|
Net-Con’2004 |
|
IFIP TC6 Conference
Sponsored by the following IFIP Working
Groups:
WG6.2 (Network
and Internetwork Architectures)
WG6.6 (Management
of Networks and Distributed Systems)
WG6.7 (Smart
Networks)
WG6.8 (
Organised by the Universitat
de les Illes Balears
November
2 – 5, 2004
GENERAL CHAIR R. Puigjaner, Universitat de les Illes
Balears (ES)
PROGRAM CO-CHAIRS D. Gaïti, Université Technique de Troyes (FR)
S.
Galmés , Universitat de les Illes Balears (ES)
STEERING COMMITTEE A.
Casaca, INESC (PT)
A.A.
Lazar,
Al-Naamany,
O.
Martikainen, Micsom (SF)
G.
Pujolle, LIP6 (FR)
J. Slavik, Testcom (CZ)
O. Spaniol, RWT Aachen (DE)
TUTORIAL CHAIR J.-L. Ferrer, Universitat de les Illes
Balears (ES)
FINANCIAL CHAIR B. Serra, Universitat de les Illes
Balears (ES)
PROGRAM COMMITTEE A.
Al-Naamany,
F. Arve Aagesen,
G. Bianchi, Universita di Palermo (IT)
A. Benzekri, Université Paul Sabatier
(FR)
C. Blondia, Univestiy of Antwerpen (BE)
R.
Boutaba,
A. Casaca, INESC (PT)
O.
Cherkaoui, UQAM (CA)
P.
Cuenca, Universidad de Castilla La Mancha (ES)
W. Dabbous, INRIA (FR)
F.
Davoli, Univesita di Genova (IT)
J. Domingo, Universitat Politècnica Catalunya (ES)
O.
Duarte, Universidade Federal de Rio de Janeiro (BR)
A.
El Sherbini, National Telecommunication Institute EG)
J.
Escobar, Centauritech (PA)
L.
Fratta, Politecnico de
G.
Haring, Wien Univeristät (AT)
D.-Y. Hu,
L. Huguet, Universitat de les Illes
Balears (ES)
V. B. Iversen,
F. Kamoun, Université La Manouba (TU)
U.
Korner, Lund University (SE)
G.
Leduc, Université de Liège (BE)
G. Omidyar, Institute for Communications Research
(SG)
G.
Pacifici, IBM, (US)
H.
G. Pujolle (LIP6 (FR)
F.
J. Quiles, Universidad de Castilla La Mancha (ES)
R. Reda, Siemens AG (DE)
T. Saito, Toyota (JP)
B.
Serra, Universitat de les Illes Balears (ES)
J. Slavik, Testcom (CZ)
O.
Spaniol, RWT Aachen (DE)
Y. Stavrakakis, Universtiy of
Y.
Takahashi,
F.
Tobagi,
I.
Furió, Universitat de les Illes Balears (ES)
M.
Payeras, Universitat de les Illes Balears (ES)
LOCATION
The sessions will be held
at the Conference room (Sala d’Actes) of the Guillem Cifre de Cologna
building in the UIB campus (Valldemossa road km 7.5).
TRANSPORTATION
A bus will pick up the
conference attendees at the official hotels at
TUTORIALS
T-1
Internet Multimedia Applications:
Challenges and Design
Raouf Boutaba,
Abstract
New multimedia
networking applications such as entertainment video, IP telephony, Internet
radio, teleconferencing, interactive games, virtual worlds, and others have
known an explosive growth in the recent years. These applications are highly
sensitive to end-to-end delay and delay variation. These particular service
requirements suggest that a network architecture that has been designed
primarily for packet loss sensitive data communication is not adequate for
supporting multimedia applications. A number of efforts to extend the Internet
architecture to provide explicit support for the service requirements of
multimedia applications are currently deployed. These efforts involve the
development of new standards for framing and controlling the transmission of
multimedia data, dedicated transport protocols, new signaling protocols, and
new network layer service abstractions. This tutorial examines the key
principles of the next-generation Internet architecture being developed to
support service classes that provide quality-of-service (QoS) performance
guarantees to multimedia applications. This tutorial will also discuss
policy-based networking as the control component of next generation
QoS-sensitive Internet.
Biography
Dr.
T-2
MPLS and GMPLS Architectures
Harry Perros,
Abstract
The Multi-Protocol Label Switched (MPLS) introduces a
connection-oriented structure into the otherwise connectionless IP network. It
was originally proposed for packet-switched networks, such as IP networks, ATM,
and Frame Relay. Subsequently it was extended to generalized MPLS (GMPLS) which
is also applicable to optical networks and TDM networks. In this tutorial we
will first explore the basic features of MPLS and its signaling protocols: LDP,
CR-LDP, and RSVP-TE. Subsequently, we will describe the main features of
wavelength routing optical networks and introduce GMPLS.
Topics: 1.
2.
Signaling Protocols (LDP, CR-LDP, RSVP-TE)
3.
Wavelength routing optical networks
4.
GMPLS
5.
Extensions of CR-LDP and RSVP-TE for GMPLS
Biography
Harry G. Perros is a Professor of Computer Science, an
Alumni Distinguished Graduate Professor, and the Program Coordinator of the
Master of Science degree in Computer Networks at NC State University.
He received the B.Sc. degree in Mathematics in 1970
from
He has published extensively in the area of
performance modelling of computer and communication systems, and he has
organized several national and international conferences. He has also published
two print books: Queueing Networks with Blocking: Exact and Approximate
Solutions, Oxford Press 1994, An Introduction to ATM Networks, Wiley 2001, and
an e-book Computer Simulation Techniques – The Definitive
Introduction,2002. He is currently completing a textbook entitled
Connection-Oriented Networks, scheduled to be published in the Spring of 2005
by Wiley.
In 1995, he founded the IFIP Working Group 6.3 on the
Performance of Communication Systems, and he was the chairman from 1995 to
2002. As from 2004, he is the chairman of the IFIP Working Group 6.10 on Optical
Networks. He is also a member of IFIP Working Groups 6.2, and 7.3, and an IEEE
Senior Member. He also an associate Editor for the Performance
EvaluationJournal, and the Telecommunications SystemsJournal.
His current research
interests are in the areas of optical networks.
T-3
Evolution of ITU-T Authentication Services
and the Standarization of Authorization Mechanisms: From PKIs to PMIs
Javier López Muñoz, Universidad de Málaga (Spain)
Abstract
The objective of this tutorial is to present the problems
of advanced authentication and authorization services and how attribute certificate and Privilege
Management Infrastructure (PMI) concepts, evolving from the
traditional concepts of identity certificate
and Public Key Infrastructure (PKI), have been
proposed by the ITU-T as the tool and framework, respectively, for the
provision of A&A services in many of the new Internet applications.
Identity certificates (or public-key certificates)
provide the best solution to integrate authentication service into most
applications developed for the Internet that make use of digital signatures.
However, new applications, particularly in the area of e-commerce, need an authorization service to describe
what it is allowed for a user to do. In this case privileges to perform tasks
should be considered.
Authorization is not a new problem, and different
solutions have been used in the past. However, “traditional”
solutions are not very helpful for many of the Internet applications. Those
solutions are not easy to use in application scenarios where the use of
identity certificates, to attest the connection of public keys to identified
subscribers, is a must. In such scenarios, types of independent data objects
that can contain user privileges would be of great help. Attribute certificates
proposed by the ITU-T International Telecommunications Union X.509
recommendation in 2000 seems to provide an appropriate solution, as these data
objects have been designed to be used in conjunction with identity
certificates.
The use of a wide-ranging
authentication service based on identity certificates is not practical unless
it is complemented by an efficient and trustworthy mean to manage and
distribute all certificates in the system. This is provided by a Public-Key Infrastructure (PKI), which at
the same time supports encryption, integrity and non-repudiation services.
Without its use, it is impractical and unrealistic to expect that large scale
digital signature applications can become a reality.
Similarly, the attribute
certificates framework defined by ITU provides a foundation upon which a Privilege Management Infrastructure (PMI)
can be built. PKI and PMI infrastructures are linked by information contained
in the identity and attribute certificates of every user. The link is justified
by the fact that authorization relies on authentication to prove who you are.
Although the framework
described by ITU is a very good staring point, it is certainly abstract, and leaves
many open questions when implementation issues are considered. Maybe that is
the reason why PMIs has not been widely deployed yet. For this reason, in this
tutorial we will explain in detail how PMIs have evolved from PKIs and
establish their similarities, we will study the insides of PMIs, and give
guidelines for their implementation and use in e-commerce applications.
The outline of this tutorial
is: (i) The Authentication problem; (ii) Identity Certificates and
Certification Authorities; (iii) Public Key Infrastructures and limitations to
solve the Authorization problem; (iv) Attribute Certificates and Privilege
Management Infrastructures; (v) PMI models; (vi) Other initiatives.
Biography
Javier López received his BSc
and MSc degrees in Computer Engineering from the
T-4
Wireless Sensor Networks: State of the Art
Ozgur Baris Akan, Georgia
Institute of Technology (
Abstract
The objective of this tutorial is to present the
concept of wireless sensor networks, which has been made viable by the significant
developments in wireless communications and microelectro-mechanical systems
technology, along with the communication and networking challenges and the
currently proposed solutions.
The tutorial will cover the following: (i)
Introduction to Wireless Sensor Networks and its applications; (ii) Application
Layer; (iii) Transport Layer; (iv) Routing Protocols; (v) Link Layer; (vi)
Conclusions.
Recent advances in Micro-Electro-Mechanical Systems
(MEMS) and radio telecommunication techniques have enabled the production and
deployment of tiny intelligent sensors to collect collaborative information
about the physical environment. The collaborative effort of these networked
wireless sensor nodes may provide sensing capabilities in space and time that
surpass the achievements of current sensing systems. However, this objective
necessitates the efficient and application specific communication protocols to
assure the reliable communication of the sensed event features and hence enable
the required actions to be taken by the actors in the smart environment. In
this tutorial, the challenges and the existing solutions for the design and
development of sensor/actor network communication protocols are presented. More
specifically, application layer, transport layer, network layer, data link
layer, in particular, error control and MAC protocols, are explained in detail.
Open research issues for the realization of sensor and actor networks are also
discussed.
Biography
Dr. Ozgur Baris Akan
received his B.Sc. and M.Sc. degrees in Electrical and Electronics Engineering
from
NOVEMBER 2 |
Internet
Multimedia Applications: Challenges and Design
Raouf Boutaba,
TUTORIAL 2
The
MPLS and GMPLS Architectures
Harry Perros,
Evolution of
ITU-T Authentication Services and the Standardization of Authorization
Mechanisms: From PKIs to PMIs
Javier López Muñoz, Universidad de Málaga (Spain)
TUTORIAL 4
Wireless
Sensor Networks: State of the Art
Özgur
B. Akan, Georgia Institute of Technology (
NOVEMBER 3 |
Pervasive wireless
networks engineering
Guy
Pujolle,
Configuration Model for
Network Management
R.
Deca, University of Quebec at Montreal & Cisco Systems, Inc., O. Cherkaoui,
University of Quebec at Montreal, & D. Puche, Cisco Systems, Inc. (Canada)
On-line Control of Service
Level Agreements
M. C. Penna & R. R. Wandresen, Pontifícia
Universidade Católica do Paraná (Brazil)
Revenue-aware Resource
Allocation in the Future Multi-service IP Networks
J. Zhang, T. Hämäläinen & J. Joutsensalo, University
of Jyväskylä (Finland)
A Kerberos-based
Authentication Architecture for Wireless LANs: Test beds and
Experiments.
M. A. Kaafar, L. Ben Azzouz & F. Kamoun, Université
de la Manouba (Tunisia)
An efficient mechanism to
ensure location privacy in telecom service applications
O.
Jorns & S. Bessler &, Telecommunications Research Centre
Network Security
Management: A Formal Evaluation Tool based on RBAC Policies
R. Laborde, B. Nasser, F. Grasset, F. Barrère & A.
Benzekri, Université Paul Sabatier
(France)
A Dynamic Cross Layer Control
Strategy for Resource Partitioning in a Rain Faded Satellite Channel with
Long-Lived TCP Connections
N.
Celandroni, ISTI-CNR, F. Davoli, CNIT and Universita de Genova, E. Ferro &
A. Gotta, ISTI-CNR (
Content Location and
Distribution in Converged Overlay Networks
O.
Unger, Technion - Israel Institute of Technology and Zoran Microelectronics,
& I. Cidon, Technion - Israel Institute of Technology (Israel)
A Communication
Architecture for Real-time Auctions
H. Kaffel Ben Ayed, S. Kaabi Chihi & F. Kamoun,
Université de la Manouba (Tunisia)
Offered by the
NOVEMBER 4 |
Optical Burst Switching:
Where do we go from here?
Harry Perros,
An Interference-Based
Prevention Mechanism against WEP Attack for 802.11b
Network
W.-C.
Hsieh,
Restricted Dynamic
Programming for Broadcast Scheduling
Performance Comparison of
Distributed Frequency Assignment Algorithms for Wireless Sensor Networks
S.
Waharte & R. Boutaba,
Fast Handoff Support in an
IP-evolved UMTS Architecture
By L. Dimopoulou, G. Leoleis & I. S. Venieris, National Technical
University of Athens (Greece)
Toward an Intelligent
Bandwidth Broker Model for Resources Management in DiffServ Networks
R. Nassrallah, M. Lemercier & D. Gaïti, Université Technique de Troyes (France)
A Learning and Intentional
Local Policy Decision Point for Dynamic QoS Provisioning
F. Krief & D. Bouthinon, Université Paris XIII
(France)
Generic IP Signaling
Service Protocol
T.
T. Luu &
On Distributed System
Supervision - A Modern Approach: GeneSys
J.-E.
Bohdanowicz, EADS Space Transportation (France), L. Kovacs, B. Pataki, MTA
STAKI (Hungary), A. Sadovykh, Université Paris 6 (France) & S. Wesner,
Stuttgart University (Germany)
Multigroup Communication
Using Active Networks Technology
A. Chodorek,
Kielce University of Technology, & R.
R. Chodorek, AGH University of Science and Technology (Poland)
Policy Usage in GMPLS
Optical Networks
B. Daheb, Université Paris 6 & Institut Supérieur
d’Electronique de Paris, & G. Pujolle, Université Paris 6 (France)
Beyond TCP/IP: a
Context-Aware Architecture
G.
Pujolle, H. Chaouchi, Université Paris 6, & D. Gaïti, Université Technique de Troyes (France)
Storage Capacity
Allocation Algorithms for Hierarchical Content Distribution
N.
Laoutaris, V. Zissimopoulos & I. Stavrakakis,
An Inference Algorithm for
Probabilistic Fault Management in Distributed Systems
J.
Ding, FernUniversität Hagen (Germany) and Shanghai Jiao Tong University (P. R.
China), B. Krämer, FernUniversität Hagen (Germany), Y. Bai, Shanghai Jiao Tong
University (P. R. China) & H. Chen, East-China Institute of Computer
Technology (P. R. China)
New Protocol for Grouping
Data Using Active Network
A. Moreno, B. Curto & V. Moreno, Universidad de Salamanca
(Spain)
NOVEMBER 5 |
Event-to-Sink Reliable
Transport in Wireless Sensor Networks
An Algebraic Model of an
Adaptive Extension of DiffServ for MANETs
O. Salem & A. Benzekri, Université Paul Sabatier de
Toulouse (France)
Cross-layer Performance
Evaluation of IP-based Applications Running over the Air Interface
D.
Moltchanov, Y. Koucheryavy & J. Harju,
Collision Avoidance and
Fairness Issues in Metropolitan Optical Access Networks
N.
Bouabdallah, Université Paris 6 and Alcatel Research & Innovation, A.-L.
Beylot, ENSEEIHT, & G. Pujolle, Université Paris 6 (