Kalyan Boggavarapu Lehigh University

Slides:



Advertisements
Similar presentations
IP Router Architectures. Outline Basic IP Router Functionalities IP Router Architectures.
Advertisements

Cost-Based Cache Replacement and Server Selection for Multimedia Proxy Across Wireless Internet Qian Zhang Zhe Xiang Wenwu Zhu Lixin Gao IEEE Transactions.
REDUNDANCY IN NETWORK TRAFFIC: FINDINGS AND IMPLICATIONS Ashok Anand Ramachandran Ramjee Chitra Muthukrishnan Microsoft Research Lab, India Aditya Akella.
Latency-sensitive hashing for collaborative Web caching Presented by: Xin Qi Yong Yang 09/04/2002.
SIGMOD 2006University of Alberta1 Approximately Detecting Duplicates for Streaming Data using Stable Bloom Filters Presented by Fan Deng Joint work with.
1 Improving the Performance of Distributed Applications Using Active Networks Mohamed M. Hefeeda 4/28/1999.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Data Link Layer – Part 1 V.T.Raja Oregon State University.
1 Prefetching the Means for Document Transfer: A New Approach for Reducing Web Latency 1. Introduction 2. Data Analysis 3. Pre-transfer Solutions 4. Performance.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
EEC-484/584 Computer Networks Discussion Session for HTTP and DNS Wenbing Zhao
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
Improving Proxy Cache Performance: Analysis of Three Replacement Policies John Dilley and Martin Arlitt IEEE internet computing volume3 Nov-Dec 1999 Chun-Fu.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Department of Computer Science Stony Brook University.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Design, Implementation, and Evaluation of Differentiated Caching Services Ying Lu, Tarek F. Abdelzaher, Avneesh Saxena IEEE TRASACTION ON PARALLEL AND.
Web-Conscious Storage Management for Web Proxies Evangelos P. Markatos, Dionisios N. Pnevmatikatos, Member, IEEE, Michail D. Flouris, and Manolis G. H.
Virtual Memory BY JEMINI ISLAM. What is Virtual Memory Virtual memory is a memory management system that gives a computer the appearance of having more.
Chapter 19 Binding Protocol Addresses (ARP) Chapter 20 IP Datagrams and Datagram Forwarding.
1Bloom Filters Lookup questions: Does item “ x ” exist in a set or multiset? Data set may be very big or expensive to access. Filter lookup questions with.
CS352- Link Layer Dept. of Computer Science Rutgers University.
1 The Mystery of Cooperative Web Caching 2 b b Web caching : is a process implemented by a caching proxy to improve the efficiency of the web. It reduces.
Peer-to-peer Multimedia Streaming and Caching Service by Won J. Jeon and Klara Nahrstedt University of Illinois at Urbana-Champaign, Urbana, USA.
On the Use and Performance of Content Distribution Networks Balachander Krishnamurthy Craig Wills Yin Zhang Presenter: Wei Zhang CSE Department of Lehigh.
Chapter 13: WAN Technologies and Routing 1. LAN vs. WAN 2. Packet switch 3. Forming a WAN 4. Addressing in WAN 5. Routing in WAN 6. Modeling WAN using.
1 Design and Performance of a Web Server Accelerator Eric Levy-Abegnoli, Arun Iyengar, Junehwa Song, and Daniel Dias INFOCOM ‘99.
1 Cache Me If You Can. NUS.SOC.CS5248 OOI WEI TSANG 2 You Are Here Network Encoder Sender Middlebox Receiver Decoder.
CH2 System models.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Dynamic Content On Edge Cache Server (using Microsoft.NET) Name: Aparna Yeddula CS – 522 Semester Project Project URL: cs.uccs.edu/~ayeddula/project.html.
Computer Networks Performance Metrics. Performance Metrics Outline Generic Performance Metrics Network performance Measures Components of Hop and End-to-End.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Data Link Layer Part I – Designing Issues and Elementary.
Authors: Haowei Yuan, Tian Song, and Patrick Crowley Publisher: ICCCN 2012 Presenter: Chai-Yi Chu Date: 2013/05/22 1.
Kiew-Hong Chua a.k.a Francis Computer Network Presentation 12/5/00.
Increasing Web Server Throughput with Network Interface Data Caching October 9, 2002 Hyong-youb Kim, Vijay S. Pai, and Scott Rixner Rice Computer Architecture.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Measurement COS 597E: Software Defined Networking.
CSE 241 Computer Engineering (1) هندسة الحاسبات (1) Lecture #3 Ch. 6 Memory System Design Dr. Tamer Samy Gaafar Dept. of Computer & Systems Engineering.
A Low-bandwidth Network File System Athicha Muthitacharoen et al. Presented by Matt Miller September 12, 2002.
Empirical Quantification of Opportunities for Content Adaptation in Web Servers Michael Gopshtein and Dror Feitelson School of Engineering and Computer.
Performance of Web Proxy Caching in Heterogeneous Bandwidth Environments IEEE Infocom, 1999 Anja Feldmann et.al. AT&T Research Lab 발표자 : 임 민 열, DB lab,
Efficient Cache Structures of IP Routers to Provide Policy-Based Services Graduate School of Engineering Osaka City University
1 Kyung Hee University Chapter 8 ARP(Address Resolution Protocol)
Delta Encoding for HTTP/1.1 Sloutsky Alexander Fink Dmitry Supervised by Lavy Libman.
Cache Small amount of fast memory Sits between normal main memory and CPU May be located on CPU chip or module.
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
Characteristics Location Capacity Unit of transfer Access method Performance Physical type Physical characteristics Organisation.
Improving Security Over Ipv6 Authentication Header Protocol using IP Traceback and TTL Devon Thomas, Alex Isaac, Majdi Alharthi, Ali Albatainah & Abdelshakour.
DISTRIBUTED FILE SYSTEM- ENHANCEMENT AND FURTHER DEVELOPMENT BY:- PALLAWI(10BIT0033)
Virtual memory.
WWW and HTTP King Fahd University of Petroleum & Minerals
Client/Server Databases and the Oracle 10g Relational Database
Networking Devices.
The Underlying Technologies
Chapter 8 ARP(Address Resolution Protocol)
Planning and Troubleshooting Routing and Switching
The Impact of Replacement Granularity on Video Caching
Mohammad Malli Chadi Barakat, Walid Dabbous Alcatel meeting
Web Caching? Web Caching:.
Internet Networking recitation #12
Routing.
Evaluating Proxy Caching Algorithms in Mobile Environments
Mark E. Crovella and Azer Bestavros Computer Science Dept,
Ch 17 - Binding Protocol Addresses
DSDV Destination-Sequenced Distance-Vector Routing Protocol
Routing.
Data Communication: Routing algorithms
Data Link Layer. Position of the data-link layer.
Presentation transcript:

Kalyan Boggavarapu Lehigh University A Protocol-Independent Technique for Eliminating Redundant Network Traffic Neil T.Spring and David Wetherall Computer Science and Engineering, University of Washington Presented by Kalyan Boggavarapu, Lehigh University 11/16/2018 Kalyan Boggavarapu Lehigh University

Kalyan Boggavarapu Lehigh University Introduction 11/16/2018 Kalyan Boggavarapu Lehigh University

Kalyan Boggavarapu Lehigh University Aim To eliminate redundant transfers Currently highest cacheabitly obtained is 45% by squid. ( to improve that) Origins of uncached content Dynamically generated or personalized Mirrored on a different server Named by a different URL Delivered using a new or unsupported protocol Updated static content Access counted for advertising revenue 11/16/2018 Kalyan Boggavarapu Lehigh University

Kalyan Boggavarapu Lehigh University Algorithm 11/16/2018 Kalyan Boggavarapu Lehigh University

Kalyan Boggavarapu Lehigh University Rabin Fingerprint Rabin fingerprint for a sequence of bytes t1,t2,t3,…tß ß = Length of the string M = 260 P = 1048583 Make a table of ti x ß values for fast access (256 entries) RF/FP are calculated for consecutive bytes of length of ß Eg: 1,2,3,4,5,6 bytes,where ß=3 1,2,3 2,3,4 3,4,5 11/16/2018 Kalyan Boggavarapu Lehigh University

Kalyan Boggavarapu Lehigh University Algorithm Hold recent packets in the cache Maintain a FP index of the first bytes of the packets Check for each incoming packets Follow LRU for cache replacement 11/16/2018 Kalyan Boggavarapu Lehigh University

Kalyan Boggavarapu Lehigh University Architecture 11/16/2018 Kalyan Boggavarapu Lehigh University

Shared Cache Architecture Not implemented Inconsistency is detected by New FPs Protocol independent Web Caching + Delta transmission Bandwidth constrained link Packets = tokens + encoded 11/16/2018 Kalyan Boggavarapu Lehigh University

Kalyan Boggavarapu Lehigh University Implementation 11/16/2018 Kalyan Boggavarapu Lehigh University

Kalyan Boggavarapu Lehigh University Parameters Selection Selected values are β=64 bytes γ = 5; Throughput is inversly proportional to β, γ; Cache Allocation = 40% for Fp Index, 60% cache 11/16/2018 Kalyan Boggavarapu Lehigh University

Kalyan Boggavarapu Lehigh University Amount of Redundancy Incoming is redundancy can be captured by increasing the cache size Outgoing data redundancy has limit 11/16/2018 Kalyan Boggavarapu Lehigh University

Locality of Redundancy Same server, lot of redundancy, therefore we can apply end-end solutions Name based proxy caching would fail to capture this amount of redundancy 11/16/2018 Kalyan Boggavarapu Lehigh University

Kalyan Boggavarapu Lehigh University Traffic Analysis 11/16/2018 Kalyan Boggavarapu Lehigh University

Kalyan Boggavarapu Lehigh University Link Utilization Less utilization => more Byte savings (cache is divided among less number of users) More utilization => less Byte savings ( can be improved by increasing the cache size) 11/16/2018 Kalyan Boggavarapu Lehigh University

Redundant incoming traffic High 11/16/2018 Kalyan Boggavarapu Lehigh University

Kalyan Boggavarapu Lehigh University Summary Best 11/16/2018 Kalyan Boggavarapu Lehigh University To eliminate requests Long Term repitition

Kalyan Boggavarapu Lehigh University Related Work 11/16/2018 Kalyan Boggavarapu Lehigh University

Duplicate Suppression Similar to this method β is larger or equal to the packet size Calculate similarity between larger regions Achieved suppression is less Delta Encoding Send the differences in the page 11/16/2018 Kalyan Boggavarapu Lehigh University

Kalyan Boggavarapu Lehigh University Conclusion Redundancy suppression > Duplicate Suppression Redundancy suppression > Delta encoding Protocol independent Useful to suppress 60% of the incoming traffic and 30% of the outgoing traffic 11/16/2018 Kalyan Boggavarapu Lehigh University

Kalyan Boggavarapu Lehigh University Questions ! 11/16/2018 Kalyan Boggavarapu Lehigh University