ABSTRACT
Besides the traditional routers and switches, middleboxes such as NATs, firewalls, IDS or proxies have a growing importance in many networks, notably in entreprise and wireless access networks. Many of these middleboxes modify the packets that they process. For this, they to implement (a subset of) protocols like TCP. Despite the deployment of these middleboxes, TCP continues to evolve on the endhosts and little is known about the interactions between TCP extensions and the middleboxes.
In this paper, we experimentally evaluate the interference between middleboxes and the Linux TCP stack. For this, we first propose MBtest, a set of Click elements that model middlebox behavior. We use it to experimentally evaluate how three TCP extensions interact with middleboxes. We also analyzes measurements of the interference between Multipath TCP and middleboxes in fifty different networks.
- Virtualbox. https://www.virtualbox.org.Google Scholar
- G. Detal, B. Hesmans, O. Bonaventure, Y. Vanaubel, and B. Donnet. Revealing Middlebox Interference with Tracebox. In ACM/USENIX Internet measurement conference (IMC), 2013. Google ScholarDigital Library
- M. Duke, R. Braden, W. Eddy, and E. Blanton. A Roadmap for Transmission Control Protocol (TCP). RFC4614, Sept. 2006.Google Scholar
- A. Ford, C. Raiciu, M. Handley, and O. Bonaventure. TCP Extensions for Multipath Operation with Multiple Addresses. RFC6824, Jan. 2013.Google Scholar
- B. Hesmans. Mbtest. Technical report, 2013.Google Scholar
- M. Honda, Y. Nishida, C. Raiciu, A. Greenhalgh, M. Handley, and H. Tokuda. Is it still possible to extend TCP? In ACM/USENIX Internet measurement conference (IMC), pages 181--194. ACM, 2011. Google ScholarDigital Library
- V. Jacobson, B. Braden, and D. Borman. TCP Extensions for High Performance. RFC1323, May 1992. Google ScholarDigital Library
- M. Mathis, J. Mahdavi, S. Floyd, and R. Ally. TCP Selective Acknowledgment Options. RFC2018, Oct. 1996. Google ScholarDigital Library
- A. Medina, M. Allman, and S. Floyd. Measuring Interactions between Transport Protocols and Middleboxes. In SIGCOMM'04, pages 336--341. ACM, 2004. Google ScholarDigital Library
- J. Padhye and S. Floyd. Identifying the TCP behavior of web servers. In ACM SIGCOMM'00, 2000.Google Scholar
- C. Raiciu, J. Iyengar, and O. Bonaventure. Recent advances in reliable transport protocols. In SIGCOMM ebook on Recent Advances in Networking, 2013.Google Scholar
- C. Raiciu, C. Paasch, S. Barre, A. Ford, M. Honda, F. Duchene, O. Bonaventure, and M. Handley. How hard can it be? Designing and Implementing a Deployable Multipath TCP. In USENIX Networked Systems Design and Implementation (NSDI), 2012. Google ScholarDigital Library
- J. H. Saltzer, D. P. Reed, and D. D. Clark. End-to-End Arguments in System Design. ACM Transactions on Computer Systems (TOCS), 2(4):277--288, 1984. Google ScholarDigital Library
- J. Sherry, S. Hasan, C. Scott, A. Krishnamurthy, S. Ratnasamy, and V. Sekar. Making Middleboxes Someone Else's Problem: Network Processing as a Cloud Service. In SIGCOMM'12, pages 13--24, 2012. Google ScholarDigital Library
- Z. Wang, Z. Qian, Q. Xu, Z. Mao, and M. Zhang. An Untold Story of Middleboxes in Cellular Networks. In SIGCOMM'11, pages 374--385, 2011. Google ScholarDigital Library
Index Terms
- Are TCP extensions middlebox-proof?
Recommendations
A middlebox-cooperative TCP for a non end-to-end internet
SIGCOMM'14Understanding, measuring, and debugging IP networks, particularly across administrative domains, is challenging. One particularly daunting aspect of the challenge is the presence of transparent middleboxes---which are now common in today's Internet. In-...
A middlebox-cooperative TCP for a non end-to-end internet
SIGCOMM '14: Proceedings of the 2014 ACM conference on SIGCOMMUnderstanding, measuring, and debugging IP networks, particularly across administrative domains, is challenging. One particularly daunting aspect of the challenge is the presence of transparent middleboxes---which are now common in today's Internet. In-...
One more bit is enough
SIGCOMM '05: Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communicationsAchieving efficient and fair bandwidth allocation while minimizing packet loss in high bandwidth-delay product networks has long been a daunting challenge. Existing end-to-end congestion control (eg TCP) and traditional congestion notification schemes (...
Comments