Zero Configuration Networking: Implementation, performance, and security

Farhan Siddiqui, Walden University
Sherali Zeadally
Thabet Kacem
Scott Fowler


The ubiquitous access to wired and wireless networks is making information access possible from anywhere, anytime, and any device. Today, end-users are also highly mobile, often equipped with a range of portable devices, and they expect service availability when they require it. In addition, they do not want to be burdened by complex configurations before they can discover and use services. The Zero Configuration (Zeroconf) networking technology promises to alleviate this configuration burden by allowing users to discover services and devices with little end-user intervention. We compare two popular implementations of Zeroconf namely, Avahi and Mono.Zeroconf running on Linux and Windows XP operating systems respectively. We evaluate their performance using service discovery time as the performance metric. Our empirical results show that Linux Avahi yields almost 99% improvements in service discovery time over Windows Mono.Zeroconf. We also discuss security solutions that can be deployed to enhance the security of Zeroconf networks. We further investigate the performance of the IP Security (IPSec) protocol when used by our Mono.Zeroconf implementation running on the Windows XP platform. With IPSec, service discovery time increases by almost 45% with our prototype implementation.