Reducing Network Load through Intelligent Content Filtering

Slides:



Advertisements
Similar presentations
1 Bandwidth management essentials Issues for technical staff and technical solutions.
Advertisements

Utilizing Military Message Handling Systems as a Transport Mechanism for SOA in Military Tactical Networks Mr Frank T. Johnsen, Mr Anders Eggen, Ms Trude.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Oct 12, 2004CS573: Network Protocols and Standards1 Virtual LANs Network Protocols and Standards Autumn
Dynamic Adaptive Streaming over HTTP2.0. What’s in store ▪ All about – MPEG DASH, pipelining, persistent connections and caching ▪ Google SPDY - Past,
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Jan 10, 2008CS573: Network Protocols and Standards1 Virtual LANs Network Protocols and Standards Winter
Maintaining and Updating Windows Server 2008
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
By Justin Thompson. What is SOAP? Originally stood for Simple Object Access Protocol Created by vendors from Microsoft, Lotus, IBM, and others Protocol.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Guide to TCP/IP, Third Edition
Achieving Load Balance and Effective Caching in Clustered Web Servers Richard B. Bunt Derek L. Eager Gregory M. Oster Carey L. Williamson Department of.
Enhancement of IPTV using a Wireless Sensor Network Sandeep Kakumanu,Sriram Lakshmanan, and Raghupathy Sivakumar GNAN Research Group Georgia Institute.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
A Review by Raghu Rangan WPI CS525 September 19, 2012 An Early Warning System Based on Reputation for Energy Control Systems.
WEB BASED DATA TRANSFORMATION USING XML, JAVA Group members: Darius Balarashti & Matt Smith.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Module 5: Configuring Internet Explorer and Supporting Applications.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Universal, Ubiquitous, Unfettered Internet © ui.com Pte Ltd Mobile Internet Protocol under IPv6 Amlan Saha 3UI.COM Global IPv6 Summit,
November 2010Future TRILL Work1 Future TRILL Work 2 Donald Eastlake 3 rd 155 Beaver Street Milford, MA USA
PRJ505 Communications Management. Communication Management Processes: –Planning –Information Distribution –Performance Reporting –Stakeholder Management.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
WWW Programming Model. WWW Model The Internet WWW architecture provides a flexible and powerful programming model. Applications and content are presented.
Security Issues With Web Based Systems. Security Issues Web Based Systems  Security can not be considered an add-on or afterthought  Security must be.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
Difference between External and Internal Server Monitoring.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Virtual Local Area Networks In Security By Mark Reed.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Building a Data Warehouse
Background Data Transfer
Caitlin Grzybala Content Operations Analyst
Software Defined Networking for Wireless Networks
REPLICATION & LOAD BALANCING
Lesson # 9 HP UCMDB 8.0 Essentials
Barracuda Web Security Flex
Centralized Management for Barracuda Networks products
The University of Adelaide, School of Computer Science
software features Highlight
Address Resolution Protocol (ARP)
Packet Switching Datagram Approach Virtual Circuit Approach
Support for Flow bindings in MIPv6 and NEMO
Basic Policy Overview Palo Alto.
Radius, LDAP, Radius used in Authenticating Users
Hardware Addressing and Frame Type Identification
Web Caching? Web Caching:.
Instructor Materials Chapter 4: Introduction to Switched Networks
Physical Architecture Layer Design
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
Virtual LANs.
Lesson 25: Task Management
Chapter 5 Networks Communicating and Sharing Resources
The Top 10 Reasons Why Federated Can’t Succeed
Mobile edge computing Report by Weiqing huang.
Chapter 6 Networks Communicating and Sharing Resources
Mobile ad hoc networking: imperatives and challenges
Communication Networks NETW 501
IS4680 Security Auditing for Compliance
Address Resolution Protocol (ARP)
BioCyc Update Notifications Suzanne Paley Pathway Tools Workshop 2018
The Medium Access Control Sublayer
Using NFFI Web Services on the tactical level: An evaluation of compression techniques 13th ICCRTS: C2 for Complex Endeavors Frank T. Johnsen.
Spectrum Sharing in Cognitive Radio Networks
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Presentation transcript:

Reducing Network Load through Intelligent Content Filtering ICCRTS 2008 Paper 051 Trude Hafsøe FFI, Norway trude.hafsoe@ffi.no

Why content filtering? Bandwidth restrictions there is not enough resources to transmit all information that is available Content filtering should be done based on relevance transmit enough information to make the right decisions at the right time which data is relevant will vary for each application, data source and end user Information overflow receiving more information than one can process can lead to users overlooking critical information

Types of content filtering Filtering metrics Geographical filtering Frequency based filtering Priority based filtering Role based filtering Security label filtering Filtering types Entire messages, or Parts of messages.

Filtering challenges How to specify relevance? Profile/role based Format? Who determines what gets filtered? End-user? Predefined based on role? Filtering awareness Does a user need to know when data gets filtered? How much do we filter? Where do we filter?

Where to filter? Filtering in the end-system terminals Low complexity Stateless High bandwidth use Filtering in proxies/intermediate nodes High complexity Proxy may need to keep state Reduces bandwidth use in parts of the network Filtering in message producing system Medium complexity May need to keep state Best bandwidth utilization since no unnecessary information is injected into the network Filtering in the end-system terminals Low complexity Stateless High bandwidth use Filtering in proxies/intermediate nodes High complexity – must know all combinations of end-system terminal and message formats and the corresponding filter policy Proxy may need to keep state (for example position information for each receiving unit in the case of geographical filtering) Reduces bandwidth use across networks Filtering in message producing system Medium complexity – must know all end system-terminals and corresponding filter policy May need to keep state Best bandwidth utilization since no unnecessary information is injected into the network

Experiments Performed at NATO CWID 2007 Web service traffic SOA enabling of a tactical handheld system NFFI formatted data Content filtering performed by a proxy/intermediate node Two types of filtering performed Geographical Optional field filtering

Geographical filtering Fixed zone filter Tracks within the zone are always sent, while tracks outside the zone are never sent. Zone ring filter Track sending frequency is determined by the zone ring the track is in; tracks close to the unit is updated most frequent.

Fixed Zone Filter Tactial unit display

Zone Ring Filter Tactical unit display

Summary Content filtering is one of several measures that can be employed in order to increase the information infrastructures ability to adapt to changing network and battlefield conditions Experiments from NATO CWID 2007: Proof-of-concept Successful test of a combined geographical and frequency based filter Content filtering can: Reduce network load Help alleviate the information overflow issue Filtering can be complex Filters must be adapted to fit the type of information and the need of the users Nato CWID 2007: we successfully tested our implementation of a combined geographical and frequency based filter for track information.