GATEWAY TRAFFIC COMPRESSION



Similar documents
Cisco Application Networking for BEA WebLogic

Cisco Application Networking for IBM WebSphere

Frequently Asked Questions

Network Services Internet VPN

VoIP QoS. Version 1.0. September 4, AdvancedVoIP.com. Phone:

Understand Wide Area Networks (WANs)

Requirements of Voice in an IP Internetwork

The Next Generation Network:

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Security issues in Voice over IP: A Review

4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19

Cost Effective Deployment of VoIP Recording

Optimizing Converged Cisco Networks (ONT)

WAN OPTIMIZATION. Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc.

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Basics of Internet Security

Cisco Integrated Services Routers Performance Overview

Chapter 5. Data Communication And Internet Technology

Cisco WAAS Optimized for Citrix XenDesktop

Glossary of Terms and Acronyms for Videoconferencing

IP Telephony Deployment Models

WAN Traffic Management with PowerLink Pro100

VegaStream Information Note Considerations for a VoIP installation

Combining Voice over IP with Policy-Based Quality of Service

Packet Level Authentication Overview

Contents. Specialty Answering Service. All rights reserved.

Performance Evaluation for VOIP over IP and MPLS

How To Configure Syslog over VPN

ADVANTAGES OF AV OVER IP. EMCORE Corporation

Layer 3 Network + Dedicated Internet Connectivity

Clearing the Way for VoIP

VoIP Bandwidth Considerations - design decisions

A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform

Virtual Leased Line (VLL) for Enterprise to Branch Office Communications

Voice over IP (VoIP) for Telephony. Advantages of VoIP Migration for SMBs BLACK BOX blackbox.com

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Steelcape Product Overview and Functional Description

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS

Voice Over IP Performance Assurance

Quality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008

Architecture of distributed network processors: specifics of application in information security systems

A Systemfor Scanning Traffic Detection in 3G WCDMA Network

Cisco Application Networking for Citrix Presentation Server

NETWORK ISSUES: COSTS & OPTIONS

Truffle Broadband Bonding Network Appliance

Cisco Networks (ONT) 2006 Cisco Systems, Inc. All rights reserved.

Intel DPDK Boosts Server Appliance Performance White Paper

An Introduction to VoIP Protocols

Leased Line + Remote Dial-in connectivity

Infor Web UI Sizing and Deployment for a Thin Client Solution

White Paper: Virtual Leased Line

Security and Risk Analysis of VoIP Networks

Technical Glossary from Frontier

Optimizing Performance for Voice over IP and UDP Traffic

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)

Region 10 Videoconference Network (R10VN)

Protocols. Packets. What's in an IP packet

AT&T Connect Video conferencing functional and architectural overview

Technical papers Virtual private networks

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Bonded Internet. Bonded is Better! AllCore Communications... Bonded Internet Features: Who is AllCore Communications?

Integration Guide. EMC Data Domain and Silver Peak VXOA Integration Guide

Voice over IP Technologies

Network Access Security. Lesson 10

WhitePaper: XipLink Real-Time Optimizations

Secure VoIP for optimal business communication

L-Series LAN Provisioning Best Practices for Local Area Network Deployment. Introduction. L-Series Network Provisioning

An Active Packet can be classified as

Perspective on secure network for control systems in SPring-8

Getting Started with RemoteFX in Windows Embedded Compact 7

Wireless Video Best Practices Guide

Fundamentals of Network Security Graphic Symbols

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Chapter 3 ATM and Multimedia Traffic

WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO

A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS

Failsafe WAN, VoIP, IVRS & LAN connectivity

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Open vswitch and the Intelligent Edge

Technical Bulletin. Enabling Arista Advanced Monitoring. Overview

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Building Secure Network Infrastructure For LANs

Presented by Philippe Bogaerts Senior Field Systems Engineer Securing application delivery in the cloud

How To Understand The Technical Specifications Of Videoconferencing

A Study of Network Security Systems

Analysis and Simulation of VoIP LAN vs. WAN WLAN vs. WWAN

Cisco CCNP Optimizing Converged Cisco Networks (ONT)

A Dell Technical White Paper Dell PowerConnect Team

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family

5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.

Release the full potential of your Cisco Call Manager with Ingate Systems

Application Notes for Configuring a SonicWALL VPN with an Avaya IP Telephony Infrastructure - Issue 1.0

Content Inspection Director

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

Next-Generation Firewalls: Critical to SMB Network Security

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Interconnection Networks. Interconnection Networks. Interconnection networks are used everywhere!

Transcription:

GATEWAY TRAFFIC COMPRESSION Name: Devaraju. R Guide Name: Dr. C. Puttamadappa Research Centre: S.J.B. Institute of Technology Year of Registration: May 2009 Devaraju R 1

1. ABSTRACT: In recent years with an explosive growth in the number of users on the Internet, bandwidth demand has grown tremendously. Various files are transferred across the network mainly from servers to client computers. Most existing network infrastructures cannot meet the bandwidth demand. This in turn increases the retrieval latency. In the corporate world where the sharing of data needs to be done at a faster rate and without any delay, they adopt the dedicated lines across their branches called Leased Lines. A leased line is a symmetric telecommunications line connecting two locations, these lines are very expensive based on the speed and bandwidth they offer. With Data Compression and Decompression techniques, the process of encoding the data using fewer bits uses specific encoding scheme. Compressed data communication works when both the sender and receiver of the information understand this encoding scheme. The design of data compression technique involve trade-offs between various factors like the degree of compression, the amount of distortion removed and the computational resources required to compress and decompress the data. Gateway device network traffic compression defines and implements how the compression/decompression daemon will intercept incoming ingress extract the network packet payload, compresses and routes the same to its egress, how it affects the retrieval latency, how it influences the traffic, reduces the collision across data packets, reduces the loss of Network packets containing some data in the payload. This project describes the Implementation of Lossless coding techniques. The objective of this project is to develop software architecture to incorporate the Gateway Network Payload Compression feature in a Core Layer Network Device. Devaraju R 2

The operating speed of the corporate LAN will depend on the link speed provided by the third party network service providers. But still sometimes this speed will not be always guaranteed or even if it is guaranteed will be affected by various reasons such as: Unwanted broadcasts packets or keep-alive packets. Malicious packets generated by the spy-ware software existing in the internal corporate LAN or the same pumped from an un-trusted outside network. Sudden bursty nature of the traffic. Less link speed than what is required. Improper routing/switching strategy. Nature of the packets (i.e) more data downloads/uploads. 2. OBJECTIVE: The objective of this project is to develop software architecture to build a WAN Network Traffic Acceleration Framework on a Linux Box implemented in C. The initial prototype version is written in user-space, but later the actual core mechanism would be supported in the kernel space. To control the same, a thin user-space application would be provided which provides both Command-Line-Interface (CLI) and Web based Graphical-User-Interface(GUI) to the users. The users can configure, fine-tune the operations in the actual Traffic Compressor kernel core modules using this user-space application also they can monitor the performance and possibly get the run-time statistics, charts/graphs of the Traffic Squeezer operation with the corresponding traffic which it optimizes and sends through it. Devaraju R 3

3. METHODOLOGY: To get connectivity between various branches of the organization, a corporate will need a leased line links to their terminating/edge gateways. The gateway devices connect to the service provider s leased line circuits and get connected to their remote branch offices. These Leased bandwidth prices are quite high, compared to dial up bandwidth of comparable size. Entry level annual port prices are also high, so that this access method is only feasible beyond a fairly high threshold level. Permanent connectivity to the Net exposes the organization to a variety of threats including hacking, malicious code including active vandals, viruses, Trojan Horses, macros, denial of service attacks etc. The Leased Bandwidth allotted for our corporate network is just 512kbps to 2Mbps. The data which is sent can be compressed in this scenario and sent through the same less capacity leased line. Since the payload is compressed, the user will get more effective use of the less available bandwidth. So, with this same link speeds the users will get a better performance. Typically, such a deployment looks as shown in the below picture. Network Service Provider (Leased Line) Network Payload [Site A] [Site B] Figure 1 Existing scenario Devaraju R 4

Network Service Provider (Leased Line) Compressed Network Payload Tunnel [Site A] Traffic Compression Device Traffic Compression Device [Site B] Figure 2 Scenario with Traffic Compression Device To achieve maximum compression ratio, Traffic Compressor proposes a design in which the compression of the network payload have been compressed with more than one loss-less compression algorithms. Since the current design includes couple of compression methods done in sequence, the design of this specific packet processing engine can be called as a Multi-Stage cascaded Compression/Decompression Engine. 3.1 Tools: LabVIEW, is a platform and development environment for a visual programming language from National Instruments. The graphical language is named "G". LabVIEW provides an extensive support for accessing instrumentation hardware. Drivers and abstraction layers for many different types of instruments and buses are included or are available for inclusion. These present themselves as graphical nodes. The abstraction layers offer standard software interfaces to communicate with hardware devices. The provided driver interfaces save program development time. Devaraju R 5

4. REFERENCES: 5.[1] Quanping Huang, Rongzheng Zhou and Zhiliang Hong, Low Memory and Low complexity VLSI Implementation of JPEG 2000 Codec, IEEE Transactions on Consumer Electronics, Vol. 50, May 2004, pp. 638-646. [2] Kishore Andra, Chaitali Chakrabarti and Tinku Acharya, A High-Performance JPEG 2000 Architecture, IEEE Transactions on Circuits and Systems for Video Techonology, Vol. 13, NO. 3, March2003, pp. 209-218. [3] D. D. Taubman and M. W. Marcellin, JPEG 2000 Image Compression Fundamentals, Standards and Practice, Kluwer Academic Publishers, 2002. [4] C. Christopoulow, A. Skodras and T. Ebrahimi, The JPEG 2000 Still Image Coding System: An Overview, IEEE transactions on Consumer Electronics, Vol. 46, No. 4, November 2000, pp. 1103-1127. [5] Majid Rabbani, Rajan Joshi, An Overview of the JPEG 2000 Still Image Compression Standard, Signal Processing: Image Communication, Vol. 17, 2002, pp. 3-48. [6] E. Ordentlich, D. Taubman, M. Weinberger, G. Seroussi, and M. Marcellin, Memory Efficient Scalable Line-Based Image Coding, Pmc. IEEE Data Compression Conference (Snowbird). March 1999, pp. 218-227. [7] JPEG 2000 Committee Drafts, available online at: http://www.jpeg.org/ Devaraju R 6