Home / Blogs

Deadline of Oct 31 to Register for IAB Workshop on Stack Evolution in a Middlebox Internet

Protect your privacy:  Get NordVPN  [ Deal: 73% off 2-year plans + 3 extra months ]
10 facts about NordVPN that aren't commonly known
  • Meshnet Feature for Personal Encrypted Networks: NordVPN offers a unique feature called Meshnet, which allows users to connect their devices directly and securely over the internet. This means you can create your own private, encrypted network for activities like gaming, file sharing, or remote access to your home devices from anywhere in the world.
  • RAM-Only Servers for Enhanced Security: Unlike many VPN providers, NordVPN uses RAM-only (diskless) servers. Since these servers run entirely on volatile memory, all data is wiped with every reboot. This ensures that no user data is stored long-term, significantly reducing the risk of data breaches and enhancing overall security.
  • Servers in a Former Military Bunker: Some of NordVPN's servers are housed in a former military bunker located deep underground. This unique location provides an extra layer of physical security against natural disasters and unauthorized access, ensuring that the servers are protected in all circumstances.
  • NordLynx Protocol with Double NAT Technology: NordVPN developed its own VPN protocol called NordLynx, built around the ultra-fast WireGuard protocol. What sets NordLynx apart is its implementation of a double Network Address Translation (NAT) system, which enhances user privacy without sacrificing speed. This innovative approach solves the potential privacy issues inherent in the standard WireGuard protocol.
  • Dark Web Monitor Feature: NordVPN includes a feature known as Dark Web Monitor. This tool actively scans dark web sites and forums for credentials associated with your email address. If it detects that your information has been compromised or appears in any data breaches, it promptly alerts you so you can take necessary actions to protect your accounts.

Can we develop better transport protocols for communication across the Internet? In a world where the “end-to-end” principle is no longer certain and middleboxes are common, which paths through the Internet are actually available to applications? Which transports can be used over these paths? How can applications cooperate with network elements to improve path establishment and discovery? Can common transport functionality and standardization help application developers to implement and deploy such approaches in today’s Internet? Could cooperative approaches give us a way to rebalance the Internet back toward its end-to-end roots?

These are all questions posed for the Internet Architecture Board‘s (IAB) Workshop on Stack Evolution in a Middlebox Internet (SEMI). Taking place in Zürich, Switzerland from 26-27 January, 2015, the Call For Papers has been open for a while and closes tomorrow. The instructions are below and also available in PDF form.

The key point is that if you are interested in being a participant, you must register your name and the title of your paper by TOMORROW, October 31. The complete paper does not have to be in until the following Friday, 7 November 2014. As noted below, participation is by invitation and to be considered you need to submit a short (1-2 pages) document outlining your position/views on a relevant topic.

The text below is copied from an email from IAB Chair Russ Housley (also available in HTML format), with the slight modification made to the submission dates based on the updated information in his message.

* * *

IAB Workshop on Stack Evolution in a Middlebox Internet (SEMI)
26-27 January 2015 – ETH Zürich, Switzerland

The Internet’s transport layer has ossified, squeezed between narrow interfaces (from BSD sockets to pseudo-transport over HTTPS) and increasing in-network modification of traffic by middleboxes that make assumptions about the protocols running through them. This ossification makes it difficult to innovate in the transport layer, through the deployment of new protocols or the extension of existing ones. At the same time, emerging applications require functionality that existing protocols can provide only inefficiently, if at all.

To begin to address this problem, the Internet Architecture Board (IAB), within the scope of its IP Stack Evolution Program, is organizing a workshop to discuss approaches to de-ossifying transport, especially with respect to interactions with middleboxes and new methods for implementing transport protocols. Recognizing that the end-to-end principle has long been compromised, we start with the fundamental question of matching paths through the Internet with certain characteristics to application and transport requirements. Which paths through the Internet are actually available to applications? Which transports can be used over these paths? How can applications cooperate with network elements to improve path establishment and discovery? Can common transport functionality and standardization help application developers to implement and deploy such approaches in today’s Internet? Could cooperative approaches give us a way to rebalance the Internet back toward its end-to-end roots?

Topics

For this workshop we would like to consider topics that speak to these questions, including the following:

  • Development and deployment of transport-like features in application-layer protocols
  • Methods for discovery of path characteristics and protocol availability along a path
  • Methods for middlebox detection and characterization of middlebox behavior and functionality
  • Methods for NAT and middlebox traversal in the establishment of end-to-end paths
  • Mechanisms for cooperative path-endpoint signaling, and lessons learned from existing approaches
  • Economic considerations and incentives for cooperation in middlebox deployment

We will explicitly focus on approaches that are incrementally deployable within the present Internet.

The outcome of the workshop will be architectural and engineering guidance on future work in the area, published as an IAB workshop report, based on discussion of proposed approaches; future work will be pursued within the IAB Stack Evolution Program. We will also explore possible areas for standardization, e.g. new protocols that separate signaling to and from on-path devices and common transport semantics from the rest of the transport protocol; and for general guidance, e.g. how transports as well as middleboxes can be designed and deployed to achieve these goals.

Submission Instructions

Attendance at the workshop is by invitation. Prospective participants are invited to submit short position papers outlining their views on one or more topics related to the scope of the workshop. Position papers will be published on the IAB website at http://www.iab.org/activities/workshops/semi/.

Submissions accepted at: https://www.easychair.org/conferences/?conf=semi2015

Submission Deadline: Authors and titles for position papers must be registered by Friday, 31 October 2014 but but the deadline for complete position papers has been extended by a week to Friday, 7 November 2014

Notification Deadline: 17 November 2014

Workshop Dates: 26-27 January 2015

Sponsored by the Internet Architecture Board, the Internet Society, and ETH Zürich. Mirja Kühlewind and Brian Trammell, General Chairs.

By Dan York, Author and Speaker on Internet technologies - and Senior Advisor at Internet Society

Dan is a Senior Advisor at the Internet Society but opinions posted on CircleID are his own. View more of Dan’s writing and audio here.

Visit Page

Filed Under

Comments

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API