Improving the Performances of Proxy Cache Replacement Policies by Considering Infrequent Objects

Size: px
Start display at page:

Download "Improving the Performances of Proxy Cache Replacement Policies by Considering Infrequent Objects"

Transcription

1 Improving the Performances of Proxy Cache Replacement Policies by Considering Infrequent Objects Hon Wai Leong Department of Computer Science National University of Singapore 3 Science Drive 2, Singapore leonghw@comp.nus.edu.sg Bo Guan Department of Computer Science National University of Singapore 3 Science Drive 2, Singapore ABSTRACT In this paper, we perform a careful study of the effect of infrequent objects on the performance of many well-known web proxy cache replacement policies including,,, and (an offline policy). Using a frequencyaware version of these policy (one that is aware of these infrequent objects), we show that significant improvement in the performance (hit rates and byte hit rates) can potentially be achieved. We also present -Pred, which is a modified replacement policy that attempts to predict single access objects that it will not cache. The algorithm, though simple, achieve better performance than. The results are encouraging and point to more research on designing more sophisticated replacement policies that can predict infrequent objects. 1. INTRODUCTION The World Wide Web (WWW) has grown at a phenomenal pace and web requests have become the predominant service and dominant workload component for Internet traffic [10]. Many previous studies have shown that a significant proportion of Web requests are static web pages and many of these do not change frequently. Thus, proxy web caching is a standard method to enhance the performance. In proxy Web caching, the proxy server acts as an intermediary between a number of client browsers and the Internet web server as shown in Figure 1. The proxy server has a cache to store frequently (and usually recently) accessed web objects. When a request is made from a client browser, the request first goes to proxy server. If the requested object is already stored in the cache (called hit), the object requested This research was supported in part by the National University of Singapore under grant R This research was done while this author was an undergraduate at the National University of Singapore. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. SAC 06 April 23-27, 2006, Dijon, France Copyright 2006 ACM /06/ $ Client A Client B Web Cache Internet Figure 1: Proxy Cache Server Web Server is sent to the client browser. If the object requested is not in the cache (called a miss), the request is forwarded to the target web server. The benefits of proxy web caching are clear: the client browser enjoys faster response and there is a reduction in traffic demand made on the network, benefiting all parties on the Web users, ISPs, and original Web servers and the Internet at large [10]. An important optimization problem in proxy web caching is the design of the replacement policy which decides which object(s) to replace when a new arrives. Much work has been done in this research area and a number of replacement policies (or algorithms) have been proposed. Our study focuses on a very specific feature of many web access traces namely, the existence of a substantial proportion of infrequent objects, namely, objects that are accessed very infrequently (say, once, twice, or thrice) in the entire trace. This phenomena has been reported in many other studies of web workloads [7, 2, 4, 10]. In the two traces used in our study, we found that as much as 53% of the objects are single access objects and they account for about 45% of the total byte count. We study the effect of these infrequent objects on the performances of some well-known replacement policies that were reported to have good performances [6, 2, 10]. These includes the (least frequently used), (least recently used), and (greedy-dual-size-frequency) policies. Two offline policies, -P (perfect least frequently used), and (longest forward distance) were also included in our study. [6, 10] To study the effect of infrequent objects, we first ask the general question what if we do not cache the infrequent objects?. To answer this question, for each replacement policy studied, we introduce an offline frequency-aware version, namely, one that is aware of these infrequent objects and will not cache them. The performance gap (in terms of hit rate and byte hit rate) between these two versions will give a good indication of the potential gain in performance that can be achieved with good replacement policies that can predict these infrequent objects.

2 Our experimental results show that there is a significant performance gap (in terms of hit rates and byte hit rates) between the two versions of the,, and replacement policies. The significant performance gaps indicate that (a) to improve proxy cache performance, replacement policies should handle infrequent objects, particularly, single-access objects, (b) there can be potential gain in not caching all missed objects, and (c) a fruitful research direction is the design and analysis of replacement policies that can predict these infrequent objects. More specifically, we find that the single-access objects account for most of this performance gap that seem to suggest that research should be targetted at prediction of single-access objects. We also present preliminary results on a simple modified policy that attempts to predict single access objects. The algorithm will not cache the predicted single access objects. The results show that even a simple prediction algorithm can improve the performance of the replacement policy, thus illustrated the power of prediction. Work is ongoing to refine our simple prediction algorithm with the goal of getting closer to the performance of -A(1). 2. ASSUMPTIONS AND SETUP It is well known (see for example [6]) that getting a fair comparison of various proposed replacement policies is complicated. Therefore, in this section, we precisely state all the assumptions made in our own trace-driven simulation study to make it possible for others to do their own implementation and verification of our results, if so desired. These assumptions are, by and large, the same as those adopted by many previous work. However, since not all previous work clearly state all their assumptions, definitions and measurements used, it is sometimes hard to make fair and consistent comparisons. We use a trace-driven simulation [10] on the following traces obtained from the National Laboratory for Applied Network Research [1]: ST [Feb 16, 2001 to Mar 1, 2001] SJ [Jan 27, 2001 to Feb 9, 2001] The SJ trace was collected from a server at MAE-West Exchange Point [sj.cache.nlanr.net] in San Jose, California while the ST trace was collected from the International Exchange Point [startap.us.ircache.net] in Chicago, Illinois. The key characteristics of these two trace files are shown in Table 1. We now state the assumptions made in this paper: We consider a single cache of a finite, fixed size and assume that the Web objects cannot be divided. Note that if an object (such as an html page) is modified, the modified object is considered a new object in our simulation. We also assume that the trace file has been cleaned up to remove the uncacheable objects (such as dynamic content objects, network failure, or unqualified HTTP requests) these are very well discussed in many previous work ([10]) and will not be discussed in detailed here. Since these uncacheable objects do not affect the performance study of replacement policies, they can be safely removed from the trace. We further assume that the requests to the cache must be served in the order of arrival. Most replacement policies also make the further assumption that every missing item (that are not oversized) must be loaded into cache at the time of request. In this paper, we relax this assumption by allowing the replacement policy to decide whether or not a 792 Property SJ ST Duration of Trace 14 days 14 days Total Requests 713, ,890 Total Unique Requests 452, ,510 Total Request Size Total Unique Req Size Table 1: Characteristics of the SJ and ST traces missing item should be cached these are discussed further in Section 3. Every time item is loaded into the cache, some items may be evicted to make room for it. The set of items to be evicted is determined by the replacement policy used. 3. PROBLEM FORMULATION We give a precise formulation of the proxy web caching problem following the notations of [8]. Let U = {1, 2,..., n} be the finite universe of the n objects in trace. 1 For each object i, we define s(i) to be its size. Let S be the size of the cache. Let R = (r 1, r 2,..., r m) be the sequence of m requests where r k U is the object requested at time k. The state of the cache at time k is denoted by B k U and is the set of objects in the cache at time k and must satisfy the property i B k s(i) S. Therefore, the sequence (B 0, B 1,..., B m) represents the consecutive states of the cache in response to the sequence of request R. B 0 is the initial state and B m is the final state of the cache. Define the hit sequence to be (h 1, h 2,..., h m) where h k = { 1 if rk B k 1 (a hit) 0 if r k / B k 1 (a miss) Given a request sequence R, a cache of size S and at initial state B 0 =, a replacement policy produces a cache state sequence (B 1, B 2,..., B m), where for k = 1,..., m, we have (B k 1 E k ) {r k } if r k / B k 1 and has B k = to be cached otherwise B k 1 where E k B k 1. In the first case, the requested object r k is a miss and has to be cached and E k is the set of objects to be evicted from the cache. In the second case, the cache remains unchanged under two conditions: (a) if the requested object r k is already in the cache (a hit) or (b) if it not the cache but the replacement policy decides that it should not be loaded. In (b), we relax the usual assumption (made by many replacement policies) that all missing objects must be cached. The replacement policy determines whether or not to load a missing object r k and also the set E k of evicted objects when r k is loaded. Performance Metrics: The two most commonly used metrics to evaluate proxy cache performances are the hit rate (HR) the ratio of the number of hits to the total number of requests, and the byte hit rate (BHR) the ratio of the total bytes of all hits to the total bytes for all requests. More formally, we have m k=1 HR = h m k m, BHR = k=1 h k s(r k ) m k=1 s(r k). Since the hit rate measures only the number of objects served, replacement policies that favour small objects remaining in the cache will perform better on the hit rate. 1 As discussed above, these are all cacheable objects.

3 The byte hit rate tries to account for the object sizes and so is a better measure of the amount of network traffic reduced due to the caching strategy. In our paper, we will evaluate both, but give higher consideration to byte hit rate. A Theoretical Upper Bound: Theoretically, the best performance for a given trace is obtained by an infinite cache a cache that is big enough for all the objects in U. Let B = n i=1 s(i) denote the size of the infinite cache. Then the corresponding upper bound for the hit rate and byte hit rates are given as follows: HR = (m n)/m, BHR = ( m k=1 s(r k) B ) m k=1 s(r k). 4. REPLACEMENT POLICIES STUDIED We first give an overview of some existing replacement policies proposed by the scientific community. We first note that the problem of find a replacement policy that optimizes any of the metrics used (hit rate, byte hit rate, or other commonly used metrics) is known to be NP-complete problem. Thus, there have been many replacement policies proposed in the literature. A good survey of replacement policies can be found in [5] and [6]. Due to space limitation, we shall only give details of the policies studied in this paper and refer the reader to the above for information on other policies. Least-Recently-Used () replaces the object which was requested least recently. Least-Frequently-Used () replaces the object that was accessed the least number of times. Perfect (-P) is the same as, except that it does not use in-cache frequency, but the frequency of the object from the beginning of the cache simulation. Greedy-Dual-Size-Frequency () [6] replaces the object that has the lowest priority where the priority of an object f is given by P r(r k ) = Clock + freq(r k ) Cost(r k )/Size(r k ), where Clock is a running queue clock, freq(r k ) is the frequency of object r k (in the cache), Cost(r k ) is the cost and Size(r k ) is the size. Longest Forward Distance () replaces the object for which the next request is furthest away in the future. It has been reported [6, 10, 9] that the above are among the better replacement policies for proxy caching. Here, we note that is an offline replacement policy. The has been shown to be optimal for the special case in which the objects are of a uniform size and cost [3]. However, it was shown [8] that the policy is no longer optimal for the general case. Nevertheless, still produces very good results (in terms of hit rate and byte hit rate) even for the general case. 5. INFREQUENTLY ACCESSED OBJECTS Our study of a number of Web traces indicates that there are many objects in the trace that are accessed very infrequently in the entire trace. We are interested in infrequent objects that have frequency f for small f = 1, 2, 3. Figure 2 shows the distribution of request frequencies of the objects in the two traces SJ and ST. It confirms that there is a significant proportion of infrequent objects. In the SJ trace, 53% of the requested objects are single-access ones and they 793 (a) By number of request. (b) By total request size/ Figure 2: Distribution of Request Frequency. account for 45% of the total request size. More importantly, they also account for 90% of the total size of unique object B. 2 In other words, only about 10% of B comes from multiple-access objects. One contributing factor to this is the fact that, like most other simulation studies, we consider each modified object to be a new object and this will increase the number of single-access objects [4]. Single-access objects are never requested again, and so caching them will not give any hit. On the other hand, it may force other objects to be evicted and therefore could reduce the overall hit rate and byte rate. Furthermore, since their proportion is significant, the negative impact may also be potentially large. However, for objects with frequencies 2 or 3, the situation is not so clearcut. There is the risk, of course, that the all the accesses occur fairly close to each other and so caching these infrequent objects will be beneficial. On the other hand, if the intervals between consecutive accesses are too far apart, then caching these infrequent objects will also have a negative impact on the hit rate and byte bit rate. 5.1 Idealized Frequency-Aware Policies To study this effect, for each policy studied, we propose a idealized frequency-aware version of the policy. The frequency-aware version knows if an object is infrequent and will not cache these infrequent objects. Figure 3 shows the algorithm used to process the frequency-aware policy. For each replacement policy studied, say P, let P -A(k) denote the frequency-aware version of policy P where we do not cache objects with access frequency k. The original policy can also be considered P -A(0). We use small values 2 For the ST trace, the numbers are 71%, 54%, and 95% respectively.

4 New Requst HIT? No Infrequently Accessed? Cache No Yes Yes Record as HIT Do not cache Figure 3: Strategy for Frequency-Aware Policy of k = 1, 2, 3. We define the performance gap (in HR and BHR) for a policy P as follows: PG-in-HR(P) = HR(P-A(k)) - HR(P) PG-in-BHR(P) = BHR(P-A(k)) - BHR(P) The performance gap of a replacement policy P gives an indication of the potential gain in performance if we can introduce good online versions of policy P that can predict these infrequent objects. 6. EXPERIMENTAL RESULTS We have implemented a web proxy cache simulator that allows us to experiment with all the policies described. The simulator is written in C++. New replacement policies can also be easily added if needed. The two traces, SJ and ST, were used. The cache is initially empty (i.e. we do not perform any warmup of the cache). The cache size S is given by S = β S. To obtain sufficient data points, we have used β = 0.1%, 0.2%,..., 0.9%, 1.0%, 2%,..., 10%. 6.1 Baseline Comparison We first do a baseline evaluation of all the replacement policies used in our study. The results are shown in Figures 4 and 5. The figures show that while the two traces have different slightly characteristics, the general performance trend of the various policies is very similar: Rank by HR :, -P,,, Rank by BHR:,, -P,, We give some observations here: The two offline policies, and -P perform well, as expected. In particular, performs the best in both HR and BHR (and very close to optimal) on both traces. Among the online policies, is the best in terms of both HR and BHR. In fact, the performance of is close to that of the offline policy -P. The performance of in terms of HR is better than but worst than. In terms of BHR, is close to. 6.2 Performance of Frequency-Aware Policies We now present results on the effect of infrequent objects by measuring the performance gaps between each replacement policy and its idealized frequency-aware version. In this section, only results on the SJ trace will be presented. The performance on the ST trace is similar, but is not shown due to space limitation. To aid the analysis, we have separated the replacement policies into two groups: the offline (, -P) and online ones (,, ). The offline replacement policies, like and -P, make use of the past frequency information in its eviction policy. Thus, it is reasonable to expect the performance of the frequencyaware version to be similar to that of the original. In contrast, we expect larger performance gaps for the online replacement policies like, and. of Different Policies for SJ trace of Different Policies for st trace -P P of Different Policies for SJ trace of Different Policies for st trace P Figure 4: Comparison of different policies on SJ using hit rate (above) and byte hit rate (below) P Figure 5: Comparison of different policies on ST using hit rate and byte hit rate. 794

5 of offline Policy and Policy-A1 for SJ trace of online Algo and Policy-A1 for SJ trace -P -P-A1 -A1 -A1 -A1 -A1 of offline Policy and Policy-A1 for SJ trace of online Policy and Policy-A1 for SJ trace -P -P-A1 -A1 Figure 6: Performance of idealized frequency-aware offline policies (, -P) for SJ trace. -A1 -A1 -A1 Figure 7: Performance of idealized frequency-aware online policies (,, ) for SJ trace Effect of Single-Access Objects. We first study the effect due to single-access objects by comparing the performance of each replacement policy with their corresponding A(1) version the version that does not cache single-access objects. The results are shown in Figures 6-8. For all the graphs shown in Figure 6-8, solid lines are used to represent the original policies, while dotted lines represent their frequency-aware versions. Figure 6 shows the results for offline policies and their A(1) versions on the SJ trace. From Figure 6, it is clear that the performance gaps for these offline policies are small, as expected. In particular, the gap between and - A(1) is almost negligible, which shows that it is able to deal with single-access file even though it does not directly use frequency information. The results for online policies (,, ) are shown in Figure 7. Figure 7 clearly shows that the A(1) versions of,, and perform significantly better in terms of HR and BHR. The performance gaps for online policies is significant typically increase with the cache size. For example, for a cache size of 4%S, the performance gaps in HR for,, and are 4.4%, 9.8%, and 5.6%, respectively. Similarly, the performance gaps in BHR are 2.2%, 3.2%, and 3.4%, respectively. In fact, all the A(1) versions converge to HR and BHR when the cache size reaches about 10%S. This can be explained as follows: Recall from Section 5 that the singleaccess files accounts about 90% of S. This means that the multiple-access files (those with frequency 2 or more) has a total size of only about 0.1%S. Therefore, when the cache size is at 10%S, the size of the cache is fast approaching 795 the total size of all uniques files considered by the A(1) policies. Therefore, almost all the replacement policies will have performances converging to HR and BHR. The results in Figure 6-7 suggest that, are good choices for further study since they both have good BHR and HR and reasonably large performance gaps. Therefore, for these two replacement policies, we also run - A(k) and -A(k) for k=1,2,3. The results (not shown here due to space limitation) suggest that the gain comes mostly from considering the A(1) version. 7. PREDICTION OF SAO Given the significant impact of single-access-objects on HR and BHR, it is natural to ask if we can design replacement policies that can predict them. We now present some preliminary results on the prediction of single access objects. Our prediction algorithm, -Pred, actually attempts to predict multiple access objects (MAO s) since they easier to predict than single access objects (SAO s). Our simple prediction algorithm is based on two observations: (a) Objects that have appeared before are not SAOs. (b) Popular objects usually come from popular hosts. For a more practical online implementation, we use an appearance window W app that keeps track of all the objects accessed within a window of size N app and a host ranking window W host, which tracks the set of popular hosts based on history of past accesses. In our current implementations, we have set N app = 50, 000 and W host to be the set of all hosts with more than 500 previous accesses. The details of -Pred are given below:

6 of, -P and -A for SJ trace of, -P and -A for SJ trace -P -A Figure 8: Performance of prediction algorithm - Pred for SJ trace. procedure P redict(r k ) begin if (Cache can accomodate r k ) then PredMAO:=true elseif (r k W app) then PredMAO:=true elseif (host(r k ) W host ) then PredMAO:=true else PredMAO := false; if (PredMAO=false) then Do not cache r k else Cache r k using replacement policy; end We note that the assumptions made by -Pred are rather simplistic. For example, while a host may be very popular, not all the files under it are equally popular. Also, -Pred do not factor in other factors such as file sizes, recency, and so on. However, the aim here is to illustrate the power of prediction in improving performance namely, that a simple prediction algorithm can already improve performance. We compare the performance of -Pred with that of and -A(1). The -Pred algorithm requires a warm-up period to fill initialize W host and W app. Therefore, to get a fair comparison, we set the same warm-up period for all three algorithms. The results are shown in Figure 10. The HR for -Pred lies between that of and -A(1), about 1/3 of the gap distance. For BHR, it performs uniformly better than and especially well for small caches (up to 2%S ). The results in Figure 10 clearly show (a) the power of prediction namely, that even a simple prediction algorithm like -Pred performs better than, (b) that there is still room for improvement as shown by the distance (for both HR and BHR) from -A(1). The latter point is not -P -A 796 unexpected since -Pred is a very simple algorithm and did not take into account many other important factors in its prediction. We expect that more sophisticated prediction algorithms should be able to do much better, although it is not known how close to -A(1) one can achieve with an online -variant. 8. CONCLUSION In this paper, we show that it is beneficial not to cache infrequent objects in proxy caching. To gain insights to this issue, we first propose offline frequency-aware versions of well-known replacement policies like,, and so on. In particular, we show that not caching singleaccess files leads to improvements in the hit rates and byte hit rates of and. This shows that the is potential for improving these replacement policies. We also present preliminary results using a simple online prediction algorithm, -Pred, that outperforms. We are currently researching more sophisticated prediction algorithms to improve proxy cache performance. 9. REFERENCES [1] Proxy trace log, national laboratory for applied network research. [2] M. Arlitt, L. Cherkasova, J. Dilley, R. Friedrich, and J. Tai. Evaluating content management techniques for web proxy caches. HP Lab. Technical Paper, pages , [3] L. A. Belady. A study of replacement policies for virtual storage computers. IBM Systems Journal, (5):78 101, [4] L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker. On the implications of zipf s law for web caching. In 3rd Intl. WWW Caching Workshop, June [5] P. Cao and S. Irani. Cost-aware www proxy caching algorithms. USENIX Symp. on Internet Technology and Systems, pages , Dec [6] L. Cherkasova. Improving www proxies performance with greedy-dual-size-frequency caching policy. HP Computer Systems Laboratory, [7] S. Glassman. A caching relay for the world wide web. First Intl. Conf. on the World-Wide Web, pages 69 74, May [8] S. Hosseini-Khayat and J. R. C. Jr. Optimal solution of off-line and on-line generalized caching. Technical Report WUCS-96-20, [9] H. H. Z. Qiang Yang and T. Li. Mining web logs for prediction models in www caching and prefetching. Proc. ACM SIGKDD, August [10] M. Rabinowich and O. Spatscheek. Web caching and replication. Addison-Wesley, 2002.

Trace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers

Trace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers Proceeding of the 9th WSEAS Int. Conference on Data Networks, Communications, Computers, Trinidad and Tobago, November 5-7, 2007 378 Trace Driven Simulation of GDSF# and Existing Caching Algorithms for

More information

Evaluating the Impact of Different Document Types on the Performance of Web Cache Replacement Schemes *

Evaluating the Impact of Different Document Types on the Performance of Web Cache Replacement Schemes * Evaluating the Impact of Different Document Types on the Performance of Web Cache Replacement Schemes * Christoph Lindemann and Oliver P. Waldhorst University of Dortmund Department of Computer Science

More information

A CONTENT-TYPE BASED EVALUATION OF WEB CACHE REPLACEMENT POLICIES

A CONTENT-TYPE BASED EVALUATION OF WEB CACHE REPLACEMENT POLICIES A CONTENT-TYPE BASED EVALUATION OF WEB CACHE REPLACEMENT POLICIES F.J. González-Cañete, E. Casilari, A. Triviño-Cabrera Department of Electronic Technology, University of Málaga, Spain University of Málaga,

More information

Improving object cache performance through selective placement

Improving object cache performance through selective placement University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2006 Improving object cache performance through selective placement Saied

More information

An Efficient Web Cache Replacement Policy

An Efficient Web Cache Replacement Policy In the Proc. of the 9th Intl. Symp. on High Performance Computing (HiPC-3), Hyderabad, India, Dec. 23. An Efficient Web Cache Replacement Policy A. Radhika Sarma and R. Govindarajan Supercomputer Education

More information

Characterizing Document Types to Evaluate Web Cache Replacement Policies

Characterizing Document Types to Evaluate Web Cache Replacement Policies Characterizing Document Types to Evaluate Web Cache Replacement Policies F.J. Gonzalez-Cañete, E. Casilari, Alicia Triviño-Cabrera Dpto. Tecnología Electrónica, Universidad de Málaga, E.T.S.I. Telecomunicación,

More information

Role of Aging, Frequency, and Size in Web Cache Replacement Policies

Role of Aging, Frequency, and Size in Web Cache Replacement Policies Role of Aging, Frequency, and Size in Web Cache Replacement Policies Ludmila Cherkasova and Gianfranco Ciardo Hewlett-Packard Labs, Page Mill Road, Palo Alto, CA 9, USA cherkasova@hpl.hp.com CS Dept.,

More information

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 2, APRIL Segment-Based Streaming Media Proxy: Modeling and Optimization

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 2, APRIL Segment-Based Streaming Media Proxy: Modeling and Optimization IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 2, APRIL 2006 243 Segment-Based Streaming Media Proxy: Modeling Optimization Songqing Chen, Member, IEEE, Bo Shen, Senior Member, IEEE, Susie Wee, Xiaodong

More information

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web TR020701 April 2002 Erbil Yilmaz Department of Computer Science The Florida State University Tallahassee, FL 32306

More information

ENHANCING QoS IN WEB CACHING USING DIFFERENTIATED SERVICES

ENHANCING QoS IN WEB CACHING USING DIFFERENTIATED SERVICES ENHANCING QoS IN WEB CACHING USING DIFFERENTIATED SERVICES P.Venketesh 1, S.N. Sivanandam 2, S.Manigandan 3 1. Research Scholar, 2. Professor and Head, 3. Research Scholar Department of Computer Science

More information

Online paging and caching

Online paging and caching Title: Online paging and caching Name: Neal E. Young 1 Affil./Addr. University of California, Riverside Keywords: paging; caching; least recently used; -server problem; online algorithms; competitive analysis;

More information

SAMBA-BUS: A HIGH PERFORMANCE BUS ARCHITECTURE FOR SYSTEM-ON-CHIPS Λ. Ruibing Lu and Cheng-Kok Koh

SAMBA-BUS: A HIGH PERFORMANCE BUS ARCHITECTURE FOR SYSTEM-ON-CHIPS Λ. Ruibing Lu and Cheng-Kok Koh BUS: A HIGH PERFORMANCE BUS ARCHITECTURE FOR SYSTEM-ON-CHIPS Λ Ruibing Lu and Cheng-Kok Koh School of Electrical and Computer Engineering Purdue University, West Lafayette, IN 797- flur,chengkokg@ecn.purdue.edu

More information

Dynamic Broadcast Scheduling in DDBMS

Dynamic Broadcast Scheduling in DDBMS Dynamic Broadcast Scheduling in DDBMS Babu Santhalingam #1, C.Gunasekar #2, K.Jayakumar #3 #1 Asst. Professor, Computer Science and Applications Department, SCSVMV University, Kanchipuram, India, #2 Research

More information

Relative Reduced Hops

Relative Reduced Hops GreedyDual-Size: A Cost-Aware WWW Proxy Caching Algorithm Pei Cao Sandy Irani y 1 Introduction As the World Wide Web has grown in popularity in recent years, the percentage of network trac due to HTTP

More information

Migration Based Page Caching Algorithm for a Hybrid Main Memory of DRAM and PRAM

Migration Based Page Caching Algorithm for a Hybrid Main Memory of DRAM and PRAM Migration Based Page Caching Algorithm for a Hybrid Main Memory of DRAM and PRAM Hyunchul Seok Daejeon, Korea hcseok@core.kaist.ac.kr Youngwoo Park Daejeon, Korea ywpark@core.kaist.ac.kr Kyu Ho Park Deajeon,

More information

INTEGRATING INTELLIGENT PREDICTIVE CACHING AND STATIC PREFETCHING IN WEB PROXY SERVERS

INTEGRATING INTELLIGENT PREDICTIVE CACHING AND STATIC PREFETCHING IN WEB PROXY SERVERS INTEGRATING INTELLIGENT PREDICTIVE CACHING AND STATIC PREFETCHING IN WEB PROXY SERVERS Abstract J. B. PATIL Department of Computer Engineering R. C. Patel Institute of Technology, Shirpur. (M.S.), India

More information

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT 5 LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS xxi

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT 5 LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS xxi ix TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT 5 LIST OF TABLES xv LIST OF FIGURES xviii LIST OF SYMBOLS AND ABBREVIATIONS xxi 1 INTRODUCTION 1 1.1 INTRODUCTION 1 1.2 WEB CACHING 2 1.2.1 Classification

More information

Mining Frequent Itemsets in Time-Varying Data Streams

Mining Frequent Itemsets in Time-Varying Data Streams Mining Frequent Itemsets in Time-Varying Data Streams Abstract A transactional data stream is an unbounded sequence of transactions continuously generated, usually at a high rate. Mining frequent itemsets

More information

Cache Design for Transcoding Proxy Caching

Cache Design for Transcoding Proxy Caching Cache Design for Transcoding Proxy Caching Keqiu Li, Hong Shen, and Keishi Tajima Graduate School of Information Science Japan Advanced Institute of Science and Technology 1-1 Tatsunokuchi, Ishikawa, 923-1292,

More information

Chapter The LRU* WWW proxy cache document replacement algorithm

Chapter The LRU* WWW proxy cache document replacement algorithm Chapter The LRU* WWW proxy cache document replacement algorithm Chung-yi Chang, The Waikato Polytechnic, Hamilton, New Zealand, itjlc@twp.ac.nz Tony McGregor, University of Waikato, Hamilton, New Zealand,

More information

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant

More information

A Comparison of File. D. Roselli, J. R. Lorch, T. E. Anderson Proc USENIX Annual Technical Conference

A Comparison of File. D. Roselli, J. R. Lorch, T. E. Anderson Proc USENIX Annual Technical Conference A Comparison of File System Workloads D. Roselli, J. R. Lorch, T. E. Anderson Proc. 2000 USENIX Annual Technical Conference File System Performance Integral component of overall system performance Optimised

More information

An Efficient LFU-Like Policy for Web Caches

An Efficient LFU-Like Policy for Web Caches An Efficient -Like Policy for Web Caches Igor Tatarinov (itat@acm.org) Abstract This study proposes Cubic Selection Sceme () a new policy for Web caches. The policy is based on the Least Frequently Used

More information

A Generalized Target-Driven Cache Replacement Policy for Mobile Environments

A Generalized Target-Driven Cache Replacement Policy for Mobile Environments A Generalized Target-Driven Cache Replacement Policy for Mobile Environments Liangzhong Yin, Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University University Park,

More information

SF-LRU Cache Replacement Algorithm

SF-LRU Cache Replacement Algorithm SF-LRU Cache Replacement Algorithm Jaafar Alghazo, Adil Akaaboune, Nazeih Botros Southern Illinois University at Carbondale Department of Electrical and Computer Engineering Carbondale, IL 6291 alghazo@siu.edu,

More information

Cache Replacement Policies For P2P File Sharing Protocols

Cache Replacement Policies For P2P File Sharing Protocols Cache Replacement Policies For P2P File Sharing Protocols Adam Wierzbicki, PhD * Polish-Japanese Institute of Information Technology adamw@icm.edu.pl * ul. Orzycka 8 m. 37 02-695 Warsaw, Poland Nathaniel

More information

CHAPTER 4 OPTIMIZATION OF WEB CACHING PERFORMANCE BY CLUSTERING-BASED PRE-FETCHING TECHNIQUE USING MODIFIED ART1 (MART1)

CHAPTER 4 OPTIMIZATION OF WEB CACHING PERFORMANCE BY CLUSTERING-BASED PRE-FETCHING TECHNIQUE USING MODIFIED ART1 (MART1) 71 CHAPTER 4 OPTIMIZATION OF WEB CACHING PERFORMANCE BY CLUSTERING-BASED PRE-FETCHING TECHNIQUE USING MODIFIED ART1 (MART1) 4.1 INTRODUCTION One of the prime research objectives of this thesis is to optimize

More information

Evaluation of Performance of Cooperative Web Caching with Web Polygraph

Evaluation of Performance of Cooperative Web Caching with Web Polygraph Evaluation of Performance of Cooperative Web Caching with Web Polygraph Ping Du Jaspal Subhlok Department of Computer Science University of Houston Houston, TX 77204 {pdu, jaspal}@uh.edu Abstract This

More information

Analyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking

Analyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking Analyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking Claudio Imbrenda Luca Muscariello Orange Labs Dario Rossi Telecom ParisTech Outline Motivation

More information

Objective-Optimal Algorithms for Long-term Web Prefetching

Objective-Optimal Algorithms for Long-term Web Prefetching Objective-Optimal Algorithms for Long-term Web Prefetching Bin Wu and Ajay D Kshemkalyani Dept of Computer Science University of Illinois at Chicago Chicago IL 667 bwu ajayk @csuicedu Abstract Web prefetching

More information

Evaluating Unstructured Peer-to-Peer Lookup Overlays

Evaluating Unstructured Peer-to-Peer Lookup Overlays Evaluating Unstructured Peer-to-Peer Lookup Overlays Idit Keidar EE Department, Technion Roie Melamed CS Department, Technion ABSTRACT Unstructured peer-to-peer lookup systems incur small constant overhead

More information

Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling

Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling Weizhen Mao Department of Computer Science The College of William and Mary Williamsburg, VA 23187-8795 USA wm@cs.wm.edu

More information

Energy-Efficient Mobile Cache Invalidation

Energy-Efficient Mobile Cache Invalidation Distributed and Parallel Databases 6, 351 372 (1998) c 1998 Kluwer Academic Publishers. Manufactured in The Netherlands. Energy-Efficient Mobile Cache Invalidation KUN-LUNG WU, PHILIP S. YU AND MING-SYAN

More information

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Saiyad Sharik Kaji Prof.M.B.Chandak WCOEM, Nagpur RBCOE. Nagpur Department of Computer Science, Nagpur University, Nagpur-441111

More information

EE6762. BROADBAND NETWORKS Project Report: Caching

EE6762. BROADBAND NETWORKS Project Report: Caching EE6762 BROADBAND NETWORKS Project Report: Caching Andreas Constantinides Due date: 05/ 11/ 2002 1 Introduction According to Knuth [1], the basic idea of caching is to maintain high-speed access to h items

More information

Fault Class Prioritization in Boolean Expressions

Fault Class Prioritization in Boolean Expressions Fault Class Prioritization in Boolean Expressions Ziyuan Wang 1,2 Zhenyu Chen 1 Tsong-Yueh Chen 3 Baowen Xu 1,2 1 State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210093,

More information

Storage Architecture and Software Support for SLC/MLC Combined Flash Memory

Storage Architecture and Software Support for SLC/MLC Combined Flash Memory Storage Architecture and Software Support for SLC/MLC Combined Flash Memory Soojun Im and Dongkun Shin Sungkyunkwan University Suwon, Korea {lang33, dongkun}@skku.edu ABSTRACT We propose a novel flash

More information

GD-Wheel: A Cost-Aware Replacement Policy for Key-Value Stores

GD-Wheel: A Cost-Aware Replacement Policy for Key-Value Stores GD-Wheel: A Cost-Aware Replacement Policy for Key-Value Stores Conglong Li Carnegie Mellon University conglonl@cs.cmu.edu Alan L. Cox Rice University alc@rice.edu Abstract Memory-based key-value stores,

More information

Leveraging Transitive Relations for Crowdsourced Joins*

Leveraging Transitive Relations for Crowdsourced Joins* Leveraging Transitive Relations for Crowdsourced Joins* Jiannan Wang #, Guoliang Li #, Tim Kraska, Michael J. Franklin, Jianhua Feng # # Department of Computer Science, Tsinghua University, Brown University,

More information

COMMON INTERNET FILE SYSTEM PROXY

COMMON INTERNET FILE SYSTEM PROXY COMMON INTERNET FILE SYSTEM PROXY CS739 PROJECT REPORT ANURAG GUPTA, DONGQIAO LI {anurag, dongqiao}@cs.wisc.edu Computer Sciences Department University of Wisconsin, Madison Madison 53706, WI May 15, 1999

More information

Performance and cost effectiveness of caching in mobile access networks

Performance and cost effectiveness of caching in mobile access networks Performance and cost effectiveness of caching in mobile access networks Jim Roberts (IRT-SystemX) joint work with Salah Eddine Elayoubi (Orange Labs) ICN 2015 October 2015 The memory-bandwidth tradeoff

More information

Location Traceability of Users in Location-based Services

Location Traceability of Users in Location-based Services Location Traceability of Users in Location-based Services Yutaka Yanagisawa Hidetoshi Kido Tetsuji Satoh, NTT Communication Science Laboratories, NTT Corporation Graduate School of Information Science

More information

Characterizing Home Pages 1

Characterizing Home Pages 1 Characterizing Home Pages 1 Xubin He and Qing Yang Dept. of Electrical and Computer Engineering University of Rhode Island Kingston, RI 881, USA Abstract Home pages are very important for any successful

More information

Operating Systems. Memory: replacement policies

Operating Systems. Memory: replacement policies Operating Systems Memory: replacement policies Last time caching speeds up data lookups if the data is likely to be re-requested again data structures for O(1)-lookup data source set-associative (hardware)

More information

A New Web Cache Replacement Algorithm 1

A New Web Cache Replacement Algorithm 1 A New Web Cache Replacement Algorithm Anupam Bhattacharjee, Biolob Kumar Debnath Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology, Dhaka-, Bangladesh

More information

Proxy Server Systems Improvement Using Frequent Itemset Pattern-Based Techniques

Proxy Server Systems Improvement Using Frequent Itemset Pattern-Based Techniques Proceedings of the 2nd International Conference on Intelligent Systems and Image Processing 2014 Proxy Systems Improvement Using Frequent Itemset Pattern-Based Techniques Saranyoo Butkote *, Jiratta Phuboon-op,

More information

A Disk Head Scheduling Simulator

A Disk Head Scheduling Simulator A Disk Head Scheduling Simulator Steven Robbins Department of Computer Science University of Texas at San Antonio srobbins@cs.utsa.edu Abstract Disk head scheduling is a standard topic in undergraduate

More information

Final Project Report: Learning optimal parameters of Graph-Based Image Segmentation

Final Project Report: Learning optimal parameters of Graph-Based Image Segmentation Final Project Report: Learning optimal parameters of Graph-Based Image Segmentation Stefan Zickler szickler@cs.cmu.edu Abstract The performance of many modern image segmentation algorithms depends greatly

More information

A Proxy Caching Scheme for Continuous Media Streams on the Internet

A Proxy Caching Scheme for Continuous Media Streams on the Internet A Proxy Caching Scheme for Continuous Media Streams on the Internet Eun-Ji Lim, Seong-Ho park, Hyeon-Ok Hong, Ki-Dong Chung Department of Computer Science, Pusan National University Jang Jun Dong, San

More information

An Attempt to Identify Weakest and Strongest Queries

An Attempt to Identify Weakest and Strongest Queries An Attempt to Identify Weakest and Strongest Queries K. L. Kwok Queens College, City University of NY 65-30 Kissena Boulevard Flushing, NY 11367, USA kwok@ir.cs.qc.edu ABSTRACT We explore some term statistics

More information

Modeling and Caching of P2P Traffic

Modeling and Caching of P2P Traffic School of Computing Science Simon Fraser University, Canada Modeling and Caching of P2P Traffic Mohamed Hefeeda Osama Saleh ICNP 06 15 November 2006 1 Motivations P2P traffic is a major fraction of Internet

More information

Shaking Service Requests in Peer-to-Peer Video Systems

Shaking Service Requests in Peer-to-Peer Video Systems Service in Peer-to-Peer Video Systems Ying Cai Ashwin Natarajan Johnny Wong Department of Computer Science Iowa State University Ames, IA 500, U. S. A. E-mail: {yingcai, ashwin, wong@cs.iastate.edu Abstract

More information

A Comparative Study of Web Prefetching Techniques Focusing on User s Perspective

A Comparative Study of Web Prefetching Techniques Focusing on User s Perspective A Comparative Study of Web Prefetching Techniques Focusing on User s Perspective Josep Domènech Ana Pont Julio Sahuquillo José A. Gil Department of Computing Engineering (DISCA) Universitat Politècnica

More information

Popularity-Based PPM: An Effective Web Prefetching Technique for High Accuracy and Low Storage

Popularity-Based PPM: An Effective Web Prefetching Technique for High Accuracy and Low Storage Proceedings of 22 International Conference on Parallel Processing, (ICPP 22), Vancouver, Canada, August 18-21, 22. Popularity-Based : An Effective Web Prefetching Technique for High Accuracy and Low Storage

More information

is the Capacitated Minimum Spanning Tree

is the Capacitated Minimum Spanning Tree Dynamic Capacitated Minimum Spanning Trees Raja Jothi and Balaji Raghavachari Department of Computer Science, University of Texas at Dallas Richardson, TX 75083, USA raja, rbk @utdallas.edu Abstract Given

More information

MBB Robot Crawler Data Report in 2014H1

MBB Robot Crawler Data Report in 2014H1 MBB Robot Crawler Data Report in 2014H1 Contents Contents 1 Introduction... 1 2 Characteristics and Trends of Web Services... 3 2.1 Increasing Size of Web Pages... 3 2.2 Increasing Average Number of Access

More information

THE CACHE REPLACEMENT POLICY AND ITS SIMULATION RESULTS

THE CACHE REPLACEMENT POLICY AND ITS SIMULATION RESULTS THE CACHE REPLACEMENT POLICY AND ITS SIMULATION RESULTS 1 ZHU QIANG, 2 SUN YUQIANG 1 Zhejiang University of Media and Communications, Hangzhou 310018, P.R. China 2 Changzhou University, Changzhou 213022,

More information

Evaluating Cache-Layering to Improve Web Cache System Performance

Evaluating Cache-Layering to Improve Web Cache System Performance Evaluating Cache-Layering to Improve Web Cache System Performance Bruno Abrahão Fabrício Benevenuto Departamento de Ciência da Computação Universidade Federal de Minas Gerais Av. Antônio Carlos, 6627,

More information

Mining Web Logs to Improve Web Caching and Prefetching

Mining Web Logs to Improve Web Caching and Prefetching Mining Web Logs to Improve Web Caching and Prefetching Qiang Yang, Henry Haining Zhang, Ian T.Y. Li, and Ye Lu School of Computing Science Simon Fraser University Burnaby, BC, Canada V5A 1S6 (qyang, hzhangb,

More information

Lightweight caching strategy for wireless content delivery networks

Lightweight caching strategy for wireless content delivery networks Lightweight caching strategy for wireless content delivery networks Jihoon Sung 1, June-Koo Kevin Rhee 1, and Sangsu Jung 2a) 1 Department of Electrical Engineering, KAIST 291 Daehak-ro, Yuseong-gu, Daejeon,

More information

Efficient Remote Data Access in a Mobile Computing Environment

Efficient Remote Data Access in a Mobile Computing Environment This paper appears in the ICPP 2000 Workshop on Pervasive Computing Efficient Remote Data Access in a Mobile Computing Environment Laura Bright Louiqa Raschid University of Maryland College Park, MD 20742

More information

Scheduling Unsplittable Flows Using Parallel Switches

Scheduling Unsplittable Flows Using Parallel Switches Scheduling Unsplittable Flows Using Parallel Switches Saad Mneimneh, Kai-Yeung Siu Massachusetts Institute of Technology 77 Massachusetts Avenue Room -07, Cambridge, MA 039 Abstract We address the problem

More information

Query Likelihood with Negative Query Generation

Query Likelihood with Negative Query Generation Query Likelihood with Negative Query Generation Yuanhua Lv Department of Computer Science University of Illinois at Urbana-Champaign Urbana, IL 61801 ylv2@uiuc.edu ChengXiang Zhai Department of Computer

More information

General properties of staircase and convex dual feasible functions

General properties of staircase and convex dual feasible functions General properties of staircase and convex dual feasible functions JÜRGEN RIETZ, CLÁUDIO ALVES, J. M. VALÉRIO de CARVALHO Centro de Investigação Algoritmi da Universidade do Minho, Escola de Engenharia

More information

Web Caching and Content Delivery

Web Caching and Content Delivery Web Caching and Content Delivery Caching for a Better Web Performance is a major concern in the Web Proxy caching is the most widely used method to improve Web performance Duplicate requests to the same

More information

Calculating lower bounds for caching problems

Calculating lower bounds for caching problems Calculating lower bounds for caching problems Leah Epstein Rob van Stee Abstract We present a general method for computing lower bounds for various caching problems. We apply the method to two well known

More information

An Enhanced Perturbing Algorithm for Floorplan Design Using the O-tree Representation*

An Enhanced Perturbing Algorithm for Floorplan Design Using the O-tree Representation* An Enhanced Perturbing Algorithm for Floorplan Design Using the O-tree Representation* Yingxin Pang Dept.ofCSE Univ. of California, San Diego La Jolla, CA 92093 ypang@cs.ucsd.edu Chung-Kuan Cheng Dept.ofCSE

More information

A Hybrid Caching Strategy for Streaming Media Files

A Hybrid Caching Strategy for Streaming Media Files A Hybrid Caching Strategy for Streaming Media Files Jussara M. Almeida a, Derek L. Eager b, Mary K. Vernon a a Department of Computer Science, University of Wisconsin-Madison 2 West Dayton Street, Madison,

More information

Stretch-Optimal Scheduling for On-Demand Data Broadcasts

Stretch-Optimal Scheduling for On-Demand Data Broadcasts Stretch-Optimal Scheduling for On-Demand Data roadcasts Yiqiong Wu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University, University Park, PA 6 E-mail: fywu,gcaog@cse.psu.edu

More information

A Comparison of Error Metrics for Learning Model Parameters in Bayesian Knowledge Tracing

A Comparison of Error Metrics for Learning Model Parameters in Bayesian Knowledge Tracing A Comparison of Error Metrics for Learning Model Parameters in Bayesian Knowledge Tracing Asif Dhanani Seung Yeon Lee Phitchaya Phothilimthana Zachary Pardos Electrical Engineering and Computer Sciences

More information

Buffer Caching Algorithms for Storage Class RAMs

Buffer Caching Algorithms for Storage Class RAMs Issue 1, Volume 3, 29 Buffer Caching Algorithms for Storage Class RAMs Junseok Park, Hyunkyoung Choi, Hyokyung Bahn, and Kern Koh Abstract Due to recent advances in semiconductor technologies, storage

More information

Coordinated En-Route Web Caching

Coordinated En-Route Web Caching This is the Pre-Published Version En-Route Web Caching Xueyan Tang & Samuel T. Chanson Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Hong Kong E-mail:

More information

Selective Fill Data Cache

Selective Fill Data Cache Selective Fill Data Cache Rice University ELEC525 Final Report Anuj Dharia, Paul Rodriguez, Ryan Verret Abstract Here we present an architecture for improving data cache miss rate. Our enhancement seeks

More information

Context based optimal shape coding

Context based optimal shape coding IEEE Signal Processing Society 1999 Workshop on Multimedia Signal Processing September 13-15, 1999, Copenhagen, Denmark Electronic Proceedings 1999 IEEE Context based optimal shape coding Gerry Melnikov,

More information

A Controller Testability Analysis and Enhancement Technique

A Controller Testability Analysis and Enhancement Technique A Controller Testability Analysis and Enhancement Technique Xinli Gu Erik Larsson, Krzysztof Kuchinski and Zebo Peng Synopsys, Inc. Dept. of Computer and Information Science 700 E. Middlefield Road Linköping

More information

DADS: Dynamic and Automatic Disk Scheduling

DADS: Dynamic and Automatic Disk Scheduling DADS: Dynamic and Automatic Disk Scheduling Pilar González-Férez Universidad de Murcia Murcia, Spain pilar@ditec.um.es Juan Piernas Universidad de Murcia Murcia, Spain piernas@ditec.um.es Toni Cortes Universitat

More information

Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment

Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment Y.-K. Chang, M.-H. Hong, and Y.-W. Ting Dept. of Computer Science & Information Engineering, National Cheng Kung University

More information

Impact of Frequency-Based Cache Management Policies on the Performance of Segment Based Video Caching Proxies

Impact of Frequency-Based Cache Management Policies on the Performance of Segment Based Video Caching Proxies Impact of Frequency-Based Cache Management Policies on the Performance of Segment Based Video Caching Proxies Anna Satsiou and Michael Paterakis Laboratory of Information and Computer Networks Department

More information

The Impact of More Accurate Requested Runtimes on Production Job Scheduling Performance

The Impact of More Accurate Requested Runtimes on Production Job Scheduling Performance The Impact of More Accurate Requested Runtimes on Production Job Scheduling Performance Su-Hui Chiang, Andrea Arpaci-Dusseau, and Mary K. Vernon Computer Sciences Department University of Wisconsin 11

More information

Quantitative Models for Performance Enhancement of Information Retrieval from Relational Databases

Quantitative Models for Performance Enhancement of Information Retrieval from Relational Databases Quantitative Models for Performance Enhancement of Information Retrieval from Relational Databases Jenna Estep Corvis Corporation, Columbia, MD 21046 Natarajan Gautam Harold and Inge Marcus Department

More information

arxiv: v3 [cs.ni] 3 May 2017

arxiv: v3 [cs.ni] 3 May 2017 Modeling Request Patterns in VoD Services with Recommendation Systems Samarth Gupta and Sharayu Moharir arxiv:1609.02391v3 [cs.ni] 3 May 2017 Department of Electrical Engineering, Indian Institute of Technology

More information

Second-Tier Cache Management Using Write Hints

Second-Tier Cache Management Using Write Hints Second-Tier Cache Management Using Write Hints Xuhui Li University of Waterloo Aamer Sachedina IBM Toronto Lab Ashraf Aboulnaga University of Waterloo Shaobo Gao University of Waterloo Kenneth Salem University

More information

A Distributed Architecture of Edge Proxy Servers for Cooperative Transcoding

A Distributed Architecture of Edge Proxy Servers for Cooperative Transcoding A Distributed Architecture of Edge Proxy Servers for Cooperative Transcoding Valeria Cardellini University of Roma Tor Vergata cardellini@ing.uniroma2.it Michele Colajanni University of Modena colajanni@unimo.it

More information

A Simulation: Improving Throughput and Reducing PCI Bus Traffic by. Caching Server Requests using a Network Processor with Memory

A Simulation: Improving Throughput and Reducing PCI Bus Traffic by. Caching Server Requests using a Network Processor with Memory Shawn Koch Mark Doughty ELEC 525 4/23/02 A Simulation: Improving Throughput and Reducing PCI Bus Traffic by Caching Server Requests using a Network Processor with Memory 1 Motivation and Concept The goal

More information

The Impact of More Accurate Requested Runtimes on Production Job Scheduling Performance

The Impact of More Accurate Requested Runtimes on Production Job Scheduling Performance The Impact of More Accurate Requested Runtimes on Production Job Scheduling Performance Su-Hui Chiang Andrea Arpaci-Dusseau Mary K. Vernon Computer Sciences Department University of Wisconsin-Madison {suhui,

More information

Providing Resource Allocation and Performance Isolation in a Shared Streaming-Media Hosting Service

Providing Resource Allocation and Performance Isolation in a Shared Streaming-Media Hosting Service Providing Resource Allocation and Performance Isolation in a Shared Streaming-Media Hosting Service Ludmila Cherkasova Hewlett-Packard Laboratories 11 Page Mill Road, Palo Alto, CA 94303, USA cherkasova@hpl.hp.com

More information

6 Distributed data management I Hashing

6 Distributed data management I Hashing 6 Distributed data management I Hashing There are two major approaches for the management of data in distributed systems: hashing and caching. The hashing approach tries to minimize the use of communication

More information

Software Complexity Factor in Software Reliability Assessment

Software Complexity Factor in Software Reliability Assessment Software Complexity Factor in Software Reliability Assessment Meng-Lai Yin, Ph.D., ECE department, California Polytechnic University, Pomona Jon Peterson, Raytheon Company, Fullerton Rafael R. Arellano,

More information

A Random Number Based Method for Monte Carlo Integration

A Random Number Based Method for Monte Carlo Integration A Random Number Based Method for Monte Carlo Integration J Wang and G Harrell Department Math and CS, Valdosta State University, Valdosta, Georgia, USA Abstract - A new method is proposed for Monte Carlo

More information

Caching Documents with Active Properties

Caching Documents with Active Properties Caching Documents with Active Properties Eyal de Lara, Karin Petersen, Douglas B. Terry, Anthony LaMarca, Jim Thornton, Mike Salisbury, Paul Dourish, Keith Edwards, and John Lamping Computer Science Laboratory

More information

On the Relationship of Server Disk Workloads and Client File Requests

On the Relationship of Server Disk Workloads and Client File Requests On the Relationship of Server Workloads and Client File Requests John R. Heath Department of Computer Science University of Southern Maine Portland, Maine 43 Stephen A.R. Houser University Computing Technologies

More information

Applied Algorithm Design Lecture 3

Applied Algorithm Design Lecture 3 Applied Algorithm Design Lecture 3 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 3 1 / 75 PART I : GREEDY ALGORITHMS Pietro Michiardi (Eurecom) Applied Algorithm

More information

Streaming Flow Analyses for Prefetching in Segment-based Proxy Caching to Improve Media Delivery Quality

Streaming Flow Analyses for Prefetching in Segment-based Proxy Caching to Improve Media Delivery Quality Streaming Flow Analyses for Prefetching in Segment-based Proxy Caching to Improve Media Delivery Quality Songqing Chen Bo Shen, Susie Wee Xiaodong Zhang Department of Computer Science Mobile and Media

More information

CACHE COHERENCY IN P2P COOPERATIVE PROXY CACHE SYSTEMS

CACHE COHERENCY IN P2P COOPERATIVE PROXY CACHE SYSTEMS CACHE COHERENCY IN P2P COOPERATIVE PROXY CACHE SYSTEMS Ankur B. Pal James Z. Wang Pradip K. Srimani* Department of Computer Science Clemson University Clemson, SC 29634 {apal, jzwang, srimani}@cs.clemson.edu

More information

Buffer Management Scheme for Video-on-Demand (VoD) System

Buffer Management Scheme for Video-on-Demand (VoD) System 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Buffer Management Scheme for Video-on-Demand (VoD) System Sudhir N.

More information

SAT A Split-Up Cache Model to Boost the Performance of Web Cache Replacement Policies

SAT A Split-Up Cache Model to Boost the Performance of Web Cache Replacement Policies BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 11, No 4 Sofia 2011 SAT A Split-Up Cache Model to Boost the Performance of Web Cache Replacement Policies Geetha Krishnan 1,

More information

Efficient Randomized Web-Cache Replacement Schemes Using Samples From Past Eviction Times

Efficient Randomized Web-Cache Replacement Schemes Using Samples From Past Eviction Times IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 4, AUGUST 2002 441 Efficient Randomized Web-Cache Replacement Schemes Using Samples From Past Eviction Times Konstantinos Psounis, Student Member, IEEE,

More information

Multimedia Streaming. Mike Zink

Multimedia Streaming. Mike Zink Multimedia Streaming Mike Zink Technical Challenges Servers (and proxy caches) storage continuous media streams, e.g.: 4000 movies * 90 minutes * 10 Mbps (DVD) = 27.0 TB 15 Mbps = 40.5 TB 36 Mbps (BluRay)=

More information

Maintaining Mutual Consistency for Cached Web Objects

Maintaining Mutual Consistency for Cached Web Objects Maintaining Mutual Consistency for Cached Web Objects Bhuvan Urgaonkar, Anoop George Ninan, Mohammad Salimullah Raunak Prashant Shenoy and Krithi Ramamritham Department of Computer Science, University

More information

B. Krishna Sagar et al. / International Journal of Research in Modern Engineering and Emerging Technology

B. Krishna Sagar et al. / International Journal of Research in Modern Engineering and Emerging Technology A Novel System to Map Reasonably Connected Internet Regions B KRISHNA SAGAR Department of Computer Science and Engineering Siddartha educational academy group of institutions, Tirupati (India) N. ANAND

More information