Information Security Laboratory Assignment No. 08 Proxy Server Installation, Configuration, Functioning, etc.

Size: px
Start display at page:

Download "Information Security Laboratory Assignment No. 08 Proxy Server Installation, Configuration, Functioning, etc."

Transcription

1 Information Security Laboratory Assignment No. 08 Proxy Server Installation, Configuration, Functioning, etc. -Ashwin Tumma Following document contains detailed steps for installing and configuring a proxy server named SQUID for Ubuntu/Debian Machines. It also contains the functions and other sophisticated options that squid provides. The version of squid that I am using is : SQUID-stable 2.7 Installation : For Debian/Ubuntu Machines the package to be used is : # sudo aptitude install squid This will add the /etc/squid/squid.conf file for configuration settings and /etc/init.d/squid as the startup script. Following are the screenshots for the same.

2 Fig. 1 : Installing Squid Configuration : The default port on which squid runs is : 3128 The visible_hostname parameter can be set which will be used in the error_log. #vim /etc/squid/squid.conf visible_hostname coepserver httpd_port 3128 Starting Squid and Logs: #service squid start Fig. 2 : Starting the Squid Service Squid maintains three log files(access.log, cache.log and store.log) under /var/log/squid directory. access.log gives information about who accessed which website at what time. To disable logging: # to disable access.log cache_access_log /dev/null # to disable store.log cache_store_log none # to disable cache.log cache_log /dev/null

3 Using Squid: 1. Restrict access to specific websites Create a file called restricted_sites # vim /etc/squid/restricted_sites Modify the squid.conf file and add the following: acl RestrictedSites dstdomain "/etc/squid/restricted_sites" http_access deny RestrictedSites Fig. 3 : Setting the Proxy Server on clients

4 Other uses of Squid: Fig. 4 : Since we have denied access, appropriate message is displayed. 2. Allow access to websites only during specific time # vim /etc/squid/squid.conf acl official_hours time M T W H F 10:00-17:30 http_access deny all http_access allow official_hours 3. Restrict access to particular network # vim /etc/squid/squid.conf acl branch_offices src /24 http_access deny all http_access allow branch_offices

5 Why use Squid? : The developers of HTTP identified early on that there was going to be exporential growth in content and, concerned with distribution mechanisms, added powerful caching primitives. These primtives allow content developers and distributions to hint to servers and end-user applications how content should be validated, revalidated and cached. This had the effect of dramatically reducing the amount of bandwidth required to serve content and improved user response time. Squid is one of the projects which grew out of the initial content distribution and caching work in the mid-90s. It has grown to include extra features such as powerful access control, authorization, logging, content distribution/replication, traffic management and shaping and more. For ISPs : Save on bandwidth, improve user performance Squid allows Internet Providers to save on their bandwidth through content caching. Cached content means data is served locally and users will see this through faster download speeds with frequently-used content. For Websites: Scale your application, without massice investment in hardware and development time Squid is one of the oldest content accelerators, used by thousands of websites around the world to ease the load on their servers. Frequently-seen content is cached by Squid and served to the client with only a fraction of the application server load needed normally. Setting up an accelerator in front of an existing website is almosr always a quick and simple task with immediate benefits. For Content Delivery Providers: Distribute your content worldwide Squid makes it easy for content distributors and streaming media developers to distribute content worldwide. CDN providers can buy cheap hardware running squid and deploy in strategic locations around the internet to serve enormous amounts of data cheaply and efficiently References: Official Squid Website:

ZENworks 2017 Update 1 HTTP Proxy Reference. July 2017

ZENworks 2017 Update 1 HTTP Proxy Reference. July 2017 ZENworks 2017 Update 1 HTTP Proxy Reference July 2017 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent

More information

Outline. Computer Center, CS, NCTU. Web hosting. Proxy. Basics Client-Server architecture HTTP protocol Static vs. dynamic pages Virtual hosts

Outline. Computer Center, CS, NCTU. Web hosting. Proxy. Basics Client-Server architecture HTTP protocol Static vs. dynamic pages Virtual hosts Web Outline Web hosting Basics Client-Server architecture HTTP protocol Static vs. dynamic pages Virtual hosts Proxy Forward proxy Reverse proxy squid 2 Basics (1) Three major techniques in WWW (World

More information

Web Server rpm. Web Server. #rpm q apache apache sis. package apache not installed CD-ROM

Web Server rpm. Web Server. #rpm q apache apache sis. package apache not installed CD-ROM 7 Server Web Server Web Server rpm #rpm q apache apache-1.3.20-16+sis package apache not installed CD-ROM Linux Redhat, Linux SiS Linux rpm I apache-1.3.20-16+sis /etc/httpd/conf/httpd.conf ServerRoot

More information

Outline. Computer Center, CS, NCTU. q Web hosting. q Proxy. Basics Client-Server architecture HTTP protocol Static vs. dynamic pages Virtual hosts

Outline. Computer Center, CS, NCTU. q Web hosting. q Proxy. Basics Client-Server architecture HTTP protocol Static vs. dynamic pages Virtual hosts Web hwlin1414 Outline q Web hosting Basics Client-Server architecture HTTP protocol Static vs. dynamic pages Virtual hosts q Proxy Forward proxy Reverse proxy 2 Basics (1) q Three major techniques in WWW

More information

Proxying. Why and How. Alon Altman. Haifa Linux Club. Proxying p.1/24

Proxying. Why and How. Alon Altman. Haifa Linux Club. Proxying p.1/24 Proxying p.1/24 Proxying Why and How Alon Altman alon@haifux.org Haifa Linux Club Proxying p.2/24 Definition proxy \Prox"y\, n.; pl. Proxies. The agency for another who acts through the agent; authority

More information

Software. Linux. Squid Windows

Software. Linux. Squid Windows Proxy Server Introduction A proxy server services client requests by forwarding : the requests to the destination server. The requests appear to come from the proxy server and not from the client. the

More information

COMP6218: Content Caches. Prof Leslie Carr

COMP6218: Content Caches. Prof Leslie Carr COMP6218: Content Caches Prof Leslie Carr 1 Slashdot.org The Slashdot effect, also known as slashdotting, occurs when a popular website links to a smaller site, causing a massive increase in traffic 2

More information

Marliza Ramly Zurina Saaya Wahidah Md Shah Mohammad Radzi Motsidi Haniza Nahar

Marliza Ramly Zurina Saaya Wahidah Md Shah Mohammad Radzi Motsidi Haniza Nahar version 2.6 by Marliza Ramly Zurina Saaya Wahidah Md Shah Mohammad Radzi Motsidi Haniza Nahar Faculty of Information and Communication Technology Universiti Teknikal Malaysia Melaka (UTeM) May 2007 Copyright

More information

[Optional] File Transfer and Web Caching

[Optional] File Transfer and Web Caching [Optional] File Transfer and Web Caching COSC301 Laboratory Manual Contents 1 File Transfer Protocol (FTP)........................ 1 2 Web Caching with Squid.......................... 4 In this lab, we

More information

Seven Criteria for a Sound Investment in WAN Optimization

Seven Criteria for a Sound Investment in WAN Optimization Seven Criteria for a Sound Investment in WAN Optimization Introduction WAN optimization technology brings three important business benefits to IT organizations: Reduces branch office infrastructure costs

More information

Open Connect Overview

Open Connect Overview Open Connect Overview What is Netflix Open Connect? Open Connect is the name of the global network that is responsible for delivering Netflix TV shows and movies to our members world wide. This type of

More information

Computer Oriented Project

Computer Oriented Project Computer Oriented Project Server Implementations on Campus Wide Networks BITS Goa Case Study Aalap Tripathy Faculty Guide : Mr Mangesh Bedekar Agenda Introduction to networks IP Addressing & Packet Analysis

More information

FAST, FLEXIBLE, RELIABLE SEAMLESSLY ROUTING AND SECURING BILLIONS OF REQUESTS PER MONTH

FAST, FLEXIBLE, RELIABLE SEAMLESSLY ROUTING AND SECURING BILLIONS OF REQUESTS PER MONTH We help Big Brands, Scale WordPress. WORDPRESS HOSTING MANAGED BY PROFESSIONALS PAGELY, INC pagely.com THE PAGELY ARES APPLICATION GATEWAY FAST, FLEXIBLE, RELIABLE SEAMLESSLY ROUTING AND SECURING BILLIONS

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. Caching, Content Distribution and Load Balancing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. Caching, Content Distribution and Load Balancing Department of Computer Science Institute for System Architecture, Chair for Computer Networks Caching, Content Distribution and Load Balancing Motivation Which optimization means do exist? Where should

More information

It s Not the Cost, It s the Quality! Ion Stoica Conviva Networks and UC Berkeley

It s Not the Cost, It s the Quality! Ion Stoica Conviva Networks and UC Berkeley It s Not the Cost, It s the Quality! Ion Stoica Conviva Networks and UC Berkeley 1 A Brief History! Fall, 2006: Started Conviva with Hui Zhang (CMU)! Initial goal: use p2p technologies to reduce distribution

More information

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies Comparison of Firewall, Intrusion Prevention and Antivirus Technologies (How each protects the network) Dr. Gaurav Kumar Jain Email: gaurav.rinkujain.jain@gmail.com Mr. Pradeep Sharma Mukul Verma Abstract

More information

Server Setup Strategies

Server Setup Strategies ,ch12.24057 Page 403 Thursday, November 18, 2004 12:41 PM Chapter 12 CHAPTER 12 Server Setup Strategies Since the first day mod_perl was available, users have adopted various techniques that make the best

More information

CernVM-FS beyond LHC computing

CernVM-FS beyond LHC computing CernVM-FS beyond LHC computing C Condurache, I Collier STFC Rutherford Appleton Laboratory, Harwell Oxford, Didcot, OX11 0QX, UK E-mail: catalin.condurache@stfc.ac.uk Abstract. In the last three years

More information

Web Caching and Content Delivery

Web Caching and Content Delivery Web Caching and Content Delivery Caching for a Better Web Performance is a major concern in the Web Proxy caching is the most widely used method to improve Web performance Duplicate requests to the same

More information

Technical papers Web caches

Technical papers Web caches Technical papers Web caches Web caches What is a web cache? In their simplest form, web caches store temporary copies of web objects. They are designed primarily to improve the accessibility and availability

More information

Case Study: Tata Communications Delivering a Truly Interactive Business Intelligence Experience on a Large Multi-Tenant Hadoop Cluster

Case Study: Tata Communications Delivering a Truly Interactive Business Intelligence Experience on a Large Multi-Tenant Hadoop Cluster Case Study: Tata Communications Delivering a Truly Interactive Business Intelligence Experience on a Large Multi-Tenant Hadoop Cluster CASE STUDY: TATA COMMUNICATIONS 1 Ten years ago, Tata Communications,

More information

Cisco Media Broadcaster

Cisco Media Broadcaster Data Sheet Cisco Media Broadcaster Cisco Media Broadcaster provides service providers a cost-effective and scalable solution for streaming HTTP adaptive bit rate live video to the in-home primary screen

More information

Configuring Web Cache Services By Using WCCP

Configuring Web Cache Services By Using WCCP CHAPTER 44 Configuring Web Cache Services By Using WCCP This chapter describes how to configure your Catalyst 3560 switch to redirect traffic to wide-area application engines (such as the Cisco Cache Engine

More information

SQUID PROXY CONFIGURATION GUIDE. Installation, configuration and Management guide

SQUID PROXY CONFIGURATION GUIDE. Installation, configuration and Management guide SQUID PROXY CONFIGURATION GUIDE Installation, configuration and Management guide ABSTRACT This Do it yourself guide is intended for any computer users who would like to improve their internet experience

More information

SANGFOR AD Product Series

SANGFOR AD Product Series SANGFOR Application Delivery (AD) Product Series provides customers with the global server load balance(gslb), inbound/outbound load balance, server load balance, SSL off-load and anti-ddos solutions for

More information

SSD in the Enterprise August 1, 2014

SSD in the Enterprise August 1, 2014 CorData White Paper SSD in the Enterprise August 1, 2014 No spin is in. It s commonly reported that data is growing at a staggering rate of 30% annually. That means in just ten years, 75 Terabytes grows

More information

Configuring Cache Services Using the Web Cache Communication Protocol

Configuring Cache Services Using the Web Cache Communication Protocol Configuring Cache Services Using the Web Cache Communication Protocol Finding Feature Information, page 1 Prerequisites for WCCP, page 1 Restrictions for WCCP, page 2 Information About WCCP, page 3 How

More information

The Guide to Best Practices in PREMIUM ONLINE VIDEO STREAMING

The Guide to Best Practices in PREMIUM ONLINE VIDEO STREAMING AKAMAI.COM The Guide to Best Practices in PREMIUM ONLINE VIDEO STREAMING PART 3: STEPS FOR ENSURING CDN PERFORMANCE MEETS AUDIENCE EXPECTATIONS FOR OTT STREAMING In this third installment of Best Practices

More information

PeerApp Case Study. November University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs

PeerApp Case Study. November University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs PeerApp Case Study University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs November 2010 Copyright 2010-2011 PeerApp Ltd. All rights reserved 1 Executive Summary

More information

SANGFOR AD Product Series

SANGFOR AD Product Series SANGFOR Application Delivery (AD) Product Series provides customers with the global server load balance(gslb), inbound/outbound load balance, server load balance, SSL off-load and anti-ddos solutions for

More information

Cisco Stealthwatch. Proxy Log Configuration Guide 7.0

Cisco Stealthwatch. Proxy Log Configuration Guide 7.0 Cisco Stealthwatch Proxy Log Configuration Guide 7.0 Table of Contents Introduction 3 Overview 3 Important Configuration Guidelines 3 Contacting Support 3 Configuring the Blue Coat Proxy Logs 5 Creating

More information

Yahoo Traffic Server -a Powerful Cloud Gatekeeper

Yahoo Traffic Server -a Powerful Cloud Gatekeeper Yahoo Traffic Server -a Powerful Cloud Gatekeeper Shih-Yong Wang Yahoo! Taiwan 2010 COSCUP Aug 15, 2010 What is Proxy Caching? Proxy Caching explicit client configuration transparent emulate responses

More information

Distil Networks & Akamai CDN Integration Guide

Distil Networks & Akamai CDN Integration Guide INTEGRATIONGUIDE Distil Networks & Akamai CDN Integration Guide (w) www.distilnetworks.com (e) sales@distilnetworks.com (US) 415.423.0831 (UK) +44.203.3184751 Table of Contents INTRODUCTION 3 TRAFFIC WORKFLOW

More information

Verifying the Internet Streamer CDS

Verifying the Internet Streamer CDS APPENDIXK This appendix covers the steps to test the CDS by using the different media players. This appendix covers the following topics: Verifying the Web Engine, page K-1 Verifying the Windows Media

More information

Edge Side Includes (ESI) Overview

Edge Side Includes (ESI) Overview Edge Side Includes (ESI) Overview Abstract: Edge Side Includes (ESI) accelerates dynamic Web-based applications by defining a simple markup language to describe cacheable and non-cacheable Web page components

More information

Adaptive Video Acceleration. White Paper. 1 P a g e

Adaptive Video Acceleration. White Paper. 1 P a g e Adaptive Video Acceleration White Paper 1 P a g e Version 1.0 Veronique Phan Dir. Technical Sales July 16 th 2014 2 P a g e 1. Preface Giraffic is the enabler of Next Generation Internet TV broadcast technology

More information

Deployment Scenarios for Standalone Content Engines

Deployment Scenarios for Standalone Content Engines CHAPTER 3 Deployment Scenarios for Standalone Content Engines This chapter introduces some sample scenarios for deploying standalone Content Engines in enterprise and service provider environments. This

More information

CDN SaaS aligned to NFV

CDN SaaS aligned to NFV CDN SaaS aligned to NFV Eli Fuchs, Product Line Manager Service Provider Video Agenda IP Video Growth Trends Network Function Virtualization & Video Infrastructure Virtualized Content Delivery Networks

More information

To use SNMP, it must first be enabled with the configure script, and squid rebuilt. To enable is first run the script:

To use SNMP, it must first be enabled with the configure script, and squid rebuilt. To enable is first run the script: Feature: SNMP Status: Completed Version: 2.x, 3.x Contents 1. 2. 3. 4. 5. 6. Feature: SNMP Details Enabling SNMP in Squid 1. Squid-3 2. Squid-2 Configuring Squid 1. Squid OIDs FAQ 1. How can I query the

More information

The Z-Files: Field reports from the world of business critical PHP applications

The Z-Files: Field reports from the world of business critical PHP applications The Z-Files: Field reports from the world of business critical PHP applications By Axel Schinke Senior Manager of Global Operations for Global Services About this webinar Field reports from Zend Consulting

More information

Last Class: Consistency Models. Today: Implementation Issues

Last Class: Consistency Models. Today: Implementation Issues Last Class: Consistency Models Need for replication Data-centric consistency Strict, linearizable, sequential, causal, FIFO Lecture 15, page 1 Today: Implementation Issues Replica placement Use web caching

More information

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74 Analysis of the Global Distributed Denial of Service (DDoS) Mitigation Market Abridged Version Rise of the DDoS Attack Spurs Demand for Comprehensive Solutions A custom excerpt from Frost & Sullivan s

More information

NTT DOCOMO Technical Journal

NTT DOCOMO Technical Journal * * * 23 CDN Application with Terminal Remote Control System File Distribution Function These factors and the potential to support In- 3 high speed. Figure 1 shows delivery of files before ternet of Things

More information

OpenCache. A Platform for Efficient Video Delivery. Matthew Broadbent. 1 st Year PhD Student

OpenCache. A Platform for Efficient Video Delivery. Matthew Broadbent. 1 st Year PhD Student OpenCache A Platform for Efficient Video Delivery Matthew Broadbent 1 st Year PhD Student Motivation Consumption of video content on the Internet is constantly expanding Video-on-demand is an ever greater

More information

Telex Anticensorship in the

Telex Anticensorship in the Telex Anticensorship in the Network Infrastructure Eric Wustrow Ian Goldberg * Scott Wolchok J. Alex Halderman University of Michigan University of Michigan * University of Waterloo Background Internet

More information

How to Configure User Authentication and Access Control

How to Configure User Authentication and Access Control How to Configure User Authentication and Access Control For user authentication with the HTTP Proxy, the external authentication scheme that you can use depends on the proxy mode. With a transparent or

More information

A New Architecture for HTTP Proxies Using Workstation Caches

A New Architecture for HTTP Proxies Using Workstation Caches A New Architecture for HTTP Proxies Using Workstation Caches Author Names : Prabhakar T V (tvprabs@cedt.iisc.ernet.in) R. Venkatesha Prasad (vprasad@cedt.iisc.ernet.in) Kartik M (kartik_m@msn.com) Kiran

More information

Content Deployment and Caching Techniques in Africa

Content Deployment and Caching Techniques in Africa Content Deployment and Caching Techniques in Africa Presentation to the AfPIF Peering Coordinators Day Dar Es Salaam 2011 Mike Blanche 1 Agenda Current Content Hosting Situation Content Hosting Content

More information

Practice change control. Take a baseline of the performance before and after changing any set- tings.

Practice change control. Take a baseline of the performance before and after changing any set- tings. 6 Performance Tuning Car manufacturers often develop for the mass market, and strive to develop a "best fit" product that will be acceptable to the majority of customers. The product (in this case a car)

More information

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments White Paper The Emerging Role of a CDN in Facilitating Secure Cloud Deployments Sponsored by: Fastly Robert Ayoub August 2017 IDC OPINION The ongoing adoption of cloud services and the desire for anytime,

More information

Course Outline: Linux Professional Institute-LPI 202. Learning Method: Instructor-led Classroom Learning. Duration: 5.00 Day(s)/ 40 hrs.

Course Outline: Linux Professional Institute-LPI 202. Learning Method: Instructor-led Classroom Learning. Duration: 5.00 Day(s)/ 40 hrs. Course Outline: Linux Professional Institute-LPI 202 Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 40 hrs Overview: The LPI certification is a vendor-neutral Linux credential

More information

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic Virus Protection & Content Filtering TECHNOLOGY BRIEF Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server Enhanced virus protection for Web and SMTP traffic INSIDE The need

More information

Backup and archiving need not to create headaches new pain relievers are around

Backup and archiving need not to create headaches new pain relievers are around Backup and archiving need not to create headaches new pain relievers are around Frank Reichart Senior Director Product Marketing Storage Copyright 2012 FUJITSU Hot Spots in Data Protection 1 Copyright

More information

Opportunities for Exploiting Social Awareness in Overlay Networks. Bruce Maggs Duke University Akamai Technologies

Opportunities for Exploiting Social Awareness in Overlay Networks. Bruce Maggs Duke University Akamai Technologies Opportunities for Exploiting Social Awareness in Overlay Networks Bruce Maggs Duke University Akamai Technologies The Akamai Intelligent Platform A Global Platform: 127,000+ Servers 1,100+ Networks 2,500+

More information

INTEGRATED APPLICATION ASSURANCE

INTEGRATED APPLICATION ASSURANCE INTEGRATED APPLICATION ASSURANCE Layer 7 Visibility Application and Internet Control Policy Based WAN Optimization INTEGRATED ASSURANCE SUITE Increase the speed and efficiency of your wide area network.

More information

Scaling Internet TV Content Delivery ALEX GUTARIN DIRECTOR OF ENGINEERING, NETFLIX

Scaling Internet TV Content Delivery ALEX GUTARIN DIRECTOR OF ENGINEERING, NETFLIX Scaling Internet TV Content Delivery ALEX GUTARIN DIRECTOR OF ENGINEERING, NETFLIX Inventing Internet TV Available in more than 190 countries 104+ million subscribers Lots of Streaming == Lots of Traffic

More information

Deployment Guide. 3.1 For Windows For Linux Docker image Windows Installation Installation...

Deployment Guide. 3.1 For Windows For Linux Docker image Windows Installation Installation... TABLE OF CONTENTS 1 About Guide...1 2 System Requirements...2 3 Package...3 3.1 For Windows... 3 3.2 For Linux... 3 3.3 Docker image... 4 4 Windows Installation...5 4.1 Installation... 5 4.1.1 Install

More information

Outlook 2010 Anywhere Setup

Outlook 2010 Anywhere Setup Outlook 2010 Anywhere Setup Scope: this document will describe how to setup Outlook 2010 from off campus using the Outlook Anywhere setup. 1) Start Outlook 2010 for the first time. If you are prompted

More information

Evaluation of Performance of Cooperative Web Caching with Web Polygraph

Evaluation of Performance of Cooperative Web Caching with Web Polygraph Evaluation of Performance of Cooperative Web Caching with Web Polygraph Ping Du Jaspal Subhlok Department of Computer Science University of Houston Houston, TX 77204 {pdu, jaspal}@uh.edu Abstract This

More information

Today: World Wide Web! Traditional Web-Based Systems!

Today: World Wide Web! Traditional Web-Based Systems! Today: World Wide Web! WWW principles Case Study: web caching as an illustrative example Invalidate versus updates Push versus Pull Cooperation between replicas Lecture 22, page 1 Traditional Web-Based

More information

The Future of P2P. A Retrospective. Eric Armstrong President Kontiki, Inc.

The Future of P2P. A Retrospective. Eric Armstrong President Kontiki, Inc. The Future of P2P A Retrospective Eric Armstrong President Kontiki, Inc. The BIG Opportunity An enormous Digital Video Marketplace is Inevitable We are passed the threshold where Digital compression +

More information

The FreeBSD Package Cluster

The FreeBSD Package Cluster The FreeBSD Package Cluster Kris Kennaway kris@freebsd.org BSDCan 2005, Ottawa, May 13 Outline Goals of the package cluster Challenges Overview of cluster architecture and implementation Anatomy of package

More information

Telecommunications. Case Study SFR

Telecommunications. Case Study SFR Case Study SFR Telecommunications With the Varnish Massive Storage Engine, SFR could cache virtually unlimited objects and deliver fast performance at scale. Video on demand is one of the reasons SFR needs

More information

TechNote AltitudeCDN Multicast+ Integration with IBM Cloud Streaming Manager for Enterprise

TechNote AltitudeCDN Multicast+ Integration with IBM Cloud Streaming Manager for Enterprise TechNote AltitudeCDN Multicast+ Integration with IBM Cloud Streaming Manager for Enterprise Version 1.0 AltitudeCDN TM Multicast+ is a patented (US Pat. 9,516,390) solution that brings multicast support

More information

Late Transmuxing: Improving caching in video streaming

Late Transmuxing: Improving caching in video streaming Bachelor Informatica Informatica Universiteit van Amsterdam Late Transmuxing: Improving caching in video streaming Jelte Fennema 17th June 215 Supervisor(s): Dirk Griffioen (Unified Streaming), Robert

More information

WHITE PAPER NGINX An Open Source Platform of Choice for Enterprise Website Architectures

WHITE PAPER NGINX An Open Source Platform of Choice for Enterprise Website Architectures ASHNIK PTE LTD. White Paper WHITE PAPER NGINX An Open Source Platform of Choice for Enterprise Website Architectures Date: 10/12/2014 Company Name: Ashnik Pte Ltd. Singapore By: Sandeep Khuperkar, Director

More information

powered by Cloudian and Veritas

powered by Cloudian and Veritas Lenovo Storage DX8200C powered by Cloudian and Veritas On-site data protection for Amazon S3-compliant cloud storage. assistance from Lenovo s world-class support organization, which is rated #1 for overall

More information

SmartEdge On-Demand Video Caching Solution

SmartEdge On-Demand Video Caching Solution MediaPlatform, Inc. 8383 Wilshire Boulevard Suite 460 Beverly Hills, CA 90211 (310) 909-8410 Sales_inquiries@mediaplatform.com www.mediaplatform.com SmartEdge On-Demand Video Caching Solution Contents

More information

TechNote AltitudeCDN OmniCache Integration with Microsoft Teams Live Events

TechNote AltitudeCDN OmniCache Integration with Microsoft Teams Live Events TechNote AltitudeCDN OmniCache Integration with Microsoft Teams Live Events Version 1.0 AltitudeCDN TM OmniCache is a robust proxy cache that enables the efficient delivery of HTTP Live Streaming (HLS)

More information

Website Acceleration with mod_pagespeed

Website Acceleration with mod_pagespeed Website Acceleration with mod_pagespeed Joshua Marantz Google June 15, 2011 @jmarantz www.modpagespeed.com 2011 Google, Inc. All rights reserved. Velocity 2011: Faster By Default 2 Velocity 2011: Faster

More information

Leaving the State: Sessionless (Stateless) Authentication in D8 with Whole Foods Market. BADCamp 2017

Leaving the State: Sessionless (Stateless) Authentication in D8 with Whole Foods Market. BADCamp 2017 Leaving the State: Sessionless (Stateless) Authentication in D8 with Whole Foods Market BADCamp 2017 These Guys Dr J Daverth Technical Lead, Whole Foods Market D.O.: dr-jay BitBucket: drjdaverth LinkedIn:

More information

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy Que: -Proxy server Introduction: Proxy simply means acting on someone other s behalf. A Proxy acts on behalf of the client or user to provide access to a network service, and it shields each side from

More information

How to Configure User Authentication and Access Control

How to Configure User Authentication and Access Control How to Configure User Authentication and Access Control For user authentication with the HTTP Proxy, the external authentication scheme that you can use depends on the proxy mode. With a transparent or

More information

Web caches (proxy server) Applications (part 3) Applications (part 3) Caching example (1) More about Web caching

Web caches (proxy server) Applications (part 3) Applications (part 3) Caching example (1) More about Web caching By the end of this lecture, you should be able to. Explain the idea of edge delivery Explain the operation of CDNs Explain the operation of P2P file sharing systems such as Napster and Gnutella Web caches

More information

SHARE THIS WHITEPAPER. Fastest Website Acceleration for New HTTP Protocol with Alteon NG and Advanced HTTP/2 Gateway Whitepaper

SHARE THIS WHITEPAPER. Fastest Website Acceleration for New HTTP Protocol with Alteon NG and Advanced HTTP/2 Gateway Whitepaper SHARE THIS WHITEPAPER Fastest Website Acceleration for New HTTP Protocol with Alteon NG and Advanced HTTP/2 Gateway Whitepaper Table of Contents Executive Summary...3 The Road to HTTP/2...3 How HTTP/2

More information

Distributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018

Distributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018 Distributed Systems 21. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2018 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance

More information

1 Real World Scenarios

1 Real World Scenarios Real World Scenarios 1 Real World Scenarios 1 Real World Scenarios 1 11 Description 11 Description This chapter provides a step-by-step installation guide for the various setups discussed in Choosing the

More information

Peering with Akamai. CaribNOG November 2015 Belize City, Belize

Peering with Akamai. CaribNOG November 2015 Belize City, Belize Peering with Akamai CaribNOG 10 04 November 2015 Belize City, Belize The Akamai Intelligent Platform Highly distributed, deeply deployed on-demand computing platform that serves any kind of web traffic

More information

CS November 2018

CS November 2018 Distributed Systems 21. Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2018 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance

More information

Assignment #2. Csci4211 Spring Due on March 6th, Notes: There are five questions in this assignment. Each question has 10 points.

Assignment #2. Csci4211 Spring Due on March 6th, Notes: There are five questions in this assignment. Each question has 10 points. Assignment #2 Csci4211 Spring 2017 Due on March 6th, 2017 Notes: There are five questions in this assignment. Each question has 10 points. 1. (10 pt.) Design and describe an application-level protocol

More information

Internet Content Distribution

Internet Content Distribution Internet Content Distribution Chapter 1: Introduction Jussi Kangasharju Chapter Outline Introduction into content distribution Basic concepts TCP DNS HTTP Outline of the rest of the course Kangasharju:

More information

Distributed System: Definition

Distributed System: Definition 2 / 25 Introduction Distributed System: Definition Definition A distributed system is a piece of software that ensures that: a collection of independent computers appears to its users as a single coherent

More information

Proxy Log Configuration

Proxy Log Configuration Stealthwatch System Proxy Log Configuration (for Stealthwatch System v6.10) Copyrights and Trademarks 2017 Cisco Systems, Inc. All rights reserved. NOTICE THE SPECIFICATIONS AND INFORMATION REGARDING THE

More information

RH-302. RedHat. Red Hat Certified Engineer on Redhat Enterprise Linux 4 (Labs)

RH-302. RedHat. Red Hat Certified Engineer on Redhat Enterprise Linux 4 (Labs) RedHat RH-302 Red Hat Certified Engineer on Redhat Enterprise Linux 4 (Labs) Download Full Version : http://killexams.com/pass4sure/exam-detail/rh-302 local domain and another is cracker.org which is called

More information

Firewall Configuration Example

Firewall Configuration Example In order to provide a comprehensive description of the possibilities of creating rules for the Barracuda NG Firewall, the following article shows an example setup configuration with a LAN, the internet,

More information

Optimizing a News Website for Speed and Stability

Optimizing a News Website for Speed and Stability Optimizing a News Website for Speed and Stability Julian Dunn SecondMarket, Inc. Blake Crosby Canadian Broadcasting Corp. - Who has worked for a news website - Who has configured a CDN - familiar with

More information

Overview Content Delivery Computer Networking Lecture 15: The Web Peter Steenkiste. Fall 2016

Overview Content Delivery Computer Networking Lecture 15: The Web Peter Steenkiste. Fall 2016 Overview Content Delivery 15-441 15-441 Computer Networking 15-641 Lecture 15: The Web Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Web Protocol interactions HTTP versions Caching Cookies

More information

Distributed Systems Principles and Paradigms. Chapter 12: Distributed Web-Based Systems

Distributed Systems Principles and Paradigms. Chapter 12: Distributed Web-Based Systems Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science steen@cs.vu.nl Chapter 12: Distributed -Based Systems Version: December 10, 2012 Distributed -Based Systems

More information

NCP VPN Path Finder for Juniper SRX Gateways

NCP VPN Path Finder for Juniper SRX Gateways NCP VPN Path Finder Technology In many cases, IPsec and SSL VPN are complementary, because they solve different problems. This complementary approach allows a single device to address all remote-access

More information

Emulation of Dynamic Adaptive Streaming over HTTP with Mininet

Emulation of Dynamic Adaptive Streaming over HTTP with Mininet Emulation of Dynamic Adaptive Streaming over HTTP with Mininet Anatoliy Zabrovskiy Evgeny Kuzmin Petrozavodsk State University Video streaming Video streaming is becoming more and more popular technology

More information

CLIENT SERVER ARCHITECTURE:

CLIENT SERVER ARCHITECTURE: CLIENT SERVER ARCHITECTURE: Client-Server architecture is an architectural deployment style that describe the separation of functionality into layers with each segment being a tier that can be located

More information

Proxy Log Configuration

Proxy Log Configuration Stealthwatch System Proxy Log Configuration (for Stealthwatch System v6.10.x) Copyrights and Trademarks 2018 Cisco Systems, Inc. All rights reserved. NOTICE THE SPECIFICATIONS AND INFORMATION REGARDING

More information

Certification. The HTTP Service

Certification. The HTTP Service Certification The HTTP Service UNIT 5 The HTTP Service 1 Objectives Learn the major features of the Apache HTTP server Be able to configure important Apache parameters Learn per-directory configuration

More information

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model:

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model: MX Sizing Guide AUGUST 2016 This technical document provides guidelines for choosing the right Cisco Meraki security appliance based on real-world deployments, industry standard benchmarks and in-depth

More information

John S. Otto Mario A. Sánchez John P. Rula Fabián E. Bustamante

John S. Otto Mario A. Sánchez John P. Rula Fabián E. Bustamante John S. Otto Mario A. Sánchez John P. Rula Fabián E. Bustamante Northwestern, EECS http://aqualab.cs.northwestern.edu ! DNS designed to map names to addresses Evolved into a large-scale distributed system!

More information

HP LoadRunner and Performance Center What is new?

HP LoadRunner and Performance Center What is new? HP LoadRunner and Performance Center 11.52 - What is new? June 26, 2013 Copyright 2013 Vivit Worldwide Copyright 2013 Vivit Worldwide Brought to you by Copyright 2013 Vivit Worldwide Housekeeping Prize

More information

Truffle Broadband Bonding Network Appliance

Truffle Broadband Bonding Network Appliance Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive

More information

Help! I need more servers! What do I do?

Help! I need more servers! What do I do? Help! I need more servers! What do I do? Scaling a PHP application 1 2-Feb-09 Introduction A real world example The wonderful world of startups Who am I? 2 2-Feb-09 Presentation Overview - Scalability

More information

MX Sizing Guide. 4Gon Tel: +44 (0) Fax: +44 (0)

MX Sizing Guide. 4Gon   Tel: +44 (0) Fax: +44 (0) MX Sizing Guide FEBRUARY 2015 This technical document provides guidelines for choosing the right Cisco Meraki security appliance based on real-world deployments, industry standard benchmarks and in-depth

More information

IP Access List Overview

IP Access List Overview Access control lists (ACLs) perform packet filtering to control which packets move through the network and where. Such control provides security by helping to limit network traffic, restrict the access

More information