); Karima Amrouche (École nationale Supérieure d'Informatique (ESI), Oued Smar, Algiers, Algeria)

PDF

Abstract: Within the Key management process in IoT networks, the key refresh step is essential and unavoidable to defend against node compromise attacks. Periodic key refresh ensures the self-healing capability of key management solutions. However, the main challenge is to strike a balance between energy efficiency and effective threat mitigation when determining when to trigger key updates. To address this trade-off, we propose a Reinforcement Learning (RL)-based approach that dynamically adjusts refresh intervals based on real-time energy consumption and attack severity. Our method initiates key updates only when necessary, enabling efficient self-healing. Experimental results across various scenarios demonstrate that our solution significantly improves energy efficiency while preserving self-healing property, highlighting its potential for adaptive key refresh in IoT environments.

Federated Inference: Towards Collaborative and Privacy-Preserving Inference over Edge Devices

Boyu Fan, Xiang Su, Sasu Tarkoma (University of Helsinki); Pan Hui (Hong Kong University of Science and Technology (Guangzhou) and University of Helsinki)

PDF

Abstract: The growing AI capabilities on edge devices, along with increasing privacy concerns, call for new paradigms for distributed inference. We introduce Federated Inference (FI), a novel framework enabling multiple heterogeneous edge devices to collaboratively execute complex inference tasks on local data without revealing private information. FI pioneers the first design of capability-aware, privacy-preserving model partitioning, where a central orchestra-tor adaptively splits models based on individual client profiles. To ensure privacy, FI injects calibrated differential privacy noise into intermediate activations before transmission. We prototype FI and demonstrate that our adaptive-split strategy significantly reduces latency for weak clients while maintaining privacy and communication efficiency.

FlexUP: Breaking Up the CU-UP to Speed Up the RAN

Francisco Germano Vogt (Universidade Estadual de Campinas); Victor H. S. Lopes, Marcelo Cagianni Luizelli (Federal University of Pampa); Christian Rothenberg (Universidade Estadual de Campinas); Gergely Pongrácz (Ericsson Research); Chrysa Papagianni (University of Amsterdam)

PDF

Abstract: The Centralized Unit User Plane (CU-UP) in 5G networks works as an aggregation point of the RAN, facing increasing performance demands yet commonly limited by general-purpose processors. In this work, we present FlexUP, an architecture that offloads CU-UP functions to programmable switches and SmartNICs via a three-path abstraction: fast, medium, and slow. By matching function complexity to the appropriate hardware, FlexUP can improve latency, throughput, and resource efficiency while aligning with the modular and disaggregated principles of Open RAN (O-RAN).

Fuzzing RPKI Validators with Semantic and Structural Awareness

Zizhi Shang, Jiahao Cao, Zhechao Lin, Yi Liu, Mingwei Xu, Yangyang Wang, Jiang Li (Tsinghua University)

PDF

Abstract: The Resource Public Key Infrastructure (RPKI) secures BGP routing by enabling validation of routing announcements via signed objects. Relying Party (RP) software, responsible for Route Origin Validation (ROV), is complex and error-prone, with over 20 vulnerabilities disclosed to date. These flaws could potentially compromise BGP security and affect routing decisions. We present RFuzz, a fuzzing framework that automatically uncovers subtle bugs in RP implementations by addressing two core challenges: (1) the semantic and structural complexity of RPKI inputs, and (2) the difficulty of detecting non-crashing behavioral deviations. RFuzz introduces a structured semantic mutator that ensures input validity and cross-file consistency using semantic templates and a grammar-based RPKI model, and a hybrid deviation monitor combining active canary injection with passive semantic checks across RPs. Evaluation shows RFuzz achieves 100% semantic validity and discovers 7 new flaws across three popular RP implementations, 6 of which have been confirmed and will be fixed by maintainers.

Kairo - Incremental View Maintenance for Scalable Virtual Switch Caching

Annus Zulfiqar (University of Michigan); Ben Pfaff (Feldera); Gianni Antichi (Politecnico di Milano & Queen Mary University of London); Muhammad Shahbaz (University of Michigan)

PDF

Abstract: Data centers manage complexity by offloading simple, high-speed packet forwarding to the network fabric and rely on virtual switches (vSwitches) at end hosts to enforce complex policies---managing connectivity across physical interfaces, containers, and VMs. Since their inception, vSwitches have seen major performance optimizations, including wildcard caches [14], learned-index lookups [15, 16], and high hit-rate SmartNIC offloads [24, 25]. Yet, fast vSwitch policy updates have remained largely overlooked, long considered non-critical to performance. We argue that architectural shifts in vSwitch design (from N-table policies to single-table caching [14, 16, 19]) and infrastructure scaling---driven by rising link rates and increasingly dynamic update patterns from emerging workloads (e.g., distributed training [9, 12, 20, 23] and low-latency inference [6, 21])---have turned the bottom-up vSwitch update mechanism (Figure 1a) into a key bottleneck, limiting cache scalability and performance. To address this, we introduce Kairo, which recasts vSwitch cache maintenance as an instance of the Incremental View Maintenance (IVM) problem [4, 10], enabling efficient top-down updates that react only to rule changes (Figure 1b) rather than recomputing from scratch. We also outline the core challenges of applying IVM in this context.

Leveraging Commodity NICs for Accelerating Hierarchical QoS for Broadband Access Networks

Rubens Figueiredo, Hagen Woesner (BISDN GmbH); Andreas Kassler (Deggendorf Institute of Technology); Holger Karl (Hasso Plattner Institute)

PDF

Abstract: Broadband Network Gateways (BNGs) implement Hierarchical QoS (HQoS) to meet subscriber and service-level demands. Software BNGs face scalability challenges due to the large number of queues needed for fine-grained scheduling. We propose a framework that partially offloads HQoS to high-speed NICs, extending DPDK's QoS features. By mapping parts of the HQoS tree to limited amount of hardware queues, we reduce software overhead. Our approach achieves up to 50× reduction in average HQoS processing latency. This enables scalable, low-latency BNGs on commodity hardware.

Lossless Preemptive Buffer Management via Orchestrating Inter-Switch Idle Capacity

Zexi Yan, Ruihao Wang, Yangyang Wang, Mingwei Xu (Tsinghua University)

PDF

Abstract: Remote Direct Memory Access (RDMA) networks require efficient switch buffer management to maintain high throughput, low latency, and losslessness. However, limited buffer size and diverse traffic types challenge existing non-preemptive approaches (e.g., DT), often leading to buffer choking and performance degradation. We present Nomad, a lossless preemptive buffer management system that allows high-priority flows to evict lower-priority packets and redirect them to neighboring switches. Nomad involves lightweight packet eviction, enhances DT by modeling remote buffer availability into local threshold calculation, and coordinates evictions via low-cost notifications. Simulations show that Nomad reduces high-priority QCT slowdown by 21-33% over DT.

Measuring Discrepancies in Attack Surfaces Generated by Internet Intelligence Platforms

Martin Price, Edward Austin, Paul Smith, Nicholas Race (Lancaster University, School of Computing and Communications)

PDF

Abstract: In response to the growing threat of cyber-attacks, there is a demand to understand modern, complex attack surfaces. To achieve this, different Internet Intelligence Platforms (IIPs) can be used. In this work, we show there are differences in the attack surfaces created using three IIPs: Shodan, Censys, and ZoomEye. Our results show these discrepancies manifest in the size and temporal characteristics of the identified attack surfaces. This could lead to organisations and decisionmakers potentially being misinformed about their true attack surface. These findings point towards the need for further research focused on understanding these discrepancies.

Measuring Resilience of Authoritative DNS

Florian Steurer (Max Planck Institute for Informatics, Saarland University); Amreesh Phokeer (Internet Society); Philip Paeps (Network Startup Resource Center); Liz Izhikevich (University of California, Los Angeles)

PDF

Abstract: A resilient domain name system (DNS) is essential for a resilient Internet. In this work, we propose an approach to measure authoritative DNS resilience at Internet-scale and showcase our method using comprehensive data from active DNS scans.

Multi-Viewpoint Evaluation of Explanation Quality in X-IDS Using Aggregated and Consensus Metrics

Mohammed Alquliti, Erisa Karafili, BooJoong Kang (University of Southampton)

PDF

Abstract: Explainable intrusion detection systems (X-IDS) typically provide a set of explanations for each alert, while provided explanations may not be sufficient for security analysts to make time-critical decisions. Existing evaluation methods only consider such cases with a single set of explanations, as a result, limiting the scope of evaluation. This work expands a set of explanation evaluation metrics, our earlier work, to extend the scope of evaluation covering X-IDS providing multiple sets of explanations. Additional intermediate metrics are proposed to capture characteristics of multiple sets of explanations so the evaluation metrics can be computed for the multiple sets of explanations. The experimental results show the proposed metrics reveal more insights.

Nanosecond Time Synchronization for Optical Data Center Networks

Yiming Lei, Jialong Li (Max Planck Institute for Informatics); Zhengqing Liu (Imperial College London); Raj Joshi (Harvard University); Yiting Xia (Max Planck Institute for Informatics)

PDF

Abstract: Optical data center networks (DCNs) are renovating the infrastructure design for the cloud in the post-Moore's law era. The fact that optical DCNs rely on optical circuits of microsecond-scale durations makes nanosecond-precision time synchronization essential for the correct functioning of routing on the network fabric. However, current studies on optical DCNs neglect the fundamental need for accurate time synchronization. In this poster, we bridge the gap by developing Nanosecond Optical Synchronization (NOS), the first nanosecond-precision synchronization solution for optical DCNs general to various optical hardware. NOS builds clock propagation trees on top of the dynamically reconfigured circuits in optical DCNs, allowing nodes to seek better sync parents throughout time. It leverages the real-time error bounds of nodes to guide the tree-building process, minimizing synchronization errors. Our simulations demonstrate a synchronization accuracy of 23 ns in a 192-node configuration, surpassing the accuracy of state-of-the-art synchronization protocols in electrical DCNs of the same scale.

NICTokenizer: Tokenizer offload to a SmartNIC

Shaunak Galvankar, Sudarshan Mehta, Sean Choi (Santa Clara University)

PDF

Abstract: Generative AI workloads and services have started to dominate cloud infrastructure capacities with exploding demand in terms of tokens being processed with each training, finetuning or inference workload beginning and ending with Tokenization. Exponentially increasing tokenization volume presents a unique opportunity to leverage network devices already present on the data path for AI pipelines and offload parts of it such as the tokenizer to programmable dataplanes. The tokenizer traditionally run on general purpose CPUs without any hardware accelerators has lightweight hashing as well as table lookups as majority of its tasks. To eliminate host OS kernel overhead and utilize specialized network flow processors we introduce NICTokenizer, a novel framework to offload the tokenizer to SmartNICs to cut down per token latency, boost throughput and freeing up CPU cycles for more intensive workloads. Initial evaluations show that NICTokenizer outperforms the conventional tokenizer implementations run on the server by lowering the latency by 61.3% and increasing the throughput by 407.62% while maintaining a short tail latency guarantee. In addition, offloading the tokenizer to a SmartNIC frees up CPU clock cycles which could be utilized by other processes.

NVMe-oF Booster: Enabling Long-Range Remote Storage Access over Optical Paths

Kiyo Ishii, Kenji Mizutani (National Institute of Advanced Industrial Science and Technology); Junichi Sugiyama, Ichiro Yokokura, Katsumi Fukumitsu (Fujitsu Limited)

PDF

Abstract: A new NVMe-oF transport architecture with direct optical paths is proposed. To mitigate performance degradation due to propagation latency, NVMe communications are localized. A prototype implemented on FPGAs demonstrates stable bandwidth over varying distances.

PARS: A Layered Hardware Obfuscation Platform for Resilience and Secure Collaborative Multi-Module Designs

Mona Hashemi (University of Tehran, National University of Singapore); Siamak Mohammadi (University of Tehran, Institute for Research in Fundamental Sciences); Trevor E. Carlson (National University of Singapore)

PDF

Abstract: As hardware design becomes outsourced, protecting intellectual property (IP) from reverse engineering and counterfeiting is a challenge. Logic locking provide a promising solution, but existing approaches fail to balance security, performance, and scalability. We present PARS, a scalable obfuscation platform that integrates locking techniques tailored to different hardware granularity: standalone IPs, multi-module, and Network-on-Chip (NoC) communications. PARS balances overhead and security (ranging from standalone to multi-module systems and networked architectures) to defeat SAT-based, approximate, and learning-based deobfuscation attacks and is a well-suited solution for large designs.

Probabilistic Routing Algebras for QoS Routing

Jean Mégret, Tibor Schneider (ETH Zürich); Laurent Vanbever (ETH Zurich)

PDF

Abstract: Algebraic structures have been practical tools in the field of protocol analysis and design by providing formal answers to routing problems. However, by means of abstractions, some information from the underlying network is lost, thus providing only a coarse approximation of the real situation. We propose an algebra modelling attributes of the network probabilistically to better characterise dependencies and randomness of real networks. This opens up new perspectives for quality of service routing and traffic engineering.

Scaling Graph Neural Networks (GNN) for Real-Time Modeling of Network Behaviour

Maryam Asgari, Ren Ping Liu, Raymond Owen, Tanzeela Altaf (University of Technology Sydney)

PDF

Abstract: Network modeling has long been a well-established field of study. More recently, Graph Neural Network based models have demonstrated remarkable capability in capturing complex interactions in network data without assumptions about physical networks. While this characteristic facilitates integration across various telecom access networks, current benchmark models remain impractical for real-world deployment, due to real-time demands of modern infrastructure. This research develops a scalable solution for network modeling in large-scale domains such as telecommunication networks. By incorporating distributed learning into the architecture, we propose a novel framework that addresses computational inefficiency without compromising the accuracy offered by benchmark GNN-based models. The proposed architecture supports deeper and larger graphs, and natively handles fragmented datasets, reducing reliance on centralized aggregation and improving compatibility with real-world infrastructure. Beyond scalability, the design emphasizes stable optimization and resilience to enhance reliability in production environments. When applied to the state-of-the-art model, our proposed architecture outperforms the original, achieving a Pearson correlation of 0.999 with MSE under 0.0005. It also converges faster, with inference speedup scaling proportionally to the number of nodes. In a single-node, two-worker setup, it achieves ~48% inference speedup, with overall training efficiency improving by 20%, highlighting practical benefits for real-world scenarios.

Software Prefetching for eBPF Programs

Farbod Shahinfar (Politecnico di Milano); Aurojit Panda (NYU); Gianni Antichi (Politecnico di Milano & Queen Mary University of London)

PDF

Abstract: Cache misses limit performance of eBPF programs. Software prefetching is a technique to overcome the barrier, but eBPF runtime does not support it. In this poster we tackle this problem by enabling software prefetching for eBPF programs.

Storms Above, Disruptions Below: Mapping The Impact of Extreme Solar Storms Across Orbital Regimes

Saeed Fadaei (University of Surrey); Aravindh Raman (Cisco ThousandEyes); Nishanth Sastry (Unversity of Surrey)

PDF

Abstract: Low Earth Orbit (LEO) constellations like Starlink now serve millions of users, including in disaster zones and unserved regions. However, LEO systems operate in a highly dynamic space environment, where solar activity can trigger geomagnetic storms that disturb ionospheric propagation, satellite drag, and radio link quality. In this work, we present a cross-layer empirical study of how the most intense solar storms of Solar Cycle 25---particularly those in May and October 2024---impacted the performance of LEO networks. Using active testbed probes (via LEOScope) and satellite telemetry we correlate geomagnetic storm activity with degradations in throughput, latency, and link stability. Our analysis reveals geographically skewed performance drops, latency inflation, and increased session drops. We conclude with a vision for a future prediction system that integrates solar observatory feeds, satellite tracking, and crowd-sourced measurements to forecast Internet disruptions under extreme space weather.

T-5GS: A Full-Scale Multi-Operator 5G Roaming Testbed Beyond Core-Level Simulations

Chia-Hao Chang, Tsung-Nan Lin (Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan)

PDF

Abstract: Providing seamless service beyond geographical boundaries has long been a core objective of mobile networks, with roaming playing a pivotal role [1]. However, experimental support for 5G Standalone (5G SA) roaming remains limited---lagging behind both architectural progress and research needs. To address this, we present T-5GS, a full-scale, reproducible and open-source testbed. Unlike partially implemented stacks in existing platforms that cover only 38% of the roaming protocol stack, T-5GS improves protocol coverage to nearly 100%. By enabling realistic end-to-end testing through VM-based isolation---avoiding the kernel-sharing issues common in container-based setups---T-5GS offers a forward-looking foundation for advancing 5G roaming design, interoperability, and security research. The complete implementation is publicly available at https://github.com/T-5GS/T-5GS.

Towards a Complete View of Encrypted Client Hello Deployments

Jonas Mücke, Konstantin Gasser (TU Dresden); Thomas C. Schmidt (HAW Hamburg); Matthias Wählisch (TU Dresden)

PDF

Abstract: We present a new measurement approach to detect ECH deployments. Our method leverages standard-compliant behavior of ECH servers. This reveals a set of ECH deployments not detected by prior measurements. Prior measurements reported only one major ECH deployment (Cloudflare). Our measurements reveal another large deployment (Meta). Meta servers support ECH, but ECH configuration is not exposed via the DNS. Furthermore, we study potential latency penalties due to ECH by analyzing the time differences between ECH and non-ECH connections.

Towards Network Model Generalization using Strategic Data Collection

Benjamin Hoffman, Alexander Dietmüller, Laurent Vanbever (ETH Zürich)

PDF

Abstract: Essential networking applications, such as video streaming, require accurate network models to estimate current and future network states (e.g., is the network congested?). Due to the complexity of today's networks and the subsequent difficulty of this modeling task, Machine Learning (ML)-based approaches have emerged as an alternative to first-principle modeling methods. However, proposed ML algorithms suffer from a generalization crisis: they often fail to perform in deployments outside of their training environment. Moreover, simple solutions such as naively training on more data do not guarantee improved generalization performance. We propose an interpretable approach to improving model generalization by focusing on the quality of a dataset over sample quantity already during data collection. Notably, our approach's interpretability allows us to reason on which environments to prioritize at the data acquisition stage. To this end, we investigate the impact of dataset metrics such as Round Trip Time (RTT) and throughput on both in-distribution (ID) and out-of-distribution (OOD) model performance. Our results suggest that strategically performing data collection in environments with broader statespace coverage in areas of higher RTT and lower throughput is key to achieving improved model generalization and OOD performance.

Two-Phase Scanning in IPv6 - First Observations from a Reactive IPv6 Network Telescope

Yue Xin (HAW Hamburg); Maynard Koch (TU Dresden); Isabell Egloff, Raphael Hiesgen, Thomas C. Schmidt (HAW Hamburg); Matthias Wählisch (TU Dresden)

PDF

Abstract: Scanning is prevalent on the Internet. Researchers, commercial services as well as malicious actors probe the Internet regularly and with high intensity. Stateless TCP SYN scanning has been established as an efficient approach to explore the IPv4 service landscape within minutes. The huge IPv6 address space renders this impossible. In this poster, we analyze 18 months of IPv6 SYN scanning using the reactive network telescope Spoki, which responds to TCP SYN packets. In case of two-phase scans, it engages in TCP handshakes initiated in a second phase. Spoki has been successful in identifying malicious scanning behavior in IPv4 and found a stable share of ≈ 75% irregular TCP SYNs, which typically characterize a first, stateless scanning phase. On the IPv6 Internet, the share of irregular TCP SYNs has not saturated but fluctuates on a 30 days average between 20% and 80%. Fewer scanners return after an irregular SYN and returns happen significantly later than in IPv4, which may indicate larger address traversals that delay the second phase.

Using Blockchain for Enhanced Inter-MNO Authentication in B5G and 6G Networks

Nischal Aryal, Fariba GHAFFARI (Institute Polytechnique de Paris, Télécom Sud-Paris); Emmanuel Bertin (Orange labs, France); Noel Crespi (Institute Polytechnique de Paris, Télécom Sud-Paris)

PDF

Abstract: This paper introduces a Blockchain-based overlay network that allows users to authenticate and access services across different MNOs without requiring prior agreements. The overlay leverages smart contracts for decentralized access control and IPFS for secure, shared storage of encrypted subscription data. A hybrid testbed using OpenAirInterface, Magma Core, Go Ethereum, and IPFS validates the system, demonstrating comparable latency, secure, and scalable cross-operator authentication---supporting flexible inter-operator collaboration in future B5G/6G networks.

Using RPKI to Aggregate Autonomous Systems by their Managing Organization

Deepak Gouda, Cecilia Testart (Georgia Institute of Technology)

PDF

Abstract: Accurate mapping of Autonomous Systems (ASes) to their owner organizations is fundamental for understanding the structure and dynamics of the Internet. However, as AS numbers have traditionally been delegated in an ad-hoc manner and organizational ownership has evolved over time, many organizations have registered resources under different names. Traditionally, researchers have relied on datasets like AS2Org, which map ASNs to organizations primarily using WHOIS records, but WHOIS inconsistencies often lead to missed and false relationships. We propose a new approach by leveraging the Resource Public Key Infrastructure (RPKI) to map ASNs to their managing organization. Our methodology combines multiple data sources: WHOIS records to extract organization names, RPKI certificates to identify potential siblings, and Large Language Models (LLMs) to find evidence not visible in WHOIS records currently. This integrated approach enables a more robust and accurate mapping of ASNs to organizations, notably improving inferences for 14% of multi-ASN clusters.

V2X Messaging with CoAP and EdgeX for Probabilistic Risk-Aware Coordination in Mixed Urban Traffic

Bruno Mendes (Capgemini Engineering,Universidade de Aveiro, Instituto de Telecomunicações and Departamento de Eletrónica, Telecomunicações e Informática); Marco Araújo (Capgemini Engineering, Instituto de Telecomunicações and Portucalense University); Adriano Goes (Capgemini Engineering); Daniel Corujo, Arnaldo S. R. Oliveira (Instituto de Telecomunicações and Departamento de Eletrónica, Telecomunicações e Informática, Universidade de Aveiro)

PDF

Abstract: This article presents a standards-based architecture for V2X communication using CoAP and EdgeX Foundry. By mapping ETSI ITS messages to CoAP, the system enables efficient risk alerting at the edge. An inference module illustrates the architecture's extensibility, and the simulation confirms responsiveness and scalability under mixed traffic conditions.

Vedrfolnir: RDMA Network Performance Anomalies Diagnosis in Collective Communications

Yuxuan Chen, Menghao Zhang, Xiheng Li, Fangzheng Jiao, Chunming Hu (Beihang University)

PDF

Abstract: Collective communication becomes increasingly crucial as large language models rapidly evolve, but the RDMA it uses inevitably faces network performance anomalies (NPAs). Vedrfolnir is an accurate and efficient diagnosis system for RDMA NPAs in collective communication, which (1) constructs waiting graphs through algorithm decomposition, (2) adaptively detects anomalies while efficiently collecting diagnostic data, and (3) precisely analyzes performance bottlenecks and root causes. Evaluation shows that Vedrfolnir can achieve accurate diagnosis results with low overhead.

WaveSurfer - Scheduling Irregular Pulsing Attacks on Microservice Autoscaling

Navidreza Asadi, Răzvan-Mihai Ursu, Johannes Zerwas (Technical University of Munich); Leon Wong (Rakuten Mobile, Inc.); Wolfgang Kellerer (Technical University of Munich)

PDF

Abstract: Microservice autoscaling balances service quality and operational costs through heuristic-based solutions that often overlook robustness. We adopt an adversarial perspective to expose vulnerabilities in autoscaling by identifying a seconds-scale irregular pulsing pattern. It comes with a traffic-aware attack scheduler that significantly outperforms traditional uniform DoS and existing pulsing attacks. Our proposed attack, which we call WaveSurfer, can exploit benign traffic patterns to increase attack effectiveness by up to 5.3×. This work highlights the urgent need for robust autoscaling mechanisms that can withstand sophisticated adversarial patterns.

Why are smart buildings still dumb: The road ahead

Karolina Skrivankova, Mark Handley, Stephen Hailes (UCL)

PDF

Abstract: Industrial and home building automation industries share a common goal: transforming passive buildings into smart environments capable of efficient resource usage and increased user comfort. Both have so far failed to enable operation of truly smart automation deployments, although facing different challenges. Industrial systems are robust but rigid, whereas home automation systems are more flexible but unreliable - could we have the best of both worlds? We propose KaOS: a distributed control platform built around three key concepts: running the control architecture in the form of portable containerised control tasks, managed communication channels with guarantees to support dataflows between them and a distributed operations platform to enable incremental change of control goals and its deployment.

A Lightweight Emulation Framework for Energy-Aware Federated Learning

Johann Bastos, João Batista (Federal University of Espirito Santo (UFES)); Ramon Fontes (Federal University of Rio Grande do Norte); Eduardo Cerqueira (Federal University of Para); Rodolfo Villaça, Vinicius F. S. Mota (Federal University of Espirito Santo (UFES))

PDF

Abstract: IoT networks face critical challenges in energy efficiency, privacy, and communication reliability. Federated Learning (FL) enables collaborative model training without sharing raw data, but traditional client selection can drain energy and disrupt RPL-based networks. This demo introduces MininetFed, a network emulator with FL support in an energy-aware client selection strategy. Clients are chosen based on energy availability, balancing model accuracy and network longevity. Users can interact with different topologies and selection algorithms, with results showing enhanced learning efficiency and extended network lifetime in multi-hop IoT scenarios.

Adapting at Line-Speed: A Demonstration of In-Network Concept Drift Detection

Daniel José Ventorim Nunes (UFES/IFES); Bruno Missi Xavier (IFES); Magnos Martinello (UFES)

PDF

Abstract: We present a fully in-network system for detecting and adapting to concept drift in real-time traffic classification. Implemented on a P4-programmable switch, our architecture integrates an Isolation Forest for one-class classification, a multiclass classifier for packet labeling, and a lightweight, bitwise EWMA-based drift detector, all within the data plane. When significant traffic shifts are detected, the control plane triggers automated model retraining and redeployment, ensuring continued accuracy at line rate. This demo highlights the feasibility and effectiveness of adaptive, resource-aware Machine Learning in high-speed networks.

An Integrated Framework for Network Emulation and Multi-vehicle Algorithm Testing

Mauricio Rodriguez, Ariel Goes de Castro (Universidade Estadual de Campinas (UNICAMP)); Ramon Fontes (Federal University of Rio Grande do Norte); Fabricio Rodriguez (Telefonica Research); Christian Rothenberg (Universidade Estadual de Campinas (UNICAMP))

PDF

Abstract: As drones and autonomous vehicles become integral to smart city infrastructures, there is a growing need for tools that can accurately evaluate their behavior under realistic communication and mobility conditions. Existing frameworks often lack support for scalable scenarios, realistic wireless emulation, or the integration of heterogeneous vehicle types. This demonstration presents UNetyEmu as a novel framework that combines real-time network emulation with high-fidelity mobility simulation, enabling realistic experimentation with both aerial and non-aerial autonomous vehicles. This integration allows researchers to evaluate vehicle coordination under dynamic communication conditions typical of smart city scenarios.

CGSynth: Cloud Gaming Synthesizer

Alireza Shirmarz (Universidade Federal de Sao Carlos (UFSCar)); Ariel Goes de Castro (University of Campinas (UNICAMP)); Victor Hugo Schneider Lopes (Federal University of Pampa); Fabio Verdi (LERIS - UFSCar); Marcelo Luizelli (Federal University of Pampa); Christian Rothenberg (UNICAMP)

PDF

Abstract: Cloud gaming's unique network traffic is challenging to reproduce for research. This demo introduces Cloud Gaming Synthesizer (CGSynth), a platform that generates realistic, configurable synthetic cloud gaming (CG) traffic. CGSynth captures real CG patterns and allows their synthetic reproduction with user-defined flow/packet parameters and deterministic protocol headers. It employs a GRU for accurate, order-preserving timestamp generation and AI-based video interpolation for realistic payloads. Crucially, CGSynth integrates a QoE evaluation module using objective (e.g., SSIM) and subjective metrics (e.g., MOS) to validate synthetic traffic's video quality and responsiveness against real streams

CRC4EVER: Cyclic Redundancy Check for Enhanced Verification and Efficient Routing

Everson Borges (UFES); Fabricio Rodriguez (Telefonica Research); Rafael Silva Guimarães (IFES); Magnos Martinello (UFES); Cristina K. Dominicini (IFES); Moises R. N. Ribeiro (UFES); Eduard Marin (Telefonica Research); Christian Rothenberg (UNICAMP)

PDF

Abstract: This demonstration introduces Cyclic Redundancy Check for Enhanced Verification and Efficient Routing (CRC4EVER). We propose how the Residue Number System (RNS) --- a number system that employs a shared secret scheme distributed across network nodes (nodeIDs)--- can enable lightweight forwarding and proof-of-transit (PoT) in path-aware networks, relying solely on CRC operations. Our approach leverages an RNS-based source routing, where a routeID encodes the entire packet path. At each hop, the routeID is decoded via simple modulo operations, executed at line rate, by repurposing existing CRC hardware in programmable switches. Furthermore, the unique mapping between the routeID and its corresponding set of nodelDs provides intrinsic path verifiability via CRC-based hash operations. A proof-of-concept was implemented on programmable Tofino switches, demonstrating the feasibility of executing both routing and path verification at line rate, through table-free CRC operations.

Developing an IoT-Integrated Photodiode Sensor for Efficient Radon Detection

Seyed N. Jafari, Rui P. Pinto, Edgar F. L. Ladeira (Instituto de Telecomunicações, Dep. of Informatics, Universidade da Beira Interior, Covilhã, Portugal); Ligia Lopes, Sandra Soares (Dep. of Physics, Universidade da Beira Interior, Covilhã, Portugal); Bruno M. C. Silva (Instituto de Telecomunicações, Dep. of Informatics, Universidade da Beira Interior, Covilhã, Portugal)

PDF

Abstract: In this paper, a low-power IoT-based radon gas detection system using a photodiode sensor is presented. The system is designed for real-time monitoring, which is optimized using Radon Eye RD200 as a calibration reference. The proposed circuit consists of a preamplifier stage, a main amplifier, a Schmitt trigger, and a pulse generator, along with a microcontroller for data processing and wireless transmission. The experimental results obtained confirm the performance of the system compared to conventional radon detection methods.

Environmental monitoring of industrial environments with TSMatch

Ricardo da Costa Lima, Rute C. Sofia (fortiss GmbH)

PDF

Abstract: TSMatch is an open-source Edge-based middleware which facilitates semantic matchmaking between Internet of Things (IoT) devices and IoT services. The primary objective of TSMatch is to automate IoT data exchange by aligning the capabilities of devices with the requirements of services. This demo showcases how TSMatch intelligently connects IoT with compatible services, using semantic reasoning and machine learning.

Hilby - Hilbert Interactive Prefix Plots

Alexander Männel (TU Dresden); kc claffy, Ricky K. P. Mok (CAIDA/UC San Diego); Thomas C. Schmidt (HAW Hamburg); Matthias Wählisch (TU Dresden)

PDF

Abstract: Hilbert curves are a common method to visualize data related to IP address spaces. In this demo, we present Hilby, a React framework to create such visualizations both for IPv4 and IPv6. Hilby offers a new perspective on Hilbert curves by enabling interactive aggregation and deaggregation of prefixes of different lengths simultaneously. By combining this with other features, e.g., color, Hilby can display both fine details and coarse overviews of large amounts of multidimensional networking data in the same frame without sacrificing performance or user experience. We provide use cases where visualizations benefit from Hilbys capabilities in research and practice.

Integration of IoT multihop networks with MEC infrastructures for Next Generation Networks

Joaquin Alvarez-Horcajo, Isaias Martinez-Yelmo, Lucia Rubio-Escribano, Elena Pontijas-Martin, Jose Manuel Arco (Universidad de Alcalá)

PDF

Abstract: This demonstration shows the feasibility of deploying scalable and interactive Internet of Things (IoT)/Mixed Reality (MR) environments assisted by Multi-Access Edge Computing (MEC) infrastructures. The setup recollects data from IoT sensors based on an enhanced version of the link layer MuHow protocol to achieve multi-hop data gathering without incurring in Internet Protocol (IP) overhead. Once the data are collected, they are forwarded to a MEC infrastructure via the Message Queuing Telemetry Transport (MQTT) protocol. The close Edge infraestructure runs an immersive MR application that receives and allows to visualize the recollected information from sensors in real-time through a Meta Quest 3 headset, providing an intuitive interface based on Digital Twins (DTs) to interact with cyber-physical systems.

Latency Limits for Asynchronous Traffic Shaping in Redundant TSN Networks

Teresa Lübeck, Philipp Meyer (HAW Hamburg); Timo Salomon (TU Dresden and HAW Hamburg); Franz Korf, Thomas C. Schmidt (HAW Hamburg)

PDF

Abstract: The IEEE 802.1 working group has introduced the Asynchronous Traffic Shaper and Frame Replication and Elimination for Reliability to Time Sensitive Networking. Recent findings indicate that combining these mechanisms can lead to unbounded latencies. This demonstration illustrates how unbounded latencies occur and proposes simple configuration rules to maintain latency bounds. Causes and effects are visualized in a simulation.

MAC-Arena: A Unified and Realistic Radio Resource Scheduling Simulator

Jingbo Liu (Shanghai Jiao Tong University); Jiacheng Chen (Pengcheng Laboratory); Haibo Zhou (Nanjing University)

PDF

Abstract: Resource scheduling is critical to the transmission performance of RAN, yet existing studies typically adopt self-defined simulation environments and overlook the practical scheduling process. To this end, we present MAC-Arena---a RAN resource scheduling simulator tailored for open and reproducible MAC-layer research. MAC-Arena models realistic delays that affect performance in the scheduling process, supports state-of-the-art physical-layer techniques and channel models, and accommodates both 5G and a potential 6G fully-decoupled RAN architecture that isolates uplink and downlink operations. The simulator abstracts physical-layer computation for efficiency, and is developed to be AI-friendly for evaluating AI-based algorithms.

MITIK Toolkit: A Privacy-Compliant Passive Collection of WiFi Probe Request Datasets

Fernando Molano Ortiz, Guillaume Farhi-Rivasseau, Nadjib Achir, Aline Carneiro Viana (INRIA)

PDF

Abstract: The ubiquity of WiFi-connected devices broadcasting unencrypted management frames enables identifying nearby devices, which can be beneficial for societal applications while raising significant privacy concerns. This demo paper introduces a unified toolkit, Mitik, for capturing, analyzing, and interpreting non-intrusive passive measurements of WiFi traces. The toolkit addresses several challenges, including the configuration of sniffers for synchronized data capture, privacy protection at the point of collection, and the association of randomized MAC addresses with individual smart-phones. By systematically tackling these challenges, Mitik aims to advance our understanding of individual mobility patterns and uncover plausible links between distinct devices.

NEBULA - Decentralized Federated Learning for Heterogeneous Networks

Enrique Tomás Martínez Beltrán (University of Murcia); Gérôme Bovet (Cyber-Defence Campus, armasuisse Science & Technology); Gregorio Martínez Pérez, Alberto Huertas Celdrán (University of Murcia)

PDF

Abstract: Federated learning (FL) enables collaborative model training without sharing raw data, which is pivotal for maintaining privacy. However, existing FL frameworks often rely on a central coordinator, posing risks in heterogeneous networks. This work presents NEBULA, a decentralized FL platform that unifies centralized and peer-to-peer FL paradigms, integrating network awareness and autonomous adaptation for improved resilience and efficiency. Key contributions include: (1) a unified architecture supporting both server-coordinated and fully decentralized operation; (2) network-aware orchestration for dynamic communication and aggregation optimization; and (3) built-in mechanisms for robust operation. The demonstration will showcase real-time performance, defense against adversarial attacks, and adaptive client participation in challenging network scenarios.

Next-Generation 6G Network Management with OSS-GPT

Abdelkader Mekrache, Adlen Ksentini (Eurecom); Christos Verikoukis (ISI/ATH and University of Patras)

PDF

Abstract: In the 6G era, the Management and Orchestration (MANO) layer must become more intelligent to support advanced use cases with stringent Quality of Service (QoS) requirements. These often span multiple domains, terrestrial, non-terrestrial, and edge, requiring efficient coordination across heterogeneous networks. To meet these demands, Mobile Network Operators (MNOs) are evolving their Operations Support Systems (OSS) toward a "network of networks" vision, built on standardized and interoperable APIs. Standards bodies such as 3GPP, ETSI, and TM Forum are addressing this by developing numerous OSS API specifications and intent-based request models in JSON or YAML. However, creating these intents remains challenging for users without deep domain knowledge. We present OSS-GPT, an agentic AI framework that enables users to interact with OSSs via natural language. By leveraging Large Language Models (LLMs), OSS-GPT translates high-level intents into executable sequences of OSS API calls and automates their execution.

Privacy-Preserving Payments on Constrained End-User Devices

Mikolai Gütschow (TU Dresden); Matthias Wählisch (TU Dresden and Barkhausen Institut)

PDF

Abstract: In this demo, we explore the resource demands of privacy-preserving digital payment systems based on digital tokens. We specifically focus on devices with constrained hardware resources. We evaluate our approach using GNU Taler, a free-software e-cash protocol and reference implementation, and RIOT, a free and open-source operating system for the IoT. Our preliminary findings suggest that participation in e-cash systems is feasible using inexpensive microcontrollers that have little processing, memory, and energy capabilities.

Realizing Flexible and Practical Multi-BS Cooperation with a Fully-Decoupled RAN Architecture

Yuhang Shi (Nanjing University); Jiacheng Chen (Peng Cheng Laboratory); Haibo Zhou (Nanjing University)

PDF

Abstract: The current RAN lacks flexibility due to tightly coupled UL/DL, making it difficult to handle increasingly asymmetric UL/DL traffic and realize multi-BS cooperation. To overcome these limitations, we proposed a Fully-Decoupled RAN (FD-RAN) architecture that splits the gNB functionalities into specialized Control-BS, Uplink-BS, and Downlink-BS entities, decoupling control/data planes and UL/DL paths. This demo showcases the first FD-RAN hardware prototype, implemented by SDR-based BSs and UEs, and an x86 server-based core network. Our live demonstration presents UE initial access and dynamic resource allocation over control plane, location-based feedback-free cooperative downlink transmission, and uplink joint reception, validating FD-RAN's feasibility for flexible and practical muti-BS cooperation.

Rearchitecting Approximation-First Cloud Telemetry

Zeying Zhu, Zaoxing Liu (University of Maryland)

PDF

Abstract: Cloud-native telemetry systems like Prometheus enable observability through rule queries-window- and dimension-based aggregations over time series data. However, these queries incur high operational costs and latency due to raw data ingestion, repeated computations, and expensive storage. In this demonstration, we revisit the potential of approximate analytics to improve efficiency across the telemetry pipeline. We propose a hybrid, sketch-based caching architecture that unifies optimizations across ingestion, query processing, and storage. By supporting approximate representations at each stage, our design achieves significant cost savings while maintaining high accuracy and responsiveness.

SmartNet: Bridging Performance and Realism in Network Emulation with SmartNICs

Francisco Germano Vogt (Universidade Estadual de Campinas); Victor H. S. Lopes, Marcelo Caggiani Luizelli (Federal University of Pampa); Fabricio Rodriguez (Telefonica Research); Christian Rothenberg (Universidade Estadual de Campinas); Chrysa Papagianni (University of Amsterdam); Gergely Pongrácz (Ericsson Research)

PDF

Abstract: Network emulators are essential for testing and validating new networking solutions before deployment. In this work, we present SmartNet, a new hardware-based emulation framework that brings SmartNIC awareness to network experimentation. SmartNet enables realistic and scalable evaluation of offloading, host interaction, and in-network processing. Using a simple API interface, researchers can define and deploy topologies with multiple switches, hosts, and diverse link characteristics (e.g., bandwidth, latency, loss) to evaluate SmartNIC-driven architectures.

The GhostTwin: Towards Live Digital Twins via SmartNIC Network Emulation

Francisco Germano Vogt (Universidade Estadual de Campinas); Victor H. S. Lopes (Federal University of Pampa); Fabricio Rodriguez (Telefonica Research); Marcelo Caggiani Luizelli (Federal University of Pampa); Chrysa Papagianni (University of Amsterdam); Christian Rothenberg (Universidade Estadual de Campinas)

PDF

Abstract: Network Digital Twin (NDT) technology enables the replication of entire network infrastructures into fully synchronized digital replicas. This capability is especially timely for the safe integration of AI into critical networks, where model correctness and reliability are essential. In this work, we introduce GhostTwin, the first open-source framework for defining and operating high-fidelity NDTs in a self-contained environment. GhostTwin employs SmartNIC-based hardware emulation to realistically replicate programmable physical networks, capturing network performance metrics such as packet loss and residual bandwidth. The framework supports diverse telemetry sources, enabling scalable and accurate digital twin deployments in a programmable testbed.

Towards an Internet Deployment of Flexible Multicast QUIC

Louis Navarre, Olivier Bonaventure (UCLouvain)

PDF

Abstract: Despite their scalability benefits, multicast protocols are not widely deployed and are confined to intra-domain use cases such as IPTV. Several factors contribute to this reluctance to deploy multicast on the Internet. Among them, the chicken-and-egg and all-or-nothing problems hindered the emergence of inter-domain multicast. Recent advancements within the IETF suggest solutions to these issues, such as Automatic Multicast Tunneling (AMT) and flexible multicast extensions to the QUIC transport protocol (FCQUIC). This demo leverages AMT and Flexicast QUIC to enable researchers to conduct large-scale inter-domain multicast measurement campaigns. We provide Docker images of FCQUIC receivers that can be connected to our FCQUIC source, which any Internet host can reach using AMT. We will also publish our setup code to motivate researchers to instantiate their own FCQUIC source application with AMT.

Towards Fine-Grained and Automated Control for Large-Scale Wireless Digital Twins

Sarath Nagadevara, Afroze Rahman, Jiayi Meng (University of Texas at Arlington)

PDF

Abstract: The NVIDIA Aerial Omniverse™ Digital Twin (AODT) is a state-of-the-art wireless digital twin (DT) platform for 5G and 6G R&D. The AODT provides intuitive graphical user interfaces (GUIs) that allow users to control a wireless DT, such as configuring radio settings and geospatial information of distributed units, radio units, and user equipments. However, these built-in GUIs impose significant constraints on fine-tuned control and automation, which are crucial for high-fidelity simulation of large-scale, real-world radio access networks. In this work, we propose an extension to the AODT that enables fine-grained control and automation without the need for GUIs. We demonstrate the use of this extension by running simulations within the AODT entirely through programmatic interfaces.

TSN Reservation Framework for Legacy Apps - Signaling, Shaping, Monitoring, and Measuring

Alexej Grigorjew, Tobias Hoßfeld (University of Würzburg); David Hock, Fabian Lipp (Infosim GmbH & Co. KG)

PDF

Abstract: This demo presents a framework that enables predictable real-time guarantees for legacy TCP applications over Ethernet. It includes four components: (i) a lightweight signaling system that implements a simplified TSN Resource Allocation Protocol with minimal dependencies, (ii) a proxy that terminates TCP connections locally, initializes resource reservations, and enforces the traffic specification through shaping, (iii) a monitoring system that tracks overall network utilization and status, and (iv) an accurate live measurement and visualization of one-way delays for all reserved streams. The components are focused on simplicity to facilitate deployment and encourage innovations.

X2DP: eXtended eXpress Data Path

Vladimiro Paschali, Francesco Fazzari, Andrea Monterubbiano (Sapienza Università di Roma); Sebastiano Miano (Politecnico di Milano); Salvatore Pontarelli (Sapienza Università di Roma)

PDF

Abstract: XDP (eXpress Data Path) is an eBPF-based high-performance data path used to process network packets at high rates, bypassing most of the Linux networking stack. The high rate is achieved by intercepting packets as soon as the NIC moves them into host memory. This paper introduces X2DP, a framework designed to enhance the performance of XDP applications. X2DP unlocks several optimizations otherwise unavailable in the standard XDP path. First, it enables prefetching. Second, it provides more opportunities to leverage SIMD instructions, allowing parallel processing of identical operations across multiple packets. Third, it facilitates specific code optimizations that enhance instruction-level parallelism. All these optimizations are enabled by the use of hardware-assisted packet batching. The batching process coalesces the execution of the eBPF application, which is launched once to process multiple packets, reducing the time spent by the CPU while executing the generic network driver code and allowing the above-mentioned optimizations. This paper quantifies the performance improvements achieved by applying these techniques to a set of XDP programs, demonstrating throughput gains of up to 2.3x.