Technical papers Web caches
|
|
- Irene Lamb
- 5 years ago
- Views:
Transcription
1 Technical papers Web caches Web caches What is a web cache? In their simplest form, web caches store temporary copies of web objects. They are designed primarily to improve the accessibility and availability of this type of data to end users. Caching is not an alternative to increased connectivity, but instead optimises the usage of available bandwidth. After the initial access/download, schools can access a single locally stored copy of the content rather than repeatedly requesting the same content from the origin server. Content delivery works on the principle of delivering content to the local network before it is required, rather than the on-demand approach of normal caching. This technical paper focuses on the practical issues surrounding caches; it will look at hardware and software solutions and advanced features that provide shared services to users over a network. How will a cache benefit my institution? Caching minimises the number of times an identical web object is transferred from its host server by retaining copies of requested objects in a database or repository. Requests for previously cached objects result in the cached copy of the object being returned to the user from the local repository rather than from the host server. This results in little or no extra network traffic over the external link and increases the speed of delivery. Caches are limited by the amount of disk space when a cache is full, older objects are removed and replaced with newer content. Some systems may implement 'persistency' measures, however, to preserve certain types of content at the discretion of the administrator. Example: A school has a 10Mbps local area network (LAN) and a 128Kbps ISDN connection to the Internet, where the local network is 80 times faster than the Internet connection. Consider a class situation where a suite of computers is trying to download a large graphic, perhaps 256KB in size. This would take each computer in the suite 16 seconds to download across the 128Kbps connection (128Kbps = 16 KBps). If a cache is implemented on the local network, the cache computer will download a single copy of the graphic at a maximum speed of 128Kbps, and then pass this on to each computer over the high-speed LAN connection at 10Mbps. Across a 10Mbps connection (10Mbps = 640 KBps), the transfer would take approximately half a second. In practice, transfer rates will be lower than these figures which allow for network overhead. How does a web cache work? The flowchart below illustrates what happens when a user requests a web page. The thicker lines represent the normally higher-speed local connections between the client and the cache, while the thinner lines represent the slower connection speeds over the Internet. Becta 2004 Valid at September 2004 page 1 of 8
2 Where are web caches used? Caches may be installed in different locations on networks for a variety of reasons: Local caches are the most common type; they sit on the edge of the LAN just before the Internet connection. All outbound web requests are directed through them in an effort to fulfil web requests locally before passing traffic over the Internet connection. ISP caches are used on the networks of most Internet Service Providers (ISPs). They provide customers with improved performance and conserve bandwidth on their own external connections to the Internet. Reverse caches are used to reduce the workload of content provider s web servers. They position the cache between the web server and its internet connection, so that when a remote user requests a web page, the request must first pass through the cache before reaching the web server. If the cache has a stored copy of the requested item, it delivers it direct rather than passing the request through to the web server. Becta 2004 Valid at September 2004 page 2 of 8
3 This document concentrates on local caches, although most of the information applies to all caches. The diagram below shows the different positions that caches can occupy on networks. As a request for information passes from the LAN to the content provider it passes through several caches, each trying to fulfil the request from their own repositories. Sometimes a request will never reach the content provider s host web server, instead being fulfilled by a cache somewhere en route. What are the advantages and disadvantages of caching? Advantages: Fast performance on cached content if content is already in the cache it is returned more quickly, even for multiple users wanting to access the same content. Improved user perception and productivity quicker delivery of content means less waiting time and increased user satisfaction with the performance of the system. Less bandwidth used if content is cached locally on the LAN, web requests do not consume Internet connection bandwidth. User monitoring and logging if a cache manages all web requests (behaving in some ways like a proxy), a centralised log can be kept of all user access. Care must be taken that any information held is in accordance with appropriate privacy regulations and the institution's policy. Caching benefits both the single end user and the content providers ISPs and other users of the same infrastructure all benefit greatly from the reduction in bandwidth usage. Disadvantages: Slower performance if an object is not cached an extra layer is added to the process, which adds time. Becta 2004 Valid at September 2004 page 3 of 8
4 Subscription sites may become confused some subscription services use IP addresses for authentication. The advent of dynamic client bypass technology, which passes the user s original IP address to the host server, coupled with an increase in the use of other methods of authentication by content providers mean this is becoming less common, however. Additional hardware or expertise may be required any new system will potentially require extra hardware and software resources, with ongoing support needed after installation. Dynamically generated content cannot be cached the results of CGI scripts or certain types of database content are increasingly common on the World Wide Web, but cannot be cached. What is the difference between transparent and non-transparent caches? Caches can differ according to their so-called transparency, which will affect the degree of configuration required for a network during device installation. Transparent caches do not require any settings to be changed on individual client machines. Instead, the network router or switch is configured to forward all requests automatically through to the cache. This has the advantage of allowing a cache to be easily introduced and removed without reconfiguring the client computers. However, it can generate confusing error messages if a page is not found and make finding the location of any problems difficult. Non-transparent caches require the settings on each client computer to be changed to point at the appropriate cache. In this case, error messages will normally show clearly if a problem is with the cache itself. However should a change of cache server be required, perhaps for maintenance reasons, the clients may have to be reconfigured with the new cache s information. How well will a cache work in a classroom situation? Caches can enhance the ways in which the Internet is used in the classroom. Teachers can pre-load a cache with particular web sites in advance of a lesson, either by simply visiting the required sites with a computer that uses the cache or by having the content pre-positioned into the cache by a management system. For example: if a school buys content from a commercial provider they might opt to pre-load or copy it to their local cache in advance of using it in lessons. When teachers and pupils wanted to use this content they would then be accessing it from the LAN rather than from the Internet. This would give fast, high-quality access without delays and without large numbers of students having to share an Internet connection. The worst case scenario in a cached environment is that the first user to request a page will experience a slightly longer delay than normal. Some solutions, however, do not have the capability to cache multimedia content such as real time streaming media files. It is possible for more advanced cache solutions to reduce bandwidth by only requesting one stream from the host web server and then splitting that stream to many computers on the LAN. Multimedia content stored in static files where the whole file must be downloaded before it can be played will in most cases be cached as normal. How do I install a cache? Installing a web cache to a LAN is relatively straightforward. An additional computer system or dedicated appliance is connected to the LAN, and the clients or router are configured, if required, to access this system. The cache itself is installed through a software program Becta 2004 Valid at September 2004 page 4 of 8
5 executed either on its own dedicated hardware or as one of many programs running on a shared server. Microsoft's Internet Security and Acceleration (ISA) Server is based on Windows 2000 and can run on its own or on a Windows 2000 server with other software. Similar arrangements are possible with Linux-based systems running software such as Squid. The main alternative would be a discrete hardware-based solution optimised for this specific role. Examples of such a solution include Volera or a Cisco unit. The appropriateness of each solution depends on a number of factors, including the number of simultaneous users, available bandwidth and available resources. Functionality can also vary developments in this area are concerned with moving away from just caching static HTML pages towards accelerating the whole web experience. An institution should be able to function adequately with a single server of reasonable specification (for Linux, a Pentium II with sufficient memory; Versions of Squid are available for NT, and the server specification should be increased according to the suppliers instructions). Specialist solutions including multiple servers need only be considered for LEAwide services and larger. The National JANET Web Cache Service has an article on sizing servers using the Squid proxy on Linux. This service runs approximately 40 servers for the HE & FE community; and requests regularly exceed one million a day. Example: In a single small or medium-sized institution, a basic web cache system could be easily implemented on a Pentium II processor with 64MB-256MB of memory and two GB-20GB of hard disk storage using Linux and the Squid caching software. The minimum requirements for the Microsoft Internet Security and Acceleration Server are a Pentium III processor with 256MB of RAM. For larger or more complex installations, it is sensible to consult a network system specialist. It is possible to connect caches together to improve the efficiency of the service and provide multiple layers. To do this, the onward ISP should be consulted. What are the costs and cost savings of a cache? It is difficult to put a precise cost on the benefits of a cache service, as its success will depend on the nature of the users. For example, in a sixth-form environment, where many students are looking at different pages, the benefits are less obvious than in a school environment, where groups or classes access the same material simultaneously. In the latter example, it could be said that cache solutions multiply bandwidth and, it follows, provide a kind of cost saving as they are providing users with a service equivalent to a higher bandwidth connection. The costs of implementing a solution are equally variable and will include purchase of hardware and software, installation and maintenance. The cheapest cache solution in terms of capital cost is likely to be a Linux-based solution, which uses free software and can run on reasonably low-specification hardware. The total cost of ownership should be considered with any system although most server software is reasonably reliable and will run for long periods without any attention, costs of maintenance and support may be a factor. Some vendors provide systems offering caching facilities on a rental basis where, instead of purchasing hardware, an annual fee is payable to cover installation and ongoing support for the service. Implementing a cache with good management and reporting facilities can identify usage patterns, cache effectiveness and bandwidth consumption. If the administrator uses these Becta 2004 Valid at September 2004 page 5 of 8
6 reports effectively they will show how much of the Internet connection s bandwidth is being used and whether the current connection is meeting demand for that site. What other functions do caches have? Caches have progressed from being merely software applications that control a store of information to being managed appliances designed specifically for content delivery. Some of the advanced functions are described below: Stream splitting is when a stream of data from a host server is divided at the cache for transmission to multiple LAN computers. If five users request a one Mb stream of video from, say, a BBC web site without a stream splittingenabled cache this would take up five Mb of the Internet connection bandwidth. With stream splitting this would only take up one Mb of the Internet connection bandwidth. Content filtering functions can be integrated with cache software so that a cache can block access to certain web sites depending on their content. Filtering normally adds to the cost of the cache, but does reduce bandwidth consumed, however, by not allowing access to inappropriate sites. WCCP (Web Cache Communication Protocol) is a protocol that transparently routes all web traffic to the local cache before it leaves the LAN. It also provides extra features such as load balancing and multicasting, as well as certain security functions. Scalability of caches and linking caches together can improve performance greatly. If one cache knows what another cache has in its repository it can redirect requests to that cache as and when required. Overload bypass is a feature that allows the cache to pass traffic that it is too busy to deal with to web servers rather than have those requests for information held in a queue at the cache. As caches increase in intelligence and complexity they offer increased report and management functionality. Logs and reports can be produced for each user, for each web site visited, the time of visit etc. These reports can be used to assist in the efficient running of a cached environment and optimise available bandwidth. Pre-positioning is the downloading of content to the cache appliance before the user requests it. This becomes more crucial when accessing video and rich media clips. The burden is taken off the network during peak usage hours if this download can be scheduled to occur out of hours How does a cache differ from a proxy? A cache server is not the same as a proxy server. Cache servers have a proxy function with regard to requests for certain content from the World Wide Web. When a client passes all their requests for web objects via a cache, this cache is effectively acting as a proxy server. Caching is a common function of proxy servers. Proxy servers perform a number of other functions, too, mainly centred on security and administrative control. Broadly speaking, a proxy server sits between a number of clients and Becta 2004 Valid at September 2004 page 6 of 8
7 the Internet. Any requests made to the Internet from a LAN computer are forwarded to the proxy server which will then make the requests itself. The key differences between a proxy and caches are: A proxy server will handle more requests than just those for web content. A proxy server does not by default cache any data that passes through it. There are certain security benefits based on the fact that proxy servers hide other computers on the network from the Internet making it is impossible for individual machines to be targeted for attack. The requirement for 'public' IP addresses is also removed, so that any number of computers can share one public address that is configured to the proxy rather than each computer needing a unique IP address. This has implications for video conferencing and other point-to-point applications which might require some additional resource or configuration. What standards are there for caches? CERN is a standard for application aware proxy services over HTTP-based client/server communications. A CERN server is slow and not suitable for heavy traffic. ICP is the Internet Caching Protocol that exchanges data between caches about the existence of stored information. WCCP is a Cisco router control protocol that transparently routes TCP port 80 packets to cache appliances and incorporates value-added features such as load balancing, security features and multicasting. What about storing multiple copies of content in a cache? Storing multiple copies of the same file on multiple caches can create licensing problems. Although CERN caching has been around since 1993 different content providers have varying opinions on the caching of their material. Caching servers do not encourage or assist in breaking copyright. Multiple caches may be combined and managed in order to provide a more efficient and scaleable content delivery service. The details of this are outside the scope of this information sheet, however the principles are worth a mention. In multiple, but non co-ordinated caches, each cache operates independently by checking its own repository and then passing requests on towards the actual host server. It would not be unreasonable to assume that the first request for content would be delayed at a number of stages on its route between client and host server, as different caches compare their own stores, pass requests on, and make a copy of any information returned. A fully managed system makes it possible for the LAN cache to query a number of other caches or a management appliance for the requested content. If this content is found on another cache the download can take place from this location rather than the host server. This works well where multiple sites are linked to one central site that has combined caches, as all the central caches will be queried for the content rather than just one. What should I be looking for when purchasing caching equipment? For effective content delivery in schools it is essential that the content delivery and caching service in a school is compatible with the equipment installed by the LEA or the RBC. Schools should consult Becta s Content Delivery Network Application Profile, which can be found at [ Becta 2004 Valid at September 2004 page 7 of 8
8 Other sources of information Software, hardware and service providers Akamai [ A commercial multimedia cache company which hosts content around the world for content providers. Equiinet [ Producers of integrated gateway devices that include cache functionality Microsoft Internet Security and Acceleration Server [ This has information on the current Microsoft solution. Squid [ Cache software. Cisco [ Provides information on cache and content delivery solutions. Volera [ Content acceleration and networking solutions. RM SmartCache/RM SmartTracker [ Product specifically for schools. RM SmartTracker is a service that sits on RM SmartCache and allows schools to keep a close eye on individual users' web-browsing activities. Reports and further reading Cashing in on Caching [ Ariadne article. Report on web caching now archived [ JISC Report. Web Caching and Content Delivery Resources [ Developing institution policies. Sizing Squid Caches [ JANET Server sheet. Becta 2004 Valid at September 2004 page 8 of 8
Virtual private networks
Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible
More informationEnterprise Content Networking System
Enterprise Content Networking System How Cisco IT Deployed Content Networking to Improve Application Performance and Security A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Consolidate
More informationSeven Criteria for a Sound Investment in WAN Optimization
Seven Criteria for a Sound Investment in WAN Optimization Introduction WAN optimization technology brings three important business benefits to IT organizations: Reduces branch office infrastructure costs
More informationTable of Contents. Cisco How NAT Works
Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9
More informationInternet Nuts and Bolts
Internet Nuts and Bolts Michael Oakes moakes@rm.com Introduction What is the internet? Comparing browsers Wireless, the basics Getting the most out of your connection Diagnosing problems Learning Platform
More informationSouth East Grid for Learning
Instructions for Surrey schools on the SEGfL Video Conferencing Service South East Grid for Learning Version 1.1 Date: January 2007 SEGfL Video Conferencing Service Page 1 Registration of Endponts Introduction...3
More informationFUJITSU Software Interstage Information Integrator V11
FUJITSU Software V11 An Innovative WAN optimization solution to bring out maximum network performance October, 2013 Fujitsu Limited Contents Overview Key technologies Supported network characteristics
More informationCOMPARING COST MODELS - DETAILS
COMPARING COST MODELS - DETAILS SOFTLAYER TOTAL COST OF OWNERSHIP (TCO) CALCULATOR APPROACH The Detailed comparison tab in the TCO Calculator provides a tool with which to do a cost comparison between
More informationSANGFOR AD Product Series
SANGFOR Application Delivery (AD) Product Series provides customers with the global server load balance(gslb), inbound/outbound load balance, server load balance, SSL off-load and anti-ddos solutions for
More informationSANGFOR AD Product Series
SANGFOR Application Delivery (AD) Product Series provides customers with the global server load balance(gslb), inbound/outbound load balance, server load balance, SSL off-load and anti-ddos solutions for
More informationSolace JMS Broker Delivers Highest Throughput for Persistent and Non-Persistent Delivery
Solace JMS Broker Delivers Highest Throughput for Persistent and Non-Persistent Delivery Java Message Service (JMS) is a standardized messaging interface that has become a pervasive part of the IT landscape
More informationNew Cisco 2800 And 3800 Series Integrated Services Router Wan Optimization Bundles
Q&A New Cisco 2800 And 3800 Series Integrated Wan Optimization Bundles Q. What are the components of the new Cisco 2800 and 3800 series integrated services router WAN optimization bundles? A. There are
More informationDeployment Scenarios for Standalone Content Engines
CHAPTER 3 Deployment Scenarios for Standalone Content Engines This chapter introduces some sample scenarios for deploying standalone Content Engines in enterprise and service provider environments. This
More informationSoftware. Linux. Squid Windows
Proxy Server Introduction A proxy server services client requests by forwarding : the requests to the destination server. The requests appear to come from the proxy server and not from the client. the
More informationWHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group
WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The
More informationPLATO Learning Environment (v2.0) System and Configuration Requirements
PLATO Learning Environment (v2.0) System and Configuration Requirements For Workstations July 30, 2010 Windows XP Home and Professional (SP3) Windows Vista Home/Premium/Business/Ultimate Windows 7 Home/Premium/Business/Ultimate
More informationQ-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ
Q-Balancer Range FAQ The Q-Balance LB Series The Q-Balance Balance Series is designed for Small and medium enterprises (SMEs) to provide cost-effective solutions for link resilience and load balancing
More informationClient-server Basics. 1. Motivation
Page 1 of 8 Client-server Basics Oxford Brookes University 2004 Contents 1. Motivation 2. Basic Model of the Web 3. Extensions - Caching and Proxies 4. High Performance Web Servers 5. Web Services Appendices
More informationRouting Protocol comparison
Routing Protocol comparison Introduction to routing Networks allow people to communicate, collaborate, and interact in many ways. Networks are used to access web pages, talk using IP telephones, participate
More informationConfiguring Web Cache Services By Using WCCP
CHAPTER 44 Configuring Web Cache Services By Using WCCP This chapter describes how to configure your Catalyst 3560 switch to redirect traffic to wide-area application engines (such as the Cisco Cache Engine
More informationPLATO Learning Environment System and Configuration Requirements
PLATO Learning Environment System and Configuration Requirements For Workstations December 13, 2010 1 Content About This Document... 3 Document Change Log... 4 System & Configuration Requirements... 5
More informationMedia File Options. Deployment and Ongoing Management. This chapter covers the following topics:
This chapter covers the following topics: Deployment and Ongoing Management, page 1 Co-Resident Unified CVP Call Server, Media Server, and Unified CVP VXML Server, page 2 Bandwidth Calculation for Prompt
More informationConfiguring WMT Streaming Media Services on Standalone Content Engines
CHAPTER 9 Configuring WMT Streaming Media Services on Standalone Content Engines This chapter provides an overview of the Windows Media Technologies (WMT) streaming and caching services, and describes
More informationCisco Wide Area Application Services and Cisco Nexus Family Switches: Enable the Intelligent Data Center
Cisco Wide Area Application Services and Cisco Nexus Family Switches: Enable the Intelligent Data Center What You Will Learn IT departments are facing increasing pressure to accommodate numerous changing
More informationDesign of Infrastructure for NCR Counterpoint
Design of Infrastructure for NCR Counterpoint The purpose of this document is to assist in determining the correct type of implementation, help implementation teams make critical decisions buying or building
More informationClustering and Reclustering HEP Data in Object Databases
Clustering and Reclustering HEP Data in Object Databases Koen Holtman CERN EP division CH - Geneva 3, Switzerland We formulate principles for the clustering of data, applicable to both sequential HEP applications
More informationPremium Web Cache Server JAGUAR 5000
Web Appliance Products Premium Web Cache Server JAGUAR 5000 Headquarters 13 Fl., Eunsung Bldg., 53-8 Cheongdamdong Kangnamgu Seoul, Korea 135-763 Tel +8-3446-6070 Fax +8-3445-9099 R&D Center 34 Gajeongdong,
More informationPerformance Evaluation of National Knowledge Network Connectivity
International Journal of Computer Applications (975 888) Performance Evaluation of National Knowledge Network Connectivity Vipin Saxena, PhD. Department of Computer Science B.B. Ambedkar University (A
More informationFeatures of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy
Que: -Proxy server Introduction: Proxy simply means acting on someone other s behalf. A Proxy acts on behalf of the client or user to provide access to a network service, and it shields each side from
More informationDeployment Guides. Help Documentation
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2019 SmarterTools Inc. Deployment Guides SmarterMail in Individual and Micro-business
More informationProxying. Why and How. Alon Altman. Haifa Linux Club. Proxying p.1/24
Proxying p.1/24 Proxying Why and How Alon Altman alon@haifux.org Haifa Linux Club Proxying p.2/24 Definition proxy \Prox"y\, n.; pl. Proxies. The agency for another who acts through the agent; authority
More informationCisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model:
MX Sizing Guide AUGUST 2016 This technical document provides guidelines for choosing the right Cisco Meraki security appliance based on real-world deployments, industry standard benchmarks and in-depth
More informationModelling and Analysis of Push Caching
Modelling and Analysis of Push Caching R. G. DE SILVA School of Information Systems, Technology & Management University of New South Wales Sydney 2052 AUSTRALIA Abstract: - In e-commerce applications,
More informationMX Sizing Guide. 4Gon Tel: +44 (0) Fax: +44 (0)
MX Sizing Guide FEBRUARY 2015 This technical document provides guidelines for choosing the right Cisco Meraki security appliance based on real-world deployments, industry standard benchmarks and in-depth
More informationWhy WAN accelerators (still) matter? Andrea Dainese Data Center Engineer
Why WAN accelerators (still) matter? Data Center Engineer Presentation Data Center Engineer @ Cerved Group SpA Red Hat RHCE VMware VCP-DCV NetApp NCIE-SAN Cisco CCIE Who is Andrea Dainese Cisco Architecture
More informationOne of the big complaints from remote
Remote Access Response Time Blues Robin Layland Robin Layland is president of Layland Consulting, a firm that specializes in network architecture and new technology. He has more than 25 years experience
More informationConfiguring Caching Services
CHAPTER 8 This chapter describes how to configure conventional caching services (HTTP, FTP [FTP-over-HTTP caching and native FTP caching], HTTPS, and DNS caching) for centrally managed Content Engines.
More informationTruffle Broadband Bonding Network Appliance
Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive
More informationCache Memory Part 1. Cache Memory Part 1 1
Cache Memory Part 1 Cache Memory Part 1 1 - Definition: Cache (Pronounced as cash ) is a small and very fast temporary storage memory. It is designed to speed up the transfer of data and instructions.
More informationLoad Balancing Technology White Paper
Load Balancing Technology White Paper Keywords: Server, gateway, link, load balancing, SLB, LLB Abstract: This document describes the background, implementation, and operating mechanism of the load balancing
More informationEvaluating external network bandwidth load for Google Apps
Evaluating external network bandwidth load for Google Apps This document describes how to perform measurements to better understand how much network load will be caused by using a software as a service
More informationImprove Web Application Performance with Zend Platform
Improve Web Application Performance with Zend Platform Shahar Evron Zend Sr. PHP Specialist Copyright 2007, Zend Technologies Inc. Agenda Benchmark Setup Comprehensive Performance Multilayered Caching
More informationCisco Wide Area Application Services (WAAS) Mobile
Cisco Wide Area Application Services (WAAS) Mobile Product Overview Cisco Wide Area Application Services (WAAS) Mobile extends Cisco WAAS Software application acceleration benefits to mobile employees
More informationOpenCache. A Platform for Efficient Video Delivery. Matthew Broadbent. 1 st Year PhD Student
OpenCache A Platform for Efficient Video Delivery Matthew Broadbent 1 st Year PhD Student Motivation Consumption of video content on the Internet is constantly expanding Video-on-demand is an ever greater
More informationSilicon House. Phone: / / / Enquiry: Visit:
Silicon House Powering Top Blue Chip Companies and Successful Hot Start Ups around the World Ranked TOP Performer among the registrars by NIXI Serving over 750000 clients in 90+ countries Phone: +91-7667-200-300
More informationCisco Data Center Network Manager 5.1
Cisco Data Center Network Manager 5.1 Product Overview Modern data centers are becoming increasingly large and complex. New technology architectures such as cloud computing and virtualization are adding
More informationCCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4
CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication
More informationInternet Architecture
Internet Architecture Lecture 3: How TCP/IP Works & Understanding the Internet's Software Structure Assistant Teacher Samraa Adnan Al-Asadi 1 How TCP/IP Works Packet: A piece of data broken down into pieces
More informationOverview Content Delivery Computer Networking Lecture 15: The Web Peter Steenkiste. Fall 2016
Overview Content Delivery 15-441 15-441 Computer Networking 15-641 Lecture 15: The Web Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Web Protocol interactions HTTP versions Caching Cookies
More informationMailroom Outsourcing. Business Solutions
Mailroom Outsourcing Business Solutions Strip out internal costs Improve speed of delivery Greatly reduce transport costs Centralise mail processing Automate mail routing Improve traceability and compliance
More information6 Key Factors to Consider When Choosing a Transparent Caching Solution
6 Key Factors to Consider When Choosing a Transparent Caching Solution 2013 Qwilt 1 OVERVIEW Transparent caching solutions help carriers reduce the impact of over-the-top (OTT) video traffic on their networks,
More informationMedia File Options. Deployment and Ongoing Management CHAPTER
CHAPTER 12 Last revised on: November 30, 2009 This chapter covers the following topics: Deployment and Ongoing Management, page 12-1 Co-Resident Call Server, Media Server, and Unified CVP VXML Server,
More informationComputer networks for the home
Technical paper Computer networks for the home Computer networks for the home An overview This paper gives information about current and emerging technologies for networking computers in the home. It is
More informationDeployments and Network Topologies
TECHNICAL GUIDE Deployments and Network Topologies A technical guide to deploying Family Zone School in different network topologies. Contents Introduction...........................................3 Transparent
More informationMigration to IPv6 from IPv4. Is it necessary?
Introduction Today Internet plays a big role in every aspect of our lives and IP acted as an important pillar of Internet. Since its inception the Internet has reached almost all corners of globe and it
More informationStratford School Academy Schemes of Work
Number of weeks (between 6&8) Content of the unit Assumed prior learning (tested at the beginning of the unit) 6 This is a theoretical unit covering the basic principles and architecture of local and wide
More informationNever Drop a Call With TecInfo SIP Proxy White Paper
Innovative Solutions. Trusted Performance. Intelligently Engineered. Never Drop a Call With TecInfo SIP Proxy White Paper TecInfo SD-WAN product - PowerLink - enables real time traffic like VoIP, video
More informationDATABASE SCALABILITY AND CLUSTERING
WHITE PAPER DATABASE SCALABILITY AND CLUSTERING As application architectures become increasingly dependent on distributed communication and processing, it is extremely important to understand where the
More informationLogical Network Design (Part II)
Logical Network Design (Part II) DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS IIT, Abbottabad Pakistan Telecommunication Network Design (TND) Possible (Part
More information2
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 There are examples of other architectures such as ATM and FDDI, however, these are not common. 35 36 37 Space
More informationLab 1: Evaluating Internet Connection Choices for a Small Home PC Network
Requirement Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network This set of labs works in conjunction with Professor Ray Panko s textbook, Business Data Networks and Telecommunications.
More informationSecuring Grid Data Transfer Services with Active Network Portals
Securing with Active Network Portals Onur Demir 1 2 Kanad Ghose 3 Madhusudhan Govindaraju 4 Department of Computer Science Binghamton University (SUNY) {onur 1, mike 2, ghose 3, mgovinda 4 }@cs.binghamton.edu
More informationActive Server Pages Architecture
Active Server Pages Architecture Li Yi South Bank University Contents 1. Introduction... 2 1.1 Host-based databases... 2 1.2 Client/server databases... 2 1.3 Web databases... 3 2. Active Server Pages...
More informationCCDP-ARCH. Section 11. Content Networking
CCDP-ARCH Section 11 As a designer, content networking technologies allows you to intelligently distribute content throughout the network, thereby reducing WAN bandwidth requirements. For example, a user
More informationCh. 5 - ISDN - Integrated Services Digital Network
Ch. 5 - ISDN - Integrated Services Digital Network 1 Overview 2 Basic elements in ISDN 3 ISDN - access 4 ISDN - the bus 5 ISDN - examples 6 ISDN - between LAN s 7 ISDN - access to Internet 8 ISDN - small
More informationReview: Networking Fall Final
Review: Networking Fall Final Question 1 of 43 You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have? Peer to peer
More informationSecurity Device Roles
Kennesaw State University DigitalCommons@Kennesaw State University KSU Proceedings on Cybersecurity Education, Research and Practice 2017 KSU Conference on Cybersecurity Education, Research and Practice
More informationMedia File Options. Deployment and Management of Voice Prompts
Deployment and Management of Voice Prompts, page 1 Media File Deployment Design Concepts, page 2 Design Considerations for Large Number of Media Files, page 6 Deployment and Management of Voice Prompts
More informationRemote Connectivity for SAP Solutions over the Internet Technical Specification
Remote Connectivity for SAP Solutions over the Technical Specification June 2006 Remote Connectivity for SAP Solutions over the page 2 1 Introduction SAP offers secure connections over the for support
More informationWCCPv2 and WCCP Enhancements
WCCPv2 and WCCP Enhancements Release 12.0(11)S June 20, 2000 This feature module describes the Web Cache Communication Protocol (WCCP) Enhancements feature and includes information on the benefits of the
More informationContent Delivery Networks
Mireille Reiners and Wim van der Bijl Delivery Networks Authors Mireille Reiners and Wim van der Bijl Capgemini Contact: wim.vander.bijl@capgemini.com Tel: +31 (0) 30 689 8952 Mobile: +31 (6) 4792 4195
More informationNetwork Design Considerations for Grid Computing
Network Design Considerations for Grid Computing Engineering Systems How Bandwidth, Latency, and Packet Size Impact Grid Job Performance by Erik Burrows, Engineering Systems Analyst, Principal, Broadcom
More informationiscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard
iscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard On February 11 th 2003, the Internet Engineering Task Force (IETF) ratified the iscsi standard. The IETF was made up of
More informationADMAS Security Gateway
ADMAS Security Gateway White paper submitted in response to 2006 Annual ITEA Technology Review June 30, 2006 Submitted by: Aberdeen Test Center and ProObject, Inc. 7467 Ridge Road, Suite 330 Hanover, MD
More informationLecture 16. Today: Start looking into memory hierarchy Cache$! Yay!
Lecture 16 Today: Start looking into memory hierarchy Cache$! Yay! Note: There are no slides labeled Lecture 15. Nothing omitted, just that the numbering got out of sequence somewhere along the way. 1
More informationTechnical papers Firewalls
Technical papers Firewalls Firewalls With the explosive growth of the Internet and the move to broadband connectivity, security has become a concern for network administrators and private individuals.
More informationCisco How Virtual Private Networks Work
Table of Contents How Virtual Private Networks Work...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 Background Information...1 What Makes a VPN?...2 Analogy:
More informationShedding Tiers Creating a Simpler, More Manageable Storage Infrastructure
Shedding Tiers Creating a Simpler, More Manageable Storage Infrastructure By Gary Orenstein, Vice President of Marketing Gear6 [www.gear6.com] Introduction The concept of segmenting data storage repositories
More informationCisco Intelligent WAN with Akamai Connect
Data Sheet Cisco Intelligent WAN with Akamai Connect Deliver consistent, LAN-like user experiences using application acceleration and WAN optimization while lowering bandwidth costs. Users get world-class
More informationUltra-Low Latency Down to Microseconds SSDs Make It. Possible
Ultra-Low Latency Down to Microseconds SSDs Make It Possible DAL is a large ocean shipping company that covers ocean and land transportation, storage, cargo handling, and ship management. Every day, its
More informationRelease Note RM Neon. Contents
RM Neon Contents About this Release Note... 2 About RM Neon... 2 What it does... 2 Components... 2 Data protection... 3 Requirements... 4 RM Unify... 4 Server... 4 Before you start... 5 Back up your servers...
More informationBoundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification:
Application control : Boundary control : Access Controls: These controls restrict use of computer system resources to authorized users, limit the actions authorized users can taker with these resources,
More informationConfiguring Cache Services Using the Web Cache Communication Protocol
Configuring Cache Services Using the Web Cache Communication Protocol Finding Feature Information, page 1 Prerequisites for WCCP, page 1 Restrictions for WCCP, page 2 Information About WCCP, page 3 How
More informationToday: World Wide Web! Traditional Web-Based Systems!
Today: World Wide Web! WWW principles Case Study: web caching as an illustrative example Invalidate versus updates Push versus Pull Cooperation between replicas Lecture 22, page 1 Traditional Web-Based
More informationCopyright 2009 by Scholastic Inc. All rights reserved. Published by Scholastic Inc. PDF0090 (PDF)
Enterprise Edition Version 1.9 System Requirements and Technology Overview The Scholastic Achievement Manager (SAM) is the learning management system and technology platform for all Scholastic Enterprise
More informationCustom Connect. All Area Networks. customer s guide to how it works version 1.0
All Area Networks Custom Connect customer s guide to how it works version 1.0 The information in this technical user guide and the glossary of terms has been prepared in good faith and is correct at the
More informationService Mesh and Microservices Networking
Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards
More informationAccelerating Video Using Cisco Wide Area Application Services and Digital Media Systems
Accelerating Video Using Cisco Wide Area Application Services and Digital Media Systems Most enterprises understand the power of video-based information delivered directly to their employees in the workplace.
More informationCounterACT 7.0. Quick Installation Guide for a Single Virtual CounterACT Appliance
CounterACT 7.0 Quick Installation Guide for a Single Virtual CounterACT Appliance Table of Contents Welcome to CounterACT Version 7.0... 3 Overview... 4 1. Create a Deployment Plan... 5 Decide Where to
More informationConfiguration Manager
CHAPTER 7 This chapter describes how to perform routine Cisco VXC Manager configuration management tasks using the Administrator Console. It provides information on managing the configuration settings
More informationRichard Clayton
Why SHIM6 is likely to fail Richard Clayton richard.clayton@cl.cam.ac.uk 10 th November 2009 TECHNICAL How does Internet routing work? (simple view) Autonomous Systems (ASs) announce their routes (addresses)
More informationSophos Web Appliance Configuration Guide. Product Version Sophos Limited 2017
Sophos Web Appliance Configuration Guide Product Version 4.3.5 Sophos Limited 2017 ii Contents Sophos Web Appliance Contents 1 Copyrights and Trademarks...1 2 Introduction...2 3 Features...4 4 Network
More informationDistributed Multimedia Systems. Introduction
Distributed Multimedia Systems Introduction Introducing Multimedia Systems Example target applications networked video libraries, Internet telephony and video conferencing Real time systems performing
More informationChapter 6: Distributed Systems: The Web. Fall 2012 Sini Ruohomaa Slides joint work with Jussi Kangasharju et al.
Chapter 6: Distributed Systems: The Web Fall 2012 Sini Ruohomaa Slides joint work with Jussi Kangasharju et al. Chapter Outline Web as a distributed system Basic web architecture Content delivery networks
More informationWAFA X3 Evolution Grade of Service. 13 October 2008
Evolution Grade of Service 13 October 2008 1 Grades of Service at a glance The following table (Figure 1) highlights the various Grades of Service that are available on the Evolution Service. It enables
More informationTechnology Trends and the IETF
Technology Trends and the IETF Scott Bradner Harvard University sob@harvard.edu trends- 1 Outline technology directions service integration industry directions impact on need for standards VC & pundit
More informationBroadband Traffic Report: Download Growth Slows for a Second Year Running
Broadband Traffic Report: Download Growth Slows for a Second Year Running 1.1 Overview In this report, we analyze traffic over the broadband access services operated by IIJ and present the results each
More informationMicrosoft Office Live Meeting from Global Crossing Frequently Asked Questions (FAQs)
Microsoft Office Live Meeting from Global Crossing Frequently Asked Questions (FAQs) Q. What is Microsoft Office Live Meeting from Global Crossing? A. Microsoft Office Live Meeting from Global Crossing
More informationDeveloping Microsoft Azure Solutions (MS 20532)
Developing Microsoft Azure Solutions (MS 20532) COURSE OVERVIEW: This course is intended for students who have experience building ASP.NET and C# applications. Students will also have experience with the
More informationProxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking
NETWORK MANAGEMENT II Proxy Servers Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking resources from the other
More information