TPOT Translucent Proxying of TCP Pablo Rodriguez, Sandeep Sibal, Oliver Spatscheck AT&T Labs - Research.

Slides:



Advertisements
Similar presentations
All Rights Reserved © Alcatel-Lucent 2009 Enhancing Dynamic Cloud-based Services using Network Virtualization F. Hao, T.V. Lakshman, Sarit Mukherjee, H.
Advertisements

Barracuda Link Balancer Link Reliability and Bandwidth Optimization.
L. Alchaal & al. Page Offering a Multicast Delivery Service in a Programmable Secure IP VPN Environment Lina ALCHAAL Netcelo S.A., Echirolles INRIA.
IPv4 - IPv6 Integration and Coexistence Strategies Warakorn Sae-Tang Network Specialist Professional Service Department A Subsidiary.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Project by: Palak Baid (pb2358) Gaurav Pandey (gip2103) Guided by: Jong Yul Kim.
Lab Practical 2 Study about different types of Networking Device
Highly Available Central Services An Intelligent Router Approach Thomas Finnern Thorsten Witt DESY/IT.
Module 8: Concepts of a Network Load Balancing Cluster
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Networking for Ocean Bottom Observatories Taken from the Cabled Observatory Presentation School of Ocean and Earth Science and Technology February 2006.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
1 Web Proxies Dr. Rocky K. C. Chang 6 November 2005.
Tesseract A 4D Network Control Plane
Load Sharing and Balancing - Saravanan Mathialagan Masters in Computer Science Georgia State University.
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Network based IP VPN Architecture using Virtual Routers Jessica Yu CoSine Communications, Inc. Feb. 19 th, 2001.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 Content Distribution Networks. 2 Replication Issues Request distribution: how to transparently distribute requests for content among replication servers.
Christopher Bednarz Justin Jones Prof. Xiang ECE 4986 Fall Department of Electrical and Computer Engineering University.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
CSE 8343 Group 3 Advanced OS Inter Operability Between IPv4 and IPv6 Team Members Aman Preet Singh Rohit Singh Nipun Aggarwal Chirag Shah Eugene Novak.
Professor OKAMURA Laboratory. Othman Othman M.M. 1.
Chapter 6: Packet Filtering
TCP/IP Guide. OSI Reference Model Real-World Analogy Phase OSI Layer CEO LetterWeb Site Connection (Simplified) Transmission 7 The CEO of a company in.
Submitted by: Shailendra Kumar Sharma 06EYTCS049.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 3.
Internet Ethernet Token Ring Video High Speed Router Host A: Client browser: REQUEST:http//mango.ee.nogradesu.edu/c461.
The Internet is Broken, and How to Fix It Jim Gettys Bell Labs July 27, 2012.
University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department INTRODUCTION TO COMPUTER NETWORKS Dr. Abdelhamid.
On the Performance of TCP Splicing for URL-aware Redirection Ariel Cohen, Sampath Rangarajan, and Hamilton Slye The 2 nd USENIX Symposium on Internet Technologies.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Module 10: How Middleboxes Impact Performance
Network Address Translation Current problems with IP addresses:  Address depletion  Scaling in routing Solutions:  IPv6  CIDR  NAT.
MultiPath TCP Proxy Presented by: Yongzhi Zhuang, Wei Zeng, Jianlei Zhang.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Module 1: Configuring Routing by Using Routing and Remote Access.
Performance Validation of Mobile IP Wireless Networks Presented by Syed Shahzad Ali Advisor Dr. Ravi Pendse.
Setup and Management for the CacheRaQ. Confidential, Page 2 Cache Installation Outline – Setup & Wizard – Cache Configurations –ICP.
SOCKS By BITSnBYTES (Bhargavi, Maya, Priya, Rajini and Shruti)
CMSC Presentation An End-to-End Approach to Host Mobility An End-to-End Approach to Host Mobility Alex C. Snoeren and Hari Balakrishnan Alex C. Snoeren.
Introduction to Networking
Final Examination of Internet Communication Protocol.
MPTCP Proxy MPTCP Client MPTCP Proxy Server.
1 CNLab/University of Ulsan Chapter 19 Firewalls  Packet Filtering Firewall  Application Gateway Firewall  Firewall Architecture.
H.323 NAT Traversal Problem particular to H.323(RAS->Q.931->H.245):  RAS from private network to public network can pass NAT  Q931 、 H.245 adopts the.
Lab A: Planning an Installation
Barracuda Link Balancer
Scaling Network Load Balancing Clusters
Planning and Troubleshooting Routing and Switching
Outline Basics of network security Definitions Sample attacks
Network Load Balancing Topology
Chris Meullion Preston Burden Dwight Philpotts John C. Jones-Walker
Introduction to Networks
Network Architecture Introductory material
Cisco Real Exam Dumps IT-Dumps
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Packet Sniffing.
INTRODUCTION TO COMPUTER NETWORKS
Review of Important Networking Concepts
PPPoE Internet Point to Point Protocol over Ethernet
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Networking Basics: A Review
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Outline Basics of network security Definitions Sample attacks
COMPUTER NETWORKING Presented by Pushpanjali Associate professor
Presentation transcript:

TPOT Translucent Proxying of TCP Pablo Rodriguez, Sandeep Sibal, Oliver Spatscheck AT&T Labs - Research

2 The Problem Intermediate proxy SYN DATA Router Destination Source proxy ACK

3 The Solution Intermediate proxy SYN Router Destination Source proxy ACK + tunneling info DATA

4 The Protocol Source Translucent Proxy (S,S_p) Intermediate Translucent Proxy (P,P_p) Destination (D,D_p) SYN: (S,S_p,D,D_p) (tcp_option: SET) ACK: (D,D_p,S,S_p) (tcp_option: P,P_p) DATA: (S,S_p,D,D_p) (IP-Tunneled via: P, P_p) SYN: (P,P_p,D,D_p) (tcp_option: SET) ACK: (D,D_p,P,P_p) DATA: (P,P_p,D,D_p)

5 TPOT: Benefits n Proxies can be placed and cascaded u Anywhere in the network u Without configuration u Without additional signalling n Graceful overload handling and fault tolerance u Fall back to plain IP routing u Late commitment: Proxy decides to proxy a connection during connection establishment not during signaling n Smaller RTTs and drop rates improve throughput n TPOT enables connection pooling

6 TPOT: Costs n Enabling TPOT requires either: u Changing TCP/IP stack of client, or u Using an explicit proxy on the client, or u Placing the access proxy at a focal point n Extra processing on TPOT machine u Scales using TPARTY - farm of TPOT machines close to router n Extra bandwidth for IP tunnel u Decreased by header compression for inner headers n TPOT-hierarchy fixed for the lifetime of a TCP connection u Might lead to sub-optimal routing of traffic (unlikely for current rate of route changes) n TPOT does not discover proxies not on the route to the original source

7 TPOT Example: Cable Access n Problem u Provide caching for a cable access network n Requirements u Low investment u Easy management u Multiple routes u Fault tolerant u Low overhead n Solution u TPOT enabled cable access modem which allows the use of caches in aggregation points

8 TPOT Example: Cable Access Origin Server Client PROXY Origin Server Client Cable Modem PROXY

9 TPOT Example: Cable Access - Benefits n Low Investment u Cable modem can be used to TPOT enable client n Easy Management u No client site configuration n Multiple Routes u Use of TPOT provides IP tunnel n Fault Tolerance u Failure of any cache in the network does not impact client n Low Overhead u No signaling overhead

10 Performance n Measurement of TCP throughput u different RTTs u 10MBits/sec Ethernet u with two TPOT machine or two Router n TPOT has been implemented on Scout n TPOT is currently being ported to Linux n Extensive performance testing and analysis is reported in AT&T TR

11 TPOT: Related Work n Transparent Proxies u have to be on a focal point n Active Networks u require a new networking infrastructure u are difficult to deploy incrementally n Transformer Tunnels u require additional signalling and/or configuration n Proxy Autodiscovery Protocols u requires additional signaling

12 Conclusion n TPOT provides scalable proxy cache discovery u without additional signaling u without configuration u with incremental deployment u with fault tolerance