The Cache Location Problem IEEE/ACM Transactions on Networking, Vol. 8, No. 5, October 2000 P. Krishnan, Danny Raz, Member, IEEE, and Yuval Shavitt, Member,

Slides:



Advertisements
Similar presentations
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Advertisements

Trees Chapter 11.
Price Of Anarchy: Routing
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Introduction to Algorithms
1 EE5900 Advanced Embedded System For Smart Infrastructure Static Scheduling.
22C:19 Discrete Structures Trees Spring 2014 Sukumar Ghosh.
1 Efficient and Robust Streaming Provisioning in VPNs Z. Morley Mao David Johnson Oliver Spatscheck Kobus van der Merwe Jia Wang.
S. J. Shyu Chap. 1 Introduction 1 The Design and Analysis of Algorithms Chapter 1 Introduction S. J. Shyu.
1 Algorithmic Game Theoretic Perspectives in Networking Dr. Liane Lewin-Eytan.
The Cache Location Problem. Overview TERCs Vs. Proxies Stability Cache location.
Routing in WSNs through analogies with electrostatics December 2005 L. Tzevelekas I. Stavrakakis.
CS 171: Introduction to Computer Science II
1 Complexity of Network Synchronization Raeda Naamnieh.
Chapter 23 Minimum Spanning Trees
1 Maximizing Lifetime of Sensor Surveillance Systems IEEE/ACM TRANSACTIONS ON NETWORKING Authors: Hai Liu, Xiaohua Jia, Peng-Jun Wan, Chih- Wei Yi, S.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
CS Dept, City Univ.1 Low Latency Broadcast in Multi-Rate Wireless Mesh Networks LUO Hongbo.
3 -1 Chapter 3 The Greedy Method 3 -2 The greedy method Suppose that a problem can be solved by a sequence of decisions. The greedy method has that each.
1 Internet Networking Spring 2006 Tutorial 6 Network Cost of Minimum Spanning Tree.
Beyond selfish routing: Network Formation Games. Network Formation Games NFGs model the various ways in which selfish agents might create/use networks.
Analysis of Web Caching Architectures: Hierarchical and Distributed Caching Pablo Rodriguez, Christian Spanner, and Ernst W. Biersack IEEE/ACM TRANSACTIONS.
Algorithms for Precomputing Constrained Widest Paths and Multicast Trees Paper by Stavroula Siachalou and Leonidas Georgiadis Presented by Jeremy Witmer.
Dean H. Lorenz, Danny Raz Operations Research Letter, Vol. 28, No
1 Internet Networking Spring 2004 Tutorial 6 Network Cost of Minimum Spanning Tree.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Tirgul 13. Unweighted Graphs Wishful Thinking – you decide to go to work on your sun-tan in ‘ Hatzuk ’ beach in Tel-Aviv. Therefore, you take your swimming.
DAST 2005 Week 4 – Some Helpful Material Randomized Quick Sort & Lower bound & General remarks…
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
UCSC 1 Aman ShaikhICNP 2003 An Efficient Algorithm for OSPF Subnet Aggregation ICNP 2003 Aman Shaikh Dongmei Wang, Guangzhi Li, Jennifer Yates, Charles.
15.082J, 6.855J, and ESD.78J September 21, 2010 Eulerian Walks Flow Decomposition and Transformations.
© The McGraw-Hill Companies, Inc., Chapter 3 The Greedy Method.
Internet Traffic Engineering by Optimizing OSPF Weights Bernard Fortz (Universit é Libre de Bruxelles) Mikkel Thorup (AT&T Labs-Research) Presented by.
Network Aware Resource Allocation in Distributed Clouds.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
7 -1 Chapter 7 Dynamic Programming Fibonacci sequence Fibonacci sequence: 0, 1, 1, 2, 3, 5, 8, 13, 21, … F i = i if i  1 F i = F i-1 + F i-2 if.
Advanced Algorithm Design and Analysis (Lecture 13) SW5 fall 2004 Simonas Šaltenis E1-215b
May 1, 2002Applied Discrete Mathematics Week 13: Graphs and Trees 1News CSEMS Scholarships for CS and Math students (US citizens only) $3,125 per year.
De-Nian Young Ming-Syan Chen IEEE Transactions on Mobile Computing Slide content thanks in part to Yu-Hsun Chen, University of Taiwan.
Web Caching and Content Distribution: A View From the Interior Syam Gadde Jeff Chase Duke University Michael Rabinovich AT&T Labs - Research.
1 Optimal Cycle Vida Movahedi Elder Lab, January 2008.
On a Network Creation Game PoA Seminar Presenting: Oren Gilon Based on an article by Fabrikant et al 1.
1 On the Placement of Web Server Replicas Lili Qiu, Microsoft Research Venkata N. Padmanabhan, Microsoft Research Geoffrey M. Voelker, UCSD IEEE INFOCOM’2001,
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
Lecture 3: Uninformed Search
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish agents strategically interact in using a network They.
作者 :Satyajeet Ahuja and Marwan Krunz 出處 :IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 10, NO. 7, NOVEMBER 2008 報告者 : 黃群凱 1.
ASSIGNMENT, DISTRIBUTION AND QOS PROVISIONING IN COMMUNICATION NETWORKS.
Vertex Coloring Distributed Algorithms for Multi-Agent Networks
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
Vasilis Syrgkanis Cornell University
1 Algorithmic aspects of radio access network design in 4G cellular networks David Amzallag Computer Science Department, Technion Joint work with Seffi.
1 EE5900 Advanced Embedded System For Smart Infrastructure Static Scheduling.
A numerical example Update frequency : 12. Simulation Setup Inet topology generator, 
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
On the Placement of Web Server Replicas Yu Cai. Paper On the Placement of Web Server Replicas Lili Qiu, Venkata N. Padmanabhan, Geoffrey M. Voelker Infocom.
1 Optimal Allocation of Electronic Content in Networks Israel Cidon- Technion Shay Kutten- Technion Ran Soffer- Redux.
Introduction to Multiple-multicast Routing Chu-Fu Wang.
::Network Optimization:: Minimum Spanning Trees and Clustering Taufik Djatna, Dr.Eng. 1.
Online Bipartite Matching with Augmentations Presentation by Henry Lin Joint work with Kamalika Chaudhuri, Costis Daskalakis, and Robert Kleinberg.
Decision trees Polynomial-Time
The minimum cost flow problem
Introduction to Trees Section 11.1.
I206: Lecture 15: Graphs Marti Hearst Spring 2012.
Smart Content Delivery in Large Networks: En-Route Caching
EE5900 Advanced Embedded System For Smart Infrastructure
Class 11 Max Flows Obtain a network, and use the same network to illustrate the shortest path problem for communication networks, the max flow.
Presentation transcript:

The Cache Location Problem IEEE/ACM Transactions on Networking, Vol. 8, No. 5, October 2000 P. Krishnan, Danny Raz, Member, IEEE, and Yuval Shavitt, Member, IEEE

Abstract The goal is to minimize the overall flow or the average delay by placing a given number of caches in the network. The location problems are formulated both for general caches and for transparent en- route caches (TERCs). A computationally efficient dynamic programming algorithm is present for the single server case.

Introduction The popular locations for caches are at the edge of networks in the form of browser and proxy caches. Significant research has gone into optimizing cache performance, co-operation among several caches, and cache hierarchies. Web servers are also replicated to achieve load- balancing. Danzig et al. had observed the advantage of placing caches inside the backbone rather than at its edge.

Transparent En-route Caches When using TERCs, caches are only located along routes from clients to servers. An en-route cache intercepts any request that passes through it, and either satisfies the request or forwards the request toward the server along the regular routing path. TERCs are easier to manage than replicated web servers since they are oblivious both to the end-user and the server.

Model and definitions Considering a general wide area network, where the internal nodes are routers and the external nodes are either servers, clients, or gateways to different subnets. A client can request a web page from any of the servers, and the server v s sends this page to the client v c on the shortest path from the server to the client. When caches are present, a client can request the page from a cache v k rather than from the server.

Model and definitions(Cont ’ d) Simplifying “ full dependency ” assumption: If a page will be found in any cache, it will be found in the first cache on the way to the server. Each client flow is associated with a single number p f that is the cachability of this flow. In other words, p f is the flow hit ratio. The full dependency assumption implies that all the flows have the same hit ratio p, the hit ratio at any node in the network is also p.

The formal model The shortest path routing is used. The network is represented by a undirected graph G = (V, E): d(e)the length of edge e d(v i, v j )the sum of the link distances along the route between nodes v i and v j. The request pattern is modeled by the demand set F: f s,c the flow from server v s to client v c P s,c the hit ratio of the flow

The formal model (Cont ’ d) K is the set of at most k nodes where the caches are to be placed. The cost c s,c of demand f s,c using a cache in location v k is This model does not capture hierarchical structures.

The general k-cache location problem

The k-TERC location problem The formal definition of the TERC k-cache location problem is exactly as the general k- cache location problem, except that the minimization in the objective function is over the set

Theorem The solution of the problem with demands F={f s,c } and flow hit ratios P={p s,c } is equivalent to solving the problem for F ’ ={f s,c p s,c } with hit ratio of one. Proof:

Theorem (Cont ’ d) The solution for the problem with F ’ ={f s,c p s,c } and a hit ratio of one is given by

Assumption Base on the Theorem, we assume that all flows have the same hit ratio which we denote by p. lineBounded Degree tree TreeGeneral graph 1 serverPoly NP m serversPolyNP

Single web server case Even the case when we have a single server is NP-hard for general networks. This case can be solved on a tree graph. Fortunately, if the shortest path routing algorithm implied by the Internet is stable, the routes to various clients as viewed by any single server should be a tree graph.

Simple greedy algorithm The intuitive greedy algorithm places caches on the tree iteratively in a greedy fashion. It checks each node of the tree to determine where to place the first cache, and chooses the node that minimizes the costs. It assigns the first cache to this node, and looks for an appropriate location for the next cache. The complexity of the greedy algorithm is O(nk).

Worst case

The optimal dynamic- programming algorithm The general tree is converted into a binary tree by introducing at most n dummy nodes. Sort all the nodes in reverse breadth first order, i.e, all descendants of a node are number before the node itself. For each node i having children i L and i R, for each, where k is the maximum number of caches to place. For each,where h is the height of the tree, we compute the quantity.

The optimal dynamic- programming algorithm is the cost of the subtree rooted at i with optimal located caches, where the next cache up the tree is at distance l from i. is the sum of the demands in the subtree rooted at i that do not pass through a cache in the optimal solution of.

The optimal dynamic- programming algorithm If no cache is to be put at node i If we put a cache at node i

The optimal dynamic- programming algorithm

While running the dynamic program we should also compute the appropriate, and keep track of the location of the caches in these solutions. The amount of data we have to keep is O(nhk). The overall time complexity is bounded by O(nhk 2 ).

Greedy versus optimal

Comparison of several placement strategies