This file was created by the TYPO3 extension
bib
--- Timezone: UTC
Creation date: 2025-03-19
Creation time: 13-21-37
--- Number of references
3
inproceedings
200605NSDIOCALA
OCALA: An Architecture for Supporting Legacy Applications over Overlays
2006
In order for overlays and new network architectures to gain real user acceptance, users should be able to leverage overlay functionality without any modifications to their applications and operating systems. We present our design, implementation, and experience with OCALA, an overlay convergence architecture that achieves this goal. OCALA interposes an overlay convergence layer below the transport layer. This layer is composed of an overlay independent sub-layer that interfaces with legacy applications, and an overlay dependent sub-layer that delivers packets to the overlay. Unlike previous efforts, OCALA enables: (a) simultaneous access to multiple overlays (b) communication between hosts in different overlays (c) communication between overlay hosts and legacy hosts (d) extensibility, allowing researchers to incorporate their overlays into OCALA. We currently support five overlays, i3 [32], RON [1], HIP [19], DOA [39] and OverDoSe [31] on Linux, Windows XP/2000 and Mac OS X. We (and a few other research groups and end-users) have used OCALA for over a year with many legacy applications ranging from web browsers to remote desktop applications.
San Jose, California
USENIX / ACM
Proceedings of 3rd ACM Sigcomm/ACM Sigops Symposium on Networked Systems Design and Implementation (NSDI 2006)
ACM
Dilip AJoseph
KarthikLakshminarayanan
IonStoica
KlausWehrle
inproceedings
200410acmmultimediai3composition
Support for Service Composition in i3
2004
http://i3.cs.berkeley.edu
New York, USA
Proceedings of ACM Multimedia 2004
ACM
KarthikLakshminarayanan
IonStoica
KlausWehrle
techreport
200606i3proxytechreport
Supporting Legacy Applications over i3
2004
UCB/CSD-04-1342
Providing support for legacy applications is a crucial component of many overlay networks, as it allows end-users to instantly benefit from the functionality introduced by these overlays. This paper presents the design and implementation of a proxy-based solution to support legacy applications in the context of the i3 overlay [24]. The proxy design relies on an address virtualization technique which allows the proxy to tunnel the legacy traffic over the overlay transparently. Our solution can preserve IP packet headers on an end-to-end basis, even when end-host IP addresses change, or when endhosts live in different address spaces (e.g., behind NATs). In addition, our solution allows the use of human-readable names to refer to hosts or services, and requires no changes to applications or operating systems. To illustrate how the proxy enables legacy applications to take advantage of the overlay (i.e., i3) functionality, we present four examples: enabling access to machines behind NAT boxes, secure Intranet access, routing legacy traffic through Bro, an intrusion detection system, and anonymous web download. We have implemented the proxy on Linux andWindows XP/2000 platforms, and used it over the i3 service on PlanetLab over a three month period with a variety of legacy applications ranging from web browsers to operating system-specific file sharing.
http://i3.cs.berkeley.edu
UCB, Berkeley, USA
University of California at Berkeley
Technical Report
JayanthkumarKannan
AyumuKubota
KarthikLakshminarayanan
IonStoica
KlausWehrle