{"id":279735,"date":"2016-08-18T20:09:24","date_gmt":"2016-08-19T03:09:24","guid":{"rendered":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/?post_type=msr-event&#038;p=279735"},"modified":"2025-08-06T11:59:40","modified_gmt":"2025-08-06T18:59:40","slug":"edgenet-2006","status":"publish","type":"msr-event","link":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/event\/edgenet-2006\/","title":{"rendered":"EdgeNet 2006"},"content":{"rendered":"\n\n<p><strong>Venue:<\/strong> <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.salishlodge.com\/\">Salish Lodge & Spa<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<p><strong>Organizers:<\/strong> Victor Bahl, David A. Maltz, Ming Zhang<span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-279747 alignleft\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/eventpage.jpg\" alt=\"eventpage\" width=\"144\" height=\"144\" \/>This summit brings together experts in academia and industry to discuss the problems facing the designers and managers of enterprise networks. Also, for the first time, we will sponsor a number of graduate students to attend the summit as a way to encourage research in this area as well as to provide them an opportunity to get technical feedback on their ideas from some of thought leaders in this space.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-279744\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/edgenetlogo-logistics.gif\" alt=\"edgenetlogo-logistics\" width=\"532\" height=\"71\" \/><\/p>\n<h2>Life at the Edge: Research and Practice in Corporate\/Campus Networks<\/h2>\n<h3>Description<\/h3>\n<p>This summit brings together experts in academia and industry to discuss the problems facing the designers and managers of enterprise networks. Also, for the first time, we will sponsor a number of graduate students to attend the summit as a way to encourage research in this area as well as to provide them an opportunity to get technical feedback on their ideas from some of thought leaders in this space.<\/p>\n<p>The summit will be structured as an academic event &#8211; consisting of presentations, panel, and working group sessions as well as a poster and demo session. In our experience, this format allows for a high-degree of interactivity between participants as well as opportunities to dig deeply into specific topic areas.<\/p>\n<p>Among the goals of this summit is to produce:<\/p>\n<ul>\n<li>A list of the hard problems facing enterprise network IT staffs. We will take a stab at a research agenda that separates out the issues with near-term solutions from ones that require research or new approaches<\/li>\n<li>A description of the campus\/enterprise network scenarios that IT managers will have to support & build up over the next 3-5 years.<\/li>\n<li>A list of the distinguishing characteristics of enterprise networks<\/li>\n<\/ul>\n<p>Our hope is that, at the end of this meeting, all participants will have a much better understanding of the problems and will have made connections to other researchers and operators working on these issues.<\/p>\n<p>Although this summit is by invitation only, all presentations, position papers, and videos of talks and panels will be available for download on this web site shortly after the meeting is over.<\/p>\n<ul>\n<li>The 2005 summit was on Self-Managing Networks<\/li>\n<li>The 2004 summit was on Mesh Networks<\/li>\n<\/ul>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<h2>Thursday, June 1<\/h2>\n<ul>\n<li>08:00 &#8211; 8:30 <strong>Breakfast<\/strong> (Falls Terrace Room)<br \/>\nThe Salish mangers have requested that we use the external entrance to the Falls Terrace Room on Thursday, as there will be another group meeting in the Potlach room. If it is raining the valet will have umbrellas for our use.<\/li>\n<li>08:30 &#8211; 9:00 <strong>Welcome and Introductions<\/strong> (Salish Ballroom)<\/li>\n<li>09:00 &#8211; 10:00 <strong>Keynote<\/strong> (Salish Ballroom)<br \/>\nKiril Tatarinov, VP Microsoft Windows & Enterprise Management Division<br \/>\n<b>Model-Based Management of Distributed Services<\/b> | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/kirillt-keynote-edgenet.ppt\" target=\"_self\">slides<\/a> | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13573\/\">video<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<\/ul>\n<p style=\"padding-left: 30px\">Traditional systems management has not been successful, and with ever-increasing scale, complexity and agility the problem keeps getting worse. The central problem is a lack of knowledge of the managed systems: what they are like, and what they should be like. We need formalized knowledge, in the form of system models, that allow automated management of deployment, configuration, security and operations. This knowledge must be captured already during the development phase, with models and policies refined and adjusted during the system\u2019s life cycle. Microsoft\u2019s industry-wide Dynamic Systems Initiative is aimed at providing infrastructure and tools for model-based management.<\/p>\n<ul>\n<li>10:00 &#8211; 10:15 <strong><strong>Break<br \/>\n<\/strong><\/strong><\/li>\n<li>10:15 &#8211; 11:45 <strong>Issues in Enterprise Networks<\/strong> (Salish Ballroom)<br \/>\n&#8211; Operator View Points &#8211; discussion of enterprise\/campus networks from the people that run them. | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13574\/\">video<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\n&#8211; Panel organized by Ken Klingenstein | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/klingenstein-edgenet.ppt\" target=\"_self\">slides<\/a><br \/>\n&#8211; Panelists: Terry Gray | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/gray-edgenet.ppt\" target=\"_self\">slides<\/a>, Jim Pepin, Mark Poepping<\/li>\n<li>11:45 &#8211; 12:45 <strong>Buffet Lunch<\/strong> (Falls Terrace room)<\/li>\n<li>12:45 &#8211; 14:15 <strong>Measuring and Monitoring Network Performance<\/strong> (Salish Ballroom)<br \/>\nWhat do enterprise networks look like today, and what issues exist in monitoring them?<br \/>\n<em><br \/>\nSpeakers:<\/em><br \/>\n&#8211; Richard Mortier &#8211; <b>Measuring and Monitoring Microsoft\u2019s Enterprise Network<\/b> | see\u00a0<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/mortier-edgenet.ppt\" target=\"_self\">slides<\/a> | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13575\/\">video<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\n&#8211; David Kotz &#8211; <b>Wireless Network Measurement Challenges<\/b> | see\u00a0<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/kotz-edgenet.pdf\" target=\"_self\">slides<\/a> | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13576\/\">video<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\n&#8211; Chas DiFatta, Mark Poepping &#8211; <b>The Case for Comprehensive Diagnostics<\/b> | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/difatta-edgenet.pdf\" target=\"_self\">slides<\/a> | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13577\/\">video<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<li>14:15 &#8211; 14:30 <strong>Break<\/strong><br \/>\n14:30 &#8211; 15:45 <strong>Poster Session<\/strong> (Vintage Room)<br \/>\n&#8211; Posters and demos from students, researchers, and Microsoft architects<br \/>\n&#8211; Abstracts and pictures of the posters available on the abstracts tab<\/li>\n<li>15:45 &#8211; 17:15 <strong>Working Session: Discussion of Problems\/Directions<\/strong> (Salish Ballroom)<br \/>\nSession is intended to work towards the goals below. So that the breakout sessions capture the areas of interest\/excitement in the room, participants will suggest topics they want to lead a discussion on. Other participants will divide themselves among the topic leaders, and we will dynamically coalesce groups as needed. After discussions, which can extend into the evening, the group leader will make short presentation during the final session on Friday.<br \/>\n<em><br \/>\nGoals:<br \/>\n<\/em>&#8211; List hard problems facing enterprise network IT staffs, separating near-term issues from the ones that require research or new approaches.<br \/>\n&#8211; Describe scenarios campus\/enterprise IT managers will have to support & build over the next 3-5 years.<br \/>\n&#8211; Define distinguishing characteristics of enterprise networks<\/li>\n<li>17: 15 &#8211; 18:30 <strong>Enterprise Security and Policy<\/strong> (Salish Ballroom)<em>Speakers<br \/>\n<\/em>&#8211; Mark Ashida &#8211; <b>Customer Insight: CSO&#8217;s Perspective on Network Policies<\/b> | see\u00a0<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/ashida-edgenet.ppt\" target=\"_self\">slides<\/a> | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13578\/\">video<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\n&#8211; Martin Casado &#8211; <b>The Protection Problem in Enterprise Networks<\/b>| see\u00a0<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/casado-edgenet.ppt\" target=\"_self\">slides<\/a> | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13579\/\">video<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\n&#8211; Jitu Padhye &#8211; <b>Managing Corporate WiFi Networks Using DAIR<\/b> | see\u00a0<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/padhye-edgenet.ppt\" target=\"_self\">slides<\/a> | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13580\/\">video<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<li>18:30 &#8211; 19:30 <strong>Walk down to the falls<\/strong><\/li>\n<\/ul>\n<h2>Friday June 2<\/h2>\n<ul>\n<li>09:00 &#8211; 10:15 Network Architectures and Network Design (Salish Ballroom)<em>Speakers<br \/>\n<\/em>&#8211; David A. Maltz &#8211; <b>Problems and Solutions in Enterprise Network Control<\/b> | see\u00a0<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/maltz-edgenet.ppt\" target=\"_self\">slides<\/a> | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13581\/\">video<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\n&#8211; Aditya Akella &#8211; <b>New Directions in Enterprise Network Management<\/b> | see <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/akella-edgenet.ppt\" target=\"_self\">slides<\/a> | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13582\/\">video<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\n&#8211; Sharad Agarwal &#8211; <b>Is an Office Without Wires Feasible?<\/b> | see\u00a0<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13583\/\">video<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<li>10:15 &#8211; 10:30 <strong><strong>Break<\/strong><\/strong><\/li>\n<li>10:30 &#8211; 12:00 <strong>Services and Management<\/strong> (Salish Ballroom)<em>Speakers<\/em><br \/>\n&#8211; Tzi-cker Chiueh &#8211; <b>Virtual LAN as a Network Control Mechanism <\/b>| see <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/chiueh-edgenet.ppt\" target=\"_self\">slides<\/a> | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13584\/\">video<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\n&#8211; Ken Birman &#8211; <b>Pushing Group Communication to the Edge Will Enable Radically New Distributed Applications<\/b> | see\u00a0<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/birman-edgenet.ppt\" target=\"_self\">slides<\/a> | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13585\/\">video<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\n&#8211; Dinesh Verma &#8211; <b>Experiences Managing Networks in IBM HPC Grid Infrastructure and Enterprise VoIP<\/b> | see\u00a0<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13586\/\">video<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\n&#8211; Anders Vinberg &#8211; <b>A Data Model for Policy<\/b> | see\u00a0<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13587\/\">video<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<li>12:00 &#8211; 13:00 <strong>Lunch<\/strong> (Falls Terrace room)<\/li>\n<li>13:00 &#8211; 14:15 <strong>Diagnosis<\/strong> (Salish Ballroom)<em>Speakers<\/em><br \/>\n&#8211; Nick Feamster &#8211; <b>Campus and Personal Network Troubleshooting<\/b> | see <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/feamster-edgenet.ppt\" target=\"_self\">slides<\/a> | video<br \/>\n&#8211; Yin Zhang &#8211; <b>Experimental Design for Flexible Network Diagnosis<\/b> | see <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/yzhang-edgenet.ppt\" target=\"_self\">slides<\/a> | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13589\/\">video<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\n&#8211; Albert Greenberg &#8211; <b>Managing Data for Diagnosis<\/b> | see\u00a0<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/greenberg-edgenet.ppt\" target=\"_self\">slides<\/a><\/li>\n<li>14:15 &#8211; 16:00 <strong>Presentations of ideas from break out sessions and critiques<\/strong> (Salish Ballroom)<\/li>\n<\/ul>\n<p style=\"padding-left: 30px\">Each break out group will give a short presentation of their ideas. These presentations will be followed by comments from a critique panel whose panelists will describe their reactions to the ideas in the breakout presentations and the other sessions.<\/p>\n<p style=\"padding-left: 30px\"><em>Breakout session Reports:<br \/>\n<\/em>&#8211; Data Sharing and Repositories to Support Research | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/rao-data-sharing-breakout-report.ppt\" target=\"_self\">slides<\/a><br \/>\n&#8211; Isolation in Networks | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/birman-isolation-breakout-report.ppt\" target=\"_self\">slides<\/a><br \/>\n&#8211; Models in Management | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/verma-models-breakout-report.ppt\" target=\"_self\">slides<\/a><br \/>\n&#8211; Network Automation | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/feamster-automation-breakout-report.ppt\" target=\"_self\">slides<\/a><\/p>\n<p style=\"padding-left: 30px\">&#8211; Critique panelists<br \/>\n&#8211; Tom Anderson<br \/>\n&#8211; Fred Barker | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/baker-edgenet.ppt\" target=\"_self\">slides<\/a><\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<h2>Poster Abstracts<\/h2>\n<p>\t<div data-wp-context='{\"items\":[]}' data-wp-interactive=\"msr\/accordion\">\n\t\t\t\t\t<div class=\"clearfix\">\n\t\t\t\t<div\n\t\t\t\t\tclass=\"btn-group align-items-center mb-g float-sm-right\"\n\t\t\t\t\tdata-bi-aN=\"accordion-collapse-controls\"\n\t\t\t\t>\n\t\t\t\t\t<button\n\t\t\t\t\t\tclass=\"btn btn-link m-0\"\n\t\t\t\t\t\tdata-bi-cN=\"Expand all\"\n\t\t\t\t\t\tdata-wp-bind--aria-controls=\"state.ariaControls\"\n\t\t\t\t\t\tdata-wp-bind--aria-expanded=\"state.ariaExpanded\"\n\t\t\t\t\t\tdata-wp-bind--disabled=\"state.isAllExpanded\"\n\t\t\t\t\t\tdata-wp-class--inactive=\"state.isAllExpanded\"\n\t\t\t\t\t\tdata-wp-on--click=\"actions.onExpandAll\"\n\t\t\t\t\t\ttype=\"button\"\n\t\t\t\t\t>\n\t\t\t\t\t\tExpand all\t\t\t\t\t<\/button>\n\t\t\t\t\t<span aria-hidden=\"true\"> | <\/span>\n\t\t\t\t\t<button\n\t\t\t\t\t\tclass=\"btn btn-link m-0\"\n\t\t\t\t\t\tdata-bi-cN=\"Collapse all\"\n\t\t\t\t\t\tdata-wp-bind--aria-controls=\"state.ariaControls\"\n\t\t\t\t\t\tdata-wp-bind--aria-expanded=\"state.ariaExpanded\"\n\t\t\t\t\t\tdata-wp-bind--disabled=\"state.isAllCollapsed\"\n\t\t\t\t\t\tdata-wp-class--inactive=\"state.isAllCollapsed\"\n\t\t\t\t\t\tdata-wp-on--click=\"actions.onCollapseAll\"\n\t\t\t\t\t\ttype=\"button\"\n\t\t\t\t\t>\n\t\t\t\t\t\tCollapse all\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<ul class=\"msr-accordion\">\n\t\t\t\t\t\t\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4048\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4048\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4047\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tYu-Chung Cheng\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4047\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4048\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><b>Jigsaw: Solving the Puzzle of Enterprise 802.11 Analysis<\/b><\/p>\n<p>The combination of unlicensed spectrum, cheap wireless interfaces and the inherent convenience of untethered computing has made 802.11-based networks ubiquitous in the enterprise. Modern universities, corporate campuses and government offices routinely deploy scores of access points to blanket their sites with wireless Internet access. However, while the fine-grained behavior of the 802.11 protocol itself has been well studied, our understanding of how large 802.11 networks behave in their full empirical complexity is surprisingly limited. In this paper, we present a system called Jigsaw that uses multiple monitors to provide a single unified view of all physical, link, network and transport-layer activity on an 802.11 network. To drive this analysis, we have deployed an infrastructure of over 170 radio monitors that simultaneously capture all 802.11b and 802.11g activity in a large university building (1M+ cubic feet). We describe the challenges posed by both the scale and ambiguity inherent in such an architecture, and explain the algorithms and inference techniques we developed to address them.<\/p>\n<p>So far, we have used Jigsaw&#8217;s global cross layer viewpoint to resolve wireless problem tickets and isolate performance artifacts , both explicit, such as management inefficiencies, and implicit, such as co-channel interference. Surprisingly many wireless problems involve the wired infrastructure such as DoS attacks by mis-behaving clients. Others include microwave interferences, slow 802.11 roaming, access points bugs, etc. We believe this is the first analysis combining this scale and level of detail for a real production network.<\/p>\n<p>More at <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/wireless.ucsdsys.net\">http:\/\/wireless.ucsdsys.net<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4050\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4050\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4049\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tRanveer Chandra, Venkat Padmanabhan, Ming Zhang\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4049\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4050\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><b>WiFiProfiler: Cooperative Diagnosis in Wireless LANs <\/b><\/p>\n<p>While 802.11-based wireless hotspots are proliferating, users often have little recourse when the network does not work or performs poorly for them. They are left trying to manually debug the problem, which can be a frustrating and disruptive process. The users&#8217; troubles are compounded by the absence of network administrators or an IT department to turn to in many 802.11 hotspot settings (e.g., cafes, airports, conferences).<\/p>\n<p>We present WiFiProfiler, a system in which wireless hosts cooperate to diagnose and possibly resolve network problems in an automated manner, without requiring any infrastructural support. The key observation is that even if a host&#8217;s wireless link to an access point is not working, the host is often within the range of other wireless nodes and is in a position to communicate with them (a little) peer-to-peer. We leverage this ability to create a shared information plane, which enables wireless hosts to exchange a range of information about their network settings and the health of their network connectivity. By aggregating and correlating such information across multiple wireless hosts, we infer the likely cause of the problem. Our implementation on Windows XP shows that WiFiProfiler is effective in diagnosing a range of problems and imposes a low overhead on the participating hosts.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4052\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4052\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4051\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tDave Thaler, Tin Qian\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4051\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4052\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><b>Network Diagnostics in Windows Vista<\/b><\/p>\n<p>Computer networking has become increasingly important and pervasive in people\u2019s daily life. On the other hand, the networks are getting more and more complex in terms of the size and topology, the mix of technology involved, and the number of applications\/services supported. How to make networking a reliable and painless experience for 300+ million windows users has become a pressing yet extremely challenging task. Windows Vista introduces an innovative network diagnostics framework that provides an extensible diagnostics platform aiming at helping non-technical windows users\u2019 trouble shooting network problems in an intuitive and interactive fashion. It defines a general trouble shooting programming model for integrates various trouble-shooting logics for different network components. To support a simple and intuitive user experience, it focuses on in-context diagnosis where the trouble-shooting process is done interactively within the context of user\u2019s network usage. Moreover, computer networking is an area where rapid technology advancement is being made constantly. To effectively cope with the ever changing network issues, the network diagnostics framework in Vista incorporates a full feedback mechanism via SQM\/WER to help quickly identifying and responding to new top network pain areas. Its built-in extensibility model also enable 3rd IHVs\/ISVs to provide trouble-shooting value-adds seamlessly to the windows diagnostics experience.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4054\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4054\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4053\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tHitesh Ballani, Paul Francis\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4053\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4054\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><b>CONMan: Taking the complexity out of Network Management<\/b><\/p>\n<p>Network management is difficult, costly, and error prone, and this is becoming more so as the network complexity increases. We argue that this is an outcome of two fundamental \ufb02aws in the existing architecture: the management plane depends on the data plane and the complexity of the ever-evolving data plane en- cumbers the management plane. Consequently, addressing these flaws can make the network amenable to management.<\/p>\n<p>We present Complexity Oblivious Network Management (CONMan), a network architecture in which the management plane does not depend on the data plane and all data plane protocols expose a generic management interface. This restricts the operational complexity of protocols to their implementation and allows the management plane to achieve high level policies in a structured fashion. Our preliminary experience with building the CONMan interface of a couple of protocols and using them for real world management tasks indicates the architecture\u2019s potential to alleviate the management troubles of the Internet.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4056\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4056\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4055\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tEric Rozner, Yogita Mehta, Aditya Akella, Lili Qiu\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4055\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4056\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><b>Traffic-Aware Channel Assignment in Wireless LANs<\/b><\/p>\n<p>The importance of channel assignment in wireless LANs has been long recognized and has attracted significant research attention. Despite much recent progress, several important challenges still remain: First, what is the right &#8220;performance metric&#8221; to optimize for? Most existing approaches to channel assignment try to minimize the number of mutually-interfering APs. However it is not clear if this metric accurately reflects client performance. Second, to what extent is the quality of channel assignment improved by incorporating the observed traffic demands at APs and clients? Recent work in IP traffic engineering has shed light on the tremendous effectiveness of using traffic demands in network engineering decisions. However, to date, no approach to channel assignment has taken traffic demands into account.<\/p>\n<p>In this work, we conduct simulations over publicly-available wireless traffic traces, to study the relative efficacy of different optimization metrics in tracking client performance. We show that being &#8220;traffic-aware&#8221; could substantially improve the overall quality of a channel assignment, irrespective of the metric employed. We also examine the effect of incomplete traffic information on the quality of a channel assignment. Finally, we develop and evaluate a preliminary set of practical traffic-aware assignment algorithms that predict future demands based on historical information and use the predicted demands for assigning channels.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4058\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4058\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4057\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tHemant Rokesh, Hui Zhang\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4057\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4058\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><b>4D on NetFPGA<\/b><\/p>\n<p>The project aims to demonstrate how 4D can be used to effectively manage data networks. The low cost NetFPGA platform is used to build an experimental network that is configured, controlled and managed as per the 4D architecture.<\/p>\n<p>The 4D architecture is a clean slate approach to network control. It is guided by the following three principles: Network-level objectives, network-wide views, direct control. 4D realizes these principles by decomposing the functions of network control into 4 planes. A decision plane that is responsible for creating a network configuration (e.g. computing FIBs for each router in the network); a dissemination plane that gathers information about network state (e.g. link up\/down information) to the decision plane, and distributes decision plane output to routers; a discovery plane that enables devices to discover their directly connected neighbors; and a data plane for forwarding network traffic.<\/p>\n<p>In this project we want to explore the practical difficulties and implementation specific challenges that arise in using 4D to control real network devices. A few aspects we are interested in looking into are-(a.) How quickly does 4D react to link and device failures in practice(b.) Can 4D implement advanced functionalities (like FRR, VLANs) in the data-plane when traffic is injected at full line-rate(c.) How effective is 4D in controlling heterogeneous (IP plus Ethernet)(d.) Is the 4D architecture\/interfaces simple enough to be implemented on low-cost memory constrained switches?For addressing these issues, we wish to build and deploy the 4D NetFPGA infrastructure in a real network like a data-center.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4060\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4060\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4059\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tRatul Mahajan\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4059\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4060\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><b>Wit: Analyzing the MAC-level Behavior of Wireless Networks in the Wild<\/b><\/p>\n<p>Wit is a tool to understand the detailed MAC-level behavior of wireless networks. It takes as input data that is acquired only through passive sniffing, and so can be used to evaluate live systems. Wit is based on several novel techniques. A robust merging technology combines the inevitably incomplete views of individual sniffers into a single, more complete trace of wireless activity. An inference engine based on formal language methods fills in still missing packets and annotates each packet with information, such as whether it was received by its intended recipient. This annotated data enables several new kinds of analyses. We have devised, for instance, a technique to estimate the number of stations competing for the medium at each moment.<\/p>\n<p>We have used Wit over multi-sniffer traces collected at a well-attended academic conference to understand how 802.11 performs in such deployments. We uncovered several MAC-layer characteristics, which to our knowledge, cannot be inferred using other currently available techniques. We find transmissions from clients to APs were usually more reliable than those in the other direction. The network was dominated by periods of low contention even during busy periods of the day. The medium utilization was highly inefficient in the common case of low contention, but network performance did not degrade during periods of high contention.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4062\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4062\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4061\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tChanghoon Kim, Jennifer Rexford\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4061\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4062\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><b>Joint Analysis of Layer-2 and Layer-3 Configuration in Enterprise Networks <\/b><\/p>\n<p>Managing enterprise networks is challenging because of the complex interaction between IP and the underlying layer-2 technologies. For example, many enterprises make heavy use of virtual LANs (VLANs) to contain broadcast traffic and apply access-control policies. A single VLAN may span multiple physical links, and a single physical link may carry traffic for multiple VLANs, making it difficult to study an individual VLAN or link in isolation. In addition, middleboxes, such as firewalls and traffic shapers, may transparently drop or delay traffic based on fields in the IP packet header, which can blur the symptoms and origins of a problem. Understanding both the layer-2 and layer-3 configuration of an enterprise network is crucial for detecting, diagnosing, and fixing performance and reachability problems.<\/p>\n<p>Despite years of research on inferring network topologies and diagnosing performance problems in backbone networks, the unique challenges introduced by layer-2 technologies in enterprise networks have received limited attention. The goal of our research is to create techniques for diagnosing cross-layer problems in enterprise networks. Initially, we focus on &#8220;white-box&#8221; approaches where we jointly analyze the configuration of layer-2 devices (such as switches and middleboxes) and the routers in operational networks. First, we plan to characterize the use of VLANs in several operational networks, using the Princeton campus network and our department&#8217;s network as a starting point. Moving beyond characterization, we hope to create analysis techniques for identifying configuration mistakes and inefficient mappings between the layer-3 and layer-2 topologies. Then, we plan to join the configuration data with traffic and performance measurements to guide the detection and diagnosis of problems.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4064\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4064\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4063\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tPaul Barham, Moises Goldszmidt, Rebecca Isaacs, John MacCormick, Richard Mortier\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4063\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4064\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><b>Constellation: an Application-level Traceroute<\/b><\/p>\n<p>Constellation is an infrastructure for distributed anomaly detection and diagnosis. Each host in the constellation constructs a probabilistic model of its own traffic using annotated packet arrival and departure times. When the user, or their agent, notices that something is wrong, the local host performs self-diagnosis before propagating the diagnosis request to its set of \u201clikely suspects\u201d, who in turn repeat the process. This packet-level approach allows detailed inter-service temporal relationships to be captured in the model \u2013 for example, the dependency of an email service on an authentication service. Constellation is early work that explores some novel machine learning techniques, and applies them to packet traces containing real-world inter-service dependencies from Microsoft\u2019s corporate network.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4066\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4066\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4065\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tAjay Mahimkar, Jasraj Dange, Vitaly Shmatikov, Harrick M. Vin, Yin Zhang\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4065\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4066\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><b>Transparent Network-based DoS Mitigation<\/b><\/p>\n<p>Denial of service (DoS) attacks are a growing threat to the availability of Internet services. We present dFence, a novel DoS mitigation system that is completely transparent to the existing Internet infrastructure and requires no software modification at either routers, or end hosts. The core of dFence is a coalition of network-based, on-demand middleboxes. Middleboxes are introduced into the data path dynamically and transparently via standard intra-ISP routing mechanisms, intercept both directions of IP traffic (to and from attacked hosts), and apply stateful policies to mitigate a broad range of spoofed and unspoofed attacks. We describe the architecture of the middlebox, including defenses against DoS attacks on the middlebox itself, as well as on-demand introduction and removal mechanisms. The implementation is evaluated using a prototype testbed based on Intel IXP network processors.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<\/p>\n<h2>Talk Abstracts<\/h2>\n<p>\t<div data-wp-context='{\"items\":[]}' data-wp-interactive=\"msr\/accordion\">\n\t\t\t\t\t<div class=\"clearfix\">\n\t\t\t\t<div\n\t\t\t\t\tclass=\"btn-group align-items-center mb-g float-sm-right\"\n\t\t\t\t\tdata-bi-aN=\"accordion-collapse-controls\"\n\t\t\t\t>\n\t\t\t\t\t<button\n\t\t\t\t\t\tclass=\"btn btn-link m-0\"\n\t\t\t\t\t\tdata-bi-cN=\"Expand all\"\n\t\t\t\t\t\tdata-wp-bind--aria-controls=\"state.ariaControls\"\n\t\t\t\t\t\tdata-wp-bind--aria-expanded=\"state.ariaExpanded\"\n\t\t\t\t\t\tdata-wp-bind--disabled=\"state.isAllExpanded\"\n\t\t\t\t\t\tdata-wp-class--inactive=\"state.isAllExpanded\"\n\t\t\t\t\t\tdata-wp-on--click=\"actions.onExpandAll\"\n\t\t\t\t\t\ttype=\"button\"\n\t\t\t\t\t>\n\t\t\t\t\t\tExpand all\t\t\t\t\t<\/button>\n\t\t\t\t\t<span aria-hidden=\"true\"> | <\/span>\n\t\t\t\t\t<button\n\t\t\t\t\t\tclass=\"btn btn-link m-0\"\n\t\t\t\t\t\tdata-bi-cN=\"Collapse all\"\n\t\t\t\t\t\tdata-wp-bind--aria-controls=\"state.ariaControls\"\n\t\t\t\t\t\tdata-wp-bind--aria-expanded=\"state.ariaExpanded\"\n\t\t\t\t\t\tdata-wp-bind--disabled=\"state.isAllCollapsed\"\n\t\t\t\t\t\tdata-wp-class--inactive=\"state.isAllCollapsed\"\n\t\t\t\t\t\tdata-wp-on--click=\"actions.onCollapseAll\"\n\t\t\t\t\t\ttype=\"button\"\n\t\t\t\t\t>\n\t\t\t\t\t\tCollapse all\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<ul class=\"msr-accordion\">\n\t\t\t\t\t\t\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4068\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4068\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4067\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tMeasuring and Monitoring Enterprise Networks\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4067\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4068\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p>Chas DiFatta, Mark Poepping &#8211; <b>The Case for Comprehensive Diagnostics<\/b><\/p>\n<p>The Internet has achieved great creative success, opening our eyes to radically new communication capabilities and distributed control opportunities. Yet for all the critical and commercial success of the past twenty years, we remain essentially unable to quantify or trace the actions of services and devices on the network. The Internet is a maelstrom of packets and protocols, an infrastructure built to speed it all along to quick completion, but constructed without detailed measures, without consistency of metrics or traces, with no visibility into how it&#8217;s operating.<\/p>\n<p>When there is a perceived problem with an application or supported service, a diagnostician must have the tools and information at their disposal to pinpoint the problem with reasonable certainty, in hopes of avoiding the problem in the future.<\/p>\n<p>We propose creating a new capability, one to collect, manage, and correlate log and diagnostic event information to not only enable investigation of problems, but that can also support validation of correct operation in complex networked systems. If realized, the resulting capabilities will provide the visibility to understand, control and validate essential operation in the computing environments we increasingly rely upon.<\/p>\n<hr \/>\n<p>Richard Mortier &#8211; <b>Measuring and Monitoring Microsoft\u2019s Enterprise Network<\/b><\/p>\n<p>In this talk I will describe some recent work at MSR Cambridge to measure Microsoft&#8217;s enterprise network as seen from our site. I will describe our collection method, the problems we faced, and the solutions we implemented. I will describe the data we collected, totalling 13TB of network traffic, to give a flavour of the traffic on our enterprise network in aggregate, per-application and per-host. Finally, I will use OSPF data to outline the topological properties of the network in which our site resides. In summary, we find that there is extreme volatility in application traffic both temporally and spatially (i.e. over time and between hosts); the application mix is significantly different to prior studies of Internet backbone traffic and university campus traffic; and the network is quite stable. This was joint work with Rebecca Isaacs and Dinan Gunawardena, with additional analysis from Laurent Massoulie and Peter Key.<\/p>\n<hr \/>\n<p>David Kotz &#8211; <b>Wireless Network Measurement Challenges<\/b><\/p>\n<p>Wireless networks, including Wi-Fi infrastructure and mesh networks, are becoming ubiquitous. It is critical to measure these networks to gain a better understanding of the traffic on the networks, the way they are used, and the response of the networks to different traffic patterns. It is also important to monitor operational wireless networks to improve security, capacity planning, and trouble shooting. Wireless networks pose unique challenges to measurement, however. In this talk I survey some of these challenges and describe some of the efforts underway to improve our ability to measure and monitor operational wireless networks.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4070\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4070\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4069\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tEnterprise Security and Policy\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4069\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4070\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p>Mark Ashida &#8211; <b>Customer Insight: CSO&#8217;s Perspective on Network Policies <\/b><\/p>\n<p>Martin Casado &#8211; <b>The Protection Problem in Enterprise Networks<\/b><\/p>\n<p>Attempts to retrofit access controls into enterprise networks have met with varied success. Often doing so has a deleterious effect, resulting in complex, brittle networks that are engineered around choke-points. In this talk, I will discuss what protection properties are desired by enterprise environments today, how existing solutions that try to approximate them fall short, and how those solutions often have negative, unintended consequences.<\/p>\n<hr \/>\n<p>Jitu Padhye &#8211; <b>Managing Corporate WiFi Networks Using DAIR<\/b><\/p>\n<p>We present a framework for monitoring and managing enterprise wireless networks using desktop infrastructure. The framework is called DAIR, which is short for Dense Array of Inexpensive Radios.<\/p>\n<p>Prior proposals in this area include monitoring the network via a combination of access points (APs), mobile clients, and dedicated sensor nodes. We show that a dense deployment of sensors is necessary to effectively monitor Wi-Fi networks, and one can not accomplish this using access points alone. An ordinary, single-radio AP can not monitor multiple channels effectively, without adversely impacting the associated clients. Moreover, we show that a typical deployment of access points is not sufficiently dense for several management tasks, particularly those related to security. Due to power constrain mobile devices can provide only limited assistance in monitoring wireless networks. Deploying a dense array of dedicated sensor nodes is an expensive proposition.<\/p>\n<p>Our solution is based on two simple observations. First, in most enterprise environments, one finds plenty of desktop machines with good wired connectivity, and spare CPU and disk resources. Second, inexpensive USB-based wireless adapters are commonly available. By attaching these adapters to desktop machines, and dedicating the adapters to the task of monitoring the wireless network, we create a low cost management infrastructure.<\/p>\n<p>We describe how several common wireless network management tasks can use the DAIR platform. As a demonstrative example, we consider the task of detecting rogue APs, and describe how the DAIR platform can be leveraged to carry out this task effectively.<\/p>\n<hr \/>\n<p>Antonio Nucci &#8211; <b>How to Build a Carrier-Grade Defense-Shield<\/b><\/p>\n<p><i>Dr. Nucci will be unable to attend due to a family emergency<\/i><\/p>\n<p>In this talk, Dr. Antonio Nucci, Chief Technology Officer at Narus Inc, will highlight the major shifts in the security market over the past few years, discuss the dynamics of the security threats and the emerging interest of Internet Service Providers to play a key role in this market. He will then introduce the requirements of this new emerging type of security and present a new preventative technology based on Information Entropy, also known as Carrier-Class Defense-Shield, that will help large high-speed ISP to efficiently defend their network perimeters from the most invasive and deadly threads.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4072\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4072\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4071\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tNetwork Architectures and Network Design\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4071\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4072\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p>David A. Maltz &#8211; <b>Problems and Solutions in Enterprise Network Control<\/b><\/p>\n<p>Enterprise networks today are fundamentally complex, as they bring together a heterogeneous collection of hosts and network devices, ranging from security cameras, to Ethernet switches, to IP routers, to storage networks. The designers of these networks are often called upon to implement sophisticated policies for reasons of security, load balancing, or reliability. This talk will give an overview of the problem space and describe an architectural change that aims to improve the manageability of enterprise networks by eliminating much of the complexity.<\/p>\n<hr \/>\n<p>Aditya Akella &#8211; <b>New Directions in Enterprise Network Management<\/b><\/p>\n<p>In this talk, we will review current and past techniques for managing and trouble-shooting enterprise networks, and their drawbacks and limitations. Furthermore, we will review initial ideas for an alternate Layer-2 architecture for connectivity and communication in enterprise networks that vastly simplifies management tasks.<\/p>\n<hr \/>\n<p>Sharad Agarwal &#8211; <b>Is an Office Without Wires Feasible?<\/b><\/p>\n<p>A wireless office is an office without wired Ethernet connectivity, or rather, one with the least number of machines connected by wires. What happens if we re-design the network in an office \u2013 remove all the network infrastructure (wireless APs, switches, routers, etc.), replace the Ethernet wires to every desktop and server with IEEE 802.11, and maintain a very small number of \u201cgateway\u201d machines for access to the wired corporate intranet and the Internet?<\/p>\n<p>We evaluated the feasibility of a mesh network for an all-wireless office using traces of 11 office users spanning over a month and an actual 21-node multi-radio mesh testbed in an office area. Unlike previous mesh studies that have examined routing design in detail, we examine how different office mesh design choices impact the performance of user traffic. We find that the performance on our mesh network depends on the combination of routing metric, user-server placement, traffic load, wireless hardware and wireless settings. While clearly it is possible to overwhelm typical wireless networks, we conclude that for our traces and deployed system, all-wireless office meshes are feasible. In most cases, individual transactions incur under 20ms of additional delay over the mesh network. We believe this is an acceptable delay for most applications where a wired network to every machine is not readily available. We argue that our results are scalable to a network of over 100 users.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4074\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4074\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4073\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tServices and Management\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4073\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4074\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p>Ken Birman &#8211; <b>Pushing Group Communication to the Edge will Enable Radically New Distributed Applications<\/b><\/p>\n<p>Advances in scalable group communication, fusing classical group communication protocols with new P2P ideas, are about to transform communication options for application developers. Modern platforms make it easy to implement group communication at the same layer where we support remote method invocation. Thus, we\u2019ll suddenly be in a position to present groups to users as shared live files (or other kinds of objects), publish-subscribe topics, or even distributed shared memory. Supporting the abstraction with solutions that scale well, are robust under stress, and that can be secured will enable arevolutionary advances for a tremendous range of applications that have been bogged down by the highly restrictive communication options available today. Cornell University\u2019s Quicksilver platform, developed by PhD student Krzys Ostrowski, will soon be available for download from <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.cs.cornell.edu\/projects\/quicksilver\/\">http:\/\/www.cs.cornell.edu\/projects\/quicksilver\/<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>.<\/p>\n<hr \/>\n<p>Tzi-cker Chiueh &#8211; <b>Virtual LAN as a Network Control Mechanism<\/b><\/p>\n<p>Modern Ethernet switches, even low-end ones, come with various advanced features such as IGMP snooping, VLAN, class-based traffic prioritization, host access control, etc. Most of these features can be configured either through standard SNMP commands or through normal packets. Although these features were originally designed for network provisioning at deployment time, there is no reason why they could not be used as dynamic control mechanisms at run time. In the past several years, we have been trying to leverage one of these features, VLAN, as a network resource management primitive, and apply it toMetro ethernets, storage area networks, and cluster interconnects. This talk will describe the important ideas in these efforts.<\/p>\n<hr \/>\n<p>Dinesh Verma &#8211; <b>Experiences Managing Networks in IBM HPC Grid Infrastructure and Enterprise VoIP<\/b><\/p>\n<p>In this talk, we will discuss the problems and issues that were encountered in managing the network infrastructure for High Performance Computing infrastructure centers that were established as a part of the IBM on Demand and Grid Computing initiatives. We would identify the problems that were encountered in managing and automating the management infrastructure of the network. We would also discuss the experiences gained from the management of VoIP infrastructure as it was rolled out in the IBM Research intranet, and some of the challenges encountered in managing the VoIP infrastructure as it is operational today.<\/p>\n<hr \/>\n<p>Anders Vinberg &#8211; <b>A Data Model for Policy<\/b><\/p>\n<p>Policy is the foundation for self-managing systems, IT control and governance\/compliance monitoring. How do we design a policy language, or policy schema, that is rich enough to be useful but simple enough to be amenable to analysis? How do we validate that policy matches intent, how do we understand how policies interact, how do we understand impact of a policy change?<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4076\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4076\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4075\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tDiagnosis\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4075\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4076\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p>Nick Feamster &#8211; <b>Troubleshooting Campus Networks<\/b><\/p>\n<p>This talk presents an overview of the problems we are tackling in helping network operators debug firewall, switch, and router configurations on a large campus network. Today, campus network operators have a preliminary set of tools to help them spot potential inconsistencies and errors, but they have no recourse when the actual network behavior is inconsistent with the behavior suggested by static configuration analysis. We present some examples of configuration challenges faced by campus network operators, propose possible roles for static and dynamic analysis for fault detection and troubleshooting, and describe some preliminary experience using a deployed active monitoring system on a major research and administrative network with 60,000 nodes, 160 buildings across 4 campuses, and 130 firewalls.<\/p>\n<hr \/>\n<p>Yin Zhang &#8211; <b>Experimental Design for Flexible Network Diagnosis<\/b><\/p>\n<p>Albert Greenberg &#8211; <b>Managing Data for Diagnosis<\/b><\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<p>\t<div data-wp-context='{\"items\":[]}' data-wp-interactive=\"msr\/accordion\">\n\t\t\t\t\t<div class=\"clearfix\">\n\t\t\t\t<div\n\t\t\t\t\tclass=\"btn-group align-items-center mb-g float-sm-right\"\n\t\t\t\t\tdata-bi-aN=\"accordion-collapse-controls\"\n\t\t\t\t>\n\t\t\t\t\t<button\n\t\t\t\t\t\tclass=\"btn btn-link m-0\"\n\t\t\t\t\t\tdata-bi-cN=\"Expand all\"\n\t\t\t\t\t\tdata-wp-bind--aria-controls=\"state.ariaControls\"\n\t\t\t\t\t\tdata-wp-bind--aria-expanded=\"state.ariaExpanded\"\n\t\t\t\t\t\tdata-wp-bind--disabled=\"state.isAllExpanded\"\n\t\t\t\t\t\tdata-wp-class--inactive=\"state.isAllExpanded\"\n\t\t\t\t\t\tdata-wp-on--click=\"actions.onExpandAll\"\n\t\t\t\t\t\ttype=\"button\"\n\t\t\t\t\t>\n\t\t\t\t\t\tExpand all\t\t\t\t\t<\/button>\n\t\t\t\t\t<span aria-hidden=\"true\"> | <\/span>\n\t\t\t\t\t<button\n\t\t\t\t\t\tclass=\"btn btn-link m-0\"\n\t\t\t\t\t\tdata-bi-cN=\"Collapse all\"\n\t\t\t\t\t\tdata-wp-bind--aria-controls=\"state.ariaControls\"\n\t\t\t\t\t\tdata-wp-bind--aria-expanded=\"state.ariaExpanded\"\n\t\t\t\t\t\tdata-wp-bind--disabled=\"state.isAllCollapsed\"\n\t\t\t\t\t\tdata-wp-class--inactive=\"state.isAllCollapsed\"\n\t\t\t\t\t\tdata-wp-on--click=\"actions.onCollapseAll\"\n\t\t\t\t\t\ttype=\"button\"\n\t\t\t\t\t>\n\t\t\t\t\t\tCollapse all\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<ul class=\"msr-accordion\">\n\t\t\t\t\t\t\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4078\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4078\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4077\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tAcademia\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4077\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4078\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<ul>\n<li>Aditya Akella University of Wisconsin, Madison<\/li>\n<li>Tom Andersen University of Washington<\/li>\n<li>Suman Banerjee University of Wisconsin, Madison<\/li>\n<li>Kenneth Birman Cornell University<\/li>\n<li>Tzi-cker Chiueh StonyBrook University<\/li>\n<li>Chas DiFatta Carnegie Mellon University\/PI Project EDDY<\/li>\n<li>Nicholas Feamster Georgia Tech<\/li>\n<li>Paul Francis Cornell University<\/li>\n<li>Terry Gray University of Washington \/ VP IT Infrastructure<\/li>\n<li>Dina Katabi MIT<\/li>\n<li>Kenneth Klingenstein University of Colorado \/ Chief Technologist<\/li>\n<li>David F. Kotz Dartmouth College<\/li>\n<li>James Pepin USC \/ CTO<\/li>\n<li>Mark G. Poepping Carnegie Mellon University\/Internet2\/Director of Network Architecture<\/li>\n<li>Sanjay Rao Purdue University<\/li>\n<li>Hui Zhang Carnegie Mellon University<\/li>\n<li>Yin Zhang UT Austin<\/li>\n<\/ul>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4080\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4080\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4079\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tIndustry\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4079\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4080\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<ul>\n<li>Fred Baker Cisco<\/li>\n<li>Albert Greenberg AT&T<\/li>\n<li>Graham Holmes Cisco<\/li>\n<li>Antonio Nucci Narus \/ CTO<\/li>\n<li>Nina Taft Intel Research Dinesh Verma IBM<\/li>\n<\/ul>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4082\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4082\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4081\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tMicrosoft Research\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4081\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4082\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<ul>\n<li>Sharad Agarwal Researcher<\/li>\n<li>Victor Bahl Principal Researcher<\/li>\n<li>Ranveer Chandra Researcher<\/li>\n<li>Sailesh Chutani Director, External Research Program<\/li>\n<li>Rich Draves Systems and Networking Research Area Manager<\/li>\n<li>Rebecca Isaacs Researcher (Cambridge)<\/li>\n<li>Jim Kajiya General Manager<\/li>\n<li>Dan Ling Vice President<\/li>\n<li>Ratual Mahajan Researcher<\/li>\n<li>Dave Maltz Researcher<\/li>\n<li>Richard Mortier Researcher (Cambridge)<\/li>\n<li>Geoffry Nordlund Sr Systems Analyst<\/li>\n<li>Jitu Padhye Researcher<\/li>\n<li>Venkat Padmanabhan Senior Researcher<\/li>\n<li>Rick Rashid Senior Vice President<\/li>\n<li>Stewart Tansley Program Manager<\/li>\n<li>Alec Wolman Researcher<\/li>\n<li>Ming Zhang Researcher<\/li>\n<li>Brian Zill Research Software Development Engineer<\/li>\n<\/ul>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4084\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4084\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4083\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tMicrosoft Research Interns and Graduate Students\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4083\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4084\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<ul>\n<li>Francisco Alvarez ITESM<\/li>\n<li>Hitesh Ballani Cornell University<\/li>\n<li>Martin Casado Stanford University<\/li>\n<li>Yu-Chung Cheng UCSD<\/li>\n<li>Tulika Garg IIT<\/li>\n<li>Hemant Rokesh Gogineni Carnegie Mellon University<\/li>\n<li>Srikanth Kandula MIT<\/li>\n<li>Changhoon Kim Princeton University<\/li>\n<li>Lun Li Caltech<\/li>\n<li>Ajay Mahimkar UT Austin<\/li>\n<li>Rohan Murthy Harvard University<\/li>\n<li>Eric Rozner UT Austin<\/li>\n<\/ul>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4086\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4086\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4085\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tMicrosoft Windows Networking Division\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4085\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4086\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<ul>\n<li>Mark Ashida General Manager<\/li>\n<li>Abolade Gbadegesin Transports & Connectivity \/ Architect<\/li>\n<li>Jawad Khaki Vice President<\/li>\n<li>Tim Muss Product Planner<\/li>\n<li>Tin Qian Development Lead<\/li>\n<li>Dave Thaler Transports & Connectivity \/ Architect<\/li>\n<\/ul>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4088\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4088\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4087\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tMicrosoft Windows & Enterprise Management Division\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4087\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4088\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<ul>\n<li>Ashvin Sanghvi Architect<\/li>\n<li>Kirill Tatarinov Vice President<\/li>\n<li>Anders Vinberg Architect<\/li>\n<\/ul>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4090\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4090\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4089\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tMicrosoft RTC Product Group HC\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4089\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4090\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<ul>\n<li>Gurdeep Singh Pall Vice President<\/li>\n<\/ul>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<h2>Related Efforts<\/h2>\n<p>Reconnections: Managing Academic Networks With New Requirements<\/p>\n<p>A <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/security.internet2.edu\/rtp\">two day workshop<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> was held on October 25-26, 2005 in Chicago, on &#8220;a needs assessment for next-generation network cyberinfrastructure.&#8221; Output includes a <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/security.internet2.edu\/rtp\/docs\/internet2-reconnections-proceedings-200603.html\">final report<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> and an <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/security.internet2.edu\/rtp\/docs\/internet2-reconnections-executive-overview-200605.html\">executive summary<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>.<\/p>\n<p>4D Architecture for Control and Management<\/p>\n<p>The <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.cs.cmu.edu\/~4d\">4D architecture<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> is a clean-slate approach to simplifying network control and management by refactoring functionality to eliminate the sources of complexity seen in today&#8217;s network.<span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Venue: Salish Lodge & Spa (opens in new tab) Organizers: Victor Bahl, David A. Maltz, Ming ZhangOpens in a new tab This summit brings together experts in academia and industry to discuss the problems facing the designers and managers of enterprise networks. Also, for the first time, we will sponsor a number of graduate students [&hellip;]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr_startdate":"2006-06-01","msr_enddate":"2006-06-02","msr_location":"Snoqualmie, WA, US","msr_expirationdate":"","msr_event_recording_link":"","msr_event_link":"","msr_event_link_redirect":false,"msr_event_time":"","msr_hide_region":false,"msr_private_event":true,"msr_hide_image_in_river":0,"footnotes":""},"research-area":[13547],"msr-region":[],"msr-event-type":[],"msr-video-type":[],"msr-locale":[268875],"msr-program-audience":[],"msr-post-option":[],"msr-impact-theme":[],"class_list":["post-279735","msr-event","type-msr-event","status-publish","hentry","msr-research-area-systems-and-networking","msr-locale-en_us"],"msr_about":"<!-- wp:msr\/event-details {\"title\":\"EdgeNet 2006\",\"backgroundColor\":\"grey\"} \/-->\n\n<!-- wp:msr\/content-tabs --><!-- wp:msr\/content-tab {\"title\":\"About\"} --><!-- wp:freeform --><p><strong>Venue:<\/strong> <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.salishlodge.com\/\">Salish Lodge &amp; Spa<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<p><strong>Organizers:<\/strong> Victor Bahl, David A. Maltz, Ming Zhang<span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-279747 alignleft\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/eventpage.jpg\" alt=\"eventpage\" width=\"144\" height=\"144\" \/>This summit brings together experts in academia and industry to discuss the problems facing the designers and managers of enterprise networks. Also, for the first time, we will sponsor a number of graduate students to attend the summit as a way to encourage research in this area as well as to provide them an opportunity to get technical feedback on their ideas from some of thought leaders in this space.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-279744\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/edgenetlogo-logistics.gif\" alt=\"edgenetlogo-logistics\" width=\"532\" height=\"71\" \/><\/p>\n<h2>Life at the Edge: Research and Practice in Corporate\/Campus Networks<\/h2>\n<h3>Description<\/h3>\n<p>This summit brings together experts in academia and industry to discuss the problems facing the designers and managers of enterprise networks. Also, for the first time, we will sponsor a number of graduate students to attend the summit as a way to encourage research in this area as well as to provide them an opportunity to get technical feedback on their ideas from some of thought leaders in this space.<\/p>\n<p>The summit will be structured as an academic event &#8211; consisting of presentations, panel, and working group sessions as well as a poster and demo session. In our experience, this format allows for a high-degree of interactivity between participants as well as opportunities to dig deeply into specific topic areas.<\/p>\n<p>Among the goals of this summit is to produce:<\/p>\n<ul>\n<li>A list of the hard problems facing enterprise network IT staffs. We will take a stab at a research agenda that separates out the issues with near-term solutions from ones that require research or new approaches<\/li>\n<li>A description of the campus\/enterprise network scenarios that IT managers will have to support &amp; build up over the next 3-5 years.<\/li>\n<li>A list of the distinguishing characteristics of enterprise networks<\/li>\n<\/ul>\n<p>Our hope is that, at the end of this meeting, all participants will have a much better understanding of the problems and will have made connections to other researchers and operators working on these issues.<\/p>\n<p>Although this summit is by invitation only, all presentations, position papers, and videos of talks and panels will be available for download on this web site shortly after the meeting is over.<\/p>\n<ul>\n<li>The 2005 summit was on Self-Managing Networks<\/li>\n<li>The 2004 summit was on Mesh Networks<\/li>\n<\/ul>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<!-- \/wp:freeform --><!-- \/wp:msr\/content-tab --><!-- wp:msr\/content-tab {\"title\":\"Technical Program\"} --><!-- wp:freeform --><h2>Thursday, June 1<\/h2>\n<ul>\n<li>08:00 &#8211; 8:30 <strong>Breakfast<\/strong> (Falls Terrace Room)<br \/>\nThe Salish mangers have requested that we use the external entrance to the Falls Terrace Room on Thursday, as there will be another group meeting in the Potlach room. If it is raining the valet will have umbrellas for our use.<\/li>\n<li>08:30 &#8211; 9:00 <strong>Welcome and Introductions<\/strong> (Salish Ballroom)<\/li>\n<li>09:00 &#8211; 10:00 <strong>Keynote<\/strong> (Salish Ballroom)<br \/>\nKiril Tatarinov, VP Microsoft Windows &amp; Enterprise Management Division<br \/>\n<b>Model-Based Management of Distributed Services<\/b> | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/kirillt-keynote-edgenet.ppt\" target=\"_self\">slides<\/a> | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13573\/\">video<\/a><\/li>\n<\/ul>\n<p style=\"padding-left: 30px\">Traditional systems management has not been successful, and with ever-increasing scale, complexity and agility the problem keeps getting worse. The central problem is a lack of knowledge of the managed systems: what they are like, and what they should be like. We need formalized knowledge, in the form of system models, that allow automated management of deployment, configuration, security and operations. This knowledge must be captured already during the development phase, with models and policies refined and adjusted during the system\u2019s life cycle. Microsoft\u2019s industry-wide Dynamic Systems Initiative is aimed at providing infrastructure and tools for model-based management.<\/p>\n<ul>\n<li>10:00 &#8211; 10:15 <strong><strong>Break<br \/>\n<\/strong><\/strong><\/li>\n<li>10:15 &#8211; 11:45 <strong>Issues in Enterprise Networks<\/strong> (Salish Ballroom)<br \/>\n&#8211; Operator View Points &#8211; discussion of enterprise\/campus networks from the people that run them. | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13574\/\">video<\/a><br \/>\n&#8211; Panel organized by Ken Klingenstein | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/klingenstein-edgenet.ppt\" target=\"_self\">slides<\/a><br \/>\n&#8211; Panelists: Terry Gray | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/gray-edgenet.ppt\" target=\"_self\">slides<\/a>, Jim Pepin, Mark Poepping<\/li>\n<li>11:45 &#8211; 12:45 <strong>Buffet Lunch<\/strong> (Falls Terrace room)<\/li>\n<li>12:45 &#8211; 14:15 <strong>Measuring and Monitoring Network Performance<\/strong> (Salish Ballroom)<br \/>\nWhat do enterprise networks look like today, and what issues exist in monitoring them?<br \/>\n<em><br \/>\nSpeakers:<\/em><br \/>\n&#8211; Richard Mortier &#8211; <b>Measuring and Monitoring Microsoft\u2019s Enterprise Network<\/b> | see\u00a0<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/mortier-edgenet.ppt\" target=\"_self\">slides<\/a> | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13575\/\">video<\/a><br \/>\n&#8211; David Kotz &#8211; <b>Wireless Network Measurement Challenges<\/b> | see\u00a0<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/kotz-edgenet.pdf\" target=\"_self\">slides<\/a> | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13576\/\">video<\/a><br \/>\n&#8211; Chas DiFatta, Mark Poepping &#8211; <b>The Case for Comprehensive Diagnostics<\/b> | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/difatta-edgenet.pdf\" target=\"_self\">slides<\/a> | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13577\/\">video<\/a><\/li>\n<li>14:15 &#8211; 14:30 <strong>Break<\/strong><br \/>\n14:30 &#8211; 15:45 <strong>Poster Session<\/strong> (Vintage Room)<br \/>\n&#8211; Posters and demos from students, researchers, and Microsoft architects<br \/>\n&#8211; Abstracts and pictures of the posters available on the abstracts tab<\/li>\n<li>15:45 &#8211; 17:15 <strong>Working Session: Discussion of Problems\/Directions<\/strong> (Salish Ballroom)<br \/>\nSession is intended to work towards the goals below. So that the breakout sessions capture the areas of interest\/excitement in the room, participants will suggest topics they want to lead a discussion on. Other participants will divide themselves among the topic leaders, and we will dynamically coalesce groups as needed. After discussions, which can extend into the evening, the group leader will make short presentation during the final session on Friday.<br \/>\n<em><br \/>\nGoals:<br \/>\n<\/em>&#8211; List hard problems facing enterprise network IT staffs, separating near-term issues from the ones that require research or new approaches.<br \/>\n&#8211; Describe scenarios campus\/enterprise IT managers will have to support &amp; build over the next 3-5 years.<br \/>\n&#8211; Define distinguishing characteristics of enterprise networks<\/li>\n<li>17: 15 &#8211; 18:30 <strong>Enterprise Security and Policy<\/strong> (Salish Ballroom)<em>Speakers<br \/>\n<\/em>&#8211; Mark Ashida &#8211; <b>Customer Insight: CSO&#8217;s Perspective on Network Policies<\/b> | see\u00a0<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/ashida-edgenet.ppt\" target=\"_self\">slides<\/a> | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13578\/\">video<\/a><br \/>\n&#8211; Martin Casado &#8211; <b>The Protection Problem in Enterprise Networks<\/b>| see\u00a0<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/casado-edgenet.ppt\" target=\"_self\">slides<\/a> | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13579\/\">video<\/a><br \/>\n&#8211; Jitu Padhye &#8211; <b>Managing Corporate WiFi Networks Using DAIR<\/b> | see\u00a0<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/padhye-edgenet.ppt\" target=\"_self\">slides<\/a> | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13580\/\">video<\/a><\/li>\n<li>18:30 &#8211; 19:30 <strong>Walk down to the falls<\/strong><\/li>\n<\/ul>\n<h2>Friday June 2<\/h2>\n<ul>\n<li>09:00 &#8211; 10:15 Network Architectures and Network Design (Salish Ballroom)<em>Speakers<br \/>\n<\/em>&#8211; David A. Maltz &#8211; <b>Problems and Solutions in Enterprise Network Control<\/b> | see\u00a0<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/maltz-edgenet.ppt\" target=\"_self\">slides<\/a> | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13581\/\">video<\/a><br \/>\n&#8211; Aditya Akella &#8211; <b>New Directions in Enterprise Network Management<\/b> | see <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/akella-edgenet.ppt\" target=\"_self\">slides<\/a> | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13582\/\">video<\/a><br \/>\n&#8211; Sharad Agarwal &#8211; <b>Is an Office Without Wires Feasible?<\/b> | see\u00a0<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13583\/\">video<\/a><\/li>\n<li>10:15 &#8211; 10:30 <strong><strong>Break<\/strong><\/strong><\/li>\n<li>10:30 &#8211; 12:00 <strong>Services and Management<\/strong> (Salish Ballroom)<em>Speakers<\/em><br \/>\n&#8211; Tzi-cker Chiueh &#8211; <b>Virtual LAN as a Network Control Mechanism <\/b>| see <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/chiueh-edgenet.ppt\" target=\"_self\">slides<\/a> | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13584\/\">video<\/a><br \/>\n&#8211; Ken Birman &#8211; <b>Pushing Group Communication to the Edge Will Enable Radically New Distributed Applications<\/b> | see\u00a0<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/birman-edgenet.ppt\" target=\"_self\">slides<\/a> | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13585\/\">video<\/a><br \/>\n&#8211; Dinesh Verma &#8211; <b>Experiences Managing Networks in IBM HPC Grid Infrastructure and Enterprise VoIP<\/b> | see\u00a0<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13586\/\">video<\/a><br \/>\n&#8211; Anders Vinberg &#8211; <b>A Data Model for Policy<\/b> | see\u00a0<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13587\/\">video<\/a><\/li>\n<li>12:00 &#8211; 13:00 <strong>Lunch<\/strong> (Falls Terrace room)<\/li>\n<li>13:00 &#8211; 14:15 <strong>Diagnosis<\/strong> (Salish Ballroom)<em>Speakers<\/em><br \/>\n&#8211; Nick Feamster &#8211; <b>Campus and Personal Network Troubleshooting<\/b> | see <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/feamster-edgenet.ppt\" target=\"_self\">slides<\/a> | video<br \/>\n&#8211; Yin Zhang &#8211; <b>Experimental Design for Flexible Network Diagnosis<\/b> | see <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/yzhang-edgenet.ppt\" target=\"_self\">slides<\/a> | <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13589\/\">video<\/a><br \/>\n&#8211; Albert Greenberg &#8211; <b>Managing Data for Diagnosis<\/b> | see\u00a0<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/greenberg-edgenet.ppt\" target=\"_self\">slides<\/a><\/li>\n<li>14:15 &#8211; 16:00 <strong>Presentations of ideas from break out sessions and critiques<\/strong> (Salish Ballroom)<\/li>\n<\/ul>\n<p style=\"padding-left: 30px\">Each break out group will give a short presentation of their ideas. These presentations will be followed by comments from a critique panel whose panelists will describe their reactions to the ideas in the breakout presentations and the other sessions.<\/p>\n<p style=\"padding-left: 30px\"><em>Breakout session Reports:<br \/>\n<\/em>&#8211; Data Sharing and Repositories to Support Research | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/rao-data-sharing-breakout-report.ppt\" target=\"_self\">slides<\/a><br \/>\n&#8211; Isolation in Networks | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/birman-isolation-breakout-report.ppt\" target=\"_self\">slides<\/a><br \/>\n&#8211; Models in Management | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/verma-models-breakout-report.ppt\" target=\"_self\">slides<\/a><br \/>\n&#8211; Network Automation | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/feamster-automation-breakout-report.ppt\" target=\"_self\">slides<\/a><\/p>\n<p style=\"padding-left: 30px\">&#8211; Critique panelists<br \/>\n&#8211; Tom Anderson<br \/>\n&#8211; Fred Barker | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/baker-edgenet.ppt\" target=\"_self\">slides<\/a><\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<!-- \/wp:freeform --><!-- \/wp:msr\/content-tab --><!-- wp:msr\/content-tab {\"title\":\"Abstracts\"} --><!-- wp:freeform --><h2>Poster Abstracts<\/h2>\n<p>\t<div data-wp-context='{\"items\":[]}' data-wp-interactive=\"msr\/accordion\">\n\t\t\t\t\t<div class=\"clearfix\">\n\t\t\t\t<div\n\t\t\t\t\tclass=\"btn-group align-items-center mb-g float-sm-right\"\n\t\t\t\t\tdata-bi-aN=\"accordion-collapse-controls\"\n\t\t\t\t>\n\t\t\t\t\t<button\n\t\t\t\t\t\tclass=\"btn btn-link m-0\"\n\t\t\t\t\t\tdata-bi-cN=\"Expand all\"\n\t\t\t\t\t\tdata-wp-bind--aria-controls=\"state.ariaControls\"\n\t\t\t\t\t\tdata-wp-bind--aria-expanded=\"state.ariaExpanded\"\n\t\t\t\t\t\tdata-wp-bind--disabled=\"state.isAllExpanded\"\n\t\t\t\t\t\tdata-wp-class--inactive=\"state.isAllExpanded\"\n\t\t\t\t\t\tdata-wp-on--click=\"actions.onExpandAll\"\n\t\t\t\t\t\ttype=\"button\"\n\t\t\t\t\t>\n\t\t\t\t\t\tExpand all\t\t\t\t\t<\/button>\n\t\t\t\t\t<span aria-hidden=\"true\"> | <\/span>\n\t\t\t\t\t<button\n\t\t\t\t\t\tclass=\"btn btn-link m-0\"\n\t\t\t\t\t\tdata-bi-cN=\"Collapse all\"\n\t\t\t\t\t\tdata-wp-bind--aria-controls=\"state.ariaControls\"\n\t\t\t\t\t\tdata-wp-bind--aria-expanded=\"state.ariaExpanded\"\n\t\t\t\t\t\tdata-wp-bind--disabled=\"state.isAllCollapsed\"\n\t\t\t\t\t\tdata-wp-class--inactive=\"state.isAllCollapsed\"\n\t\t\t\t\t\tdata-wp-on--click=\"actions.onCollapseAll\"\n\t\t\t\t\t\ttype=\"button\"\n\t\t\t\t\t>\n\t\t\t\t\t\tCollapse all\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<ul class=\"msr-accordion\">\n\t\t\t\t\t\t\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4048\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4048\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4047\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tYu-Chung Cheng\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4047\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4048\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><b>Jigsaw: Solving the Puzzle of Enterprise 802.11 Analysis<\/b><\/p>\n<p>The combination of unlicensed spectrum, cheap wireless interfaces and the inherent convenience of untethered computing has made 802.11-based networks ubiquitous in the enterprise. Modern universities, corporate campuses and government offices routinely deploy scores of access points to blanket their sites with wireless Internet access. However, while the fine-grained behavior of the 802.11 protocol itself has been well studied, our understanding of how large 802.11 networks behave in their full empirical complexity is surprisingly limited. In this paper, we present a system called Jigsaw that uses multiple monitors to provide a single unified view of all physical, link, network and transport-layer activity on an 802.11 network. To drive this analysis, we have deployed an infrastructure of over 170 radio monitors that simultaneously capture all 802.11b and 802.11g activity in a large university building (1M+ cubic feet). We describe the challenges posed by both the scale and ambiguity inherent in such an architecture, and explain the algorithms and inference techniques we developed to address them.<\/p>\n<p>So far, we have used Jigsaw&#8217;s global cross layer viewpoint to resolve wireless problem tickets and isolate performance artifacts , both explicit, such as management inefficiencies, and implicit, such as co-channel interference. Surprisingly many wireless problems involve the wired infrastructure such as DoS attacks by mis-behaving clients. Others include microwave interferences, slow 802.11 roaming, access points bugs, etc. We believe this is the first analysis combining this scale and level of detail for a real production network.<\/p>\n<p>More at <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/wireless.ucsdsys.net\">http:\/\/wireless.ucsdsys.net<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4050\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4050\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4049\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tRanveer Chandra, Venkat Padmanabhan, Ming Zhang\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4049\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4050\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><b>WiFiProfiler: Cooperative Diagnosis in Wireless LANs <\/b><\/p>\n<p>While 802.11-based wireless hotspots are proliferating, users often have little recourse when the network does not work or performs poorly for them. They are left trying to manually debug the problem, which can be a frustrating and disruptive process. The users&#8217; troubles are compounded by the absence of network administrators or an IT department to turn to in many 802.11 hotspot settings (e.g., cafes, airports, conferences).<\/p>\n<p>We present WiFiProfiler, a system in which wireless hosts cooperate to diagnose and possibly resolve network problems in an automated manner, without requiring any infrastructural support. The key observation is that even if a host&#8217;s wireless link to an access point is not working, the host is often within the range of other wireless nodes and is in a position to communicate with them (a little) peer-to-peer. We leverage this ability to create a shared information plane, which enables wireless hosts to exchange a range of information about their network settings and the health of their network connectivity. By aggregating and correlating such information across multiple wireless hosts, we infer the likely cause of the problem. Our implementation on Windows XP shows that WiFiProfiler is effective in diagnosing a range of problems and imposes a low overhead on the participating hosts.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4052\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4052\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4051\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tDave Thaler, Tin Qian\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4051\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4052\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><b>Network Diagnostics in Windows Vista<\/b><\/p>\n<p>Computer networking has become increasingly important and pervasive in people\u2019s daily life. On the other hand, the networks are getting more and more complex in terms of the size and topology, the mix of technology involved, and the number of applications\/services supported. How to make networking a reliable and painless experience for 300+ million windows users has become a pressing yet extremely challenging task. Windows Vista introduces an innovative network diagnostics framework that provides an extensible diagnostics platform aiming at helping non-technical windows users\u2019 trouble shooting network problems in an intuitive and interactive fashion. It defines a general trouble shooting programming model for integrates various trouble-shooting logics for different network components. To support a simple and intuitive user experience, it focuses on in-context diagnosis where the trouble-shooting process is done interactively within the context of user\u2019s network usage. Moreover, computer networking is an area where rapid technology advancement is being made constantly. To effectively cope with the ever changing network issues, the network diagnostics framework in Vista incorporates a full feedback mechanism via SQM\/WER to help quickly identifying and responding to new top network pain areas. Its built-in extensibility model also enable 3rd IHVs\/ISVs to provide trouble-shooting value-adds seamlessly to the windows diagnostics experience.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4054\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4054\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4053\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tHitesh Ballani, Paul Francis\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4053\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4054\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><b>CONMan: Taking the complexity out of Network Management<\/b><\/p>\n<p>Network management is difficult, costly, and error prone, and this is becoming more so as the network complexity increases. We argue that this is an outcome of two fundamental \ufb02aws in the existing architecture: the management plane depends on the data plane and the complexity of the ever-evolving data plane en- cumbers the management plane. Consequently, addressing these flaws can make the network amenable to management.<\/p>\n<p>We present Complexity Oblivious Network Management (CONMan), a network architecture in which the management plane does not depend on the data plane and all data plane protocols expose a generic management interface. This restricts the operational complexity of protocols to their implementation and allows the management plane to achieve high level policies in a structured fashion. Our preliminary experience with building the CONMan interface of a couple of protocols and using them for real world management tasks indicates the architecture\u2019s potential to alleviate the management troubles of the Internet.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4056\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4056\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4055\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tEric Rozner, Yogita Mehta, Aditya Akella, Lili Qiu\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4055\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4056\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><b>Traffic-Aware Channel Assignment in Wireless LANs<\/b><\/p>\n<p>The importance of channel assignment in wireless LANs has been long recognized and has attracted significant research attention. Despite much recent progress, several important challenges still remain: First, what is the right &#8220;performance metric&#8221; to optimize for? Most existing approaches to channel assignment try to minimize the number of mutually-interfering APs. However it is not clear if this metric accurately reflects client performance. Second, to what extent is the quality of channel assignment improved by incorporating the observed traffic demands at APs and clients? Recent work in IP traffic engineering has shed light on the tremendous effectiveness of using traffic demands in network engineering decisions. However, to date, no approach to channel assignment has taken traffic demands into account.<\/p>\n<p>In this work, we conduct simulations over publicly-available wireless traffic traces, to study the relative efficacy of different optimization metrics in tracking client performance. We show that being &#8220;traffic-aware&#8221; could substantially improve the overall quality of a channel assignment, irrespective of the metric employed. We also examine the effect of incomplete traffic information on the quality of a channel assignment. Finally, we develop and evaluate a preliminary set of practical traffic-aware assignment algorithms that predict future demands based on historical information and use the predicted demands for assigning channels.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4058\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4058\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4057\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tHemant Rokesh, Hui Zhang\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4057\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4058\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><b>4D on NetFPGA<\/b><\/p>\n<p>The project aims to demonstrate how 4D can be used to effectively manage data networks. The low cost NetFPGA platform is used to build an experimental network that is configured, controlled and managed as per the 4D architecture.<\/p>\n<p>The 4D architecture is a clean slate approach to network control. It is guided by the following three principles: Network-level objectives, network-wide views, direct control. 4D realizes these principles by decomposing the functions of network control into 4 planes. A decision plane that is responsible for creating a network configuration (e.g. computing FIBs for each router in the network); a dissemination plane that gathers information about network state (e.g. link up\/down information) to the decision plane, and distributes decision plane output to routers; a discovery plane that enables devices to discover their directly connected neighbors; and a data plane for forwarding network traffic.<\/p>\n<p>In this project we want to explore the practical difficulties and implementation specific challenges that arise in using 4D to control real network devices. A few aspects we are interested in looking into are-(a.) How quickly does 4D react to link and device failures in practice(b.) Can 4D implement advanced functionalities (like FRR, VLANs) in the data-plane when traffic is injected at full line-rate(c.) How effective is 4D in controlling heterogeneous (IP plus Ethernet)(d.) Is the 4D architecture\/interfaces simple enough to be implemented on low-cost memory constrained switches?For addressing these issues, we wish to build and deploy the 4D NetFPGA infrastructure in a real network like a data-center.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4060\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4060\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4059\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tRatul Mahajan\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4059\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4060\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><b>Wit: Analyzing the MAC-level Behavior of Wireless Networks in the Wild<\/b><\/p>\n<p>Wit is a tool to understand the detailed MAC-level behavior of wireless networks. It takes as input data that is acquired only through passive sniffing, and so can be used to evaluate live systems. Wit is based on several novel techniques. A robust merging technology combines the inevitably incomplete views of individual sniffers into a single, more complete trace of wireless activity. An inference engine based on formal language methods fills in still missing packets and annotates each packet with information, such as whether it was received by its intended recipient. This annotated data enables several new kinds of analyses. We have devised, for instance, a technique to estimate the number of stations competing for the medium at each moment.<\/p>\n<p>We have used Wit over multi-sniffer traces collected at a well-attended academic conference to understand how 802.11 performs in such deployments. We uncovered several MAC-layer characteristics, which to our knowledge, cannot be inferred using other currently available techniques. We find transmissions from clients to APs were usually more reliable than those in the other direction. The network was dominated by periods of low contention even during busy periods of the day. The medium utilization was highly inefficient in the common case of low contention, but network performance did not degrade during periods of high contention.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4062\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4062\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4061\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tChanghoon Kim, Jennifer Rexford\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4061\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4062\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><b>Joint Analysis of Layer-2 and Layer-3 Configuration in Enterprise Networks <\/b><\/p>\n<p>Managing enterprise networks is challenging because of the complex interaction between IP and the underlying layer-2 technologies. For example, many enterprises make heavy use of virtual LANs (VLANs) to contain broadcast traffic and apply access-control policies. A single VLAN may span multiple physical links, and a single physical link may carry traffic for multiple VLANs, making it difficult to study an individual VLAN or link in isolation. In addition, middleboxes, such as firewalls and traffic shapers, may transparently drop or delay traffic based on fields in the IP packet header, which can blur the symptoms and origins of a problem. Understanding both the layer-2 and layer-3 configuration of an enterprise network is crucial for detecting, diagnosing, and fixing performance and reachability problems.<\/p>\n<p>Despite years of research on inferring network topologies and diagnosing performance problems in backbone networks, the unique challenges introduced by layer-2 technologies in enterprise networks have received limited attention. The goal of our research is to create techniques for diagnosing cross-layer problems in enterprise networks. Initially, we focus on &#8220;white-box&#8221; approaches where we jointly analyze the configuration of layer-2 devices (such as switches and middleboxes) and the routers in operational networks. First, we plan to characterize the use of VLANs in several operational networks, using the Princeton campus network and our department&#8217;s network as a starting point. Moving beyond characterization, we hope to create analysis techniques for identifying configuration mistakes and inefficient mappings between the layer-3 and layer-2 topologies. Then, we plan to join the configuration data with traffic and performance measurements to guide the detection and diagnosis of problems.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4064\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4064\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4063\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tPaul Barham, Moises Goldszmidt, Rebecca Isaacs, John MacCormick, Richard Mortier\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4063\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4064\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><b>Constellation: an Application-level Traceroute<\/b><\/p>\n<p>Constellation is an infrastructure for distributed anomaly detection and diagnosis. Each host in the constellation constructs a probabilistic model of its own traffic using annotated packet arrival and departure times. When the user, or their agent, notices that something is wrong, the local host performs self-diagnosis before propagating the diagnosis request to its set of \u201clikely suspects\u201d, who in turn repeat the process. This packet-level approach allows detailed inter-service temporal relationships to be captured in the model \u2013 for example, the dependency of an email service on an authentication service. Constellation is early work that explores some novel machine learning techniques, and applies them to packet traces containing real-world inter-service dependencies from Microsoft\u2019s corporate network.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4066\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4066\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4065\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tAjay Mahimkar, Jasraj Dange, Vitaly Shmatikov, Harrick M. Vin, Yin Zhang\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4065\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4066\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><b>Transparent Network-based DoS Mitigation<\/b><\/p>\n<p>Denial of service (DoS) attacks are a growing threat to the availability of Internet services. We present dFence, a novel DoS mitigation system that is completely transparent to the existing Internet infrastructure and requires no software modification at either routers, or end hosts. The core of dFence is a coalition of network-based, on-demand middleboxes. Middleboxes are introduced into the data path dynamically and transparently via standard intra-ISP routing mechanisms, intercept both directions of IP traffic (to and from attacked hosts), and apply stateful policies to mitigate a broad range of spoofed and unspoofed attacks. We describe the architecture of the middlebox, including defenses against DoS attacks on the middlebox itself, as well as on-demand introduction and removal mechanisms. The implementation is evaluated using a prototype testbed based on Intel IXP network processors.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<\/p>\n<h2>Talk Abstracts<\/h2>\n<p>\t<div data-wp-context='{\"items\":[]}' data-wp-interactive=\"msr\/accordion\">\n\t\t\t\t\t<div class=\"clearfix\">\n\t\t\t\t<div\n\t\t\t\t\tclass=\"btn-group align-items-center mb-g float-sm-right\"\n\t\t\t\t\tdata-bi-aN=\"accordion-collapse-controls\"\n\t\t\t\t>\n\t\t\t\t\t<button\n\t\t\t\t\t\tclass=\"btn btn-link m-0\"\n\t\t\t\t\t\tdata-bi-cN=\"Expand all\"\n\t\t\t\t\t\tdata-wp-bind--aria-controls=\"state.ariaControls\"\n\t\t\t\t\t\tdata-wp-bind--aria-expanded=\"state.ariaExpanded\"\n\t\t\t\t\t\tdata-wp-bind--disabled=\"state.isAllExpanded\"\n\t\t\t\t\t\tdata-wp-class--inactive=\"state.isAllExpanded\"\n\t\t\t\t\t\tdata-wp-on--click=\"actions.onExpandAll\"\n\t\t\t\t\t\ttype=\"button\"\n\t\t\t\t\t>\n\t\t\t\t\t\tExpand all\t\t\t\t\t<\/button>\n\t\t\t\t\t<span aria-hidden=\"true\"> | <\/span>\n\t\t\t\t\t<button\n\t\t\t\t\t\tclass=\"btn btn-link m-0\"\n\t\t\t\t\t\tdata-bi-cN=\"Collapse all\"\n\t\t\t\t\t\tdata-wp-bind--aria-controls=\"state.ariaControls\"\n\t\t\t\t\t\tdata-wp-bind--aria-expanded=\"state.ariaExpanded\"\n\t\t\t\t\t\tdata-wp-bind--disabled=\"state.isAllCollapsed\"\n\t\t\t\t\t\tdata-wp-class--inactive=\"state.isAllCollapsed\"\n\t\t\t\t\t\tdata-wp-on--click=\"actions.onCollapseAll\"\n\t\t\t\t\t\ttype=\"button\"\n\t\t\t\t\t>\n\t\t\t\t\t\tCollapse all\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<ul class=\"msr-accordion\">\n\t\t\t\t\t\t\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4068\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4068\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4067\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tMeasuring and Monitoring Enterprise Networks\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4067\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4068\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p>Chas DiFatta, Mark Poepping &#8211; <b>The Case for Comprehensive Diagnostics<\/b><\/p>\n<p>The Internet has achieved great creative success, opening our eyes to radically new communication capabilities and distributed control opportunities. Yet for all the critical and commercial success of the past twenty years, we remain essentially unable to quantify or trace the actions of services and devices on the network. The Internet is a maelstrom of packets and protocols, an infrastructure built to speed it all along to quick completion, but constructed without detailed measures, without consistency of metrics or traces, with no visibility into how it&#8217;s operating.<\/p>\n<p>When there is a perceived problem with an application or supported service, a diagnostician must have the tools and information at their disposal to pinpoint the problem with reasonable certainty, in hopes of avoiding the problem in the future.<\/p>\n<p>We propose creating a new capability, one to collect, manage, and correlate log and diagnostic event information to not only enable investigation of problems, but that can also support validation of correct operation in complex networked systems. If realized, the resulting capabilities will provide the visibility to understand, control and validate essential operation in the computing environments we increasingly rely upon.<\/p>\n<hr \/>\n<p>Richard Mortier &#8211; <b>Measuring and Monitoring Microsoft\u2019s Enterprise Network<\/b><\/p>\n<p>In this talk I will describe some recent work at MSR Cambridge to measure Microsoft&#8217;s enterprise network as seen from our site. I will describe our collection method, the problems we faced, and the solutions we implemented. I will describe the data we collected, totalling 13TB of network traffic, to give a flavour of the traffic on our enterprise network in aggregate, per-application and per-host. Finally, I will use OSPF data to outline the topological properties of the network in which our site resides. In summary, we find that there is extreme volatility in application traffic both temporally and spatially (i.e. over time and between hosts); the application mix is significantly different to prior studies of Internet backbone traffic and university campus traffic; and the network is quite stable. This was joint work with Rebecca Isaacs and Dinan Gunawardena, with additional analysis from Laurent Massoulie and Peter Key.<\/p>\n<hr \/>\n<p>David Kotz &#8211; <b>Wireless Network Measurement Challenges<\/b><\/p>\n<p>Wireless networks, including Wi-Fi infrastructure and mesh networks, are becoming ubiquitous. It is critical to measure these networks to gain a better understanding of the traffic on the networks, the way they are used, and the response of the networks to different traffic patterns. It is also important to monitor operational wireless networks to improve security, capacity planning, and trouble shooting. Wireless networks pose unique challenges to measurement, however. In this talk I survey some of these challenges and describe some of the efforts underway to improve our ability to measure and monitor operational wireless networks.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4070\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4070\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4069\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tEnterprise Security and Policy\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4069\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4070\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p>Mark Ashida &#8211; <b>Customer Insight: CSO&#8217;s Perspective on Network Policies <\/b><\/p>\n<p>Martin Casado &#8211; <b>The Protection Problem in Enterprise Networks<\/b><\/p>\n<p>Attempts to retrofit access controls into enterprise networks have met with varied success. Often doing so has a deleterious effect, resulting in complex, brittle networks that are engineered around choke-points. In this talk, I will discuss what protection properties are desired by enterprise environments today, how existing solutions that try to approximate them fall short, and how those solutions often have negative, unintended consequences.<\/p>\n<hr \/>\n<p>Jitu Padhye &#8211; <b>Managing Corporate WiFi Networks Using DAIR<\/b><\/p>\n<p>We present a framework for monitoring and managing enterprise wireless networks using desktop infrastructure. The framework is called DAIR, which is short for Dense Array of Inexpensive Radios.<\/p>\n<p>Prior proposals in this area include monitoring the network via a combination of access points (APs), mobile clients, and dedicated sensor nodes. We show that a dense deployment of sensors is necessary to effectively monitor Wi-Fi networks, and one can not accomplish this using access points alone. An ordinary, single-radio AP can not monitor multiple channels effectively, without adversely impacting the associated clients. Moreover, we show that a typical deployment of access points is not sufficiently dense for several management tasks, particularly those related to security. Due to power constrain mobile devices can provide only limited assistance in monitoring wireless networks. Deploying a dense array of dedicated sensor nodes is an expensive proposition.<\/p>\n<p>Our solution is based on two simple observations. First, in most enterprise environments, one finds plenty of desktop machines with good wired connectivity, and spare CPU and disk resources. Second, inexpensive USB-based wireless adapters are commonly available. By attaching these adapters to desktop machines, and dedicating the adapters to the task of monitoring the wireless network, we create a low cost management infrastructure.<\/p>\n<p>We describe how several common wireless network management tasks can use the DAIR platform. As a demonstrative example, we consider the task of detecting rogue APs, and describe how the DAIR platform can be leveraged to carry out this task effectively.<\/p>\n<hr \/>\n<p>Antonio Nucci &#8211; <b>How to Build a Carrier-Grade Defense-Shield<\/b><\/p>\n<p><i>Dr. Nucci will be unable to attend due to a family emergency<\/i><\/p>\n<p>In this talk, Dr. Antonio Nucci, Chief Technology Officer at Narus Inc, will highlight the major shifts in the security market over the past few years, discuss the dynamics of the security threats and the emerging interest of Internet Service Providers to play a key role in this market. He will then introduce the requirements of this new emerging type of security and present a new preventative technology based on Information Entropy, also known as Carrier-Class Defense-Shield, that will help large high-speed ISP to efficiently defend their network perimeters from the most invasive and deadly threads.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4072\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4072\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4071\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tNetwork Architectures and Network Design\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4071\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4072\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p>David A. Maltz &#8211; <b>Problems and Solutions in Enterprise Network Control<\/b><\/p>\n<p>Enterprise networks today are fundamentally complex, as they bring together a heterogeneous collection of hosts and network devices, ranging from security cameras, to Ethernet switches, to IP routers, to storage networks. The designers of these networks are often called upon to implement sophisticated policies for reasons of security, load balancing, or reliability. This talk will give an overview of the problem space and describe an architectural change that aims to improve the manageability of enterprise networks by eliminating much of the complexity.<\/p>\n<hr \/>\n<p>Aditya Akella &#8211; <b>New Directions in Enterprise Network Management<\/b><\/p>\n<p>In this talk, we will review current and past techniques for managing and trouble-shooting enterprise networks, and their drawbacks and limitations. Furthermore, we will review initial ideas for an alternate Layer-2 architecture for connectivity and communication in enterprise networks that vastly simplifies management tasks.<\/p>\n<hr \/>\n<p>Sharad Agarwal &#8211; <b>Is an Office Without Wires Feasible?<\/b><\/p>\n<p>A wireless office is an office without wired Ethernet connectivity, or rather, one with the least number of machines connected by wires. What happens if we re-design the network in an office \u2013 remove all the network infrastructure (wireless APs, switches, routers, etc.), replace the Ethernet wires to every desktop and server with IEEE 802.11, and maintain a very small number of \u201cgateway\u201d machines for access to the wired corporate intranet and the Internet?<\/p>\n<p>We evaluated the feasibility of a mesh network for an all-wireless office using traces of 11 office users spanning over a month and an actual 21-node multi-radio mesh testbed in an office area. Unlike previous mesh studies that have examined routing design in detail, we examine how different office mesh design choices impact the performance of user traffic. We find that the performance on our mesh network depends on the combination of routing metric, user-server placement, traffic load, wireless hardware and wireless settings. While clearly it is possible to overwhelm typical wireless networks, we conclude that for our traces and deployed system, all-wireless office meshes are feasible. In most cases, individual transactions incur under 20ms of additional delay over the mesh network. We believe this is an acceptable delay for most applications where a wired network to every machine is not readily available. We argue that our results are scalable to a network of over 100 users.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4074\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4074\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4073\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tServices and Management\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4073\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4074\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p>Ken Birman &#8211; <b>Pushing Group Communication to the Edge will Enable Radically New Distributed Applications<\/b><\/p>\n<p>Advances in scalable group communication, fusing classical group communication protocols with new P2P ideas, are about to transform communication options for application developers. Modern platforms make it easy to implement group communication at the same layer where we support remote method invocation. Thus, we\u2019ll suddenly be in a position to present groups to users as shared live files (or other kinds of objects), publish-subscribe topics, or even distributed shared memory. Supporting the abstraction with solutions that scale well, are robust under stress, and that can be secured will enable arevolutionary advances for a tremendous range of applications that have been bogged down by the highly restrictive communication options available today. Cornell University\u2019s Quicksilver platform, developed by PhD student Krzys Ostrowski, will soon be available for download from <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.cs.cornell.edu\/projects\/quicksilver\/\">http:\/\/www.cs.cornell.edu\/projects\/quicksilver\/<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>.<\/p>\n<hr \/>\n<p>Tzi-cker Chiueh &#8211; <b>Virtual LAN as a Network Control Mechanism<\/b><\/p>\n<p>Modern Ethernet switches, even low-end ones, come with various advanced features such as IGMP snooping, VLAN, class-based traffic prioritization, host access control, etc. Most of these features can be configured either through standard SNMP commands or through normal packets. Although these features were originally designed for network provisioning at deployment time, there is no reason why they could not be used as dynamic control mechanisms at run time. In the past several years, we have been trying to leverage one of these features, VLAN, as a network resource management primitive, and apply it toMetro ethernets, storage area networks, and cluster interconnects. This talk will describe the important ideas in these efforts.<\/p>\n<hr \/>\n<p>Dinesh Verma &#8211; <b>Experiences Managing Networks in IBM HPC Grid Infrastructure and Enterprise VoIP<\/b><\/p>\n<p>In this talk, we will discuss the problems and issues that were encountered in managing the network infrastructure for High Performance Computing infrastructure centers that were established as a part of the IBM on Demand and Grid Computing initiatives. We would identify the problems that were encountered in managing and automating the management infrastructure of the network. We would also discuss the experiences gained from the management of VoIP infrastructure as it was rolled out in the IBM Research intranet, and some of the challenges encountered in managing the VoIP infrastructure as it is operational today.<\/p>\n<hr \/>\n<p>Anders Vinberg &#8211; <b>A Data Model for Policy<\/b><\/p>\n<p>Policy is the foundation for self-managing systems, IT control and governance\/compliance monitoring. How do we design a policy language, or policy schema, that is rich enough to be useful but simple enough to be amenable to analysis? How do we validate that policy matches intent, how do we understand how policies interact, how do we understand impact of a policy change?<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4076\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4076\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4075\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tDiagnosis\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4075\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4076\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p>Nick Feamster &#8211; <b>Troubleshooting Campus Networks<\/b><\/p>\n<p>This talk presents an overview of the problems we are tackling in helping network operators debug firewall, switch, and router configurations on a large campus network. Today, campus network operators have a preliminary set of tools to help them spot potential inconsistencies and errors, but they have no recourse when the actual network behavior is inconsistent with the behavior suggested by static configuration analysis. We present some examples of configuration challenges faced by campus network operators, propose possible roles for static and dynamic analysis for fault detection and troubleshooting, and describe some preliminary experience using a deployed active monitoring system on a major research and administrative network with 60,000 nodes, 160 buildings across 4 campuses, and 130 firewalls.<\/p>\n<hr \/>\n<p>Yin Zhang &#8211; <b>Experimental Design for Flexible Network Diagnosis<\/b><\/p>\n<p>Albert Greenberg &#8211; <b>Managing Data for Diagnosis<\/b><\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<!-- \/wp:freeform --><!-- \/wp:msr\/content-tab --><!-- wp:msr\/content-tab {\"title\":\"Participants\"} --><!-- wp:freeform --><p>\t<div data-wp-context='{\"items\":[]}' data-wp-interactive=\"msr\/accordion\">\n\t\t\t\t\t<div class=\"clearfix\">\n\t\t\t\t<div\n\t\t\t\t\tclass=\"btn-group align-items-center mb-g float-sm-right\"\n\t\t\t\t\tdata-bi-aN=\"accordion-collapse-controls\"\n\t\t\t\t>\n\t\t\t\t\t<button\n\t\t\t\t\t\tclass=\"btn btn-link m-0\"\n\t\t\t\t\t\tdata-bi-cN=\"Expand all\"\n\t\t\t\t\t\tdata-wp-bind--aria-controls=\"state.ariaControls\"\n\t\t\t\t\t\tdata-wp-bind--aria-expanded=\"state.ariaExpanded\"\n\t\t\t\t\t\tdata-wp-bind--disabled=\"state.isAllExpanded\"\n\t\t\t\t\t\tdata-wp-class--inactive=\"state.isAllExpanded\"\n\t\t\t\t\t\tdata-wp-on--click=\"actions.onExpandAll\"\n\t\t\t\t\t\ttype=\"button\"\n\t\t\t\t\t>\n\t\t\t\t\t\tExpand all\t\t\t\t\t<\/button>\n\t\t\t\t\t<span aria-hidden=\"true\"> | <\/span>\n\t\t\t\t\t<button\n\t\t\t\t\t\tclass=\"btn btn-link m-0\"\n\t\t\t\t\t\tdata-bi-cN=\"Collapse all\"\n\t\t\t\t\t\tdata-wp-bind--aria-controls=\"state.ariaControls\"\n\t\t\t\t\t\tdata-wp-bind--aria-expanded=\"state.ariaExpanded\"\n\t\t\t\t\t\tdata-wp-bind--disabled=\"state.isAllCollapsed\"\n\t\t\t\t\t\tdata-wp-class--inactive=\"state.isAllCollapsed\"\n\t\t\t\t\t\tdata-wp-on--click=\"actions.onCollapseAll\"\n\t\t\t\t\t\ttype=\"button\"\n\t\t\t\t\t>\n\t\t\t\t\t\tCollapse all\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<ul class=\"msr-accordion\">\n\t\t\t\t\t\t\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4078\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4078\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4077\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tAcademia\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4077\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4078\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<ul>\n<li>Aditya Akella University of Wisconsin, Madison<\/li>\n<li>Tom Andersen University of Washington<\/li>\n<li>Suman Banerjee University of Wisconsin, Madison<\/li>\n<li>Kenneth Birman Cornell University<\/li>\n<li>Tzi-cker Chiueh StonyBrook University<\/li>\n<li>Chas DiFatta Carnegie Mellon University\/PI Project EDDY<\/li>\n<li>Nicholas Feamster Georgia Tech<\/li>\n<li>Paul Francis Cornell University<\/li>\n<li>Terry Gray University of Washington \/ VP IT Infrastructure<\/li>\n<li>Dina Katabi MIT<\/li>\n<li>Kenneth Klingenstein University of Colorado \/ Chief Technologist<\/li>\n<li>David F. Kotz Dartmouth College<\/li>\n<li>James Pepin USC \/ CTO<\/li>\n<li>Mark G. Poepping Carnegie Mellon University\/Internet2\/Director of Network Architecture<\/li>\n<li>Sanjay Rao Purdue University<\/li>\n<li>Hui Zhang Carnegie Mellon University<\/li>\n<li>Yin Zhang UT Austin<\/li>\n<\/ul>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4080\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4080\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4079\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tIndustry\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4079\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4080\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<ul>\n<li>Fred Baker Cisco<\/li>\n<li>Albert Greenberg AT&amp;T<\/li>\n<li>Graham Holmes Cisco<\/li>\n<li>Antonio Nucci Narus \/ CTO<\/li>\n<li>Nina Taft Intel Research Dinesh Verma IBM<\/li>\n<\/ul>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4082\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4082\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4081\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tMicrosoft Research\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4081\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4082\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<ul>\n<li>Sharad Agarwal Researcher<\/li>\n<li>Victor Bahl Principal Researcher<\/li>\n<li>Ranveer Chandra Researcher<\/li>\n<li>Sailesh Chutani Director, External Research Program<\/li>\n<li>Rich Draves Systems and Networking Research Area Manager<\/li>\n<li>Rebecca Isaacs Researcher (Cambridge)<\/li>\n<li>Jim Kajiya General Manager<\/li>\n<li>Dan Ling Vice President<\/li>\n<li>Ratual Mahajan Researcher<\/li>\n<li>Dave Maltz Researcher<\/li>\n<li>Richard Mortier Researcher (Cambridge)<\/li>\n<li>Geoffry Nordlund Sr Systems Analyst<\/li>\n<li>Jitu Padhye Researcher<\/li>\n<li>Venkat Padmanabhan Senior Researcher<\/li>\n<li>Rick Rashid Senior Vice President<\/li>\n<li>Stewart Tansley Program Manager<\/li>\n<li>Alec Wolman Researcher<\/li>\n<li>Ming Zhang Researcher<\/li>\n<li>Brian Zill Research Software Development Engineer<\/li>\n<\/ul>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4084\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4084\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4083\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tMicrosoft Research Interns and Graduate Students\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4083\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4084\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<ul>\n<li>Francisco Alvarez ITESM<\/li>\n<li>Hitesh Ballani Cornell University<\/li>\n<li>Martin Casado Stanford University<\/li>\n<li>Yu-Chung Cheng UCSD<\/li>\n<li>Tulika Garg IIT<\/li>\n<li>Hemant Rokesh Gogineni Carnegie Mellon University<\/li>\n<li>Srikanth Kandula MIT<\/li>\n<li>Changhoon Kim Princeton University<\/li>\n<li>Lun Li Caltech<\/li>\n<li>Ajay Mahimkar UT Austin<\/li>\n<li>Rohan Murthy Harvard University<\/li>\n<li>Eric Rozner UT Austin<\/li>\n<\/ul>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4086\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4086\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4085\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tMicrosoft Windows Networking Division\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4085\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4086\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<ul>\n<li>Mark Ashida General Manager<\/li>\n<li>Abolade Gbadegesin Transports &amp; Connectivity \/ Architect<\/li>\n<li>Jawad Khaki Vice President<\/li>\n<li>Tim Muss Product Planner<\/li>\n<li>Tin Qian Development Lead<\/li>\n<li>Dave Thaler Transports &amp; Connectivity \/ Architect<\/li>\n<\/ul>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4088\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4088\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4087\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tMicrosoft Windows &amp; Enterprise Management Division\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4087\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4088\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<ul>\n<li>Ashvin Sanghvi Architect<\/li>\n<li>Kirill Tatarinov Vice President<\/li>\n<li>Anders Vinberg Architect<\/li>\n<\/ul>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4090\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4090\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-4089\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tMicrosoft RTC Product Group HC\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-4089\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4090\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<ul>\n<li>Gurdeep Singh Pall Vice President<\/li>\n<\/ul>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<!-- \/wp:freeform --><!-- \/wp:msr\/content-tab --><!-- wp:msr\/content-tab {\"title\":\"White Papers\"} --><!-- wp:freeform --><h2>Related Efforts<\/h2>\n<p>Reconnections: Managing Academic Networks With New Requirements<\/p>\n<p>A <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/security.internet2.edu\/rtp\">two day workshop<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> was held on October 25-26, 2005 in Chicago, on &#8220;a needs assessment for next-generation network cyberinfrastructure.&#8221; Output includes a <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/security.internet2.edu\/rtp\/docs\/internet2-reconnections-proceedings-200603.html\">final report<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> and an <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/security.internet2.edu\/rtp\/docs\/internet2-reconnections-executive-overview-200605.html\">executive summary<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>.<\/p>\n<p>4D Architecture for Control and Management<\/p>\n<p>The <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.cs.cmu.edu\/~4d\">4D architecture<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> is a clean-slate approach to simplifying network control and management by refactoring functionality to eliminate the sources of complexity seen in today&#8217;s network.<span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<!-- \/wp:freeform --><!-- \/wp:msr\/content-tab --><!-- \/wp:msr\/content-tabs -->","tab-content":[{"id":0,"name":"About","content":"<img class=\"size-full wp-image-279747 alignleft\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/eventpage.jpg\" alt=\"eventpage\" width=\"144\" height=\"144\" \/>This summit brings together experts in academia and industry to discuss the problems facing the designers and managers of enterprise networks. Also, for the first time, we will sponsor a number of graduate students to attend the summit as a way to encourage research in this area as well as to provide them an opportunity to get technical feedback on their ideas from some of thought leaders in this space.\r\n\r\n<img class=\"alignnone size-full wp-image-279744\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/edgenetlogo-logistics.gif\" alt=\"edgenetlogo-logistics\" width=\"532\" height=\"71\" \/>\r\n<h2>Life at the Edge: Research and Practice in Corporate\/Campus Networks<\/h2>\r\n<h3>Description<\/h3>\r\nThis summit brings together experts in academia and industry to discuss the problems facing the designers and managers of enterprise networks. Also, for the first time, we will sponsor a number of graduate students to attend the summit as a way to encourage research in this area as well as to provide them an opportunity to get technical feedback on their ideas from some of thought leaders in this space.\r\n\r\nThe summit will be structured as an academic event - consisting of presentations, panel, and working group sessions as well as a poster and demo session. In our experience, this format allows for a high-degree of interactivity between participants as well as opportunities to dig deeply into specific topic areas.\r\n\r\nAmong the goals of this summit is to produce:\r\n<ul>\r\n \t<li>A list of the hard problems facing enterprise network IT staffs. We will take a stab at a research agenda that separates out the issues with near-term solutions from ones that require research or new approaches<\/li>\r\n \t<li>A description of the campus\/enterprise network scenarios that IT managers will have to support &amp; build up over the next 3-5 years.<\/li>\r\n \t<li>A list of the distinguishing characteristics of enterprise networks<\/li>\r\n<\/ul>\r\nOur hope is that, at the end of this meeting, all participants will have a much better understanding of the problems and will have made connections to other researchers and operators working on these issues.\r\n\r\nAlthough this summit is by invitation only, all presentations, position papers, and videos of talks and panels will be available for download on this web site shortly after the meeting is over.\r\n<ul>\r\n \t<li>The 2005 summit was on Self-Managing Networks<\/li>\r\n \t<li>The 2004 summit was on Mesh Networks<\/li>\r\n<\/ul>"},{"id":1,"name":"Technical Program","content":"<h2>Thursday, June 1<\/h2>\r\n<ul>\r\n \t<li>08:00 - 8:30 <strong>Breakfast<\/strong> (Falls Terrace Room)\r\nThe Salish mangers have requested that we use the external entrance to the Falls Terrace Room on Thursday, as there will be another group meeting in the Potlach room. If it is raining the valet will have umbrellas for our use.<\/li>\r\n \t<li>08:30 - 9:00 <strong>Welcome and Introductions<\/strong> (Salish Ballroom)<\/li>\r\n \t<li>09:00 - 10:00 <strong>Keynote<\/strong> (Salish Ballroom)\r\nKiril Tatarinov, VP Microsoft Windows &amp; Enterprise Management Division\r\n<b>Model-Based Management of Distributed Services<\/b> | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/kirillt-keynote-edgenet.ppt\" target=\"_self\">slides<\/a> | <a href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13573\/\">video<\/a><\/li>\r\n<\/ul>\r\n<p style=\"padding-left: 30px\">Traditional systems management has not been successful, and with ever-increasing scale, complexity and agility the problem keeps getting worse. The central problem is a lack of knowledge of the managed systems: what they are like, and what they should be like. We need formalized knowledge, in the form of system models, that allow automated management of deployment, configuration, security and operations. This knowledge must be captured already during the development phase, with models and policies refined and adjusted during the system\u2019s life cycle. Microsoft\u2019s industry-wide Dynamic Systems Initiative is aimed at providing infrastructure and tools for model-based management.<\/p>\r\n\r\n<ul>\r\n \t<li>10:00 - 10:15 <strong><strong>Break\r\n<\/strong><\/strong><\/li>\r\n \t<li>10:15 - 11:45 <strong>Issues in Enterprise Networks<\/strong> (Salish Ballroom)\r\n- Operator View Points - discussion of enterprise\/campus networks from the people that run them. | <a href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13574\/\">video<\/a>\r\n- Panel organized by Ken Klingenstein | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/klingenstein-edgenet.ppt\" target=\"_self\">slides<\/a>\r\n- Panelists: Terry Gray | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/gray-edgenet.ppt\" target=\"_self\">slides<\/a>, Jim Pepin, Mark Poepping<\/li>\r\n \t<li>11:45 - 12:45 <strong>Buffet Lunch<\/strong> (Falls Terrace room)<\/li>\r\n \t<li>12:45 - 14:15 <strong>Measuring and Monitoring Network Performance<\/strong> (Salish Ballroom)\r\nWhat do enterprise networks look like today, and what issues exist in monitoring them?\r\n<em>\r\nSpeakers:<\/em>\r\n- Richard Mortier - <b>Measuring and Monitoring Microsoft\u2019s Enterprise Network<\/b> | see\u00a0<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/mortier-edgenet.ppt\" target=\"_self\">slides<\/a> | <a href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13575\/\">video<\/a>\r\n- David Kotz - <b>Wireless Network Measurement Challenges<\/b> | see\u00a0<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/kotz-edgenet.pdf\" target=\"_self\">slides<\/a> | <a href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13576\/\">video<\/a>\r\n- Chas DiFatta, Mark Poepping - <b>The Case for Comprehensive Diagnostics<\/b> | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/difatta-edgenet.pdf\" target=\"_self\">slides<\/a> | <a href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13577\/\">video<\/a><\/li>\r\n \t<li>14:15 - 14:30 <strong>Break<\/strong>\r\n14:30 - 15:45 <strong>Poster Session<\/strong> (Vintage Room)\r\n- Posters and demos from students, researchers, and Microsoft architects\r\n- Abstracts and pictures of the posters available on the abstracts tab<\/li>\r\n \t<li>15:45 - 17:15 <strong>Working Session: Discussion of Problems\/Directions<\/strong> (Salish Ballroom)\r\nSession is intended to work towards the goals below. So that the breakout sessions capture the areas of interest\/excitement in the room, participants will suggest topics they want to lead a discussion on. Other participants will divide themselves among the topic leaders, and we will dynamically coalesce groups as needed. After discussions, which can extend into the evening, the group leader will make short presentation during the final session on Friday.\r\n<em>\r\nGoals:\r\n<\/em>- List hard problems facing enterprise network IT staffs, separating near-term issues from the ones that require research or new approaches.\r\n- Describe scenarios campus\/enterprise IT managers will have to support &amp; build over the next 3-5 years.\r\n- Define distinguishing characteristics of enterprise networks<\/li>\r\n \t<li>17: 15 - 18:30 <strong>Enterprise Security and Policy<\/strong> (Salish Ballroom)<em>Speakers\r\n<\/em>- Mark Ashida - <b>Customer Insight: CSO's Perspective on Network Policies<\/b> | see\u00a0<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/ashida-edgenet.ppt\" target=\"_self\">slides<\/a> | <a href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13578\/\">video<\/a>\r\n- Martin Casado - <b>The Protection Problem in Enterprise Networks<\/b>| see\u00a0<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/casado-edgenet.ppt\" target=\"_self\">slides<\/a> | <a href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13579\/\">video<\/a>\r\n- Jitu Padhye - <b>Managing Corporate WiFi Networks Using DAIR<\/b> | see\u00a0<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/padhye-edgenet.ppt\" target=\"_self\">slides<\/a> | <a href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13580\/\">video<\/a><\/li>\r\n \t<li>18:30 - 19:30 <strong>Walk down to the falls<\/strong><\/li>\r\n<\/ul>\r\n<h2>Friday June 2<\/h2>\r\n<ul>\r\n \t<li>09:00 - 10:15 Network Architectures and Network Design (Salish Ballroom)<em>Speakers\r\n<\/em>- David A. Maltz - <b>Problems and Solutions in Enterprise Network Control<\/b> | see\u00a0<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/maltz-edgenet.ppt\" target=\"_self\">slides<\/a> | <a href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13581\/\">video<\/a>\r\n- Aditya Akella - <b>New Directions in Enterprise Network Management<\/b> | see <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/akella-edgenet.ppt\" target=\"_self\">slides<\/a> | <a href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13582\/\">video<\/a>\r\n- Sharad Agarwal - <b>Is an Office Without Wires Feasible?<\/b> | see\u00a0<a href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13583\/\">video<\/a><\/li>\r\n \t<li>10:15 - 10:30 <strong><strong>Break<\/strong><\/strong><\/li>\r\n \t<li>10:30 - 12:00 <strong>Services and Management<\/strong> (Salish Ballroom)<em>Speakers<\/em>\r\n- Tzi-cker Chiueh - <b>Virtual LAN as a Network Control Mechanism <\/b>| see <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/chiueh-edgenet.ppt\" target=\"_self\">slides<\/a> | <a href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13584\/\">video<\/a>\r\n- Ken Birman - <b>Pushing Group Communication to the Edge Will Enable Radically New Distributed Applications<\/b> | see\u00a0<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/birman-edgenet.ppt\" target=\"_self\">slides<\/a> | <a href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13585\/\">video<\/a>\r\n- Dinesh Verma - <b>Experiences Managing Networks in IBM HPC Grid Infrastructure and Enterprise VoIP<\/b> | see\u00a0<a href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13586\/\">video<\/a>\r\n- Anders Vinberg - <b>A Data Model for Policy<\/b> | see\u00a0<a href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13587\/\">video<\/a><\/li>\r\n \t<li>12:00 - 13:00 <strong>Lunch<\/strong> (Falls Terrace room)<\/li>\r\n \t<li>13:00 - 14:15 <strong>Diagnosis<\/strong> (Salish Ballroom)<em>Speakers<\/em>\r\n- Nick Feamster - <b>Campus and Personal Network Troubleshooting<\/b> | see <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/feamster-edgenet.ppt\" target=\"_self\">slides<\/a> | video\r\n- Yin Zhang - <b>Experimental Design for Flexible Network Diagnosis<\/b> | see <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/yzhang-edgenet.ppt\" target=\"_self\">slides<\/a> | <a href=\"http:\/\/content.digitalwell.washington.edu\/msr\/external_release_talks_12_05_2005\/13589\/\">video<\/a>\r\n- Albert Greenberg - <b>Managing Data for Diagnosis<\/b> | see\u00a0<a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/greenberg-edgenet.ppt\" target=\"_self\">slides<\/a><\/li>\r\n \t<li>14:15 - 16:00 <strong>Presentations of ideas from break out sessions and critiques<\/strong> (Salish Ballroom)<\/li>\r\n<\/ul>\r\n<p style=\"padding-left: 30px\">Each break out group will give a short presentation of their ideas. These presentations will be followed by comments from a critique panel whose panelists will describe their reactions to the ideas in the breakout presentations and the other sessions.<\/p>\r\n<p style=\"padding-left: 30px\"><em>Breakout session Reports:\r\n<\/em>- Data Sharing and Repositories to Support Research | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/rao-data-sharing-breakout-report.ppt\" target=\"_self\">slides<\/a>\r\n- Isolation in Networks | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/birman-isolation-breakout-report.ppt\" target=\"_self\">slides<\/a>\r\n- Models in Management | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/verma-models-breakout-report.ppt\" target=\"_self\">slides<\/a>\r\n- Network Automation | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/feamster-automation-breakout-report.ppt\" target=\"_self\">slides<\/a><\/p>\r\n<p style=\"padding-left: 30px\">- Critique panelists\r\n- Tom Anderson\r\n- Fred Barker | <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2016\/08\/baker-edgenet.ppt\" target=\"_self\">slides<\/a><\/p>"},{"id":2,"name":"Abstracts","content":"<h2>Poster Abstracts<\/h2>\r\n[accordion]\r\n\r\n[panel header=\"Yu-Chung Cheng\"]\r\n\r\n<b>Jigsaw: Solving the Puzzle of Enterprise 802.11 Analysis<\/b>\r\n\r\nThe combination of unlicensed spectrum, cheap wireless interfaces and the inherent convenience of untethered computing has made 802.11-based networks ubiquitous in the enterprise. Modern universities, corporate campuses and government offices routinely deploy scores of access points to blanket their sites with wireless Internet access. However, while the fine-grained behavior of the 802.11 protocol itself has been well studied, our understanding of how large 802.11 networks behave in their full empirical complexity is surprisingly limited. In this paper, we present a system called Jigsaw that uses multiple monitors to provide a single unified view of all physical, link, network and transport-layer activity on an 802.11 network. To drive this analysis, we have deployed an infrastructure of over 170 radio monitors that simultaneously capture all 802.11b and 802.11g activity in a large university building (1M+ cubic feet). We describe the challenges posed by both the scale and ambiguity inherent in such an architecture, and explain the algorithms and inference techniques we developed to address them.\r\n\r\nSo far, we have used Jigsaw's global cross layer viewpoint to resolve wireless problem tickets and isolate performance artifacts , both explicit, such as management inefficiencies, and implicit, such as co-channel interference. Surprisingly many wireless problems involve the wired infrastructure such as DoS attacks by mis-behaving clients. Others include microwave interferences, slow 802.11 roaming, access points bugs, etc. We believe this is the first analysis combining this scale and level of detail for a real production network.\r\n\r\nMore at <a href=\"http:\/\/wireless.ucsdsys.net\">http:\/\/wireless.ucsdsys.net<\/a>\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Ranveer Chandra, Venkat Padmanabhan, Ming Zhang\"]\r\n\r\n<b>WiFiProfiler: Cooperative Diagnosis in Wireless LANs <\/b>\r\n\r\nWhile 802.11-based wireless hotspots are proliferating, users often have little recourse when the network does not work or performs poorly for them. They are left trying to manually debug the problem, which can be a frustrating and disruptive process. The users' troubles are compounded by the absence of network administrators or an IT department to turn to in many 802.11 hotspot settings (e.g., cafes, airports, conferences).\r\n\r\nWe present WiFiProfiler, a system in which wireless hosts cooperate to diagnose and possibly resolve network problems in an automated manner, without requiring any infrastructural support. The key observation is that even if a host's wireless link to an access point is not working, the host is often within the range of other wireless nodes and is in a position to communicate with them (a little) peer-to-peer. We leverage this ability to create a shared information plane, which enables wireless hosts to exchange a range of information about their network settings and the health of their network connectivity. By aggregating and correlating such information across multiple wireless hosts, we infer the likely cause of the problem. Our implementation on Windows XP shows that WiFiProfiler is effective in diagnosing a range of problems and imposes a low overhead on the participating hosts.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Dave Thaler, Tin Qian\"]\r\n\r\n<b>Network Diagnostics in Windows Vista<\/b>\r\n\r\nComputer networking has become increasingly important and pervasive in people\u2019s daily life. On the other hand, the networks are getting more and more complex in terms of the size and topology, the mix of technology involved, and the number of applications\/services supported. How to make networking a reliable and painless experience for 300+ million windows users has become a pressing yet extremely challenging task. Windows Vista introduces an innovative network diagnostics framework that provides an extensible diagnostics platform aiming at helping non-technical windows users\u2019 trouble shooting network problems in an intuitive and interactive fashion. It defines a general trouble shooting programming model for integrates various trouble-shooting logics for different network components. To support a simple and intuitive user experience, it focuses on in-context diagnosis where the trouble-shooting process is done interactively within the context of user\u2019s network usage. Moreover, computer networking is an area where rapid technology advancement is being made constantly. To effectively cope with the ever changing network issues, the network diagnostics framework in Vista incorporates a full feedback mechanism via SQM\/WER to help quickly identifying and responding to new top network pain areas. Its built-in extensibility model also enable 3rd IHVs\/ISVs to provide trouble-shooting value-adds seamlessly to the windows diagnostics experience.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Hitesh Ballani, Paul Francis\"]\r\n\r\n<b>CONMan: Taking the complexity out of Network Management<\/b>\r\n\r\nNetwork management is difficult, costly, and error prone, and this is becoming more so as the network complexity increases. We argue that this is an outcome of two fundamental \ufb02aws in the existing architecture: the management plane depends on the data plane and the complexity of the ever-evolving data plane en- cumbers the management plane. Consequently, addressing these flaws can make the network amenable to management.\r\n\r\nWe present Complexity Oblivious Network Management (CONMan), a network architecture in which the management plane does not depend on the data plane and all data plane protocols expose a generic management interface. This restricts the operational complexity of protocols to their implementation and allows the management plane to achieve high level policies in a structured fashion. Our preliminary experience with building the CONMan interface of a couple of protocols and using them for real world management tasks indicates the architecture\u2019s potential to alleviate the management troubles of the Internet.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Eric Rozner, Yogita Mehta, Aditya Akella, Lili Qiu\"]\r\n\r\n<b>Traffic-Aware Channel Assignment in Wireless LANs<\/b>\r\n\r\nThe importance of channel assignment in wireless LANs has been long recognized and has attracted significant research attention. Despite much recent progress, several important challenges still remain: First, what is the right \"performance metric\" to optimize for? Most existing approaches to channel assignment try to minimize the number of mutually-interfering APs. However it is not clear if this metric accurately reflects client performance. Second, to what extent is the quality of channel assignment improved by incorporating the observed traffic demands at APs and clients? Recent work in IP traffic engineering has shed light on the tremendous effectiveness of using traffic demands in network engineering decisions. However, to date, no approach to channel assignment has taken traffic demands into account.\r\n\r\nIn this work, we conduct simulations over publicly-available wireless traffic traces, to study the relative efficacy of different optimization metrics in tracking client performance. We show that being \"traffic-aware\" could substantially improve the overall quality of a channel assignment, irrespective of the metric employed. We also examine the effect of incomplete traffic information on the quality of a channel assignment. Finally, we develop and evaluate a preliminary set of practical traffic-aware assignment algorithms that predict future demands based on historical information and use the predicted demands for assigning channels.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Hemant Rokesh, Hui Zhang\"]\r\n\r\n<b>4D on NetFPGA<\/b>\r\n\r\nThe project aims to demonstrate how 4D can be used to effectively manage data networks. The low cost NetFPGA platform is used to build an experimental network that is configured, controlled and managed as per the 4D architecture.\r\n\r\nThe 4D architecture is a clean slate approach to network control. It is guided by the following three principles: Network-level objectives, network-wide views, direct control. 4D realizes these principles by decomposing the functions of network control into 4 planes. A decision plane that is responsible for creating a network configuration (e.g. computing FIBs for each router in the network); a dissemination plane that gathers information about network state (e.g. link up\/down information) to the decision plane, and distributes decision plane output to routers; a discovery plane that enables devices to discover their directly connected neighbors; and a data plane for forwarding network traffic.\r\n\r\nIn this project we want to explore the practical difficulties and implementation specific challenges that arise in using 4D to control real network devices. A few aspects we are interested in looking into are-\r\n(a.) How quickly does 4D react to link and device failures in practice\r\n(b.) Can 4D implement advanced functionalities (like FRR, VLANs) in the data-plane when traffic is injected at full line-rate\r\n(c.) How effective is 4D in controlling heterogeneous (IP plus Ethernet)\r\n(d.) Is the 4D architecture\/interfaces simple enough to be implemented on low-cost memory constrained switches?\r\nFor addressing these issues, we wish to build and deploy the 4D NetFPGA infrastructure in a real network like a data-center.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Ratul Mahajan\"]\r\n\r\n<b>Wit: Analyzing the MAC-level Behavior of Wireless Networks in the Wild<\/b>\r\n\r\nWit is a tool to understand the detailed MAC-level behavior of wireless networks. It takes as input data that is acquired only through passive sniffing, and so can be used to evaluate live systems. Wit is based on several novel techniques. A robust merging technology combines the inevitably incomplete views of individual sniffers into a single, more complete trace of wireless activity. An inference engine based on formal language methods fills in still missing packets and annotates each packet with information, such as whether it was received by its intended recipient. This annotated data enables several new kinds of analyses. We have devised, for instance, a technique to estimate the number of stations competing for the medium at each moment.\r\n\r\nWe have used Wit over multi-sniffer traces collected at a well-attended academic conference to understand how 802.11 performs in such deployments. We uncovered several MAC-layer characteristics, which to our knowledge, cannot be inferred using other currently available techniques. We find transmissions from clients to APs were usually more reliable than those in the other direction. The network was dominated by periods of low contention even during busy periods of the day. The medium utilization was highly inefficient in the common case of low contention, but network performance did not degrade during periods of high contention.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Changhoon Kim, Jennifer Rexford\"]\r\n\r\n<b>Joint Analysis of Layer-2 and Layer-3 Configuration in Enterprise Networks <\/b>\r\n\r\nManaging enterprise networks is challenging because of the complex interaction between IP and the underlying layer-2 technologies. For example, many enterprises make heavy use of virtual LANs (VLANs) to contain broadcast traffic and apply access-control policies. A single VLAN may span multiple physical links, and a single physical link may carry traffic for multiple VLANs, making it difficult to study an individual VLAN or link in isolation. In addition, middleboxes, such as firewalls and traffic shapers, may transparently drop or delay traffic based on fields in the IP packet header, which can blur the symptoms and origins of a problem. Understanding both the layer-2 and layer-3 configuration of an enterprise network is crucial for detecting, diagnosing, and fixing performance and reachability problems.\r\n\r\nDespite years of research on inferring network topologies and diagnosing performance problems in backbone networks, the unique challenges introduced by layer-2 technologies in enterprise networks have received limited attention. The goal of our research is to create techniques for diagnosing cross-layer problems in enterprise networks. Initially, we focus on \"white-box\" approaches where we jointly analyze the configuration of layer-2 devices (such as switches and middleboxes) and the routers in operational networks. First, we plan to characterize the use of VLANs in several operational networks, using the Princeton campus network and our department's network as a starting point. Moving beyond characterization, we hope to create analysis techniques for identifying configuration mistakes and inefficient mappings between the layer-3 and layer-2 topologies. Then, we plan to join the configuration data with traffic and performance measurements to guide the detection and diagnosis of problems.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Paul Barham, Moises Goldszmidt, Rebecca Isaacs, John MacCormick, Richard Mortier\"]\r\n\r\n<b>Constellation: an Application-level Traceroute<\/b>\r\n\r\nConstellation is an infrastructure for distributed anomaly detection and diagnosis. Each host in the constellation constructs a probabilistic model of its own traffic using annotated packet arrival and departure times. When the user, or their agent, notices that something is wrong, the local host performs self-diagnosis before propagating the diagnosis request to its set of \u201clikely suspects\u201d, who in turn repeat the process. This packet-level approach allows detailed inter-service temporal relationships to be captured in the model \u2013 for example, the dependency of an email service on an authentication service. Constellation is early work that explores some novel machine learning techniques, and applies them to packet traces containing real-world inter-service dependencies from Microsoft\u2019s corporate network.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Ajay Mahimkar, Jasraj Dange, Vitaly Shmatikov, Harrick M. Vin, Yin Zhang\"]\r\n\r\n<b>Transparent Network-based DoS Mitigation<\/b>\r\n\r\nDenial of service (DoS) attacks are a growing threat to the availability of Internet services. We present dFence, a novel DoS mitigation system that is completely transparent to the existing Internet infrastructure and requires no software modification at either routers, or end hosts. The core of dFence is a coalition of network-based, on-demand middleboxes. Middleboxes are introduced into the data path dynamically and transparently via standard intra-ISP routing mechanisms, intercept both directions of IP traffic (to and from attacked hosts), and apply stateful policies to mitigate a broad range of spoofed and unspoofed attacks. We describe the architecture of the middlebox, including defenses against DoS attacks on the middlebox itself, as well as on-demand introduction and removal mechanisms. The implementation is evaluated using a prototype testbed based on Intel IXP network processors.\r\n\r\n[\/panel]\r\n\r\n[\/accordion]\r\n<h2>Talk Abstracts<\/h2>\r\n[accordion]\r\n\r\n[panel header=\"Measuring and Monitoring Enterprise Networks\"]\r\n\r\nChas DiFatta, Mark Poepping - <b>The Case for Comprehensive Diagnostics<\/b>\r\n\r\nThe Internet has achieved great creative success, opening our eyes to radically new communication capabilities and distributed control opportunities. Yet for all the critical and commercial success of the past twenty years, we remain essentially unable to quantify or trace the actions of services and devices on the network. The Internet is a maelstrom of packets and protocols, an infrastructure built to speed it all along to quick completion, but constructed without detailed measures, without consistency of metrics or traces, with no visibility into how it's operating.\r\n\r\nWhen there is a perceived problem with an application or supported service, a diagnostician must have the tools and information at their disposal to pinpoint the problem with reasonable certainty, in hopes of avoiding the problem in the future.\r\n\r\nWe propose creating a new capability, one to collect, manage, and correlate log and diagnostic event information to not only enable investigation of problems, but that can also support validation of correct operation in complex networked systems. If realized, the resulting capabilities will provide the visibility to understand, control and validate essential operation in the computing environments we increasingly rely upon.\r\n\r\n<hr \/>\r\n\r\nRichard Mortier - <b>Measuring and Monitoring Microsoft\u2019s Enterprise Network<\/b>\r\n\r\nIn this talk I will describe some recent work at MSR Cambridge to measure Microsoft's enterprise network as seen from our site. I will describe our collection method, the problems we faced, and the solutions we implemented. I will describe the data we collected, totalling 13TB of network traffic, to give a flavour of the traffic on our enterprise network in aggregate, per-application and per-host. Finally, I will use OSPF data to outline the topological properties of the network in which our site resides. In summary, we find that there is extreme volatility in application traffic both temporally and spatially (i.e. over time and between hosts); the application mix is significantly different to prior studies of Internet backbone traffic and university campus traffic; and the network is quite stable. This was joint work with Rebecca Isaacs and Dinan Gunawardena, with additional analysis from Laurent Massoulie and Peter Key.\r\n\r\n<hr \/>\r\n\r\nDavid Kotz - <b>Wireless Network Measurement Challenges<\/b>\r\n\r\nWireless networks, including Wi-Fi infrastructure and mesh networks, are becoming ubiquitous. It is critical to measure these networks to gain a better understanding of the traffic on the networks, the way they are used, and the response of the networks to different traffic patterns. It is also important to monitor operational wireless networks to improve security, capacity planning, and trouble shooting. Wireless networks pose unique challenges to measurement, however. In this talk I survey some of these challenges and describe some of the efforts underway to improve our ability to measure and monitor operational wireless networks.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Enterprise Security and Policy\"]\r\n\r\nMark Ashida - <b>Customer Insight: CSO's Perspective on Network Policies <\/b>\r\n\r\nMartin Casado - <b>The Protection Problem in Enterprise Networks<\/b>\r\n\r\nAttempts to retrofit access controls into enterprise networks have met with varied success. Often doing so has a deleterious effect, resulting in complex, brittle networks that are engineered around choke-points. In this talk, I will discuss what protection properties are desired by enterprise environments today, how existing solutions that try to approximate them fall short, and how those solutions often have negative, unintended consequences.\r\n\r\n<hr \/>\r\n\r\nJitu Padhye - <b>Managing Corporate WiFi Networks Using DAIR<\/b>\r\n\r\nWe present a framework for monitoring and managing enterprise wireless networks using desktop infrastructure. The framework is called DAIR, which is short for Dense Array of Inexpensive Radios.\r\n\r\nPrior proposals in this area include monitoring the network via a combination of access points (APs), mobile clients, and dedicated sensor nodes. We show that a dense deployment of sensors is necessary to effectively monitor Wi-Fi networks, and one can not accomplish this using access points alone. An ordinary, single-radio AP can not monitor multiple channels effectively, without adversely impacting the associated clients. Moreover, we show that a typical deployment of access points is not sufficiently dense for several management tasks, particularly those related to security. Due to power constrain mobile devices can provide only limited assistance in monitoring wireless networks. Deploying a dense array of dedicated sensor nodes is an expensive proposition.\r\n\r\nOur solution is based on two simple observations. First, in most enterprise environments, one finds plenty of desktop machines with good wired connectivity, and spare CPU and disk resources. Second, inexpensive USB-based wireless adapters are commonly available. By attaching these adapters to desktop machines, and dedicating the adapters to the task of monitoring the wireless network, we create a low cost management infrastructure.\r\n\r\nWe describe how several common wireless network management tasks can use the DAIR platform. As a demonstrative example, we consider the task of detecting rogue APs, and describe how the DAIR platform can be leveraged to carry out this task effectively.\r\n\r\n<hr \/>\r\n\r\nAntonio Nucci - <b>How to Build a Carrier-Grade Defense-Shield<\/b>\r\n\r\n<i>Dr. Nucci will be unable to attend due to a family emergency<\/i>\r\n\r\nIn this talk, Dr. Antonio Nucci, Chief Technology Officer at Narus Inc, will highlight the major shifts in the security market over the past few years, discuss the dynamics of the security threats and the emerging interest of Internet Service Providers to play a key role in this market. He will then introduce the requirements of this new emerging type of security and present a new preventative technology based on Information Entropy, also known as Carrier-Class Defense-Shield, that will help large high-speed ISP to efficiently defend their network perimeters from the most invasive and deadly threads.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Network Architectures and Network Design\"]\r\n\r\nDavid A. Maltz - <b>Problems and Solutions in Enterprise Network Control<\/b>\r\n\r\nEnterprise networks today are fundamentally complex, as they bring together a heterogeneous collection of hosts and network devices, ranging from security cameras, to Ethernet switches, to IP routers, to storage networks. The designers of these networks are often called upon to implement sophisticated policies for reasons of security, load balancing, or reliability. This talk will give an overview of the problem space and describe an architectural change that aims to improve the manageability of enterprise networks by eliminating much of the complexity.\r\n\r\n<hr \/>\r\n\r\nAditya Akella - <b>New Directions in Enterprise Network Management<\/b>\r\n\r\nIn this talk, we will review current and past techniques for managing and trouble-shooting enterprise networks, and their drawbacks and limitations. Furthermore, we will review initial ideas for an alternate Layer-2 architecture for connectivity and communication in enterprise networks that vastly simplifies management tasks.\r\n\r\n<hr \/>\r\n\r\nSharad Agarwal - <b>Is an Office Without Wires Feasible?<\/b>\r\n\r\nA wireless office is an office without wired Ethernet connectivity, or rather, one with the least number of machines connected by wires. What happens if we re-design the network in an office \u2013 remove all the network infrastructure (wireless APs, switches, routers, etc.), replace the Ethernet wires to every desktop and server with IEEE 802.11, and maintain a very small number of \u201cgateway\u201d machines for access to the wired corporate intranet and the Internet?\r\n\r\nWe evaluated the feasibility of a mesh network for an all-wireless office using traces of 11 office users spanning over a month and an actual 21-node multi-radio mesh testbed in an office area. Unlike previous mesh studies that have examined routing design in detail, we examine how different office mesh design choices impact the performance of user traffic. We find that the performance on our mesh network depends on the combination of routing metric, user-server placement, traffic load, wireless hardware and wireless settings. While clearly it is possible to overwhelm typical wireless networks, we conclude that for our traces and deployed system, all-wireless office meshes are feasible. In most cases, individual transactions incur under 20ms of additional delay over the mesh network. We believe this is an acceptable delay for most applications where a wired network to every machine is not readily available. We argue that our results are scalable to a network of over 100 users.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Services and Management\"]\r\n\r\nKen Birman - <b>Pushing Group Communication to the Edge will Enable Radically New Distributed Applications<\/b>\r\n\r\nAdvances in scalable group communication, fusing classical group communication protocols with new P2P ideas, are about to transform communication options for application developers. Modern platforms make it easy to implement group communication at the same layer where we support remote method invocation. Thus, we\u2019ll suddenly be in a position to present groups to users as shared live files (or other kinds of objects), publish-subscribe topics, or even distributed shared memory. Supporting the abstraction with solutions that scale well, are robust under stress, and that can be secured will enable a\r\nrevolutionary advances for a tremendous range of applications that have been bogged down by the highly restrictive communication options available today. Cornell University\u2019s Quicksilver platform, developed by PhD student Krzys Ostrowski, will soon be available for download from <a href=\"http:\/\/www.cs.cornell.edu\/projects\/quicksilver\/\">http:\/\/www.cs.cornell.edu\/projects\/quicksilver\/<\/a>.\r\n\r\n<hr \/>\r\n\r\nTzi-cker Chiueh - <b>Virtual LAN as a Network Control Mechanism<\/b>\r\n\r\nModern Ethernet switches, even low-end ones, come with various advanced features such as IGMP snooping, VLAN, class-based traffic prioritization, host access control, etc. Most of these features can be configured either through standard SNMP commands or through normal packets. Although these features were originally designed for network provisioning at deployment time, there is no reason why they could not be used as dynamic control mechanisms at run time. In the past several years, we have been trying to leverage one of these features, VLAN, as a network resource management primitive, and apply it to\r\nMetro ethernets, storage area networks, and cluster interconnects. This talk will describe the important ideas in these efforts.\r\n\r\n<hr \/>\r\n\r\nDinesh Verma - <b>Experiences Managing Networks in IBM HPC Grid Infrastructure and Enterprise VoIP<\/b>\r\n\r\nIn this talk, we will discuss the problems and issues that were encountered in managing the network infrastructure for High Performance Computing infrastructure centers that were established as a part of the IBM on Demand and Grid Computing initiatives. We would identify the problems that were encountered in managing and automating the management infrastructure of the network. We would also discuss the experiences gained from the management of VoIP infrastructure as it was rolled out in the IBM Research intranet, and some of the challenges encountered in managing the VoIP infrastructure as it is operational today.\r\n\r\n<hr \/>\r\n\r\nAnders Vinberg - <b>A Data Model for Policy<\/b>\r\n\r\nPolicy is the foundation for self-managing systems, IT control and governance\/compliance monitoring. How do we design a policy language, or policy schema, that is rich enough to be useful but simple enough to be amenable to analysis? How do we validate that policy matches intent, how do we understand how policies interact, how do we understand impact of a policy change?\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Diagnosis\"]\r\n\r\nNick Feamster - <b>Troubleshooting Campus Networks<\/b>\r\n\r\nThis talk presents an overview of the problems we are tackling in helping network operators debug firewall, switch, and router configurations on a large campus network. Today, campus network operators have a preliminary set of tools to help them spot potential inconsistencies and errors, but they have no recourse when the actual network behavior is inconsistent with the behavior suggested by static configuration analysis. We present some examples of configuration challenges faced by campus network operators, propose possible roles for static and dynamic analysis for fault detection and troubleshooting, and describe some preliminary experience using a deployed active monitoring system on a major research and administrative network with 60,000 nodes, 160 buildings across 4 campuses, and 130 firewalls.\r\n\r\n<hr \/>\r\n\r\nYin Zhang - <b>Experimental Design for Flexible Network Diagnosis<\/b>\r\n\r\nAlbert Greenberg - <b>Managing Data for Diagnosis<\/b>\r\n\r\n[\/panel]\r\n\r\n[\/accordion]"},{"id":3,"name":"Participants","content":"[accordion]\r\n\r\n[panel header=\"Academia\"]\r\n<ul>\r\n \t<li>Aditya Akella University of Wisconsin, Madison<\/li>\r\n \t<li>Tom Andersen University of Washington<\/li>\r\n \t<li>Suman Banerjee University of Wisconsin, Madison<\/li>\r\n \t<li>Kenneth Birman Cornell University<\/li>\r\n \t<li>Tzi-cker Chiueh StonyBrook University<\/li>\r\n \t<li>Chas DiFatta Carnegie Mellon University\/PI Project EDDY<\/li>\r\n \t<li>Nicholas Feamster Georgia Tech<\/li>\r\n \t<li>Paul Francis Cornell University<\/li>\r\n \t<li>Terry Gray University of Washington \/ VP IT Infrastructure<\/li>\r\n \t<li>Dina Katabi MIT<\/li>\r\n \t<li>Kenneth Klingenstein University of Colorado \/ Chief Technologist<\/li>\r\n \t<li>David F. Kotz Dartmouth College<\/li>\r\n \t<li>James Pepin USC \/ CTO<\/li>\r\n \t<li>Mark G. Poepping Carnegie Mellon University\/Internet2\/Director of Network Architecture<\/li>\r\n \t<li>Sanjay Rao Purdue University<\/li>\r\n \t<li>Hui Zhang Carnegie Mellon University<\/li>\r\n \t<li>Yin Zhang UT Austin<\/li>\r\n<\/ul>\r\n[\/panel]\r\n\r\n[panel header=\"Industry\"]\r\n<ul>\r\n \t<li>Fred Baker Cisco<\/li>\r\n \t<li>Albert Greenberg AT&amp;T<\/li>\r\n \t<li>Graham Holmes Cisco<\/li>\r\n \t<li>Antonio Nucci Narus \/ CTO<\/li>\r\n \t<li>Nina Taft Intel Research Dinesh Verma IBM<\/li>\r\n<\/ul>\r\n[\/panel]\r\n\r\n[panel header=\"Microsoft Research\"]\r\n<ul>\r\n \t<li>Sharad Agarwal Researcher<\/li>\r\n \t<li>Victor Bahl Principal Researcher<\/li>\r\n \t<li>Ranveer Chandra Researcher<\/li>\r\n \t<li>Sailesh Chutani Director, External Research Program<\/li>\r\n \t<li>Rich Draves Systems and Networking Research Area Manager<\/li>\r\n \t<li>Rebecca Isaacs Researcher (Cambridge)<\/li>\r\n \t<li>Jim Kajiya General Manager<\/li>\r\n \t<li>Dan Ling Vice President<\/li>\r\n \t<li>Ratual Mahajan Researcher<\/li>\r\n \t<li>Dave Maltz Researcher<\/li>\r\n \t<li>Richard Mortier Researcher (Cambridge)<\/li>\r\n \t<li>Geoffry Nordlund Sr Systems Analyst<\/li>\r\n \t<li>Jitu Padhye Researcher<\/li>\r\n \t<li>Venkat Padmanabhan Senior Researcher<\/li>\r\n \t<li>Rick Rashid Senior Vice President<\/li>\r\n \t<li>Stewart Tansley Program Manager<\/li>\r\n \t<li>Alec Wolman Researcher<\/li>\r\n \t<li>Ming Zhang Researcher<\/li>\r\n \t<li>Brian Zill Research Software Development Engineer<\/li>\r\n<\/ul>\r\n[\/panel]\r\n\r\n[panel header=\"Microsoft Research Interns and Graduate Students\"]\r\n<ul>\r\n \t<li>Francisco Alvarez ITESM<\/li>\r\n \t<li>Hitesh Ballani Cornell University<\/li>\r\n \t<li>Martin Casado Stanford University<\/li>\r\n \t<li>Yu-Chung Cheng UCSD<\/li>\r\n \t<li>Tulika Garg IIT<\/li>\r\n \t<li>Hemant Rokesh Gogineni Carnegie Mellon University<\/li>\r\n \t<li>Srikanth Kandula MIT<\/li>\r\n \t<li>Changhoon Kim Princeton University<\/li>\r\n \t<li>Lun Li Caltech<\/li>\r\n \t<li>Ajay Mahimkar UT Austin<\/li>\r\n \t<li>Rohan Murthy Harvard University<\/li>\r\n \t<li>Eric Rozner UT Austin<\/li>\r\n<\/ul>\r\n[\/panel]\r\n\r\n[panel header=\"Microsoft Windows Networking Division\"]\r\n<ul>\r\n \t<li>Mark Ashida General Manager<\/li>\r\n \t<li>Abolade Gbadegesin Transports &amp; Connectivity \/ Architect<\/li>\r\n \t<li>Jawad Khaki Vice President<\/li>\r\n \t<li>Tim Muss Product Planner<\/li>\r\n \t<li>Tin Qian Development Lead<\/li>\r\n \t<li>Dave Thaler Transports &amp; Connectivity \/ Architect<\/li>\r\n<\/ul>\r\n[\/panel]\r\n\r\n[panel header=\"Microsoft Windows &amp; Enterprise Management Division\"]\r\n<ul>\r\n \t<li>Ashvin Sanghvi Architect<\/li>\r\n \t<li>Kirill Tatarinov Vice President<\/li>\r\n \t<li>Anders Vinberg Architect<\/li>\r\n<\/ul>\r\n[\/panel]\r\n\r\n[panel header=\"Microsoft RTC Product Group HC\"]\r\n<ul>\r\n \t<li>Gurdeep Singh Pall Vice President<\/li>\r\n<\/ul>\r\n[\/panel]\r\n\r\n[\/accordion]"},{"id":4,"name":"White Papers","content":"<h2>Related Efforts<\/h2>\r\nReconnections: Managing Academic Networks With New Requirements\r\n\r\nA <a href=\"http:\/\/security.internet2.edu\/rtp\">two day workshop<\/a> was held on October 25-26, 2005 in Chicago, on \"a needs assessment for next-generation network cyberinfrastructure.\" Output includes a <a href=\"http:\/\/security.internet2.edu\/rtp\/docs\/internet2-reconnections-proceedings-200603.html\">final report<\/a> and an <a href=\"http:\/\/security.internet2.edu\/rtp\/docs\/internet2-reconnections-executive-overview-200605.html\">executive summary<\/a>.\r\n\r\n4D Architecture for Control and Management\r\n\r\nThe <a href=\"http:\/\/www.cs.cmu.edu\/~4d\">4D architecture<\/a> is a clean-slate approach to simplifying network control and management by refactoring functionality to eliminate the sources of complexity seen in today's network."}],"msr_startdate":"2006-06-01","msr_enddate":"2006-06-02","msr_event_time":"","msr_location":"Snoqualmie, WA, US","msr_event_link":"","msr_event_recording_link":"","msr_startdate_formatted":"June 1, 2006","msr_register_text":"Watch now","msr_cta_link":"","msr_cta_text":"","msr_cta_bi_name":"","featured_image_thumbnail":null,"event_excerpt":"This summit brings together experts in academia and industry to discuss the problems facing the designers and managers of enterprise networks. Also, for the first time, we will sponsor a number of graduate students to attend the summit as a way to encourage research in this area as well as to provide them an opportunity to get technical feedback on their ideas from some of thought leaders in this space. Life at the Edge: Research&hellip;","msr_research_lab":[199565],"related-researchers":[],"msr_impact_theme":[],"related-academic-programs":[],"related-groups":[],"related-projects":[],"related-opportunities":[],"related-publications":[],"related-videos":[],"related-posts":[],"_links":{"self":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/279735","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-event"}],"about":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-event"}],"version-history":[{"count":2,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/279735\/revisions"}],"predecessor-version":[{"id":1147287,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/279735\/revisions\/1147287"}],"wp:attachment":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/media?parent=279735"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=279735"},{"taxonomy":"msr-region","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-region?post=279735"},{"taxonomy":"msr-event-type","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-event-type?post=279735"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=279735"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=279735"},{"taxonomy":"msr-program-audience","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-program-audience?post=279735"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=279735"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=279735"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}