- QUIC and MASQUE were tested in proxying scenarios under different network conditions and file sizes, and compared to traditional TCP+TLS.
- TCP+TLS performed best with a proxy due to independent connections, but QUIC and MASQUE outperformed TCP+TLS without a proxy, especially at higher bandwidths and larger files.
- MASQUE generally had similar or worse performance than QUIC, especially for small files, though it improved relative to QUIC for medium/high bandwidth and large files. Its performance came at a reasonable cost for its privacy benefits.
IAB-5039 : MQTT: A Protocol for the Internet of Things (InterConnect 2015)PeterNiblett
MQTT is a simple, event-driven messaging protocol designed for use in Internet of Things and mobile applications. It's implemented in IBM MessageSight and MQ, and it is the protocol used by the IBM Internet of Things Foundation. You will hear it mentioned in several of the talks at this conference; and, as it recently became an official standard and is being used more and more in the world at large, you may have heard about it in the press as well. Come along to this unashamedly technical session to learn about what the protocol actually does, and how to program to it in Java, C or JavaScript.
(Revised from 2014 presentation: Session 2640 Introduction to the iot protocol, mqtt)
UDP accelerated file transfer - introducing an FTP replacement and its benefitsFileCatalyst
Providing an introduction to TCP and the issues associated with file transfer using this process, while introducing an alternative file transfer method.
High performance browser networking ch1,2,3Seung-Bum Lee
Presentation material including summary of "High Performance Browser Networking" by Ilya Grigorik. This book includes very good summary of computer network not only for internet browsing but also multimedia streaming.
The internet is a network of computers linking many different types of computers all over the world. It is a very large wide area network (WAN) connecting computers and networks around the world.
Scale changes everything. Number of connections and destinations went from dozen to thousands, number of messages increased by order of magnitude. What once was quite adequate for enterprise messaging can't scale to support "Internet of Things". We need new protocols, patterns and architectures to support this new world. This session will start with basic introduction to the concept of Internet of things. Next it will discuss general technical challenges involved with the concept and explain why it is becoming mainstream now. Now we're ready to start talking about solutions. We will introduce some messaging patterns (like telemetry and command/control) and protocols (such as MQTT and AMQP) used in these scenarios. Finally we will see how Apache ActiveMQ is gearing up for this race. We will show tips for horizontal and vertical scaling of the broker, related projects that can help with deployments and what the future development road map looks like.
IAB-5039 : MQTT: A Protocol for the Internet of Things (InterConnect 2015)PeterNiblett
MQTT is a simple, event-driven messaging protocol designed for use in Internet of Things and mobile applications. It's implemented in IBM MessageSight and MQ, and it is the protocol used by the IBM Internet of Things Foundation. You will hear it mentioned in several of the talks at this conference; and, as it recently became an official standard and is being used more and more in the world at large, you may have heard about it in the press as well. Come along to this unashamedly technical session to learn about what the protocol actually does, and how to program to it in Java, C or JavaScript.
(Revised from 2014 presentation: Session 2640 Introduction to the iot protocol, mqtt)
UDP accelerated file transfer - introducing an FTP replacement and its benefitsFileCatalyst
Providing an introduction to TCP and the issues associated with file transfer using this process, while introducing an alternative file transfer method.
High performance browser networking ch1,2,3Seung-Bum Lee
Presentation material including summary of "High Performance Browser Networking" by Ilya Grigorik. This book includes very good summary of computer network not only for internet browsing but also multimedia streaming.
The internet is a network of computers linking many different types of computers all over the world. It is a very large wide area network (WAN) connecting computers and networks around the world.
Scale changes everything. Number of connections and destinations went from dozen to thousands, number of messages increased by order of magnitude. What once was quite adequate for enterprise messaging can't scale to support "Internet of Things". We need new protocols, patterns and architectures to support this new world. This session will start with basic introduction to the concept of Internet of things. Next it will discuss general technical challenges involved with the concept and explain why it is becoming mainstream now. Now we're ready to start talking about solutions. We will introduce some messaging patterns (like telemetry and command/control) and protocols (such as MQTT and AMQP) used in these scenarios. Finally we will see how Apache ActiveMQ is gearing up for this race. We will show tips for horizontal and vertical scaling of the broker, related projects that can help with deployments and what the future development road map looks like.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Presentazione-Prelaurea_Alessandro-Nuzzi.pptx
1. Performance assessment of the MASQUE extension for
proxying scenarios in the QUIC transport protocol
Anno accademico 2022-2023
DIPARTIMENTO DI INGEGNERIA E ARCHITETTURA
Corso di Laurea in Ingegneria Elettronica e Informatica
Curriculum Reti & IoT
Laureando
Alessandro Nuzzi
Relatori
Prof. Alberto Bartoli
Prof. Martino Trevisan
2. Context
• The web relies on many protocols to enable communication and
information sharing across the Internet
• HTTP and TCP are the predominant protocols driving today's web
infrastructure
• The new QUIC (Quick UDP Internet Connections) transport protocol is
on the rise across the world for many applications
3. QUIC vs TCP
• Reduced connection establishment
latency
• Connection migration support
• Header encryption
• No head-of-line blocking
4. QUIC: Usage
• More than 40% of traffic for big
applications requiring high efficiency
• Facebook, Netflix, YouTube, Instagram
• High traffic around the world
• 46% in Latin America, 42% in Europe and
32% in the United States
• Widely supported by providers
• Akamai, Cloudflare, Fastly
5. Proxies
• Act as intermediaries between clients and servers
• Provide several features
• Network optimization
• Privacy enhancement
• Content filtering
6. Problem introduction
• QUIC encrypts almost all of its packet header fields
• Difficult for proxies to inspect traffic and apply policy rules
• Proxies might treat QUIC traffic as malicious or unknown
• Traffic delayed or dropped
• Need for new proxying technologies that allow HTTP to create tunnels
for proxying any non-TCP-based protocols, such as QUIC
7. MASQUE
Multiplexed Application Substrate over QUIC Encryption
• Working group formed in June 2020
• Supports proxying UDP and IP over HTTP
• Using QUIC DATAGRAMS with HTTP/3 (RFC 9297)
• CONNECT-UDP (RFC 9298)
• Provides privacy guarantees
• Hiding client IP address from the target server
• Obfuscating traffic destination from client network provider
• Can perform network translation or DNS resolution
8. CONNECT-UDP
• Uses new DATAGRAM frame
• Unreliable
• Congestion-controlled
• ACK-eliciting, not retransmitted
• Creates and connects a UDP
socket to a target server
• Creates an end-to-end flow of
unreliable messages between
client and server
9. Thesis objectives
• Evaluate the performance of the MASQUE proposal in proxying
scenarios
• Several network conditions
• Comparison with traditional HTTP/TCP proxies
• Scenarios in which MASQUE usage could be beneficial
10. Tools used
Hard to find stable implementations of MASQUE and QUIC
• Cloudflare QUIC server
• Google QUIC client
• Google MASQUE client and MASQUE proxy
• curl command-line tool
• Squid proxy
• Twisted HTTPS server
11. Testing environment
• Docker-based emulation
• Client, server and proxy containers
• Traffic control and network conditions with tc
• Additional delay, bandwidth limit, packet loss
• Automation with Bash scripts
• Execution of repetitive or complex operations
12. Methodology
• Client requesting a constant-sized file via HTTP GET
• File requested to target server, either through proxy or not
• Transfer time measured
• Different file sizes
• Four categories
• Without proxy: TCP with TLS and QUIC
• With proxy: TCP with TLS and MASQUE
• Simulated network conditions
• Bandwidth limit, additional delay, packet loss
13. Network conditions
• Additional delay
• Results in additional RTT
• Without proxy: doubled delay applied to client interface
• With proxy: single delays applied to client and server interfaces
• Packet loss
• Without proxy: loss divided by two on all interfaces
• With proxy: loss divided by four on all interfaces
• Bandwidth limit
• Limit applied to client and server interfaces
14. Experiments
• A full test is made of four experiments, one for each category
• MASQUE, TCP+TLS with proxy, QUIC, TCP+TLS without proxy
• Each experiment is made of 21 measurements
• Delay increased in every new measurement, from 0ms to 200ms
• Each measurement is made of 100 iterations
• Each iteration is a file request
• Fixed network conditions: delay, bandwidth, packet loss
• Data summary based on the iterations measured times
15. Data
• Collected data for each request
• Real time: elapsed time from client command start to finish
• CPU time: processing time used by client command on user and kernel mode
• Data summary for each measurement
• Collected real times used to calculate measurement summary
• Mean, standard deviation, median, quartiles...
• In case of error, time is discarded and error is logged
16. Experimental campaigns
• Three scenarios
• Low bandwidth: 10Mbps, no packet loss, variable delay
• Medium bandwidth: 100Mbps, no packet loss, variable delay
• High bandwidth: 1Gbps, no packet loss, variable delay
• In each scenario, 1MB and 10MB download
• Other scenarios
• Medium bandwidth, 1MB file download, 10ms delay, 0%, 1%, 2%, 5% packet loss
17. Low bandwidth
1MB file
• TCP+TLS with proxy has best
performance
• Gap between QUIC, MASQUE
and TCP+TLS at the beginning
• QUIC similar to TCP+TLS
without proxy
• QUIC has worst performance
between 140ms and 170ms
• QUIC outperforms MASQUE and
TCP+TLS without proxy after
• Internal tuning mechanisms
18. Medium bandwidth
1MB file
• Same considerations about
TCP+TLS without proxy and
performance gap
• QUIC performs better than
MASQUE, except at 30ms
• QUIC outperforms TCP+TLS
without proxy starting from
80ms, MASQUE from 190ms
• QUIC and MASQUE less
variable than TCP+TLS
19. High bandwidth
1MB file
• Similar as previous scenario
• QUIC and MASQUE start
performing better than
TCP+TLS without proxy earlier,
at 40ms and 140ms
20. All bandwidth
10MB file
• Same considerations about
TCP+TLS without proxy and
performance gap
• MASQUE and QUIC never reach
TCP+TLS
• MASQUE perform worse than
QUIC before a certain time,
better after
21. Medium bandwidth,
1MB, 10ms, loss
• Measured time of each box
increases as loss increases
• MASQUE performs the worst
• QUIC keeps its median below
the TCP+TLS counterpart when
the loss is the highest
22. CPU time VS Real
time
• QUIC has equal CPU time and
Real time
• The process actively executes
instructions on the CPU
• TCP+TLS cases have constant
CPU time
• Waiting time is not considered in
the CPU time
• MASQUE has almost constant
CPU time, except at the
beginning
Lines overlap!
23. Results
• TCP+TLS with proxy has the best performance
• In presence of a proxy, TCP+TLS uses two end-to-end independent
connections
• Retransmissions happen independently in the two connections
• Higher throughput
• In MASQUE, only one connection is established
• End-to-end retransmissions
• Using a proxy does not provide advantages
24. Results (II)
• Small files: MASQUE performs similarly or worse than QUIC
• Bigger files: MASQUE outperforms QUIC in medium and high bandwidth
and high latency links
• Low bandwidth and high latency: QUIC has very good performance
• Lossy links: QUIC has better performance than equivalent TCP+TLS and
than MASQUE
• QUIC and MASQUE have different retransmission mechanism
25. Results (III)
• Higher bandwidth is beneficial for QUIC and MASQUE with small files
• The higher the bandwidth, the sooner QUIC and MASQUE outperform TCP+TLS
without proxy
• With little to no added delay, performance gap between QUIC and
MASQUE and QUIC and TCP+TLS
• Up to 30% and 40% respectively
• After this time interval, QUIC and MASQUE have small difference
• At most 8% with 1MB file size, 13% with 10MB file size
26. Limitations and future work
• MASQUE early development stage
• Existing implementations are not yet stable
• Need for analysing new or enhanced MASQUE implementations
• Experiments only with single HTTP requests
• Need to evaluate performance of complex web pages
• And other applications: video streaming, mail, etc.
• Need for finding root causes reason of the performance gaps
• Possibility of using more sophisticated network conditions
• Correlated packet loss
• Unevenly distributed delay
27. Conclusions
• Overall modest performance cost associated with the employment of MASQUE
in proxying scenarios that already use QUIC
• Adopting MASQUE to achieve its privacy guarantees comes at a reasonable
performance expense
• MASQUE can be a good choice in several contexts
• IoT devices
• Companies handling sensitive data
• Developing protocols with encryption and privacy promises involves a
performance trade-off