10:30 - 11:00Coffee break
11:00 - 12:30Session on Data-Centric Networking - Chair: Chadi Barakat
11:00-11:45Keynote Speaker: Don Towsley
University of Massachusetts, MA, USA
Service Differentiation in Cache Networks
Caches are building blocks in today's content distribution networks and a major building block in tomorrow's information centric networks. Typically the caches in these systems are managed with the goal of maximizing hit rates or minimizing download times independently of the content. On the other hand situations arise where different content is entitled to different levels of service according to service level agreements and/or financial contracts between content providers and cache providers. In this talk we present a utility maximization framework within which to examine these problems and issues. We illustrate the power of this framework in the context of several applications, content-level service differentiation both at the individual and aggregate levels, and for monetizing cache service.
[Slides]
11:45-12:05Thrasyvoulos Spyropoulos
EURECOM
Offloading Mobile Traffic Using a Vehicular Cloud
The widespread adoption of sophisticated mobile devices is driving a demand for Internet content, especially video, overloading the cellular infrastructure, and urgently requiring some traffic to be offloaded. Proposed solutions suggest densification via small cell base stations, and locally caching popular contents in small cells. While this can help serve some requests over shorter links (better SINR) and from the local cache (no backhaul load), adequate densification comes at high CAPEX/OPEX costs. We present here a low cost alternative, having public or private vehicles acting as mobile small cells and local caches, offering content access to users in their vicinity. Users can query nearby vehicles to get contents at low cost and be redirected to the cellular infrastructure when necessary. Caching on vehicles reduces installation and maintenance costs, compared to small cells. Furthermore, over a given time window, a static user sees a much larger variety of locally accessible contents (thus increasing the hit ratio), stored at the different vehicles passing, than she would be seeing if these caches were sparse and static. In this content, we present, analyze, and optimize two scenarios: a "download" scenario where users are downloading content in its entirety before they consume it, and a "streaming" scenario where users are downloading video content in chunks (from encountered mobile caches, or from the infrastructure), while watching the content in parallel.
[Extended abstract] [Slides]
12:05-12:25Giovanni Neglia
Inria Sophia Antipolis Méditérannée
Access-time aware cache algorithms
Most of the caching algorithms are oblivious to requests timescale, but caching systems are capacity constrained and in practical cases the hit rate may be limited by the cache impossibility to serve requests fast enough. In particular the hard-disk access time can be the key factor capping cache performances. In this talk we present new cache algorithms that take advantage of the access-time difference in the hierarchical cache to reduce the load on harddisk and then improve the overall cache efficiency for a capacity constrained storage systems.
[Extended abstract] [Slides]
12:30 - 14:00Lunch break
14:00 - 15:30Session on Network Virtualization - Chair: Lucile Sassatelli
14:00-14:45Keynote Speaker: Sachin Katti
Stanford University, CA, USA
SoftRAN: Software Defined Radio Access Networks
The RAN in the future (LTE-A, 5G) will be dense and heterogeneous. At the same time, traffic demands on the RAN are also scaling and becoming diverse. Scaling capacity and managing such a dense chaotic infrastructure requires tight co-ordination in the infrastructure to tackle interference, as well as the ability to flexibly and dynamically define eNB behavior to handle network and traffic diversity. This research agenda aims to bring a software defined networking approach to designing, deploying and managing the RAN. We show how by systematically decoupling the LTE control and user planes across the entire architecture, from the eNB to the transport, we can build efficient, scalable and tightly coordinated RANs while retaining the flexibility to change the network service definition on the fly. SoftRAN's architecture creates very simple eNBs with standard interfaces and stripped of complex control mechanisms, designs a low latency but practical mobile transport for the control plane, and designs a low latency software controller to implement functions such as CoMP, RAN slicing etc.
[Slides]
14:45-15:05Guillaume Urvoy Keller
University of Nice Sophia Antipolis
SDN in data centers and ISP networks
Software Defined Networking (SDN) is gaining momentum in data centers (DCs) and is envisaged as an evolution of ISP networks. In this presentation, we will present several recent works carried out by several UCN@Sophia teams, in particular recent advances in DC and ISP networks that address the issue of the limited number of hardware rules offered by current SDN switches. Solutions related to compression or a reformulation of the routing/policing problem in those networks can enable to fully unleash from the SDN potential, i.e. a transparent centralized control of network flows. Other points related to extensions of SDN to the data plane, hybrid SDN networks (mixing legacy OSPF/ISIS routers with SDN nodes) or the interplay between SDN and NFV (network function virtualization) technologies will also be addressed.
[Extended abstract] [Slides]
15:05-15:25Navid Nikaein
EURECOM
Cloud-native and Programmable Radio Access Networks
Enabling ubiquitous and personalized mobile Internet requires pushing the boundaries of existing network and service infrastructure. The softwarization and virtualiztion of radio access network functions are two key ingredients to abstract infrastructure resources and enable the delivery of the network as a service. Their tight coupling provides the flexibility needed to provision network resources on-demand and to compose and chain network service functions dynamically to meet a wide range of use-cases. The objectives of this research is to reunite software-define networking and network function virtualization priniciples for designing cloud-native and programmable radio access networks. We show that a full GPP approach brings the required flexibility in splitting, chaining, and placement of RAN functions while meeting the realtime deadlines. We further illustrate how to achieve programmability through an agent that acts as a local controller for one or many network functions and executes various actions in cooperation with the centralized controller as well as other agents. Finally, we develop some future directions in the perspective of 5G research.
[Extended abstract] [Slides]
15:30 - 16:00Coffee break
16:00 - 17:30Session on User privacy & Network security - Chair: Nataliia Bielova
16:00-16:45Keynote Speaker: Krishna Gummadi
Max Planck Institute for Software Systems, Germany
Addressing the Privacy Management Crisis in Online Social Networks
The sharing of personal data has emerged as a popular activity over online social networking sites like Facebook and Twitter. As a result, the issue of online social network privacy has received significant attention in both the research literature and the mainstream media. In this talk, I will discuss our efforts towards the overarching goals of (i) quantifying the privacy risks for users of these sites and (ii) providing users with better tools (abstractions and mechanisms) for controlling their privacy risks.
[Slides]
16:45-17:05Arnaud Legout
Inria Sophia Antipolis Méditerannée
How to protect your privacy when using a smartphone?
Smartphones are so integrated in our daily life that they contain numerous private and sensitive information ranging from bank account data to personal pictures. However, the privacy model implemented in smartphones make for users impossible to detect and prevent leaks of their private data. In this talk, we will present a new approach to detect and control privacy leaks. This approach called ReCon is a cross-platform system that reveals privacy leaks and gives users control over them without requiring any special privileges or custom OSes.
[Extended abstract] [Slides]
17:05-17:25Aurélien Francillon
EURECOM
User trust in IoT, status and what can we do about it
A lot of research efforts have been put into constructing secure embedded systems. However, currently deployed systems are often insecure. Some devices are security devices ("smartcards") while other are not (connected fridge). We nevertheless often rely on the their security in our daily life, and their failure can have serious consequences. Users are either left with opaque devices they should blindly trust or insecure devices which are actually possible to inspect. In this talk, we discuss why we are in this situation and what we can do to improve it. In particular, we defend the thesis that more transparency and more openness in embedded systems hardware and software will foster a more secure ecosystem.
[Extended abstract] [Slides]
17:30 - 18:30User-Centric Networks panel discussion
Chair: Walid Dabbous
Inria Sophia Antipolis Méditerannée
Software Defined Network permits to conceive the whole Internet infrastructure as a program where you can easily deploy through NFV some key functionalities in strategic locations of the network. This is promising in particular for the wireless radio access network. In addition to network operators and vendors, end-users should also benefit indirectly through smart applications from the network programmability. Service transparency on both performance and privacy network aspects and open control on data are of primary interest to end-users. This panel will discuss the future network technologies and how they can be adapted to serve the interest of the Internet users.
[Slides]