Experiences with CoralCDN
|
|
- Evelyn Chad Turner
- 6 years ago
- Views:
Transcription
1 Experiences with A Five Year Opera:onal View Michael J. Freedman Princeton University
2 A Coopera:ve, Self Organizing CDN HTTP Proxy DNS Server Coral index node Resolver 1 HTTP Proxy DNS Server Coral index node 3 6 Client 2 HTTP Proxy 5 HTTP Proxy 4 Coral index node DNS Server Coral index node Goal: To make desired content widely available regardless of publisher s own resources, by organizing and u:lizing any coopera:ve resources
3 hpp://example.com/path hpp://example.com.nyud.net/path
4 Adopted by: Clients Servers Third par:es
5 Many of you have used
6 Many of you have used
7 Many of you have used
8 Many of you have used
9 Many of you have used
10 Many of you have used
11 Requests per Day (Millions) From Clients To Upstream Proxy/Origin Jan 05 Jan 06 Jan 07 Jan 08 Jan 09 Jan 10 Daily Request Volume 2M clients 2 TB content 20K origin domains From PlanetLab servers
12 HTTP Proxy DNS Server Coral index node HTTP Proxy DNS Server Coral index node HTTP Proxy DNS Server Coral index node HTTP Proxy Coral index node Based on peer to peer DHT 1. Weakened consistency + algorithms that prevent tree satura:on during lookup 2. Decentralized clustering for locality and hierarchical lookup 3. Coopera:ve HTTP / DNS that leverages locality
13 HTTP Proxy DNS Server Coral index node HTTP Proxy DNS Server Coral index node HTTP Proxy DNS Server Coral index node HTTP Proxy Coral index node Based on peer to peer DHT 1. Weakened consistency + algorithms that prevent tree satura:on during lookup 2. Decentralized clustering for locality and hierarchical lookup 3. Coopera:ve HTTP / DNS that leverages locality
14 CoralCDN HTTP Proxy CoralCDN DNS Server CoralCDN HTTP Proxy Coral index node CoralCDN CoralCDN HTTP Proxy CoralCDN DNS Server Coral index node CoralCDN DNS Server Coral index node CoralCDN HTTP Proxy Coral index node Interac:ons with the External Environment Clients Virtualiza:on Layer Origin Domains
15 1. Experiences Naming Fault Tolerance Resource management 2. Revisit CoralCDN s design
16 Naming x Flexible, open API Mismatch with domain based access control policies
17 CoralCDN s Plaaorm as a Service API Rewrite rules in origin webservers RewriteEngine on RewriteCond %{HTTP_USER_AGENT}!^CoralWebPrx RewriteCond %{QUERY_STRING}!(^ &)coral-no-serve$ RewriteRule ^(.*)$ {REQUEST_URI} [R,L]
18 CoralCDN s Plaaorm as a Service API Rewrite rules in origin webservers RewriteEngine on RewriteCond %{HTTP_USER_AGENT}!^CoralWebPrx RewriteCond %{QUERY_STRING}!(^ &)coral-no-serve$ RewriteCond %{HTTP_REFERER} slashdot\.org [NC] RewriteCond %{HTTP_REFERER} digg\.com [NC,OR] RewriteCond %{HTTP_REFERER} blogspot\.com [NC,OR] RewriteRule ^(.*)$ {REQUEST_URI} [R,L] Sites integrate with load/bandwidth monitoring Elas:c Provisioning
19 Naming Confla:on hpp://domain /path.service1.service2 x x 1. Loca:on to retrieve content 2. Human readable name for administra:ve en:ty 3. Security policies to govern objects interac:ons
20 Domain based Security Policies evil.com Web Page Cookies target.com Document Object Model
21 Domain based Security Policies Web Page evil.com.nyud.net Cookies target.com.nyud.net Document Object Model Defaults violate least privilege
22 Fault Tolerance: Failure Decoupling x Internal failures: DHT nodes DNS servers, HTTP proxies Management service External failures: Decouple IPs from hosts Interac:ons with origin sites
23 happens! Origin Status 1. Unresponsive 2. Returns error code 3. Reply truncated ReacAon Cache nega:ve results Serve stale content Use whole file overwrites
24 happens! Origin Status 1. Unresponsive 2. Returns error code 3. Reply truncated ReacAon Cache nega:ve results Serve stale content Use whole file overwrites Maintain status quo unless improvements are possible
25 What is failure? Return values should have fail safe defaults
26 Resource Management x Control over bandwidth consump:on Control and visibility into environment s resources
27 Mar 2004 released on PlanetLab Some :meline
28 Some :meline Mar 2004 released on PlanetLab Aug 2004 SlashdoPed
29 Some :meline Mar 2004 released on PlanetLab Aug 2004 SlashdoPed Dec 2004 Asian Tsunami 1. PlanetLab traffic jumps 2. Site threatens to yank PL 3. PL admin kills slice 4. Slice restored next day 5. Ini:ates discussion of resource limits for slices
30 Demand >> Supply: Enter Fair Sharing Algorithms Avg MB per hour (d i )? Σ i d i S Domains with heaviest consump:on
31 Demand >> Supply: Enter Fair Sharing Algorithms Avg MB per hour (d i ) λ find max λ, s.t. Σ i min (λ, d i ) S Domains with heaviest consump:on
32 Demand >> Supply: Enter Fair Sharing Algorithms find max λ, s.t. λ Σ i min (λ, d i ) S Domains with heaviest consump:on
33 Admission Control under Fair Sharing ~10 kb imgs 3.3% rejected ~5 MB videos 89% rejected Requests per Domain 1e All Responses Forbidden Responses Unique Domains Ordered by Decreasing Popularity Demand > 10 TB Supply 2 TB
34 Some :meline Mar 2004 released on PlanetLab Aug 2004 SlashdoPed Dec 2004 Asian Tsunami Mar 2006 PL deploys bandwidth thropling 1. PlanetLab traffic jumps 2. Site threatens to yank PL 3. PL admin kills slice 4. Slice restored next day 5. Ini:ates discussion of resource limits for slices
35 Resource Management: Us vs. Them ApplicaAon Hammer Track HTTP traffic If site > fair share rate, reject via HTTP 403 If total > peak rate, close server socket PlaEorm Hammer Track all network traffic If total > 80% daily rate, BW shaping in kernel
36 Resource Management: Us vs. Them ApplicaAon Hammer Track HTTP traffic If site > fair share rate, reject via HTTP 403 If total > peak rate, close server socket PlaEorm Hammer Track all network traffic If total > 80% daily rate, BW shaping in kernel Result: HTTP traffic is 1/2 2/3 of all traffic Lower layers should expose greater visibility and control over resources
37 1. Experiences Naming Fault Tolerance Resource management 2. Revisit CoralCDN s design
38 Usage Scenarios 1. Resurrec:ng old content 2. Accessing unpopular content Requests per URL 1e Aug Aug Aug e+06 Unique URLs by Popularity
39 Usage Scenarios 1. Resurrec:ng old content 2. Accessing unpopular content 3. Serving long term popular content Requests per URL 1e Aug Aug Aug e+06 Unique URLs by Popularity
40 Usage Scenarios 1. Resurrec:ng old content 2. Accessing unpopular content 3. Serving long term popular content Requests per URL 1e Aug Aug Aug e+07 1e e+06 1 Unique 2 URLs 3 by Popularity Time (Days) Requests per domain
41 Usage Scenarios 1. Resurrec:ng old content 2. Accessing unpopular content 3. Serving long term popular content Top URLs % Reqs Agg Size (MB) 0.01 % 49.1 % % 71.8 % % 84.8 % % 92.2 % Result Frequency Local Cache 70.4 % Origin Site 9.9 % Proxy 7.1 % 4xx/5xx Error 12.6 %
42 Usage Scenarios 1. Resurrec:ng old content 2. Accessing unpopular content 3. Serving long term popular content 4. Surviving flash crowds to content 600 moonbuggy.org redditmirror.cc moonbuggy reddit Requests per minute Time (Hours)
43 Usage Scenarios 1. Resurrec:ng old content 2. Accessing unpopular content 3. Serving long term popular content 4. Surviving flash crowds to content 600 moonbuggy.org redditmirror.cc moonbuggy reddit Requests per minute Time (Hours)
44 Usage Scenarios 1. Resurrec:ng old content 2. Accessing unpopular content 3. Serving long term popular content 4. Surviving flash crowds to content 5 second epochs 10 minute epochs 24% epochs 1 domain with 10x incr 99.93% epochs 1 domain with 10x incr 0.006% epochs 1 domain with 100x incr 28% epochs 1 domain with 100x incr 0 % epochs 1 domain with 1000x incr 0.21% epochs 1 domain with 1000x incr
45 Conclusions? Most requested content is long term popular and already cached locally Flash crowds occur, but on order of minutes
46 Conclusions? Most requested content is long term popular and already cached locally Flash crowds occur, but on order of minutes Focus on long term popular LiPle / no HTTP coopera:on Global discovery (e.g., DNS) Focus on flash crowds Regional coop. as default Global coop. as failover
47 Reconfiguring CoralCDN s design Leverage Coral hierarchy for lookup Latency 90% Origin Load 5% Failover to global 0.5%
48 Reconfiguring CoralCDN s design Leverage Coral hierarchy for lookup During admission control, bias against long term use λ Σ i min (λ, d i ) < S heavily weight history in ewma
49 Conclusions 1. Experiences Naming Fault Tolerance Resource management 2. Revisit CoralCDN s design Current design unnecessary for deployment / most use Easy changes to promote flash crowd mi:ga:on
50 Can we reach Internet scale? Ini:al beta release of browser based P2P web cache
CONTENT DISTRIBUTION. Oliver Michel University of Illinois at Urbana-Champaign. October 25th, 2011
CONTENT DISTRIBUTION Oliver Michel University of Illinois at Urbana-Champaign October 25th, 2011 OVERVIEW 1. Why use advanced techniques for content distribution on the internet? 2. CoralCDN 3. Identifying
More informationDemocratizing Content Publication with Coral
Democratizing Content Publication with Mike Freedman Eric Freudenthal David Mazières New York University NSDI 2004 A problem Feb 3: Google linked banner to julia fractals Users clicking directed to Australian
More informationDemocratizing Content Publication with Coral
Democratizing Content Publication with Mike Freedman Eric Freudenthal David Mazières New York University www.scs.cs.nyu.edu/coral A problem Feb 3: Google linked banner to julia fractals Users clicking
More informationVenugopal Ramasubramanian Emin Gün Sirer SIGCOMM 04
The Design and Implementation of a Next Generation Name Service for the Internet Venugopal Ramasubramanian Emin Gün Sirer SIGCOMM 04 Presenter: Saurabh Kadekodi Agenda DNS overview Current DNS Problems
More informationThe Application Layer HTTP and FTP
The Application Layer HTTP and FTP File Transfer Protocol (FTP) Allows a user to copy files to/from remote hosts Client program connects to FTP server provides a login id and password allows the user to
More informationDocument Sub Title. Yotpo. Technical Overview 07/18/ Yotpo
Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time
More informationCSE 124: Networked Services Lecture-17
Fall 2010 CSE 124: Networked Services Lecture-17 Instructor: B. S. Manoj, Ph.D http://cseweb.ucsd.edu/classes/fa10/cse124 11/30/2010 CSE 124 Networked Services Fall 2010 1 Updates PlanetLab experiments
More informationContent Distribution. Today. l Challenges of content delivery l Content distribution networks l CDN through an example
Content Distribution Today l Challenges of content delivery l Content distribution networks l CDN through an example Trends and application need " Some clear trends Growing number of and faster networks
More informationMultimedia Streaming. Mike Zink
Multimedia Streaming Mike Zink Technical Challenges Servers (and proxy caches) storage continuous media streams, e.g.: 4000 movies * 90 minutes * 10 Mbps (DVD) = 27.0 TB 15 Mbps = 40.5 TB 36 Mbps (BluRay)=
More informationThe Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla
The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Venugopalan Ramasubramanian Emin Gün Sirer Presented By: Kamalakar Kambhatla * Slides adapted from the paper -
More informationTHE FLEXIBLE DATA-STRUCTURE SERVER THAT COULD.
REDIS THE FLEXIBLE DATA-STRUCTURE SERVER THAT COULD. @_chriswhitten_ REDIS REDIS April 10, 2009; 6 years old Founding Author: Salvatore Sanfilippo Stable release: 3.0.3 / June 4, 2015; 3 months ago Fundamental
More informationYahoo Traffic Server -a Powerful Cloud Gatekeeper
Yahoo Traffic Server -a Powerful Cloud Gatekeeper Shih-Yong Wang Yahoo! Taiwan 2010 COSCUP Aug 15, 2010 What is Proxy Caching? Proxy Caching explicit client configuration transparent emulate responses
More informationFrom Internet Data Centers to Data Centers in the Cloud
From Internet Data Centers to Data Centers in the Cloud This case study is a short extract from a keynote address given to the Doctoral Symposium at Middleware 2009 by Lucy Cherkasova of HP Research Labs
More informationFlexible, Wide-Area Storage for Distributed Systems Using Semantic Cues
Flexible, Wide-Area Storage for Distributed Systems Using Semantic Cues Jeremy Stribling Thesis Defense, August 6, 2009 Including material previously published in: Flexible, Wide-Area Storage for Distributed
More informationSquirrel case-study. Decentralized peer-to-peer web cache. Traditional centralized web cache. Based on the Pastry peer-to-peer middleware system
Decentralized peer-to-peer web cache Based on the Pastry peer-to-peer middleware system Traditional centralized web cache 1 2 Decentralized caching of web pages use the resources of peers (web browsers/clients)
More informationSubway : Peer-To-Peer Clustering of Clients for Web Proxy
Subway : Peer-To-Peer Clustering of Clients for Web Proxy Kyungbaek Kim and Daeyeon Park Department of Electrical Engineering & Computer Science, Division of Electrical Engineering, Korea Advanced Institute
More informationMINIATURE WORLD: MEASURING AND REPLICATING REAL-WORLD BLOCKCHAIN DEPLOYMENTS
MINIATURE WORLD: MEASURING AND REPLICATING REAL-WORLD BLOCKCHAIN DEPLOYMENTS Adem Efe Gencer with Ittay Eyal, Emin Gün Sirer, and Robbert van Renesse Jan 26 th, 2016 Initiative for CryptoCurrencies and
More informationConfiguring Caching Services
CHAPTER 8 This chapter describes how to configure conventional caching services (HTTP, FTP [FTP-over-HTTP caching and native FTP caching], HTTPS, and DNS caching) for centrally managed Content Engines.
More informationInternet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016
Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at
More informationInstallation and Deployment
This section includes troubleshooting topics about installation and deployment issues. Use of Forward Proxies in Your System, page 1 Use of Reverse Proxies in Your System, page 2 Auto-Deployment Fails
More informationInternet Technology 3/2/2016
Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology
More informationSpotify Behind the Scenes
A Eulogy to P2P (?) Spotify gkreitz@spotify.com KTH, May 7 2014 What is Spotify? Lightweight on-demand streaming Large catalogue, over 20 million tracks 1 Available in 28 countries. Over 24 million active
More informationRead the following information carefully, before you begin an upgrade.
Read the following information carefully, before you begin an upgrade. Review Supported Upgrade Paths, page 1 Review Time Taken for Upgrade, page 1 Review Available Cisco APIC-EM Ports, page 2 Securing
More informationCSE 5306 Distributed Systems. Naming
CSE 5306 Distributed Systems Naming 1 Naming Names play a critical role in all computer systems To access resources, uniquely identify entities, or refer to locations To access an entity, you have resolve
More informationDistributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018
Distributed Systems 21. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2018 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance
More informationCS November 2018
Distributed Systems 21. Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2018 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance
More informationScaling Internet TV Content Delivery ALEX GUTARIN DIRECTOR OF ENGINEERING, NETFLIX
Scaling Internet TV Content Delivery ALEX GUTARIN DIRECTOR OF ENGINEERING, NETFLIX Inventing Internet TV Available in more than 190 countries 104+ million subscribers Lots of Streaming == Lots of Traffic
More informationHandling Flash Crowds from your Garage
Handling Flash Crowds from your Garage Jeremy Elson, Jon Howell Microsoft Research presented by: Vrije Universiteit Amsterdam March 2, 2012 Overview Flash crowds Building blocks of a scalable system Scaling
More informationCCDP-ARCH. Section 11. Content Networking
CCDP-ARCH Section 11 As a designer, content networking technologies allows you to intelligently distribute content throughout the network, thereby reducing WAN bandwidth requirements. For example, a user
More informationWeb as a Distributed System
Web as a Distributed System The World Wide Web is a large distributed system. In 1998 comprises 70-75% of Internet traffic. With large transfers of streaming media and p2p, no longer a majority of bytes,
More informationautomating server selection with OASIS
MICHAEL J. FREEDMAN automating server selection with OASIS Michael J. Freedman is a doctoral student at NYU, currently visiting Stanford University, and received his M.Eng. and S.B. degrees from MIT. His
More informationDistributed Systems Final Exam
15-440 Distributed Systems Final Exam Name: Andrew: ID December 12, 2011 Please write your name and Andrew ID above before starting this exam. This exam has 14 pages, including this title page. Please
More informationCS155b: E-Commerce. Lecture 3: Jan 16, How Does the Internet Work? Acknowledgements: S. Bradner and R. Wang
CS155b: E-Commerce Lecture 3: Jan 16, 2001 How Does the Internet Work? Acknowledgements: S. Bradner and R. Wang Internet Protocols Design Philosophy ordered set of goals 1. multiplexed utilization of existing
More informationReST 2000 Roy Fielding W3C
Outline What is ReST? Constraints in ReST REST Architecture Components Features of ReST applications Example of requests in REST & SOAP Complex REST request REST Server response Real REST examples REST
More informationCSE 5306 Distributed Systems
CSE 5306 Distributed Systems Naming Jia Rao http://ranger.uta.edu/~jrao/ 1 Naming Names play a critical role in all computer systems To access resources, uniquely identify entities, or refer to locations
More informationPeer-to-peer computing research a fad?
Peer-to-peer computing research a fad? Frans Kaashoek kaashoek@lcs.mit.edu NSF Project IRIS http://www.project-iris.net Berkeley, ICSI, MIT, NYU, Rice What is a P2P system? Node Node Node Internet Node
More informationComputer Networks. HTTP and more. Jianping Pan Spring /20/17 CSC361 1
Computer Networks HTTP and more Jianping Pan Spring 2017 1/20/17 CSC361 1 First things first W1 due next Monday (Jan 23) submit a single PDF file through connex Noah posted a docx for for questions on
More informationCE693: Adv. Computer Networking
CE693: Adv. Computer Networking L-17 Naming Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are obtained from other
More informationOverview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste
Overview 5-44 5-44 Computer Networking 5-64 Lecture 6: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Web Consistent hashing Peer-to-peer Motivation Architectures Discussion CDN Video Fall
More informationUsing PlanetLab for Network Research: Myths, Realities, and Best Practices
Using PlanetLab for Network Research: Myths, Realities, and Best Practices Authors: Neil Spring, Larry Peterson, Andy Bavier, and Vivek Pai Akshat Thirani EECS 395/495 14 Jan, 2016 What is PlanetLab? PlanetLab
More informationThe Google File System
The Google File System Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung December 2003 ACM symposium on Operating systems principles Publisher: ACM Nov. 26, 2008 OUTLINE INTRODUCTION DESIGN OVERVIEW
More informationCSC2231: DNS with DHTs
CSC2231: DNS with DHTs http://www.cs.toronto.edu/~stefan/courses/csc2231/05au Stefan Saroiu Department of Computer Science University of Toronto Administrivia Next lecture: P2P churn Understanding Availability
More informationData Centers. Tom Anderson
Data Centers Tom Anderson Transport Clarification RPC messages can be arbitrary size Ex: ok to send a tree or a hash table Can require more than one packet sent/received We assume messages can be dropped,
More informationCSE 124: QUANTIFYING PERFORMANCE AT SCALE AND COURSE REVIEW. George Porter December 6, 2017
CSE 124: QUANTIFYING PERFORMANCE AT SCALE AND COURSE REVIEW George Porter December 6, 2017 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA
More informationFinding a needle in Haystack: Facebook's photo storage
Finding a needle in Haystack: Facebook's photo storage The paper is written at facebook and describes a object storage system called Haystack. Since facebook processes a lot of photos (20 petabytes total,
More informationFinding a Needle in a Haystack. Facebook s Photo Storage Jack Hartner
Finding a Needle in a Haystack Facebook s Photo Storage Jack Hartner Paper Outline Introduction Background & Previous Design Design & Implementation Evaluation Related Work Conclusion Facebook Photo Storage
More informationAn Introduction to Overlay Networks PlanetLab: A Virtual Overlay Network Testbed
An Introduction to Overlay Networks PlanetLab: A Virtual Overlay Network Testbed Suhas Mathur suhas@winlab.rutgers.edu Communication Networks II Spring 2005 Talk Outline Introduction: The future internet
More informationComputer Networks. Wenzhong Li. Nanjing University
Computer Networks Wenzhong Li Nanjing University 1 Chapter 8. Internet Applications Internet Applications Overview Domain Name Service (DNS) Electronic Mail File Transfer Protocol (FTP) WWW and HTTP Content
More informationArcGIS for Server: Administration and Security. Amr Wahba
ArcGIS for Server: Administration and Security Amr Wahba awahba@esri.com Agenda ArcGIS Server architecture Distributing and scaling components Implementing security Monitoring server logs Automating server
More informationBIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0
BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web
More informationPeer-to-Peer Systems and Distributed Hash Tables
Peer-to-Peer Systems and Distributed Hash Tables CS 240: Computing Systems and Concurrency Lecture 8 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Selected
More informationMeasuring IPv6 Day. Geoff Huston APNIC
Measuring IPv6 Day Geoff Huston APNIC My brief for this session... It would be great if you could consider to include following topics in your presentation:! What you observed on World IPv6 day:!! Statistics
More informationConfiguring CWMP Service
CHAPTER 12 This chapter describes how to configure the CWMP service in Cisco Broadband Access Center (BAC). Topics covered are:, page 12-1 Configuring Service Ports on the DPE, page 12-2 Disabling Connection
More informationMicrosoft Exchange Server 2013 and 2016 Deployment
Microsoft Exchange Server 2013 and 2016 Deployment Barracuda Networks has conducted interoperability tests using the Barracuda Load Balancer ADC and Microsoft Exchange Server 2013 and Microsoft Exchange
More informationGoogle File System. Arun Sundaram Operating Systems
Arun Sundaram Operating Systems 1 Assumptions GFS built with commodity hardware GFS stores a modest number of large files A few million files, each typically 100MB or larger (Multi-GB files are common)
More informationCOMP6218: Content Caches. Prof Leslie Carr
COMP6218: Content Caches Prof Leslie Carr 1 Slashdot.org The Slashdot effect, also known as slashdotting, occurs when a popular website links to a smaller site, causing a massive increase in traffic 2
More informationTrek: Testable Replicated Key-Value Store
Trek: Testable Replicated Key-Value Store Yen-Ting Liu, Wen-Chien Chen Stanford University Abstract This paper describes the implementation of Trek, a testable, replicated key-value store with ZooKeeper-like
More informationTECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica
TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica Examination Architecture of Distributed Systems (2IMN10 / 2II45), on Monday November 2, 2015, from 13.30 to 16.30 hours. Indicate on
More informationWWW, REST, and Web Services
WWW, REST, and Web Services Instructor: Yongjie Zheng Aprile 18, 2017 CS 5553: Software Architecture and Design World Wide Web (WWW) What is the Web? What challenges does the Web have to address? 2 What
More informationDEPLOYMENT GUIDE. Deploying F5 for High Availability and Scalability of Microsoft Dynamics 4.0
DEPLOYMENT GUIDE Deploying F5 for High Availability and Scalability of Microsoft Dynamics 4.0 Introducing the F5 and Microsoft Dynamics CRM configuration Microsoft Dynamics CRM is a full customer relationship
More informationDeployment Scenarios for Standalone Content Engines
CHAPTER 3 Deployment Scenarios for Standalone Content Engines This chapter introduces some sample scenarios for deploying standalone Content Engines in enterprise and service provider environments. This
More informationSmart Links for SEO. Miva Module for Miva Merchant 5. Contents
Smart Links for SEO user manual Miva Module for Miva Merchant 5 Contents Introduction Requirements Installation Rewrite Rules Template Customization Best Practices Support copyright 2009 by NetBlazon LLC
More informationONOS OVERVIEW. Architecture, Abstractions & Application
ONOS OVERVIEW Architecture, Abstractions & Application WHAT IS ONOS? Open Networking Operating System (ONOS) is an open source SDN network operating system (controller). Mission: to enable Service Providers
More informationDistributed Systems. Hajussüsteemid MTAT Distributed File Systems. (slides: adopted from Meelis Roos DS12 course) 1/25
Hajussüsteemid MTAT.08.024 Distributed Systems Distributed File Systems (slides: adopted from Meelis Roos DS12 course) 1/25 Examples AFS NFS SMB/CIFS Coda Intermezzo HDFS WebDAV 9P 2/25 Andrew File System
More informationArchitecting Network for Branch Offices with Cisco Unified Wireless
Architecting Network for Branch Offices with Cisco Unified Wireless Karan Sheth - Sr. Technical Marketing Engineer Objective Design & Deploy Branch Network That Increases Business Resiliency 2 Agenda Learn
More information1 Modular architecture
1 Modular architecture UI customization IIS ID assignment Authorizer selection HTML/CSS/JS HTML/CSS/JS skin skin API User module Admin module Attribute validation Resource assignment Escalation / delegation
More information416 Distributed Systems. March 23, 2018 CDNs
416 Distributed Systems March 23, 2018 CDNs Outline DNS Design (317) Content Distribution Networks 2 Typical Workload (Web Pages) Multiple (typically small) objects per page File sizes are heavy-tailed
More informationBefore You Update: Important Notes
Before you update, familiarize yourself with the update process, the system's behavior during the update, compatibility issues, and required pre or post-update configuration changes. Caution Note Do not
More informationScalable overlay Networks
Scalable overlay Networks Dr. Samu Varjonen 15.02.2018 Scalable overlay networks 15.02.2018 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01.
More informationCSE 124: CONTENT-DISTRIBUTION NETWORKS. George Porter December 4, 2017
CSE 124: CONTENT-DISTRIBUTION NETWORKS George Porter December 4, 2017 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) Creative Commons
More informationMore on Testing and Large Scale Web Apps
More on Testing and Large Scale Web Apps Testing Functionality Tests - Unit tests: E.g. Mocha - Integration tests - End-to-end - E.g. Selenium - HTML CSS validation - forms and form validation - cookies
More informationSCI - NIH/NCRR Site. Web Log Analysis Yearly Report Report Range: 01/01/ :00:00-12/31/ :59:59.
SCI - NIH/NCRR Site Web Log Analysis Yearly Report 2003 Report Range: 01/01/2003 00:00:00-12/31/2003 23:59:59 www.webtrends.com Table of Contents General Statistics...5 Page Views Over Time...8 Top Pages
More informationCSE 124: Networked Services Lecture-15
Fall 2010 CSE 124: Networked Services Lecture-15 Instructor: B. S. Manoj, Ph.D http://cseweb.ucsd.edu/classes/fa10/cse124 11/18/2010 CSE 124 Networked Services Fall 2010 1 Updates Signup sheet for PlanetLab
More informationFUJITSU Cloud Service K5 - API Management Service Description
FUJITSU Cloud Service K5 - API Management Service Description August 8, 2018 1. API Management Service Overview API Management Service is built on Apigee Edge, an integrated API platform product provided
More informationReducing Outgoing Traffic of Proxy Cache by Using Client-Cluster
Reducing Outgoing Traffic of Proxy Cache by Using Client-Cluster Kyungbaek Kim and Daeyeon Park Abstract: Many web cache systems and policies concerning them have been proposed. These studies, however,
More informationToday: World Wide Web! Traditional Web-Based Systems!
Today: World Wide Web! WWW principles Case Study: web caching as an illustrative example Invalidate versus updates Push versus Pull Cooperation between replicas Lecture 22, page 1 Traditional Web-Based
More informationDeploying the BIG-IP System v10 with Oracle s BEA WebLogic
DEPLOYMENT GUIDE Deploying the BIG-IP System v10 with Oracle s BEA WebLogic Version 1.0 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Oracle s BEA WebLogic Prerequisites and
More informationWeb Caching and Content Delivery
Web Caching and Content Delivery Caching for a Better Web Performance is a major concern in the Web Proxy caching is the most widely used method to improve Web performance Duplicate requests to the same
More informationPrivileged Remote Access Failover Configuration
Privileged Remote Access Failover Configuration 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property of
More informationNetwork Coordinates in the Wild
Network Coordinates in the Wild Jonathan Ledlie Margo Seltzer Paul Gardner Harvard University Aelitis / Azureus Hourglass Project http://www.eecs.harvard.edu/~syrah/hourglass Jonathan Ledlie - Harvard
More informationDistributed redirection for the Globule platform
Distributed redirection for the Globule platform Aline Baggio October 2004 Technical report IR-CS-010 Abstract Replication in the World-Wide Web covers a wide range of techniques. Often, the redirection
More informationData Processing at the Speed of 100 Gbps using Apache Crail. Patrick Stuedi IBM Research
Data Processing at the Speed of 100 Gbps using Apache Crail Patrick Stuedi IBM Research The CRAIL Project: Overview Data Processing Framework (e.g., Spark, TensorFlow, λ Compute) Spark-IO Albis Pocket
More informationMulti-Level Priority Queues
The (MPQ) feature allows you to configure multiple priority queues for multiple traffic classes by specifying a different priority level for each of the traffic classes in a single service policy map.
More informationApplied Architectures
Applied Architectures Software Architecture Lecture 17 Copyright Richard N. Taylor, Nenad Medvidovic, and Eric M. Dashofy. All rights reserved. Objectives Illustrate how principles have been used to solve
More informationSecure Access Troubleshooting Rewrite related issues (Core/Web Based Access)
Secure Access Troubleshooting Rewrite related issues (Core/Web Based Access) Published June 2015 Why do certain web-based applications have issues through the rewrite engine compared to accessing the resource
More informationINF3190 Data Communication. Application Layer
Application Layer Carsten Griwodz Email: griff@ifi.uio.no Coding for adaptation Adapt audiovisual quality to your bandwidth share Coding for Adaptive Streaming: MPEG-1 Frames can be dropped In a controlled
More informationCSE 486/586 Distributed Systems
CSE 486/586 Distributed Systems Content Distribution Networks Slides by Steve Ko Computer Sciences and Engineering University at Buffalo CSE 486/586 Understanding Your Workload Engineering principle Make
More informationMySQL As A Service. Operationalizing 19 Years of Infrastructure at GoDaddy
MySQL As A Service Operationalizing 19 Years of Infrastructure at GoDaddy WHOAMI Nathan Northcutt Senior Software Engineer MySQL DevOps ~10 years performance engineering & distributed data services. Email:
More informationApéndice B. Reportes de Pruebas de Estrés
Apéndice B Reportes de Pruebas de Estrés Apéndice B Reportes de Pruebas de Estrés Paessler Web Server Stress Tool Test Report ** Test Logfile by Webserver Stress Tool, Version. Trial Edition ** - by Paessler
More informationIntroduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology
2005 / High Speed Networks II Outline Introduction Mobility Support Overview of IPv6 Mobility Support Handover Management Mobility Support What means Mobility Support? allow transparent routing of IPv6
More informationBIG-IP Access Policy Manager : Secure Web Gateway. Version 12.1
BIG-IP Access Policy Manager : Secure Web Gateway Version 12.1 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...11 About Secure Web Gateway for web access...11 About the benefits
More informationFutureNet IV Fourth International Workshop on the Network of the Future, in conjunction with IEEE ICC
Sasu Tarkoma, Dmitriy Kuptsov, and Petri Savolainen Helsinki Institute for Information Technology University of Helsinki and Aalto University Pasi Sarolahti Aalto University FutureNet IV Fourth International
More informationEvaluating external network bandwidth load for Google Apps
Evaluating external network bandwidth load for Google Apps This document describes how to perform measurements to better understand how much network load will be caused by using a software as a service
More informationCS November 2017
Distributed Systems 21. Delivery Networks () Paul Krzyzanowski Rutgers University Fall 2017 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance Flash
More informationAmbry: LinkedIn s Scalable Geo- Distributed Object Store
Ambry: LinkedIn s Scalable Geo- Distributed Object Store Shadi A. Noghabi *, Sriram Subramanian +, Priyesh Narayanan +, Sivabalan Narayanan +, Gopalakrishna Holla +, Mammad Zadeh +, Tianwei Li +, Indranil
More informationInstalling and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.
Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on
More informationOverview. Internet in Pakistan. How I Stumbled Upon this? Information Access and Communication Networks in the Developing-world. Poor Man s Broadband
Digital Divide Information Access and Communication Networks in the Developing-world Umar Saif LUMS, Pakistan umar@lums.edu.pk umar@mit.edu Overview Poor Man s Broadband Poor Man s Cache Packet Containment
More informationTopics in P2P Networked Systems
600.413 Topics in P2P Networked Systems Week 4 Measurements Andreas Terzis Slides from Stefan Saroiu Content Delivery is Changing Thirst for data continues to increase (more data & users) New types of
More informationvsan Mixed Workloads First Published On: Last Updated On:
First Published On: 03-05-2018 Last Updated On: 03-05-2018 1 1. Mixed Workloads on HCI 1.1.Solution Overview Table of Contents 2 1. Mixed Workloads on HCI 3 1.1 Solution Overview Eliminate the Complexity
More informationReliable High-Performance HTTP Infrastructure with nginx and Lua. Sean Cribbs Senior Principal Engineer, Comcast
Reliable High-Performance HTTP Infrastructure with nginx and Lua Sean Cribbs Senior Principal Engineer, Comcast Cable @seancribbs Background Consumer Consumer Internal Internal Consumer Partner API Management
More information