Doc.: IEEE 802.11-03/535r0 Submission July 2003 Khurram Kazi ECDD Tech, Jeff Heath Hughes Networks Slide 1 Lossless Data Compression: Data Compression.

Slides:



Advertisements
Similar presentations
CAUSES & CURE OF LATENCY IN THE INTERNET TELEPHONY DR. OLUMIDE SUNDAY ADEWALE Dept of Industrial Math & Computer Science Federal University of Technology.
Advertisements

Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Chapter 7 Data Link Layer
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Four Police Technology Networks.
© 2006 Cisco Systems, Inc. All rights reserved. Module 4: Implement the DiffServ QoS Model Lesson 4.8: Understanding WAN Link Efficiency Mechanisms.
Requirements for IP/UDP/RTP header compression To become Editor: Mikael Degermark Input: Charter, 3GPP requirements, contribution from 3G.IP, Editors central.
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
1 Chapter 8 Local Area Networks - Internetworking.
Introduction To Networking
Efficient Internet Traffic Delivery over Wireless Networks Sandhya Sumathy.
V1.00 © 2009 Research In Motion Limited Introduction to Mobile Device Web Development Trainer name Date.
Local Area Networks Part II. 2 Introduction Many times it is necessary to connect a local area network to another local area network or to a wide area.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Definition  A new Technology  Fixed size packets called CELLS  Streamlined: minimal error and flow control  Small cells compared to other technologies.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
CS 218 F 2003 Nov 3 lecture:  Streaming video/audio  Adaptive encoding (eg, layered encoding)  TCP friendliness References: r J. Padhye, V.Firoiu, D.
CIS679: RTP and RTCP r Review of Last Lecture r Streaming from Web Server r RTP and RTCP.
The generation, storage, and movement of information are central to managing an enterprise’s business processes As a result, businesses must ensure.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Chapter 4 Computer Networks – Part 1
Business Data Communications, Stallings 1 Chapter 1: Introduction William Stallings Business Data Communications 6 th Edition.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Characteristics of Communication Systems
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Cisco – Semester 1 – Chapter 2 Network Fundamentals And The OSI Model.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
 What is a network and how does it function with computer systems? It is a collection of computers and devices that communicate with one another over.
October 4-7, 2004 Los Angeles, CA VoWLAN Trends and Opportunities Kamal Anand Vice President Marketing Meru Networks
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
Chapter 2 Wide Area Network Technologies. What is a WAN ? The set of connecting links between local area networks These links can be made using: –Public.
Presented to: By: Date: Federal Aviation Administration Basic Information About the XASDI Feed A Telcon with Vendors ASDI Vendors and Users FAA 18 May.
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
© Sarvesh 25 November 2015Cross-layer optimization for VoIP over WLAN125 November Cross Layer optimization for VoIP over WLAN [Yuan Liu Zhu] A Presentation.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
WEBMASTER 3224 PHYSICAL VS LOGICAL COMPONENTS OF THE INTERNET AND NETWORKS.
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Communicating over the Network Network Fundamentals – Chapter 2.
Doc.: IEEE /345r0 Submission May 2002 Albert Young, Ralink TechnologySlide 1 Enabling Seamless Hand-Off Across Wireless Networks Albert Young.
CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY? Karthik Kumar and Yung-Hsiang Lu, Purdue University IEEE Software, 2010.
Doc.: IEEE / Submission March 2013 Juho Pirskanen, Renesas Mobile CorporationSlide 1 Discussion On Basic Technical Aspects for HEW Date:
Doc.: IEEE /230 Submission May 2001 William Arbaugh, University of MarylandSlide 1 An Inductive Chosen Plaintext Attack against WEP/WEP2 William.
1 0-Byte Header Reduction Mechanism Fundamentals.
Doc.: IEEE /0764r0 Submission July 2008 Alex Ashley, NDS LtdSlide 1 Using packet drop precedence for graceful degradation Date: Authors:
Digital Planet: Tomorrow’s Technology and You Chapter 8 Networking and Digital Communication Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
The Features of Wanos Networks Wanos is Free Wan Optimization Software Appliances with Wan Acceleration, Cross Protocol Deduplication, Compression, Quality.
Virtual Private Networks
Packet Switching Networks & Frame Relay
Providing Teleworker Services
2200 Mission College Blvd., Santa Clara, CA 95054, USA
OCR Computing for GCSE © Hodder Education 2011
Packet Sniffing.
ATTACKS ON WINZIP ENCRYPTION
Network Virtualization
Virtual Private Network
File Transfer Issues with TCP Acceleration with FileCatalyst
System Models and Networking Chapter 2,3
2200 Mission College Blvd., Santa Clara, CA 95054, USA
OCR GCSE Computing © Hodder Education 2013 Slide 1
Reducing Overhead in Active Scanning
Presentation transcript:

doc.: IEEE /535r0 Submission July 2003 Khurram Kazi ECDD Tech, Jeff Heath Hughes Networks Slide 1 Lossless Data Compression: Data Compression can Significantly Increase Virtual Bandwidth in Wireless Networks Khurram Kazi Jeff Heath

doc.: IEEE /535r0 Submission July 2003 Khurram Kazi ECDD Tech, Jeff Heath Hughes Networks Slide 2 Will the bandwidth supported by the existing and future wireless standards be enough? Once the fundamental issues of wireless networks’ security and mobility are addressed, it is expected that the wireless: –LANs and WANs will be widely deployed –Hotspots will be popping up at the airports, favorite hangouts, university campuses, trailer parks, and numerous other areas –More and more wireless networks will find their way into corporate infrastructure –Security, mobility, etc., will increasingly erode the amount of wireless bandwidth available for data.

doc.: IEEE /535r0 Submission July 2003 Khurram Kazi ECDD Tech, Jeff Heath Hughes Networks Slide 3 Complimentary Solution to Optimized Air Interface Air interface due to the technology and physics allows certain data rate throughputs. Using complimentary techniques of lossless data compression the virtual bandwidth of wireless networks can be significantly increased Neutralize the affects of overhead introduced by security and mobility related functions Allows more users to send more data traffic at the hotspots where the wireless channel is shared.

doc.: IEEE /535r0 Submission July 2003 Khurram Kazi ECDD Tech, Jeff Heath Hughes Networks Slide 4 Requirements for Data Compression in a Wireless Packet Network Compression must be lossless. Should execute efficiently with excellent compression when processing individual IP packets (Layer 1, etc.) Minimal latency Should not increase the packet size if uncompressible data is encountered –Use a bit to indicate if payload of the packet is already compressed (unused bit in header field) –Test compression ratio after 200 bytes or so and abort compression on the packet if not successful to that point Should be transparent to the end user once it is enabled Compression must be performed before data encryption

doc.: IEEE /535r0 Submission July 2003 Khurram Kazi ECDD Tech, Jeff Heath Hughes Networks Slide 5 Standardized and Widely Used Compression algorithms Adopted by Standards Bodies and Forums to increase data throughput –ITU-T V.42bis (LZW) primarily used for modem applications –ITU-T V.44 (LZJH) adopted for use in modems but originally designed for packet networks –ANSI X3.241 (LZS) Stac algorithm used in packet networks ZIP (PKZIP, WinZIP, Deflate) two pass algorithms used primarily for compression of a file prior to and separate from network handling

doc.: IEEE /535r0 Submission July 2003 Khurram Kazi ECDD Tech, Jeff Heath Hughes Networks Slide 6 Does it make sense to introduce compression in wireless networks Typical user in corporate wireless networks –Web access – –Instant message –Application software –VPN Social/Home-user –Web access – –Instant messaging

doc.: IEEE /535r0 Submission July 2003 Khurram Kazi ECDD Tech, Jeff Heath Hughes Networks Slide 7 Does it make sense to introduce compression in wireless networks Web access, s, Instant messaging, application text data; the major source of traffic traversing wireless network – All have a great deal of redundancy in the data making them ideal for lossless compression Compression before data encryption offsets the encryption burden by reducing the amount of data encrypted and time to encrypt Compression enhances encryption efficiency and security by removing redundancy from the plaintext and thus thwarting cryptanalysis.

doc.: IEEE /535r0 Submission July 2003 Khurram Kazi ECDD Tech, Jeff Heath Hughes Networks Slide 8 Compression ratios of HTML files using various compression algorithms (original file size/compressed file)

doc.: IEEE /535r0 Submission July 2003 Khurram Kazi ECDD Tech, Jeff Heath Hughes Networks Slide 9 Compression ratios of HTML files using various compression algorithms (original file size/compressed file)

doc.: IEEE /535r0 Submission July 2003 Khurram Kazi ECDD Tech, Jeff Heath Hughes Networks Slide 10 Compression ratios of HTML files using various compression algorithms (original file size/compressed file)

doc.: IEEE /535r0 Submission July 2003 Khurram Kazi ECDD Tech, Jeff Heath Hughes Networks Slide 11 Comparisons between V.44 and WinZIP (original frame size/compressed frame) Sample frames captured while accessing

doc.: IEEE /535r0 Submission July 2003 Khurram Kazi ECDD Tech, Jeff Heath Hughes Networks Slide 12 Virtual Bandwidth

doc.: IEEE /535r0 Submission July 2003 Khurram Kazi ECDD Tech, Jeff Heath Hughes Networks Slide 13 Side benefits of data compression The compression will enhance encryption efficiency and security by minimizing the amount of data to be encrypted, and by removing redundancy from the plaintext and thus thwarting cryptanalysis.

doc.: IEEE /535r0 Submission July 2003 Khurram Kazi ECDD Tech, Jeff Heath Hughes Networks Slide 14 Conclusion Introducing lossless data compression can significantly increase the virtual bandwidth in wireless networks Based on the traffic patterns Compression ratios up to 7:1 have been reported. Our preliminary analysis shows that on an average ratios of 2:1 are seen Enhances the Encryption efficiencies Seriously consider introduction of V.44 or equivalent compression algorithm as a possible compression scheme for networks to achieve significant bandwidth gains (compliments optimized air interface schemes)