NetCache Architecture and Deployment Peter Danzig Network Appliance, Santa Clara, CA 元智大學 系統實驗室 陳桂慧 1999.01.26.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
FIREWALLS Chapter 11.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 7 Working with Proxy Servers & Application-Level Firewalls By Whitman, Mattord,
Working with Proxy Servers and Application-Level Firewalls Chapter 5.
Security Firewall Firewall design principle. Firewall Characteristics.
Firewall Configuration Strategies
Network Operating Systems Users are aware of multiplicity of machines. Access to resources of various machines is done explicitly by: –Logging into the.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Chapter 2: Application Layer
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
Adaptive Web Caching: Towards a New Caching Architecture Authors and Institutions: Scott Michel, Khoi Nguyen, Adam Rosenstein and Lixia Zhang UCLA Computer.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
CS682 Session 6 Prof. Katz. Firewalls An intelligent router? Used as a traffic control mechanism Based on information in the Layer 3 and 4 headers Administrator.
Towards a Better Understanding of Web Resources and Server Responses for Improved Caching Craig E. Wills and Mikhail Mikhailov Computer Science Department.
1 Web Proxies Dr. Rocky K. C. Chang 6 November 2005.
Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
Implementing ISA Server Caching. Caching Overview ISA Server supports caching as a way to improve the speed of retrieving information from the Internet.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
16: Distributed Systems1 DISTRIBUTED SYSTEM STRUCTURES NETWORK OPERATING SYSTEMS The users are aware of the physical structure of the network. Each site.
Proxy Servers CS-480b Dick Steflik Proxy Servers Part of an overall Firewall strategy Sits between the local network and the external network Originally.
World Wide Web Caching: Trends and Technology Greg Barish and Katia Obraczka USC Information Science Institute IEEE Communications Magazine, May 2000 Presented.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Chapter 7: Working with Proxy Servers & Application-Level Firewalls
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
Web Cache. Introduction what is web cache?  Introducing proxy servers at certain points in the network that serve in caching Web documents for faster.
Internet Basics.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
IT 210 The Internet & World Wide Web introduction.
Server Load Balancing. Introduction Why is load balancing of servers needed? If there is only one web server responding to all the incoming HTTP requests.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
 Zhichun Li  The Robust and Secure Systems group at NEC Research Labs  Northwestern University  Tsinghua University 2.
HTTP; The World Wide Web Protocol
Redirection and Load Balancing
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
Chapter 6: Packet Filtering
Chapter 9: Novell NetWare
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
ASHIMA KALRA IMPORTANT TERMS.  WWW WWW  URL URL  HTTP PROTOCOL HTTP PROTOCOL  PROXIES PROXIES.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
World Wide Web Caching: Trends and Technologys Gerg Barish & Katia Obraczka USC Information Sciences Institute, USA,2000.
Web Cache Redirection using a Layer-4 switch: Architecture, issues, tradeoffs, and trends Shirish Sathaye Vice-President of Engineering.
(c) University of Technology, Sydney Firewall Architectures.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
Proxy Servers.
The Intranet.
ICP and the Squid Web Cache Duanc Wessels k Claffy August 13, 1997 元智大學系統實驗室 宮春富 2000/01/26.
TCP/IP (Transmission Control Protocol / Internet Protocol)
DYNAMIC LOAD BALANCING ON WEB-SERVER SYSTEMS by Valeria Cardellini Michele Colajanni Philip S. Yu.
Implementing ISA Server Caching
ICP and the Squid Web Cache Duane Wessels and K. Claffy 산업공학과 조희권.
Setup and Management for the CacheRaQ. Confidential, Page 2 Cache Installation Outline – Setup & Wizard – Cache Configurations –ICP.
The LSAM Proxy Cache - a Multicast Distributed Virtual Cache Joe Touch USC / Information Sciences Institute 元智大學 資訊工程研究所 系統實驗室 陳桂慧
CFTP - A Caching FTP Server Mark Russell and Tim Hopkins Computing Laboratory University of Kent Canterbury, CT2 7NF Kent, UK 元智大學 資訊工程研究所 系統實驗室 陳桂慧.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Cache Digest Alex Rousskov Duane Wessels National Laboratory for Applied Network Research April 17, 1998 元智大學 資訊工程研究所 系統實驗室 陳桂慧 February 9, 1999.
Overview on Web Caching COSC 513 Class Presentation Instructor: Prof. M. Anvari Student name: Wei Wei ID:
Improving the WWW: Caching or Multicast? Pablo RodriguezErnst W. BiersackKeith W. Ross Institut EURECOM 2229, route des Cretes. BP , Sophia Antipolis.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Netscape Application Server
Presentation transcript:

NetCache Architecture and Deployment Peter Danzig Network Appliance, Santa Clara, CA 元智大學 系統實驗室 陳桂慧

NetCache’s Architecture NetCache consists of: separate state machines to –fetch WWW, FTP, and Gopher pages from their respective servers, –tunnel HTTPS conversations, –parse HTTP-1.1 requests, –map objects from and to disk. state machines are driven by –network, disk, and timeout events.

NetCache block diagram

Design Principles(1) Avoid disk-ops –maintains a small description of each cached URL in a memory resident, 1/2MD5 indexed hash-table. – WAFL (Write-Anywhere-File-Layout) file system : write-optimized, log-structured, RAID-aware, with the unique property that its disk image is always consistent, allows no fsck ( never need to check file system consistency ) –almost never deletes a file or disassociates the directory entry from the inode to which it bound.

Design Principles(2) Keep it fast and simple –2/3 : TCP stack and I/O system, 1/3 : “Caching” application, a single NetCache node can keep several processors busy executing TCP, disk I/O, and the NetCache application itself. optimized NetCache on two-processor nodes. –To keep it maintainable, performance focused, and reasonably simple, we consciously chose not to make NetCache substitute for a firewall or an electronic commerce server.

Design Principles(3) Scale by robustly partitioning workload Instrument it extensively –NetCache permits remote monitoring and configuration through password-protected, access-controlled web pages. –NetCache instruments and reports the cache object hit rate, the bandwidth saved by caching, and the URL response time as perceived by users.

Design Features NetCache supports HTTP-1.1 persistent connections both to clients and to web and FTP servers. –eliminate the need to setup and tear down a TCP connection per URL NetCache dynamically reduces the amount of time –300 ~ 1 second, as needed to constrain the number of open network connections.

Filtering & Access Controls Access Controls –NetCache supports IP-based access control lists for monitoring and administration, proxy access, and ICP access. –Access controls can be tailored to specific clients by mapping client identity into the reverse DNS lookup. Filtering –NetCache supports regular expression-based filtering.

Partitioning Browser Traffic Proxy auto-configuration is the most cost- effective and easiest way to partition browser workload, and both Netscape and Microsoft browsers support it. Proxy auto-configuration transparently masks cache server failures, provides a mechanism to bypass caching during server maintenance.

Partitioning Browser Traffic(2) A load balancing TCP router follows three steps to map a client TCP session to a ready web cache. –First, it responds to the client TCP SYN packet on behalf of the web caches and establishes a TCP session with the client. –Second, it selects a web cache and creates a new TCP session with it. If it cannot create the TCP session with this cache, it tries to connect to alternative caches until succeeding. –Third, once both TCP sessions are established, it routes the client TCP packets to the cache by translating sequence and port numbers such that the two endpoints believe that they are communicating directly with one another.

Partitioning Hierarchically

Transparent Caching A transparent cache acts much like a gateway or firewall - it sits between the users and the network. An advantage of transparent caching is that browser reconfiguration (i.e., with respect to proxy designation) is not necessary. A disadvantage is that browser reconfiguration is not possible.

Transparent Caching The strength of a transparent cache –clients cannot easily bypass it, except when network routing flaps so that it no longer flows through the cache. Weaknesses –slower than non-transparent ones because standard caches perform and cache their DNS lookups, because browsers maintain persistent connections to traditional caches but not to transparent caches. –Most transparent caches do not cache FTP. Because transparent caches are difficult to bypass, it also hard to deploy quick fixes when a particular web server interacts badly with the cache software.

Summary SQUID - serves URLs/second. NetCache - serves URLs/second. Because it close integration with the file system and Data ONTAP microkernel.