Christian Huitema | 1 Mar 18:21 2003
Picon

RE: [e2e] source code release

How is 4+4 in any way easier to deploy than 6to4?

________________________________

From: Zoltan Turanyi [mailto:zoltan <at> ee.columbia.edu]
Sent: Fri 2/28/2003 1:23 AM
To: end2end-interest <at> postel.org
Subject: [e2e] source code release

4+4 Open Source Code Release:

http://ipv44.comet.columbia.edu/

for the Linux implementation of 4+4 and tools. The source and i386
binaries are part of the release.

What is 4+4?

4+4 is an evolutionary approach to address space extension and IPng
deployment. 4+4 starts as a NAT-extended architecture that provides a way
back to unique, global, network layer host addresses - through its
deployment end-to-end transparency is restored.

There is no need to change routers. The transition process provides
incentives. The final state of the network is a homogeneous and
transparent Internet that uses 64-bit addresses and a packet format
similar to tunneling.

A paper on: "4+4: An Architecture for Evolving the Internet Address Space
Back Toward Transparency" that describes the design, implementation, and
(Continue reading)

Sugih Jamin | 1 Mar 14:10 2003
Picon

[e2e] CFP: NetGames 2003

                  CALL FOR PAPERS
                   NetGames 2003

                  May 22-23, 2003
           at Electronic Arts Headquarters,
              Redwood City, California.

       http://confman.eecs.umich.edu/netgames2003/

We invite papers about multi-player games, whether on 
network protocols to support gaming, architecture 
of infrastructural support for multi-player games,
or game designs to accommodate network vagaries.
We welcome submissions on multi-player games for 
the PCs, game consoles, or mobile devices.

Topics of interest include, but are not limited to: 

    Multi-player game architectures and platforms
    Prevention and detection of cheating
    Games on mobile and resource-scarce devices
    AI and techniques for latency hiding
    Modeling, usage studies, and characterization
    Enabling protocols for networked games 
    Systems support for authentication and accounting

Contributions:

Extended abstracts of technical papers, work-in-progress 
reports, position statements, and full-length papers of 
(Continue reading)

Tze Sing Eugene Ng | 1 Mar 04:55 2003
Picon

Re: [e2e] source code release

I wonder if you are aware of our work on AVES, which I believe is related
to your work. The AVES approach is to have intermediate waypoints to
handle the packet translations in order to connect IPv4, IPv6, and NAT
realm together in a transparent fashion without modifying end hosts.

http://www-2.cs.cmu.edu/~eugeneng/research/aves/

-Eugene

On Fri, 28 Feb 2003, Zoltan Turanyi wrote:

> 4+4 Open Source Code Release:
>
> http://ipv44.comet.columbia.edu/
>
> for the Linux implementation of 4+4 and tools. The source and i386
> binaries are part of the release.
>
> What is 4+4?
>
> 4+4 is an evolutionary approach to address space extension and IPng
> deployment. 4+4 starts as a NAT-extended architecture that provides a way
> back to unique, global, network layer host addresses - through its
> deployment end-to-end transparency is restored.
>
> There is no need to change routers. The transition process provides
> incentives. The final state of the network is a homogeneous and
> transparent Internet that uses 64-bit addresses and a packet format
> similar to tunneling.
>
(Continue reading)

Kalyan | 4 Mar 03:56 2003

[e2e] Inferring loss at Client-side on TCP

Hello,

I am a grad student working on developing a tool which should 
capture the loss based statistics at the client-side. The possible 
inputs to my tool are tcpdump traces.

Can anyone suggest some heuristics of identifying loss based on 
client-side tcpdump traces.

Thanks,
¬Kalyan C

Let Peace prevail.
"sarve janaaH sukhino bhavantu" - 'Happy living for all of the 
humanity'

David G. Andersen | 4 Mar 06:04 2003
Picon

Re: [e2e] Inferring loss at Client-side on TCP

On Tue, Mar 04, 2003 at 02:56:32AM -0000, Kalyan quacked:
> Hello,
> 
> I am a grad student working on developing a tool which should 
> capture the loss based statistics at the client-side. The possible 
> inputs to my tool are tcpdump traces.
> 
> Can anyone suggest some heuristics of identifying loss based on 
> client-side tcpdump traces.

Depends on the fidelity with which you want to identify them.  You
could always look for triple dup acks and assume whatever losses
you haven't seen.  Assuming you want something more accurate,
Crovella and Barford's Critical Path Discovery techniques would
seem a reasonable starting point.  They present an off-line algorithm
for matching TCP packets with the ACK that released them, which has
obvious application to identifying loss.  However, if your long-term
goal is to do this detection online, it may not be applicable.

  -Dave

--

-- 
work: dga <at> lcs.mit.edu                          me:  dga <at> pobox.com
      MIT Laboratory for Computer Science           http://www.angio.net/
      I do not accept unsolicited commercial email.  Do not spam me.

Saad Biaz | 4 Mar 09:11 2003
Picon

Re: [e2e] Inferring loss at Client-side on TCP

On 4 Mar 2003, Kalyan wrote:

> Hello,
>
> I am a grad student working on developing a tool which should
> capture the loss based statistics at the client-side. The possible
> inputs to my tool are tcpdump traces.
>
> Can anyone suggest some heuristics of identifying loss based on
> client-side tcpdump traces.

Act like any TCP client!!! Whenever you see up to 3 out of order packets,
you may conclude that you lost packets.

Peter Benko (ETH | 4 Mar 10:34 2003
Picon
Picon

Re: [e2e] Inferring loss at Client-side on TCP

Hi,

take a look at our paper:

P. Benko, A. Veres, "A Passive Method for Estimating End-to-End TCP Packet
Loss", Proc. IEEE Globecom 2002, Taipei, Taiwan

Abstract:
This paper presents a passive end-to-end loss
monitoring method, which relies on traffic monitoring at a core
or ingress router interface. The monitoring node captures the
packets of TCP connections generated by end-hosts. Based on
the seen sequence number pattern the loss ratios are estimated
for the two segments of end-to-end path divided by the monitor.
This feature is especially useful if the monitoring node is placed
at the border of an autonomous system, e.g., at the egress point
of an ISP. When applied to mobile Internet access, packet losses
on the radio interface can be distinguished from losses in the
core network or in the public Internet. The packet loss
estimation algorithm is rigorously validated using simulations
and testbed measurements. Additionally, measurement results
and an application example in a dial-up ISP are presented.

Best regards,

Peter

----- Original Message -----
From: Kalyan <kalyanramcvs <at> rediffmail.com>
To: <end2end-interest <at> postel.org>
(Continue reading)

Tim Moors | 3 Mar 22:28 2003
Picon
Picon

[e2e] CFP: 2003 IEEE Int'l Conf. on Networks - Sydney, Australia

               C A L L   F O R   P A P E R S
   ICON 2003: The 11th IEEE International Conference on Networks
      September 28 - October 1, 2003 Sydney, NSW, Australia
      http://www.ee.unsw.edu.au/~icon/ and www.icon2003.com

IMPORTANT DATES
Full papers and tutorial proposals due: March 21, 2003
Notification of acceptance: May 16, 2003
Final version of papers due: July 4, 2003
       Final overheads & handouts for tutorials due: August 15, 2003

The 11th IEEE International Conference on Networks (ICON 2003) will be
held in Sydney, Australia. ICON 2003 will provide a forum to discuss
recent innovations in computer networks and communications.  The
conference will consist of two days of tutorials followed by two days of
technical presentations.  A wireless networking workshop will also
precede ICON, with an emphasis on works in progress.

Contributions describing original research, surveys and applications are
solicited. Topics of interest include, but are not limited to, the
following areas: 
Ad hoc & sensor networks 
Addressing & location management  
Approaches for mobility & intermittent connectivity  
Bluetooth, 802.11, 802.15
Content distribution & web caching 
Label switching protocols
Layer interaction for mobile/wireless systems  
Location-dependent applications 
Low power & energy-efficient designs
(Continue reading)

mdis | 4 Mar 15:28 2003
Picon

[e2e] Call for Papers: Mobile Distributed Information Systems on HICSS37

CfP: HICSS-37 Minitrack on Mobile Distributed Information Systems

[Our sincere apologies if you receive multiple copies of this CfP]

=====================================================================

               CALL FOR PAPERS 

             HICSS-37 Minitrack on
      MOBILE DISTRIBUTED INFORMATION SYSTEMS

       Part of the Software Technology Track
            at the Thirty-seventh Annual 
    HAWAI'I INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES
              on the Big Island of Hawaii

                 January 5 - 8, 2004

---------------------------------------------------------------------

        Abstracts due:   March 31, 2003
        Full Papers due: June 1, 2003
        Website: http://www.ipsi.fraunhofer.de/mobile/hicss

=====================================================================

In today's mobile society, access to relevant information and to context-
specific services "anytime, anywhere" is becoming increasingly important.
Mobile users are often particularly interested in information about and 
services in their immediate vicinity, thus Mobile Distributed Information 
(Continue reading)

Kalyan | 4 Mar 21:12 2003

[e2e] Re: Inferring loss ...

Dave, Peter, Nandita, Alex and Saad,

Thanks for the input. Hope this gives me a good start.

Thanks,
¬Kalyan C

Let Peace prevail.
"sarve janaaH sukhino bhavantu" - 'Happy living for all of the
humanity'


Gmane