Technical papers Web caches

Size: px
Start display at page:

Download "Technical papers Web caches"

Transcription

1 Technical papers Web caches Web caches What is a web cache? In their simplest form, web caches store temporary copies of web objects. They are designed primarily to improve the accessibility and availability of this type of data to end users. Caching is not an alternative to increased connectivity, but instead optimises the usage of available bandwidth. After the initial access/download, schools can access a single locally stored copy of the content rather than repeatedly requesting the same content from the origin server. Content delivery works on the principle of delivering content to the local network before it is required, rather than the on-demand approach of normal caching. This technical paper focuses on the practical issues surrounding caches; it will look at hardware and software solutions and advanced features that provide shared services to users over a network. How will a cache benefit my institution? Caching minimises the number of times an identical web object is transferred from its host server by retaining copies of requested objects in a database or repository. Requests for previously cached objects result in the cached copy of the object being returned to the user from the local repository rather than from the host server. This results in little or no extra network traffic over the external link and increases the speed of delivery. Caches are limited by the amount of disk space when a cache is full, older objects are removed and replaced with newer content. Some systems may implement 'persistency' measures, however, to preserve certain types of content at the discretion of the administrator. Example: A school has a 10Mbps local area network (LAN) and a 128Kbps ISDN connection to the Internet, where the local network is 80 times faster than the Internet connection. Consider a class situation where a suite of computers is trying to download a large graphic, perhaps 256KB in size. This would take each computer in the suite 16 seconds to download across the 128Kbps connection (128Kbps = 16 KBps). If a cache is implemented on the local network, the cache computer will download a single copy of the graphic at a maximum speed of 128Kbps, and then pass this on to each computer over the high-speed LAN connection at 10Mbps. Across a 10Mbps connection (10Mbps = 640 KBps), the transfer would take approximately half a second. In practice, transfer rates will be lower than these figures which allow for network overhead. How does a web cache work? The flowchart below illustrates what happens when a user requests a web page. The thicker lines represent the normally higher-speed local connections between the client and the cache, while the thinner lines represent the slower connection speeds over the Internet. Becta 2004 Valid at September 2004 page 1 of 8

2 Where are web caches used? Caches may be installed in different locations on networks for a variety of reasons: Local caches are the most common type; they sit on the edge of the LAN just before the Internet connection. All outbound web requests are directed through them in an effort to fulfil web requests locally before passing traffic over the Internet connection. ISP caches are used on the networks of most Internet Service Providers (ISPs). They provide customers with improved performance and conserve bandwidth on their own external connections to the Internet. Reverse caches are used to reduce the workload of content provider s web servers. They position the cache between the web server and its internet connection, so that when a remote user requests a web page, the request must first pass through the cache before reaching the web server. If the cache has a stored copy of the requested item, it delivers it direct rather than passing the request through to the web server. Becta 2004 Valid at September 2004 page 2 of 8

3 This document concentrates on local caches, although most of the information applies to all caches. The diagram below shows the different positions that caches can occupy on networks. As a request for information passes from the LAN to the content provider it passes through several caches, each trying to fulfil the request from their own repositories. Sometimes a request will never reach the content provider s host web server, instead being fulfilled by a cache somewhere en route. What are the advantages and disadvantages of caching? Advantages: Fast performance on cached content if content is already in the cache it is returned more quickly, even for multiple users wanting to access the same content. Improved user perception and productivity quicker delivery of content means less waiting time and increased user satisfaction with the performance of the system. Less bandwidth used if content is cached locally on the LAN, web requests do not consume Internet connection bandwidth. User monitoring and logging if a cache manages all web requests (behaving in some ways like a proxy), a centralised log can be kept of all user access. Care must be taken that any information held is in accordance with appropriate privacy regulations and the institution's policy. Caching benefits both the single end user and the content providers ISPs and other users of the same infrastructure all benefit greatly from the reduction in bandwidth usage. Disadvantages: Slower performance if an object is not cached an extra layer is added to the process, which adds time. Becta 2004 Valid at September 2004 page 3 of 8

4 Subscription sites may become confused some subscription services use IP addresses for authentication. The advent of dynamic client bypass technology, which passes the user s original IP address to the host server, coupled with an increase in the use of other methods of authentication by content providers mean this is becoming less common, however. Additional hardware or expertise may be required any new system will potentially require extra hardware and software resources, with ongoing support needed after installation. Dynamically generated content cannot be cached the results of CGI scripts or certain types of database content are increasingly common on the World Wide Web, but cannot be cached. What is the difference between transparent and non-transparent caches? Caches can differ according to their so-called transparency, which will affect the degree of configuration required for a network during device installation. Transparent caches do not require any settings to be changed on individual client machines. Instead, the network router or switch is configured to forward all requests automatically through to the cache. This has the advantage of allowing a cache to be easily introduced and removed without reconfiguring the client computers. However, it can generate confusing error messages if a page is not found and make finding the location of any problems difficult. Non-transparent caches require the settings on each client computer to be changed to point at the appropriate cache. In this case, error messages will normally show clearly if a problem is with the cache itself. However should a change of cache server be required, perhaps for maintenance reasons, the clients may have to be reconfigured with the new cache s information. How well will a cache work in a classroom situation? Caches can enhance the ways in which the Internet is used in the classroom. Teachers can pre-load a cache with particular web sites in advance of a lesson, either by simply visiting the required sites with a computer that uses the cache or by having the content pre-positioned into the cache by a management system. For example: if a school buys content from a commercial provider they might opt to pre-load or copy it to their local cache in advance of using it in lessons. When teachers and pupils wanted to use this content they would then be accessing it from the LAN rather than from the Internet. This would give fast, high-quality access without delays and without large numbers of students having to share an Internet connection. The worst case scenario in a cached environment is that the first user to request a page will experience a slightly longer delay than normal. Some solutions, however, do not have the capability to cache multimedia content such as real time streaming media files. It is possible for more advanced cache solutions to reduce bandwidth by only requesting one stream from the host web server and then splitting that stream to many computers on the LAN. Multimedia content stored in static files where the whole file must be downloaded before it can be played will in most cases be cached as normal. How do I install a cache? Installing a web cache to a LAN is relatively straightforward. An additional computer system or dedicated appliance is connected to the LAN, and the clients or router are configured, if required, to access this system. The cache itself is installed through a software program Becta 2004 Valid at September 2004 page 4 of 8

5 executed either on its own dedicated hardware or as one of many programs running on a shared server. Microsoft's Internet Security and Acceleration (ISA) Server is based on Windows 2000 and can run on its own or on a Windows 2000 server with other software. Similar arrangements are possible with Linux-based systems running software such as Squid. The main alternative would be a discrete hardware-based solution optimised for this specific role. Examples of such a solution include Volera or a Cisco unit. The appropriateness of each solution depends on a number of factors, including the number of simultaneous users, available bandwidth and available resources. Functionality can also vary developments in this area are concerned with moving away from just caching static HTML pages towards accelerating the whole web experience. An institution should be able to function adequately with a single server of reasonable specification (for Linux, a Pentium II with sufficient memory; Versions of Squid are available for NT, and the server specification should be increased according to the suppliers instructions). Specialist solutions including multiple servers need only be considered for LEAwide services and larger. The National JANET Web Cache Service has an article on sizing servers using the Squid proxy on Linux. This service runs approximately 40 servers for the HE & FE community; and requests regularly exceed one million a day. Example: In a single small or medium-sized institution, a basic web cache system could be easily implemented on a Pentium II processor with 64MB-256MB of memory and two GB-20GB of hard disk storage using Linux and the Squid caching software. The minimum requirements for the Microsoft Internet Security and Acceleration Server are a Pentium III processor with 256MB of RAM. For larger or more complex installations, it is sensible to consult a network system specialist. It is possible to connect caches together to improve the efficiency of the service and provide multiple layers. To do this, the onward ISP should be consulted. What are the costs and cost savings of a cache? It is difficult to put a precise cost on the benefits of a cache service, as its success will depend on the nature of the users. For example, in a sixth-form environment, where many students are looking at different pages, the benefits are less obvious than in a school environment, where groups or classes access the same material simultaneously. In the latter example, it could be said that cache solutions multiply bandwidth and, it follows, provide a kind of cost saving as they are providing users with a service equivalent to a higher bandwidth connection. The costs of implementing a solution are equally variable and will include purchase of hardware and software, installation and maintenance. The cheapest cache solution in terms of capital cost is likely to be a Linux-based solution, which uses free software and can run on reasonably low-specification hardware. The total cost of ownership should be considered with any system although most server software is reasonably reliable and will run for long periods without any attention, costs of maintenance and support may be a factor. Some vendors provide systems offering caching facilities on a rental basis where, instead of purchasing hardware, an annual fee is payable to cover installation and ongoing support for the service. Implementing a cache with good management and reporting facilities can identify usage patterns, cache effectiveness and bandwidth consumption. If the administrator uses these Becta 2004 Valid at September 2004 page 5 of 8

6 reports effectively they will show how much of the Internet connection s bandwidth is being used and whether the current connection is meeting demand for that site. What other functions do caches have? Caches have progressed from being merely software applications that control a store of information to being managed appliances designed specifically for content delivery. Some of the advanced functions are described below: Stream splitting is when a stream of data from a host server is divided at the cache for transmission to multiple LAN computers. If five users request a one Mb stream of video from, say, a BBC web site without a stream splittingenabled cache this would take up five Mb of the Internet connection bandwidth. With stream splitting this would only take up one Mb of the Internet connection bandwidth. Content filtering functions can be integrated with cache software so that a cache can block access to certain web sites depending on their content. Filtering normally adds to the cost of the cache, but does reduce bandwidth consumed, however, by not allowing access to inappropriate sites. WCCP (Web Cache Communication Protocol) is a protocol that transparently routes all web traffic to the local cache before it leaves the LAN. It also provides extra features such as load balancing and multicasting, as well as certain security functions. Scalability of caches and linking caches together can improve performance greatly. If one cache knows what another cache has in its repository it can redirect requests to that cache as and when required. Overload bypass is a feature that allows the cache to pass traffic that it is too busy to deal with to web servers rather than have those requests for information held in a queue at the cache. As caches increase in intelligence and complexity they offer increased report and management functionality. Logs and reports can be produced for each user, for each web site visited, the time of visit etc. These reports can be used to assist in the efficient running of a cached environment and optimise available bandwidth. Pre-positioning is the downloading of content to the cache appliance before the user requests it. This becomes more crucial when accessing video and rich media clips. The burden is taken off the network during peak usage hours if this download can be scheduled to occur out of hours How does a cache differ from a proxy? A cache server is not the same as a proxy server. Cache servers have a proxy function with regard to requests for certain content from the World Wide Web. When a client passes all their requests for web objects via a cache, this cache is effectively acting as a proxy server. Caching is a common function of proxy servers. Proxy servers perform a number of other functions, too, mainly centred on security and administrative control. Broadly speaking, a proxy server sits between a number of clients and Becta 2004 Valid at September 2004 page 6 of 8

7 the Internet. Any requests made to the Internet from a LAN computer are forwarded to the proxy server which will then make the requests itself. The key differences between a proxy and caches are: A proxy server will handle more requests than just those for web content. A proxy server does not by default cache any data that passes through it. There are certain security benefits based on the fact that proxy servers hide other computers on the network from the Internet making it is impossible for individual machines to be targeted for attack. The requirement for 'public' IP addresses is also removed, so that any number of computers can share one public address that is configured to the proxy rather than each computer needing a unique IP address. This has implications for video conferencing and other point-to-point applications which might require some additional resource or configuration. What standards are there for caches? CERN is a standard for application aware proxy services over HTTP-based client/server communications. A CERN server is slow and not suitable for heavy traffic. ICP is the Internet Caching Protocol that exchanges data between caches about the existence of stored information. WCCP is a Cisco router control protocol that transparently routes TCP port 80 packets to cache appliances and incorporates value-added features such as load balancing, security features and multicasting. What about storing multiple copies of content in a cache? Storing multiple copies of the same file on multiple caches can create licensing problems. Although CERN caching has been around since 1993 different content providers have varying opinions on the caching of their material. Caching servers do not encourage or assist in breaking copyright. Multiple caches may be combined and managed in order to provide a more efficient and scaleable content delivery service. The details of this are outside the scope of this information sheet, however the principles are worth a mention. In multiple, but non co-ordinated caches, each cache operates independently by checking its own repository and then passing requests on towards the actual host server. It would not be unreasonable to assume that the first request for content would be delayed at a number of stages on its route between client and host server, as different caches compare their own stores, pass requests on, and make a copy of any information returned. A fully managed system makes it possible for the LAN cache to query a number of other caches or a management appliance for the requested content. If this content is found on another cache the download can take place from this location rather than the host server. This works well where multiple sites are linked to one central site that has combined caches, as all the central caches will be queried for the content rather than just one. What should I be looking for when purchasing caching equipment? For effective content delivery in schools it is essential that the content delivery and caching service in a school is compatible with the equipment installed by the LEA or the RBC. Schools should consult Becta s Content Delivery Network Application Profile, which can be found at [ Becta 2004 Valid at September 2004 page 7 of 8

8 Other sources of information Software, hardware and service providers Akamai [ A commercial multimedia cache company which hosts content around the world for content providers. Equiinet [ Producers of integrated gateway devices that include cache functionality Microsoft Internet Security and Acceleration Server [ This has information on the current Microsoft solution. Squid [ Cache software. Cisco [ Provides information on cache and content delivery solutions. Volera [ Content acceleration and networking solutions. RM SmartCache/RM SmartTracker [ Product specifically for schools. RM SmartTracker is a service that sits on RM SmartCache and allows schools to keep a close eye on individual users' web-browsing activities. Reports and further reading Cashing in on Caching [ Ariadne article. Report on web caching now archived [ JISC Report. Web Caching and Content Delivery Resources [ Developing institution policies. Sizing Squid Caches [ JANET Server sheet. Becta 2004 Valid at September 2004 page 8 of 8

Virtual private networks

Virtual private networks Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible

More information

Enterprise Content Networking System

Enterprise Content Networking System Enterprise Content Networking System How Cisco IT Deployed Content Networking to Improve Application Performance and Security A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Consolidate

More information

Seven Criteria for a Sound Investment in WAN Optimization

Seven Criteria for a Sound Investment in WAN Optimization Seven Criteria for a Sound Investment in WAN Optimization Introduction WAN optimization technology brings three important business benefits to IT organizations: Reduces branch office infrastructure costs

More information

Table of Contents. Cisco How NAT Works

Table of Contents. Cisco How NAT Works Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9

More information

Internet Nuts and Bolts

Internet Nuts and Bolts Internet Nuts and Bolts Michael Oakes moakes@rm.com Introduction What is the internet? Comparing browsers Wireless, the basics Getting the most out of your connection Diagnosing problems Learning Platform

More information

South East Grid for Learning

South East Grid for Learning Instructions for Surrey schools on the SEGfL Video Conferencing Service South East Grid for Learning Version 1.1 Date: January 2007 SEGfL Video Conferencing Service Page 1 Registration of Endponts Introduction...3

More information

FUJITSU Software Interstage Information Integrator V11

FUJITSU Software Interstage Information Integrator V11 FUJITSU Software V11 An Innovative WAN optimization solution to bring out maximum network performance October, 2013 Fujitsu Limited Contents Overview Key technologies Supported network characteristics

More information

COMPARING COST MODELS - DETAILS

COMPARING COST MODELS - DETAILS COMPARING COST MODELS - DETAILS SOFTLAYER TOTAL COST OF OWNERSHIP (TCO) CALCULATOR APPROACH The Detailed comparison tab in the TCO Calculator provides a tool with which to do a cost comparison between

More information

SANGFOR AD Product Series

SANGFOR AD Product Series SANGFOR Application Delivery (AD) Product Series provides customers with the global server load balance(gslb), inbound/outbound load balance, server load balance, SSL off-load and anti-ddos solutions for

More information

SANGFOR AD Product Series

SANGFOR AD Product Series SANGFOR Application Delivery (AD) Product Series provides customers with the global server load balance(gslb), inbound/outbound load balance, server load balance, SSL off-load and anti-ddos solutions for

More information

Solace JMS Broker Delivers Highest Throughput for Persistent and Non-Persistent Delivery

Solace JMS Broker Delivers Highest Throughput for Persistent and Non-Persistent Delivery Solace JMS Broker Delivers Highest Throughput for Persistent and Non-Persistent Delivery Java Message Service (JMS) is a standardized messaging interface that has become a pervasive part of the IT landscape

More information

New Cisco 2800 And 3800 Series Integrated Services Router Wan Optimization Bundles

New Cisco 2800 And 3800 Series Integrated Services Router Wan Optimization Bundles Q&A New Cisco 2800 And 3800 Series Integrated Wan Optimization Bundles Q. What are the components of the new Cisco 2800 and 3800 series integrated services router WAN optimization bundles? A. There are

More information

Deployment Scenarios for Standalone Content Engines

Deployment Scenarios for Standalone Content Engines CHAPTER 3 Deployment Scenarios for Standalone Content Engines This chapter introduces some sample scenarios for deploying standalone Content Engines in enterprise and service provider environments. This

More information

Software. Linux. Squid Windows

Software. Linux. Squid Windows Proxy Server Introduction A proxy server services client requests by forwarding : the requests to the destination server. The requests appear to come from the proxy server and not from the client. the

More information

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The

More information

PLATO Learning Environment (v2.0) System and Configuration Requirements

PLATO Learning Environment (v2.0) System and Configuration Requirements PLATO Learning Environment (v2.0) System and Configuration Requirements For Workstations July 30, 2010 Windows XP Home and Professional (SP3) Windows Vista Home/Premium/Business/Ultimate Windows 7 Home/Premium/Business/Ultimate

More information

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ Q-Balancer Range FAQ The Q-Balance LB Series The Q-Balance Balance Series is designed for Small and medium enterprises (SMEs) to provide cost-effective solutions for link resilience and load balancing

More information

Client-server Basics. 1. Motivation

Client-server Basics. 1. Motivation Page 1 of 8 Client-server Basics Oxford Brookes University 2004 Contents 1. Motivation 2. Basic Model of the Web 3. Extensions - Caching and Proxies 4. High Performance Web Servers 5. Web Services Appendices

More information

Routing Protocol comparison

Routing Protocol comparison Routing Protocol comparison Introduction to routing Networks allow people to communicate, collaborate, and interact in many ways. Networks are used to access web pages, talk using IP telephones, participate

More information

Configuring Web Cache Services By Using WCCP

Configuring Web Cache Services By Using WCCP CHAPTER 44 Configuring Web Cache Services By Using WCCP This chapter describes how to configure your Catalyst 3560 switch to redirect traffic to wide-area application engines (such as the Cisco Cache Engine

More information

PLATO Learning Environment System and Configuration Requirements

PLATO Learning Environment System and Configuration Requirements PLATO Learning Environment System and Configuration Requirements For Workstations December 13, 2010 1 Content About This Document... 3 Document Change Log... 4 System & Configuration Requirements... 5

More information

Media File Options. Deployment and Ongoing Management. This chapter covers the following topics:

Media File Options. Deployment and Ongoing Management. This chapter covers the following topics: This chapter covers the following topics: Deployment and Ongoing Management, page 1 Co-Resident Unified CVP Call Server, Media Server, and Unified CVP VXML Server, page 2 Bandwidth Calculation for Prompt

More information

Configuring WMT Streaming Media Services on Standalone Content Engines

Configuring WMT Streaming Media Services on Standalone Content Engines CHAPTER 9 Configuring WMT Streaming Media Services on Standalone Content Engines This chapter provides an overview of the Windows Media Technologies (WMT) streaming and caching services, and describes

More information

Cisco Wide Area Application Services and Cisco Nexus Family Switches: Enable the Intelligent Data Center

Cisco Wide Area Application Services and Cisco Nexus Family Switches: Enable the Intelligent Data Center Cisco Wide Area Application Services and Cisco Nexus Family Switches: Enable the Intelligent Data Center What You Will Learn IT departments are facing increasing pressure to accommodate numerous changing

More information

Design of Infrastructure for NCR Counterpoint

Design of Infrastructure for NCR Counterpoint Design of Infrastructure for NCR Counterpoint The purpose of this document is to assist in determining the correct type of implementation, help implementation teams make critical decisions buying or building

More information

Clustering and Reclustering HEP Data in Object Databases

Clustering and Reclustering HEP Data in Object Databases Clustering and Reclustering HEP Data in Object Databases Koen Holtman CERN EP division CH - Geneva 3, Switzerland We formulate principles for the clustering of data, applicable to both sequential HEP applications

More information

Premium Web Cache Server JAGUAR 5000

Premium Web Cache Server JAGUAR 5000 Web Appliance Products Premium Web Cache Server JAGUAR 5000 Headquarters 13 Fl., Eunsung Bldg., 53-8 Cheongdamdong Kangnamgu Seoul, Korea 135-763 Tel +8-3446-6070 Fax +8-3445-9099 R&D Center 34 Gajeongdong,

More information

Performance Evaluation of National Knowledge Network Connectivity

Performance Evaluation of National Knowledge Network Connectivity International Journal of Computer Applications (975 888) Performance Evaluation of National Knowledge Network Connectivity Vipin Saxena, PhD. Department of Computer Science B.B. Ambedkar University (A

More information

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy Que: -Proxy server Introduction: Proxy simply means acting on someone other s behalf. A Proxy acts on behalf of the client or user to provide access to a network service, and it shields each side from

More information

Deployment Guides. Help Documentation

Deployment Guides. Help Documentation Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2019 SmarterTools Inc. Deployment Guides SmarterMail in Individual and Micro-business

More information

Proxying. Why and How. Alon Altman. Haifa Linux Club. Proxying p.1/24

Proxying. Why and How. Alon Altman. Haifa Linux Club. Proxying p.1/24 Proxying p.1/24 Proxying Why and How Alon Altman alon@haifux.org Haifa Linux Club Proxying p.2/24 Definition proxy \Prox"y\, n.; pl. Proxies. The agency for another who acts through the agent; authority

More information

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model:

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model: MX Sizing Guide AUGUST 2016 This technical document provides guidelines for choosing the right Cisco Meraki security appliance based on real-world deployments, industry standard benchmarks and in-depth

More information

Modelling and Analysis of Push Caching

Modelling and Analysis of Push Caching Modelling and Analysis of Push Caching R. G. DE SILVA School of Information Systems, Technology & Management University of New South Wales Sydney 2052 AUSTRALIA Abstract: - In e-commerce applications,

More information

MX Sizing Guide. 4Gon Tel: +44 (0) Fax: +44 (0)

MX Sizing Guide. 4Gon   Tel: +44 (0) Fax: +44 (0) MX Sizing Guide FEBRUARY 2015 This technical document provides guidelines for choosing the right Cisco Meraki security appliance based on real-world deployments, industry standard benchmarks and in-depth

More information

Why WAN accelerators (still) matter? Andrea Dainese Data Center Engineer

Why WAN accelerators (still) matter? Andrea Dainese Data Center Engineer Why WAN accelerators (still) matter? Data Center Engineer Presentation Data Center Engineer @ Cerved Group SpA Red Hat RHCE VMware VCP-DCV NetApp NCIE-SAN Cisco CCIE Who is Andrea Dainese Cisco Architecture

More information

One of the big complaints from remote

One of the big complaints from remote Remote Access Response Time Blues Robin Layland Robin Layland is president of Layland Consulting, a firm that specializes in network architecture and new technology. He has more than 25 years experience

More information

Configuring Caching Services

Configuring Caching Services CHAPTER 8 This chapter describes how to configure conventional caching services (HTTP, FTP [FTP-over-HTTP caching and native FTP caching], HTTPS, and DNS caching) for centrally managed Content Engines.

More information

Truffle Broadband Bonding Network Appliance

Truffle Broadband Bonding Network Appliance Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive

More information

Cache Memory Part 1. Cache Memory Part 1 1

Cache Memory Part 1. Cache Memory Part 1 1 Cache Memory Part 1 Cache Memory Part 1 1 - Definition: Cache (Pronounced as cash ) is a small and very fast temporary storage memory. It is designed to speed up the transfer of data and instructions.

More information

Load Balancing Technology White Paper

Load Balancing Technology White Paper Load Balancing Technology White Paper Keywords: Server, gateway, link, load balancing, SLB, LLB Abstract: This document describes the background, implementation, and operating mechanism of the load balancing

More information

Evaluating external network bandwidth load for Google Apps

Evaluating external network bandwidth load for Google Apps Evaluating external network bandwidth load for Google Apps This document describes how to perform measurements to better understand how much network load will be caused by using a software as a service

More information

Improve Web Application Performance with Zend Platform

Improve Web Application Performance with Zend Platform Improve Web Application Performance with Zend Platform Shahar Evron Zend Sr. PHP Specialist Copyright 2007, Zend Technologies Inc. Agenda Benchmark Setup Comprehensive Performance Multilayered Caching

More information

Cisco Wide Area Application Services (WAAS) Mobile

Cisco Wide Area Application Services (WAAS) Mobile Cisco Wide Area Application Services (WAAS) Mobile Product Overview Cisco Wide Area Application Services (WAAS) Mobile extends Cisco WAAS Software application acceleration benefits to mobile employees

More information

OpenCache. A Platform for Efficient Video Delivery. Matthew Broadbent. 1 st Year PhD Student

OpenCache. A Platform for Efficient Video Delivery. Matthew Broadbent. 1 st Year PhD Student OpenCache A Platform for Efficient Video Delivery Matthew Broadbent 1 st Year PhD Student Motivation Consumption of video content on the Internet is constantly expanding Video-on-demand is an ever greater

More information

Silicon House. Phone: / / / Enquiry: Visit:

Silicon House. Phone: / / / Enquiry:  Visit: Silicon House Powering Top Blue Chip Companies and Successful Hot Start Ups around the World Ranked TOP Performer among the registrars by NIXI Serving over 750000 clients in 90+ countries Phone: +91-7667-200-300

More information

Cisco Data Center Network Manager 5.1

Cisco Data Center Network Manager 5.1 Cisco Data Center Network Manager 5.1 Product Overview Modern data centers are becoming increasingly large and complex. New technology architectures such as cloud computing and virtualization are adding

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

Internet Architecture

Internet Architecture Internet Architecture Lecture 3: How TCP/IP Works & Understanding the Internet's Software Structure Assistant Teacher Samraa Adnan Al-Asadi 1 How TCP/IP Works Packet: A piece of data broken down into pieces

More information

Overview Content Delivery Computer Networking Lecture 15: The Web Peter Steenkiste. Fall 2016

Overview Content Delivery Computer Networking Lecture 15: The Web Peter Steenkiste. Fall 2016 Overview Content Delivery 15-441 15-441 Computer Networking 15-641 Lecture 15: The Web Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Web Protocol interactions HTTP versions Caching Cookies

More information

Mailroom Outsourcing. Business Solutions

Mailroom Outsourcing. Business Solutions Mailroom Outsourcing Business Solutions Strip out internal costs Improve speed of delivery Greatly reduce transport costs Centralise mail processing Automate mail routing Improve traceability and compliance

More information

6 Key Factors to Consider When Choosing a Transparent Caching Solution

6 Key Factors to Consider When Choosing a Transparent Caching Solution 6 Key Factors to Consider When Choosing a Transparent Caching Solution 2013 Qwilt 1 OVERVIEW Transparent caching solutions help carriers reduce the impact of over-the-top (OTT) video traffic on their networks,

More information

Media File Options. Deployment and Ongoing Management CHAPTER

Media File Options. Deployment and Ongoing Management CHAPTER CHAPTER 12 Last revised on: November 30, 2009 This chapter covers the following topics: Deployment and Ongoing Management, page 12-1 Co-Resident Call Server, Media Server, and Unified CVP VXML Server,

More information

Computer networks for the home

Computer networks for the home Technical paper Computer networks for the home Computer networks for the home An overview This paper gives information about current and emerging technologies for networking computers in the home. It is

More information

Deployments and Network Topologies

Deployments and Network Topologies TECHNICAL GUIDE Deployments and Network Topologies A technical guide to deploying Family Zone School in different network topologies. Contents Introduction...........................................3 Transparent

More information

Migration to IPv6 from IPv4. Is it necessary?

Migration to IPv6 from IPv4. Is it necessary? Introduction Today Internet plays a big role in every aspect of our lives and IP acted as an important pillar of Internet. Since its inception the Internet has reached almost all corners of globe and it

More information

Stratford School Academy Schemes of Work

Stratford School Academy Schemes of Work Number of weeks (between 6&8) Content of the unit Assumed prior learning (tested at the beginning of the unit) 6 This is a theoretical unit covering the basic principles and architecture of local and wide

More information

Never Drop a Call With TecInfo SIP Proxy White Paper

Never Drop a Call With TecInfo SIP Proxy White Paper Innovative Solutions. Trusted Performance. Intelligently Engineered. Never Drop a Call With TecInfo SIP Proxy White Paper TecInfo SD-WAN product - PowerLink - enables real time traffic like VoIP, video

More information

DATABASE SCALABILITY AND CLUSTERING

DATABASE SCALABILITY AND CLUSTERING WHITE PAPER DATABASE SCALABILITY AND CLUSTERING As application architectures become increasingly dependent on distributed communication and processing, it is extremely important to understand where the

More information

Logical Network Design (Part II)

Logical Network Design (Part II) Logical Network Design (Part II) DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS IIT, Abbottabad Pakistan Telecommunication Network Design (TND) Possible (Part

More information

2

2 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 There are examples of other architectures such as ATM and FDDI, however, these are not common. 35 36 37 Space

More information

Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network

Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network Requirement Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network This set of labs works in conjunction with Professor Ray Panko s textbook, Business Data Networks and Telecommunications.

More information

Securing Grid Data Transfer Services with Active Network Portals

Securing Grid Data Transfer Services with Active Network Portals Securing with Active Network Portals Onur Demir 1 2 Kanad Ghose 3 Madhusudhan Govindaraju 4 Department of Computer Science Binghamton University (SUNY) {onur 1, mike 2, ghose 3, mgovinda 4 }@cs.binghamton.edu

More information

Active Server Pages Architecture

Active Server Pages Architecture Active Server Pages Architecture Li Yi South Bank University Contents 1. Introduction... 2 1.1 Host-based databases... 2 1.2 Client/server databases... 2 1.3 Web databases... 3 2. Active Server Pages...

More information

CCDP-ARCH. Section 11. Content Networking

CCDP-ARCH. Section 11. Content Networking CCDP-ARCH Section 11 As a designer, content networking technologies allows you to intelligently distribute content throughout the network, thereby reducing WAN bandwidth requirements. For example, a user

More information

Ch. 5 - ISDN - Integrated Services Digital Network

Ch. 5 - ISDN - Integrated Services Digital Network Ch. 5 - ISDN - Integrated Services Digital Network 1 Overview 2 Basic elements in ISDN 3 ISDN - access 4 ISDN - the bus 5 ISDN - examples 6 ISDN - between LAN s 7 ISDN - access to Internet 8 ISDN - small

More information

Review: Networking Fall Final

Review: Networking Fall Final Review: Networking Fall Final Question 1 of 43 You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have? Peer to peer

More information

Security Device Roles

Security Device Roles Kennesaw State University DigitalCommons@Kennesaw State University KSU Proceedings on Cybersecurity Education, Research and Practice 2017 KSU Conference on Cybersecurity Education, Research and Practice

More information

Media File Options. Deployment and Management of Voice Prompts

Media File Options. Deployment and Management of Voice Prompts Deployment and Management of Voice Prompts, page 1 Media File Deployment Design Concepts, page 2 Design Considerations for Large Number of Media Files, page 6 Deployment and Management of Voice Prompts

More information

Remote Connectivity for SAP Solutions over the Internet Technical Specification

Remote Connectivity for SAP Solutions over the Internet Technical Specification Remote Connectivity for SAP Solutions over the Technical Specification June 2006 Remote Connectivity for SAP Solutions over the page 2 1 Introduction SAP offers secure connections over the for support

More information

WCCPv2 and WCCP Enhancements

WCCPv2 and WCCP Enhancements WCCPv2 and WCCP Enhancements Release 12.0(11)S June 20, 2000 This feature module describes the Web Cache Communication Protocol (WCCP) Enhancements feature and includes information on the benefits of the

More information

Content Delivery Networks

Content Delivery Networks Mireille Reiners and Wim van der Bijl Delivery Networks Authors Mireille Reiners and Wim van der Bijl Capgemini Contact: wim.vander.bijl@capgemini.com Tel: +31 (0) 30 689 8952 Mobile: +31 (6) 4792 4195

More information

Network Design Considerations for Grid Computing

Network Design Considerations for Grid Computing Network Design Considerations for Grid Computing Engineering Systems How Bandwidth, Latency, and Packet Size Impact Grid Job Performance by Erik Burrows, Engineering Systems Analyst, Principal, Broadcom

More information

iscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard

iscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard iscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard On February 11 th 2003, the Internet Engineering Task Force (IETF) ratified the iscsi standard. The IETF was made up of

More information

ADMAS Security Gateway

ADMAS Security Gateway ADMAS Security Gateway White paper submitted in response to 2006 Annual ITEA Technology Review June 30, 2006 Submitted by: Aberdeen Test Center and ProObject, Inc. 7467 Ridge Road, Suite 330 Hanover, MD

More information

Lecture 16. Today: Start looking into memory hierarchy Cache$! Yay!

Lecture 16. Today: Start looking into memory hierarchy Cache$! Yay! Lecture 16 Today: Start looking into memory hierarchy Cache$! Yay! Note: There are no slides labeled Lecture 15. Nothing omitted, just that the numbering got out of sequence somewhere along the way. 1

More information

Technical papers Firewalls

Technical papers Firewalls Technical papers Firewalls Firewalls With the explosive growth of the Internet and the move to broadband connectivity, security has become a concern for network administrators and private individuals.

More information

Cisco How Virtual Private Networks Work

Cisco How Virtual Private Networks Work Table of Contents How Virtual Private Networks Work...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 Background Information...1 What Makes a VPN?...2 Analogy:

More information

Shedding Tiers Creating a Simpler, More Manageable Storage Infrastructure

Shedding Tiers Creating a Simpler, More Manageable Storage Infrastructure Shedding Tiers Creating a Simpler, More Manageable Storage Infrastructure By Gary Orenstein, Vice President of Marketing Gear6 [www.gear6.com] Introduction The concept of segmenting data storage repositories

More information

Cisco Intelligent WAN with Akamai Connect

Cisco Intelligent WAN with Akamai Connect Data Sheet Cisco Intelligent WAN with Akamai Connect Deliver consistent, LAN-like user experiences using application acceleration and WAN optimization while lowering bandwidth costs. Users get world-class

More information

Ultra-Low Latency Down to Microseconds SSDs Make It. Possible

Ultra-Low Latency Down to Microseconds SSDs Make It. Possible Ultra-Low Latency Down to Microseconds SSDs Make It Possible DAL is a large ocean shipping company that covers ocean and land transportation, storage, cargo handling, and ship management. Every day, its

More information

Release Note RM Neon. Contents

Release Note RM Neon. Contents RM Neon Contents About this Release Note... 2 About RM Neon... 2 What it does... 2 Components... 2 Data protection... 3 Requirements... 4 RM Unify... 4 Server... 4 Before you start... 5 Back up your servers...

More information

Boundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification:

Boundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification: Application control : Boundary control : Access Controls: These controls restrict use of computer system resources to authorized users, limit the actions authorized users can taker with these resources,

More information

Configuring Cache Services Using the Web Cache Communication Protocol

Configuring Cache Services Using the Web Cache Communication Protocol Configuring Cache Services Using the Web Cache Communication Protocol Finding Feature Information, page 1 Prerequisites for WCCP, page 1 Restrictions for WCCP, page 2 Information About WCCP, page 3 How

More information

Today: World Wide Web! Traditional Web-Based Systems!

Today: World Wide Web! Traditional Web-Based Systems! Today: World Wide Web! WWW principles Case Study: web caching as an illustrative example Invalidate versus updates Push versus Pull Cooperation between replicas Lecture 22, page 1 Traditional Web-Based

More information

Copyright 2009 by Scholastic Inc. All rights reserved. Published by Scholastic Inc. PDF0090 (PDF)

Copyright 2009 by Scholastic Inc. All rights reserved. Published by Scholastic Inc. PDF0090 (PDF) Enterprise Edition Version 1.9 System Requirements and Technology Overview The Scholastic Achievement Manager (SAM) is the learning management system and technology platform for all Scholastic Enterprise

More information

Custom Connect. All Area Networks. customer s guide to how it works version 1.0

Custom Connect. All Area Networks. customer s guide to how it works version 1.0 All Area Networks Custom Connect customer s guide to how it works version 1.0 The information in this technical user guide and the glossary of terms has been prepared in good faith and is correct at the

More information

Service Mesh and Microservices Networking

Service Mesh and Microservices Networking Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards

More information

Accelerating Video Using Cisco Wide Area Application Services and Digital Media Systems

Accelerating Video Using Cisco Wide Area Application Services and Digital Media Systems Accelerating Video Using Cisco Wide Area Application Services and Digital Media Systems Most enterprises understand the power of video-based information delivered directly to their employees in the workplace.

More information

CounterACT 7.0. Quick Installation Guide for a Single Virtual CounterACT Appliance

CounterACT 7.0. Quick Installation Guide for a Single Virtual CounterACT Appliance CounterACT 7.0 Quick Installation Guide for a Single Virtual CounterACT Appliance Table of Contents Welcome to CounterACT Version 7.0... 3 Overview... 4 1. Create a Deployment Plan... 5 Decide Where to

More information

Configuration Manager

Configuration Manager CHAPTER 7 This chapter describes how to perform routine Cisco VXC Manager configuration management tasks using the Administrator Console. It provides information on managing the configuration settings

More information

Richard Clayton

Richard Clayton Why SHIM6 is likely to fail Richard Clayton richard.clayton@cl.cam.ac.uk 10 th November 2009 TECHNICAL How does Internet routing work? (simple view) Autonomous Systems (ASs) announce their routes (addresses)

More information

Sophos Web Appliance Configuration Guide. Product Version Sophos Limited 2017

Sophos Web Appliance Configuration Guide. Product Version Sophos Limited 2017 Sophos Web Appliance Configuration Guide Product Version 4.3.5 Sophos Limited 2017 ii Contents Sophos Web Appliance Contents 1 Copyrights and Trademarks...1 2 Introduction...2 3 Features...4 4 Network

More information

Distributed Multimedia Systems. Introduction

Distributed Multimedia Systems. Introduction Distributed Multimedia Systems Introduction Introducing Multimedia Systems Example target applications networked video libraries, Internet telephony and video conferencing Real time systems performing

More information

Chapter 6: Distributed Systems: The Web. Fall 2012 Sini Ruohomaa Slides joint work with Jussi Kangasharju et al.

Chapter 6: Distributed Systems: The Web. Fall 2012 Sini Ruohomaa Slides joint work with Jussi Kangasharju et al. Chapter 6: Distributed Systems: The Web Fall 2012 Sini Ruohomaa Slides joint work with Jussi Kangasharju et al. Chapter Outline Web as a distributed system Basic web architecture Content delivery networks

More information

WAFA X3 Evolution Grade of Service. 13 October 2008

WAFA X3 Evolution Grade of Service. 13 October 2008 Evolution Grade of Service 13 October 2008 1 Grades of Service at a glance The following table (Figure 1) highlights the various Grades of Service that are available on the Evolution Service. It enables

More information

Technology Trends and the IETF

Technology Trends and the IETF Technology Trends and the IETF Scott Bradner Harvard University sob@harvard.edu trends- 1 Outline technology directions service integration industry directions impact on need for standards VC & pundit

More information

Broadband Traffic Report: Download Growth Slows for a Second Year Running

Broadband Traffic Report: Download Growth Slows for a Second Year Running Broadband Traffic Report: Download Growth Slows for a Second Year Running 1.1 Overview In this report, we analyze traffic over the broadband access services operated by IIJ and present the results each

More information

Microsoft Office Live Meeting from Global Crossing Frequently Asked Questions (FAQs)

Microsoft Office Live Meeting from Global Crossing Frequently Asked Questions (FAQs) Microsoft Office Live Meeting from Global Crossing Frequently Asked Questions (FAQs) Q. What is Microsoft Office Live Meeting from Global Crossing? A. Microsoft Office Live Meeting from Global Crossing

More information

Developing Microsoft Azure Solutions (MS 20532)

Developing Microsoft Azure Solutions (MS 20532) Developing Microsoft Azure Solutions (MS 20532) COURSE OVERVIEW: This course is intended for students who have experience building ASP.NET and C# applications. Students will also have experience with the

More information

Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking

Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking NETWORK MANAGEMENT II Proxy Servers Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking resources from the other

More information