Skip to main content
Log in

A general purpose proxy filtering mechanism applied to the mobile environment

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Host mobility complicates the standard networking model in unexpected ways. It increases network heterogeneity, causing difficulty within applications that expect a high or constant amount of network bandwidth. Mobility increases cost when a user switches from a relatively inexpensive high bandwidth network to a low bandwidth pay‐by‐call or pay‐by‐byte network. Mobility may also reduce security when a user moves from a “safe” network onto a foreign one. This situation can be improved by introducing a proxy between the mobile client and its peer. The purpose of this intermediary is to process data moving between the client and peer. The type of processing performed depends on the desired result: the proxy can hide network heterogeneity via data filtering, reduce cost by using compression, and increase security through the use of secure protocols between the client and proxy. This paper presents a general purpose proxy system and how it has been applied to the mobile environment. The overall architecture is described, examples of its use given, and a study on its feasibility and performance is presented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. E. Amir, H. Balakrishnan, S. Seshan and R.H. Katz, Improving TCP/IP performance over wireless networks, in: Proc. of 1st Annual International Conference on Mobile Computing and Networking, ACM (November 1995) pp. 2–11.

  2. AT&T Wireless Communications and Networking Division-Utrecht, WaveLAN air interface data manual, AT&T Document Number407–0024785 Rev. 1 (draft) (June 1995).

  3. B. Callaghan, B. Pawlowski and P. Staubach, NFS version 3 protocol specification, RFC 1813, IETF Network Working Group (June 1995).

  4. B. Badrinath and P. Sudame, To send or not to send: Implementing deferred transmissions in a mobile host, in: Proc. of 16th Int. Conf. on Distributed Computing Systems, IEEE (May 1996) pp. 327–333.

  5. B.R. Badrinath, A. Bakre, R. Marantz and T. Imielinski, Handling mobile hosts: A case for indirect interaction, in: Proc. of 4th Workshop on Workstation Operating Systems, IEEE (October 1993) pp. 91–97.

  6. A. Bakre and B. Badrinath, Handoff and system support for indirect TCP/IP, in: Proc. of 2nd Symposium on Mobile and Location-Independent Computing, USENIX (April 1995) pp. 11–24.

  7. T. Berners-Lee and D. Connolly, Hypertext markup language-2.0, RFC 1866, IETF Network Working Group (November 1995).

  8. T. Berners-Lee, R.T. Fielding and H. Frystyk, Hypertext transfer protocol-HTTP/1.0, IETF HTTP Working Group Draft 02, Best Current Practice (August 1995).

  9. R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva and M. Yung, The Krypto-Knight family of light-weight protocols for authentication and key distribution, IEEE Transactions on Networking 3(1) (February 1995) 31–42.

    Google Scholar 

  10. N. Borenstein and N. Freed, MIME (Multipurpose Internet Mail Extensions), Part One, RFC 1521, IETF Network Working Group (September 1993).

  11. C. Brooks, M. Mazer, S. Meeks and J. Miller, Application-specific proxy servers as HTTP stream transducers, World Wide Web Journal (December 1995) 539–548.

  12. R. Caceres and L. Iftode,Improving the performance of reliable transport protocols in mobile computing environments, IEEE Journal of Selected Areas in Communications 13(5) (June 1994).

  13. D. Chapman and E. Zwicky, Building Internet Firewalls(O'Reilly and Assoiates, 1995).

  14. M. Crispin, Interactive mail access protocol-version 2, RFC 1176, IETF Network Working Group (August 1990).

  15. A.J. Rover et al., A toolkit for mobile information access, in: Proc. of 15th ACM Symposium on Operating Systems Principles, ACM (December 1995) pp. 156–171.

  16. R. Fielding, J. Gettys, J. Mogul, H. Frystyk and T. Berners-Lee, Hypertext transfer protocol-HTTP/1.1, RFC 2068, IETF Network Working Group (January 1997).

  17. J. Fulton and C. Kantarjiev, An update on Low Bandwidth X (LBX), The X Resource 1(5) (January 1993) 251–266.

    Google Scholar 

  18. J. Gailly and M. Adler, Zlib general purpose compression library, User manual for zlib version 1.0.4, URL:http:://quest.jpl.nasa.gov/zlib/ (July 1996). B. Zenel /A general purpose proxy filtering mechanism 409

  19. J. Gosling and H. McGilton, The Java language environment, Sun Microsystems White Paper (May 1995).

  20. J. Ioannidis, D. Duchamp, G.Q. Maguire, Jr. and S. Deering, Protocols for supporting mobile IP hosts, Internet-Draft, ftp://software. watson.ibm.com/pub/mobile-ip/columbia-draft-june-92 (June 1992).

  21. Digital Compression and Coding of Continuous-Tone Still Images (JPEG), ISO/IEC 10918–1, ISO(February 1994).

  22. M. Kojo, K. Raatikainen and T. Alanko, Connecting mobile workstations to the Internet over a digital cellular telephone network, in: Proc. 1994 Mobidata Workshop, Rutgers University (November 1994).

  23. D.B. Lange, Java Aglet Application Programming Interface (J-AAPI), White Paper-Draft 2, IBM Tokyo Research Laboratory White Paper, URL: http:://www.trl.ibm.co.jp/aglets/JAAPIwhitepaper. html (February 1997).

  24. D.B. Lange and D.T. Chang, IBM aglets workbench, programming mobile agents in Java, IBM Tokyo Research Laboratory White Paper, URL: http:://www.trl.ibm.co.jp/aglets/whitepaper.htm (September 1996).

  25. D. Le Gall, MPEG: A video compression standard for multimedia applications, Communications of the ACM 34(4) (April 1991).

  26. J. Myers and M. Rose, Post office protocol-version 3, RFC 1725, IETF Network Working Group (November 1994).

  27. B.D. Noble, M. Price and M.S. Yanaray Anan, A programming interface for application-aware adaptation in mobile computing, in: Proc. of 2nd Symposium on Mobile and Location-Independent Computing, USENIX (April 1995) pp. 57–66.

  28. M.F.X.J. Oberhumer, LZO-a real-time data compression library, User manual for LZO version 0.28, URL: http:://www.infosys. tuwien.ac.at/Staff/lux/marco/lzo.html (February 1997).

  29. J. Postel, Internet control message protocol, RFC 792, IETF Network Working Group (September 1981).

  30. J.B. Postel, Simple mail transfer protocol, RFC 821, IETF Network Working Group (August 1982).

  31. R.W. Scheifler and J. Gettys, The X window system, ACM Transactions on Graphics 5(2) (1986) 79–109.

    Google Scholar 

  32. Sun Microsystems, Inc., RPC: Remote Procedure Call protocol specification, version 2, RFC 1057, IETF Network Working Group (June 1988).

  33. Sun Microsystems, Inc., NFS: Network File System protocol speci-fication, RFC 1094, IETF Network Working Group (March 1989).

  34. Sun Microsystems, Inc., JAVA remote method invocation specification, Sun Microsystems White Paper (February 1997).

  35. D. Tennenhouse and D. Wetherall,Towards an active network architecture, ACM Computer Communications Review 26(2) (April 1996) 5–18.

    Google Scholar 

  36. J. Touch, J. Heidemann and K. Obraczka, Analysis of HTTP performance, URL: http:://www.isi.edu/lsam/publications/http-perf (August 1996).

  37. T. Wilkinson, KAFFE-A virtual machine to run Java code, URL: http:://web.soi.city.ac.uk/tim/kaffe/ (September 1996).

  38. R. Yavatkar and N. Bhagawat, Improving end-to-end performance of TCP over mobile internetworks, in: Proc. of Workshop on Mobile Computing Systems and Applications, ACM/IEEE (December 1994) pp. 146–152.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zenel, B. A general purpose proxy filtering mechanism applied to the mobile environment. Wireless Networks 5, 391–409 (1999). https://doi.org/10.1023/A:1019131902063

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1019131902063

Keywords

Navigation