MessiandNeymar

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, July 27, 2012

Networking: theory and practice

Posted on 6:23 PM by Unknown

I came across two nice papers recently with some interesting synergy.

First, on the theory side, BBN's Craig Partridge offers his suggestions for Forty Data Communications Research Questions. Each question is briefly summarized, with lots of pointers to further research for the curious. The one that interested me the most was:

22. Are there cooperative protocols above the physical layer? There’s a substantial body of work showing that wireless networks can perform better if nodes help each other[51] – e.g. a node off to the side echoes what it hears from a sender in order to improve reception at the receiver. For the most part, these are physical layer improvements (perhaps coordinated with the media access layer). Is there a role for similar cooperation at higher layers? At first this may seem impractical, as most higher layer communications is point-to-point. Yet many servers often work together to deliver a web page and many servers work together to deliver an email. The step from collaboration to cooperation would seem small.

Secondly, on the practical side, Adam Langley has posted his notes from his HOPE9 talk: Living with HTTPS. I wasn't familiar with the H.O.P.E. conferences, but it seems like HOPE9 was a very interesting conference -- just browse through some of the abstracts and shake your head in wonder at the range of topics and viewpoints!

Langley's talk, meanwhile, is interesting from start to finish, with plenty of practical advice about how to secure your site, pointers to tools to help you assess where you may still have problems, as well as ideas about how we can continue to improve our security protocols and techniques in the future.

Security is a never-ending struggle, and you have to be constantly considering it. For example, Langley notes the risks involved in mixed-mode sub-resources:

When you load sub-resources over HTTP, an attacker can replace them with content of their choosing. The attacker also gets to choose any page on your HTTPS site with the problem. That includes pages that you don't expect to be served over HTTPS, but happen to be mapped. If you have this problem anywhere, on any HTTPS page, the attacker wins.

Read more, learn more, be smarter. Good ideas for the weekend!

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Shelter
    I meant to post this as part of my article on Watership Down , but then totally forgot: Shelter In Shelter you experience the wild as a moth...
  • The Legend of 1900: a very short review
    Fifteen years late, we stumbled across The Legend of 1900 . I suspect that 1900 is the sort of movie that many people despise, and a few peo...
  • Rediscovering Watership Down
    As a child, I was a precocious and voracious reader. In my early teens, ravenous and impatient, I raced through Richard Adams's Watershi...
  • Must be a heck of a rainstorm in Donetsk
    During today's Euro 2012 match between Ukraine and France, the game was suspended due to weather conditions, which is a quite rare occur...
  • Beethoven and Jonathan Biss
    I'm really enjoying the latest Coursera class that I'm taking: Exploring Beethoven’s Piano Sonatas . This course takes an inside-out...
  • Starting today, the games count
    In honor of the occasion: The Autumn Wind is a pirate, Blustering in from sea, With a rollocking song, he sweeps along, Swaggering boisterou...
  • Parbuckling
    The enormous project to right and remove the remains of the Costa Concordia is now well underway. There's some nice reporting on the NP...
  • For your weekend reading
    I don't want you to be bored this weekend, so I thought I'd pass along some articles you might find interesting. If not, hopefully y...
  • Are some algorithms simply too hard to implement correctly?
    I recently got around to reading a rather old paper: McKusick and Ganger: Soft Updates: A Technique for Eliminating Most Synchronous Writes ...
  • Don't see me!
    When she was young, and she had done something she was embarrassed by or felt guilty about, my daughter would sometimes hold up her hand to ...

Blog Archive

  • ►  2013 (165)
    • ►  September (14)
    • ►  August (19)
    • ►  July (16)
    • ►  June (17)
    • ►  May (17)
    • ►  April (18)
    • ►  March (24)
    • ►  February (19)
    • ►  January (21)
  • ▼  2012 (335)
    • ►  December (23)
    • ►  November (30)
    • ►  October (33)
    • ►  September (34)
    • ►  August (29)
    • ▼  July (39)
      • Serious infrastructure issues
      • Drone pilots in the NYT
      • Nice Olympics sailing video
      • Inside the Coursera contract
      • Networking: theory and practice
      • The other Eagle
      • Precious Reynolds and the Milwaukee Protocol
      • Trying to understand the evolution of finance
      • Who invented the Internet, part 94
      • Annie Hall, now and then
      • Simple hardware lessons for a software guy, part 3
      • Simple hardware lessons for a software guy, part 2
      • Simple hardware lessons for a simple software guy
      • The bubble is back!
      • It's not just a game ...
      • Random stuff I'm reading currently
      • Solomon's Oak: a very short review
      • Postcards from the high end...
      • Some Dallas phone numbers are not Dallas phone num...
      • Perforce 2012.2 has entered beta testing
      • Good enough for GitHub
      • The Coursera Tsunami
      • A collection of AWS post-mortems
      • Java code coverage and thrown exceptions
      • Google Summer of Code and the University of Moratuwa
      • Construction Everywhere
      • MMDS 2012
      • Tips for security conference week
      • GSoC 2012: halfway there!
      • Various database topics
      • A troubling article on scientific careers
      • ubuntu tracker and locate
      • So that's what it takes to find a Higgs Boson!
      • And now we will know for sure
      • Silicon Valley craziness
      • Matthew Yglesias on patent "reform"
      • Post-vacation link dump
      • A week in Kauai
      • I'm back online
    • ►  June (27)
    • ►  May (48)
    • ►  April (32)
    • ►  March (30)
    • ►  February (10)
Powered by Blogger.

About Me

Unknown
View my complete profile