Welcome to the first Workshop: Research on Enterprise Networking -- WREN 2009. We established this workshop to generate papers and discussion on research challenges and results specific to enterprise and data-center networks.
Enterprise networks (in large corporations, universities, government entities, etc.) use much of the same technology as the Internet, but otherwise differ in important and interesting ways. Also, net spending on enterprise network equipment is much larger than analogous spending by ISPs. However, most academic researchers have focussed on public networks such as the Internet. WREN, we hope, will help to broaden that focus.
We knew we were taking a risk in starting a new workshop, to be held outside the US, on a topic whose primary experts might be suffering from limited travel budgets (to put it mildly). Therefore, we did a lot of work to solicit papers (and, as program chair, I want to thank the WREN PC members for a lot of help contacting potential authors.) I am happy to report that we received more good submissions than we could accept.
We received 24 submissions from at least eight countries, and accepted 13 papers, including two from industry authors outside research labs. Most papers received five reviews, and the PC was generally quite impressed with the quality of the submissions; people are doing a lot of interesting enterprise-related network research, and we expect that this topic will become more visible in the future.
We present Flow-based Management Language (FML), a declarative policy language for managing the configuration of enterprise networks. FML was designed to replace the many disparate configuration mechanisms traditionally used to enforce policies within ...
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and systems that can cause incorrect behavior and slow response to attacks. We ...
Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be able to cope, the administrator ...
In this paper, we study the impact of today's IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to the uniform configuration of Host intrusion detection systems (HIDS) across all ...
As forwarding tables and link speeds continue to grow, fast packet forwarding becomes increasingly challenging for enterprise edge routers. Simply building routers with ever larger amounts of ever faster memory is not appealing, since high-speed memory ...
This paper describes a new architecture which addresses Quality of Service (QoS) by creating unique flows for applications, services, or subnets. A flow is a dedicated and independent path from the NIC hardware to the socket layer in which the QoS layer ...
IP multicast, after spending much of the last 20 years as the subject of research papers, protocol design efforts and limited experimental usage, is finally seeing significant deployment in production networks. The efficiency afforded by one-to-many ...
As data centers become more and more central in Internet communications, both research and operations communities have begun to explore how to better design and manage them. In this paper, we present a preliminary empirical study of end-to-end traffic ...
TCP Throughput Collapse, also known as Incast, is a pathological behavior of TCP that results in gross under-utilization of link capacity in certain many-to-one communication patterns. This phenomenon has been observed by others in distributed storage, ...
Organizations world-wide are adopting wireless networks at an impressive rate, and a new industry has sprung up to provide tools to manage these networks. Unfortunately, these tools do not integrate cleanly with traditional wired network management ...
Network equipment is difficult to configure correctly. To minimize configuration errors, network administrators typically build a smaller scale test lab replicating the production network and test out their configuration changes before rolling out the ...
As virtualized data-centres become the back-end platforms behind a new generation of utility and cloud computing infrastructures (such as AmazonAWS [1]) their multi-tenancy, scale and complexity introduce new challenges that especially affect the ...
Since the early days of networks, a basic principle has been that endpoints treat the network as a black box. An endpoint injects a packet with a destination address and the network delivers the packet. This principle has served us well, and allowed us ...