Hacking the MPTCP socket API draft-hesmans-mptcp-socket-00 - - PowerPoint PPT Presentation

hacking the mptcp socket api
SMART_READER_LITE
LIVE PREVIEW

Hacking the MPTCP socket API draft-hesmans-mptcp-socket-00 - - PowerPoint PPT Presentation

Hacking the MPTCP socket API draft-hesmans-mptcp-socket-00 MultiPath TCP WiFi 4G LTE MultiPath TCP MultiPath TCP Application connect read select getpid MPTCP TCP TCP TCP MultiPath TCP API Application add_subflow read select


slide-1
SLIDE 1

Hacking the MPTCP socket API

draft-hesmans-mptcp-socket-00

slide-2
SLIDE 2

MultiPath TCP

WiFi 4G LTE

slide-3
SLIDE 3

MultiPath TCP

Application MPTCP read select getpid connect TCP TCP TCP

MultiPath TCP

slide-4
SLIDE 4

MultiPath TCP API

Application API MPTCP read select getpid add_subflow TCP TCP TCP

slide-5
SLIDE 5

Concept

Louvain-La-Neuve Seoul

slide-6
SLIDE 6

Topics

  • Integrating the API with iPerf3
  • Bindings the API towards
  • C#
  • Java
  • Python
  • Ruby
  • Tuning these applications for MPTCP:
  • OpenSSH
  • Curl
  • lighttpd (server initiating the subflows)
  • LD_PRELOAD library
  • Documentation (manpage)
slide-7
SLIDE 7

The LD_PRELOAD Library

Application Library API MPTCP connect read select getpid add_subflow read TCP TCP TCP

slide-8
SLIDE 8

Takeaways

  • The iPerf extension will allow easier benchmarks
  • The socket API is asynchronous

=> you don’t receive any notification/callbacks/error codes

  • Inferring new endpoints (for new subflows) is hard