Defining High-Speed Protocols: Five Challenges and an Example that Survives the Challenges Joseph D. Touch IEEE Journal on Selected Areas in Communications.

Slides:



Advertisements
Similar presentations
Proxy Server Systems for Wireless Mobile Web Service
Advertisements

Digital Fountains: Applications and Related Issues Michael Mitzenmacher.
System Area Network Abhiram Shandilya 12/06/01. Overview Introduction to System Area Networks SAN Design and Examples SAN Applications.
S3 Computer Literacy Internet Technology.
Spring 2000CS 4611 Introduction Outline Statistical Multiplexing Inter-Process Communication Network Architecture Performance Metrics.
Doc.: IEEE /0604r1 Submission May 2014 Slide 1 Modeling and Evaluating Variable Bit rate Video Steaming for ax Date: Authors:
CSCI-235 Micro-Computers in Science The Network. Network Fundamentals A computer network consists of two or more computers linked together to exchange.
Distributed Multimedia Systems
What’s the Problem Web Server 1 Web Server N Web system played an essential role in Proving and Retrieve information. Cause Overloaded Status and Longer.
Using DSVM to Implement a Distributed File System Ramon Lawrence Dept. of Computer Science
NETWORK LOAD BALANCING NLB.  Network Load Balancing (NLB) is a Clustering Technology.  Windows Based. (windows server).  To scale performance, Network.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Spring 2004 EE4272 EE4272: Computer Networks Instructor: Dr. Tricia Chigan Dept.: Elec. & Comp. Eng.
Prefix Caching assisted Periodic Broadcast for Streaming Popular Videos Yang Guo, Subhabrata Sen, and Don Towsley.
Chapter 2: Technology Infrastructure: The Internet and the World Wide Web.
Internet and Intranet Protocols and Applications Section V: Network Application Performance Lecture 11: Why the World Wide Wait? 4/11/2000 Arthur P. Goldberg.
Differentiated Multimedia Web Services Using Quality Aware Transcoding S. Chandra, C.Schlatter Ellis and A.Vahdat InfoCom 2000, IEEE Journal on Selected.
Wide Web Load Balancing Algorithm Design Yingfang Zhang.
Performance Comparison of Congested HTTP/2 Links Brian Card, CS /7/
1 Web Content Delivery Reading: Section and COS 461: Computer Networks Spring 2007 (MW 1:30-2:50 in Friend 004) Ioannis Avramopoulos Instructor:
What is adaptive web technology?  There is an increasingly large demand for software systems which are able to operate effectively in dynamic environments.
Application Layer  We will learn about protocols by examining popular application-level protocols  HTTP  FTP  SMTP / POP3 / IMAP  Focus on client-server.
COMPUTER TERMS PART 1. COOKIE A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information.
Exploiting Virtualization for Delivering Cloud based IPTV Services Speaker : 吳靖緯 MA0G IEEE Conference on Computer Communications Workshops.
Research on cloud computing application in the peer-to-peer based video-on-demand systems Speaker : 吳靖緯 MA0G rd International Workshop.
Hybrid Prefetching for WWW Proxy Servers Yui-Wen Horng, Wen-Jou Lin, Hsing Mei Department of Computer Science and Information Engineering Fu Jen Catholic.
Chapter 3 The Basics of Networking
Enhancement of IPTV using a Wireless Sensor Network Sandeep Kakumanu,Sriram Lakshmanan, and Raghupathy Sivakumar GNAN Research Group Georgia Institute.
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 1: Introduction What is an Operating System? Mainframe Systems Desktop Systems.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Infrastructure for Better Quality Internet Access & Web Publishing without Increasing Bandwidth Prof. Chi Chi Hung School of Computing, National University.
Network Aware Resource Allocation in Distributed Clouds.
Module 2: Information Technology Infrastructure
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 3.
PPT Slides by Dr. Craig Tyran & Kraig Pencil Computer Networking – Part 1 MIS 320 Kraig Pencil Summer 2014.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Sharing Information across Congestion Windows CSE222A Project Presentation March 15, 2005 Apurva Sharma.
Architectures of distributed systems Fundamental Models
CH1. Hardware: CPU: Ex: compute server (executes processor-intensive applications for clients), Other servers, such as file servers, do some computation.
High Performance Cluster Computing Architectures and Systems Hai Jin Internet and Cluster Computing Center.
Web Performance 성민영 SNU Computer Systems lab.. 2 차례 4 Modeling the Performance of HTTP Over Several Transport Protocols. 4 Summary Cache : A Scaleable.
Optimizing Bandwidth Utilization Defiana Arnaldy, M.Si
I/O Computer Organization II 1 Interconnecting Components Need interconnections between – CPU, memory, I/O controllers Bus: shared communication channel.
03/11/2015 Michael Chai; Behrouz Forouzan Staffordshire University School of Computing Streaming 1.
Creating Web Documents: How the Web works Client / Server Protocols Access methods Homework: Complete experiment & report on Discussion Forum.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
World Wide Web “WWW”, "Web" or "W3". World Wide Web “WWW”, "Web" or "W3"
1 Recommendations Now that 40 GbE has been adopted as part of the 802.3ba Task Force, there is a need to consider inter-switch links applications at 40.
August 23, 2001ITCom2001 Proxy Caching Mechanisms with Video Quality Adjustment Masahiro Sasabe Graduate School of Engineering Science Osaka University.
Multiplexing Team Members: Cesar Chavez Arne Solas Steven Fong Vi Duong David Nguyen.
CSCI-235 Micro-Computer Applications The Network.
COMPUTER NETWORKING 2 LECTURE 3: BROADBAND TECHNOLOGY & DSL.
1 COMP 431 Internet Services & Protocols HTTP Persistence & Web Caching Jasleen Kaur February 11, 2016.
2/18/2016Fatimah AlAkeel - Network 11 Introduction to Networks.
Introduction Computer networks: – definition – computer networks from the perspectives of users and designers – Evaluation criteria – Some concepts: –
Silberschatz and Galvin  Operating System Concepts Module 1: Introduction What is an operating system? Simple Batch Systems Multiprogramming.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
Performance Evaluation of Redirection Schemes in Content Distribution Networks Jussi Kangasharju, Keith W. Ross Institut Eurecom Jim W. Roberts France.
1 The Latency/Bandwidth Tradeoff in Gigabit Networks UBI 527 Data Communications Ozan TEKDUR , Fall.
SURENDRA INSTITUTE OF ENGINEERING & MANAGEMENT PRESENTED BY : Md. Mubarak Hussain DEPT-CSE ROLL
Chapter 1: Introduction What is an Operating System? Mainframe Systems Desktop Systems Multiprocessor Systems Distributed Systems Clustered System Real.
Lab A: Planning an Installation
Introduction to Networks
Wednesday, September 19, 2018 What Is the Internet?
Introduction to Networks
Introduction to Networks
Introduction to Networks
Computer Networks Protocols
Presentation transcript:

Defining High-Speed Protocols: Five Challenges and an Example that Survives the Challenges Joseph D. Touch IEEE Journal on Selected Areas in Communications May 1995 Presented by 李孝治

I. Introduction At the first IEEE Gigabit Networking (GBN) Workshop held prior to IEEE Infocom’94, a number of “gigabit applications” were presented. The criteria for “gigabit applications” were defined in the call-for-papers by a list of characteristics that ensures –that significant user bases exits and –that a gigabit network is required.

Two primary issues for gigabit protocols –increased speed or performance of existing protocols –domains where existing protocols may not suffice* (* what this paper is concerned with) This paper –summarizes the GBN criteria –justifies the need for additional challenges –presents the challenges –presents an application that survives these challenges

A. The GBN Criteria - a Review 1) Realistic consumer or business application (current or future). 2) Minimum bandwidth per user of many megabits per second. 3) Minimum potential base of thousands of simultaneous users. 4) Number of users  application bandwidth in excess of Tb/s. 5) Consumer video applications must be more sophisticated that broadcast or simple video-on- demand multicast.

Criteria 1 to 4 –Ensure that the application addresses substantial user communities and requires GBN Criteria 5 –Filters those applications that can already be implemented with existing protocols. –But dose not sufficiently exclude classes of gigabit application for which solutions already exist.  Goal: to define a set of criteria that require new protocols to use gigabit networking for real applications.

B. The killer Application and Killer Protocol An application that exhibits the goal: –World Wide Web client-server system with real-time interactive constraints.  – “WWWia” (WWW interactive applications) – (Satisfying Criteria 1) WWW is emerging as a dominant consumer and business application.

–WWW demands response time in the range of ms. –Consider: 100 ms transmission and switching latency 50 ms request/response processing 10 ms for other components  40 ms remain for file transmission.  For a 60 KB image  12 Mbps is needed. For a 200 KB still image  40 Mbps is needed. –(Satisfying Criteria 2) For larger file size and interactive case, the minimum bandwidth per user needs many megabits per second.

–(Satisfying Criteria 3) Minimum potential base of thousands of simultaneous users –(Satisfying Criteria 4) Aggregate bandwidth in excess of Tbps. –(Satisfying Criteria 5) Can existing protocol still be working?

C. Other Considerations WWW bandwidth need

C. Other Considerations To use unused bandwidth to reduce latency Bandwidth-delay product pipe –Vertical pipe (higher BW  tall pipe) –Horizontal pipe (lower BW  longitudinal pipe) B*D t Unused B*D t Unused

II. Primary Issues Two primary issues - A. Protocol Dose Not Run Fast Enough B. The Pipe is Not Kept Full –Note: The Pipe = bandwidth-delay product pipe

A. Protocol Dose Not Run Fast Enough –1) Data Path Is Not Fast To increase the clock rate of the data  To parallelize the data path –2) Control Path Is Not Fast To reduce the amount of control required To slow down the control –to make data packets (payload) larger  –to transmit multiple packets per control packet –3) End-to-End Latency Is Too Large To relocate everything  –To use caching –To circulate the data

B. The Pipe is Not Kept Full –When BD product  current WAN, speed is the issue –When BD product  current WAN, keeping the pipe full is the issue –1) The Pipe Is Empty. Because the Window Is Small To increase the window size  –2) Even with Large Windows, There Is Not Enough Stuff To use multiplexing to share the channel among processes 

III. Five Challenges #1 Increase the Clock Rate #2 Multiplex (Deterministic) #3 Use Large Payload #4 Increase Windows Size #5 Relocate Everything

IV. WWW Interactive Applications Goal: –Use bandwidth-delay product to reduce perceived latency Began as Mirage/Parallel Communication Latency compensation is done by – “source-based anticipation” (pre-sending) not by “receiver-base anticipation” (pre-fetching) –Advantage of pre-sending over pre-fetching distribution of computing avoid unnecessary pre-fetch better use of asymmetric communication channels

V. Defining Characteristics #1 Requires Feedback –Server keeps soft-state #2 “Nonlinear” Communication –non-deterministic –branching #3 “Well-Defined App.-App. BW

VI. An Example That Survives the Challenges (1) A. Survival –1) Increase the clock rate –2) Use deterministic multiplexing –3) Use Large payload –4) Speed TCP code/increase TCP windows –5) Requests feedback

VI. An Example That Survives the Challenges(2) B. Exhibits Characteristics –1) Requires feedback –2) “Nonlinear” communication –3) “Well-defined” app.-app. bandwidth

VII. WWWia’s Architecture Augmenting the exsisting WWW client/server with presenting pump and browser filter.

The pump and the filter together appear as a proxy cache to the client and server.

VIII. Observations Measured on current Web design. ISDN lines: –14% hit rate in 0.1 sec. with plain server –83% hit rate in 0.1 sec. with server pre- loading

No. of HREF’s vs Percentage of HTML pages

Presentable HTML pages vs. additional BW required

VIII. Observations (1) A. Performance –channel utilization goal: 50% (½ request + ½ response)  100% –effective bandwidth goal:  (½ request + ½ response) –effective latency reduced (by guessed messages) –overall cost in terms of “Bandwidth” acceptable -

VIII. Observations (2) B. Bandwidth Requirements –preload should be “droppable available-bit- rate” available-bit-rate: bandwidth is shared preemptive packet scheduler

VIII. Observations (3) C. Other Requirements –availability of sufficient cache storage at receiver: cache space = 1 Bandwidth-delay product at server: cache space  server overload, internal BW –availability of sufficient information independent of user/user history limited to the URL’s within links on one page

IX. Conclusion Five challenges for gigabit applications – that indicate where existing protocols may not work, and where new protocols are required. Interactive real-time WWW access –interactive distributed multimedia access –a class of applications that survive the challenges Source presenting (preloading) –to use excess bandwidth-delay product to reduce the browser response time. –a truly gigabit protocol