[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Report of the DIMACS working group on abstractions for network services, architecture, and implementation

Published: 09 January 2012 Publication History

Abstract

A workshop on Abstractions for Network Services, Architecture, and Implementation brought together researchers interested in creating better abstractions for creating and analyzing networked services and network architectures. The workshop took place at DIMACS on May 21-23, 2012. This report summarizes the presentations and discussions that took place at the workshop, organized by areas of abstractions such as layers, domains, and graph properties.

References

[1]
D. D. Clark. Applications and abstractions. http://dimacs.rutgers.edu/Workshops/NetworkServices/Slides/Dave_Clark.pdf.
[2]
D. D. Clark, J. Wroclawski, K. R. Sollins, and R. Braden. Tussle in cyberspace: Defining tomorrow's Internet. IEEE/ACM Transactions on Networking, 13(3):462--475, June 2005.
[3]
B. Ford. How should we think about transport abstractions? http://dimacs.rutgers.edu/Workshops/NetworkServices/Slides/Bryan_Ford.pdf.
[4]
N. Foster, J. Rexford, and D. Walker. Abstractions for software-defined networking. http://dimacs.rutgers.edu/Workshops/NetworkServices/Slides/Nate-dimacs.pdf.
[5]
B. Godfrey. Abstractions for network routing. http://dimacs.rutgers.edu/Workshops/NetworkServices/Slides/godfrey-DIMACS.pdf.
[6]
T. Griffin. Algebraic path finding. http://dimacs.rutgers.edu/Workshops/NetworkServices/Slides/Tim_Griffin.pdf.
[7]
S. Keshav. Net working? http://dimacs.rutgers.edu/Workshops/NetworkServices/Slides/Keshav.pdf.
[8]
S. Keshav. Editor's message: Modeling. Computer Communication Review, 42(3):3, July 2012.
[9]
J. Rexford. The networking philosopher's problem. Computer Communication Review, 41(3):5--10, July 2011.
[10]
D. S. Rosenblum. Applications and abstractions: A cautionary tale. http://dimacs.rutgers.edu/Workshops/NetworkServices/Slides/DSRDIMACS.pdf.
[11]
V. Sekar and S. Ratnasamy. Abstractions formiddleboxes. http://dimacs.rutgers.edu/Workshops/NetworkServices/Slides/Vyas-dimacs.pdf.
[12]
S. Shenker. The future of networking, and the past of protocols. http://opennetsummit.org/talks/shenker-tue.pdf.
[13]
M. Walfish. Failure detection as a network abstraction for end-host applications. http://dimacs.rutgers.edu/Workshops/NetworkServices/Slides/dimacs12-walfish-talk.pdf.
[14]
P. Zave. Abstractions of the data plane. http://dimacs.rutgers.edu/Workshops/NetworkServices/Slides/absDataPlaneTalk.pdf.

Cited By

View all
  • (2016)Empirical Evidences in Software-Defined Network Security: A Systematic Literature ReviewInformation Fusion for Cyber-Security Analytics10.1007/978-3-319-44257-0_11(253-295)Online publication date: 22-Oct-2016
  • (2015)Applying Formal Methods to Networking: Theory, Techniques, and ApplicationsIEEE Communications Surveys & Tutorials10.1109/COMST.2014.234579217:1(256-291)Online publication date: Sep-2016
  • (2014)Building programmable wireless networks: an architectural surveyEURASIP Journal on Wireless Communications and Networking10.1186/1687-1499-2014-1722014:1Online publication date: 22-Oct-2014
  • Show More Cited By

Index Terms

  1. Report of the DIMACS working group on abstractions for network services, architecture, and implementation

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM SIGCOMM Computer Communication Review
      ACM SIGCOMM Computer Communication Review  Volume 43, Issue 1
      January 2013
      55 pages
      ISSN:0146-4833
      DOI:10.1145/2427036
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 09 January 2012
      Published in SIGCOMM-CCR Volume 43, Issue 1

      Check for updates

      Author Tags

      1. abstractions
      2. architecture
      3. education
      4. services

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 31 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2016)Empirical Evidences in Software-Defined Network Security: A Systematic Literature ReviewInformation Fusion for Cyber-Security Analytics10.1007/978-3-319-44257-0_11(253-295)Online publication date: 22-Oct-2016
      • (2015)Applying Formal Methods to Networking: Theory, Techniques, and ApplicationsIEEE Communications Surveys & Tutorials10.1109/COMST.2014.234579217:1(256-291)Online publication date: Sep-2016
      • (2014)Building programmable wireless networks: an architectural surveyEURASIP Journal on Wireless Communications and Networking10.1186/1687-1499-2014-1722014:1Online publication date: 22-Oct-2014
      • (2013)Compositional Network MobilityRevised Selected Papers of the 5th International Conference on Verified Software: Theories, Tools, Experiments - Volume 816410.1007/978-3-642-54108-7_4(68-87)Online publication date: 17-May-2013

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media