4,320 research outputs found
Raising the Datagram API to Support Transport Protocol Evolution
Some application developers can wield huge resources to build
new transport protocols, for these developers the present UDP
Socket API is perfectly fine. They have access to large test
beds and sophisticated tools. Many developers do not have these
resources. This paper presents a new high-level Datagram API
that is for everyone else, this has an advantage of offering a
clear evolutionary path to support new requirements. This new
API is needed to move forward the base of the system, allowing
developers with limited resources to evolve their applications
while accessing new network services
Reinterpreting the transport protocol stack to embrace ossification
Ubiquitous deployment of middleboxes has resulted in ossification of the transport layer, with TCP and UDP becoming part of the narrow waist of the Internet. This is a necessary stage in the evolution of the network, caused by its progression from research, to production, to increasingly critical infrastructure. New transport layer protocols will be needed in future, but since we are working with essential infrastructure, we cannot expect to have scope to make wholesale rapid changes. Future development must be done using the existing protocols as substrates, always maintaining on-the-wire compatibility. To advance, we must embrace the ossification of the network, and learn to reinterpret and extend the existing protocols
Efficient security for IPv6 multihoming
In this note, we propose a security mechanism for protecting IPv6
networks from possible abuses caused by the malicious usage of a
multihoming protocol. In the presented approach, each
multihomed node is assigned multiple prefixes from its upstream
providers, and it creates the interface identifier part of its
addresses by incorporating a cryptographic one-way hash of the
available prefix set. The result is that the addresses of each
multihomed node form an unalterable set of intrinsically bound
IPv6 addresses. This allows any node that is communicating with
the multihomed node to securely verify that all the alternative
addresses proposed through the multihoming protocol are
associated to the address used for establishing the communication.
The verification process is extremely efficient because it only
involves hash operationsPublicad
- …