Proceedings of the Applied Networking Research Workshop最新文献

筛选
英文 中文
Characterizing User-to-User Connectivity with RIPE Atlas 表征用户到用户连接与成熟的地图集
Proceedings of the Applied Networking Research Workshop Pub Date : 2017-07-15 DOI: 10.1145/3106328.3106332
Petros Gigis, Vasileios Kotronis, E. Aben, Stephen D. Strowes, X. Dimitropoulos
{"title":"Characterizing User-to-User Connectivity with RIPE Atlas","authors":"Petros Gigis, Vasileios Kotronis, E. Aben, Stephen D. Strowes, X. Dimitropoulos","doi":"10.1145/3106328.3106332","DOIUrl":"https://doi.org/10.1145/3106328.3106332","url":null,"abstract":"Characterizing the interconnectivity of networks at a country level is an interesting but non-trivial task. The IXP Country Jedi [8] is an existing prototype that uses RIPE Atlas probes in order to explore interconnectivity at a country level, taking into account all Autonomous Systems (AS) where RIPE Atlas probes are deployed. In this work, we build upon this basis and specifically focus on \"eyeball\" networks, i.e. the user-facing networks with the largest user populations in any given country, and explore to what extent we can provide insights on their interconnectivity. In particular, with a focused user-to-user (and/or user-to-content) version of the IXP Country Jedi we work towards meaningful statistics and comparisons between countries/economies. This is something that a general-purpose probe-to-probe version is not able to capture. We present our preliminary work on the estimation of RIPE Atlas coverage in eyeball networks, as well as an approach to measure and visualize user interconnectivity with our Eyeball Jedi tool.","PeriodicalId":147697,"journal":{"name":"Proceedings of the Applied Networking Research Workshop","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115325671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
copycat: Testing Differential Treatment of New Transport Protocols in the Wild copycat:在野外测试新传输协议的差异处理
Proceedings of the Applied Networking Research Workshop Pub Date : 2017-07-15 DOI: 10.1145/3106328.3106330
Korian Edeline, M. Kühlewind, B. Trammell, B. Donnet
{"title":"copycat: Testing Differential Treatment of New Transport Protocols in the Wild","authors":"Korian Edeline, M. Kühlewind, B. Trammell, B. Donnet","doi":"10.1145/3106328.3106330","DOIUrl":"https://doi.org/10.1145/3106328.3106330","url":null,"abstract":"Recent years have seen the development of multiple transport solutions to address the ossification of TCP in the Internet, and to ease transport-layer extensibility and deployability. Recent approaches, such as PLUS and Google's QUIC, introduce an upper transport layer atop UDP; their deployment therefore relies on UDP not being disadvantaged with respect to TCP by the Internet. This paper introduces copycat, a generic transport protocol testing tool that highlights differential treatment by the path in terms of connectivity and QoS between TCP and a non-TCP transport protocol. copycat generates TCP-shaped traffic with custom headers, and compares its performance in terms of loss and delay with TCP. We present a proof-of-concept case study (UDP vs. TCP) in order to answer questions about the deployability of current transport evolution approaches, and demonstrate the extent of copycat's capabilities and possible applications. While the vast majority of UDP impairments are found to be access-network linked, and subtle impairment is rare, middleboxes might adapt to new protocols that would then perform differently in the wild compared to early deployments or controlled environment testing.","PeriodicalId":147697,"journal":{"name":"Proceedings of the Applied Networking Research Workshop","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117218607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
No domain left behind: is Let's Encrypt democratizing encryption? 没有一个领域被抛在后面:让我们加密让加密民主化了吗?
Proceedings of the Applied Networking Research Workshop Pub Date : 2016-12-09 DOI: 10.1145/3106328.3106338
M. Aertsen, Maciej Korczyński, G. Moura, Samaneh Tajalizadehkhoob, J. Berg
{"title":"No domain left behind: is Let's Encrypt democratizing encryption?","authors":"M. Aertsen, Maciej Korczyński, G. Moura, Samaneh Tajalizadehkhoob, J. Berg","doi":"10.1145/3106328.3106338","DOIUrl":"https://doi.org/10.1145/3106328.3106338","url":null,"abstract":"The 2013 National Security Agency revelations of pervasive monitoring have led to an \"encryption rush\" across the computer and Internet industry. To push back against massive surveillance and protect users' privacy, vendors, hosting and cloud providers have widely deployed encryption on their hardware, communication links, and applications. As a consequence, most web connections nowadays are encrypted. However, there is still a significant part of Internet traffic that is not encrypted. It has been argued that both costs and complexity associated with obtaining and deploying X.509 certificates are major barriers for widespread encryption, since these certificates are required to establish encrypted connections. To address these issues, the Electronic Frontier Foundation, Mozilla Foundation, the University of Michigan and a number of partners have set up Let's Encrypt (LE), a certificate authority that provides both free X.509 certificates and software that automates the deployment of these certificates. In this paper, we investigate if LE has been successful in democratizing encryption: we analyze certificate issuance in the first year of LE and show from various perspectives that LE adoption has an upward trend and it is in fact being successful in covering the lower-cost end of the hosting market.","PeriodicalId":147697,"journal":{"name":"Proceedings of the Applied Networking Research Workshop","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131619073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Proceedings of the Applied Networking Research Workshop 应用网络研究研讨会论文集
Proceedings of the Applied Networking Research Workshop Pub Date : 1900-01-01 DOI: 10.1145/3606464
{"title":"Proceedings of the Applied Networking Research Workshop","authors":"","doi":"10.1145/3606464","DOIUrl":"https://doi.org/10.1145/3606464","url":null,"abstract":"","PeriodicalId":147697,"journal":{"name":"Proceedings of the Applied Networking Research Workshop","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132856960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings of the Applied Networking Research Workshop 应用网络研究研讨会论文集
Proceedings of the Applied Networking Research Workshop Pub Date : 1900-01-01 DOI: 10.1145/3106328
{"title":"Proceedings of the Applied Networking Research Workshop","authors":"","doi":"10.1145/3106328","DOIUrl":"https://doi.org/10.1145/3106328","url":null,"abstract":"","PeriodicalId":147697,"journal":{"name":"Proceedings of the Applied Networking Research Workshop","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133325047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信