Supporting Legacy Applications over i 3
نویسندگان
چکیده
Providing support for legacy applications is a crucial component of many overlay networks, as it allows end-users to instantly benefit from the functionality introduced by these overlays. This paper presents the design and implementation of a proxy-based solution to support legacy applications in the context of the i3 overlay [24]. The proxy design relies on an address virtualization technique which allows the proxy to tunnel the legacy traffic over the overlay transparently. Our solution can preserve IP packet headers on an end-to-end basis, even when end-host IP addresses change, or when endhosts live in different address spaces (e.g., behind NATs). In addition, our solution allows the use of human-readable names to refer to hosts or services, and requires no changes to applications or operating systems. To illustrate how the proxy enables legacy applications to take advantage of the overlay (i.e., i3) functionality, we present four examples: enabling access to machines behind NAT boxes, secure Intranet access, routing legacy traffic through Bro, an intrusion detection system, and anonymous web download. We have implemented the proxy on Linux and Windows XP/2000 platforms, and used it over the i3 service on PlanetLab over a three month period with a variety of legacy applications ranging from web browsers to operating system-specific file sharing.
منابع مشابه
Transparent QoS Support of Network Applications Using Netlets
This paper describes a method for providing QoS support to legacy (non-QoS aware) network applications. This facility allows such applications to request desired QoS levels from QoS supporting networks and thus helps to increase their lifespan and performance levels. We use mobile-agent components called Netlets for this purpose. Netlets are nomadic components that roam in a network providing p...
متن کاملA Cognitive Digital Home Framework using Admission Control and Resource Distribution
The advances in radio design and wireless networking, along with the growth of multimedia home entertainment technologies, is creating the concept of a cognitive digital home requiring spectrum coexistence of various devices and networks of networks. A framework for resource allocation in a Cognitive Digital Home (CDH) with a multiplicity o f radio access technologies (RAT) such as cognitive ra...
متن کاملConfiguring Business Objects from Legacy Systems
When developing applications based on business objects and processes it is important to address two important factors: requirements for change so that business information systems can evolve over time and the linking of business objects with legacy information systems. The common aim of these two requirements is the ability to smoothly combine modern and legacy business components within a runn...
متن کاملOCALA: An Architecture for Supporting Legacy Applications over Overlays
The ever increasing demand of new applications has led researchers to propose new network architectures that address limitations of the current Internet. Given the rigidity of the Internet today, overlay networks are used to implement such architectures, in the hope of gaining a large user base. Despite sustained efforts to test and deploy new network architectures (on testbeds such as Planetla...
متن کاملReverse Engineering: Why and How to Reverse Engineer Software
Today especially large organizations are not only faced with the problem of replacing their information systems with completely new ones, but they have to maintain and to gain control over their legacy applications. Reverse engineering provides the means for this purpose supporting in recapturing lost information, restructuring complex systems or transforming old systems to a new and more maint...
متن کامل