Lots of exciting talks and discussion at HotNets. Here are a few highlights.
Session 1
The first session was on Internet architecture. Ali Ghodsi spoke about three unanswered questions for the burgeoning area of {data/information/content}-{centric/oriented} networking. These were privacy, data-plane efficiency, and whether ubiquitous caching (a key feature of nearly all the proposals) actually provides quantitative improvement. For the latter point, the argument is that work on web caching from the late 1990's indicated that if you have caching near the edge (as already exists in present-day web caches), then adding ubiquitous caching to the architecture does not provide much more benefit due to heavy-tailed access distributions. So, does the caching advantage of information-centric networking warrant such a large-scale architectural change?
In later one-on-one discussions, Dan Massey (who later gave an interesting talk on the IPv4 grey market) argued that at least for the NDN project, ubiquitous caching is not the focus. Something more important is being able to do policy-aware multipath load balancing — in a very dynamic way in the network, by shipping content requests optimistically to multiple locations and seeing what ends up working well. A kind of speculative execution for forwarding. This may not be specific to content-awareness, but Dan argued that if you want to make this work, you end up needing something like NDN's Pending Interest Table mechanism. (The discussion was brief, but hopefully I restated the argument accurately.)
Dave Andersen and Scott Shenker argued that the primary goal of a future Internet architecture should be to accommodate evolution within the architecture itself, rather than just adding new functionality. The XIA approach introduces the notion of data-plane fallbacks so the sender can ask for new functionality and if it isn't supported everywhere, things still work. Scott focused on bringing evolvability to the architecture by applying the principles of extensibility and modularity.
There were several questions about what would be the incentives to deploy either approach. Scott responded that while incentives are important, first we need to understand what technical mechanisms we need to make evolvability feasible — which previously we have not understood. Ion Stoica asked, What would be the first thing that would drive deployment of one of the future Internet architectures? Some of the answers included SCADA networks which need extreme security, content caching (despite the first talk!) where content providers have monetary incentives, and (from Hari) the ability to deploy differential pricing by having more information about applications' intent (though users may not like this!).
Another question was whether these architectures would actually have fixed the processes which led to ossification in practice (e.g., via middlebox problems); and whether they'd aid deployment of protocols like secure BGP which have had problems in practice.
Session 2
Haitao Zheng from UCSB spoke about building wireless data centers, where directional wireless interfaces on racks of servers can be dynamically steered to connect pairs of racks that need to communicate. If you want to connect racks of servers with high-bandwidth wireless links, interference is a big problem. Their approach is 3D beamforming: Rather than aiming the radio directly (in the 2D plane at the top of racks), bounce it off a reflective ceiling and put an absorber around the target. This direction of reception reduces interference. In addition to having many pretty pictures of interference patterns, this is part of a line of work (in wireless and optical) that has a very cool approach — we always think of changing the traffic flow to match the topology; now we can change the physical topology to match the traffic.
Abhinav Pathak talked about finding energy bugs in mobile devices — as he said, that hits three hot keywords.
Jonathan Perry spoke about Rateless Spinal Codes. My main question: why do coding schemes get to have such cool names?
Session 3
Mark Reitblatt spoke on "Consistent Updates for Software-Defined Networks: Change You Can Believe In!". Here is the problem they are solving: As you are reconfiguring your network how can you be sure your policy (like availability or security) is preserved even during the transition? Traditionally, this is hard because of the inconsistency of having one set of forwarding rules deployed some places, and another set deployed other places. Actually, it might seem impossible. Even if you magically deploy a change everywhere instantly, you can still get policy violations because packets travel across non-negligible time. Can you solve it? Yes you can!
Junda Liu should get some sort of award for giving the most entertaining talk that also featured a state machine diagram.
Barath Raghavan calculated the energy and emergy of the Internet, which has been getting some press recently and which generated a lot of discussion on the complexities and implications of measuring society's energy use.
Awesome feature of this session: all the talks finished early!
Session 4
Jon Howell spoke on a proposed refactoring (and narrowing) of the API for web applications executing on user machines.
Ethan Katz-Bassett spoke about Machiavellian Routing. The coolness here is a trick by which ISPs can control inbound routing, so if they notice there is a connectivity problem at some AS they can induce other senders to avoid the problem.
Dan Massey noted that a grey market is emerging for IPv4 addresses and argued that we need a way not to prevent the market from existing outside the traditional Internet governance, but instead to verify what transactions happen. This would make the market more honest and efficient. Most interesting point from discussion (I think from Jon Howell): Why do we want to improve the IPv4 market? This will allow more efficient use of available IPv4 addresses ... but if we let the market be as baroque and inconvenient as possible, it will encourage deployment of IPv6 sooner!
About our ICN paper in session 1: Dan was nice to let us know that the focus of NDN has shifted, which of course is the natural progression of research. However, when we read the NDN proposal when writing our paper, the proposal devoted several sections to caching (2.2.3), caching policies (3.2.3) , and mentioned the word cache/caching 54 times. The project description can be found here:
ReplyDeletehttp://www.named-data.org/ndn-proj.pdf