Rate limitable and efficient discovery of path maximum transmission units

Summary Path maximum transmission unit discovery (PMTUD) is the protocol by which a host can find the largest packet it can send through an internet protocol (IP) network to a given destination. It relies on intermediary nodes sending “packet too big” (PTB) messages in IPv6 or “datagram too big” mes...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of communication systems Jg. 32; H. 6
1. Verfasser: Subbaraman, Ramesh R.
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Chichester Wiley Subscription Services, Inc 01.04.2019
Schlagworte:
ISSN:1074-5351, 1099-1131
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Summary Path maximum transmission unit discovery (PMTUD) is the protocol by which a host can find the largest packet it can send through an internet protocol (IP) network to a given destination. It relies on intermediary nodes sending “packet too big” (PTB) messages in IPv6 or “datagram too big” messages in IPv4 (both henceforth referred to as PTB for the purposes of this paper). These are often completely blocked by firewalls, presumably due to a fear of PTB floods wasting the bandwidth of network links. This breaks PMTUD, forcing the use of fragmentation in IPv4 and/or suboptimal packet sizes. In IPv6, fragmentation by intermediary nodes is no longer an option. Utilizing a dynamic programming‐based solution to the generalization of a mathematical puzzle, the two‐egg problem, this work presents a family of strategies for a host to discover path MTU while obeying hard limits on the maximum number of incoming PTB messages that may be generated. This allows a firewall to mitigate PTB floods via rate limits. Moreover, these strategies are compliant with the relevant standards on PMTUD and thus can be deployed by merely changing the PMTUD algorithm implementation in TCP/IP stacks on end hosts without changing intermediary nodes' protocol behavior. Adapting the solution to the generalization of a mathematical puzzle, the two‐egg problem, this work evaluates a DDoS resistant and RFC compliant method to discover path maximum transmission units (PMTU) in IP networks. Simulations show that the method is efficient in terms of the network load it causes and converges fast enough to be used in practice. Moreover, it directly lends itself to rate limiting the number of incoming control messages needed, thus addressing the long standing open problem of firewalls breaking the PMTU discovery protocol by blocking such messages.
AbstractList Path maximum transmission unit discovery (PMTUD) is the protocol by which a host can find the largest packet it can send through an internet protocol (IP) network to a given destination. It relies on intermediary nodes sending “packet too big” (PTB) messages in IPv6 or “datagram too big” messages in IPv4 (both henceforth referred to as PTB for the purposes of this paper). These are often completely blocked by firewalls, presumably due to a fear of PTB floods wasting the bandwidth of network links. This breaks PMTUD, forcing the use of fragmentation in IPv4 and/or suboptimal packet sizes. In IPv6, fragmentation by intermediary nodes is no longer an option. Utilizing a dynamic programming‐based solution to the generalization of a mathematical puzzle, the two‐egg problem, this work presents a family of strategies for a host to discover path MTU while obeying hard limits on the maximum number of incoming PTB messages that may be generated. This allows a firewall to mitigate PTB floods via rate limits. Moreover, these strategies are compliant with the relevant standards on PMTUD and thus can be deployed by merely changing the PMTUD algorithm implementation in TCP/IP stacks on end hosts without changing intermediary nodes' protocol behavior.
Summary Path maximum transmission unit discovery (PMTUD) is the protocol by which a host can find the largest packet it can send through an internet protocol (IP) network to a given destination. It relies on intermediary nodes sending “packet too big” (PTB) messages in IPv6 or “datagram too big” messages in IPv4 (both henceforth referred to as PTB for the purposes of this paper). These are often completely blocked by firewalls, presumably due to a fear of PTB floods wasting the bandwidth of network links. This breaks PMTUD, forcing the use of fragmentation in IPv4 and/or suboptimal packet sizes. In IPv6, fragmentation by intermediary nodes is no longer an option. Utilizing a dynamic programming‐based solution to the generalization of a mathematical puzzle, the two‐egg problem, this work presents a family of strategies for a host to discover path MTU while obeying hard limits on the maximum number of incoming PTB messages that may be generated. This allows a firewall to mitigate PTB floods via rate limits. Moreover, these strategies are compliant with the relevant standards on PMTUD and thus can be deployed by merely changing the PMTUD algorithm implementation in TCP/IP stacks on end hosts without changing intermediary nodes' protocol behavior. Adapting the solution to the generalization of a mathematical puzzle, the two‐egg problem, this work evaluates a DDoS resistant and RFC compliant method to discover path maximum transmission units (PMTU) in IP networks. Simulations show that the method is efficient in terms of the network load it causes and converges fast enough to be used in practice. Moreover, it directly lends itself to rate limiting the number of incoming control messages needed, thus addressing the long standing open problem of firewalls breaking the PMTU discovery protocol by blocking such messages.
Author Subbaraman, Ramesh R.
Author_xml – sequence: 1
  givenname: Ramesh R.
  orcidid: 0000-0001-7470-2812
  surname: Subbaraman
  fullname: Subbaraman, Ramesh R.
  email: ramesh.subbaraman@att.com
  organization: AT&T
BookMark eNp10E1LAzEQBuAgFWyr4E8IePGyNZNs9uNYqtVCQRA9h2w2wZTdpCZZtf_erfXqZWYOz8zAO0MT551G6BrIAgihd61UC1YTfoamQOo6A2AwOc5lnnHG4QLNYtwRQipa8CnavMikcWd7m2TTaSxdi7UxVlntEm5tVP5ThwP2Bu9lese9_Lb90OMUpIu9jdF6hwdnU7xE50Z2UV_99Tl6Wz-8rp6y7fPjZrXcZorynGcVl5JzQ1WZK8a4hkoBb2iRG00AVFEr0ihaqqKsueI0Z6piQHTTjrVoxpU5ujnd3Qf_MeiYxM4PwY0vBYWaQV4VlI7q9qRU8DEGbcQ-2F6GgwAijkGJMShxDGqk2Yl-2U4f_nXifrn69T_DiGpO
Cites_doi 10.1145/55483.55524
10.1145/1879141.1879155
10.1145/3158374
10.17487/rfc4821
10.17487/rfc1981
10.1287/ited.4.1.48
10.1109/TNET.2002.805028
ContentType Journal Article
Copyright 2019 John Wiley & Sons, Ltd.
Copyright_xml – notice: 2019 John Wiley & Sons, Ltd.
DBID AAYXX
CITATION
7SP
8FD
JQ2
L7M
DOI 10.1002/dac.3905
DatabaseName CrossRef
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
DatabaseTitle CrossRef
Technology Research Database
Advanced Technologies Database with Aerospace
Electronics & Communications Abstracts
ProQuest Computer Science Collection
DatabaseTitleList Technology Research Database

CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1099-1131
EndPage n/a
ExternalDocumentID 10_1002_dac_3905
DAC3905
Genre article
GroupedDBID .3N
.GA
.Y3
05W
0R~
10A
1L6
1OB
1OC
31~
33P
3SF
3WU
4.4
50Y
50Z
51W
51X
52M
52N
52O
52P
52S
52T
52U
52W
52X
5GY
5VS
66C
702
7PT
8-0
8-1
8-3
8-4
8-5
8UM
930
A03
AAESR
AAEVG
AAHHS
AAHQN
AAMNL
AANHP
AANLZ
AAONW
AASGY
AAXRX
AAYCA
AAZKR
ABCQN
ABCUV
ABDBF
ABEML
ABIJN
ABPVW
ACAHQ
ACBWZ
ACCFJ
ACCZN
ACGFS
ACIWK
ACPOU
ACRPL
ACSCC
ACUHS
ACXBN
ACXQS
ACYXJ
ADBBV
ADEOM
ADIZJ
ADKYN
ADMGS
ADNMO
ADOZA
ADXAS
ADZMN
ADZOD
AEEZP
AEIGN
AEIMD
AENEX
AEQDE
AEUQT
AEUYR
AFBPY
AFFPM
AFGKR
AFPWT
AFWVQ
AFZJQ
AHBTC
AITYG
AIURR
AIWBW
AJBDE
AJXKR
ALAGY
ALMA_UNASSIGNED_HOLDINGS
ALUQN
ALVPJ
AMBMR
AMYDB
ASPBG
ATUGU
AUFTA
AVWKF
AZBYB
AZFZN
AZVAB
BAFTC
BDRZF
BFHJK
BHBCM
BMNLL
BMXJE
BNHUX
BROTX
BRXPI
BY8
CMOOK
CS3
D-E
D-F
DCZOG
DPXWK
DR2
DRFUL
DRSTM
DU5
EBS
EJD
ESX
F00
F01
F04
FEDTE
G-S
G.N
GNP
GODZA
H.T
H.X
HF~
HGLYW
HHY
HVGLF
HZ~
I-F
IX1
J0M
JPC
KQQ
LATKE
LAW
LC2
LC3
LEEKS
LITHE
LOXES
LP6
LP7
LUTES
LYRES
MEWTI
MK4
MK~
ML~
MRFUL
MRSTM
MSFUL
MSSTM
MXFUL
MXSTM
N04
N05
N9A
NF~
O66
O9-
OIG
P2W
P2X
P4D
PALCI
Q.N
Q11
QB0
QRW
R.K
RIWAO
ROL
RWI
RX1
RYL
SAMSI
SUPJJ
TUS
UB1
V2E
W8V
W99
WBKPD
WIH
WIK
WLBEL
WOHZO
WQJ
WRC
WWI
WXSBR
WYISQ
XG1
XV2
ZZTAW
~IA
~WT
AAMMB
AAYXX
AEFGJ
AEYWJ
AGHNM
AGQPQ
AGXDD
AGYGG
AIDQK
AIDYY
AIQQE
CITATION
O8X
7SP
8FD
JQ2
L7M
ID FETCH-LOGICAL-c2545-85aa55f2c74c335e18c15b264fe011c69c0bc27c6795c5243c8310ebd3106bc33
IEDL.DBID DRFUL
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000461873100010&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1074-5351
IngestDate Fri Jul 25 12:23:56 EDT 2025
Sat Nov 29 03:54:51 EST 2025
Wed Jan 22 16:20:30 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 6
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2545-85aa55f2c74c335e18c15b264fe011c69c0bc27c6795c5243c8310ebd3106bc33
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-7470-2812
PQID 2193148622
PQPubID 996367
PageCount 17
ParticipantIDs proquest_journals_2193148622
crossref_primary_10_1002_dac_3905
wiley_primary_10_1002_dac_3905_DAC3905
PublicationCentury 2000
PublicationDate April 2019
2019-04-00
20190401
PublicationDateYYYYMMDD 2019-04-01
PublicationDate_xml – month: 04
  year: 2019
  text: April 2019
PublicationDecade 2010
PublicationPlace Chichester
PublicationPlace_xml – name: Chichester
PublicationTitle International journal of communication systems
PublicationYear 2019
Publisher Wiley Subscription Services, Inc
Publisher_xml – name: Wiley Subscription Services, Inc
References 2018; 18
1990
2001
2012
2011
2010
2002; 10
2009
2008
1996
2003; 4
2007
2006
2017
2016; 2016
2016
2005
2015
1981
1987; 17
1999
e_1_2_9_30_1
e_1_2_9_31_1
Ullrich J (e_1_2_9_5_1) 2016; 2016
e_1_2_9_11_1
e_1_2_9_10_1
e_1_2_9_13_1
e_1_2_9_32_1
e_1_2_9_12_1
e_1_2_9_33_1
Bruno A (e_1_2_9_21_1) 2007
e_1_2_9_15_1
Cormen T (e_1_2_9_20_1) 2009
e_1_2_9_14_1
e_1_2_9_17_1
e_1_2_9_16_1
e_1_2_9_19_1
e_1_2_9_18_1
e_1_2_9_22_1
e_1_2_9_24_1
e_1_2_9_23_1
e_1_2_9_8_1
e_1_2_9_7_1
e_1_2_9_6_1
e_1_2_9_4_1
e_1_2_9_3_1
e_1_2_9_2_1
e_1_2_9_9_1
e_1_2_9_26_1
e_1_2_9_25_1
e_1_2_9_28_1
e_1_2_9_27_1
e_1_2_9_29_1
References_xml – year: 2011
– year: 2009
– year: 1981
– volume: 4
  start-page: 48
  issue: 1
  year: 2003
  end-page: 64
  article-title: The joy of egg‐dropping in Braunschweig and Hong Kong
  publication-title: Inf Trans Education
– year: 2005
– year: 2008
– volume: 10
  start-page: 709
  issue: 6
  year: 2002
  end-page: 720
  article-title: Beyond folklore: observations on fragmented traffic
  publication-title: IEEE/ACM Trans Networking
– year: 2007
– year: 2001
– year: 2006
– start-page: 102
  year: 2010
  end-page: 108
– year: 1996
– volume: 17
  start-page: 390
  issue: 5
  year: 1987
  end-page: 401
– volume: 18
  start-page: 36:1
  issue: 3
  year: 2018
  end-page: 36:20
  article-title: Are we there yet? IPV6 in Australia and China
  publication-title: ACM Trans Internet Technol
– volume: 2016
  start-page: 42:1
  issue: 1
  year: 2016
  end-page: 42:20
  article-title: The role and security of firewalls in cyber‐physical cloud computing
  publication-title: EURASIP J Inf Secur
– year: 2017
– year: 2016
– year: 1990
– year: 2015
– year: 2010
– year: 1999
– year: 2012
– ident: e_1_2_9_31_1
– ident: e_1_2_9_28_1
– ident: e_1_2_9_3_1
– ident: e_1_2_9_6_1
– ident: e_1_2_9_25_1
– ident: e_1_2_9_16_1
  doi: 10.1145/55483.55524
– ident: e_1_2_9_24_1
  doi: 10.1145/1879141.1879155
– ident: e_1_2_9_7_1
– ident: e_1_2_9_13_1
  doi: 10.1145/3158374
– ident: e_1_2_9_22_1
  doi: 10.17487/rfc4821
– volume: 2016
  start-page: 42:1
  issue: 1
  year: 2016
  ident: e_1_2_9_5_1
  article-title: The role and security of firewalls in cyber‐physical cloud computing
  publication-title: EURASIP J Inf Secur
– ident: e_1_2_9_19_1
– ident: e_1_2_9_32_1
– ident: e_1_2_9_4_1
  doi: 10.17487/rfc1981
– ident: e_1_2_9_2_1
– ident: e_1_2_9_10_1
– ident: e_1_2_9_27_1
– ident: e_1_2_9_8_1
– volume-title: Introduction to Algorithms, Third Edition, Chapter 15
  year: 2009
  ident: e_1_2_9_20_1
– ident: e_1_2_9_12_1
– volume-title: CCDA Official Examination Certification Guide, Third Edition (pgs. 21, 527)
  year: 2007
  ident: e_1_2_9_21_1
– ident: e_1_2_9_33_1
– ident: e_1_2_9_30_1
– ident: e_1_2_9_15_1
– ident: e_1_2_9_14_1
  doi: 10.1287/ited.4.1.48
– ident: e_1_2_9_18_1
– ident: e_1_2_9_23_1
– ident: e_1_2_9_26_1
– ident: e_1_2_9_9_1
– ident: e_1_2_9_11_1
– ident: e_1_2_9_17_1
  doi: 10.1109/TNET.2002.805028
– ident: e_1_2_9_29_1
SSID ssj0008265
Score 2.1427507
Snippet Summary Path maximum transmission unit discovery (PMTUD) is the protocol by which a host can find the largest packet it can send through an internet protocol...
Path maximum transmission unit discovery (PMTUD) is the protocol by which a host can find the largest packet it can send through an internet protocol (IP)...
SourceID proquest
crossref
wiley
SourceType Aggregation Database
Index Database
Publisher
SubjectTerms Algorithms
Dynamic programming
Firewalls
Floods
Fragmentation
internet protocols and standards
IP (Internet Protocol)
Messages
modeling and simulation
Nodes
path MTU discovery
TCP (protocol)
TCP/IP (protocol)
Title Rate limitable and efficient discovery of path maximum transmission units
URI https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fdac.3905
https://www.proquest.com/docview/2193148622
Volume 32
WOSCitedRecordID wos000461873100010&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVWIB
  databaseName: Wiley Online Library Full Collection 2020
  customDbUrl:
  eissn: 1099-1131
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0008265
  issn: 1074-5351
  databaseCode: DRFUL
  dateStart: 19960101
  isFulltext: true
  titleUrlDefault: https://onlinelibrary.wiley.com
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8NAEB609aAH32J9sYJ4C002u5vkWFqLghQpFnoLu5sNFGwqTSv6753No60HQfCSXDJJGObxzTLzDcCdMK72osA4SqTSYTLxHcnTxJGJCZIgFF7ip8WyiWAwCMfj6KXqqrSzMCU_xOrAzXpGEa-tg0uVt9ekoQl-Dwt2vg1NimbLG9DsDfuj51UcRuDM645D7nOvpp51abuW_ZmM1ghzE6cWiaZ_8J9fPIT9Cl6STmkPR7BlsmPY2yAdPIGnIcJL8mYHm-zYFJFZQkxBJIH5h9gpXdvV-UVmKbHrislUfk6myylZ2KyGVmGP18gSI0F-CqP-w2v30akWKjga60DuhFxKzlOqA6Z9nxsv1B5XCIlSg26uRaRdpWmgRRBxzSnztV1DZlSCV6FQ5Awa2Swz50BYaCQWS9QzCgs8jynMcpoJEbqGMRbRFtzWmo3fS96MuGRIpjGqJbZqacFVrfK48pw8xgjqY4kmKL7ivlDur_Jxr9O194u_PngJu4h3orLx5goai_nSXMOO_lhM8vlNZT_f2e_IKQ
linkProvider Wiley-Blackwell
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8NAEB5qK6gH32K16griLZjH7ibBU2ktLdYipYXewmazgYJNpQ_Rf-9sHm09CIKX5JJJwjCPb5aZbwDuuDKl5bvKCHksDCoixxAsjgwRKTdyPW5FTpwum3B7PW808l9L8FjMwmT8EKsDN-0ZabzWDq4PpB_WrKERfhArdrYFFYpWhOZdafZbw-4qECNyZkXLIXOYVXDPmvZDIfszG60h5iZQTTNN6-Bf_3gI-znAJPXMIo6gpJJj2NugHTyBTh8BJnnTo016cIqIJCIqpZLADET0nK7u6_wi05johcVkIj7Hk-WELHReQ7vQB2xkibFgfgrD1tOg0TbylQqGxEqQGR4TgrHYli6VjsOU5UmLhQiKYoWOLrkvzVDaruSuzySzqSP1IjIVRnjlIYqcQTmZJuocCPWUwHLJtlSIJZ5FQ8xzknLumYpS6ttVuC1UG7xnzBlBxpFsB6iWQKulCrVC50HuO_MAY6iDRRq38RX3qXZ_lQ-a9Ya-X_z1wRvYaQ9eukG303u-hF1EP37WhlOD8mK2VFewLT8W4_nsOjemb-SYzBk
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8NAEB5qK6IH32K16griLTSP3U2Cp9JaLJZSioXewmZ3AwX7oA_Rf-9s0rT1IAhekksmCcM8vllmvgF44NqWTuhrK-aJsKhQniVYoiyhtK_8gDvKS9JlE36nEwwGYbcAT_ksTMYPsT5wM56Rxmvj4HqqkuqGNVThB7FiZztQomaHTBFKjV6z314HYkTOLG85ZB5zcu5Z263msj-z0QZibgPVNNM0j_71j8dwuAKYpJZZxAkU9PgUDrZoB8-g1UOASd7NaJMZnCJirIhOqSQwAxEzp2v6Or_IJCFmYTEZic_haDkiC5PX0C7MARtZYiyYn0O_-fxWf7FWKxUsiZUgswImBGOJK30qPY9pJ5AOixEUJRodXfJQ2rF0fcn9kEnmUk-aRWQ6VnjlMYpcQHE8GetLIDTQAssl19ExlngOjTHPScp5YGtKaeiW4T5XbTTNmDOijCPZjVAtkVFLGSq5zqOV78wjjKEeFmncxVc8ptr9VT5q1OrmfvXXB-9gr9toRu1W5_Ua9hH8hFkXTgWKi9lS38Cu_FgM57PblS19A7v4y5Q
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Rate+limitable+and+efficient+discovery+of+path+maximum+transmission+units&rft.jtitle=International+journal+of+communication+systems&rft.au=Subbaraman%2C+Ramesh+R&rft.date=2019-04-01&rft.pub=Wiley+Subscription+Services%2C+Inc&rft.issn=1074-5351&rft.eissn=1099-1131&rft.volume=32&rft.issue=6&rft_id=info:doi/10.1002%2Fdac.3905&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1074-5351&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1074-5351&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1074-5351&client=summon