
From mko@cs.stir.ac.uk  Mon Mar  1 07:46:44 2010
Return-Path: <mko@cs.stir.ac.uk>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C810028C3DF for <sam@core3.amsl.com>; Mon,  1 Mar 2010 07:46:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.11
X-Spam-Level: 
X-Spam-Status: No, score=-1.11 tagged_above=-999 required=5 tests=[BAYES_05=-1.11]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1drCsCurcPLO for <sam@core3.amsl.com>; Mon,  1 Mar 2010 07:46:44 -0800 (PST)
Received: from mailscanner2.stir.ac.uk (mailscanner2.stir.ac.uk [139.153.13.35]) by core3.amsl.com (Postfix) with ESMTP id 04E4528C2F9 for <sam@irtf.org>; Mon,  1 Mar 2010 07:46:44 -0800 (PST)
Received: from yen.cs.stir.ac.uk ([139.153.254.70]) by mailscanner2.stir.ac.uk with esmtp (Exim 4.63) (envelope-from <mko@cs.stir.ac.uk>) id 1Nm7pK-0003D3-Iu for sam@irtf.org; Mon, 01 Mar 2010 15:46:37 +0000
Received: from [139.153.253.90] by yen.cs.stir.ac.uk (8.9.3) id PAA12021; Mon, 1 Mar 2010 15:46:34 GMT
Message-ID: <4B8BE15A.1040106@cs.stir.ac.uk>
Date: Mon, 01 Mar 2010 15:46:34 +0000
From: Dr Mario Kolberg <mko@cs.stir.ac.uk>
User-Agent: Thunderbird 2.0.0.23 (Windows/20090812)
MIME-Version: 1.0
To: sam <sam@irtf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-stir.ac.uk-MailScanner: Found to be clean
X-stir.ac.uk-MailScanner-From: mko@cs.stir.ac.uk
Subject: [SAM] New SAM baseline internet draft
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Mar 2010 15:46:44 -0000

Hi All,

a new ID (draft-kolberg-sam-baseline-protocol-00) has been submitted to 
IETF. The draft has the title: Application Layer Multicast Extensions to 
RELOAD, and attempts to summarize the architecture and protocol for 
constructing SAM sessions using the P2P-SIP overlay RELOAD. We would be 
very interested in any feedback from the group!

The ID can be found at 
https://datatracker.ietf.org/doc/draft-kolberg-sam-baseline-protocol/

Many thanks,
Mario Kolberg

-- 
Dr Mario Kolberg                phone: +44 (0)1786 46 7440
Lecturer in Computing Science   fax  : +44 (0)1786 46 4551
                                 email: mko@cs.stir.ac.uk

Department of Computing Science and Mathematics
University of Stirling
Stirling FK9 4LA
Scotland, UK

-- 
The Sunday Times Scottish University of the Year 2009/2010
The University of Stirling is a charity registered in Scotland, 
 number SC 011159.


From jlloret@dcom.upv.es  Fri Mar  5 07:40:54 2010
Return-Path: <jlloret@dcom.upv.es>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B81CA28C2B1 for <sam@core3.amsl.com>; Fri,  5 Mar 2010 07:40:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.197
X-Spam-Level: 
X-Spam-Status: No, score=-3.197 tagged_above=-999 required=5 tests=[AWL=1.402,  BAYES_00=-2.599, GB_I_INVITATION=-2]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ulY293mVngia for <sam@core3.amsl.com>; Fri,  5 Mar 2010 07:40:54 -0800 (PST)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.21]) by core3.amsl.com (Postfix) with ESMTP id 1D43328C173 for <SAM@irtf.org>; Fri,  5 Mar 2010 07:40:50 -0800 (PST)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id o25FW5WO017924 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <SAM@irtf.org>; Fri, 5 Mar 2010 16:32:05 +0100
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id o25FW4nA016760 for <SAM@irtf.org>; Fri, 5 Mar 2010 16:32:05 +0100
Received: from JLLORET (mp3mix.gnd.upv.es [158.42.145.152]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id o25FW45S027244 for <SAM@irtf.org>; Fri, 5 Mar 2010 16:32:04 +0100
Date: Fri, 5 Mar 2010 16:32:04 +0100
Message-Id: <201003051532.o25FW45S027244@smtp.upv.es>
From: Jaime Lloret Mauri<jlloret@dcom.upv.es>
To: SAM@irtf.org
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] 2nd CfP: ICWMC 2010 || September 20-25, 2010 - Valencia, Spain
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Mar 2010 15:40:54 -0000

INVITATION:

=================
Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results.
=================


============== ICWMC 2010 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

ICWMC 2010: The Sixth International Conference on Wireless and Mobile Communications 
September 20-25, 2010 - Valencia, Spain

General page: http://www.iaria.org/conferences2010/ICWMC10.html
Call for Papers: http://www.iaria.org/conferences2010/CfPICWMC10.html

Submission deadline: April 20, 2010

Sponsored by IARIA, www.iaria.org
Co-sponsored by: IEEE Spain, University 'Politehnica' Bucharest, La Machinista Valenciana, Universidad Politecnica de Valencia, IGIC 

Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org
Publisher: CPS ( see: http://www2.computer.org/portal/web/cscps )
Archived: IEEE CSDL (Computer Science Digital Library) and IEEE Xplore
Submitted for indexing: Elsevier's EI Compendex Database, EI's Engineering Information Index
Other indexes are being considered: INSPEC, DBLP, Thomson Reuters Conference Proceedings Citation Index

Please note the Poster Forum and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. 

All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html

ICWMC 2010 Tracks (tracks' topics and submission details: see CfP on the site)

Wireless Communications Basics
Coding & modulation & equalization; Channel modeling and characterization; Equalization/Synchronization; Transform-domain communication; Multiple access algorithms and schemes; Antenna and RF subsystems; Smart antennas, adaptive antennas, MIMO and beam forming; MIMO and OFDM Based PHY Layer technologies; CDMA Systems

Radio Interfaces and Systems
Radio communications systems; Radio resource management; Radio transmission technologies; Power and interference control; Interference Cancellation for Wireless Mobile Systems; Power management for small terminals; Energy map; Channel Measurement and Characterization

Spectrum Allocation and Management
Spectrum efficiency analyses; Dynamic spectrum access networks; Spectrum management; Interference mitigation and management techniques 

Circuits for Wireless Communications
Wireless ASICs; Wireless technologies; RF Design issues

Wireless and Mobility
Mobility management; Location-based services and positioning; Micro and macro-mobility; Mobility, location and handoff management; Mobile and wireless IP; Wireless broadband mobile access; Routing in multihop, ad hoc and sensor networks; Wireless multicasting; Wireless mesh networks; Topology control in wireless

Protocols for wireless and mobility
Wireless protocols, architectural and design concepts; Protocols for air interfaces and networks; Wireless MAC protocols: Design and analysis; Transport layer issues in mobile and wireless networks; Middleware for handhelds and mobile services nodes; Proxies and middleware for wireless networks 

Traffic and congestion control, QoS, Resource Management
Traffic Modeling and Analysis; 3G/4G Bandwidth on Demand; QoS and mobility; End-to-end QoS; QoS profiling and pricing; Traffic Engineering; Congestion and admission control 

Wireless and mobile technologies
Wireless LANs; Home and Personal Area Networks: Bluetooth, ZigBeee, etc; Wireless MANs:802.16, 802.20; Wireless WANs: 2G/3G/4G; Mobile ad hoc networks and multi-hop wireless; Sensor networks and applications; Ultra-wideband and short-range networks; High altitude platforms and satellites; Emergency wireless communications; Wireless real-time communications 

Performance Evaluation, Simulation and Modeling of wireless networks and systems
Performance and QoS in wireless networks; Radio channel modeling (wave propagation and measurements); Mobile/wireless networks modeling and simulation; Performance of end-to-end protocols over wireless networks 

Management of wireless and mobile networks 
Mobility and QoS management; Billing technologies and tools; Policy Based Management in wireless LANS and MANs; Wireless and Mobile Network Planning; Mobile Database Access and Design

Security in wireless and mobile environment
Security and robustness in wireless networks; Privacy, Authentication Authorization and Accounting (AAA); Encryption and Cryptography; Key Management Protocols; Digital Rights Management and Multimedia Protection

Networks convergence and integration
2G/3G/4G integration; Convergence of 3G wireless and Internet cross-layer design in wireless networks; WLAN/3G/4G integration; Wireless-wireline convergence; Heterogeneous Networks (WAN, Wireless MAN, WLAN); IP Multimedia subsystems (IMS); Next Generation Network Architecture- mobility issues; Coexistence of mobile radio networks; End to End QoS in Heterogeneous environment; Signaling for integrated wireline/wireless networks 

Applications and services based on wireless infrastructures
Mobile & Wireless applications & services; Service discovery: protocols and frameworks; Personalized services and applications; Audio-visual and mobile multimedia applications; Media and content distribution over wireless networks 

Standardization and regulations
Position on standards & fora on wireless and mobile networks; Wireless Networks Standards and Protocols; Communications regulations; 802.11 WLAN Standards; 802.16 WMAN Standards; 3GPP and 3GPP2 standards; HSDPA Technology and Standards; Next Generation Network standards 

Design and implementation 
Emerging wireless technologies; Cross-layer optimizations in wireless networks; Design and implementation of mobile information systems; Software defined radio and re-configurability; Joint PHY/MAC design 

Wireless and mobile network deployment
Business models on wireless networks; Market trends and regional developments; M-commerce; Lessons learnt for wireless deployment in schools Lessons learnt for wireless deployment in special regions; Specialized wireless networks; Heterogeneous wireless network deployment (e.g., combining 802.11, 802.16 and 3G networks)

Cooperative and Cognitive Vehicular Networks
Architectures and platforms of cognitive vehicular network; Distributed artificial intelligence techniques for cognitive networks; Cognitive vehicular routing metrics and supporting protocols; Reduced complexity cognitive networks; Physical and MAC layer issues; Protocols design for cognitive vehicular networks; Cross-layer optimization in cognitive networks; Security issues for vehicular and cognitive networks; Testbed experiment, applications and new advances; Cooperative vehicular networks; QoS provisioning in heterogeneous networks ; Managing vertical handover; Multihoming; IPv6 GeoNetworking; Vehicular network architectures and protocols ; Cross-layer design and optimization for vehicular networks and cognitive networks; Mobility management and topology control; Standardization and Development of vehicular networks

Convergence and social mobility
Convergence of mobile networks with the Web 2.0; Convergence on architecture and services; Open service capabilities; Open exposure of telco capabilities; Open Web APIs, SOA and SDP); Interworking strategies; Mobile terminals as sources for User-generated content; Architecture and services for user-generated content; Auto-description and metadata synthesis for telecom-generated for user-generated content; Social mobile networks; User behavior profiling; Social connections (social graphs, contacts, etc); Services and architectures/solutions for social mobile services

==========
ICWMC GENERAL CHAIR
Jaime Lloret Mauri, Polytechnic University of Valencia, Spain 

ICWMC Advisory Chairs
Silviu Ciochina, University 'Politehnica' Bucharest, Romania 
Petre Dini, Concordia University, Canada / IARIA, USA
Jonathan Loo, Brunel University West London, UK 
Tudor Palade, Technical University of Cluj-Napoca, Romania 
Francisco Ramos, Polytechnic University of Valencia, Spain 
Manuel Sierra Pérez, Universidad Politécnica de Madrid / IEEE Spain, Spain 

ICWMC 2010 Research Institute Liaison Chairs
Nicolae Crisan, Technical University of Cluj-Napoca, Romania 
Adrian Matei, Politehnica University of Bucharest / Orange Romania S.A., Romania 
Jyrki Penttinen, Nokia Siemens Networks - Madrid, Spain / Helsinki University of Technology, Finland 
Tomi Räty, VTT Technical Research Centre of Finland, Finland 
Javier Del Ser Lorente, Tecnalia, Spain 

ICWMC 2010 Industry/Research Chairs
José García, La Maquinista Valenciana, Spain 
Jingli Li, TopWorx - Emerson, USA 
Christopher Nguyen, Intel Corp., USA 
Horia Stefanescu, Orange, Romania 

ICWMC 2010 Special Area Chairs
Cooperative and Cognitive Vehicular Networks Area Chairs:
Yacine Khaled, Geenov, France
Jong-Hyouk Lee, Sungkyunkwan University, Korea // INRIA, France

Committee members: http://www.iaria.org/conferences2010/ComICWMC10.html
==========

From waehlisch@ieee.org  Mon Mar  8 16:30:34 2010
Return-Path: <waehlisch@ieee.org>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 405A23A6C27 for <sam@core3.amsl.com>; Mon,  8 Mar 2010 16:30:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.249
X-Spam-Level: 
X-Spam-Status: No, score=-102.249 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_DE=0.35, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BodwSF783EXL for <sam@core3.amsl.com>; Mon,  8 Mar 2010 16:30:32 -0800 (PST)
Received: from mail2.rz.htw-berlin.de (mail2.rz.htw-berlin.de [141.45.10.102]) by core3.amsl.com (Postfix) with ESMTP id 1FFF03A6C14 for <sam@irtf.org>; Mon,  8 Mar 2010 16:30:31 -0800 (PST)
Envelope-to: sam@irtf.org
Received: from e178138232.adsl.alicedsl.de ([85.178.138.232] helo=mw-thinkpad.fritz.box) by mail2.rz.htw-berlin.de with esmtpsa (TLSv1:RC4-MD5:128) (Exim 4.68 (FreeBSD)) (envelope-from <waehlisch@ieee.org>) id 1NonLF-000GRY-K4 for sam@irtf.org; Tue, 09 Mar 2010 01:30:33 +0100
Date: Tue, 9 Mar 2010 01:30:32 +0100
From: Matthias Waehlisch <waehlisch@ieee.org>
To: sam <sam@irtf.org>
Message-ID: <Pine.WNT.4.64.1003090116590.5936@mw-thinkpad>
X-X-Sender: mw@mail2.rz.fhtw-berlin.de
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
X-HTW-SPAMINFO: this message was scanned by eXpurgate (http://www.eleven.de)
Subject: [SAM] New Version Notification for draft-waehlisch-sam-common-api-02 (fwd)
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Mar 2010 00:30:34 -0000

Hi all,

  we submitted an update of our draft "A Common API for Transparent 
Hybrid Multicast".

  
  The following changes have been made from draft-waehlisch-sam-common-api-01

   1.  Document restructured to clarify the realm of document overview
       and specific contributions s.a. naming and addressing.

   2.  A clear separation of naming and addressing was drawn.  Multicast
       URIs have been introduced,

   3.  Clarified and adapted the API calls.

   4.  Introduced Socket Option calls.

   5.  Deployment use cases moved to an appendix.

   6.  Simple programming example added.

   7.  Many editorial improvements.


  Any feedback is very appreciated!

See you in Anaheim
  matthias

-- 
Matthias Waehlisch
.  FU Berlin, Inst. fuer Informatik, AG CST
.  Takustr. 9, D-14195 Berlin, Germany
.. mailto:waehlisch@ieee.org .. http://www.inf.fu-berlin.de/~waehl
:. Also: http://inet.cpt.haw-hamburg.de .. http://www.link-lab.net

---------- Forwarded message ----------
Date: Mon, 8 Mar 2010 16:13:14 -0800 (PST)
From: IETF I-D Submission Tool <idsubmission@ietf.org>
To: Schmidt@informatik.haw-hamburg.de
Cc: mw@link-lab.net, schmidt@informatik.haw-hamburg.de, stig@cisco.com
Subject: New Version Notification for draft-waehlisch-sam-common-api-02 


A new version of I-D, draft-waehlisch-sam-common-api-02.txt has been successfuly submitted by Thomas Schmidt and posted to the IETF repository.

Filename:	 draft-waehlisch-sam-common-api
Revision:	 02
Title:		 A Common API for Transparent Hybrid Multicast
Creation_date:	 2010-03-08
WG ID:		 Independent Submission
Number_of_pages: 19

Abstract:
Group communication services are most efficiently implemented on the
lowest layer available.  However, as the deployment status of
multicast technologies largely varies throughout the Internet,
globally operational group solutions are frequently forced to using a
stable, upper layer protocol controlled by the application itself.
This document describes a common multicast API that is suitable for
transparent underlay and overlay communication.  It proposes abstract
naming and addressing by multicast URIs and discusses mapping
mechanisms between different namespaces and distribution
technologies.  Additionally, it describes the application of this API
for building gateways that interconnect current multicast domains
throughout the Internet.
                                                                                  


The IETF Secretariat.



From schmidt@informatik.haw-hamburg.de  Tue Mar  9 05:29:15 2010
Return-Path: <schmidt@informatik.haw-hamburg.de>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2F4F13A680F for <sam@core3.amsl.com>; Tue,  9 Mar 2010 05:29:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.036
X-Spam-Level: 
X-Spam-Status: No, score=-1.036 tagged_above=-999 required=5 tests=[AWL=-1.387, BAYES_50=0.001, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CaBoicw7ZHl7 for <sam@core3.amsl.com>; Tue,  9 Mar 2010 05:29:07 -0800 (PST)
Received: from mail2.rz.htw-berlin.de (mail2.rz.htw-berlin.de [141.45.10.102]) by core3.amsl.com (Postfix) with ESMTP id F1D2E3A680D for <sam@irtf.org>; Tue,  9 Mar 2010 05:29:06 -0800 (PST)
Envelope-to: sam@irtf.org
Received: from e178132215.adsl.alicedsl.de ([85.178.132.215] helo=[192.168.178.25]) by mail2.rz.htw-berlin.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68 (FreeBSD)) (envelope-from <schmidt@informatik.haw-hamburg.de>) id 1NozUj-000BsV-Oz for sam@irtf.org; Tue, 09 Mar 2010 14:29:09 +0100
Message-ID: <4B964D1F.1060507@informatik.haw-hamburg.de>
Date: Tue, 09 Mar 2010 14:29:03 +0100
From: "Thomas C. Schmidt" <schmidt@informatik.haw-hamburg.de>
User-Agent: Thunderbird 2.0.0.23 (Windows/20090812)
MIME-Version: 1.0
To: sam <sam@irtf.org>
Content-Type: text/plain; charset=ISO-8859-15; format=flowed
Content-Transfer-Encoding: 8bit
X-HTW-SPAMINFO: this message was scanned by eXpurgate (http://www.eleven.de)
Subject: [SAM] Update: Meeting & Document Stati
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Mar 2010 13:29:15 -0000

Folks,

I've just updated our Wiki page: 
http://trac.tools.ietf.org/group/irtf/trac/wiki/samrg

We'll meet on THURSDAY, March 25, 2010, 1300 - 1500 in the Manhattan 
room. A tentative agenda follows shortly.

I've also made an attempt to sort documents. From my current knowledge, 
we have five active documents:

  * SAM extensions to reload
  * Multiparty transport
  * SAM common API
  * XCAST (2 docs)

Please take a look and hint on anything I may have missed.

Hope to see you in Anaheim

Thomas
-- 

Prof. Dr. Thomas C. Schmidt
° Hamburg University of Applied Sciences                   Berliner Tor 7 °
° Dept. Informatik, Internet Technologies Group    20099 Hamburg, Germany °
° http://www.haw-hamburg.de/inet                   Fon: +49-40-42875-8452 °
° http://www.informatik.haw-hamburg.de/~schmidt    Fax: +49-40-42875-8409 °

From schmidt@informatik.haw-hamburg.de  Tue Mar  9 09:15:51 2010
Return-Path: <schmidt@informatik.haw-hamburg.de>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 728413A6830 for <sam@core3.amsl.com>; Tue,  9 Mar 2010 09:15:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.574
X-Spam-Level: 
X-Spam-Status: No, score=-0.574 tagged_above=-999 required=5 tests=[AWL=-0.925, BAYES_50=0.001, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rQfLRBo000X6 for <sam@core3.amsl.com>; Tue,  9 Mar 2010 09:15:50 -0800 (PST)
Received: from mail2.rz.htw-berlin.de (mail2.rz.htw-berlin.de [141.45.10.102]) by core3.amsl.com (Postfix) with ESMTP id 7369A3A6816 for <sam@irtf.org>; Tue,  9 Mar 2010 09:15:50 -0800 (PST)
Envelope-to: sam@irtf.org
Received: from e178132215.adsl.alicedsl.de ([85.178.132.215] helo=[192.168.178.25]) by mail2.rz.htw-berlin.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68 (FreeBSD)) (envelope-from <schmidt@informatik.haw-hamburg.de>) id 1Np329-000DRz-8l for sam@irtf.org; Tue, 09 Mar 2010 18:15:53 +0100
Message-ID: <4B968242.9050809@informatik.haw-hamburg.de>
Date: Tue, 09 Mar 2010 18:15:46 +0100
From: "Thomas C. Schmidt" <schmidt@informatik.haw-hamburg.de>
User-Agent: Thunderbird 2.0.0.23 (Windows/20090812)
MIME-Version: 1.0
To: sam <sam@irtf.org>
Content-Type: text/plain; charset=ISO-8859-15; format=flowed
Content-Transfer-Encoding: 8bit
X-HTW-SPAMINFO: this message was scanned by eXpurgate (http://www.eleven.de)
Subject: [SAM] Tentative Agenda
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Mar 2010 17:15:51 -0000

Folks,

the tentative agenda is now online:

IRTF SAM RG Meeting, IETF 77
Thursday, March 25th, 2010, 1300 - 1500

1. Introduction, Agenda - Chairs           (5 min)

2. Application Layer Multicast Extensions to RELOAD
    draft-kolberg-sam-baseline-protocol-00
    - Mario Kolberg                        (20 min)

3. A Common API for Transparent Hybrid Multicast
    draft-waehlisch-sam-common-api-02
    - Matthias Waehlisch                   (20 min)

4. Multiparty Transport Overlay Control Protocol(MTOCP)
    draft-kellil-sam-mtocp-00
    - Mounir Kellil (substitute Thomas)    (20 min)

5. Update on the SAM testbed
    - John Buford			  (20 min)

6. G-Lab: Overview of Testbed and Selected Projects
    - Thomas Schmidt			  (20 min)

7. Document Status & Future Work - Chairs (10 min)


Please send any feedback / change request to the chairs asap.

Thanks,

Thomas

-- 

Prof. Dr. Thomas C. Schmidt
° Hamburg University of Applied Sciences                   Berliner Tor 7 °
° Dept. Informatik, Internet Technologies Group    20099 Hamburg, Germany °
° http://www.haw-hamburg.de/inet                   Fon: +49-40-42875-8452 °
° http://www.informatik.haw-hamburg.de/~schmidt    Fax: +49-40-42875-8409 °

From m.garcia.upv@gmail.com  Fri Mar 12 03:36:29 2010
Return-Path: <m.garcia.upv@gmail.com>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 90B7E3A67A5 for <sam@core3.amsl.com>; Fri, 12 Mar 2010 03:36:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_50=0.001, GB_I_INVITATION=-2]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PVBsiVSHDISM for <sam@core3.amsl.com>; Fri, 12 Mar 2010 03:36:24 -0800 (PST)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.21]) by core3.amsl.com (Postfix) with ESMTP id 84E5A3A6767 for <sam@irtf.org>; Fri, 12 Mar 2010 03:36:23 -0800 (PST)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id o2CBaRRc012223 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Fri, 12 Mar 2010 12:36:27 +0100
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id o2CBaRsV006610 for <sam@irtf.org>; Fri, 12 Mar 2010 12:36:27 +0100
Received: from JLLORET (osiris1.gnd.upv.es [158.42.148.63]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id o2CBaRkR022871 for <sam@irtf.org>; Fri, 12 Mar 2010 12:36:27 +0100
Date: Fri, 12 Mar 2010 12:36:27 +0100
Message-Id: <201003121136.o2CBaRkR022871@smtp.upv.es>
From: Miguel Garcia<m.garcia.upv@gmail.com>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] 2nd CfP: ICCGI 2010 || September 20-25, 2010 - Valencia, Spain
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Mar 2010 11:36:29 -0000

2nd CfP: ICCGI 2010 || September 20-25, 2010 - Valencia, Spain

INVITATION:

=================
Please consider to contribute to and/or forward to the appropriate 
groups the following opportunity to submit and publish original 
scientific results.
=================


============== ICCGI 2010 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

ICCGI 2010: The Fifth International Multi-Conference on Computing in the 
Global Information Technology
September 20-25, 2010 - Valencia, Spain

General page: http://www.iaria.org/conferences2010/ICCGI10.html
Call for Papers: http://www.iaria.org/conferences2010/CfPICCGI10.html

Submission deadline: April 20, 2010

Sponsored by IARIA, www.iaria.org
Co-sponsored by IEEE Spain, Illinois State University, University 
Politehnica Bucharest, Universidad Politecnica de Valencia, La 
Machinista Valenciana, IGIC, Hydro-Quebec, Ruder Boskovic Institute,
Orange, Universidad Complutense Madrid

Extended versions of selected papers will be published in IARIA 
Journals: http://www.iariajournals.org
Publisher: CPS ( see: http://www2.computer.org/portal/web/cscps )
Archived: IEEE CSDL (Computer Science Digital Library) and IEEE Xplore
Submitted for indexing: Elsevier's EI Compendex Database, EI's 
Engineering Information Index
Other indexes are being considered: INSPEC, DBLP, Thomson Reuters 
Conference Proceedings Citation Index

Please note the Poster Forum and Work in Progress options.

The topics suggested by the conference can be discussed in term of 
concepts, state of the art, research, standards, implementations, 
running experiments, applications, and industrial case studies. Authors 
are invited to submit complete unpublished papers, which are not under 
review in any other conference or journal in the following, but not 
limited to, topic areas.

All tracks are open to both research and industry contributions, in 
terms of Regular papers, Posters, Work in progress, 
Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: 
http://www.iaria.org/editorialrules.html

ICCGI 2010 Tracks (tracks' topics and submission details: see CfP on the 
site)

Industrial systems
Control theory and systems; Fault-tolerance and reliability; Data 
engineering; Enterprise computing and evaluation; Electrical and 
electronics engineering; Economic decisions and information systems; 
Advanced robotics; Virtual reality systems; Industrial systems and 
applications; Industrial and financial systems; Industrial control 
electronics; Industrial IT solutions

Evolutionary computation
Algorithms, procedures, mechanisms and applications; Computer 
architecture and systems; Computational sciences; Computation in complex 
systems; Computer and communication systems; Computer networks; Computer 
science theory; Computation and computer security; Computer simulation; 
Digital telecommunications; Distributed and parallel computing; 
Computation in embedded and real-time systems; Soft computing; 
User-centric computation

Autonomic and autonomous systems
Automation and autonomous systems; Theory of Computing; Autonomic 
computing; Autonomic networking; Network computing; Protecting 
computing; Theories of agency and autonomy; Multi-agent evolution, 
adaptation and learning; Adjustable and self-adjustable autonomy; 
Pervasive systems and computation; Computing with locality principles; 
GRID networking and services; Pervasive computing; Cluster computing and 
performance; Artificial intelligence Computational linguistics; 
Cognitive technologies; Decision making; Evolutionary computation; 
Expert systems; Computational biology

Bio-technologies
Models and techniques for biometric technologies; Bioinformatics; 
Biometric security; Computer graphics and visualization; Computer vision 
and image processing; Computational biochemistry; Finger, facial, iris, 
voice, and skin biometrics; Signature recognition; Multimodal 
biometrics; Verification and identification techniques; Accuracy of 
biometric technologies; Authentication smart cards and biometric 
metrics; Performance and assurance testing; Limitations of biometric 
technologies; Biometric card technologies; Biometric wireless 
technologies; Biometric software and hardware; Biometric standards

Knowledge data systems
Data mining and Web mining; Knowledge databases and systems; Data 
warehouse and applications; Data warehousing and information systems; 
Database performance evaluation; Semantic and temporal databases; 
Database systems Databases and information retrieval; Digital library 
design; Meta-data modeling

Mobile and distance education
Human computer interaction; Educational technologies; Computer in 
education; Distance learning; E-learning; Mobile learning Cognitive 
support for learning; Internet-based education; Impact of ICT on 
education and society; Group decision making and software; Habitual 
domain and information technology; Computer-mediated communications; 
Immersing authoring; Contextual and cultural challenges in user mobility

Intelligent techniques, logics, and systems
Intelligent agent technologies; Intelligent and fuzzy information 
processing; Intelligent computing and knowledge management; Intelligent 
systems and robotics; Fault-tolerance and reliability; Fuzzy logic & 
systems; Genetic algorithms; Haptic phenomena; Graphic recognition; 
Neural networks; Symbolic and algebraic computation; Modeling, 
simulation and analysis of business processes and systems

Knowledge processing
Knowledge representation models; Knowledge languages; Cognitive science; 
Knowledge acquisition; Knowledge engineering; Knowledge processing under 
uncertainty; Machine intelligence; Machine learning; Making decision 
through Internet; Networking knowledge plan

Information technologies
Information technology and organizational behavior; Agents, data mining 
and ontologies; Information retrieval systems; Information and network 
security; Information ethics and legal evaluations; Optimization and 
information technology; Organizational information systems; Information 
fusion; Information management systems; Information overload; 
Information policy making; Information security; Information systems; 
Information discovery

Internet and web technologies
Internet and WWW-based computing; Web and Grid computing; Internet 
service and training; IT and society; IT in education and health; 
Management information systems; Visualization and group decision making; 
Web based language development; Web search and decision making; Web 
service ontologies; Scientific web intelligence; Online business and 
decision making; Business rule language; E-Business; E-Commerce; Online 
and collaborative work; Social eco-systems and social networking; Social 
decisions on Internet; Computer ethics

Digital information processing
Mechatronics; Natural language processing; Medical imaging; Image 
processing; Signal processing; Speech processing; Video processing; 
Pattern recognition; Pattern recognition models; Graphics & computer 
vision; Medical systems and computing

Cognitive science and knowledge agent-based systems
Cognitive support for e-learning and mobile learning; Agents and 
cognitive models; Agents & complex systems; computational ecosystems; 
Agent architectures, perception, action & planning in agents; Agent 
communication: languages, semantics, pragmatics & protocols; Agent-based 
electronic commerce and trading systems Multi-agent constraint 
satisfaction; Agent programming languages, development environments and 
testbeds; Computational complexity in autonomous agents; Multi-agent 
planning and cooperation; Logics and formal models of for agency 
verification; Nomadic agents; Negotiation, auctions, persuasion; Privacy 
and security issues in multi-agent systems

Mobility and multimedia systems
Mobile communications; Multimedia and visual programming; Multimedia and 
decision making; Multimedia systems; Mobile multimedia systems; 
User-centered mobile applications; Designing for the mobile devices; 
Contextual user mobility; Mobile strategies for global market; 
Interactive television and mobile commerce

Systems performance
Performance evaluation; Performance modeling; Performance of parallel 
computing; Reasoning under uncertainty; Reliability and fault-tolerance; 
Performance instrumentation; Performance monitoring and corrections; 
Performance in entity-dependable systems; Real-time performance and 
near-real time performance evaluation; Performance in software systems; 
Performance and hybrid systems; Measuring performance in embedded systems

Networking and telecommunications
Telecommunication and Networking; Telecommunication Systems and 
Evaluation; Multiple Criteria Decision Making in Information Technology; 
Network and Decision Making; Networks and Security; Communications 
protocols (SIP/H323/MPLS/IP); Specialized networks (GRID/P2P/Overlay/Ad 
hoc/Sensor); Advanced services (VoIP/IPTV/Video-on-Demand; Network and 
system monitoring and management; Feature interaction detection and 
resolution; Policy-based monitoring and managements systems; Traffic 
modeling and monitoring; Traffic engineering and management; 
Self-monitoring, self-healing and self-management systems; 
Man-in-the-loop management paradigm

Software development and deployment
Software requirements engineering; Software design, frameworks, and 
architectures; Software interactive design; Formal methods for software 
development, verification and validation; Neural networks and 
performance; Patterns/Anti-patterns/Artifacts/Frameworks; 
Agile/Generic/Agent-oriented programming; Empirical software evaluation 
metrics; Software vulnerabilities; Reverse engineering; Software reuse; 
Software security, reliability and safety; Software economics; Software 
testing and debugging; Tracking defects in the OO design; Distributed 
and parallel software; Programming languages; Declarative programming; 
Real-time and embedded software; Open source software development 
methodologies; Software tools and deployment environments; Software 
Intelligence; Software Performance and Evaluation

Knowledge virtualization
Modeling techniques, tools, methodologies, languages; Model-driven 
architectures (MDA); Service-oriented architectures (SOA); Utility 
computing frameworks and fundamentals; Enabled applications through 
virtualization; Small-scale virtualization methodologies and techniques; 
Resource containers, physical resource multiplexing, and segmentation; 
Large-scale virtualization methodologies and techniques; Management of 
virtualized systems; Platforms, tools, environments, and case studies; 
Making virtualization real; On-demand utilities Adaptive enterprise; 
Managing utility-based systems; Development environments, tools, prototypes

Systems and networks on the chip
Microtechnology and nanotechnology; Real-time embedded systems; 
Programming embedded systems; Controlling embedded systems; High speed 
embedded systems; Designing methodologies for embedded systems; 
Performance on embedded systems; Updating embedded systems; 
Wireless/wired design of systems-on-the-chip; Testing embedded systems; 
Technologies for systems processors; Migration to single-chip systems

Context-aware systems
Context-aware autonomous entities; Context-aware fundamental concepts, 
mechanisms, and applications; Modeling context-aware systems; 
Specification and implementation of awareness behavioral contexts; 
Development and deployment of large-scale context-aware systems and 
subsystems; User awareness requirements Design techniques for interfaces 
and systems; Methodologies, metrics, tools, and experiments for 
specifying context-aware systems; Tools evaluations, Experiment evaluations

Networking technologies
Next generation networking; Network, control and service architectures; 
Network signalling, pricing and billing; Network middleware; 
Telecommunication networks architectures; On-demand networks, utility 
computing architectures; Next generation networks [NGN] principles; 
Storage area networks [SAN]; Access and home networks; High-speed 
networks; Optical networks; Peer-to-peer and overlay networking; Mobile 
networking and systems; MPLS-VPN, IPSec-VPN networks; GRID networks; 
Broadband networks

Security in network, systems, and applications
IT in national and global security; Formal aspects of security; Systems 
and network security; Security and cryptography; Applied cryptography; 
Cryptographic protocols; Key management; Access control; Anonymity and 
pseudonymity management; Security management; Trust management; 
Protection management; Certification and accreditation; Virii, worms, 
attacks, spam; Intrusion prevention and detection; Information hiding; 
Legal and regulatory issues

Knowledge for global defense
Business continuity and availability; Risk assessment; Aerospace 
computing technologies; Systems and networks vulnerabilities; Developing 
trust in Internet commerce; Performance in networks, systems, and 
applications; Disaster prevention and recovery; IT for anti-terrorist 
technology innovations (ATTI); Networks and applications emergency 
services; Privacy and trust in pervasive communications; Digital rights 
management; User safety and protection

Information Systems [IS]
Management Information Systems; Decision Support Systems; Innovation and 
IS; Enterprise Application Integration; Enterprise Resource Planning; 
Business Process Change; Design and Development Methodologies and 
Frameworks; Iterative and Incremental Methodologies; Agile 
Methodologies; IS Standards and Compliance Issues; Risk Management in IS 
Design and Development; Research Core Theories; Conceptualisations and 
Paradigms in IS; Research Ontological Assumptions in IS Research; IS 
Research Constraints, Limitations and Opportunities; IS vs Computer 
Science Research; IS vs Business Studies

IPv6 Today - Technology and deployment
IP Upgrade - An Engineering Exercise or a Necessity?; Worldwide IPv6 
Adoption - Trends and Policies; IPv6 Programs, from Research to 
Knowledge Dissemination; IPv6 Technology - Practical Information; 
Advanced Topics and Latest Developments in IPv6; IPv6 Deployment 
Experiences and Case Studies; IPv6 Enabled Applications and Devices

Modeling
Continuous and Discrete Models; Optimal Models; Complex System Modeling; 
Individual-Based Models; Modeling Uncertainty; Compact Fuzzy Models; 
Modeling Languages; Real-time modeling; Peformance modeling

Optimization
Multicriteria Optimization; Multilervel Optimization; Goal Programming; 
Optimization and Efficiency; Optimization-based decisions; Evolutionary 
Optimization; Self-Optimization; Extreme Optimization; Combinatorial 
Optimization; Disccrete Optimization; Fuzzy Optimization; Lipschitzian 
Optimization; Non-Convex Optimization; Convexity; Continuous 
Optimization; Interior point methods; Semidefinite and Conic Programming

Complexity
Complexity Analysis; Computational Complexity; Complexity Reduction; 
Optimizing Model Complexity; Communication Complexity; Managing 
Complexity; Modeling Complexity in Social Systems; Low-complexity Global 
Optimization; Software Development for Modeling and Optimization; 
Industrial applications

==========
ICCGI 2010 General Chair
Jordi Bataller, Polytechnic University of Valencia, Spain

ICCGI Advisory Chairs
Mirela Danubianu, "Stefan cel Mare" University of Suceava, Romania
Petre Dini, Concordia University, Canada / IARIA
Tibor Gyires, Technology Illinois State University, USA
José Valerdi, France Telecom R&D (Orange Labs), Spain

ICCGI 2010 Research Institute Liaison Chairs
Robert Chew, Lien Centre for Social Innovation, Singapore
Matjaz Gams, Jozef Stefan Institute - Ljubljana, Slovenia
Karolj Skala, Rudjer Bokovic Institute - Zagreb, Croatia
Mauro Teófilo, Nokia Technology Institute, Brazil

ICCGI 2010 Industry/Research Chairs
Kemal A. Delic, Hewlett-Packard Co. France
José García Escudero, La Maquinista Valenciana, Spain
Jivesh Govil, Cisco Systems, Inc., USA
Liviu Panait, Google Inc., USA
Jean-Denis Mathias, CEMAGREF - Clermont-Ferrand, France
Hoo Chong Wei, Motorola Inc., Malaysia

Committee members: http://www.iaria.org/conferences2010/ComICCGI10.html
=============

From m.garcia.upv@gmail.com  Sat Mar 13 04:43:55 2010
Return-Path: <m.garcia.upv@gmail.com>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 848483A692C for <sam@core3.amsl.com>; Sat, 13 Mar 2010 04:43:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.299
X-Spam-Level: 
X-Spam-Status: No, score=-3.299 tagged_above=-999 required=5 tests=[AWL=1.300,  BAYES_00=-2.599, GB_I_INVITATION=-2]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FVcKkYPrKWtF for <sam@core3.amsl.com>; Sat, 13 Mar 2010 04:43:53 -0800 (PST)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.21]) by core3.amsl.com (Postfix) with ESMTP id 785F23A67B1 for <sam@irtf.org>; Sat, 13 Mar 2010 04:43:49 -0800 (PST)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id o2DChswv003890 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Sat, 13 Mar 2010 13:43:54 +0100
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id o2DChsE5001627 for <sam@irtf.org>; Sat, 13 Mar 2010 13:43:54 +0100
Received: from JLLORET (osiris1.gnd.upv.es [158.42.148.63]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id o2DChrpK029911 for <sam@irtf.org>; Sat, 13 Mar 2010 13:43:53 +0100
Date: Sat, 13 Mar 2010 13:43:53 +0100
Message-Id: <201003131243.o2DChrpK029911@smtp.upv.es>
From: Miguel Garcia Pineda<m.garcia.upv@gmail.com>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] 2nd CfP: ACCESS 2010 || September 20-25, 2010 - Valencia, Spain
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sat, 13 Mar 2010 12:43:55 -0000

2nd CfP: ACCESS 2010 || September 20-25, 2010 - Valencia, Spain

INVITATION:

=================
Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results.
=================


============== ACCESS 2010 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

ACCESS 2010: The First International Conferences on Access Networks, Services and Technologies
September 20-25, 2010 - Valencia, Spain

General page: http://www.iaria.org/conferences2010/ACCESS10.html
Call for Papers: http://www.iaria.org/conferences2010/CfPACCESS10.html

Submission deadline: April 20, 2010

Sponsored by IARIA, www.iaria.org
Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org
Publisher: CPS ( see: http://www2.computer.org/portal/web/cscps )
Archived: IEEE CSDL (Computer Science Digital Library) and IEEE Xplore
Submitted for indexing: Elsevier's EI Compendex Database, EI's Engineering Information Index
Other indexes are being considered: INSPEC, DBLP, Thomson Reuters Conference Proceedings Citation Index

Please note the Poster Forum and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. 

All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html

ACCESS 2010 Tracks (tracks' topics and submission details: see CfP on the site)

NEXTACCESS: Next generation access technologies
Interactivity, unlimited access and full-scale media support; Energy-aware and efficiency-oriented technologies; Sustainable access network business (standard DSL vs. fiber vs. wireless access); 3G/4G wireless technologies; Multiservice access (DSL, fiber, WiMAX, POTS); FTTH; Ethernet P2P vs. xPON; FTTx with VDSL2, or Ethernet, or DOCSIS 3.0; Radio extension, 802.xx (Wi-Fi, WiMax, etc.); LTE, LTE-advanced; IMT-advanced networks; Mesh and relay networks (IEEE 802.11s, IEEE802.16j, etc.); Quality of experience (QoE)

FEMTO: Femtocells-based access
Femtocells architectures; Femtocells requirements ands specifications; Femtocells protocols; Femtocells services and applications; Traffic and QoS in Femtocells; Performance analysis in Femtocells; Femtocells control and management; Interoperability of Femtocells devices; Femtocells operation optimization; Femtocells specific solutions for mobility; OFDMA Femtocells: interference avoidance; Macrocell-Femto cell interference issues and mitigation; Macrocell-Femto cell handover strategies; WiMAX Fentocells; Standardization of Femtocells

BROADBAND: Broadband wireless Internet access
New architectures, technologies, protocols for broadband wireless access; QoS in mobile and broadband wireless access networks; Broadcast and multicast support; Physical and data link layer issues; Medium access control, SLA and QoS; Radio resource management and call admission control; Space-time coding for broadband wireless Internet; Modulation, coding and antennas (MIMO); Spectrum management; Scalability and reliability issues; Wireless mesh networks; Capacity planning and traffic engineering; Security and privacy issues; Interoperability aspects (fixed/mobile LANs/MANs, WANs); Experiences/lessons from recent deployments

OPTICAL: Optical access networks
Optical access network architecture design; Optical access network components and systems; New PON developments and testbeds; WDM and OFDM PON technologies; MAC and bandwidth allocation; RoF network architecture and MAC; RoF components and systems; Signal processing for new modulation formats; Optical spectral management; Multimode fiber technology and applications; Performance monitoring and diagnosis; Deployment and economic analysis

MOBILE WIRELESS: Mobile wireless access
Mobile Broadband Wireless Access; Wireless/Mobile Access Protocols; Wireless/Mobile Web Access; Ubiquitous and mobile access; Mobile/vehicular environment access; Multi-Homing and Vertical Handoff; Localization and tracking; Context-aware services and applications; Context-aware protocols and protocol architectures; Interactive applications; Mobile and Wireless Entertainment; Mobile Info-services; Wireless ad hoc and sensor networks

DYNAMIC: Dynamic and cognitive access
Dynamic spectrum access; Architectures and platforms for dynamic spectrum access networks; Spectrum sensing, measurement and models; Efficient and broadband spectrum sensing; Interference metrics and measurements; New spectrum protocols and models; Cognitive radio (cross-layer optimization); Multiple access schemes for cognitive radio networks; Radio resource management and dynamic spectrum access networks; Dynamic spectrum auction and economics; Business model, pricing, and regulations for dynamic spectrum

HOWAN: Hybrid optical and wireless access networks
Multi-hop wireless mesh networks; Passive optical networks; Node architecture and design of hybrid optical and wireless networks; Emerging wireless/optical applications QoS management for hybrid access networks; PON and WDM-PON network experiments; Radio over Fiber (RoF); FTTx network architecture and applications; Routing and multicast over hybrid optical and wireless networks; Service resilience and availability of hybrid optical and wireless networks; Applications and evolutions of hybrid access networks; Network design, control, and performance in HOWANs; Capacity analysis, flow and congestion control in HOWANs; Optimization of hybrid optical and wireless networks; Evolution of HOWAN access networks Broadband wireless access in HOWANs; Security and privacy in HOWANs; New services and applications; Test-bed and prototype implementation; Standardization issues

COPPER: Copper Access
Ubiquity via phone lines; Speed reaching 100 Mbps; DSL broadband access; Dynamic and joint optimization of resources (frequency, amplitude, space, and time); Attenuation and crosstalk bottlenecks; Management and control for the multi-user twisted pair networks

GIGATERA: Giga/Tera Access
Multi-antenna technologies (MIMO, Beamforming, Antenna Selection, etc); RF/Antenna propagation (RF beamforming, Tera-Hz signal generation, Propagation); Interoperability aspects (fixed/mobile LANs/MANs, WANs); Signal processing for millimeter and Tera-Hz wireless systems; NLOS avoidance techniques; Cooperative networks, repeaters and relaying; Error correction, equalization; Space division multiple access; Coexistence and interoperability; OFDM versus single-carrier systems; MIMO in mm-wave and Tera-Hz systems; OFDMA processing; Spread spectrum techniques; High-efficiency medium access control (MAC) protocol; Neighbor discovery in directional wireless networks

CONTROL: Access Control 
Foundations for access control; Models for access control; Mechanisms for access control; Policy-driven and role-driven access control; Delegation and identity management; Privacy-drive control; Access control for advanced applications (cloud, autonomic, sensor, social networks, etc.); Standards for accesses control

NEUTRAL: Neutral Access Networks
Open access networks; Network neutrality; Operator-neutral residential access technologies; Operator-neutral nomadic access technologies; Operator-neutral mobile access technologies; Operator-neutral CPEs; Internet access regulation; NANs design and management; Multi-gateway traffic management; QoS management in shared infrastructures; Routing and multicast in NANs; Broadband business models for NANs; Broadband pricing models for NANs; Broadband market analysis for NANs; IP traffic models for NANs; Edge routers for NANs; Identity management in NANs; NANS and Digital divide; NANs and Digital inclusion; Inclusive services and applications; NAN testbeds and case studies

LEGAL: Legal aspects on network and service access
Network neutrality principle; Security and privacy rights; Institutional implications; Accessibility and social affordability; User responsibility

==========
ACCESS 2010 General Chairs
Elsa María Macías López, University of Las Palmas de Gran Canaria, Spain
Álvaro Suárez Sarmiento, University of Las Palmas de Gran Canaria, Spain

ACCESS Advisory Committee
Alessandro Bogliolo, Università di Urbino, Italy
Fabio M. Chiussi, Airvana, Inc., USA 
Mark Perry, University of Western Ontario/Faculty of Law/ Faculty of Science - London, Canada 
Shing-Wa Wong, Stanford University, USA 

ACCESS 20101 Research Institute Liaison Chairs
Sradhi Chava, CREATE-NET, Italy 
Moshe Ran, H.I.T - Holon Institute of Technology, Israel 

ACCESS 2010 Industry/Research Chairs
Alexander Klein, Technische Universität München, Germany 

ACCESS 2010 Special Area Chairs
FEMTO Chair 
    Fabio M. Chiussi, Airvana, Inc., USA 

Committee members: http://www.iaria.org/conferences2010/ComACCESS10.html
====================

From jlloret@dcom.upv.es  Tue Mar 16 09:29:43 2010
Return-Path: <jlloret@dcom.upv.es>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CC1143A6B7C for <sam@core3.amsl.com>; Tue, 16 Mar 2010 09:29:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.248
X-Spam-Level: 
X-Spam-Status: No, score=-0.248 tagged_above=-999 required=5 tests=[AWL=-2.248, BAYES_80=2]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KV5G3VL20HSl for <sam@core3.amsl.com>; Tue, 16 Mar 2010 09:29:42 -0700 (PDT)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.21]) by core3.amsl.com (Postfix) with ESMTP id 3029C3A6BB4 for <sam@irtf.org>; Tue, 16 Mar 2010 09:29:40 -0700 (PDT)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id o2GGTlwH021756 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Tue, 16 Mar 2010 17:29:47 +0100
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id o2GGTkZN010410 for <sam@irtf.org>; Tue, 16 Mar 2010 17:29:47 +0100
Received: from JLLORET (vpn245-27.vpns.upv.es [158.42.245.27]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id o2GGTjjA003954 for <sam@irtf.org>; Tue, 16 Mar 2010 17:29:46 +0100
Date: Tue, 16 Mar 2010 17:29:46 +0100
Message-Id: <201003161629.o2GGTjjA003954@smtp.upv.es>
From: Jaime Lloret Mauri<jlloret@dcom.upv.es>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] CFP: WiMob'2010 - 6th IEEE INTERNATIONAL CONFERENCE on Wireless & Mobile Computing, Networking & communication
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Mar 2010 16:29:43 -0000

(Apologies if you receive multiple copies of this message)
|----------------------------------------------------------|
|                       WiMob 2010                         |
|             6th IEEE INTERNATIONAL CONFERENCE on         |
| Wireless & Mobile Computing, Networking & communication  |
+----------------------------------------------------------+
                     Niagara Falls, Canada
                      October 11-13, 2010
      http://conferences.computer.org/WiMob2010



SCOPE:
------

The research area of mobile computing has become more important following the recent widespread drive towards mobile ad hoc networks, wireless sensor networks and vehicular ad hoc network tracking technologies and their applications. The availability of high bandwidth 3G infrastructures and the pervasive deployment of low cost WiFi infrastructures and WiMAX to create hotspots around the world serve to accelerate the development of mobile computing towards ubiquitous computing. 
WiMobÕ10 addresses three main areas:
        - Wireless Communications
        - Mobile Networking, Mobility and Nomadicity
        - Ubiquitous Computing, Services and Applications
        
This conference aims to stimulate interactions among participants and enable them to exchange new ideas and practical experience. WiMobÕ10 is the sixth in a series of annual conferences: twice in Montreal, Canada in 2005 and 2006; in New York, USA in 2007; in Avignon, France in 2008; and in Marrakech, Morocco in 2009.




IMPORTANT DATES:
----------------

Paper submission due:  	     	May 16, 2010
Notification of acceptance:  	July 16, 2010
Final manuscripts due:       	July 30, 2010

High quality original papers that at the time of submission are neither published nor submitted for publications elsewhere are solicited. Please visit  http://conferences.computer.org/WiMob2010 for details and submission information. 


From mko@cs.stir.ac.uk  Mon Mar 22 08:12:10 2010
Return-Path: <mko@cs.stir.ac.uk>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9A1E228C13C for <sam@core3.amsl.com>; Mon, 22 Mar 2010 08:12:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.76
X-Spam-Level: *
X-Spam-Status: No, score=1.76 tagged_above=-999 required=5 tests=[AWL=-2.870,  BAYES_99=3.5, DNS_FROM_OPENWHOIS=1.13]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aIDy0GQQcT3x for <sam@core3.amsl.com>; Mon, 22 Mar 2010 08:12:05 -0700 (PDT)
Received: from mailscanner2.stir.ac.uk (mailscanner2.stir.ac.uk [139.153.13.35]) by core3.amsl.com (Postfix) with ESMTP id B37943A697B for <sam@irtf.org>; Mon, 22 Mar 2010 08:12:01 -0700 (PDT)
Received: from yen.cs.stir.ac.uk ([139.153.254.70]) by mailscanner2.stir.ac.uk with esmtp (Exim 4.69) (envelope-from <mko@cs.stir.ac.uk>) id 1NtjIO-0006eS-Dh for sam@irtf.org; Mon, 22 Mar 2010 15:12:06 +0000
Received: from [139.153.253.90] by yen.cs.stir.ac.uk (8.9.3) id PAA05768; Mon, 22 Mar 2010 15:12:00 GMT
Message-ID: <4BA788C0.4060908@cs.stir.ac.uk>
Date: Mon, 22 Mar 2010 15:12:00 +0000
From: Dr Mario Kolberg <mko@cs.stir.ac.uk>
User-Agent: Thunderbird 2.0.0.24 (Windows/20100228)
MIME-Version: 1.0
To: sam <sam@irtf.org>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: quoted-printable
X-MIME-Autoconverted: from 8bit to quoted-printable by yen.cs.stir.ac.uk id PAA05768
X-MailScanner-ID: 1NtjIO-0006eS-Dh
X-stir.ac.uk-MailScanner: Found to be clean
X-stir.ac.uk-MailScanner-From: mko@cs.stir.ac.uk
MailScanner-NULL-Check: 1269875529.43075@zmCZUONOdIBmnSE8dnD6zw
Subject: [SAM] IEEE CCNC Call for Workshop proposals
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Mar 2010 15:12:10 -0000

Call for IEEE CCNC 2011 Workshop Proposals

***********************************************************************
8th Annual IEEE Consumer Communications and Networking Conference

Las Vegas, Nevada USA
January 8 =96 11, 2011
http://www.ieee-ccnc.org/

CALL FOR WORKSHOP PROPOSALS

***********************************************************************

INTRODUCTION

The IEEE CCNC organizing committee invite proposals for the CCNC
Workshops to be held either on 8 or 11 January, 2011, Las Vegas, USA, in
conjunction with the main technical program of the CCNC 2011 conference
(http://www.ieee-ccnc.org/). All researchers and practitioners
interested in organizing workshops are invited to submit workshop
proposals. The purpose of the CCNC Workshops 2011 is to provide
participants with an international forum and opportunity to discuss
novel research ideas and challenges in a wide range of networked
consumer systems. The workshop proceedings will be published by IEEE
(and will be indexed accordingly).

Workshop manuscripts should be written in English conforming to the IEEE
standard conference format (8.5" x 11", Two-Column) and not exceed 5
pages in length. Submission of papers should be regarded as a commitment
such that, if accepted, at least one author of the paper will register
and attend the conference; otherwise it will be removed from the IEEE
Digital Library after the conference.

SUBMISSION GUIDELINES

To propose a workshop in conjunction with CCNC 2011, please submit a
workshop proposal including the following information:

- The title of the workshop;
- The workshop scope and the introduction of the technical issues that
the workshop will address;
- The important anticipated deadlines of the workshop;
- The detailed contact information of the workshop organizers, such as
names, titles, affiliations, postal code and address, phone and fax
numbers, and e-mail addresses;
- A one paragraph overview of the organizers' experience of
conference/workshop organization, and one paragraph describing how you
will advertise and distribute information to attract more papers for
your workshop.

For better management, the CCNC workshop organizers are required to use
EDAS to manage their papers.


IMPORTANT DATES

Workshop proposals deadline:        April 15, 2010
Notification of proposal decision:  April 29, 2010
Deadline for workshop papers:       August 24, 2010
Acceptance of workshop papers:      September 15, 2010
Camera-ready version (hard):        October 1, 2010
Workshop presentations:             January 8 or 11, 2011

WORKSHOPS CONTACT

All workshop proposals should be submitted by e-mail to the CCNC
Workshops 2011 Chair,
Dr David Llewellyn-Jones (D.Llewellyn-Jones@ljmu.ac.uk), Liverpool John
Moores University, Liverpool, UK.



--=20
The Sunday Times Scottish University of the Year 2009/2010
The University of Stirling is a charity registered in Scotland,=20
 number SC 011159.


From schmidt@informatik.haw-hamburg.de  Thu Mar 25 17:40:01 2010
Return-Path: <schmidt@informatik.haw-hamburg.de>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0E2583A684D for <sam@core3.amsl.com>; Thu, 25 Mar 2010 17:40:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.423
X-Spam-Level: *
X-Spam-Status: No, score=1.423 tagged_above=-999 required=5 tests=[AWL=-0.058,  BAYES_50=0.001, DNS_FROM_OPENWHOIS=1.13, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ASyXHWvoDeRS for <sam@core3.amsl.com>; Thu, 25 Mar 2010 17:39:59 -0700 (PDT)
Received: from mail2.rz.htw-berlin.de (mail2.rz.htw-berlin.de [141.45.10.102]) by core3.amsl.com (Postfix) with ESMTP id 762D43A67FC for <sam@irtf.org>; Thu, 25 Mar 2010 17:39:58 -0700 (PDT)
Envelope-to: sam@irtf.org
Received: from [130.129.29.157] by mail2.rz.htw-berlin.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68 (FreeBSD)) (envelope-from <schmidt@informatik.haw-hamburg.de>) id 1Nuxb1-000CZO-3y for sam@irtf.org; Fri, 26 Mar 2010 01:40:19 +0100
Message-ID: <4BAC026B.9080607@informatik.haw-hamburg.de>
Date: Thu, 25 Mar 2010 17:40:11 -0700
From: "Thomas C. Schmidt" <schmidt@informatik.haw-hamburg.de>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.8) Gecko/20100227 Lightning/1.0b1 Thunderbird/3.0.3
MIME-Version: 1.0
To: sam <sam@irtf.org>
Content-Type: text/plain; charset=ISO-8859-15; format=flowed
Content-Transfer-Encoding: 8bit
X-HTW-SPAMINFO: this message was scanned by eXpurgate (http://www.eleven.de)
Subject: [SAM] Meeting Materials & call for reviews
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Mar 2010 00:40:01 -0000

Folks,

the slides of today's meeting are uploaded:
https://datatracker.ietf.org/meeting/77/materials.html#wg-SAMRG

Please have a look and send your comments.

In particular, Mario Kolberg raised the question of adopting 
draft-kolberg-sam-baseline-protocol-00 as an RG work item.
To obtain a consensus on a possible adoption, please have a closer look 
at the draft

http://tools.ietf.org/html/draft-kolberg-sam-baseline-protocol-00

and the presentation

http://www.ietf.org/proceedings/10mar/slides/SAMRG-1.pdf

and please bring your feedback to the list.

Thanks to all!

Thomas

-- 

Prof. Dr. Thomas C. Schmidt
° Hamburg University of Applied Sciences                   Berliner Tor 7 °
° Dept. Informatik, Internet Technologies Group    20099 Hamburg, Germany °
° http://www.haw-hamburg.de/inet                   Fon: +49-40-42875-8452 °
° http://www.informatik.haw-hamburg.de/~schmidt    Fax: +49-40-42875-8409 °

From waehlisch@ieee.org  Fri Mar 26 14:36:09 2010
Return-Path: <waehlisch@ieee.org>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CAE013A67D3 for <sam@core3.amsl.com>; Fri, 26 Mar 2010 14:36:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -98.519
X-Spam-Level: 
X-Spam-Status: No, score=-98.519 tagged_above=-999 required=5 tests=[BAYES_50=0.001, DNS_FROM_OPENWHOIS=1.13, HELO_EQ_DE=0.35, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eLY3itksdE7e for <sam@core3.amsl.com>; Fri, 26 Mar 2010 14:36:08 -0700 (PDT)
Received: from mail2.rz.htw-berlin.de (mail2.rz.htw-berlin.de [141.45.10.102]) by core3.amsl.com (Postfix) with ESMTP id 852F83A67A3 for <sam@irtf.org>; Fri, 26 Mar 2010 14:36:08 -0700 (PDT)
Envelope-to: sam@irtf.org
Received: from dhcp-wireless-open-abg-29-156.meeting.ietf.org ([130.129.29.156] helo=mw-thinkpad.meeting.ietf.org) by mail2.rz.htw-berlin.de with esmtpsa (TLSv1:RC4-MD5:128) (Exim 4.68 (FreeBSD)) (envelope-from <waehlisch@ieee.org>) id 1NvHCg-000Gwn-Ip; Fri, 26 Mar 2010 22:36:31 +0100
Date: Fri, 26 Mar 2010 14:36:21 -0700 (Pazifik Sommerzeit)
From: Matthias Waehlisch <waehlisch@ieee.org>
To: mounir.kellil@cea.fr, christophe.janneteau@cea.fr, pierre.roux@cea.fr
Message-ID: <Pine.WNT.4.64.1003261040590.4220@mw-thinkpad>
X-X-Sender: mw@mail2.rz.fhtw-berlin.de
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
X-HTW-SPAMINFO: this message was scanned by eXpurgate (http://www.eleven.de)
Cc: sam@irtf.org
Subject: [SAM] draft-kellil-sam-mtocp
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Mar 2010 21:36:10 -0000

Dear authors,

  I read your draft on the multiparty transport overlay control 
protocol. Nice work. Can you clarify the following questions:

  * How does the MTO-Ctrl knows other MTO entities? Must all MTOCP 
entities have to register at the MTO-Ctrl?

  * In section 2.2, you mention that the MTO-Ctrl assigns the port 
numbers. How does the Ctrl knows that ports are not already in use?

  * The forwarding process is a bit unclear to me: By which means does 
an overlay node to unicast or to multicast?

  * It may be helpful to mention explicitly which states are maintained 
by which MTOCP entity.

  * And an editorial question: Page 4: "Comments are solicited and 
should be addressed ..." Is the mailing list correct?


Thanks
  matthias


-- 
Matthias Waehlisch
.  FU Berlin, Inst. fuer Informatik, AG CST
.  Takustr. 9, D-14195 Berlin, Germany
.. mailto:waehlisch@ieee.org .. http://www.inf.fu-berlin.de/~waehl
:. Also: http://inet.cpt.haw-hamburg.de .. http://www.link-lab.net

From schmidt@informatik.haw-hamburg.de  Fri Mar 26 16:44:00 2010
Return-Path: <schmidt@informatik.haw-hamburg.de>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 04D883A6A7D; Fri, 26 Mar 2010 16:44:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.962
X-Spam-Level: *
X-Spam-Status: No, score=1.962 tagged_above=-999 required=5 tests=[AWL=-0.569,  BAYES_50=0.001, DNS_FROM_OPENWHOIS=1.13, HELO_EQ_DE=0.35, SARE_TOWRITE=1.05]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FbGTCCuqWjWY; Fri, 26 Mar 2010 16:43:58 -0700 (PDT)
Received: from mail2.rz.htw-berlin.de (mail2.rz.htw-berlin.de [141.45.10.102]) by core3.amsl.com (Postfix) with ESMTP id 815773A6782; Fri, 26 Mar 2010 16:43:58 -0700 (PDT)
Envelope-to: p2prg@irtf.org, sam@irtf.org
Received: from [130.129.29.157] by mail2.rz.htw-berlin.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68 (FreeBSD)) (envelope-from <schmidt@informatik.haw-hamburg.de>) id 1NvJCO-0005Xl-F6; Sat, 27 Mar 2010 00:44:20 +0100
Message-ID: <4BAD46D0.3040203@informatik.haw-hamburg.de>
Date: Fri, 26 Mar 2010 16:44:16 -0700
From: "Thomas C. Schmidt" <schmidt@informatik.haw-hamburg.de>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.8) Gecko/20100227 Lightning/1.0b1 Thunderbird/3.0.3
MIME-Version: 1.0
To: p2prg@irtf.org
References: <Pine.GSO.4.61.1003242141150.8106@stekt3>
In-Reply-To: <Pine.GSO.4.61.1003242141150.8106@stekt3>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 8bit
X-HTW-SPAMINFO: this message was scanned by eXpurgate (http://www.eleven.de)
Cc: sam <sam@irtf.org>
Subject: Re: [SAM] [p2prg] New survey draft on P2P group management (fwd)
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Mar 2010 23:44:00 -0000

Dear Authors,

you are proposing a taxonomy of P2P group management. I read your draft, 
looked at your presentation slides, and can provide the following comments:

In general, I was lost in the document, as it was not clear to me what 
this actually addresses. You target at "group management" which actually 
is a core operation for group communication solutions. However, I could 
not clearly see that you address group communication in the sense, that 
the communication model you regard and draw examples from actually is in 
groups (as distinguished from other multiparty approaches like swarm 
routing or mesh-building techniques ...).

Correspondingly, you present a (somewhat random) collection of Example 
Solutions in Section 2. These examples are partly from the group 
communication area, partly they are not. In particular, they seem far 
from exploring the design space of group management, and do not always 
represent initial contributions (P2P group management did not start in 
the year 2003).

IMHO it would be useful to compile an overview of all major group 
management mechanisms that are around, and it will be good practice to 
give credits to those who invented them or first transferred them into 
the P2P world. I would highly appreciate to see this overview 
categorized in a number of useful categories like performance, 
cost/overhead, flexibility, scaling ...

The taxonomy you propose, I cannot really follow. This is for several 
reasons. At first, your "high-level properties" don't appear sharp nor 
relevant to me (What difference does it make that some group is formed 
for conferencing or for collaboration?). Second you enumerate categories 
that are orthogonal to each other (e.g., knowledge sharing : 
security/trust). Third you are cutting out the measures above that are 
of typical concern.

Personally, I would think that a clear focus of the document and a 
stringent, rigorous and relevant categorization would be a great 
improvement.

Two additional suggestions:

  * Can you provide your long report to the community?
  * As this is a group topic, it might make sense to get SAMRG involved.

Best regards,

Thomas

On 24.03.2010 12:42, Mika Ylianttila wrote:
> Hi,
>
> as present co-author, I will say few words in the meeting, mainly to
> point out this work we have done, kind of "as per your request".
>
> Presentation slides summarizing the draft can be now found at the
> IETF77 meeting materials page:
> https://datatracker.ietf.org/meeting/77/materials.html
> --> http://www.ietf.org/proceedings/10mar/slides/P2PRG-7.pdf
>
> Discussion topics:
> - need of this type of taxonomy as Informational RFC? (based on previous
> discussions we assume yes)
> - scope and extent of the draft
> - should it be simplified (how)
> - less example solutions?
> - less categories (what)?
> - should it be clarified (how)
> - are the naming conventions clear enough?
> - should it extended (how)
> - for example. maybe additional criteria assessing the feasibility or
> performance of the solution. However, this is propably topic for
> further studies and maybe in the solution space.
> - as other solutions emerge, maybe some updates/extensions. This is also
> future topic.
>
> Hope you find time to provide some input.
>
> Many thanks,
>
> Mika Ylianttila
> (at IETF77)
>
>
>
> On Tue, 23 Mar 2010, Erkki Harjula wrote:
>
>> Howdy,
>>
>> In the previous P2PRG meeting in Stockholm, we presented a draft on
>> peer-to-peer based group management. In the meeting, we received
>> multiple comments pointing out that there is a need for a
>> comprehensive survey on existing and proposed group management
>> mechanisms.
>>
>> Thus, before proceeding with the solution draft, we decided to write a
>> separate survey-type draft presenting the existing and proposed P2P
>> group management solutions in the literature. The draft is called
>> "Taxonomy for P2P Group Management Solutions". It provides an analysis
>> and the taxonomy of the existing and proposed P2P group management
>> solutions.
>>
>> The draft can be found at:
>> http://tools.ietf.org/search/draft-kassinen-p2psip-group-taxonomy-00
>>
>> We would be grateful for your comments.
>>
>> BR, Erkki
>> _______________________________________________
>> p2prg mailing list
>> p2prg@irtf.org
>> http://www.irtf.org/mailman/listinfo/p2prg
>>
> _______________________________________________
> p2prg mailing list
> p2prg@irtf.org
> http://www.irtf.org/mailman/listinfo/p2prg

-- 

Prof. Dr. Thomas C. Schmidt
° Hamburg University of Applied Sciences                   Berliner Tor 7 °
° Dept. Informatik, Internet Technologies Group    20099 Hamburg, Germany °
° http://www.haw-hamburg.de/inet                   Fon: +49-40-42875-8452 °
° http://www.informatik.haw-hamburg.de/~schmidt    Fax: +49-40-42875-8409 °

From astavrou@gmu.edu  Mon Mar 22 07:37:03 2010
Return-Path: <astavrou@gmu.edu>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 69CAA3A68BF for <sam@core3.amsl.com>; Mon, 22 Mar 2010 07:37:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.351
X-Spam-Level: *
X-Spam-Status: No, score=1.351 tagged_above=-999 required=5 tests=[BAYES_50=0.001, DNS_FROM_OPENWHOIS=1.13, HTML_MESSAGE=0.001, J_CHICKENPOX_12=0.6, RCVD_IN_DNSWL_LOW=-1, RCVD_IN_SORBS_WEB=0.619]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xk+sJKST72Z3 for <sam@core3.amsl.com>; Mon, 22 Mar 2010 07:37:01 -0700 (PDT)
Received: from caduceus2.gmu.edu (caduceus2.gmu.edu [129.174.0.41]) by core3.amsl.com (Postfix) with ESMTP id 8B3623A67AC for <sam@irtf.org>; Mon, 22 Mar 2010 07:36:43 -0700 (PDT)
Received: from arcturus.nat-wireless.gmu.edu ([129.174.97.34]) by caduceus2.gmu.edu (Sun Java System Messaging Server 6.2-2.05 (built Apr 28 2005)) with ESMTPSA id <0KZO00MGCTWIB640@caduceus2.gmu.edu> for sam@irtf.org; Mon, 22 Mar 2010 10:37:00 -0400 (EDT)
Date: Mon, 22 Mar 2010 10:37:00 -0400
From: Angelos Stavrou <astavrou@gmu.edu>
To: sam@irtf.org
Message-id: <C922E096-0E5C-431A-9B24-F1441DAD9C46@gmu.edu>
MIME-version: 1.0
X-Mailer: Apple Mail (2.1077)
Content-type: multipart/alternative; boundary="Boundary_(ID_MhkqCIgsXXsMRKd+oPe6nQ)"
X-Mailman-Approved-At: Fri, 26 Mar 2010 17:59:47 -0700
Cc: cset10chairs@usenix.org
Subject: [SAM] CSET '10 Call for Papers
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Mar 2010 14:37:03 -0000

--Boundary_(ID_MhkqCIgsXXsMRKd+oPe6nQ)
Content-type: text/plain; charset=us-ascii
Content-transfer-encoding: 7BIT

*** Apologies for cross posting ***

On behalf of the 3rd Workshop on Cyber Security Experimentation and
Test (CSET '10) program committee, we'd like to invite you to submit
papers on the science, design, architecture, construction,
operation, and use of cyber security experiments in network testbeds
and infrastructures. Please submit all papers by May 24, 2010, 11:59
p.m. PDT.

Topics of interest include but are not limited to:

* Science of security/testbed experimentation
- Data and tools to achieve realistic experiment setup/scenarios
- Diagnosis of and methodologies for dealing with experimental artifacts
- Support for experimentation on a large scale (virtualization,
federation, high fidelity scale-down)
- Tools and methodologies to achieve, and metrics to measure,
correctness, repeatability, and sharing of experiments

* Testbeds and methodologies
- Tools, methodologies, and infrastructure that support risky
experimentation
- Support for experimentation in emerging security topics
(cyber-physical systems, wireless, botnets, etc.)
- Novel experimentation approaches (e.g., coupling of emulation and
simulation)
- Experience in designing or deploying secure testbeds
- Instrumentation and automation of experiments; their archiving,
preservation, and visualization
- Fair sharing of testbed resources

* Hands-on security education
- Experiences teaching security classes that use hands-on security
experiments for homework, in-class demonstrations, or class projects
- Experiences from red team/blue team exercises

Submissions are due Monday, May 24, 2010, 11:59 p.m. PDT.

For more details on the submission process, please see the complete
Call for Papers at:
http://www.usenix.org/cset10/cfpa/

We look forward to receiving your submissions!

Terry V. Benzel, USC Information Sciences Institute (ISI)
CSET '10 General Chair

Jelena Mirkovic, USC Information Sciences Institute (ISI)
Angelos Stavrou, George Mason University
CSET '10 Program Co-Chairs
cset10chairs@usenix.org



--Boundary_(ID_MhkqCIgsXXsMRKd+oPe6nQ)
Content-type: text/html; charset=us-ascii
Content-transfer-encoding: 7BIT

<html><head></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; "><div>*** Apologies for cross posting ***</div><div><br></div>On behalf of the 3rd Workshop on Cyber Security Experimentation and<br>Test (CSET '10) program committee, we'd like to invite you to submit<br>papers on the science, design, architecture, construction,<br>operation, and use of cyber security experiments in network testbeds<br>and infrastructures. Please submit all papers by May 24, 2010, 11:59<br>p.m. PDT.<br><br><div>Topics of interest include but are not limited to:<br><br>* Science of security/testbed experimentation<br>- Data and tools to achieve realistic experiment setup/scenarios<br>- Diagnosis of and methodologies for dealing with experimental artifacts<br>- Support for experimentation on a large scale (virtualization,<br>federation, high fidelity scale-down)<br>- Tools and methodologies to achieve, and metrics to measure,<br>correctness,
  repeata
periments<br><br>* Testbeds and methodologies<br>- Tools, methodologies, and infrastructure that support risky<br>experimentation<br>- Support for experimentation in emerging security topics<br>(cyber-physical systems, wireless, botnets, etc.)<br>- Novel experimentation approaches (e.g., coupling of emulation and<br>simulation)<br>- Experience in designing or deploying secure testbeds<br>- Instrumentation and automation of experiments; their archiving,<br>preservation, and visualization<br>- Fair sharing of testbed resources<br><br>* Hands-on security education<br>- Experiences teaching security classes that use hands-on security<br>experiments for homework, in-class demonstrations, or class projects<br>- Experiences from red team/blue team exercises<br><br><b>Submissions are due Monday, May 24, 2010, 11:59 p.m. PDT.</b><br><br>For more details on the submission process, please see the complete<br>Call for Papers at:<br><a href="http://www.usenix.org/cset10/cfpa/">http://www.
 usenix.o
r>We look forward to receiving your submissions!<br><br>Terry V. Benzel, USC Information Sciences Institute (ISI)<br>CSET '10 General Chair<br><br>Jelena Mirkovic, USC Information Sciences Institute (ISI)<br>Angelos Stavrou, George Mason University<br>CSET '10 Program Co-Chairs<br><a href="mailto:cset10chairs@usenix.org">cset10chairs@usenix.org</a><br><br><br></div></body></html>

--Boundary_(ID_MhkqCIgsXXsMRKd+oPe6nQ)--

From byeager@fastmail.fm  Fri Mar 26 17:57:35 2010
Return-Path: <byeager@fastmail.fm>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 829C63A694D; Fri, 26 Mar 2010 17:57:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.038
X-Spam-Level: 
X-Spam-Status: No, score=0.038 tagged_above=-999 required=5 tests=[AWL=0.093,  BAYES_40=-0.185, DNS_FROM_OPENWHOIS=1.13, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mUnzxgQV5fw0; Fri, 26 Mar 2010 17:57:34 -0700 (PDT)
Received: from out3.smtp.messagingengine.com (out3.smtp.messagingengine.com [66.111.4.27]) by core3.amsl.com (Postfix) with ESMTP id DA3013A6946; Fri, 26 Mar 2010 17:57:33 -0700 (PDT)
Received: from compute2.internal (compute2.internal [10.202.2.42]) by gateway1.messagingengine.com (Postfix) with ESMTP id B31D4E93F0; Fri, 26 Mar 2010 20:57:57 -0400 (EDT)
Received: from heartbeat1.messagingengine.com ([10.202.2.160]) by compute2.internal (MEProxy); Fri, 26 Mar 2010 20:57:57 -0400
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=messagingengine.com; h=cc:message-id:from:to:in-reply-to:content-type:content-transfer-encoding:mime-version:subject:date:references; s=smtpout; bh=C2W3ekl70/oKBIV4TZk1VwT++j4=; b=hxGUWIaI9VgYX9WvdttcGXeWaVDmn/lKX4FEsDUiVQ97XeWecyJLjDw0rX3MZDjSPjr7O4FVMr0xUlnnft9KYS0W/ICXK0m6aRVOt1eiUgWd1cY6uInO8WmrG/lh6f+zY1Fjwght/RcafZfgPVFkTgcnKxPwTVdfYbOvOlb1urc=
X-Sasl-enc: CCGabtlaXLLRyj5THLhUdcqRH5g4ulZnns6FhFchp5h0 1269651477
Received: from [192.168.0.10] (adsl-75-35-76-213.dsl.pltn13.sbcglobal.net [75.35.76.213]) by mail.messagingengine.com (Postfix) with ESMTPA id A807034F552; Fri, 26 Mar 2010 20:57:56 -0400 (EDT)
Message-Id: <3EAD54A2-5C3A-422A-A11A-6C3333316562@fastmail.fm>
From: Bill Yeager <byeager@fastmail.fm>
To: "Thomas C. Schmidt" <schmidt@informatik.haw-hamburg.de>
In-Reply-To: <4BAD46D0.3040203@informatik.haw-hamburg.de>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed; delsp=yes
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Apple Message framework v936)
Date: Fri, 26 Mar 2010 17:57:55 -0700
References: <Pine.GSO.4.61.1003242141150.8106@stekt3> <4BAD46D0.3040203@informatik.haw-hamburg.de>
X-Mailer: Apple Mail (2.936)
X-Mailman-Approved-At: Fri, 26 Mar 2010 17:59:47 -0700
Cc: sam <sam@irtf.org>, p2prg@irtf.org
Subject: Re: [SAM] [p2prg] New survey draft on P2P group management (fwd)
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sat, 27 Mar 2010 00:57:35 -0000

One can also note that JXTA has had peer groups since it was initially =20=

architected in 2000. Their use has been publicly available since the =20
Project JXTA launch in April, 2001.

Bill

On Mar 26, 2010, at 4:44 PM, Thomas C. Schmidt wrote:

> Dear Authors,
>
> you are proposing a taxonomy of P2P group management. I read your =20
> draft, looked at your presentation slides, and can provide the =20
> following comments:
>
> In general, I was lost in the document, as it was not clear to me =20
> what this actually addresses. You target at "group management" which =20=

> actually is a core operation for group communication solutions. =20
> However, I could not clearly see that you address group =20
> communication in the sense, that the communication model you regard =20=

> and draw examples from actually is in groups (as distinguished from =20=

> other multiparty approaches like swarm routing or mesh-building =20
> techniques ...).
>
> Correspondingly, you present a (somewhat random) collection of =20
> Example Solutions in Section 2. These examples are partly from the =20
> group communication area, partly they are not. In particular, they =20
> seem far from exploring the design space of group management, and do =20=

> not always represent initial contributions (P2P group management did =20=

> not start in the year 2003).
>
> IMHO it would be useful to compile an overview of all major group =20
> management mechanisms that are around, and it will be good practice =20=

> to give credits to those who invented them or first transferred them =20=

> into the P2P world. I would highly appreciate to see this overview =20
> categorized in a number of useful categories like performance, cost/=20=

> overhead, flexibility, scaling ...
>
> The taxonomy you propose, I cannot really follow. This is for =20
> several reasons. At first, your "high-level properties" don't appear =20=

> sharp nor relevant to me (What difference does it make that some =20
> group is formed for conferencing or for collaboration?). Second you =20=

> enumerate categories that are orthogonal to each other (e.g., =20
> knowledge sharing : security/trust). Third you are cutting out the =20
> measures above that are of typical concern.
>
> Personally, I would think that a clear focus of the document and a =20
> stringent, rigorous and relevant categorization would be a great =20
> improvement.
>
> Two additional suggestions:
>
> * Can you provide your long report to the community?
> * As this is a group topic, it might make sense to get SAMRG involved.
>
> Best regards,
>
> Thomas
>
> On 24.03.2010 12:42, Mika Ylianttila wrote:
>> Hi,
>>
>> as present co-author, I will say few words in the meeting, mainly to
>> point out this work we have done, kind of "as per your request".
>>
>> Presentation slides summarizing the draft can be now found at the
>> IETF77 meeting materials page:
>> https://datatracker.ietf.org/meeting/77/materials.html
>> --> http://www.ietf.org/proceedings/10mar/slides/P2PRG-7.pdf
>>
>> Discussion topics:
>> - need of this type of taxonomy as Informational RFC? (based on =20
>> previous
>> discussions we assume yes)
>> - scope and extent of the draft
>> - should it be simplified (how)
>> - less example solutions?
>> - less categories (what)?
>> - should it be clarified (how)
>> - are the naming conventions clear enough?
>> - should it extended (how)
>> - for example. maybe additional criteria assessing the feasibility or
>> performance of the solution. However, this is propably topic for
>> further studies and maybe in the solution space.
>> - as other solutions emerge, maybe some updates/extensions. This is =20=

>> also
>> future topic.
>>
>> Hope you find time to provide some input.
>>
>> Many thanks,
>>
>> Mika Ylianttila
>> (at IETF77)
>>
>>
>>
>> On Tue, 23 Mar 2010, Erkki Harjula wrote:
>>
>>> Howdy,
>>>
>>> In the previous P2PRG meeting in Stockholm, we presented a draft on
>>> peer-to-peer based group management. In the meeting, we received
>>> multiple comments pointing out that there is a need for a
>>> comprehensive survey on existing and proposed group management
>>> mechanisms.
>>>
>>> Thus, before proceeding with the solution draft, we decided to =20
>>> write a
>>> separate survey-type draft presenting the existing and proposed P2P
>>> group management solutions in the literature. The draft is called
>>> "Taxonomy for P2P Group Management Solutions". It provides an =20
>>> analysis
>>> and the taxonomy of the existing and proposed P2P group management
>>> solutions.
>>>
>>> The draft can be found at:
>>> http://tools.ietf.org/search/draft-kassinen-p2psip-group-taxonomy-00
>>>
>>> We would be grateful for your comments.
>>>
>>> BR, Erkki
>>> _______________________________________________
>>> p2prg mailing list
>>> p2prg@irtf.org
>>> http://www.irtf.org/mailman/listinfo/p2prg
>>>
>> _______________________________________________
>> p2prg mailing list
>> p2prg@irtf.org
>> http://www.irtf.org/mailman/listinfo/p2prg
>
> --=20
>
> Prof. Dr. Thomas C. Schmidt
> =B0 Hamburg University of Applied Sciences                   Berliner =20=

> Tor 7 =B0
> =B0 Dept. Informatik, Internet Technologies Group    20099 Hamburg, =20=

> Germany =B0
> =B0 http://www.haw-hamburg.de/inet                   Fon: =20
> +49-40-42875-8452 =B0
> =B0 http://www.informatik.haw-hamburg.de/~schmidt    Fax: =20
> +49-40-42875-8409 =B0
> _______________________________________________
> p2prg mailing list
> p2prg@irtf.org
> http://www.irtf.org/mailman/listinfo/p2prg


From mounir.kellil@cea.fr  Mon Mar 29 03:07:32 2010
Return-Path: <mounir.kellil@cea.fr>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CAAA53A6943 for <sam@core3.amsl.com>; Mon, 29 Mar 2010 03:07:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.481
X-Spam-Level: *
X-Spam-Status: No, score=1.481 tagged_above=-999 required=5 tests=[BAYES_50=0.001, DNS_FROM_OPENWHOIS=1.13, HELO_EQ_FR=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rAkHBsz26lT1 for <sam@core3.amsl.com>; Mon, 29 Mar 2010 03:07:31 -0700 (PDT)
Received: from cirse-out.extra.cea.fr (cirse-out.extra.cea.fr [132.166.172.106]) by core3.amsl.com (Postfix) with ESMTP id 05FA43A69EF for <sam@irtf.org>; Mon, 29 Mar 2010 03:07:23 -0700 (PDT)
Received: from pisaure.intra.cea.fr (pisaure.intra.cea.fr [132.166.88.21]) by cirse.extra.cea.fr (8.14.2/8.14.2/CEAnet-Internet-out-2.0) with ESMTP id o2TA7mpT005454 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Mon, 29 Mar 2010 12:07:48 +0200
Received: from muguet2.intra.cea.fr (muguet2.intra.cea.fr [132.166.192.7]) by pisaure.intra.cea.fr (8.14.4/8.14.4) with ESMTP id o2TA7mjJ008309; Mon, 29 Mar 2010 12:07:48 +0200 (envelope-from mounir.kellil@cea.fr)
Received: from levau.intra.cea.fr (levau.intra.cea.fr [132.166.88.52]) by muguet2.intra.cea.fr (8.13.8/8.13.8/CEAnet-Intranet-out-1.1) with ESMTP id o2TA7m3R019874; Mon, 29 Mar 2010 12:07:48 +0200
Received: from LODERI.intra.cea.fr ([132.166.64.44]) by levau.intra.cea.fr with Microsoft SMTPSVC(6.0.3790.3959);  Mon, 29 Mar 2010 12:07:48 +0200
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Mon, 29 Mar 2010 12:07:49 +0200
Message-ID: <A2408947975D7A4C95A0DD337F63825801B2E80A@LODERI.intra.cea.fr>
In-Reply-To: <Pine.WNT.4.64.1003261040590.4220@mw-thinkpad>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: draft-kellil-sam-mtocp
Thread-Index: AcrNLGrPys2ieW0GSMarHUJ1YB+yYQB+V6zA
References: <Pine.WNT.4.64.1003261040590.4220@mw-thinkpad>
From: "KELLIL Mounir" <mounir.kellil@cea.fr>
To: "Matthias Waehlisch" <waehlisch@ieee.org>
X-OriginalArrivalTime: 29 Mar 2010 10:07:48.0400 (UTC) FILETIME=[AF3A7B00:01CACF27]
Cc: sam@irtf.org, ROUX Pierre <pierre.roux@cea.fr>, JANNETEAU Christophe <christophe.janneteau@cea.fr>
Subject: Re: [SAM] draft-kellil-sam-mtocp
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Mar 2010 10:07:32 -0000

Dear Matthias

Thanks a lot for reading the draft, and your very relevant comments.

Please find below my answers.

>=20
>   * How does the MTO-Ctrl knows other MTO entities? Must all MTOCP
> entities have to register at the MTO-Ctrl?
>=20
> =20
[MK] Currently (or in the current implementation if you want), MTO-Ctrl
gets the list of overlay nodes and connection descriptions from an
external module defined in a deliverable of the FP7 CCAST project work,
which MTOCP is part of.  Actually, the current MTOCP draft focuses on
the "enforcement/configuration" of the overlay tree in the network. The
"generation" of the topology/form of the overlay tree is out of the
scope of the draft. In our project implementation, the generation of the
overlay topology is handled by a specific network context-aware
component interacting with (but could be integrated in) the MTO-Ctrl;
but this is external to the MTOCP protocol.


 * In section 2.2, you mention that the MTO-Ctrl assigns the port
> numbers. How does the Ctrl knows that ports are not already in use?
>=20
[MK] In our work we considered the single operator scenario in which the
operator has sufficient knowledge (and actually full control) of overlay
nodes in its network, their existing ports, etc. In such a scenario, the
MTO-Ctrl (owned by the operator) sets up a range of assignable port
numbers. Ports numbers are assigned for all multicast connections as
well unicast connections, except unicast connections terminating at
terminals. In the latter case, the MTO-CTRL might learn the terminal's
listening port from an out of band mechanisms (e.g. Session Mgmt
signalling like SIP).
>=20
 =20


* The forwarding process is a bit unclear to me: By which means does
> an overlay node to unicast or to multicast?
>
[MK] An ON receives forwarding information from the MTO-CTRL (via the
MTCOP protocol) in the form of one input transport connection and one or
multiple output transport connections (for a given MTO Tree ID). These
input/output connections are bound together in the ON "MTO forwarding
table". When the overlay node receives data on the input transport
connection, it then just forwards the data onto the output connections
indicated in its "MTO forwarding table".
Of course, the destination address of transport connections could be
multicast or unicast, IPv4 or IPv6.=20

=20
>=20
  * It may be helpful to mention explicitly which states are maintained
> by which MTOCP entity.
>
[MK] OK, this will be clarified a bit more in the next draft version.
BTW, the MTO-Ctrl maintains the list of all active MTO trees (MTO tree
IDs. And, for each MTO tree ID; it maintains the list of overlay nodes
along with their multicast/unicast connections). On the other hand, the
overlay node maintains the list of all input and output connections per
MTO tree which the said overlay node is connected to.=20


>   * And an editorial question: Page 4: "Comments are solicited and
> should be addressed ..." Is the mailing list correct?
>=20
>=20
[MK] Sorry, this and other typos will be corrected in a future version
of the draft.


Please do not hesitate to send us further comments you may have.

Best regards

Mounir

> Thanks
>   matthias
>=20
>=20
> --
> Matthias Waehlisch
> .  FU Berlin, Inst. fuer Informatik, AG CST
> .  Takustr. 9, D-14195 Berlin, Germany
> .. mailto:waehlisch@ieee.org .. http://www.inf.fu-berlin.de/~waehl
> :. Also: http://inet.cpt.haw-hamburg.de .. http://www.link-lab.net

From waehlisch@ieee.org  Wed Mar 31 22:56:37 2010
Return-Path: <waehlisch@ieee.org>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B40C43A688D for <sam@core3.amsl.com>; Wed, 31 Mar 2010 22:56:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -98.519
X-Spam-Level: 
X-Spam-Status: No, score=-98.519 tagged_above=-999 required=5 tests=[BAYES_50=0.001, DNS_FROM_OPENWHOIS=1.13, HELO_EQ_DE=0.35, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uCe7zYqOWqRW for <sam@core3.amsl.com>; Wed, 31 Mar 2010 22:56:36 -0700 (PDT)
Received: from mail2.rz.htw-berlin.de (mail2.rz.htw-berlin.de [141.45.10.102]) by core3.amsl.com (Postfix) with ESMTP id 5F8DC3A68D1 for <sam@irtf.org>; Wed, 31 Mar 2010 22:56:36 -0700 (PDT)
Envelope-to: sam@irtf.org
Received: from wsip-98-173-211-100.sb.sd.cox.net ([98.173.211.100] helo=mw-thinkpad) by mail2.rz.htw-berlin.de with esmtpsa (TLSv1:RC4-MD5:128) (Exim 4.68 (FreeBSD)) (envelope-from <waehlisch@ieee.org>) id 1NxDOs-000FNH-AJ; Thu, 01 Apr 2010 07:57:06 +0200
Date: Wed, 31 Mar 2010 22:56:59 -0700 (Pazifik Sommerzeit)
From: Matthias Waehlisch <waehlisch@ieee.org>
To: KELLIL Mounir <mounir.kellil@cea.fr>
In-Reply-To: <A2408947975D7A4C95A0DD337F63825801B2E80A@LODERI.intra.cea.fr>
Message-ID: <Pine.WNT.4.64.1003312209170.4220@mw-thinkpad>
References: <Pine.WNT.4.64.1003261040590.4220@mw-thinkpad> <A2408947975D7A4C95A0DD337F63825801B2E80A@LODERI.intra.cea.fr>
X-X-Sender: mw@mail2.rz.fhtw-berlin.de
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
X-HTW-SPAMINFO: this message was scanned by eXpurgate (http://www.eleven.de)
Cc: sam@irtf.org, JANNETEAU Christophe <christophe.janneteau@cea.fr>, ROUX Pierre <pierre.roux@cea.fr>
Subject: Re: [SAM] draft-kellil-sam-mtocp
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Apr 2010 05:56:37 -0000

Dear Mounir,

  many thanks for your answers!

On Mon, 29 Mar 2010, KELLIL Mounir wrote:

> >   * How does the MTO-Ctrl knows other MTO entities? Must all MTOCP 
> > entities have to register at the MTO-Ctrl?
> >  
> [MK] Currently (or in the current implementation if you want), 
> MTO-Ctrl gets the list of overlay nodes and connection descriptions 
> from an external module defined in a deliverable of the FP7 CCAST 
> project work, which MTOCP is part of.  Actually, the current MTOCP 
> draft focuses on the "enforcement/configuration" of the overlay tree 
> in the network. The "generation" of the topology/form of the overlay 
> tree is out of the scope of the draft. In our project implementation, 
> the generation of the overlay topology is handled by a specific 
> network context-aware component interacting with (but could be 
> integrated in) the MTO-Ctrl; but this is external to the MTOCP 
> protocol.
> 
[MW] OK ... The MTO-Ctrl is an entity to establish centrally multicast 
states. The topolog creation should probably be integrated within the 
MTO-Ctrl as topologies will be constructed depending on the receivers. 
On ther other hand, one can collect, maybe aggregate, and delegate 
receiver subscriptions to the specific topology component.

  Nevertheless, the receivers have to register at the MTO-Ctrl - or at 
the topology component.

> * The forwarding process is a bit unclear to me: By which means does
> > an overlay node to unicast or to multicast?
> >
> [MK] An ON receives forwarding information from the MTO-CTRL (via the 
> MTCOP protocol) in the form of one input transport connection and one 
> or multiple output transport connections (for a given MTO Tree ID). 
> These input/output connections are bound together in the ON "MTO 
> forwarding table". When the overlay node receives data on the input 
> transport connection, it then just forwards the data onto the output 
> connections indicated in its "MTO forwarding table". Of course, the 
> destination address of transport connections could be multicast or 
> unicast, IPv4 or IPv6.
> 
[MW] OK, an ON decides on multicast or unicast based on the destination 
address in its local MTOCP state table.

  How do you map the destination address to an actual IP forwarding 
interface at an ON? Is this based on the local unicast routing table? 
And what does this mean for a multicast destination address: multicast 
addresses are not included in unicast routing tables. Thus, you cannot 
easily replicate packets and require an addition multicast 
routing/signaling, right?

  Btw: Do you assume a global topology view - at least with respect to 
the overlay nodes? Otherwise it seems hard to determine appropriately 
the destination address for ON state tables.



Thanks & Best regards
  matthias


-- 
Matthias Waehlisch
.  FU Berlin, Inst. fuer Informatik, AG CST
.  Takustr. 9, D-14195 Berlin, Germany
.. mailto:waehlisch@ieee.org .. http://www.inf.fu-berlin.de/~waehl
:. Also: http://inet.cpt.haw-hamburg.de .. http://www.link-lab.net
