Are TCP Extensions Middlebox-proof?

Tue, 11/05/2013 - 12:51 by Benjamin Hesmans

Abstract

Besides the traditional routers and switches, middleboxes such as
NATs, firewalls, IDS or proxies have a growing importance in many
networks, notably in entreprise and wireless access
networks. Many of these middleboxes modify the packets that
they process. For this, they to implement (a subset of) protocols
like TCP. Despite the deployment of these middleboxes, TCP continues
to evolve on the endhosts and little is known about the interactions
between TCP extensions and the middleboxes.
In this paper, we experimentally evaluate the interference between
middleboxes and the Linux TCP stack. For this, we first propose
MBtest, a set of Click elements that model
middlebox behavior. We use it to experimentally evaluate how three TCP extensions
interact with middleboxes. We also analyzes measurements of the
interference between Multipath TCP and middleboxes in fifty different networks.

Authors
Benjamin Hesmans, Fabien Duchene, Christoph Paasch, Gregory Detal and Olivier Bonaventure
Source
CoNEXT workshop HotMiddlebox, December 2013. ACM.
Keywords
Protocol; TCP; Multipath TCP; Middlebox
Full text
pdf   (222.54 KB)
Cite it
BibTex
Copyright
See here

IEEE Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

ACM Copyright Notice: Copyright 1999 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page or intial screen of the document. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Publications Dept., ACM Inc., fax +1 (212) 869-0481, or permissions@acm.org.

Springer-Verlag LNCS Copyright Notice: The copyright of these contributions has been transferred to Springer-Verlag Berlin Heidelberg New York. The copyright transfer covers the exclusive right to reproduce and distribute the contribution, including reprints, translations, photographic reproductions, microform, electronic form (offline, online), or any other reproductions of similar nature. Online available from Springer-Verlag LNCS series.