1 E-mail over low bandwidth networks Indika Wasala Sasanka Usgoda Arachchi Dr. Gihan Dias.

Slides:



Advertisements
Similar presentations
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 22 Simple Mail Transfer Protocol (SMTP)
Advertisements

Web 2.0 Programming 1 © Tongji University, Computer Science and Technology. Web Web Programming Technology 2012.
1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
1 IDX. 2 What you will learn: What IDX is Why its important How to use it Tips and tricks Introduction Q & A.
Chapter 1 The Study of Body Function Image PowerPoint
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
Security Issues In Mobile IP
1 IEEE Media Independent Handoff Overview of services and scenarios for 3GPP2 Stefano M. Faccin Liaison officer to 3GPP2.
1 Hyades Command Routing Message flow and data translation.
19 Copyright © 2005, Oracle. All rights reserved. Distributing Modular Applications: Developing Web Services.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Introduction to HTML, XHTML, and CSS
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Year 6 mental test 10 second questions
Communicating over the Network
Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
INTERNET PROTOCOLS Class 9 CSCI 6433 David C. Roberts Entire contents copyright 2011, David C. Roberts, all rights reserved.
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
Chapter 1: Introduction to Scaling Networks
1 The phone in the cloud Utilizing resources hosted anywhere Claes Nilsson.
GETTING STARTED WITH WINDOWS COMMUNICATION FOUNDATION 4.5 Ed Jones & Grey Guindon.
Campaign Overview Mailers Mailing Lists
Yunling Wang VoIP Security COMS 4995 Nov 24, 2008 XCAP The Extensible Markup Language (XML) Configuration Access Protocol (XCAP)
ABC Technology Project
EU market situation for eggs and poultry Management Committee 20 October 2011.
MySQL Access Privilege System
LFCDS SkyMail & SkyDrive Full Student Orientation
© 2005 AT&T, All Rights Reserved. 11 July 2005 AT&T Enhanced VPN Services Performance Reporting and Web Tools Presenter : Sam Levine x111.
1 ITSS This overview deck contains two sections. Please use the links below to navigate –How to Register for ITSS Application AccessHow to Register for.
VOORBLAD.
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
IONA Technologies Position Paper Constraints and Capabilities for Web Services
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I IP ADDRESSING AND SUBNETS Derived From CCNA Network Fundamentals.
31242/32549 Advanced Internet Programming Advanced Java Programming
© 2012 National Heart Foundation of Australia. Slide 2.
Services Course Windows Live SkyDrive Participant Guide.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
Getting Familiar with Web Pages 1 2 The Internet Worldwide collection of interconnected computer networks that enables businesses, organizations, governments,
Macromedia Dreamweaver MX 2004 – Design Professional Dreamweaver GETTING STARTED WITH.
1 Early Intervention Central Billing Office Electronic Claims Submission.
The Internet–Illustrated Introductory, Fourth Edition
25 seconds left…...
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
® Microsoft Office 2010 Browser and Basics.
Presentation 7 part 2: SOAP & WSDL.
Januar MDMDFSSMDMDFSSS
We will resume in: 25 Minutes.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Intracellular Compartments and Transport
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 9 TCP/IP Protocol Suite and IP Addressing.
PSSA Preparation.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Profile. 1.Open an Internet web browser and type into the web browser address bar. 2.You will see a web page similar to the one on.
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
HTML Concepts and Techniques Fourth Edition Project 2 Creating and Editing a Web Page.
October 12, 2004IETF 60,5 – Vancouver, BC draft-meylan-imap-statistics-lemonade-00.txt October 12 th 2004 Lemonade Interim Meeting Arnaud Meylan Randall.
Electronic Mail. Client Software and Mail Hosts –Client PC has client software that communicates with user’s mail host –Mail hosts deliver.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 8 Omar Meqdadi Department of Computer Science and Software Engineering University of.
1 WWW. 2 World Wide Web Major application protocol used on the Internet Simple interface Two concepts –Point –Click.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
Internet Applications (Cont’d) Basic Internet Applications – World Wide Web (WWW) Browser Architecture Static Documents Dynamic Documents Active Documents.
How HTTP Works Made by Manish Kushwaha.
Web Caching? Web Caching:.
Presentation transcript:

1 over low bandwidth networks Indika Wasala Sasanka Usgoda Arachchi Dr. Gihan Dias

2 Contents Objective Research Problem Previous Work at UoM Other Related work Current Project Future Work References

3 Objective To optimize communication over Low Bandwidth networks.

4 Problem Dialup internet connections in rural areas. ADSL connections with shared bandwidth. Expensive Leased Lines. CDMA/GPRS connections. Download delays  Large attachments

5 Previous work at UoM On-the-fly Inter-proxy Data Compression for Web Access - Pradeepa Gurusinghe, Gihan Dias, Vishaka Nanayakkara A Market-Based Approach to Control Web Bandwidth Usage - Chamara Dissanayake, Gihan Dias Dynamic Bandwidth Negotiation among Web Proxies - Sumith Gamage, Gihan Dias

6 Other Related Work draft-ietf-lemonade-compress-04lemonade  COMPRESS extension  IMAP Connection is compressed effectively and efficiently. to reduce the bandwidth usage of IMAP  Commands CAPABILITY –Response COMPRESS=DEFLATE COMPRESS DEFLATE –Response OK DEFLATE active

7 Current Project over low bandwidth networks

8 Solution IMAP proxy server IMAP Proxy client Legacy client client IMAP Server IMAP Proxy server server Low bandwidth network andproxy client optimize communication over low bandwidth connection. to

9 Scope IMAP Proxy client functions  Defining filter rule set  Assignment of priorities to s.  Compression of IMAP requests  Decompression of IMAP responses  Sending decompressed responses to client  Sending compressed requests to server IMAP Proxy client Legacy client client

10 Scope cont.. IMAP Proxy Server functions  filtering  Selecting a pre-fetch model  Compression of IMAP responses Different compressors for different content-types  Decompression of IMAP requests and sending to IMAP server.  Spam filtering IMAP Server IMAP Proxy server server

11 Solution Components Mail server : qmail ( IMAP Server : binc imap ( IMAP proxy : imapproxy ( All are open source components.

12 Proxy Client Configuration Filtering Rules  Configured in proxy client  Using a simple UI  Using config file  1 0

13 Proxy Client Configuration contd.. Priorities and Pre-fetching  Priority 1 : Pre-fetch whole message  Priority 2 : Pre-fetch first 1 KB of the message  Priority 3 : Pre-fetch only the header information including attachment type if there are any.  Priority 4 : Delete messages

14 Pre-fetching Static  Pre-fetch at night or when the link is idle Dynamic  While previous message / first part of message is being read

15 IMAP Proxy server Operation Client Connects Is Link idle ? Get All unseen UIDs and put them into a list Process Client Requests NO YES

16 NO IMAP Proxy server Operation Contd.. Download user rule configuration into proxy server For each UID in list get header and check whether any match is found in rules config. Assign default priority =3 #Format of a rule 0 Check Priority YES

17 IMAP Proxy server Operation Contd.. Priority = 1  Check for compression bit for images  Compress or leave image in original form  Compress text/html part  Send whole to proxy client

18 IMAP Proxy server Operation Contd.. Priority = 2  Check for compression bit for images  Compress or leave image in original form  Store attachments  Generate a URLs for attachments  Append URLs to the end of  Get 1 st KB of the  Append a URL to next KB  Compress and send to proxy client

19 IMAP Proxy server Operation Contd.. Priority = 3  Check for compression bit for images  Compress or leave image in original form  Leave any other attachment in original form  Compress header  Send header to proxy client

20 IMAP Proxy server Operation Contd.. Priority = 4  Delete  Remove UID from the list

21 IMAP Proxy client operation Client Connects to proxy client box will be populated with the headers of pre -fetched s Client fetches an Checks the priority of the requested uncompreses prefetched headers

22 IMAP Proxy client operation contd.. Priority = 1  Uncompress and Send pre-fetched mail to client  Check priority of next  If 3 start fetching next from server  If priority is 1 or 2 check priority of next

23 IMAP Proxy client operation contd.. Priority = 2  Uncompress and Send pre-fetched part to client  Start fetching next part from the server  If end of mail check priority of next  If 3 start fetching next from server  If priority is 1 or 2 check priority of next

24 IMAP Proxy client operation contd.. Priority = 3  If it was pre-fetched, uncompress and send to client  If not fetch from server, uncompress and send to client  Check priority of next  If 3 start fetching next from server  If priority is 1 or 2 check priority of next

25 Future Work Caching of attachments  For future reuse Different compression algorithms for different content types

26 References RFC Internet Message Access Protocol - Version 4rev1 RFC IMAP4 Implementation Recommendations RFC IMAP4 Binary Content Extension Arnt Gulbrandsen, draft-ietf-lemonade-compress-04 Bruce Zenel, A general purpose proxy filtering mechanism applied to the mobile environment Pradeepa Gurusinghe, Vishaka Nanayakkara, Gihan Dias, On-the- fly Inter-proxy Data Compression for Web Access Chamara Disanayake & Gihan Dias, A Market-Based Approach to Control Web Bandwidth Usage Qmail manual, Binc IMAP, 8bitMIME - MIME - Zlib -

27 On-the-fly Inter-proxy Data Compression for Web Access Objective  good web access over a low bandwidth link. Solution  two proxy servers Operation  Data is compressed at the upstream proxy and decompressed at the downstream proxy.  Different compressors for different content types.

28 Content TypeCompression technique Text based (html, css,text)Gzip (gzip library) Jpeg imagesJpeg compression library http header compressionGzip with preset dictionary Other features  Pre opened connections On-the-fly Inter-proxy Data Compression for Web Access Compression algorithms used

29 Lemonade  Internet submission  Transport  retrieval protocols  platforms with constrained resources  communications links with high latency or limited bandwidth.

30 A Market-Based Approach to Control Web Bandwidth Usage Problem  limited bandwidth and unequal utilization of available bandwidth  No priority for critical applications Solution – Modified Squid Proxy  Set User’s Bandwidth according to the User Request  Keeps individual user’s web usage information  Calculate the cost of service on current demand and update user’s account

31 IMAPv4rev1 – rfc3501 Method of accessing electronic mail  kept on a (possibly shared) mail server. It permits to access remote message stores as if they were local. Good for mobile users TCP port used – 143 Supports partial message downloads Great User control over downloading

32 Target Group Users/organizations with low bandwidth internet connections.  Home Users  Small Businesses  Schools Wireless Users  CDMA  GPRS