Export Citations
No abstract available.
Proceeding Downloads
An enhanced socket API for Multipath TCP
Multipath TCP is a TCP extension that enables hosts to send data belonging to a single TCP connection over different paths. It was designed as an incrementally deployable evolution of TCP. For this reason, the Multipath TCP specification assumes that ...
Multipath bonding at Layer 3
Recent work has applied Multipath TCP proxies to the problem of bonding a customer's multiple access interfaces to the Internet, in order to augment available bandwidth, especially in areas with marginal fixed connectivity. However, such proxies only ...
Towards a Multipath TCP Aware Load Balancer
Multipath TCP has been recently introduced in order to allow a better resource consumption and user quality-of-experience. This is achieved by allowing a connection between two hosts through multiple subflows. However, with the rise of middleboxes and ...
Multi-Homed on a Single Link: Using Multiple IPv6 Access Networks
Small companies and branch offices often have bandwidth demands and redundancy needs that go beyond the commercially available Internet access products in their price range. One way to overcome this problem is to bundle existing Internet access ...
Towards Decentralized Fast Consistent Updates
Updating data plane state to adapt to dynamic conditions is a fundamental network control operation. Software-Defined Networking (SDN) offers abstractions for updating network state while preserving consistency properties. However, realizing these ...
Composition of SDN applications: Options/challenges for real implementations
In this paper we define the notion of composition for software-defined network applications and show the theoretical and practical approaches to composition in software-defined networks and explain the challenges associated with it. We explore the ...
Towards Securing Internet eXchange Points Against Curious onlooKers
The growing relevance of Internet eXchange Points (IXPs), where an increasing number of networks exchange routing information, poses fundamental questions regarding the privacy guarantees of confidential business information. To facilitate the exchange ...
Computing Customer Cones of Peering Networks
We present a method to compute the customer cones of peering networks using PCH data. Our method computes location dependent customer cones (LDCCs) for networks that are present at more than one IXP instead of computing a single customer cone for each ...
Measuring the Effects of Happy Eyeballs
The IETF has developed protocols that promote a healthy IPv4 and IPv6 co-existence. The Happy Eyeballs (HE) algorithm, for instance, prevents bad user experience in situations where IPv6 connectivity is broken. Using an active test (happy) that measures ...
On the Cost of Using Happy Eyeballs for Transport Protocol Selection
- Giorgos Papastergiou,
- Karl-Johan Grinnemo,
- Anna Brunstrom,
- David Ros,
- Michael Tüxen,
- Naeem Khademi,
- Per Hurtig
Concerns have been raised in the past several years that introducing new transport protocols on the Internet has become increasingly difficult, not least because there is no agreed-upon way for a source end host to find out if a transport protocol is ...
Start Me Up: Determining and Sharing TCP's Initial Congestion Window
When multiple TCP connections are used between the same host pair, they often share a common bottleneck -- especially when they are encapsulated together, e.g. in VPN scenarios. Then, all connections after the first should not have to guess the right ...
Revisiting Benchmarking Methodology for Interconnect Devices
Ever growing demand for network bandwidth makes computer networks an area of constant development and fast adjustments. The steady change makes good performance assessments equally necessary and challenging. This development motivated us to revisit the ...
PATHspider: A tool for active measurement of path transparency
In today’s Internet we see an increasing deployment of middleboxes. While middleboxes provide in-network functionality that is necessary to keep networks manageable and economically viable, any packet mangling – whether essential for the needed ...
Diurnal and Weekly Cycles in IPv6 Traffic
IPv6 activity is commonly reported as a fraction of network traffic per day. Within this traffic, however, are daily and weekly characteristics, driven by non-uniform IPv6 deployment across ISPs and regions. This paper discusses some of the more ...
How to say that you're special: Can we use bits in the IPv4 header?
The IP header should be the ideal part of a packet that an end system could use to ask the network for special treatment. Recently, there has been renewed interest in using bits of this header -- e.g. the ECN and the DSCP fields. But can we really use ...
Towards an Observatory for Network Transparency Research
The Internet is full of Middleboxes that change packets and flows. In fact, there is probably no IP o TCP header that is not affected by at least one middlebox. Obviously, middleboxes impede path transparency, i.e., the idea that an exchange of messages ...
Making Google Congestion Control robust over Wi-Fi networks using packet grouping
Google congestion control (GCC) has been proposed for the case of delay sensitive traffic (i.e. video-conference) in the WebRTC framework. In this paper we analyze the effect of wireless channel outages on the GCC. We have observed that, when a channel ...
Implementing Real-Time Transport Services over an Ossified Network
Real-time applications require a set of transport services not currently provided by widely-deployed transport protocols. Ossification prevents the deployment of novel protocols, restricting solutions to protocols using either TCP or UDP as a substrate. ...
Index Terms
- Proceedings of the 2016 Applied Networking Research Workshop