Multipath Routing: Proxy Selection By Joseph A LaConte CS 591 – Semester Project December 07, 2005.

Slides:



Advertisements
Similar presentations
Intra-Carrier Solutions Enabled by the OIF NNI Erning Ye Nortel Networks.
Advertisements

Networks Unit 3 & 4 IP&M JEOPARDY Acknowledgements: VITTA for the jeopardy pro-forma Mark Kelly’s Network slideshow.
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
Networking TCP-DCR: Making TCP Robust to Non-Congestion Events Sumitha Bhandarkar A. L. Narasimha Reddy
1 End to End Bandwidth Estimation in TCP to improve Wireless Link Utilization S. Mascolo, A.Grieco, G.Pau, M.Gerla, C.Casetti Presented by Abhijit Pandey.
(4.4) Internet Protocols Layered approach to Internet Software 1.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Adaptive Video Streaming in Vertical Handoff: A Case Study Ling-Jyh Chen, Guang Yang, Tony Sun, M. Y. Sanadidi, Mario Gerla Computer Science Department,
The Internet and Security Steven Shedd. The Internet How it began How it began.
Controlling access with packet filters and firewalls.
On Proxy Server based Multipath Connections (PSMC) PhD Proposal Yu Cai 10/2003 University of Colorado at Colorado Springs.
PSMC Proxy Server-based Multipath Connection CS 526 Advanced Networking - Richard White.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
TCP Westwood (with Faster Recovery) Claudio Casetti Mario Gerla Scott Seongwook Lee Saverio.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Multipath Routing CS 522 F2003 Beaux Sharifi. Agenda Description of Multipath Routing Necessity of Multipath Routing 3 Major Components Necessary for.
Basic Dynamic Scheduling for Multiple Path Routing Joseph A LaConte CS 526 May 5, 2005.
COS 420 Day 16. Agenda Assignment 3 Corrected Poor results 1 C and 2 Ds Spring Break?? Assignment 4 Posted Chap Due April 6 Individual Project Presentations.
Autonomous Anti-DDoS Network V2.0 (A2D2-2) Sarah Jelinek University Of Colorado, Colo. Spgs. Spring Semester 2003, CS691 Project.
INTRODUCTION TO COMPUTER NETWORKS Navpreet Singh Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA (Ph : ,
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
End-to-end QoE Optimization Through Overlay Network Deployment Bart De Vleeschauwer, Filip De Turck, Bart Dhoedt and Piet Demeester Ghent University -
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
CS 381 Final Exam Study Guide Final Exam Date: Tuesday, May 12 th Time: 10:30am -12:30pm Room: SB 105 Exam aid: 8 ½ x 11 page of notes front and back.
World Wide Web Hypertext model Use of hypertext in World Wide Web (WWW) WWW client-server model Use of TCP/IP protocols in WWW.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
ATCP:TCP Performance Over Mobile Ad Hoc Networks Researched by Suresh Singh of PSU and Jian Liu of Sun Microsystems Presentation by Mir Hashimi CS 401B.
Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Politecnico di Torino Dipartimento di Automatica ed Informatica TORSEC Group Performance of Xen’s Secured Virtual Networks Emanuele Cesena Paolo Carlo.
The Aerospace Clinic 2002 Team Members Nick Hertl (Project Manager) Will Berriel Richard Fujiyama Chip Bradford Faculty Advisor Professor Michael Erlinger.
William Stallings Data and Computer Communications 7 th Edition Chapter 1 Data Communications and Networks Overview.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Chapter 11 Network Management and Security Cisco Learning Institute Network+ Fundamentals and Certification Copyright ©2005 by Pearson Education, Inc.
University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department INTRODUCTION TO COMPUTER NETWORKS Dr. Abdelhamid.
By: Aleksandr Movsesyan Advisor: Hugh Smith. OSI Model.
Network Technologies essentials Week 5: Routing Compilation made by Tim Moors, UNSW Australia Original slides by David Wetherall, University of Washington.
On the Performance of TCP Splicing for URL-aware Redirection Ariel Cohen, Sampath Rangarajan, and Hamilton Slye The 2 nd USENIX Symposium on Internet Technologies.
Maximum Lifetime Routing in Wireless Sensor Networks by Collins Adetu Nicole Powell Course: EEL 5784 Instructor: Dr. Ming Yu.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
MultiPath TCP Proxy Presented by: Yongzhi Zhuang, Wei Zeng, Jianlei Zhang.
Every computer along the path of your data can see what you send and receive. USERNAMES and PASSWORDS  Username can be assigned to you eg. Student ID.
Module 11: Designing Security for Network Perimeters.
Data Communications and Networking Overview
Network and the internet Part eight Introduction to computer, 2nd semester, 2009/2010 Mr.Nael Aburas Faculty of Information.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Kevin Harrison LTEC 4550 Assignment 3.  Ethernet Hub  An unsophisticated device that is used for connecting multiple Ethernet devices together.  Typically.
Networking (Cont’d). Congestion Control l Is achieved by informing nodes along a route that congestion has occurred and asking them to reduce their packet.
Presented by Deepak Varghese Reg No: Introduction Application S/W for server load balancing Many client requests make server congestion Distribute.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
William Stallings Data and Computer Communications 7th Edition
COS 561: Advanced Computer Networks
Multipath Routing Using Distributed Proxy Servers
INTRODUCTION TO COMPUTER NETWORKS
William Stallings Data and Computer Communications 7th Edition
Firewalls Purpose of a Firewall Characteristic of a firewall
Multiple Path Connection through a Set of Connection Relay Servers
William Stallings Data and Computer Communications 7th Edition
Online Learning.
Congestion Control (from Chapter 05)
Advanced Computer Networks
Presentation transcript:

Multipath Routing: Proxy Selection By Joseph A LaConte CS 591 – Semester Project December 07, 2005

Presentation Goals  Define the problem  Provide brief background information  Explain an overview of the solution  Discuss issues associated with solution

Assumptions  Multiple path routing is available.  Future Internet has a set of proxy servers available to users.

Requirements  Users share the same set of proxy servers.  Proxy selection is determined based on QoS and Security.  Set of proxy servers can change during communication. QoS – Quality of Service

Proxy Based Multipath Routing Each packet is transmitted over one of many paths using IP–IP encapsulation then forwarded by the proxy server.

Why Proxy Selection? A bad choice can route your packet far out of the way or to an overloaded proxy server.

Basic Proposed Schema  Edge servers (middle-man) Contain hierarchical topology Manage proxy information Advise clients / Collect network data  DNS modification Add edge server assignment (topology)

Edge Server Topology  Break Internet into subdivisions based on regions and sub-regions.  Each subdivision has n proxy servers which report to an edge server.  Each level in the hierarchy has a root node (eg. Colorado Springs -> Colorado -> US West -> US) [break down similar to DNS: cs -> uccs -> edu]

How does hierarchical topology help?  Provides a mechanism to restrict the assignment of proxy servers. Generalized Example Proxy selection between L.A. to Washington D.C. is based on information from the highest level that contains both then filtering from sub- region(s) between.

Determining Quality of Service Data collection  Proxy server Average wait time for packets Statistics on time between packets based on regions  Edge server Response time to external proxy  Client Applications/Implementation specific

Security Issues  Proxy servers How do you know if compromised? IDS on proxy can be used to notify edge server. What happens if compromised? Edge server can remove from availability list. What happens if all proxy servers go down? Normal communication persists (i.e. direct routing).

Security Benefits  Man in the middle.  Avoid areas of high congestion or denial of service in the internet (loss of service)  Can use firewall on Proxy to filter problems such as Slammer virus.

Future Work  Implementation  Multiple proxy hops  Benefit of n paths over x distance  Wireless

References Cai, Yu On the Proxy Server based Multipath Connection. PhD Dissertation Defense, University of Colorado at Colorado Springs. Casetti, C., Gerla, M., Lee S. S., Mascolo, S., Sanadidi, M TCP with Faster Recovery. Eyler, Pat Networking Linux: A Practical Guide to TCP/IP. New Riders, Indianapolis, Indiana. Gerla, M., Lee, S. S., Pau, G TCP Westwood Performance Over Multiple Paths. Sacerdoti, Federico D Tcphealth: TCP Connection Monitoring in Linux. Sarolahti, Pasi Linux TCP. Seminar on Linux Kernel. Tanenbaum, Andrew S Computer Networks, 4th ed. Prentice Hall PTR, Upper Saddle River, NJ. Watson, Frank E Enhanced TCP Performance with Multiple Path Routing. Master’s thesis, University of Colorado at Colorado Springs.