Twin-object platform: a generic proxy-based system for communication customization in mobile computing

Communication customization has been widely used and proved having benefits in mobile computing. However, most systems are designed for specific purposes. They may have weaknesses in compatibility and portability, and incur unnecessary overheads in certain situations. Besides, they may be not flexible as a generic system because of requiring particular software facilities or hardware devices. In the paper, we propose TOP, a generic proxy-based system for communication customization in mobile computing. TOP utilizes API hook and packet redirection technologies to provide objects with the service of packet manipulations. Rather than being limited Java Applet, the objects on TOP are Java application capable of accessing various Java libraries. Communication customization on TOP can fully change an existing protocol's semantics without modifying application programs. We implement TOP on Windows 2000/XP and the experiments show that the performance of TOP is acceptable. Besides, we use TOP to overcome TCP disconnection hazards over wireless LAN as an example of applications on it.

[1]  Gabriel Montenegro,et al.  End-to-end Performance Implications of Slow Links , 2001, RFC.

[2]  Jochen Seitz,et al.  Π2 -- a generic proxy platform for wireless access and mobility in CORBA , 2000, PODC '00.

[3]  Bruce Zenel A general purpose proxy filtering mechanism applied to the mobile environment , 1999, Wirel. Networks.

[4]  George Samaras,et al.  WebExpress: A client/intercept based system for optimizing Web browsing in a wireless environment , 1998, Mob. Networks Appl..

[5]  Suresh Singh,et al.  M-TCP: TCP for mobile cellular networks , 1997, CCRV.

[6]  Steven McCanne,et al.  BPF+: exploiting global data-flow optimization in a generalized packet filter architecture , 1999, SIGCOMM '99.

[7]  Charles E. Perkins,et al.  Service Location Protocol, Version 2 , 1999, RFC.

[8]  Sergio Loureiro,et al.  Mobile code security , 2000 .

[9]  Van Jacobson,et al.  Compressing TCP/IP Headers for Low-Speed Serial Links , 1990, RFC.

[10]  Srinivasan Seshan,et al.  Improving reliable transport and handoff performance in cellular wireless networks , 1995, Wirel. Networks.

[11]  Michael J. Jipping,et al.  Investigating wired and wireless networks using a java-based programmable sniffer , 2004, ITiCSE '04.

[12]  Jeff Wilson,et al.  Securing a wireless network , 2002, SIGUCCS '02.

[13]  Jeffrey C. Mogul,et al.  The packer filter: an efficient mechanism for user-level network code , 1987, SOSP '87.

[14]  Ned Freed,et al.  Behavior of and Requirements for Internet Firewalls , 2000, RFC.

[15]  Galen C. Hunt,et al.  Detours: binary interception of Win32 functions , 1999 .

[16]  Mani B. Srivastava,et al.  Active Base Stations and Nodes for Wireless Networks , 2003, Wirel. Networks.

[17]  B. R. Badrinath,et al.  I-TCP: indirect TCP for mobile hosts , 1995, Proceedings of 15th International Conference on Distributed Computing Systems.

[18]  Jason Nieh,et al.  Web browsing performance of wireless thin-client computing , 2003, WWW '03.

[19]  Eric Eide,et al.  Bees: a secure, resource-controlled, Java-based execution environment , 2003, 2003 IEEE Conference onOpen Architectures and Network Programming..

[20]  Gary McGraw,et al.  Statically Scanning Java Code: Finding Security Vulnerabilities , 2000, IEEE Software.

[21]  Eric A. Brewer,et al.  Adapting to network and client variability via on-demand dynamic distillation , 1996, ASPLOS VII.

[22]  Kimmo E. E. Raatikainen,et al.  Optimizing World-Wide Web for weakly connected mobile workstations: An indirect approach , 1995, Second International Workshop on Services in Distributed and Networked Environments.

[23]  José Legatheaux Martins,et al.  Flexible data storage for mobile computing , 1999, SAC '99.

[24]  Kimmo E. E. Raatikainen,et al.  Connecting Mobile Workstations to the Internet Over a Digital Cellular Telephone Network , 1994, Mobidata.