CORE KAIST EECS Computer Engineering Research Lab A General Purpose Proxy Filtering Mechanism Applied to the Mobile Environment Bruce Zenel Jupyung Lee.

Slides:



Advertisements
Similar presentations
Chapter 17 Networking Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
Advertisements

IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
TCP and FTP Internet Engineering. 1 Protocol of transport layer Reliability ( guarantee packet arrives to destination ) –Retransmission control Use for.
Tam Vu Remote Procedure Call CISC 879 – Spring 03 Tam Vu March 06, 03.
Chapter 2: Application Layer
1 A general purpose proxy filtering mechanism applied to the mobile environment Author : Bruce Zenel From : Wireless Networks.
TCP Splicing for URL-aware Redirection
A Distributed Proxy Server for Wireless Mobile Web Service Kisup Kim, Hyukjoon Lee, and Kwangsue Chung Information Network 2001, 15 th Conference.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Lecture 1 Overview: roadmap 1.1 What is computer network? the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Application Layer  We will learn about protocols by examining popular application-level protocols  HTTP  FTP  SMTP / POP3 / IMAP  Focus on client-server.
Copyright 2003 CCNA 1 Chapter 7 TCP/IP Protocol Suite and IP Addressing By Your Name.
Chapter Overview TCP/IP Protocols IP Addressing.
Process-to-Process Delivery:
Module 1: Reviewing the Suite of TCP/IP Protocols.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
1 Proxy-based Adaptation for Mobile Computing ECET 581 Spring 07 Authors: Markus Endler Hana Rubinsztejn Ricardo C. A. da Rocha Vagner Sacramento ISSN.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Chapter 17 Networking Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings.
An Agile Vertical Handoff Scheme for Heterogeneous Networks Hsung-Pin Chang Department of Computer Science National Chung Hsing University Taichung, Taiwan,
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
Review: – computer networks – topology: pair-wise connection, point-to-point networks and broadcast networks – switching techniques packet switching and.
Chapter 6: Packet Filtering
Cisco 1 - Networking Basics Perrine. J Page 19/17/2015 Chapter 9 What transport layer protocol does TFTP use? 1.TCP 2.IP 3.UDP 4.CFTP.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
SEED Infotech Pvt. Ltd. 1 Networking in Java. SEED Infotech Pvt. Ltd. 2 Objectives of This Session Describe issues related to any type of network using.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
IP and Errors IP Best Effort Datagrams can be: –Lost –Delayed –Duplicated –Delivered out of order –Corrupted.
© 2002, Cisco Systems, Inc. All rights reserved..
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
Obile etworking M-TCP : TCP for Mobile Cellular Networks Kevin Brown and Suresh Singh Department of Computer Science Univ. of South Carolina.
Fundamentals of Computer Networks ECE 478/578 Lecture #19: Transport Layer Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
TCP/IP Transport and Application (Topic 6)
EEC4113 Data Communication & Multimedia System Chapter 1: Introduction by Muhazam Mustapha, September 2011.
UDP and CBR Internet Engineering. 1 Contents Delivery Encode –Music or movie is converted to data (compress) CBR (Constant Bit Rate) –Constant bit assignment.
1 Networking Chapter Distributed Capabilities Communications architectures –Software that supports a group of networked computers Network operating.
On the Performance of TCP Splicing for URL-aware Redirection Ariel Cohen, Sampath Rangarajan, and Hamilton Slye The 2 nd USENIX Symposium on Internet Technologies.
 network appliances to filter network traffic  filter on header (largely based on layers 3-5) Internet Intranet.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 8 Omar Meqdadi Department of Computer Science and Software Engineering University of.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
COM211 Communications and Networks CDA College Theodoros Christophides
ECEN “Internet Protocols and Modeling”, Spring 2012 Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Class.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Latency Reduction Techniques for Remote Memory Access in ANEMONE Mark Lewandowski Department of Computer Science Florida State University.
Prentice HallHigh Performance TCP/IP Networking, Hassan-Jain Chapter 6 TCP/IP Performance over Wireless Networks.
Unit - III. Providing a Caching Proxy Server (1) A caching proxy server is software that stores (caches) frequently requested internet objects such as.
Measuring the Capacity of a Web Server USENIX Sympo. on Internet Tech. and Sys. ‘ Koo-Min Ahn.
GLOBAL EDGE SOFTWERE LTD1 R EMOTE F ILE S HARING - Ardhanareesh Aradhyamath.
Internet protocol Suite
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Networking (Cont’d). Congestion Control l Is achieved by informing nodes along a route that congestion has occurred and asking them to reduce their packet.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Ch 2. Application Layer Myungchul Kim
USHA: A Practical Vertical Handoff Solution Ling-Jyh Chen, Tony Sun, Mario Gerla Computer Science Department, UCLA.
Application layer tcp/ip
Reddy Mainampati Udit Parikh Alex Kardomateas
Understand the OSI Model Part 2
Week 5: Network Protocols Part 1
Process-to-Process Delivery:
Firewalls.
EEC4113 Data Communication & Multimedia System Chapter 1: Introduction by Muhazam Mustapha, July 2010.
IS 4506 Configuring the FTP Service
Presentation transcript:

CORE KAIST EECS Computer Engineering Research Lab A General Purpose Proxy Filtering Mechanism Applied to the Mobile Environment Bruce Zenel Jupyung Lee CoreLab, KAIST March

CORE KAIST EECS Computer Engineering Research Lab Contents Introduction Architecture –PMICP –Proxy Server –Adaptation through Filter Control Designed and Implemented Filters Evaluation –HTTP filter –NFS filter –TCP filter Conclusion & Future Work

CORE KAIST EECS Computer Engineering Research Lab Introduction Mobile environment –Slower, more costly, less reliable, less secure than WAN, LAN… –Heterogeneity problem : hosts move unpredictably in networks which have different speed, cost, security, loss rate Proxy improves the mobile environment –Drop / Compress / Delay / Cache data MPEG / HTTP, NFS / POP / TCP –Act as substitute for mobile client ICMP ECHO request –Use a different transport protocol(or parameter settings) –Generally… : perform trading off computation for communication * Minimize server/client modification

CORE KAIST EECS Computer Engineering Research Lab Introduction (cont’) Filter : program downloading & executing on proxy –Often application specific –Dynamically control filter behavior Contribution of this paper –Propose ‘general purpose proxy filtering mechanism’ applied to the mobile environment –Apply it to the HTTP, NFS, TCP

CORE KAIST EECS Computer Engineering Research Lab Architecture: PMICP Problem: –All traffic from/to MH must past through a single gateway –But mobile protocol* supports host mobility Keep track of the location of the MH Using Mobile Support Routers(MSR) Solution –New Protocol : PMICP** Each MH choose Proxy MSR(PMSR) PMICP guarantees that all traffic from/to MH will pass through PMSR * Proxy filter runs on PMSR * Columbia Mobile IP Protocol ** Proxy Mobile Internetworking Control Protocol

CORE KAIST EECS Computer Engineering Research Lab (Proxy MSR)

CORE KAIST EECS Computer Engineering Research Lab Architecture: Proxy Server High Level Proxy –Use filter insertion Low Level Proxy –LLP packet queue is created configured. –It contains matching criterion –If criterion is matched, filter is allows to read/write LLP packet queue * Analogous to socket program

CORE KAIST EECS Computer Engineering Research Lab (Filter Insertion) * Kernel on Proxy & MH may be modified * Server notices no change

CORE KAIST EECS Computer Engineering Research Lab Architecture: Adaptation through Filter Control Event Registry(ER) –Register in certain events Change in network bandwidth Network interface information Change in MH battery power MH location –Notified when these events occur

CORE KAIST EECS Computer Engineering Research Lab Designed and Implemented Filters HTTP: compress header/body of HTTP messages MPEG: drop intermediate MPEG frames SMTP: drop all multimedia data NFS: compress file data ICMP: provide replies to queries TCP –Cache unacknowledged TCP to MH –Perform local re-TX when packet loss is detected arrival of a duplicate ack, local timeout –Not break the end-to-end semantics of TCP –Originally from “Improving TCP/IP Performance over Wireless Networks”

CORE KAIST EECS Computer Engineering Research Lab Evaluation 10Mbps Ethernet vs. 2Mbps Wavelan vs. 33.3Kbps SLIP HTTP filter –compress text file using ZLIB or LZO –not compress image file –Primary proxy as compressor, secondary as decompressor Provide client transparency NFS filter : compress text/binary files using ZLIB or LZO TCP filter : use unacknowledged packet caching ServerProxyGateway Client

CORE KAIST EECS Computer Engineering Research Lab Performance of HTTP Filter

CORE KAIST EECS Computer Engineering Research Lab Performance of NFS Filter

CORE KAIST EECS Computer Engineering Research Lab Performance of TCP Filter

CORE KAIST EECS Computer Engineering Research Lab Conclusion & Future Work General Purpose Proxy Mechanism Author’s future work –End-to-End semantics High level proxy breaks the end-to-end semantics of TCP –Security Message security between proxy & MH Filter code security –Proxy mobility –# proxies –Adapt protocol / application