No abstract available.
Proceeding Downloads
A performance perspective on web optimized protocol stacks: TCP+TLS+HTTP/2 vs. QUIC
Existing performance comparisons of QUIC and TCP compared an optimized QUIC to an unoptimized TCP stack. By neglecting available TCP improvements inherently included in QUIC, comparisons do not shed light on the performance of current web stacks. In this ...
Performance measurements of QUIC communications
Performance measurement in terms of packet loss, delay, and jitter is key in modern packet switched networks. These values give a clear indication of the quality of service (QoS) perceived by users, thus being helpful to service providers to properly ...
Who is answering my queries: understanding and characterizing interception of the DNS resolution path
DNS is a critical service for almost all Internet applications. DNS queries from end users are handled by recursive DNS servers for scalability. For convenience, Internet Service Providers (ISPs) assign recursive servers for their clients automatically ...
Oblivious DNS: practical privacy for DNS queries: published in PoPETS 2019
Virtually every Internet communication typically involves a Domain Name System (DNS) lookup for the destination server that the client wants to communicate with. Operators of DNS recursive resolvers---the machines that receive a client's query for a ...
Analyzing the costs (and benefits) of DNS, DoT, and DoH for the modern web
We measure the effect of DoH and DoT on name resolution performance and content delivery. We find that although DoH and DoT response times can be higher than for conventional DNS (Do53), DoT performs better than DoH and Do53 in terms of page load times. ...
Securing IPv6 neighbor discovery and SLAAC in access networks through SDN
This paper proposes and evaluates a new approach, based on Software Defined Networking (SDN), to secure the IPv6 Neighbor Discovery Protocol (NDP) message exchange and make the Stateless Address Autoconfiguration safer. We created an SDN application on ...
Towards core-stateless fairness on multiple timescales
Extending fairness to multiple timescales creates the right incentives for users and provides better QoE for short sessions, e.g. for web page download. In this paper, we show how to define and implement multi-timescale fairness among flows independently ...
What time is it: managing time in the internet
In this paper, we report on our investigation of how current local time is reported accurately by devices connected to the internet. We describe the basic mechanisms for time management and focus on a critical but unstudied aspect of managing time on ...
What can you learn from an IP?
The Internet was not designed with security in mind. A number of recent protocols such as Encrypted DNS, HTTPS, etc. target encrypting critical parts of the web architecture, which can otherwise be exploited by eavesdroppers to infer users' data. But ...
Can we containerize internet measurements?
Container systems (e.g., Docker) provide a well-defined, lightweight, and versatile foundation to streamline the process of tool deployment, to provide a consistent and repeatable experimental interface, and to leverage data centers in the global cloud ...
Supporting multi-domain Use cases with ALTO
- Danny Lachos,
- Christian Rothenberg,
- Qiao Xiang,
- Y. Richard Yang,
- Börje Ohlman,
- Sabine Randriamasy,
- Farni Boten,
- Luis M. Contreras
Many multi-domain use cases can benefit substantially from network information exposure, but also introduce new, key requirements that existing exposure solutions, such as the Application-Layer Traffic Optimization (ALTO) protocol, do not satisfy. In ...
mmb: flexible high-speed userspace middleboxes
Nowadays, Internet actors have to deal with a strong increase in Internet traffic at many levels. One of their main challenge is building high-speed and efficient networking solutions. In such a context, kernel-bypass I/O frameworks have become their ...
Checking-in on network functions
When programming network functions, changes within a packet tend to have consequences---side effects which must be accounted for by network programmers or administrators via arbitrary logic and an innate understanding of dependencies. Examples of this ...