Implementation and Evaluation of a Performance Enhancing Proxy for Wireless TCP Scenarios and Architecture.

Slides:



Advertisements
Similar presentations
Multi-Access Services in Heterogeneous Wireless Networks Kameswari Chebrolu, Ramesh R. Rao Abstract Today's wireless world is characterized by heterogeneity.
Advertisements

CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
LMF/TTR Raimo Vuopionperä 6WINIT: Ericsson (Research) Objectives (6WINIT Kick-Off, London) Raimo Vuopionperä (Ph. D.), NomadicLab (LMF/TTR)
Dynamic Tunnel Management Protocol for IPv4 Traversal of IPv6 Mobile Network Jaehoon Jeong Protocol Engineering Center, ETRI
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 25 Introduction to Computer Networks.
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WLAN vs. 2G/3G Performance, roaming, mobility, security...
Rev A8/8/021 ABC Networks
TNC 2003 Wireless Campus project Coletta Elisa Marchioro -
Network Layer introduction 4.2 virtual circuit and datagram networks 4.3 what’s inside a router 4.4 IP: Internet Protocol  datagram format  IPv4.
The Network Layer Chapter 5. The IP Protocol The IPv4 (Internet Protocol) header.
Rev BMarch 2004 The ABC Service as a Research Infrastructure Rajesh Mishra Per Johansson Cahit Akin Salih Ergut.
Chapter 5 The Network Layer.
1 Web Proxies Dr. Rocky K. C. Chang 6 November 2005.
Lecture Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Data Communications I & II Project Sequence Tom Costello.
Subnetting.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Mobile IP Shivkumar Kalyanaraman Rensselaer Polytechnic Institute
Bob Baker Communications Bob Baker September 1999.
Slide 1 of 23 Implementation and Evaluation of a Performance Enhancing Proxy for Wireless TCP Master Thesis Project (Sep 03 – April 04) Dennis Dungs Technical.
GPRS Muhammad Al-khaldi Sultan Al-Khaldi
Lecture 1 Overview: roadmap 1.1 What is computer network? the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network.
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
Networking DSC340 Mike Pangburn. Networking: Computers on the Internet  1969 – 4  1971 – 15  1984 – 1000  1987 – 10,000  1989 – 100,000  1992 –
1 CMPT 471 Networking II DHCP © Janice Regan,
DHCP for Multi-hop Wireless Ad-Hoc Networks Presented by William List.
Support Protocols and Technologies. Topics Filling in the gaps we need to make for IP forwarding work in practice – Getting IP addresses (DHCP) – Mapping.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
Performance Validation of Mobile IP Wireless Networks Syed Shahzad Ali Muhammad Saqib Ilyas Advisor: Dr. Ravi Pendse.
Managing Network connections. Network Cabling Ethernet Topology Bus topology – Connects each node in a line – Has no central connection point Star topology.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 4 Network Layer.
Midterm Review - Network Layers. Computer 1Computer 2 2.
Network Components: Assignment Three
Cisco PIX firewall Set up 3 security zones ***CS580*** John Trafecanty Jules R. Nya Baweu August 23, 2005.
CS 381 Final Exam Study Guide Final Exam Date: Tuesday, May 12 th Time: 10:30am -12:30pm Room: SB 105 Exam aid: 8 ½ x 11 page of notes front and back.
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
1 Chapter 4: Network Layer r 4.4 IP: Internet Protocol m Datagram format m IPv4 addressing m ICMP m IPv6 r 4.5 Routing algorithms m Hierarchical routing.
Internet Ethernet Token Ring Video High Speed Router Host A: Client browser: REQUEST:http//mango.ee.nogradesu.edu/c461.
Passive DAD Henning Schulzrinne Columbia University.
5: Link Layer Part Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer.
Chapter 6 Data Communications. Network Collection of computers Communicate with one another over transmission line Major types of network topologies What.
Module 10: How Middleboxes Impact Performance
輔大資工所 在職研一 報告人:林煥銘 學號: Public Access Mobility LAN: Extending The Wireless Internet into The LAN Environment Jun Li, Stephen B. Weinstein, Junbiao.
Lectu re 1 Recap: “Operational” view of Internet r Internet: “network of networks” m Requires sending, receiving of messages r protocols control sending,
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
1 ECE453 - Introduction to Computer Networks Lecture 1: Introduction.
EE3402- Data Communication Networks Lecture 1 Muhammad Qaisar Shafi.
Performance Validation of Mobile IP Wireless Networks Presented by Syed Shahzad Ali Advisor Dr. Ravi Pendse.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Chapter 3.  Upon completion of this chapter, you should be able to:  Select and install network cards to meet network connection requirements  Connect.
Networking Components Siby Abraham LTEC Purpose of the presentation  This presentation will cover how certain network components function, when.
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
: MobileIP. : r Goal: Allow machines to roam around and maintain IP connectivity r Problem: IP addresses => location m This is important for efficient.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Introduction to “Tap – Dance ”. Company Proprietary Presentation Topics  Introduction  Handover scenarios  Inter-Network Handover consequences  Common.
Chapter Objectives In this chapter, you will learn:
Chapter 4: Network Layer
Section 4 – Computer Networks
Client1 Client2 Client3 Client4 My network setup Server Pix Des
Planning and Troubleshooting Routing and Switching
Course Review 2015 Computer networks 赵振刚
Wireless Modes.
2002 IPv6 技術巡迴研討會 IPv6 Mobility
I. Basic Network Concepts
Firewalls Purpose of a Firewall Characteristic of a firewall
Computer Network Overview
Binit Mohanty Ketan Rajawat
DHCP: Dynamic Host Configuration Protocol
Presentation transcript:

Implementation and Evaluation of a Performance Enhancing Proxy for Wireless TCP Scenarios and Architecture

Scenarios of interest Definition Scenario: Every time, hardware changes (including configurations) have to be done, a new scenario is created.

Meta-Modell for Scenarios ??????

Classification Classify Scenarios in different Classes: Wired Wireless –Local (fixed IP) –Mobile Handover Access Points Handover Access Techniques

Standard Wired Scenarios Possible Scenarios: Server & Client in same net (LAN), client-server- path known and traffic „stable/static“ Wired World = Internet, Client & Server in different subnets, path unknown, traffic variable, more congestion Client Server (e.g. HTTP, FTP) ”Wired World”

Fixed wireless Scenario Possible Scenarios: Server in same/different subnet as Client High BER Signal loss, reconnect Wired World WLAN AP Server (e.g. HTTP, FTP)

Mobile Wireless Scenario (Access Points) Possible Scenarios: AP‘s same/different subnet Server & Client same/different subnet Wired World WLAN AP Server (e.g. HTTP, FTP) WLAN AP Handover

Mobile Wireless Scenarios (Access Techniques) Possible Scenarios: WLAN -> GPRS -> WLAN WLAN -> UMTS -> WLAN WLAN -> Bluetooth -> WLAN..... Wired World WLAN AP Server (e.g. HTTP, FTP) GPRS AP Handover

Current Network Architecture

IP LAB: Current Architecture E A B C D Internet GPRS Network Server (e.g. Video application) WLAN (802.11) Wired access (Ethernet) Cellular access (GPRS) Router Switch WLAN AP Router

Meta-modell for Network Architectures

Meta-Network-Modell TCP Proxy Server (e.g. HTTP, FTP) ”Wireless World” ”Wired World”

Possible Network Architectures

Classification of Architectures Intercepting –In-Path –Router-Config –Gartious ARP Forced (Terminologie??) –IP-Tunneling –IP-Header-Modification

Full Intercepting Proxy Network Design Internet GPRS Network Server (e.g. HTTP, FTP) Cellular access (GPRS) A Router Switch WLAN AP 1 WLAN AP 3 B Router D E C TCP Proxy Intranet StudNet Terminal WLAN AP 2 Client Switch WLAN AP 4 TCP Proxy Wireless World Wired World

Possible Scenarios in Full Intercepting Server -> Switch -> Client Server -> Switch -> TCP Proxy -> WLAN AP 3-> Client Server -> Switch -> Routers -> Switch -> TCP Proxy -> WLAN AP 1 -> Client Server -> Switch -> Routers -> TCP Proxy -> Internet -> Intranet -> Terminal Handover WLAN AP 1 -> WLAN AP 2 Handover WLAN AP 2 -> WLAN AP 3 Handover WLAN AP 3 -> WLAN AP 4 Handover WLAN AP -> GPRS

Problems of Full Intercepted Proxy Scenario Hardware efforts (4 Proxies) -> reduction to max. 2 proxy PC‘s for handover possible => reconfig for every Scenario needed Internal Server access by Port-Forwarding How to realize GPRS handover (Server IP change from internal to external IP needed, use Mobile IP??)

Improved Intercepting Proxy Network Design Internet Server (e.g. HTTP, FTP) GPRS Network Cellular access (GPRS) A Router Switch WLAN AP 1 WLAN AP 3 B Router D E C TCP Proxy Intranet StudNet Terminal WLAN AP 2 Client Switch WLAN AP 4 Switch Wireless World Wired World IMPOSSIBLE

Forced Proxy Scenarios Internet GPRS Network Server (e.g. HTTP, FTP) A Router Switch WLAN AP 1 WLAN AP 3 B Router D E C Intranet StudNet Terminal WLAN AP 2 Client Switch WLAN AP 4 TCP Proxy Wireless World Wired World

Problems of Forced Proxy Solution How to implement forced Proxy? Possible Solutions: –„TCP packet in TCP packet“-solution (IP- Tunneling) –Modifying TCP packet: Target IP in Optional field, Proxy IP in Dest. Field How to access internal Proxy from outside world (New TCP Proxy protocol on new port + port forwarding)? More network traffic, evtl. More hops GPRS problem not resolved (MobileIP)

Router Config Proxy Scenarios Internet GPRS Network Server (e.g. HTTP, FTP) Cellular access (GPRS) A Router Switch WLAN AP 1 WLAN AP 3 B Router D E C Intranet StudNet Terminal WLAN AP 2 Client Switch WLAN AP 4 TCP Proxy Wired World Mixed World Wireless World Mixed World

Automated Forced Proxy Network Design Idea: –Categorize every port on router in „wireless, wired, (evtl. Mixed?)“ –Force router to send packets from wireless to wired over TCP Proxy ( send from Mixed or to Mixed always over TCP proxy) Problems: –Is this possible? –How to force WLAN AP 3 & 4 to use Proxy?

Functional Architecture „Implementation Plan“

Functional Implementation Router Config ARP to catch all packets Internet GPRS Network Server (e.g. HTTP, FTP) Cellular access (GPRS) WLAN AP 3 D Router E Intranet StudNet Terminal Client Switch WLAN AP 4 TCP Proxy