skip to main content
10.1145/3472305acmconferencesBook PagePublication PagescommConference Proceedingsconference-collections
ANRW '21: Proceedings of the 2021 Applied Networking Research Workshop
ACM2021 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ANRW '21: Applied Networking Research Workshop Virtual Event USA July 24 - 30, 2021
ISBN:
978-1-4503-8618-0
Published:
24 July 2021
Sponsors:
In-Cooperation:
IRTF, Internet Society
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 16 Jan 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: Interconnection and routing
short-paper
Hunting BGP zombies in the wild

As the key component of Internet's inter-domain routing, BGP is expected to work flawlessly. However, a recent study has revealed the presence of BGP zombies: Withdrawn prefixes that are still active in routing tables and that can cause routing issues. ...

research-article
Meta-peering: towards automated ISP peer selection

We introduce meta-peering, a term that encompasses the set of tools needed to ease and automate the Internet Service Provider (ISP) peering process; starting with identifying a list of ISPs that are likely to peer, generating respective BGP ...

SESSION: Monitoring internet traffic
short-paper
Towards cross-layer telemetry

This paper introduces Cross-Layer Telemetry (Clt), a way to combine in-band telemetry (based on In-Situ Oam) and Application Performance Management (APM, based on distributed tracing) into a single monitoring tool providing a full network stack ...

short-paper
L, Q, R, and T: which spin bit cousin is here to stay?

Network operators utilize traffic monitoring to locate and fix faults or performance bottlenecks. This often relies on intrinsic protocol semantics, e.g., sequence numbers, that many protocols share implicitly through their packet headers. The arrival of ...

short-paper
On the evolution of internet flow characteristics

The ongoing evolution of technologies and network services on the Internet indicates ongoing changes in traffic and flow characteristics. Since the analysis of flow characteristics, like duration, size, and rate, has been a frequently studied topic ...

research-article
Open Access
Detecting consumer IoT devices through the lens of an ISP

Internet of Things (IoT) devices are becoming increasingly popular and offer a wide range of services and functionality to their users. However, there are significant privacy and security risks associated with these devices. IoT devices can infringe ...

SESSION: New internet protocols
short-paper
Adaptive cheapest path first scheduling in a transport-layer multi-path tunnel context

Bundling multiple access technologies increases capacity, resiliency and robustness of network connections. Multi-access is currently being standardized in the ATSSS framework in 3GPP, supporting different access bundling strategies. Within ATSSS, a ...

extended-abstract
Leveraging the 0-RTT convert protocol to improve wi-fi/cellular convergence

Mobile data usage is increasing and mobile network operators are looking to move some of this traffic onto Wi-Fi networks. MPTCP and the 0-RTT TCP Convert protocol can help these operators by enabling a convergence of cellular and Wi-Fi networks. We ...

extended-abstract
Cooperative performance enhancement using QUIC tunneling in 5G cellular networks

Multiplexed Application Substrate over QUIC Encryption (MASQUE) is a new protocol mechanism that is currenty under standardization in the IETF. MASQUE defines an extension to the HTTP CONNECT method in order to support QUIC-based tunneling and forwarding ...

SESSION: Practical congestion control
short-paper
CCID5: an implementation of the BBR congestion control algorithm for DCCP and its impact over multi-path scenarios

Providing multi-connectivity services is an important goal for next generation wireless networks, where multiple access networks are available and need to be integrated into a coherent solution that efficiently supports both reliable and non reliable ...

extended-abstract
Public Access
Toward greater scavenger congestion control deployment: implementations and interfaces

Heterogeneous applications and restricted bandwidth on the Internet have motivated recent works on scavenger congestion control, which yields bandwidth to competing primary traffic for increased network-wide utility. Although potential use cases are ...

SESSION: DNS and privacy
short-paper
Public Access
Encryption without centralization: distributing DNS queries across recursive resolvers

Emerging protocols such as DNS-over-HTTPS (DoH) and DNS-over-TLS (DoT) improve the privacy of DNS queries and responses. While this trend towards encryption is positive, deployment of these protocols has in some cases resulted in further centralization ...

short-paper
Open Access
Institutional privacy risks in sharing DNS data

The Domain Name System (DNS) is used in every website visit and e-mail transmission, so privacy is an obvious concern. In DNS, users ask recursive resolvers (or "recursives") to make queries on their behalf. Prior analysis of DNS privacy focused on ...

short-paper
DNS-over-TCP considered vulnerable

The research and operational communities believe that TCP provides protection against IP fragmentation attacks and recommend that servers avoid sending DNS responses over UDP but use TCP instead.

In this work we show that IP fragmentation attacks also ...

SESSION: Applications and specifications
research-article
Manus manum lavat: media clients and servers cooperating with common media client/server data

The newly rectified CTA standard --- Common Media Client Data (CMCD) --- allows content providers to get insights into the performance of their large-scale streaming operations. Its sister standard --- Common Media Server Data (CMSD) --- is in the works ...

short-paper
Open Access
Tools for disambiguating RFCs

For decades, drafting Internet protocols has taken significant amounts of human supervision due to the fundamental ambiguity of natural language. Given such ambiguity, it is also not surprising that protocol implementations have long exhibited bugs. This ...

Contributors
  • The University of Chicago
  • Telefonica

Recommendations

Acceptance Rates

ANRW '21 Paper Acceptance Rate 16 of 28 submissions, 57%;
Overall Acceptance Rate 34 of 58 submissions, 59%
YearSubmittedAcceptedRate
ANRW '21281657%
ANRW '16301860%
Overall583459%