General purpose proxies: solved and unsolved problems

Proxies are becoming increasingly common. One use of a proxy is to address network heterogeneity, which can arise especially in mobile computing. In this setting, a proxy can process the traffic flowing to and from a network limited mobile host, damping the variations in application performance as well as providing other benefits such as reduced cost and increased security. We describe the issues we faced in designing such a proxy system, how we solved some problems, and why others could not be solved.

[1]  B. R. Badrinath,et al.  Handoff and Systems Support for Indirect TCP/IP , 1995, Symposium on Mobile and Location-Independent Computing.

[2]  Tomasz Imielinski,et al.  Handling mobile clients: a case for indirect interaction , 1993, Proceedings of IEEE 4th Workshop on Workstation Operating Systems. WWOS-III.

[3]  Gary Cornell,et al.  Core Java , 1996, The SunSoft Press Java series.

[4]  M. Frans Kaashoek,et al.  Rover: a toolkit for mobile information access , 1995, SOSP.

[5]  Jim Fulton,et al.  An update on low bandwidth X (LBX) , 1993 .

[6]  Jon Postel,et al.  Internet Control Message Protocol , 1981, RFC.

[7]  Mark R. Crispin,et al.  Interactive Mail Access Protocol: Version 2 , 1988, RFC.

[8]  Mahadev Satyanarayanan,et al.  A Programming Interface for Application-Aware Adaptation in Mobile Computing , 1995, Comput. Syst..

[9]  Jim Miller,et al.  Application-Specific Proxy Servers as HTTP Stream Transducers , 1996, World Wide Web journal.

[10]  B. R. Badrinath,et al.  To send or not to send: implementing deferred transmissions in a mobile host , 1996, Proceedings of 16th International Conference on Distributed Computing Systems.

[11]  Srinivasan Seshan,et al.  Improving TCP/IP performance over wireless networks , 1995, MobiCom '95.

[12]  Brent Callaghan WebNFS Client Specification , 1996, RFC.

[13]  Elizabeth D. Zwicky,et al.  Building internet firewalls , 1995 .

[14]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[15]  Dan Duchamp Optimistic Lookup of Whole NFS Paths in a Single Operation , 1994, USENIX Summer.

[16]  Kimmo E. E. Raatikainen,et al.  Connecting Mobile Workstations to the Internet Over a Digital Cellular Telephone Network , 1994, Mobidata.

[17]  Liviu Iftode,et al.  Improving the Performance of Reliable Transport Protocols in Mobile Computing Environments , 1994, IEEE J. Sel. Areas Commun..

[18]  David Wetherall,et al.  Towards an active network architecture , 1996, CCRV.