TCP/IP illustrated (vol. 2): the implementation
TCP/IP illustrated (vol. 2): the implementation
Http: The Definitive Guide
Web Caching
Computer Networks
Optimizing Network Performance with Content Switching: Server, Firewall and Cache Load Balancing
Optimizing Network Performance with Content Switching: Server, Firewall and Cache Load Balancing
UNIX Network Programming, Vol. 1
UNIX Network Programming, Vol. 1
IPv6 Core Protocols Implementation (The Morgan Kaufmann Series in Networking)
IPv6 Core Protocols Implementation (The Morgan Kaufmann Series in Networking)
Hi-index | 0.00 |
A transparent secure network proxy intercepts web traffic such as HTTP requests and applies access policies to the intercepted traffic. The proxy will reinitiate a request on behalf of the client when policies permit. Depending on policy configuration, this proxy may masquerade as the client when generating the request. The response from the server may reach the client instead of the proxy due to asymmetric routing, and if so, would be rejected by the client as an invalid response. Consequently the proxy can not complete the original request. This paper presents a new protocol and a comprehensive mechanism that facilitates the formation of a cluster comprised of multiple proxies. This proxy cluster can cover a network that spans a large geographical area, and collaboratively discover and redirect asymmetrically routed traffic flows towards the appropriate member proxy. The protocol and the algorithms presented in this paper can operate in both IPv4 and IPv6 [1] networks.