Are TCP extensions middlebox-proof?

  • Authors:
  • Benjamin Hesmans;Fabien Duchene;Christoph Paasch;Gregory Detal;Olivier Bonaventure

  • Affiliations:
  • UCLouvain, Louvain-La-Neuve, Belgium;UCLouvain, Louvain-La-Neuve, Belgium;UCLouvain, Louvain-La-Neuve, Belgium;UCLouvain, Louvain-La-Neuve, Belgium;UCLouvain, Louvain-La-Neuve, Belgium

  • Venue:
  • Proceedings of the 2013 workshop on Hot topics in middleboxes and network function virtualization
  • Year:
  • 2013

Quantified Score

Hi-index 0.02

Visualization

Abstract

Besides the traditional routers and switches, middleboxes such as NATs, firewalls, IDS or proxies have a growing importance in many networks, notably in entreprise and wireless access networks. Many of these middleboxes modify the packets that they process. For this, they to implement (a subset of) protocols like TCP. Despite the deployment of these middleboxes, TCP continues to evolve on the endhosts and little is known about the interactions between TCP extensions and the middleboxes. In this paper, we experimentally evaluate the interference between middleboxes and the Linux TCP stack. For this, we first propose MBtest, a set of Click elements that model middlebox behavior. We use it to experimentally evaluate how three TCP extensions interact with middleboxes. We also analyzes measurements of the interference between Multipath TCP and middleboxes in fifty different networks.