10.1145/1592681acmconferencesBook PagePublication PagescommConference Proceedingsconference-collections
WREN '09: Proceedings of the 1st ACM workshop on Research on enterprise networking
ACM2009 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SIGCOMM '09: ACM SIGCOMM 2009 Conference Barcelona Spain 21 August 2009
ISBN:
978-1-60558-443-0
Published:
21 August 2009
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

Welcome to the first Workshop: Research on Enterprise Networking -- WREN 2009. We established this workshop to generate papers and discussion on research challenges and results specific to enterprise and data-center networks.

Enterprise networks (in large corporations, universities, government entities, etc.) use much of the same technology as the Internet, but otherwise differ in important and interesting ways. Also, net spending on enterprise network equipment is much larger than analogous spending by ISPs. However, most academic researchers have focussed on public networks such as the Internet. WREN, we hope, will help to broaden that focus.

We knew we were taking a risk in starting a new workshop, to be held outside the US, on a topic whose primary experts might be suffering from limited travel budgets (to put it mildly). Therefore, we did a lot of work to solicit papers (and, as program chair, I want to thank the WREN PC members for a lot of help contacting potential authors.) I am happy to report that we received more good submissions than we could accept.

We received 24 submissions from at least eight countries, and accepted 13 papers, including two from industry authors outside research labs. Most papers received five reviews, and the PC was generally quite impressed with the quality of the submissions; people are doing a lot of interesting enterprise-related network research, and we expect that this topic will become more visible in the future.

Skip Table Of Content Section
SESSION: Security
research-article
Free
Practical declarative network management

We present Flow-based Management Language (FML), a declarative policy language for managing the configuration of enterprise networks. FML was designed to replace the many disparate configuration mechanisms traditionally used to enforce policies within ...

research-article
Free
Resonance: dynamic access control for enterprise networks

Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and systems that can cause incorrect behavior and slow response to attacks. We ...

research-article
Free
Delegating network security with more information

Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be able to cope, the administrator ...

research-article
Free
Impact of IT monoculture on behavioral end host intrusion detection

In this paper, we study the impact of today's IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to the uniform configuration of Host intrusion detection systems (HIDS) across all ...

SESSION: System design
research-article
Free
Hash, don't cache: fast packet forwarding for enterprise edge routers

As forwarding tables and link speeds continue to grow, fast packet forwarding becomes increasingly challenging for enterprise edge routers. Simply building routers with ever larger amounts of ever faster memory is not appealing, since high-speed memory ...

research-article
Free
Crossbow: a vertically integrated QoS stack

This paper describes a new architecture which addresses Quality of Service (QoS) by creating unique flows for applications, services, or subnets. A flow is a dedicated and independent path from the NIC hardware to the socket layer in which the QoS layer ...

SESSION: Measurement and modeling
research-article
Free
Multicast redux: a first look at enterprise multicast traffic

IP multicast, after spending much of the last 20 years as the subject of research papers, protocol design efforts and limited experimental usage, is finally seeing significant deployment in production networks. The efficiency afforded by one-to-many ...

research-article
Free
Understanding data center traffic characteristics

As data centers become more and more central in Internet communications, both research and operations communities have begun to explore how to better design and manage them. In this paper, we present a preliminary empirical study of end-to-end traffic ...

research-article
Free
Understanding TCP incast throughput collapse in datacenter networks

TCP Throughput Collapse, also known as Incast, is a pathological behavior of TCP that results in gross under-utilization of link capacity in certain many-to-one communication patterns. This phenomenon has been observed by others in distributed storage, ...

SESSION: Diagnosis and testing
research-article
Free
Change is hard: adapting dependency graph models for unified diagnosis in wired/wireless networks

Organizations world-wide are adopting wireless networks at an impressive rate, and a new industry has sprung up to provide tools to manage these networks. Unfortunately, these tools do not integrate cleanly with traditional wired network management ...

research-article
Free
Remote network labs: an on-demand network cloud for configuration testing

Network equipment is difficult to configure correctly. To minimize configuration errors, network administrators typically build a smaller scale test lab replicating the production network and test out their configuration changes before rolling out the ...

SESSION: Data center networks
research-article
Free
Diverter: a new approach to networking within virtualized infrastructures

As virtualized data-centres become the back-end platforms behind a new generation of utility and cloud computing infrastructures (such as AmazonAWS [1]) their multi-tenancy, scale and complexity introduce new challenges that especially affect the ...

research-article
Free
Why should we integrate services, servers, and networking in a data center?

Since the early days of networks, a basic principle has been that endpoints treat the network as a black box. An endpoint injects a packet with a destination address and the network delivers the packet. This principle has served us well, and allowed us ...

Contributors
  • Google LLC

Recommendations

About Cookies On This Site

We use cookies to ensure that we give you the best experience on our website.

Learn more

Got it!