1 Proxy-based Adaptation for Mobile Computing ECET 581 Spring 07 Authors: Markus Endler Hana Rubinsztejn Ricardo C. A. da Rocha Vagner Sacramento ISSN.

Slides:



Advertisements
Similar presentations
System Area Network Abhiram Shandilya 12/06/01. Overview Introduction to System Area Networks SAN Design and Examples SAN Applications.
Advertisements

Building Cloud-ready Video Transcoding System for Content Delivery Networks(CDNs) Zhenyun Zhuang and Chun Guo Speaker: 饒展榕.
Dr. Kalpakis CMSC 621, Advanced Operating Systems. Fall 2003 URL: Distributed System Architectures.
Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
OSI MODEL Maninder Kaur
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Protocols and the TCP/IP Suite
1 Web Proxies Dr. Rocky K. C. Chang 6 November 2005.
Reliable Transport Layers in Wireless Networks Mark Perillo Electrical and Computer Engineering.
World Wide Web Caching: Trends and Technology Greg Barish and Katia Obraczka USC Information Science Institute IEEE Communications Magazine, May 2000 Presented.
Introduction to client/server architecture
Web Cache. Introduction what is web cache?  Introducing proxy servers at certain points in the network that serve in caching Web documents for faster.
Client-Server Computing in Mobile Environments
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Lecturer: Tamanna Haque Nipa
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Midterm Review - Network Layers. Computer 1Computer 2 2.
SensIT PI Meeting, January 15-17, Self-Organizing Sensor Networks: Efficient Distributed Mechanisms Alvin S. Lim Computer Science and Software Engineering.
Presentation on Osi & TCP/IP MODEL
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
CORE KAIST EECS Computer Engineering Research Lab A General Purpose Proxy Filtering Mechanism Applied to the Mobile Environment Bruce Zenel Jupyung Lee.
SEED Infotech Pvt. Ltd. 1 Networking in Java. SEED Infotech Pvt. Ltd. 2 Objectives of This Session Describe issues related to any type of network using.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
1 Computer Networks DA Chapter 1-3 Introduction.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Chapter 1 Lecture 2 By :Jigar M Pandya WCMP 1. Architecture of Mobile Computing The three tier architecture contains the user interface or the presentation.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
1 Version 3.0 Module 11 TCP Application and Transport.
Wireless Access and Terminal Mobility in CORBA Dimple Kaul, Arundhati Kogekar, Stoyan Paunov.
A Transport Framework for Distributed Brokering Systems Shrideep Pallickara, Geoffrey Fox, John Yin, Gurhan Gunduz, Hongbin Liu, Ahmet Uyar, Mustafa Varank.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Salim Hariri HPDC Laboratory Enhanced General Switch Management Protocol Salim Hariri Department of Electrical and Computer.
UNDERSTANDING THE HOST-TO-HOST COMMUNICATIONS MODEL - OSI LAYER & TCP/IP MODEL 1.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Reconsidering Internet Mobility Alex C. Snoeren, Hari Balakrishnan, M. Frans Kaashoek MIT Laboratory for Computer Science.
The Intranet.
Rehab AlFallaj.  OSI Model : Open system Interconnection.  is a conceptual model that characterizes and standardizes the internal functions of a communication.
Improving TCP Performance over Wireless Networks
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
WAP Architecture Presented by, Nithya Inbamani. WAP Background Wireless Application Protocol – secure specification. Wireless Application Protocol – secure.
MPEG-4: Multimedia Coding Standard Supporting Mobile Multimedia System Lian Mo, Alan Jiang, Junhua Ding April, 2001.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
Secure middleware patterns E.B.Fernandez. Middleware security Architectures have been studied and several patterns exist Security aspects have not been.
/ Fast Web Content Delivery An Introduction to Related Techniques by Paper Survey B Li, Chien-chang R Sung, Chih-kuei.
Kevin Harrison LTEC 4550 Assignment 3.  Ethernet Hub  An unsophisticated device that is used for connecting multiple Ethernet devices together.  Typically.
USHA: A Practical Vertical Handoff Solution Ling-Jyh Chen, Tony Sun, Mario Gerla Computer Science Department, UCLA.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Mr. Sathish Kumar. M Department of Electronics and Communication Engineering I’ve learned that people will forget what you said, people will forget what.
Lecture # 02 Network Models Course Instructor: Engr. Sana Ziafat.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Computer Networking A Top-Down Approach Featuring the Internet Introduction Jaypee Institute of Information Technology.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
The Intranet.
Internet and Intranet.
PROTEAN: A Scalable Architecture for Active Networks
CT1303 LAN Rehab AlFallaj.
#01 Client/Server Computing
Computer Network.
Internet and Intranet.
Protocols and the TCP/IP Suite
Computer Network.
Internet and Intranet.
Protocols and the TCP/IP Suite
Computer Networking A Top-Down Approach Featuring the Internet
Internet and Intranet.
#01 Client/Server Computing
Presentation transcript:

1 Proxy-based Adaptation for Mobile Computing ECET 581 Spring 07 Authors: Markus Endler Hana Rubinsztejn Ricardo C. A. da Rocha Vagner Sacramento ISSN By: Douglas A. Schultz 1/29/07 For: Professor Lin

2 Introduction Proxies have 3 main problem solving uses: –Throughput and latency issues. (wired to wireless) –Host mobility. –Limited resources of MH (mobile hosts). This report reviews: –General proxy based approaches. –Implementation techniques. –Successful well know examples.

3 Introduction Proxy is an intermediary placed in the path between a server and it’s clients. Proxies act as: – Protocol translators. –Caches and content adapters. –Usually reside at the border between wired and wireless networks. –A Wireless Access Point (AP) is a common example.

4 Introduction Proxies perform complex tasks: for mobile networks: –Handover, Session or consistency measurement –Personalization, authentication, check pointing –Service/resource discovery.

5 Introduction Advantages of proxies: –Proxy handles the wireless-dependent translation and trans-coding, for the server. –Processing for protocol and content is distributed to other nodes, saving serving processing. –Proxy placement at the wireless interface gives faster response to wireless conditions, link quality, and disconnection detection. –Transformations for any communications layer can be implemented.

6 Introduction Proxy based middleware solves problems in: –Web access, multimedia streaming, and database access. Proxy terminology: –Gateway, intermediary, or agent. –“an entity that intercepts communication or performs some service on behalf of some mobile client.”

7 Classifying Proxy-Based Approaches Different characteristics of the bridge between wired and wireless networks as in: –Throughput, latency, reliability and probability of disconnection. Mobile Host characteristics like: –Display size, user input/output mechanism, processing power, memory size, and Power limitations. Application type requirements: –Response time, network latency, disconnection transparency, and cache coherence.

8 Classifying Proxy-Based Approaches Two main classifications of proxies: –General architecture characteristics. –Tasks or functionalities assigned. Architecture-based Classification –Level, Placement, Single-/Multi-protocol, and Communication and Extensibility.

9 Architecture-based Classification Level –Communication-level Handles issues of communications protocols and abstractions. Goal is to provide device mobility and make wireless link transparent to the higher software layers. Typical adaptations include: –Wired to wireless protocol translation, buffering, and handover management.

10 Architecture-based Classification Middleware-level: –Non-application or Non-protocol specific tasks. –As in content adaptation, management of cached data, service or resource discovery, security, and authentication. Application-level: –Application specific tasks. –As in caching for Web based applications (fast response time) vs. database where consistency is more important.

11 Architecture-based Classification Placement: –Server-side : Only at stationary network node. –Client-side: Only at mobile node. –Interceptor model: Proxy pair, one mobile client one stationary server. –Migratory proxy or agent: Moves between mobile and stationary nodes.

12 Architecture-based Classification Placement continued. –Server-side proxies work with any device. –Client-side proxies require more resources usually thick-clients. Architecture: –Centralized: All functionality is bundled into the Proxy. –De-centralized: Several proxies perform separate functions.

13 Architecture-based Classification Single and multi-protocol: –Single protocol commonly used for TCP or HTTP. –Multi-protocol like UDP, SMTP, SMS, and WSP and dynamically switches between protocols. Communication: –Synchronous mode: Proxy does an adaptation task in response to an explicit client request. –Asynchronous mode: The proxy does long-term work based on user preferences, then sends asynchronous notifications to the client. This is common for the role of user agents in searching, collecting and aggregating information for the user. WAP is one example that supports both.

14 Architecture-based Classification Communication continued: –Communication among proxies is also supported. –For session management, check pointing, and multicasting. –Direct mode: Proxy knows which other proxy to interact with. –Indirect mode: Server or another proxy acts as a router for message exchange.

15 Architecture-based Classification Extensibility/Programmability: –Extensibility, the possibility to adapt and customize its functions, is an important architecture characteristic. –A generic framework is provided to tailor to the application. –Another group of proxy infra-structures further support the dynamic loading of filters or new modules.

16 Common Proxy Tasks Protocol Translation and Optimization: –Proxies deal with communication specific issues like: Flow control, error detection, recovery, and medium multiplexing. –Connection oriented protocols like TCP need proxies for handling disconnections, burst packet losses or varying round trip delay times.

17 Common Proxy Tasks Content Adaptation: –Aims at transforming the payload for optimized transmission and presentation at the mobile device Distillation and Refinement: –General term for several forms of data compression. Summarization: –Lossy compression where specific parts of the original data are selected for presentation, aiming at the least possible loss of information. Intelligent Filtering: –Mechanism to transform, drop or delay data delivery by applying filters on a data path, according to network or target device conditions.

18 Common Proxy Tasks Trans-coding: –General process of transforming the format and representation of content. Caching and Consistency Management: Main goals of caching: –Are to reduce traffic to and from the source server. –Restrict the user-perceived latency, conserve wireless bandwidth and the mobile device’s battery power. –Handle client disconnections.

19 Common Proxy Tasks Session Management: –Maintaining an application’s or service’s session state in spite of disconnections and mobility of the user. Handover Management: –Occurs when a user previously connected to some network reconnects to the same or to a new network.

20 Common Proxy Tasks Discovery and Auto-configuration: –Accessing a service through a proxy, eliminates the choice from the client. –Jini, a distributed system, uses proxy-based approaches for service discovery. – Dynamic service reconfiguration, like WebPADS. Security and Privacy: –Public-key security model. –One protocol for secure device-to-proxy communication. –Another protocol for secure proxy-to-proxy communication.

21 Common Proxy Tasks Check-pointing and Recovery: –Recovery is typically based on check-pointing. Check-pointing is snapshots of distributed data. Other tasks: –Personalization –Content Creation –Name Resolution

22 Proxy Frameworks Adapter Development: –Module responsible for implementing a trans-coding function of a message or its content. Adapter Selection: –Programmable interfaces or via rule-based configuration. Context Monitoring: –The collection of the network state. Adapter Loading and Execution: –Configurable or dynamic proxies.

23 Conclusion Challenges and Future: –Scalability of server-side proxies as the number of clients increase. Combine the end-to-end and proxy approaches. –Open Pluggable Edge Services: Develop infra-structures that collectively perform adaptations for a huge variety of devices and protocols. –Dynamic proxy configuration: The proxy’s functionality is shaped according to dynamic demand by the clients, server load, or the current mobile network conditions.