Caching And Prefetching For Web Content Distribution Presented By:- Harpreet Singh Sidong Zeng ECE -7995 Fall 2007.

Slides:



Advertisements
Similar presentations
Link Prediction and Path Analysis using Markov Chains
Advertisements

A Survey of Web Cache Replacement Strategies Stefan Podlipnig, Laszlo Boszormenyl University Klagenfurt ACM Computing Surveys, December 2003 Presenter:
Investigating Distributed Caching Mechanisms for Hadoop Gurmeet Singh Puneet Chandra Rashid Tahir.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Cache Coherent Distributed Shared Memory. Motivations Small processor count –SMP machines –Single shared memory with multiple processors interconnected.
Latency-sensitive hashing for collaborative Web caching Presented by: Xin Qi Yong Yang 09/04/2002.
1 Content Delivery Networks iBAND2 May 24, 1999 Dave Farber CTO Sandpiper Networks, Inc.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Analysis of Using Broadcast and Proxy for Streaming Layered Encoded Videos Wilson, Wing-Fai Poon and Kwok-Tung Lo.
Analysis of Web Caching Architectures: Hierarchical and Distributed Caching Pablo Rodriguez, Christian Spanner, and Ernst W. Biersack IEEE/ACM TRANSACTIONS.
Prefix Caching assisted Periodic Broadcast for Streaming Popular Videos Yang Guo, Subhabrata Sen, and Don Towsley.
What’s a Web Cache? Why do people use them? Web cache location Web cache purpose There are two main reasons that Web cache are used:  to reduce latency.
Improving Proxy Cache Performance: Analysis of Three Replacement Policies John Dilley and Martin Arlitt IEEE internet computing volume3 Nov-Dec 1999 Chun-Fu.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
Internet Networking Spring 2002 Tutorial 13 Web Caching Protocols ICP, CARP.
Web Caching1 By Amisha Thakkar Alpa Shah. Web Caching2 Overview What is a Web Cache ? Caching Terminology Why use a cache? Disadvantages of Web Cache.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Squirrel: A decentralized peer- to-peer web cache Paul Burstein 10/27/2003.
1 Web Content Delivery Reading: Section and COS 461: Computer Networks Spring 2007 (MW 1:30-2:50 in Friend 004) Ioannis Avramopoulos Instructor:
Web Caching Schemes For The Internet – cont. By Jia Wang.
1 The Mystery of Cooperative Web Caching 2 b b Web caching : is a process implemented by a caching proxy to improve the efficiency of the web. It reduces.
Loopback: Exploiting Collaborative Caches for Large-Scale Streaming Ewa Kusmierek, Yingfei Dong, Member, IEEE, and David H. C. Du, Fellow, IEEE.
1 ENHANCHING THE WEB’S INFRASTUCTURE: FROM CACHING TO REPLICATION ECE 7995 Presented By: Pooja Swami and Usha Parashetti.
World Wide Web Caching: Trends and Technology Greg Barish and Katia Obraczka USC Information Science Institute IEEE Communications Magazine, May 2000 Presented.
Data Cache Prefetching using a Global History Buffer Presented by: Chuck (Chengyan) Zhao Mar 30, 2004 Written by: - Kyle Nesbit - James Smith Department.
Web Cache. Introduction what is web cache?  Introducing proxy servers at certain points in the network that serve in caching Web documents for faster.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
P2P File Sharing Systems
YEE VANG WEB CACHE. INTRODUCTION Internet has many user Issues with access latency (lag) Server crashing How to solve? One solution, Web Cache.
Supporting Strong Cache Coherency for Active Caches in Multi-Tier Data-Centers over InfiniBand S. Narravula, P. Balaji, K. Vaidyanathan, S. Krishnamoorthy,
Hybrid Prefetching for WWW Proxy Servers Yui-Wen Horng, Wen-Jou Lin, Hsing Mei Department of Computer Science and Information Engineering Fu Jen Catholic.
Storage Allocation in Prefetching Techniques of Web Caches D. Zeng, F. Wang, S. Ram Appeared in proceedings of ACM conference in Electronic commerce (EC’03)
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Web Prefetching Between Low-Bandwidth Clients and Proxies : Potential and Performance Li Fan, Pei Cao and Wei Lin Quinn Jacobson (University of Wisconsin-Madsion)
World Wide Web Caching: Trends and Technologys Gerg Barish & Katia Obraczka USC Information Sciences Institute, USA,2000.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
Scalable Web Server on Heterogeneous Cluster CHEN Ge.
Understanding the Performance of Web Caching System with an Analysis Model and Simulation Xiaosong Hu Nur Zincir-Heywood Sep
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
Enabling Peer-to-Peer SDP in an Agent Environment University of Maryland Baltimore County USA.
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
The Intranet.
An Efficient Wireless Mesh Network A New Architecture 指導教授:許子衡 教授 學生:王志嘉.
HTTP evolution - TCP/IP issues Lecture 4 CM David De Roure
ICP and the Squid Web Cache Duane Wessels and K. Claffy 산업공학과 조희권.
MiddleMan: A Video Caching Proxy Server NOSSDAV 2000 Brian Smith Department of Computer Science Cornell University Ithaca, NY Soam Acharya Inktomi Corporation.
Content Delivery Networks: Status and Trends Speaker: Shao-Fen Chou Advisor: Dr. Ho-Ting Wu 5/8/
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Video Caching in Radio Access network: Impact on Delay and Capacity
Overview on Web Caching COSC 513 Class Presentation Instructor: Prof. M. Anvari Student name: Wei Wei ID:
/ Fast Web Content Delivery An Introduction to Related Techniques by Paper Survey B Li, Chien-chang R Sung, Chih-kuei.
Semantic collaborative web caching Jean-Marc Pierson Lionel Brunie, David Coquil LISI, INSA de LYON
Improving the WWW: Caching or Multicast? Pablo RodriguezErnst W. BiersackKeith W. Ross Institut EURECOM 2229, route des Cretes. BP , Sophia Antipolis.
Project Webpage: Funded by: mod _ kaPoW: Mitigating Denial-of-Service with Transparent Proof-of-Work Ed Kaiser & Wu-chang.
Cost-Effective Video Streaming Techniques Kien A. Hua School of EE & Computer Science University of Central Florida Orlando, FL U.S.A.
Internet and Intranet.
The Impact of Replacement Granularity on Video Caching
Memory Management for Scalable Web Data Servers
Internet Networking recitation #12
Internet and Intranet.
Distributed Systems CS
Evaluating Proxy Caching Algorithms in Mobile Environments
Outline Midterm results summary Distributed file systems – continued
Peer-to-Peer Video Services
Internet and Intranet.
Group Based Management of Distributed File Caches
Internet and Intranet.
Presentation transcript:

Caching And Prefetching For Web Content Distribution Presented By:- Harpreet Singh Sidong Zeng ECE Fall 2007

Contents Introduction Overview: Proxy Caching Systems Caching Challenges and solutions. Cache Replacement and Prefetching. Consistency Management. Cache Co-operation. Further Enhancements Conclusion.

Introduction WWW is internet widely used tool for information access. But now users often experience long access latency due to network congestion. In order to solve this problem Caching and prefetching Techniques plays an important role.

Proxy Caching System Proxy caching :- Proxy is generally deployed at network edge as an enterprise network gateway or fire wall. Proxy process internal client request either locally or forward the request to remote server. Proxy is shared by internal clients having similar interest,so its natural it cache commonly requested objects.

Proxy Caching System Proxy can’t satisfy a request, a cache miss occurs.

Proxy Caching System Proxy hit

Caching Challenges Cache replacement and prefetching Consistency management Co-operative management

Issue regarding Web caching Issue of size:-Proxy cache must be capable of handling numerous concurrent user requests. Heterogeneity in hardware and software configurations,connection bandwidth, and access behaviors which makes cache management tough. loose coupling :-Proxy cache consumers (Web browsers) and suppliers (servers) are loosely coupled. It makes managing consistency and cooperation among proxy caches particularly difficult.

Cache Replacement Insufficient disk space, a proxy must decide which existing objects to purge when a new object arrives. Replacement algorith like LRU are used. LRU offers limited room for improvement.

Prefetching policies Three types of prefetching policies Mixed access pattern. Per-client access pattern. Object structural information.

Mixed access pattern. This policy uses aggregate access patterns from different clients, but doesn’t explore which client made the request. E.g Top 10 proposal,Which uses popularity based prediction. This scheme determine how many objects to prefetch from which servers using two parameters.

Mixed access pattern. This policy uses aggregate access patterns from different clients, but doesn’t explore which client made the request. E.g Top 10 proposal,Which uses popularity based prediction. This scheme determine how many objects to prefetch from which servers using two parameters.

Mixed access pattern(cont..) M, the number of times the client has contacted a server before it can prefetch. N, the maximum number of objects the client can prefetch from a server. If the number of objects fetched in the previous measurement period L reaches the threshold N,the client will prefetch the K most popular objects from the server, where K = min{N, L}.

Per-client access pattern Policy first analyzes access patterns on a per-client basis, then uses the aggregated access patterns for prediction. One client access which object at particular time is analysed and according to that prefetching is predicted.

Per-client access pattern Markov modeling analysis tool,in which the policy establishes a Markov graph based on access histories and uses the graph to make prefetching predictions. Set of Web objects is represented as a node; if the same client accesses two nodes (A and B) in order within a certain period of time, the policy draws a direct link from A to B and assigns a weight with the transition probability from A to B.

Per-client access pattern

The probability of accessing B after A is 0.3. The probability of accessing C after A is 0.7. To make a prefetching prediction a search algorithm traverses the graph starting from the current object set and computes the access likelihood for its successors; then prefetching algorithm decide how many successors to preload,depending on factors such as access likelihood and the bandwidth available for prefetching.

Object structural information This scheme exploit the local information contained in objects themselves. Hyperlinks, for example, are good indictors of future accesses because users tend to access objects by clicking on links rather than typing new URLs. This Algorithm can also combine object information with access-pattern based policies to further improve predication efficiency and accuracy.

Consistency Management If the origin server updates an object after a proxy caches it, the cached copy becomes stale. Consistency Algorithm should ensure the consistency between the cached copy and the original object.

Consistency Algorithm Consistency algorithm can be classified: – strong consistency – weak consistency If t is the delay between the proxy and server, a strong consistency algorithm returns object outdated by t at most.

Enforce Strong Consistency Server-driven invalidation – Server must invalidate a proxy’s copies before it can update the objects. – Require extra space to maintain all objects’ states Clients-driven validation – The proxy validates the cached copies freshness with the server for every cache-hit access – Generate numerous unnecessary messages A hybrid approach is developed to balance the space required to maintain states with message volume that validations required

Weak Consistency Generally supported by validation, in which proxies verify the validity of their cached objects with the origin server – TTL-based validation – Proactive polling

Cache Cooperation The stand alone proxy has disadvantage – A single point failure – Performance bottleneck Caching proxies collaborate with one another in serving requests Three kind of architectures for cooperative caching proxies – Hierarchical caches architecture – Distributed cache architecture – Hybrid architecture

Cache Cooperation Limitation of hierarchy depth: most operational hierarchies have only three levels: – Institutional – Regional – National. Hierarchical caches

Distributed cache architecture All the participating proxy caches are peers.

Hybrid architecture Combine the advantages of the hierarchical and distributed caching.

Recent Researches Caching dynamic content Caching streaming objects Security and integrity issues

Caching Dynamic Content Contributes up to 40 percent of the total Web traffic. To improve the performance, developer have deployed reverse caches near the origin server to support dynamic content caching.

Caching streaming objects Represent a significant portion of Web traffic, such as music or video clips Streaming objects have three distinctive features – huge size – intensive bandwidth use – high interactivity One solution is partial caching

Security and integrity Difficult to protect it from various attacks for stand alone proxy Establishing a trust model among participants is a challenging for cooperative proxies Intermediate proxy violates the SSL’s functionality.

Conclusion Proxy caching effectively reduces the network resources that Web services consume, while minimizing user access latencies. Deploying Web caching proxies over the Internet is complicated and difficult.