Tracing Internet Path Transparency

Mirja Kuehlewind, Michael Walter, Iain Learmonth, Brian Trammell

Research output: Contribution to conferenceUnpublished paperpeer-review

3 Citations (Scopus)
10 Downloads (Pure)

Abstract

Investigating Internet Path Transparency means measuring if a network path between two endhosts is impaired by in-network functions on the path. A path is considered transparent if it provides connectivity and the same performance independent of the protocol or protocol stack that is used for the transmission. Unfortunately this is not always the case. Simple firewalls that block e.g. UDP, are an example. Of course such in-network functions are often valuable, like firewalls. However, these middleboxes also, sometimes unintentionally, make assumptions about the traffic passing through them that restricts innovation in the Internet on the higher layers, e.g. the deployment of new UDP-based protocols such as QUIC, to stick with the previous example.
Original languageEnglish
Number of pages7
Publication statusPublished - Jun 2018
EventNetwork Traffic Measurement and Analysis Conference 2018 - Vienna, Austria
Duration: 26 Jun 201829 Jun 2018
https://tma.ifip.org/2018/

Conference

ConferenceNetwork Traffic Measurement and Analysis Conference 2018
Abbreviated titleTMA CONFERENCE 2018
Country/TerritoryAustria
CityVienna
Period26/06/1829/06/18
Internet address

Bibliographical note

This project has received funding from the European Union’s Horizon
2020 research and innovation program under grant agreement
No 688421, and was supported by the Swiss State Secretariat for
Education, Research and Innovation (SERI) under contract number
15.0268. The opinions expressed and arguments employed reflect
only the authors’ views. The European Commission is not responsible
for any use that may be made of that information. Further, the
opinions expressed and arguments employed herein do not necessarily
reflect the official views of the Swiss Government.

Fingerprint

Dive into the research topics of 'Tracing Internet Path Transparency'. Together they form a unique fingerprint.

Cite this