Markdown Version | Recording 1 | Recording 2 | Recording 3 | Recording 4

Session Date/Time: 22 Jul 2025 07:30

anrw

Summary

The Applied Networking Research Workshop (ANRW) 2025 meeting covered a range of topics including network misconfiguration, carbon-aware content delivery, and 360 video streaming. Laurent Van Bever delivered a keynote on tackling network misconfiguration using verification techniques. Presentations followed on carbon-intelligent content scheduling in CDNs and end-to-end 360 video streaming over HTTP/3.

Key Discussion Points

Decisions and Action Items

Next Steps


Session Date/Time: 22 Jul 2025 09:30

anrw

Summary

The anrw session featured six presentations covering diverse topics: affiliations within SDOs like IETF, utilizing LLMs for IETF collaboration, automated network protocol testing with LLMs, emulation of satellite constellations, website loading emulation, and network tomography using explicit flow measurements (EFM). Discussions focused on the implications of each study, potential improvements, and future research directions.

Key Discussion Points

Decisions and Action Items

Next Steps


Session Date/Time: 22 Jul 2025 12:30

anrw

Summary

This session covered a range of topics related to transport protocols and network performance, including congestion control mechanisms, measurements of TCP performance over satellite internet, performance variability in QUIC implementations, acknowledgement cascades in multi-hop masking, and a fallback issue in TCP Prague. The session included presentations from researchers and engineers followed by Q&A and concluded with one minute pitches from poster authors and a poster session.

Key Discussion Points

Decisions and Action Items

Next Steps


Session Date/Time: 22 Jul 2025 15:00

anrw

Summary

This document contains the minutes for the anrw session, covering a variety of topics related to network research. The session included presentations on anycast geolocation, MPLS network action stack management, predictable traffic in virtual switches, internet background radiation analysis, secure eBPF deployments, a QUIC protocol vulnerability, and DNSSEC post-quantum cryptography considerations.

Key Discussion Points

Decisions and Action Items

Next Steps