Tapster: Transparent Proxy Redirector for Mobile Computing

In mobile computing, the proxy-based software may access the proxy far from the visited network rather than the nearby proxy. Accordingly, the proxy-based software's communication hardly gets advantages from the proxy and may suffer disturbances. We propose the Tapster as the transparent proxy redirector for mobile computing. The Tapster can automatically redirect applications' requests to a nearby proxy without software configuration and modification. Accordingly, developers can focus on designing their applications without considering mobility and compatibility issues. The Tapster supports various network applications not merely WWW applications. Besides, the Tapster works at the mobile device to maintain security mechanisms, make the optimal communication path, and mitigate the load of network devices. We implement the Tapster in Windows XP and have experiments. The experiments show that (1) the Tapster has the negligible overhead, (2) the Tapster redirects applications' requests to the nearby proxy to shorten communication delay, and (3) the Tapster works without software configuration and modification.

[1]  Charles E. Perkins,et al.  Service Location Protocol, Version 2 , 1999, RFC.

[2]  PodlipnigStefan,et al.  A survey of Web cache replacement strategies , 2003 .

[3]  Henning Schulzrinne,et al.  Dynamic Host Configuration Protocol (DHCP-for-IPv4) Option for Session Initiation Protocol (SIP) Servers , 2002, RFC.

[4]  Brad Cain,et al.  A Model for Content Internetworking (CDI) , 2003, RFC.

[5]  David A. Maltz,et al.  MSOCKS: an architecture for transport layer mobility , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[6]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[7]  Stephen T. Kent,et al.  Security Architecture for the Internet Protocol , 1998, RFC.

[8]  Charles E. Perkins,et al.  Service Location Protocol , 1997, RFC.

[9]  Philip S. Yu,et al.  The state of the art in locally distributed Web-server systems , 2002, CSUR.

[10]  Stephen E. Deering,et al.  ICMP Router Discovery Messages , 1991, RFC.

[11]  Pyda Srisuresh,et al.  Traditional IP Network Address Translator (Traditional NAT) , 2001, RFC.

[12]  Paul Vixie,et al.  A DNS RR for specifying the location of services (DNS SRV) , 1996, RFC.

[13]  Senthil Balasubramanian DHCP Option for Proxy Server Configuration , 2006 .

[14]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[15]  Martin Hamilton,et al.  Use of DNS Aliases for Network Services , 1997, RFC.

[16]  Ralph E. Droms,et al.  Authentication for DHCP Messages , 2001, RFC.

[17]  Ian Cooper,et al.  Web Proxy Auto-Discovery Protocol , 1999 .

[18]  László Böszörményi,et al.  A survey of Web cache replacement strategies , 2003, CSUR.

[19]  Suresh Singh,et al.  M-TCP: TCP for mobile cellular networks , 1997, CCRV.

[20]  B. R. Badrinath,et al.  I-TCP: indirect TCP for mobile hosts , 1995, Proceedings of 15th International Conference on Distributed Computing Systems.