2015
DOI: 10.1007/978-3-319-15509-8_20
|View full text |Cite
|
Sign up to set email alerts
|

Investigating Transparent Web Proxies in Cellular Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
42
1

Year Published

2015
2015
2018
2018

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 60 publications
(43 citation statements)
references
References 19 publications
0
42
1
Order By: Relevance
“…On the other hand, various HTTP proxy-based approaches break the end-to-end connection in order to enable web content pre-fetching, caching, offloading and compression to enhance user experiences [4]- [6]. Nevertheless, till now noticeable performance gains cannot always be achieved under different network conditions and web page characteristics [7], [8].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…On the other hand, various HTTP proxy-based approaches break the end-to-end connection in order to enable web content pre-fetching, caching, offloading and compression to enhance user experiences [4]- [6]. Nevertheless, till now noticeable performance gains cannot always be achieved under different network conditions and web page characteristics [7], [8].…”
Section: Introductionmentioning
confidence: 99%
“…Current proxy-based techniques applied in mobile network environments share two common features [4]- [6]: (1) Splitting end-to-end connections between wireless and wired parts, and (2) Employing various network operations such as content prefetching and caching for mobile users. However, again these widely deployed proxies are unable to comprehensively achieve improvements according to different context conditions [5], [8], [13]. In addition, splitting of end-to-end connections encounters issues like unexpected timeout [14] or marginal improvement [8] in real mobile networks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Note that at least one implicit proxy on the path is already commonly deployed, e.g., in cellular networks [18,22]. In this case, the first proxy (likely close to the client), will perform a traditional 3-way handshake, while all the remaining proxies in the chain, if supporting the newly introduced TCP option, can use ESF.…”
Section: Miniproxy Implementationmentioning
confidence: 99%
“…Instead, transparent proxies and middleboxes can be used [42]. In order to train these classiiers, the operator could use bufer emulations based on pilot experiments with a subset of clients (under their control) going through a trusted proxy (as done here) or through the use of an instrumented player, if available, for example.…”
Section: Classiication Framework Overviewmentioning
confidence: 99%