The TEK System: Browsing the Web in Low- Connectivity Communities



Similar documents
Searching the World Wide Web in Low-Connectivity Communities

Providing Web Search Capability for Low-Connectivity Communities

Internet Content Distribution

Cyclope Internet Filtering Proxy. - Installation Guide -

User Guide. You will be presented with a login screen which will ask you for your username and password.

The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.

DOSarrest Security Services (DSS) Version 4.0

A Tool for Evaluation and Optimization of Web Application Performance

Siemens HiPath ProCenter Multimedia

Building native mobile apps for Digital Factory

User Guide FOR TOSHIBA STORAGE PLACE

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

What Is Ad-Aware Update Server?

CSSEA Helpdesk User Guide

Websense Web Security Gateway: What to do when a Web site does not load as expected

Global Server Load Balancing

How to configure the Panda GateDefender Performa explicit proxy in a Local User Database or in a LDAP server

Networks and the Internet A Primer for Prosecutors and Investigators

NETWORKS AND THE INTERNET

How To Export Data From Exchange To A Mailbox On A Pc Or Macintosh (For Free) With A Gpl Or Ipa (For A Free) Or Ipo (For Cheap) With An Outlook 2003 Or Outlook 2007 (For An Ub

Internet Safety for Kids and Adults

Web Tap: Detecting Covert Web Traffic. Presented By: Adam Anthony

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.

Technical Guide for Remote access

Configuring Microsoft IIS 5.0 With Pramati Server

Remote Access and Control of the. Programmer/Controller. Version 1.0 9/07/05

Using over FleetBroadband

P&WC Portal Settings. 1) Portal Language Setting:

How-to setup a proxy in the cloud

So in order to grab all the visitors requests we add to our workbench a non-test-element of the proxy type.

Axapta Object Server MICROSOFT BUSINESS SOLUTIONS AXAPTA

Lab Conducting a Network Capture with Wireshark

Cyclope Internet Filtering Proxy

Installation Guide For Choic Enterprise Edition

IAS Portal Staff User Guide

Elluminate Live! Access Guide. Page 1 of 7

Building Java Servlets with Oracle JDeveloper

User Documentation Web Traffic Security. University of Stavanger

TIBCO Spotfire Metrics Prerequisites and Installation

CA APM Cloud Monitor. Scripting Guide. Release 8.2

Development of Open Source RESTful WHOIS. Haikuo Zhang

SurfCop for Microsoft ISA Server. System Administrator s Guide

CA Unified Infrastructure Management Server

A Reliable Low Bandwidth -based Communication Protocol

DOSarrest Security Services (DSS) Version 4.0

MSGCU SECURE MESSAGE CENTER

Aspera Connect User Guide

V Series Rapid Deployment Version 7.5

Pass Through Proxy. How-to. Overview:..1 Why PTP?...1

Elluminate Live! Access Guide. Page 1 of 7

Proxies. Chapter 4. Network & Security Gildas Avoine

IBM Aspera Add-in for Microsoft Outlook 1.3.2

Zimbra Connector for Outlook User Guide. Release 6.0

CSA Helpdesk User Guide

Content Distribution Networks (CDN)

Working with your NTU off campus

Understanding SofaWare Management Portal URL Filtering. S-box Solutions. Rolf Wagner

Tutorial: Load Testing with CLIF

Getting Started Guide

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12

Help. F-Secure Online Backup

SYSTEM DEVELOPMENT AND IMPLEMENTATION

Installation and Setup: Setup Wizard Account Information

A Guide to Getting Started with Successful Load Testing

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5

<Insert Picture Here> Oracle Web Cache 11g Overview

Northwestern University Dell Kace Patch Management

Zimbra Connector for Outlook User Guide. Release 6.0

Fast Innovation requires Fast IT

Checking Browser Settings, and Basic System Requirements for QuestionPoint

Configuring Network Load Balancing with Cerberus FTP Server

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

How To Install A New Database On A 2008 R2 System With A New Version Of Aql Server 2008 R 2 On A Windows Xp Server 2008 (Windows) R2 (Windows Xp) (Windows 8) (Powerpoint) (Mysql

On the Deficiencies of Active Network Discovery Systems

Created by: David Marriner. Updated by: Cliff Nicolai Version no: V1.2 Date Last Modified: November 2010

Anonymity on the Internet Over Proxy Servers

Deploying the BIG-IP System with Oracle E-Business Suite 11i

BITS-Pilani Hyderabad Campus CS C461/IS C461/CS F303/ IS F303 (Computer Networks) Laboratory 3

Zimbra Connector for Microsoft Outlook User Guide 7.1

AppLoader7. Windows Server 2008 Injector Optimization. Protocol Independent Load Testing

HTTP. Internet Engineering. Fall Bahador Bakhshi CE & IT Department, Amirkabir University of Technology

Java Secure Application Manager

Apache Traffic Server Extensible Host Resolution

How To Set Up An Openfire With Libap On A Cdd (Dns) On A Pc Or Mac Or Ipad (Dnt) On An Ipad Or Ipa (Dn) On Your Pc Or Ipo (D

Interpreting Web Analytics Data

Version 1.0 January Xerox Phaser 3635MFP Extensible Interface Platform

Intelligent Video Analytics. Server Installation Guide. - Windows - Linux

Secure Global Desktop (SGD)

HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS

CORE Enterprise on a WAN

Support to Reading Groups

Data Discovery on the Information Highway

FAQs for Oracle iplanet Proxy Server 4.0

Zimbra Connector for Microsoft Outlook User Guide. Network Edition 7.0

Best practice for SwiftBroadband


HP WebInspect Tutorial

McAfee Product Entitlement Definitions

Carisbrooke. End User Guide

Note that if at any time during the setup process you are asked to login, click either Cancel or Work Offline depending upon the prompt.

Transcription:

The System: Browsing the Web in Low- Connectivity Communities Bill Thies, Libby Levison, Saman Amarasinghe MIT Laboratory for Computer Science http://cag.lcs.mit.edu/tek

Web Browsing: Current Method

Web Browsing: Current Method 1. Connect to

Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply

Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply 3. Read through results

Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply 3. Read through results 4. If results bad, revise query and resend

Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply 3. Read through results 4. If results bad, revise query and resend

Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply 3. Read through results 4. If results bad, revise query and resend 5. If results good, click on site, wait for reply

Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply 3. Read through results 4. If results bad, revise query and resend 5. If results good, click on site, wait for reply

Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply 3. Read through results 4. If results bad, revise query and resend 5. If results good, click on site, wait for reply 6. Read through site

Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply 3. Read through results 4. If results bad, revise query and resend 5. If results good, click on site, wait for reply 6. Read through site 7. If site down or not useful, look for other sites

Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply 3. Read through results 4. If results bad, revise query and resend 5. If results good, click on site, wait for reply 6. Read through site 7. If site down or not useful, look for other sites

Web Browsing: Current Method What are the barriers to access? 1. High telephone fees 2. High fees 3. Low-Bandwidth 4. Low-Connectivity

Web Browsing: Current Method What are the barriers to access? 1. High telephone fees 2. High fees 3. Low-Bandwidth 4. Low-Connectivity Should minimize time online

Web Browsing: Current Method What are the barriers to access? 1. High telephone fees 2. High fees 3. Low-Bandwidth 4. Low-Connectivity Should minimize time online Should minimize data transfer

Web Browsing: Current Method What are the barriers to access? 1. High telephone fees Should minimize time online 2. High fees 3. Low-Bandwidth Should minimize data transfer 4. Low-Connectivity Current method is inappropriate!

Web Browsing: Approach Solution has two components:

Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results

Web Browsing: Approach Email Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through email, not http - Connect only to send/receive email, not to browse web

Web Browsing: Approach Email Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through email, not http - Connect only to send/receive email, not to browse web

Web Browsing: Approach Email Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through email, not http - Connect only to send/receive email, not to browse web

Web Browsing: Approach Email Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through email, not http - Connect only to send/receive email, not to browse web

Web Browsing: Approach Email Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through email, not http - Connect only to send/receive email, not to browse web

Web Browsing: Approach Email Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through email, not http - Connect only to send/receive email, not to browse web

Web Browsing: Approach Email Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through email, not http - Connect only to send/receive email, not to browse web

Web Browsing: Approach Email Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through email, not http - Connect only to send/receive email, not to browse web

Web Browsing: Approach Email Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through email, not http - Connect only to send/receive email, not to browse web

Web Browsing: Approach Email Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through email, not http - Connect only to send/receive email, not to browse web

Web Browsing: Approach Email Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through email, not http - Connect only to send/receive email, not to browse web : Time Equals Knowledge

Outline Protocol Details Rationale Server Details Current Status / Demo

Outline Protocol Details Rationale Server Details Current Status / Demo

Protocol Details

Protocol Details PROXY 0. Install proxy server on machine

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies 6. Administrator finds results in email and opens them

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies 6. Administrator finds results in email and opens them

Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies 6. Administrator finds results in email and opens them 7. Users can view results on future logins

Protocol Details PROXY Additional features 1. Accumulates digital reference library on client 2. Reliable email-based communication protocol

Outline Protocol Details Rationale Server Details Current Status / Demo

Rationale I: Decreased Cost Email accounts cheaper than web access Phone lines are cheaper, clearer, and more stable during off-peak hours Connection time is shorter User reads pages offline, not while connected Content is direct from, not a distant server Results are more compact due to Server Local web cache can prevent some searches

Rationale II: Improved Reliability Email reduces dependence on network Never need continuous path from client to server

Rationale II: Improved Reliability Email reduces dependence on network Never need continuous path from client to server

Rationale II: Improved Reliability Email reduces dependence on network Never need continuous path from client to server

Rationale II: Improved Reliability Email reduces dependence on network Never need continuous path from client to server

Rationale II: Improved Reliability Email reduces dependence on network Never need continuous path from client to server

Rationale II: Improved Reliability Email reduces dependence on network Never need continuous path from client to server

Rationale II: Improved Reliability Email reduces dependence on network Never need continuous path from client to server

Rationale II: Improved Reliability Email reduces dependence on network Never need continuous path from client to server

Rationale II: Improved Reliability Email reduces dependence on network Never need continuous path from client to server

Rationale II: Improved Reliability Email reduces dependence on network Never need continuous path from client to server

Rationale II: Improved Reliability Email reduces dependence on network Never need continuous path from client to server

Rationale II: Improved Reliability Email reduces dependence on network Never need continuous path from client to server

Rationale III: Improved Convenience Sending email at night: Frees telephone for other daytime uses Avoids daytime traffic in connecting to Offline viewing of results is quick and reliable More people can use computer during daytime More relevant results thanks to server

Outline Protocol Details Rationale Server Details Current Status / Demo

Server Details Extensive server-side processing Optimized for bandwidth, not speed Gathers pages from other search engines Filtering Removes duplicate or similar pages Looks for paragraph text, not just links Dither or remove images Compresses the result set Keeps track of each Avoids sending a page twice to a given machine Enables more intelligent page ranking

Outline Protocol Details Rationale Server Details Current Status / Demo

Status Fully-functional prototype of system Implemented in Java Looking for s by summer 2002 Future Work More intelligent query-builder on client Consider multi-language interfaces Demo