In past years, it has become increasingly evident that the venerable end-to-end model often taught in networking courses has more to do with Internet lore than with the reality of the network today. Over time, operators have deployed a vast array of middleboxes to enhance the capabilities of the network, ranging from security (firewalls, IDSes, traffic scrubbers), traffic shaping (rate limiters, load balancers), dealing with address space exhaustion (NATs) or improving performance (traffic accelerators, caches, proxies), to name a few. Middleboxes are ubiquitous: a third of access networks show symptoms of stateful middlebox processing  and in enterprise networks there are as many middleboxes deployed as routers and switches .
|Number of pages||3|
|Publication status||Published - 27 Jan 2015|
|Event||IAB Workshop on Stack Evolution in a Middlebox Internet 2015 - Zürich, Switzerland|
Duration: 26 Jan 2015 → 27 Jan 2015
|Workshop||IAB Workshop on Stack Evolution in a Middlebox Internet 2015|
|Abbreviated title||SEMI 2015|
|Period||26/01/15 → 27/01/15|