On the Analysis of Caches with Pending Interest Tables

Size: px
Start display at page:

Download "On the Analysis of Caches with Pending Interest Tables"

Transcription

1 On the Analysis of Caches with Pending Interest Tables Mostafa Dehghan 1, Bo Jiang 1 Ali Dabirmoghaddam 2, Don Towsley 1 1 University of Massachusetts Amherst 2 University of California Santa Cruz ICN, October 2, 2015 College of Information and Computer Sciences

2 Overview Named Data Networking Data names instead of IP addresses Data Structures: Content Store Pending Interest Table Forwarding Information Base Packets: Interest packet Data packet 1 / 25

3 Overview Content Store Name ss Data Face 0 Pending Interest Table Name Face ss Face 1 Forwarding Information Base Prefix Face /icn/ ss 1 Face 2 2 / 25

4 Overview Content Store Name Data ss Pending Interest Table Name Face ss Face 0 Interest: /icn/pit.pdf Face 1 Forwarding Information Base Prefix Face /icn/ ss 1 Face 2 2 / 25

5 Overview Content Store Name Data ss Pending Interest Table Name Face ss Face 0 Interest: /icn/pit.pdf Face 1 Forwarding Information Base Prefix Face /icn/ ss 1 Face 2 2 / 25

6 Overview Content Store Name Data ss Pending Interest Table Name Face ss Face 0 Interest: /icn/pit.pdf Face 1 Forwarding Information Base Prefix Face /icn/ ss 1 Face 2 2 / 25

7 Overview Content Store Name Data ss Pending Interest Table Name Face /icn/pit.pdf ss 0 Face 0 Interest: /icn/pit.pdf Face 1 Forwarding Information Base Prefix Face /icn/ ss 1 Face 2 2 / 25

8 Overview Content Store Name Data ss Pending Interest Table Name Face /icn/pit.pdf ss 0 Face 0 Interest: /icn/pit.pdf Face 1 Forwarding Information Base Prefix Face /icn/ ss 1 Face 2 2 / 25

9 Overview Content Store Name Data ss Pending Interest Table Name Face /icn/pit.pdf ss 0 Face 0 Interest: /icn/pit.pdf Face 1 Forwarding Information Base Prefix Face /icn/ ss 1 Face 2 2 / 25

10 Overview Content Store Name ss Data Face 0 Pending Interest Table Name Face /icn/pit.pdf ss 0 Face 1 Forwarding Information Base Prefix Face /icn/ ss 1 Face 2 Interest: /icn/pit.pdf 2 / 25

11 Overview Content Store Name ss Data Face 0 Pending Interest Table Name Face /icn/pit.pdf ss 0 Face 1 Forwarding Information Base Prefix Face /icn/ ss 1 Face 2 Interest: /icn/pit.pdf 2 / 25

12 Overview Content Store Name ss Data Face 0 Pending Interest Table Name Face /icn/pit.pdf ss 0 Face 1 Forwarding Information Base Prefix Face /icn/ ss 1 Face 2 Interest: /icn/pit.pdf 2 / 25

13 Overview Content Store Name ss Data Face 0 Pending Interest Table Name Face /icn/pit.pdf ss 0,2 Face 1 Forwarding Information Base Prefix Face /icn/ ss 1 Face 2 Interest: /icn/pit.pdf 2 / 25

14 Overview Content Store Name ss Data Face 0 Pending Interest Table Name Face /icn/pit.pdf ss 0,2 Forwarding Information Base Prefix Face /icn/ ss 1 Face 1 Data: /icn/pit.pdf Face 2 2 / 25

15 Overview Content Store Name ss Data Face 0 Pending Interest Table Name Face /icn/pit.pdf ss 0,2 Forwarding Information Base Prefix Face /icn/ ss 1 Face 1 Data: /icn/pit.pdf Face 2 2 / 25

16 Overview Content Store Name Data /icn/pit.pdf ss... Pending Interest Table Name Face /icn/pit.pdf ss 0,2 Forwarding Information Base Prefix Face /icn/ ss 1 Face 0 Face 1 Data: /icn/pit.pdf Face 2 2 / 25

17 Overview Content Store Name Data /icn/pit.pdf ss... Pending Interest Table Name Face /icn/pit.pdf ss 0,2 Forwarding Information Base Prefix Face /icn/ ss 1 Face 0 Face 1 Data: /icn/pit.pdf Face 2 2 / 25

18 Overview Content Store Name Data /icn/pit.pdf ss... Pending Interest Table Name Face ss Face 0 Face 1 Forwarding Information Base Prefix Face /icn/ ss 1 Face 2 2 / 25

19 Pending Interest Table (PIT) Performs request aggregation Keep track of Interests forwarded but not yet satisfied 3 / 25

20 Pending Interest Table (PIT) Performs request aggregation Keep track of Interests forwarded but not yet satisfied Advantages: lower bandwidth usage communication without knowledge of source and destination better security... 3 / 25

21 Pending Interest Table (PIT) Performs request aggregation Keep track of Interests forwarded but not yet satisfied Advantages: lower bandwidth usage communication without knowledge of source and destination better security... Affects cache behavior hit probability response time 3 / 25

22 Motivation Need analytical models to predict cache behavior Better design choices 4 / 25

23 Motivation Need analytical models to predict cache behavior Better design choices PIT sizing 4 / 25

24 Motivation Need analytical models to predict cache behavior Better design choices PIT sizing State of the art: Ignores download delay Does not consider PIT 4 / 25

25 Motivation Need analytical models to predict cache behavior Better design choices PIT sizing State of the art: Ignores download delay Does not consider PIT Goal: Analytically model cache with PIT 4 / 25

26 Outline Time-To-Live Caches Model and Analysis Replacement Based Policies Simulation Results 5 / 25

27 Time-To-Live (TTL) Caches Content eviction occurs upon timer expiration 6 / 25

28 Time-To-Live (TTL) Caches Content eviction occurs upon timer expiration Cache t 6 / 25

29 Time-To-Live (TTL) Caches Content eviction occurs upon timer expiration T Cache t 6 / 25

30 Time-To-Live (TTL) Caches Content eviction occurs upon timer expiration T Cache t 6 / 25

31 Time-To-Live (TTL) Caches Content eviction occurs upon timer expiration T Cache t Reset TTL cache reset timer upon each hit 6 / 25

32 Time-To-Live (TTL) Caches Content eviction occurs upon timer expiration T Cache t Reset TTL cache reset timer upon each hit T Cache t 6 / 25

33 Time-To-Live (TTL) Caches Content eviction occurs upon timer expiration T Cache t Reset TTL cache reset timer upon each hit T Cache t 6 / 25

34 Time-To-Live (TTL) Caches Content eviction occurs upon timer expiration T Cache t Reset TTL cache reset timer upon each hit T Cache t 6 / 25

35 Time-To-Live (TTL) Caches Content eviction occurs upon timer expiration T Cache t Reset TTL cache reset timer upon each hit T Cache t 6 / 25

36 Model Requests: renewal arrivals Reset TTL cache with PIT CS PIT t 7 / 25

37 Model Requests: renewal arrivals Reset TTL cache with PIT CS PIT t 7 / 25

38 Model Requests: renewal arrivals Reset TTL cache with PIT CS PIT t 7 / 25

39 Model Requests: renewal arrivals Reset TTL cache with PIT CS PIT D t 7 / 25

40 Model Requests: renewal arrivals Reset TTL cache with PIT CS PIT D t 7 / 25

41 Model Requests: renewal arrivals Reset TTL cache with PIT CS PIT D t 7 / 25

42 Model Requests: renewal arrivals Reset TTL cache with PIT CS PIT D t 7 / 25

43 Model Requests: renewal arrivals Reset TTL cache with PIT CS PIT D T t 7 / 25

44 Model Requests: renewal arrivals Reset TTL cache with PIT CS PIT D T t 7 / 25

45 Model Requests: renewal arrivals Reset TTL cache with PIT CS PIT D T t 7 / 25

46 Model Requests: renewal arrivals Reset TTL cache with PIT CS PIT D T t 7 / 25

47 Model Requests: renewal arrivals Reset TTL cache with PIT CS PIT D T t 7 / 25

48 Model Requests: renewal arrivals Reset TTL cache with PIT CS PIT D T t 7 / 25

49 Model Requests: renewal arrivals Reset TTL cache with PIT CS PIT D T t 7 / 25

50 Metrics Z D L t # misses M # hits N 8 / 25

51 Metrics Cache hit prob Z h = E[N] E[M] + E[N] D L t # misses M # hits N 8 / 25

52 Metrics Cache hit prob h = E[N] E[M] + E[N] Cache response time r = E[w(D)]/(E[M]+E[N]) w(t) = t+ t 0 (t x)dm(x) m(t): renewal function Poisson: m(t) = λt Z D L # misses M # hits N t 8 / 25

53 Metrics Cache hit prob h = E[N] E[M] + E[N] Cache response time r = E[w(D)]/(E[M]+E[N]) w(t) = t+ t 0 (t x)dm(x) m(t): renewal function Poisson: m(t) = λt Z D L # misses M # hits N Cache occupancy prob o = E[L]/E[Z] t 8 / 25

54 Metrics Cache hit prob h = E[N] E[M] + E[N] Cache response time r = E[w(D)]/(E[M]+E[N]) w(t) = t+ t 0 (t x)dm(x) m(t): renewal function Poisson: m(t) = λt Z D L # misses M # hits N Cache occupancy prob o = E[L]/E[Z] PIT occupancy prob p = E[D]/E[Z] t 8 / 25

55 Replacement Based Policies Characteristic Time Approximation Introduced by Che et al. for LRU policy w/ Poisson arrivals Extended to other policies, e.g. FIFO, Random,... Extended to general request arrival processes Characteristic time T solution of i o i(t) = C o i cache occupancy probability of file i C cache size 9 / 25

56 LRU Cache with Poisson Arrivals Modeled as reset TTL with constant T Cache hit/occupancy probability h i = o i = eλ it 1 λ i ED i + e λ it λ i arrival rate of requests for file i ED i expected download delay for file i characteristic time T solution of i e λit 1 λ i ED i + e λit = C 10 / 25

57 LRU Cache with Poisson Arrivals PIT occupancy probability p i = λ i ED i λ i ED i + e λ it 11 / 25

58 LRU Cache with Poisson Arrivals PIT occupancy probability p i = λ i ED i λ i ED i + e λ it PIT size ( S N p i, i i p i (1 p i ) ) 11 / 25

59 LRU Cache with Poisson Arrivals PIT occupancy probability p i = λ i ED i λ i ED i + e λ it PIT size ( S N p i, i i Average cache response time p i (1 p i ) ) r i = ED i + 0.5λ i ED 2 i λ i ED i + e λ it 11 / 25

60 Simulation Cache size = 10 3 # different files = 10 4 Requests: Poisson process w/ rate λ = 10 5 per second File popularity: Zipf distribution, λ i i 0.8 Download delay: 100 ms One simulation run: total of 10 7 requests simulated Base model: ZDD: Zero-Download Delay 12 / 25

61 Result Cache Hit Probability Hit probability for individual files (D = 100 ms) 10 0 LRU Hit probability 10 1 Simulation Model File index 13 / 25

62 Result Cache Hit Probability Hit probability for individual files (D = 100 ms) 10 0 LRU Hit probability 10 1 Simulation ZDD Model File index 13 / 25

63 Result Cache Hit Probability Average hit probability vs. download delay Average hit probability LRU Simulation Model Download delay (ms) 14 / 25

64 Result Request Aggregation PIT occupancy probability for individual files (D = 100 ms) Req. aggregation prob Simulation Model LRU Files 15 / 25

65 Result PIT Size PIT size distribution Probability density Simulation Model LRU PIT size 16 / 25

66 Result PIT Size Average PIT size vs. download delay LRU 5000 Average PIT size Simulation Model Download delay (ms) 17 / 25

67 Result Cache Response Time Response time for individual files (D = 100 ms) Average response time (ms) Simulation Model LRU File index 18 / 25

68 Result Cache Response Time Response time for individual files (D = 100 ms) Average response time (ms) Simulation ZDD Model LRU File index 18 / 25

69 Result Cache Response Time Average response time vs. download delay Average response time (ms) Simulation Model LRU Download delay (ms) 19 / 25

70 Numerical Results Cache size = 10 4 # different files = 10 7 Requests: Poisson process w/ rate λ = 10 5 per second File popularity: Zipf distribution, λ i i 0.8 Download delay: 100 ms Model only no simulations 20 / 25

71 Result Cache Hit Probability Average hit probability vs. cache size Overall hit probability Cache size LRU FIFO 21 / 25

72 Result Cache Hit Probability Average hit probability vs. download delay Overall hit probability Download delay (ms) LRU FIFO 22 / 25

73 Result PIT Size Average PIT size vs. cache size Average PIT size FIFO LRU Cache size 23 / 25

74 Result PIT Size Average PIT size vs. download delay Average PIT size 2.5 x FIFO LRU Download delay (ms) 24 / 25

75 Summary Conclusions: Modeled cache with PIT and non-zero download delay Cache hit probability PIT size Cache response time Analysis based on TTL caches LRU, FIFO and Random Characteristic time holds with positive download delay Future Work: Requests arriving for chunks of files (e.g. streaming video) Different scales of download delays 25 / 25

On the Analysis of Caches with Pending Interest Tables

On the Analysis of Caches with Pending Interest Tables On the Analysis of Caches with Pending Interest Tables Mostafa Dehghan 1, Bo Jiang 1, Ali Dabirmoghaddam, and Don Towsley 1 1 College of Information and Computer Sciences, University of Massachusetts,

More information

Application aware access and distribution of digital objects using Named Data Networking (NDN)

Application aware access and distribution of digital objects using Named Data Networking (NDN) Application aware access and distribution of digital objects using Named Data Networking (NDN) July 4, 2017 Rahaf Mousa Supervisor: dr.zhiming Zhao University of Amsterdam System and Network Engineering

More information

Efficient Content Verification in Named Data Networking

Efficient Content Verification in Named Data Networking Efficient Content Verification in Named Data Networking 2015. 10. 2. Dohyung Kim 1, Sunwook Nam 2, Jun Bi 3, Ikjun Yeom 1 mr.dhkim@gmail.com 1 Sungkyunkwan University 2 Korea Financial Telecommunications

More information

Performance and cost effectiveness of caching in mobile access networks

Performance and cost effectiveness of caching in mobile access networks Performance and cost effectiveness of caching in mobile access networks Jim Roberts (IRT-SystemX) joint work with Salah Eddine Elayoubi (Orange Labs) ICN 2015 October 2015 The memory-bandwidth tradeoff

More information

Named Data Networking for 5G Wireless

Named Data Networking for 5G Wireless Named Data Networking for 5G Wireless Edmund Yeh Electrical and Computer Engineering Northeastern University New York University January 27, 2017 Overview NDN: a major information-centric networking architecture

More information

Optimal Cache Allocation for Content-Centric Networking

Optimal Cache Allocation for Content-Centric Networking Optimal Cache Allocation for Content-Centric Networking Yonggong Wang, Zhenyu Li, Gaogang Xie Chinese Academy of Sciences Gareth Tyson, Steve Uhlig QMUL Yonggong Wang, Zhenyu Li, Gareth Tyson, Steve Uhlig,

More information

CS7810 Prefetching. Seth Pugsley

CS7810 Prefetching. Seth Pugsley CS7810 Prefetching Seth Pugsley Predicting the Future Where have we seen prediction before? Does it always work? Prefetching is prediction Predict which cache line will be used next, and place it in the

More information

MPC: Popularity-based Caching Strategy for Content Centric Networks

MPC: Popularity-based Caching Strategy for Content Centric Networks MPC: Popularity-based Caching Strategy for Content Centric Networks César Bernardini Thomas Silverston Olivier Festor INRIA Nancy Université de Lorraine, France cesar.bernardini@inria.fr ICC 2013 - June

More information

Performance Comparison of Caching Strategies for Information-Centric IoT

Performance Comparison of Caching Strategies for Information-Centric IoT Performance Comparison of Caching Strategies for Information-Centric IoT Jakob Pfender, Alvin Valera, Winston Seah School of Engineering and Computer Science Victoria University of Wellington, New Zealand

More information

A Popularity-based Caching Strategy for the Future Internet

A Popularity-based Caching Strategy for the Future Internet Team researchers: Ikram Ud Din, Adib Habbal, and Nur Haryani Zakaria ITU Kaleidoscope 2016 ICTs for a Sustainable World A Popularity-based Caching Strategy for the Future Internet Suhaidi Hassan PhD SMIEEE

More information

Master s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE 5114FG21-6 THEINT THEINT MYO. Hidenori NAKAZATO. Supervisor 指導教員 年 7 月 1 9 日

Master s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE 5114FG21-6 THEINT THEINT MYO. Hidenori NAKAZATO. Supervisor 指導教員 年 7 月 1 9 日 Graduate School of Fundamental Science and Engineering Master s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE Student ID 学籍番号 5114FG21-6 Name 氏名 THEINT THEINT MYO Supervisor 指導教員 Hidenori NAKAZATO 印

More information

Time Aware Least Recent Used (TLRU) Cache Management Policy in ICN

Time Aware Least Recent Used (TLRU) Cache Management Policy in ICN Time Aware Least Recent Used (T) Cache Management Policy in ICN Muhammad Bilal*, Shin-Gak Kang** *Dept. of Engineering, University of Science and Technology (ETRI-Campus), Daejeon, Rep. of Korea ** Electronics

More information

An approximate analysis of heterogeneous and general cache networks.

An approximate analysis of heterogeneous and general cache networks. An approximate analysis of heterogeneous and general cache networks. Nicaise Choungmo Fofack, Don Towsley, Misha Badov, Mostafa Dehghan, Dennis L. Goeckel RESEARCH REPORT N 856 April 8 24 Project-Team

More information

Scaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks

Scaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks 1896 1920 1987 2006 Scaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks Ying Cui Shanghai Jiao Tong University, Shanghai, China Joint work with Fan Lai, Feng Qiu, Wenjie

More information

Model-based Design and Analysis of Cache Hierarchies

Model-based Design and Analysis of Cache Hierarchies Model-based Design and Analysis of Cache Hierarchies Amr Rizk Technische Universität Darmstadt amr.rizk@kom.tu-darmstadt.de Michael Zink University of Massachusetts, Amherst zink@ecs.umass.edu Ramesh Sitaraman

More information

A Light-Weight Forwarding Plane for Content-Centric Networks

A Light-Weight Forwarding Plane for Content-Centric Networks A Light-Weight Forwarding Plane for Content-Centric Networks J.J. Garcia-Luna-Aceves 1,2 and Maziar Mirzazad-Barijough 2 1 Palo Alto Research Center, Palo Alto, CA 94304 2 Department of Computer Engineering,

More information

Time-Step Network Simulation

Time-Step Network Simulation Time-Step Network Simulation Andrzej Kochut Udaya Shankar University of Maryland, College Park Introduction Goal: Fast accurate performance evaluation tool for computer networks Handles general control

More information

A Comparison of Capacity Management Schemes for Shared CMP Caches

A Comparison of Capacity Management Schemes for Shared CMP Caches A Comparison of Capacity Management Schemes for Shared CMP Caches Carole-Jean Wu and Margaret Martonosi Princeton University 7 th Annual WDDD 6/22/28 Motivation P P1 P1 Pn L1 L1 L1 L1 Last Level On-Chip

More information

Follow Me Cloud and Virtualization of (Multimedia) Services and Applications: Challenges and Possible Solutions

Follow Me Cloud and Virtualization of (Multimedia) Services and Applications: Challenges and Possible Solutions Follow Me Cloud and Virtualization of (Multimedia) Services and Applications: Challenges and Possible Solutions André Gomes (1), Torsten Braun (1), Georgios Karagiannis (2), Morteza Karimzadeh (2), Marco

More information

Memory Hierarchy. Slides contents from:

Memory Hierarchy. Slides contents from: Memory Hierarchy Slides contents from: Hennessy & Patterson, 5ed Appendix B and Chapter 2 David Wentzlaff, ELE 475 Computer Architecture MJT, High Performance Computing, NPTEL Memory Performance Gap Memory

More information

A Markov Model of CCN Pending Interest Table Occupancy with Interest Timeout and Retries

A Markov Model of CCN Pending Interest Table Occupancy with Interest Timeout and Retries A Markov Model of CCN Pending Interest Table Occupancy with Interest Timeout and Retries Amuda James Abu, Brahim Bensaou and Ahmed M. Abdelmoniem The Department of Computer Science and Engineering The

More information

A Cross-Layer Perspective of Routing. Taming the Underlying Challenges of Reliable Routing in Sensor Networks. Underlying Connectivity in Reality

A Cross-Layer Perspective of Routing. Taming the Underlying Challenges of Reliable Routing in Sensor Networks. Underlying Connectivity in Reality Taming the Underlying Challenges of Reliable Routing in Sensor Networks Alec Woo, Terence Tong, and David Culler UC Berkeley and Intel Research Berkeley A Cross-Layer Perspective of Routing How to get

More information

Group-Based Management of Distributed File Caches

Group-Based Management of Distributed File Caches Group-Based Management of Distributed File Caches Darrell D. E. Long Ahmed Amer Storage Systems Research Center Jack Baskin School of Engineering University of California, Santa Cruz Randal Burns Hopkins

More information

Adaptive Caching Algorithms with Optimality Guarantees for NDN Networks. Stratis Ioannidis and Edmund Yeh

Adaptive Caching Algorithms with Optimality Guarantees for NDN Networks. Stratis Ioannidis and Edmund Yeh Adaptive Caching Algorithms with Optimality Guarantees for NDN Networks Stratis Ioannidis and Edmund Yeh A Caching Network Nodes in the network store content items (e.g., files, file chunks) 1 A Caching

More information

ccnsim user manual September 10, 2013

ccnsim user manual September 10, 2013 ccnsim user manual September 10, 2013 ii Contents 1 ccnsim overview 1 1.1 What is ccnsim?........................... 1 1.2 ccnsim and Oment++........................ 1 1.3 Overall structure of ccnsim.....................

More information

Joint Cache Resource Allocation and Request Routing for In-network Caching Services

Joint Cache Resource Allocation and Request Routing for In-network Caching Services Joint Cache Resource Allocation and Request Routing for In-network Caching Services arxiv:171.11376v2 [cs.ni] 11 Dec 217 Weibo Chu, Mostafa Dehghan, John C.S. Lui, Don Towsley, Zhi-Li Zhang Northwestern

More information

Inferring Military Activity in Hybrid Networks through Cache Behavior

Inferring Military Activity in Hybrid Networks through Cache Behavior Inferring Military Activity in Hybrid Networks through Cache Behavior Mostafa Dehghan, Dennis L. Goeckel, Ting He, and Don Towsley School of Computer Science, University of Massachusetts Amherst, Emails:

More information

Publisher Mobility Support in Content Centric Networks

Publisher Mobility Support in Content Centric Networks ICOIN 2014@Phuket Publisher Mobility Support in Content Centric Networks Dookyoon Han, Munyoung Lee, Kideok Cho, Ted Taekyoung Kwon, and Yanghee Choi (mylee@mmlab.snu.ac.kr) Seoul National University 2014.02.11

More information

Models. Motivation Timing Diagrams Metrics Evaluation Techniques. TOC Models

Models. Motivation Timing Diagrams Metrics Evaluation Techniques. TOC Models Models Motivation Timing Diagrams Metrics Evaluation Techniques TOC Models Motivation Understanding Network Behavior Improving Protocols Verifying Correctness of Implementation Detecting Faults Choosing

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information

Performance Evaluation of CCN

Performance Evaluation of CCN Performance Evaluation of CCN September 13, 2012 Donghyun Jang, Munyoung Lee, Eunsang Cho, Ted Taekyoung Kwon (Seoul National University), Byoung-Joon Lee, Myeong-Wuk Jang, Sang-Jun Moon (Samsung Electronics),

More information

Impact of Frequency-Based Cache Management Policies on the Performance of Segment Based Video Caching Proxies

Impact of Frequency-Based Cache Management Policies on the Performance of Segment Based Video Caching Proxies Impact of Frequency-Based Cache Management Policies on the Performance of Segment Based Video Caching Proxies Anna Satsiou and Michael Paterakis Laboratory of Information and Computer Networks Department

More information

Efficient analysis of caching strategies under dynamic content popularity

Efficient analysis of caching strategies under dynamic content popularity Efficient analysis of caching strategies under dynamic content popularity Michele Garetto, Emilio Leonardi, Stefano Traverso ( ) Dipartimento di Elettronica, Politecnico di Torino, Torino, Italy Dipartimento

More information

Web Caching and Content Delivery

Web Caching and Content Delivery Web Caching and Content Delivery Caching for a Better Web Performance is a major concern in the Web Proxy caching is the most widely used method to improve Web performance Duplicate requests to the same

More information

STLAC: A Spatial and Temporal Locality-Aware Cache and Networkon-Chip

STLAC: A Spatial and Temporal Locality-Aware Cache and Networkon-Chip STLAC: A Spatial and Temporal Locality-Aware Cache and Networkon-Chip Codesign for Tiled Manycore Systems Mingyu Wang and Zhaolin Li Institute of Microelectronics, Tsinghua University, Beijing 100084,

More information

Memory Hierarchy. Slides contents from:

Memory Hierarchy. Slides contents from: Memory Hierarchy Slides contents from: Hennessy & Patterson, 5ed Appendix B and Chapter 2 David Wentzlaff, ELE 475 Computer Architecture MJT, High Performance Computing, NPTEL Memory Performance Gap Memory

More information

The Strategy of Batch Using Dynamic Cache for Streaming Media

The Strategy of Batch Using Dynamic Cache for Streaming Media The Strategy of Batch Using Dynamic Cache for Streaming Media Zhiwen Xu, Xiaoxin Guo, Yunjie Pang, and Zhengxuan Wang Faculty of Computer Science and Technology, Jilin University, Changchun City, 130012,

More information

The Transmitted Strategy of Proxy Cache Based on Segmented Video

The Transmitted Strategy of Proxy Cache Based on Segmented Video The Transmitted Strategy of Proxy Cache Based on Segmented Video Zhiwen Xu, Xiaoxin Guo, Yunjie Pang, Zhengxuan Wang Faculty of Computer Science and Technology, Jilin University, Changchun City, 130012,

More information

CCNinfo: Discovering Content and Netw ork Information in Content-Centric Netwo rks

CCNinfo: Discovering Content and Netw ork Information in Content-Centric Netwo rks CCNinfo: Discovering Content and Netw ork Information in Content-Centric Netwo rks draft-irtf-icnrg-ccninfo-00 Hitoshi Asaeda (NICT) Xun Shao (KIT) 1 History Initial proposal: Contrace Contrace: Traceroute

More information

Combining D2D and content caching for mobile network offload

Combining D2D and content caching for mobile network offload Combining and content caching for mobile network offload Salah Eddine Elayoubi Orange Labs & IRT SystemX Joint work with Antonia Masucci and Berna Sayrac 07/09/2015 Key 5G technologies Ultra-dense networks

More information

Midterm Exam October 15, 2012 CS162 Operating Systems

Midterm Exam October 15, 2012 CS162 Operating Systems CS 62 Fall 202 Midterm Exam October 5, 202 University of California, Berkeley College of Engineering Computer Science Division EECS Fall 202 Ion Stoica Midterm Exam October 5, 202 CS62 Operating Systems

More information

Optimizing Grouped Aggregation in Geo- Distributed Streaming Analytics

Optimizing Grouped Aggregation in Geo- Distributed Streaming Analytics Optimizing Grouped Aggregation in Geo- Distributed Streaming Analytics Benjamin Heintz, Abhishek Chandra University of Minnesota Ramesh K. Sitaraman UMass Amherst & Akamai Technologies Wide- Area Streaming

More information

Dynamic TTL Assignment in Caching Meta Algorithms. and Study of the Effects on Caching. Named Data Networks

Dynamic TTL Assignment in Caching Meta Algorithms. and Study of the Effects on Caching. Named Data Networks Dynamic TTL Assignment in Caching Meta Algorithms and Study of the Effects on Caching In Named Data Networks A Thesis Presented to the Faculty of the Department of Engineering Technology University of

More information

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/220850337 On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement

More information

NetFlow Multiple Export Destinations

NetFlow Multiple Export Destinations Feature History Release 12.0(19)S 12.0(19)ST 12.2(2)T 12.2(14)S Modification This feature was introduced on the Cisco 12000 Internet router. This feature was integrated into Cisco IOS Release 12.0(19)ST.

More information

Sporadic Server Scheduling in Linux Theory vs. Practice. Mark Stanovich Theodore Baker Andy Wang

Sporadic Server Scheduling in Linux Theory vs. Practice. Mark Stanovich Theodore Baker Andy Wang Sporadic Server Scheduling in Linux Theory vs. Practice Mark Stanovich Theodore Baker Andy Wang Real-Time Scheduling Theory Analysis techniques to design a system to meet timing constraints Schedulability

More information

Named Data Networking Enabled WiFi in Challenged Communication Environments

Named Data Networking Enabled WiFi in Challenged Communication Environments Named Data Networking Enabled WiFi in Challenged Communication Environments 1 Anthony Guardado, 1 Zilong Ye, 1 Huiping Guo 2 Lei Liu, 2 Liguang Xie, 2 Akira Ito 1 California State University, Los Angeles

More information

DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing

DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing Husnu Saner Narman Md. Shohrab Hossain Mohammed Atiquzzaman School of Computer Science University of Oklahoma,

More information

Network layer overview

Network layer overview Network layer overview understand principles behind layer services: layer service models forwarding versus rou:ng how a router works rou:ng (path selec:on) broadcast, mul:cast instan:a:on, implementa:on

More information

CLUSTER BASED IN NETWORKING CACHING FOR CONTENT CENTRIC NETWORKING

CLUSTER BASED IN NETWORKING CACHING FOR CONTENT CENTRIC NETWORKING CLUSTER BASED IN NETWORKING CACHING FOR CONTENT CENTRIC NETWORKING S.Poornima, M.Phil Research Scholar, Department of Computer Sciences and Applications, Vivekanandha College Of Arts And Sciences For Women(Autonomous),

More information

Multimedia Streaming. Mike Zink

Multimedia Streaming. Mike Zink Multimedia Streaming Mike Zink Technical Challenges Servers (and proxy caches) storage continuous media streams, e.g.: 4000 movies * 90 minutes * 10 Mbps (DVD) = 27.0 TB 15 Mbps = 40.5 TB 36 Mbps (BluRay)=

More information

ECE7995 Caching and Prefetching Techniques in Computer Systems. Lecture 8: Buffer Cache in Main Memory (I)

ECE7995 Caching and Prefetching Techniques in Computer Systems. Lecture 8: Buffer Cache in Main Memory (I) ECE7995 Caching and Prefetching Techniques in Computer Systems Lecture 8: Buffer Cache in Main Memory (I) 1 Review: The Memory Hierarchy Take advantage of the principle of locality to present the user

More information

Content-Centric Networking Using Anonymous Datagrams

Content-Centric Networking Using Anonymous Datagrams Content-Centric Networking Using Anonymous Datagrams J.J. Garcia-Luna-Aceves 1,2 and Maziar Mirzazad Barijough 2 1 Palo Alto Research Center, Palo Alto, CA 94304 2 Department of Computer Engineering, University

More information

CIT 668: System Architecture. Caching

CIT 668: System Architecture. Caching CIT 668: System Architecture Caching Topics 1. Cache Types 2. Web Caching 3. Replacement Algorithms 4. Distributed Caches 5. memcached A cache is a system component that stores data so that future requests

More information

LRC: Dependency-Aware Cache Management for Data Analytics Clusters. Yinghao Yu, Wei Wang, Jun Zhang, and Khaled B. Letaief IEEE INFOCOM 2017

LRC: Dependency-Aware Cache Management for Data Analytics Clusters. Yinghao Yu, Wei Wang, Jun Zhang, and Khaled B. Letaief IEEE INFOCOM 2017 LRC: Dependency-Aware Cache Management for Data Analytics Clusters Yinghao Yu, Wei Wang, Jun Zhang, and Khaled B. Letaief IEEE INFOCOM 2017 Outline Cache Management for Data Analytics Clusters Inefficiency

More information

Cache Less for More in Information- Centric Networks W. K. Chai, D. He, I. Psaras and G. Pavlou (presenter)

Cache Less for More in Information- Centric Networks W. K. Chai, D. He, I. Psaras and G. Pavlou (presenter) Cache Less for More in Information- Centric Networks W. K. Chai, D. He, I. Psaras and G. Pavlou (presenter) Department of Electronic & Electrical Engineering University College London London WC1E 6EA United

More information

Advanced Caching Techniques (2) Department of Electrical Engineering Stanford University

Advanced Caching Techniques (2) Department of Electrical Engineering Stanford University Lecture 4: Advanced Caching Techniques (2) Department of Electrical Engineering Stanford University http://eeclass.stanford.edu/ee282 Lecture 4-1 Announcements HW1 is out (handout and online) Due on 10/15

More information

Performance Modeling

Performance Modeling Performance Modeling EECS 489 Computer Networks http://www.eecs.umich.edu/~zmao/eecs489 Z. Morley Mao Tuesday Sept 14, 2004 Acknowledgement: Some slides taken from Kurose&Ross and Katz&Stoica 1 Administrivia

More information

6 th Lecture :: The Cache - Part Three

6 th Lecture :: The Cache - Part Three Dr. Michael Manzke :: CS7031 :: 6 th Lecture :: The Cache - Part Three :: October 20, 2010 p. 1/17 [CS7031] Graphics and Console Hardware and Real-time Rendering 6 th Lecture :: The Cache - Part Three

More information

CISC 7310X. C08: Virtual Memory. Hui Chen Department of Computer & Information Science CUNY Brooklyn College. 3/22/2018 CUNY Brooklyn College

CISC 7310X. C08: Virtual Memory. Hui Chen Department of Computer & Information Science CUNY Brooklyn College. 3/22/2018 CUNY Brooklyn College CISC 7310X C08: Virtual Memory Hui Chen Department of Computer & Information Science CUNY Brooklyn College 3/22/2018 CUNY Brooklyn College 1 Outline Concepts of virtual address space, paging, virtual page,

More information

Q3: Block Replacement. Replacement Algorithms. ECE473 Computer Architecture and Organization. Memory Hierarchy: Set Associative Cache

Q3: Block Replacement. Replacement Algorithms. ECE473 Computer Architecture and Organization. Memory Hierarchy: Set Associative Cache Fundamental Questions Computer Architecture and Organization Hierarchy: Set Associative Q: Where can a block be placed in the upper level? (Block placement) Q: How is a block found if it is in the upper

More information

Week 7: Traffic Models and QoS

Week 7: Traffic Models and QoS Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,

More information

C13b: Routing Problem and Algorithms

C13b: Routing Problem and Algorithms CISC 7332X T6 C13b: Routing Problem and Algorithms Hui Chen Department of Computer & Information Science CUNY Brooklyn College 11/20/2018 CUNY Brooklyn College 1 Acknowledgements Some pictures used in

More information

Stateless ICN Forwarding with P4 towards Netronome NFP-based Implementation

Stateless ICN Forwarding with P4 towards Netronome NFP-based Implementation Stateless ICN Forwarding with P4 towards Netronome NFP-based Implementation Aytac Azgin, Ravishankar Ravindran, Guo-Qiang Wang aytac.azgin, ravi.ravindran, gq.wang@huawei.com Huawei Research Center, Santa

More information

Course Outline. Processes CPU Scheduling Synchronization & Deadlock Memory Management File Systems & I/O Distributed Systems

Course Outline. Processes CPU Scheduling Synchronization & Deadlock Memory Management File Systems & I/O Distributed Systems Course Outline Processes CPU Scheduling Synchronization & Deadlock Memory Management File Systems & I/O Distributed Systems 1 Today: Memory Management Terminology Uniprogramming Multiprogramming Contiguous

More information

Computer System Overview

Computer System Overview Computer System Overview Chapter 1 Muhammad Adri, MT 1 Operating System Exploits the hardware resources of one or more processors Provides a set of services to system users Manages secondary memory and

More information

Management of scalable video streaming in information centric networking

Management of scalable video streaming in information centric networking Multimed Tools Appl (2017) 76:21519 21546 DOI 10.1007/s11042-016-4008-8 Management of scalable video streaming in information centric networking Saeed Ullah 1 Kyi Thar 1 Choong Seon Hong 1 Received: 25

More information

INF5071 Performance in distributed systems Distribution Part II

INF5071 Performance in distributed systems Distribution Part II INF5071 Performance in distributed systems Distribution Part II 5 November 2010 Type IV Distribution Systems Combine Types I, II or III Network of servers Server hierarchy Autonomous servers Cooperative

More information

A Novel Scheduling and Queue Management Scheme for Multi-band Mobile Routers

A Novel Scheduling and Queue Management Scheme for Multi-band Mobile Routers A Novel Scheduling and Queue Management Scheme for Multi-band Mobile Routers Mohammed Atiquzzaman Md. Shohrab Hossain Husnu Saner Narman Telecommunications and Networking Research Lab The University of

More information

Why memory hierarchy? Memory hierarchy. Memory hierarchy goals. CS2410: Computer Architecture. L1 cache design. Sangyeun Cho

Why memory hierarchy? Memory hierarchy. Memory hierarchy goals. CS2410: Computer Architecture. L1 cache design. Sangyeun Cho Why memory hierarchy? L1 cache design Sangyeun Cho Computer Science Department Memory hierarchy Memory hierarchy goals Smaller Faster More expensive per byte CPU Regs L1 cache L2 cache SRAM SRAM To provide

More information

Analyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking

Analyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking Analyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking Claudio Imbrenda Luca Muscariello Orange Labs Dario Rossi Telecom ParisTech Outline Motivation

More information

A Statistical Model of Skewed-Associativity. Pierre Michaud March 2003

A Statistical Model of Skewed-Associativity. Pierre Michaud March 2003 A Statistical Model of Skewed-Associativity Pierre Michaud March 23 It s about microarchitected caches Type of cache Type of object Data/instructions cache Translation buffer Data/instructions block Page

More information

Introduction to Information Centric Networking

Introduction to Information Centric Networking Introduction to Information Centric Networking... with a Dash of Security Claudio Marxer Computer Networks Group University of Basel Switzerland Open Source IoT & Blockchain

More information

Midterm II December 4 th, 2006 CS162: Operating Systems and Systems Programming

Midterm II December 4 th, 2006 CS162: Operating Systems and Systems Programming Fall 2006 University of California, Berkeley College of Engineering Computer Science Division EECS John Kubiatowicz Midterm II December 4 th, 2006 CS162: Operating Systems and Systems Programming Your

More information

HW3 and Quiz. P14, P24, P26, P27, P28, P31, P37, P43, P46, P55, due at 3:00pm with both soft and hard copies, 11/11/2013 (Monday) TCP), 20 mins

HW3 and Quiz. P14, P24, P26, P27, P28, P31, P37, P43, P46, P55, due at 3:00pm with both soft and hard copies, 11/11/2013 (Monday) TCP), 20 mins HW3 and Quiz v HW3 (Chapter 3): R1, R2, R5, R6, R7, R8, R15, P14, P24, P26, P27, P28, P31, P37, P43, P46, P55, due at 3:00pm with both soft and hard copies, 11/11/2013 (Monday) v Quiz: 10/30/2013, Wednesday,

More information

ECSE 425 Lecture 21: More Cache Basics; Cache Performance

ECSE 425 Lecture 21: More Cache Basics; Cache Performance ECSE 425 Lecture 21: More Cache Basics; Cache Performance H&P Appendix C 2011 Gross, Hayward, Arbel, Vu, Meyer Textbook figures Last Time Two QuesRons Q1: Block placement Q2: Block idenrficaron ECSE 425,

More information

A Hybrid Methodology for the Performance Evaluation of Internet-scale Cache Networks

A Hybrid Methodology for the Performance Evaluation of Internet-scale Cache Networks A Hybrid Methodology for the Performance Evaluation of Internet-scale Cache Networks M. Tortelli a,, D. Rossi a, E. Leonardi b a Telecom ParisTech, Paris, France b Politecnico di Torino, Torino, Italy

More information

Online Caching. Jiazhong Nie directed by Prof. Manfred Warmuth SOE UC, Santa Cruz. May 16, jiazhong (UCSC) May 16, / 35

Online Caching. Jiazhong Nie directed by Prof. Manfred Warmuth SOE UC, Santa Cruz. May 16, jiazhong (UCSC) May 16, / 35 Online Caching Jiazhong Nie directed by Prof. Manfred Warmuth SOE UC, Santa Cruz May 16, 2012 jiazhong (UCSC) May 16, 2012 1 / 35 Table of Contents Motivation 1 Motivation 2 Caching Problem 3 Master Policies

More information

Footprint Descriptors: Theory and Practice of Cache Provisioning in a Global CDN

Footprint Descriptors: Theory and Practice of Cache Provisioning in a Global CDN Footprint Descriptors: Theory and Practice of Cache Provisioning in a Global CDN ABSTRACT Aditya Sundarrajan University of Massachusetts Amherst Mangesh Kasbekar Akamai Technologies Modern CDNs cache and

More information

arxiv: v1 [cs.ni] 24 Jun 2016

arxiv: v1 [cs.ni] 24 Jun 2016 Caching Strategies for Information Centric Networking: Opportunities and Challenges arxiv:1606.07630v1 [cs.ni] 24 Jun 2016 César Bernardini 1, Thomas Silverston 2, Athanasios Vasilakos 3 1 University of

More information

Cache and Forward Architecture

Cache and Forward Architecture Cache and Forward Architecture Shweta Jain Research Associate Motivation Conversation between computers connected by wires Wired Network Large content retrieval using wireless and mobile devices Wireless

More information

Different Layers Lecture 20

Different Layers Lecture 20 Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,

More information

LRU. Pseudo LRU A B C D E F G H A B C D E F G H H H C. Copyright 2012, Elsevier Inc. All rights reserved.

LRU. Pseudo LRU A B C D E F G H A B C D E F G H H H C. Copyright 2012, Elsevier Inc. All rights reserved. LRU A list to keep track of the order of access to every block in the set. The least recently used block is replaced (if needed). How many bits we need for that? 27 Pseudo LRU A B C D E F G H A B C D E

More information

LS Example 5 3 C 5 A 1 D

LS Example 5 3 C 5 A 1 D Lecture 10 LS Example 5 2 B 3 C 5 1 A 1 D 2 3 1 1 E 2 F G Itrn M B Path C Path D Path E Path F Path G Path 1 {A} 2 A-B 5 A-C 1 A-D Inf. Inf. 1 A-G 2 {A,D} 2 A-B 4 A-D-C 1 A-D 2 A-D-E Inf. 1 A-G 3 {A,D,G}

More information

Publisher Mobility Support in Content Centric Networks

Publisher Mobility Support in Content Centric Networks Publisher Mobility Support in Content Centric Networks Dookyoon Han, Munyoung Lee, Kideok Cho, Ted Taekyoung Kwon, and Yanghee Choi School of Computer Science and Engineering Seoul National University,

More information

Streaming Flow Analyses for Prefetching in Segment-based Proxy Caching to Improve Media Delivery Quality

Streaming Flow Analyses for Prefetching in Segment-based Proxy Caching to Improve Media Delivery Quality Streaming Flow Analyses for Prefetching in Segment-based Proxy Caching to Improve Media Delivery Quality Songqing Chen Bo Shen, Susie Wee Xiaodong Zhang Department of Computer Science Mobile and Media

More information

CHAPTER 4 OPTIMIZATION OF WEB CACHING PERFORMANCE BY CLUSTERING-BASED PRE-FETCHING TECHNIQUE USING MODIFIED ART1 (MART1)

CHAPTER 4 OPTIMIZATION OF WEB CACHING PERFORMANCE BY CLUSTERING-BASED PRE-FETCHING TECHNIQUE USING MODIFIED ART1 (MART1) 71 CHAPTER 4 OPTIMIZATION OF WEB CACHING PERFORMANCE BY CLUSTERING-BASED PRE-FETCHING TECHNIQUE USING MODIFIED ART1 (MART1) 4.1 INTRODUCTION One of the prime research objectives of this thesis is to optimize

More information

Performance and Scalability of Networks, Systems, and Services

Performance and Scalability of Networks, Systems, and Services Performance and Scalability of Networks, Systems, and Services Niklas Carlsson Linkoping University, Sweden Student presentation @LiU, Sweden, Oct. 10, 2012 Primary collaborators: Derek Eager (University

More information

Cost-based cache replacement and server selection for multimedia proxy across wireless Internet

Cost-based cache replacement and server selection for multimedia proxy across wireless Internet University of Massachusetts Amherst From the SelectedWorks of Lixin Gao January 1, 2004 Cost-based cache replacement and server selection for multimedia proxy across wireless Internet Q Zhang Z Xiang WW

More information

Portland State University ECE 587/687. Caches and Memory-Level Parallelism

Portland State University ECE 587/687. Caches and Memory-Level Parallelism Portland State University ECE 587/687 Caches and Memory-Level Parallelism Revisiting Processor Performance Program Execution Time = (CPU clock cycles + Memory stall cycles) x clock cycle time For each

More information

Overview. Problem: Find lowest cost path between two nodes Factors static: topology dynamic: load

Overview. Problem: Find lowest cost path between two nodes Factors static: topology dynamic: load Dynamic Routing Overview Forwarding vs Routing forwarding: to select an output port based on destination address and routing table routing: process by which routing table is built Network as a Graph C

More information

Module 17: "Interconnection Networks" Lecture 37: "Introduction to Routers" Interconnection Networks. Fundamentals. Latency and bandwidth

Module 17: Interconnection Networks Lecture 37: Introduction to Routers Interconnection Networks. Fundamentals. Latency and bandwidth Interconnection Networks Fundamentals Latency and bandwidth Router architecture Coherence protocol and routing [From Chapter 10 of Culler, Singh, Gupta] file:///e /parallel_com_arch/lecture37/37_1.htm[6/13/2012

More information

Chapter 09: Caches. Lesson 04: Replacement policy

Chapter 09: Caches. Lesson 04: Replacement policy Chapter 09: Caches Lesson 04: Replacement policy 1 Objective Understand the replacement Policy Comparisons between write back and write through caches 2 Replacement policy 3 Replacement after eviction

More information

Threshold-Based Multicast for Continuous Media Delivery y

Threshold-Based Multicast for Continuous Media Delivery y Threshold-Based Multicast for Continuous Media Delivery y Lixin Gao? Department of Electrical and Computer Engineering University of Massachusetts Amherst, Mass. 01003, USA lgao@ecs.umass.edu Don Towsley

More information

Performance Characterization of a Commercial Video Streaming Service. Mojgan Ghasemi, Akamai Technologies - Princeton University

Performance Characterization of a Commercial Video Streaming Service. Mojgan Ghasemi, Akamai Technologies - Princeton University Performance Characterization of a Commercial Video Streaming Service Mojgan Ghasemi, Akamai Technologies - Princeton University MGhasemi,PKanuparthy,AMansy,TBenson,andJRexford ACM IMC 2016 1 2 First study

More information

BGP. Daniel Zappala. CS 460 Computer Networking Brigham Young University

BGP. Daniel Zappala. CS 460 Computer Networking Brigham Young University Daniel Zappala CS 460 Computer Networking Brigham Young University 2/20 Scaling Routing for the Internet scale 200 million destinations - can t store all destinations or all prefixes in routing tables

More information

Announcements. ! Previous lecture. Caches. Inf3 Computer Architecture

Announcements. ! Previous lecture. Caches. Inf3 Computer Architecture Announcements! Previous lecture Caches Inf3 Computer Architecture - 2016-2017 1 Recap: Memory Hierarchy Issues! Block size: smallest unit that is managed at each level E.g., 64B for cache lines, 4KB for

More information

Proposal for Standardization of Green Information Centric Networking Based Communication Utilizing Proactive Caching in Intelligent Transport System

Proposal for Standardization of Green Information Centric Networking Based Communication Utilizing Proactive Caching in Intelligent Transport System Proposal for Standardization of Green Information Centric Networking Based Communication Utilizing Proactive Caching in Intelligent Transport System Quang N. Nguyen 1, M. Arifuzzaman 2,, D. Zhang 1,, K.

More information

Lecture 5: Performance Analysis I

Lecture 5: Performance Analysis I CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview

More information

Introduction to cache memories

Introduction to cache memories Course on: Advanced Computer Architectures Introduction to cache memories Prof. Cristina Silvano Politecnico di Milano email: cristina.silvano@polimi.it 1 Summary Summary Main goal Spatial and temporal

More information