Intelligent Proxy Server in TANet/TWAREN
|
|
|
- Wendy Cox
- 9 years ago
- Views:
Transcription
1 Proceedings of the Asia Pacific Advanced Network Intelligent Proxy Server in TANet/TWAREN Ya-Ling Wang 1, Ying-Chieh Chang 2 and Quincy Wu 1,* 1 National Chi Nan University / Department of Computer Science and Information Engineering 2 National Chi Nan University / Department of International Business s: {s ,s ,solomon}@ncnu.edu.tw * Corresponding author; Tel.: # 4736 Abstract: This paper studies the choice of web proxy servers. Usually there are plenty of proxy servers that are available to users, so it is important for users to choose the best proxy server. When visiting web servers in different countries, it is a common practice to divert the requests to different proxy servers in order to get better performance. However, generally the users do not exactly know which proxy server provides the fastest service for a specific website. Therefore, this paper proposes to run a priori speed tests in webpage retrieval, and choose the fastest proxy server according to the measurement. The experimental result shows that the performance of this strategy is better than the naïve approach which simply makes up the decision according to the nationality of websites. Keywords: Intelligent; Learn; Proxy server; TANet; TWAREN. 1. Introduction For server administrators, it has always been a tough technical decision to adjust the strategy of web proxy servers in his/her site to obtain the best performance [1]. For a multi-homed site like National Chi Nan University (hereinafter referred to as NCNU), this is even more difficult. Just as many universities in Taiwan, NCNU is connected to two national research/education networks (NRENs) Taiwan Academic Network (TANet) and Taiwan Advance Research & Education Network (TWAREN), each of which provides a proxy server to serve connecting sites [2]. Because TWAREN provides high speed connection through APAN to many countries, the original configuration of NCNU is to access all webpages through the TWAREN proxy server. However, some tests demonstrate that this strategy is not always the optimal, especially for
2 commercial websites or domestic websites. This violates the goal to reduce download time through a proxy server [3]. Therefore, depending on the destination websites, we may want to use different upstream proxy servers. For web browsers like Microsoft Internet Explorer, users need to manually modify the proxy server name in Internet Options to choose a different proxy server. For other browsers like Mozilla Firefox and Seamonkey, add-ons like foxyproxy were developed to allow users selecting multiple proxy servers and route requests to one of them according to regular expression matching of URLs [4]. Figure 1. Multi-proxy servers architecture According to users feedback, configuring multiple proxy servers requires the knowledge of network topology, and constant measurement of download time. Therefore, although some network experts may enjoy the flexibility of foxyproxy, many users still prefer to choose a single web proxy server, which can usually provides them the fastest connection. Consequently, NCNU decided to provide users a single web proxy server, which will intelligently determine to access a webpage via the TWAREN proxy server or the TANET proxy server, depending on which one provides faster service for the target site (see Figure 1). In some cases, the NCNU proxy server will decide to bypass both the TANet proxy server and the TWAREN proxy server, and access the website directly, because the overhead for retrieving the website indirectly through another proxy server is larger than the benefit it can obtain. The goal is to promote all NCNU users to surf the web through the proxy server, so that the average download time can be minimized [5]. 2. Architecture and Components NCNU proxy server is running on the CentOS 5.4 operating system. Its web proxy server was upgraded to Squid 3.1 in February of 2010 to support IPv6 websites. The access log is analyzed by Webalizer and the report is generated by SARG (Squid Analysis Report Generator)
3 to provide statistical charts. At the beginning, the policy is that all non-local webpages were retrieved via the TWAREN proxy server. As shown in Figure 1, the current test environment consists of three proxy servers: 1. (local) NCNU proxy server 2. TANet proxy server proxy.moe.edu.tw:3128/ 3. TWAREN proxy server proxy1.twaren.net:3128/ 2.1. Measurement Tools To measure the download speed of each webpage, a tool http_ping is utilized. The behavior of http_ping is similar to the command ping. The difference is that ping sends ICMP echo requests while http_ping sends HTTP requests. The command ping used to be a popular utility for network engineers to test the round-trip time between two hosts. However, recently many firewall policies simply discard ICMP requests to prevent hackers from scanning on-line hosts. On the contrary, HTTP requests can always successfully pass through the firewall, so it is suitable to support our measurement. Moreover, http_ping supports IPv6. Through a command-line option proxy it can specify which proxy server to use. The -count option specifies the number of iterations of HTTP request, and the data transmission time will be calculated, as shown in Figure 2. Figure 2. http_ping screenshots In our experiment, we shall repeat the http_ping test 3 times to retrieve each webpage from a designated proxy server, so the command will look like: http_ping count 3 proxy proxy server:port
4 2.2. Data Collection Process The NCNU proxy server performs a download test regularly every day. From the access.log file of the proxy server, URLs which were retrieved by users are extracted, and http_ping tries to retrieve these webpages via different proxy servers. According to the download speed of each site, new rules will be added into the configuration file of the NCNU proxy server. It then reloads the profile so that the proxy server will choose the fastest proxy server between TWAREN proxy server and TANet proxy server as the upstream server. To reduce the total number of download pages, for popular websites like Yahoo! which receives thousands of visits in each day, our experiment will only take as a representative and download the webpage 3 times. Figure 3 show the flow chart of the data collection process. Figure 3. Flow chart of the data collection process Each test will generate two lists. One list contains all websites whose download speed will be maximal via the TWAREN proxy server. The other list contains websites whose download
5 speed will be maximal via the TANet proxy server. These two lists will be included into squid.conf to produce a new configuration file (see Figure 4 and Figure 5). For other sites not in these two lists, retrieving them directly from the NCNU proxy server provides the fastest download speed, without going through any further proxy servers. A B C Figure 4. Squid original configuration Figure 5. Squid new profile
6 3. Experimental Results Although http_ping does not consume much bandwidth [6], the tests were required to be scheduled at dawn (4AM in this experiment) to prevent it from causing network congestion or bringing any inconvenience to other users. However, NCNU has enough uplink bandwidth. According to Table 1 which shows the statistics of NCNU inbound traffic flows during 2010/04/29 to 2010/05/10, these http_ping tests did not significantly increase the network traffic. Take April 29 th for example. It only consumed 7.9Gbyte of bandwidth, which was ranked as top 15 among all hosts in NCNU. Table 1. Network traffic of the NCNU proxy server Figure 6 shows the test for 3191 randomly chosen URLs from the access.log data on May 7 th, The horizontal axis is the data amount while the vertical axis is the cumulative access time in millisecond. The blue line indicates the access time required to download those webpages through the NCNU proxy server; the average time for a site is ms. The red line indicates the access time required to download those webpages without the NCNU proxy server; the average time for each site is ms, which is twice longer than the scenario with the NCNU proxy server. This figure clearly shows that utilizing the NCNU proxy server can reduce total access time. Figure /05/07 Speed test
7 Figure 7 shows another experiment on May 11 th with 157 randomly selected documents. The horizontal axis is the total amount of data. The vertical axis is the cumulative access time in millisecond. The blue line indicates that, for intelligent proxy server with adaptive rules, averagely each webpage only takes ms to download. The green line indicates that, for traditional proxy server with fixed rules, the average time to download a webpage is ms. The red line indicates the time to retrieve webpages without proxy servers, where the average time to download a page is ms. Figure /05/11 Comparison Test 4. Conclusions and Future Work Through experiments in this paper, it was shown that with proxy servers, the access time to retrieve webpages will be significantly decreased. If the proxy server can intelligently adjust its rule to utilize upstream proxy servers to retrieve data, it can further reduce the access time profoundly. As more users utilize this proxy service, there will be more websites included in the testing list, and further retrieval to webpages on those sites can automatically choose the fastest upstream proxy server to retrieve data. However, the testing process downloads webpages which consume network bandwidth, so it is suggested that in the future, it can re-use the statistical information from some existing measurement system like perfsonar, so that it need not download webpages frequently..
8 Acknowledgements The Computer and Network Center in National Chi Nan University provides perfect equipment and support to this experiment, which is highly appreciated. References 1. R. Howard, B.J. Jansen, "A proxy server experiment: an indication of the changing nature of the Web", Proceedings of the 7th International Conference on Computer Communications and Networks, pp , C.L. Jeffery, S.R. Das, G.S. Bernal, "Proxy-sharing proxy servers", Proceedings of First Annual Conference on Emerging Technologies and Applications in Communications, pp , S. Hussain, R.D. McLeod, "Intelligent prefetching at a proxy server", Proceedings of 2000 Canadian Conference on Electrical and Computer Engineering, pp vol.1, Jeremy Clark, P. C. van Oorschot, Carlisle Adams, "Usability of anonymous web browsing: an examination of Tor interfaces and deploy ability", ACM Proceedings of the 3rd Symposium on Usable Privacy and Security, pp , M. Wijnants, P. Monsieurs, P. Quax, W. Lamotte, "Exploiting Proxy-Based Transcoding to Increase the User Quality of Experience in Networked Application", Proceedings of First International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications (AAA-IDEA 05), pp , Wei-hsiu Ma and David H.C. Du, "Reducing bandwidth requirement for delivering video over wide area networks with proxy server", Multimedia, IEEE Transactions, pp , by the authors; licensee Asia Pacific Advanced Network. This article is an open-access article distributed under the terms and conditions of the Creative Commons Attribution license (
Infor Xtreme Browser References
Infor Xtreme Browser References This document describes the list of supported browsers, browser recommendations and known issues. Contents Infor Xtreme Browser References... 1 Browsers Supported... 2 Browser
MultiSite Manager. Setup Guide
MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...
Software Version 1.0 ConnectKey TM Share to Cloud April 2013. Xerox ConnectKey Share to Cloud User / Administrator s Guide
Software Version 1.0 ConnectKey TM Share to Cloud April 2013 Xerox ConnectKey Share to Cloud User / Administrator s Guide 2013 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and Xerox
Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform
Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Shie-Yuan Wang Department of Computer Science National Chiao Tung University, Taiwan Email: [email protected]
MultiSite Manager. Setup Guide
MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]
Cisco Cloud Web Security Cisco IT Methods Introduction Malicious scripts, or malware, are executable code added to webpages that execute when the user visits the site. Many of these seemingly harmless
Client-controlled QoS Management in Networked Virtual Environments
Client-controlled QoS Management in Networked Virtual Environments Patrick Monsieurs, Maarten Wijnants, Wim Lamotte Expertise Centre for Digital Media Limburgs Universitair Centrum Universitaire Campus,
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
Using Steelhead Appliances and Stingray Aptimizer to Accelerate Microsoft SharePoint WHITE PAPER
Using Steelhead Appliances and Stingray Aptimizer to Accelerate Microsoft SharePoint WHITE PAPER Introduction to Faster Loading Web Sites A faster loading web site or intranet provides users with a more
Manual. Traffic Exchange
Updated on 21-Oct-2010 Page 1 of 10 Manual Traffic Exchange Updated on 21-Oct-2010 Page 2 of 10 Index Pages 1. To access the Traffic Exchange 3 2. Checking User Log 5 3. Change Password 7 4. Troubleshooting
Performance Comparison of low-latency Anonymisation Services from a User Perspective
Performance Comparison of low-latency Anonymisation Services from a User Perspective Rolf Wendolsky Hannes Federrath Department of Business Informatics University of Regensburg 7th Workshop on Privacy
WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS
WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS Biswajit Biswal Oracle Corporation [email protected] ABSTRACT With the World Wide Web (www) s ubiquity increase and the rapid development
Connection and Printer Setup Guide
Connection and Printer Setup Guide For connection issues, see the following sections of this document: "Connection Requirements" on page 1 "Log on" on page 2 "Troubleshooting Your Connection" on page 4
Broadband Quality Test Plan
Broadband Quality Test Plan Version 1.2 December 2007 Page 1 Table of Contents 1 EXPERIMENT DESIGN... 3 1.1 METRICS... 3 1.2 DESTINATIONS...4 1.3 MEASUREMENT TECHNIQUES... 6 2 TEST SETUP... 7 2.1 ISPS
Scan to Cloud Installation Guide
Scan to Cloud Installation Guide Table of Contents 1 - Before you start 1 1.1- What is Scan to Cloud? 1 1.2- What is included? 1 1.3- Supported devices 1 1.4- Supported languages 1 1.5- Keyboards 1 1.6-
A Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN)
A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN) Adeyinka A. Adewale, Samuel N. John, and Charles Ndujiuba 1 Department of Electrical and Information Engineering, Covenant
RAPID BROADBAND INSTALLATION RAPID BROADBAND SUPPORT CONTACT DETAILS. [email protected] AND TROUBLESHOOTING GUIDE. Email: Tel: 076 6708787
RAPID BROADBAND INSTALLATION AND TROUBLESHOOTING GUIDE RAPID BROADBAND SUPPORT CONTACT DETAILS Email: [email protected] Tel: 076 6708787 January 2008 1 INTERNET CONNECTION TROUBLESHOOTING GUIDE
A Design and Implementation of a Web Server Log File Analyzer
A Design and Implementation of a Web Server Log File Analyzer Yu-Hsin Cheng 1, Chien-Hung Huang 2 1 Department of Information Management, Ling Tung University No. 1, Ling tung Rd., Taichung, Taiwan 2 Department
NetFlow-Based Approach to Compare the Load Balancing Algorithms
6 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.1, October 8 NetFlow-Based Approach to Compare the Load Balancing Algorithms Chin-Yu Yang 1, and Jian-Bo Chen 3 1 Dept.
Microsoft 10972 - Administering the Web Server (IIS) Role of Windows Server
1800 ULEARN (853 276) www.ddls.com.au Microsoft 10972 - Administering the Web Server (IIS) Role of Windows Server Length 5 days Price $4169.00 (inc GST) Version B Overview This course provides students
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
Aspera Connect 2.4.7. Linux 32/64-bit. Document Version: 1
Aspera Connect 2.4.7 Linux 32/64-bit Document Version: 1 2 Contents Contents Introduction... 3 Setting Up... 4 Upgrading from a Previous Version...4 Installation... 4 Set Up Network Environment... 5 Basic
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
Hosting more than one FortiOS instance on. VLANs. 1. Network topology
Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of
Cyclope Internet Filtering Proxy. - Installation Guide -
Cyclope Internet Filtering Proxy - Installation Guide - 1. Overview 3 2. Installation 4 2.1 System requirements 4 2.2 Cyclope Internet Filtering Proxy Installation 4 2.3 Client Browser Configuration 6
Configuring Snort as a Firewall on Windows 7 Environment
Journal of Ubiquitous Systems & Pervasive Networks Volume 3, No. 2 (2011) pp. 3- Configuring Snort as a Firewall on Windo Environment Moath Hashim Alsafasfeh a, Abdel Ilah Noor Alshbatat b a National University
If you see "Skip installation of the current version and test the currently installed version of Java" then select that hyperlink.
Workstation, Browser, Java, Connections, Proxy Servers, & Firewall Information March 2, 2015 Contents I. Workstation and Browser Configurations A. Internet Explorer B. Mozilla Firefox C. Google Chrome
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,[email protected]
Firewall Examples. Using a firewall to control traffic in networks
Using a firewall to control traffic in networks 1 1 Example Network 1 2 1.0/24 1.2.0/24.4 1.0.0/16 Rc 5.6 4.0/24 2 Consider this example internet which has: 6 subnets (blue ovals), each with unique network
SysAid Remote Discovery Tool
SysAid Remote Discovery Tool SysAid Release 7 Document Updated: 27-Apr-10 SysAid Remote Discovery Tool The SysAid server comes with a built-in discovery service that performs various network discovery
An Efficient Hybrid P2P MMOG Cloud Architecture for Dynamic Load Management. Ginhung Wang, Kuochen Wang
1 An Efficient Hybrid MMOG Cloud Architecture for Dynamic Load Management Ginhung Wang, Kuochen Wang Abstract- In recent years, massively multiplayer online games (MMOGs) become more and more popular.
On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu
On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu Dilip Kumar Krishnappa, Samamon Khemmarat, Lixin Gao, Michael Zink University of Massachusetts Amherst,
GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide
GFI Product Manual Web security, monitoring and Internet access control Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as
REST-based Offline e-mail System
Proceedings of the APAN Network Research Workshop 2012 REST-based Offline e-mail System Gihan Dias, Mithila Karunarathna, Madhuka Udantha, Ishara Gunathilake, Shalika Pathirathna and Tharidu Rathnayake
Assuring Your Business Continuity
Assuring Your Business Continuity Q-Balancer Range Offering Business Continuity, Productivity, and Security Q-Balancer is designed to offer assured network connectivity to small and medium business (SME)
Load Balancing Clearswift Secure Web Gateway
Load Balancing Clearswift Secure Web Gateway Deployment Guide rev. 1.1.8 Copyright 2002 2016 Loadbalancer.org, Inc. 1 Table of Contents About this Guide...3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
Configuring SonicWALL TSA on Citrix and Terminal Services Servers
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
Trend Micro Hosted Email Security. Best Practice Guide
Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described
Application Performance Analysis and Troubleshooting
Exam : 1T6-520 Title : Application Performance Analysis and Troubleshooting Version : DEMO 1 / 6 1. When optimizing application efficiency, an improvement in efficiency from the current 90% to an efficiency
Trouble Shooting SiteManager to GateManager access
Trouble Shooting SiteManager to GateManager access If you are unsure if a SiteManager will be able to access the GateManager through the corporate firewall, or you experience connection issues, this document
Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions
Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas
Deployment Guide Microsoft IIS 7.0
Deployment Guide Microsoft IIS 7.0 DG_IIS_022012.1 TABLE OF CONTENTS 1 Introduction... 4 2 Deployment Guide Overview... 4 3 Deployment Guide Prerequisites... 4 4 Accessing the AX Series Load Balancer...
THE OPEN UNIVERSITY OF TANZANIA
THE OPEN UNIVERSITY OF TANZANIA Institute of Educational and Management Technologies COURSE OUTLINES FOR DIPLOMA IN COMPUTER SCIENCE 2 nd YEAR (NTA LEVEL 6) SEMESTER I 06101: Advanced Website Design Gather
Lab - Using Wireshark to View Network Traffic
Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark Start and stop data capture of ping traffic to local hosts. Locate the IP
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper Details: Introduction When computers in a private network connect to the Internet, they physically
D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)
v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
MMGD0204 Web Application Technologies. Chapter 1 Introduction to Internet
MMGD0204 Application Technologies Chapter 1 Introduction to Internet Chapter 1 Introduction to Internet What is The Internet? The Internet is a global connection of computers. These computers are connected
Siemens HiPath ProCenter Multimedia
Siemens HiPath ProCenter Multimedia Today s business climate is tougher than ever, and chances are your competitors are no longer just a local concern. All this means finding ways of improving customer
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Fixed Line Broadband Performance (ADSL) in New Zealand. April June 2013
Fixed Line Broadband Performance (ADSL) in New Zealand April June 213 Copyright Epitiro Group Limited, 213. No reproduction, copy, transmission or translation of this publication may be made without written
Running the Tor client on Mac OS X
Running the Tor client on Mac OS X Note that these are the installation instructions for running a Tor client on Mac OS X. If you want to relay traffic for others to help the network grow (please do),
The enemy within: Stop students from bypassing your defenses
The enemy within: Stop students from bypassing your defenses Computer literate K-12 students regularly use anonymizing proxies to bypass their school s web filters to access pornography, social networking,
How to Make the Client IP Address Available to the Back-end Server
How to Make the Client IP Address Available to the Back-end Server For Layer 4 - UDP and Layer 4 - TCP services, the actual client IP address is passed to the server in the TCP header. No further configuration
Deploying in a Distributed Environment
Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each
What Is Ad-Aware Update Server?
Contents What Is Ad-Aware Update Server?...2 Installation and Removal...3 System Requirements...3 Obtaining the Installation File...3 Installing Ad-Aware Update Server...3 Upgrade...4 Repairing, Modifying
Experimentation with the YouTube Content Delivery Network (CDN)
Experimentation with the YouTube Content Delivery Network (CDN) Siddharth Rao Department of Computer Science Aalto University, Finland [email protected] Sami Karvonen Department of Computer Science
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Exploitation of Server Log Files of User Behavior in Order to Inform Administrator
Exploitation of Server Log Files of User Behavior in Order to Inform Administrator Hamed Jelodar Computer Department, Islamic Azad University, Science and Research Branch, Bushehr, Iran ABSTRACT All requests
Trouble Shooting SiteManager to GateManager access via a corporate Intranet
Trouble Shooting SiteManager to GateManager access via a corporate Intranet If you are unsure if a SiteManager will be able to access the GateManager through the corporate firewall, or you experience connection
Nokia E90 Communicator Using WLAN
Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia
Konica Minolta s Optimised Print Services (OPS)
Konica Minolta s Optimised Print Services (OPS) Document Collection Agent (DCA) Detailed Installation Guide V1.6 Page 1 of 43 Table of Contents Notes... 4 Requirements... 5 Network requirements... 5 System
AN EFFICIENT APPROACH TO PERFORM PRE-PROCESSING
AN EFFIIENT APPROAH TO PERFORM PRE-PROESSING S. Prince Mary Research Scholar, Sathyabama University, hennai- 119 [email protected] E. Baburaj Department of omputer Science & Engineering, Sun Engineering
Gigabit Multi-Homing VPN Security Router
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is a ideal to help the SMBs increase the broadband
Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1
Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....
Sage ERP Accpac Online
Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac
2.2.1. Astaro User Portal: Getting Software and Certificates...13. 2.2.2. Astaro IPsec Client: Configuring the Client...14
1. Introduction... 2 2. Remote Access via IPSec... 2 2.1. Configuration of the Astaro Security Gateway... 2 2.2. Configuration of the Remote Client...13 2.2.1. Astaro User Portal: Getting Software and
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for
Chapter 52 WAN Load Balancing
Chapter 52 WAN Load Balancing Introduction... 52-2 WAN Load Balancer Operating Principles... 52-2 Load Distribution Methods... 52-3 Round Robin Distribution... 52-3 Weighted Lottery Distribution... 52-3
E-MAIL AND SERVER SECURITY
E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 1.1 How the product works 3 1.2 Product contents 4 2. Deployment scenarios 5 2.1 Stand-alone
Using TestLogServer for Web Security Troubleshooting
Using TestLogServer for Web Security Troubleshooting Topic 50330 TestLogServer Web Security Solutions Version 7.7, Updated 19-Sept- 2013 A command-line utility called TestLogServer is included as part
E-MAIL AND SERVER SECURITY
E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 2. Deployment scenarios 5 2.1 Stand-alone server 5 2.2 Deploying the product with F-Secure
Docufide Client Installation Guide for Windows
Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is
idatafax Troubleshooting
idatafax Troubleshooting About idatafax idatafax is a client application that connects back to a server at the PHRI based in Hamilton, Ontario, Canada. It is not known to interfere with any software and
Real-Time Analysis of CDN in an Academic Institute: A Simulation Study
Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management
Optimization of Cluster Web Server Scheduling from Site Access Statistics
Optimization of Cluster Web Server Scheduling from Site Access Statistics Nartpong Ampornaramveth, Surasak Sanguanpong Faculty of Computer Engineering, Kasetsart University, Bangkhen Bangkok, Thailand
Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11
Investment Management System Connectivity Guide IMS Connectivity Guide Page 1 of 11 1. Introduction This document details the necessary steps and procedures required for organisations to access the Homes
Cloud Director User's Guide
Cloud Director 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
Chapter 51 WAN Load Balancing
Chapter 51 WAN Load Balancing Introduction... 51-2 WAN Load Balancer Operating Principles... 51-2 Load Distribution Methods... 51-3 Round Robin Distribution... 51-3 Weighted Lottery Distribution... 51-3
SurfCop for Microsoft ISA Server. System Administrator s Guide
SurfCop for Microsoft ISA Server System Administrator s Guide Contents INTRODUCTION 5 PROGRAM FEATURES 7 SYSTEM REQUIREMENTS 7 DEPLOYMENT PLANNING 8 AGENTS 10 How It Works 10 What is Important to Know
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with the Nagios Open Source Network Monitoring System
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP LTM with the Nagios Open Source Network Monitoring System Deploying F5 with Nagios Open Source Network Monitoring System Welcome to the F5 and Nagios deployment
Networking Topology For Your System
This chapter describes the different networking topologies supported for this product, including the advantages and disadvantages of each. Select the one that best meets your needs and your network deployment.
Configuration Manual English version
Configuration Manual English version Frama F-Link Configuration Manual (EN) All rights reserved. Frama Group. The right to make changes in this Installation Guide is reserved. Frama Ltd also reserves the
Configuring Snort as a Firewall on Windows 7 Environment
Configuring Snort as a Firewall on Windo Environment Moath Hashim Alsafasfeh a, Abdel Ilah Noor Alshbatat b a National university of Malaysia UKM, Selengor, Malaysia. b Tafila Technical University, Electrical
Density Map Visualization for Overlapping Bicycle Trajectories
, pp.327-332 http://dx.doi.org/10.14257/ijca.2014.7.3.31 Density Map Visualization for Overlapping Bicycle Trajectories Dongwook Lee 1, Jinsul Kim 2 and Minsoo Hahn 1 1 Digital Media Lab., Korea Advanced
Design and Implementation of an IP based authentication mechanism for Open Source Proxy Servers in Interception Mode
Design and Implementation of an IP based authentication mechanism for Open Source Proxy Servers in Interception Mode Tejaswi Agarwal 1 and Mike Leonetti 2 1 School of Computing Science and Engineering,
Windows Server Update Services 3.0 SP2 Step By Step Guide
Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server
