Experiences with CoralCDN

Size: px
Start display at page:

Download "Experiences with CoralCDN"

Transcription

1 Experiences with A Five Year Opera:onal View Michael J. Freedman Princeton University

2 A Coopera:ve, Self Organizing CDN HTTP Proxy DNS Server Coral index node Resolver 1 HTTP Proxy DNS Server Coral index node 3 6 Client 2 HTTP Proxy 5 HTTP Proxy 4 Coral index node DNS Server Coral index node Goal: To make desired content widely available regardless of publisher s own resources, by organizing and u:lizing any coopera:ve resources

3 hpp://example.com/path hpp://example.com.nyud.net/path

4 Adopted by: Clients Servers Third par:es

5 Many of you have used

6 Many of you have used

7 Many of you have used

8 Many of you have used

9 Many of you have used

10 Many of you have used

11 Requests per Day (Millions) From Clients To Upstream Proxy/Origin Jan 05 Jan 06 Jan 07 Jan 08 Jan 09 Jan 10 Daily Request Volume 2M clients 2 TB content 20K origin domains From PlanetLab servers

12 HTTP Proxy DNS Server Coral index node HTTP Proxy DNS Server Coral index node HTTP Proxy DNS Server Coral index node HTTP Proxy Coral index node Based on peer to peer DHT 1. Weakened consistency + algorithms that prevent tree satura:on during lookup 2. Decentralized clustering for locality and hierarchical lookup 3. Coopera:ve HTTP / DNS that leverages locality

13 HTTP Proxy DNS Server Coral index node HTTP Proxy DNS Server Coral index node HTTP Proxy DNS Server Coral index node HTTP Proxy Coral index node Based on peer to peer DHT 1. Weakened consistency + algorithms that prevent tree satura:on during lookup 2. Decentralized clustering for locality and hierarchical lookup 3. Coopera:ve HTTP / DNS that leverages locality

14 CoralCDN HTTP Proxy CoralCDN DNS Server CoralCDN HTTP Proxy Coral index node CoralCDN CoralCDN HTTP Proxy CoralCDN DNS Server Coral index node CoralCDN DNS Server Coral index node CoralCDN HTTP Proxy Coral index node Interac:ons with the External Environment Clients Virtualiza:on Layer Origin Domains

15 1. Experiences Naming Fault Tolerance Resource management 2. Revisit CoralCDN s design

16 Naming x Flexible, open API Mismatch with domain based access control policies

17 CoralCDN s Plaaorm as a Service API Rewrite rules in origin webservers RewriteEngine on RewriteCond %{HTTP_USER_AGENT}!^CoralWebPrx RewriteCond %{QUERY_STRING}!(^ &)coral-no-serve$ RewriteRule ^(.*)$ {REQUEST_URI} [R,L]

18 CoralCDN s Plaaorm as a Service API Rewrite rules in origin webservers RewriteEngine on RewriteCond %{HTTP_USER_AGENT}!^CoralWebPrx RewriteCond %{QUERY_STRING}!(^ &)coral-no-serve$ RewriteCond %{HTTP_REFERER} slashdot\.org [NC] RewriteCond %{HTTP_REFERER} digg\.com [NC,OR] RewriteCond %{HTTP_REFERER} blogspot\.com [NC,OR] RewriteRule ^(.*)$ {REQUEST_URI} [R,L] Sites integrate with load/bandwidth monitoring Elas:c Provisioning

19 Naming Confla:on hpp://domain /path.service1.service2 x x 1. Loca:on to retrieve content 2. Human readable name for administra:ve en:ty 3. Security policies to govern objects interac:ons

20 Domain based Security Policies evil.com Web Page Cookies target.com Document Object Model

21 Domain based Security Policies Web Page evil.com.nyud.net Cookies target.com.nyud.net Document Object Model Defaults violate least privilege

22 Fault Tolerance: Failure Decoupling x Internal failures: DHT nodes DNS servers, HTTP proxies Management service External failures: Decouple IPs from hosts Interac:ons with origin sites

23 happens! Origin Status 1. Unresponsive 2. Returns error code 3. Reply truncated ReacAon Cache nega:ve results Serve stale content Use whole file overwrites

24 happens! Origin Status 1. Unresponsive 2. Returns error code 3. Reply truncated ReacAon Cache nega:ve results Serve stale content Use whole file overwrites Maintain status quo unless improvements are possible

25 What is failure? Return values should have fail safe defaults

26 Resource Management x Control over bandwidth consump:on Control and visibility into environment s resources

27 Mar 2004 released on PlanetLab Some :meline

28 Some :meline Mar 2004 released on PlanetLab Aug 2004 SlashdoPed

29 Some :meline Mar 2004 released on PlanetLab Aug 2004 SlashdoPed Dec 2004 Asian Tsunami 1. PlanetLab traffic jumps 2. Site threatens to yank PL 3. PL admin kills slice 4. Slice restored next day 5. Ini:ates discussion of resource limits for slices

30 Demand >> Supply: Enter Fair Sharing Algorithms Avg MB per hour (d i )? Σ i d i S Domains with heaviest consump:on

31 Demand >> Supply: Enter Fair Sharing Algorithms Avg MB per hour (d i ) λ find max λ, s.t. Σ i min (λ, d i ) S Domains with heaviest consump:on

32 Demand >> Supply: Enter Fair Sharing Algorithms find max λ, s.t. λ Σ i min (λ, d i ) S Domains with heaviest consump:on

33 Admission Control under Fair Sharing ~10 kb imgs 3.3% rejected ~5 MB videos 89% rejected Requests per Domain 1e All Responses Forbidden Responses Unique Domains Ordered by Decreasing Popularity Demand > 10 TB Supply 2 TB

34 Some :meline Mar 2004 released on PlanetLab Aug 2004 SlashdoPed Dec 2004 Asian Tsunami Mar 2006 PL deploys bandwidth thropling 1. PlanetLab traffic jumps 2. Site threatens to yank PL 3. PL admin kills slice 4. Slice restored next day 5. Ini:ates discussion of resource limits for slices

35 Resource Management: Us vs. Them ApplicaAon Hammer Track HTTP traffic If site > fair share rate, reject via HTTP 403 If total > peak rate, close server socket PlaEorm Hammer Track all network traffic If total > 80% daily rate, BW shaping in kernel

36 Resource Management: Us vs. Them ApplicaAon Hammer Track HTTP traffic If site > fair share rate, reject via HTTP 403 If total > peak rate, close server socket PlaEorm Hammer Track all network traffic If total > 80% daily rate, BW shaping in kernel Result: HTTP traffic is 1/2 2/3 of all traffic Lower layers should expose greater visibility and control over resources

37 1. Experiences Naming Fault Tolerance Resource management 2. Revisit CoralCDN s design

38 Usage Scenarios 1. Resurrec:ng old content 2. Accessing unpopular content Requests per URL 1e Aug Aug Aug e+06 Unique URLs by Popularity

39 Usage Scenarios 1. Resurrec:ng old content 2. Accessing unpopular content 3. Serving long term popular content Requests per URL 1e Aug Aug Aug e+06 Unique URLs by Popularity

40 Usage Scenarios 1. Resurrec:ng old content 2. Accessing unpopular content 3. Serving long term popular content Requests per URL 1e Aug Aug Aug e+07 1e e+06 1 Unique 2 URLs 3 by Popularity Time (Days) Requests per domain

41 Usage Scenarios 1. Resurrec:ng old content 2. Accessing unpopular content 3. Serving long term popular content Top URLs % Reqs Agg Size (MB) 0.01 % 49.1 % % 71.8 % % 84.8 % % 92.2 % Result Frequency Local Cache 70.4 % Origin Site 9.9 % Proxy 7.1 % 4xx/5xx Error 12.6 %

42 Usage Scenarios 1. Resurrec:ng old content 2. Accessing unpopular content 3. Serving long term popular content 4. Surviving flash crowds to content 600 moonbuggy.org redditmirror.cc moonbuggy reddit Requests per minute Time (Hours)

43 Usage Scenarios 1. Resurrec:ng old content 2. Accessing unpopular content 3. Serving long term popular content 4. Surviving flash crowds to content 600 moonbuggy.org redditmirror.cc moonbuggy reddit Requests per minute Time (Hours)

44 Usage Scenarios 1. Resurrec:ng old content 2. Accessing unpopular content 3. Serving long term popular content 4. Surviving flash crowds to content 5 second epochs 10 minute epochs 24% epochs 1 domain with 10x incr 99.93% epochs 1 domain with 10x incr 0.006% epochs 1 domain with 100x incr 28% epochs 1 domain with 100x incr 0 % epochs 1 domain with 1000x incr 0.21% epochs 1 domain with 1000x incr

45 Conclusions? Most requested content is long term popular and already cached locally Flash crowds occur, but on order of minutes

46 Conclusions? Most requested content is long term popular and already cached locally Flash crowds occur, but on order of minutes Focus on long term popular LiPle / no HTTP coopera:on Global discovery (e.g., DNS) Focus on flash crowds Regional coop. as default Global coop. as failover

47 Reconfiguring CoralCDN s design Leverage Coral hierarchy for lookup Latency 90% Origin Load 5% Failover to global 0.5%

48 Reconfiguring CoralCDN s design Leverage Coral hierarchy for lookup During admission control, bias against long term use λ Σ i min (λ, d i ) < S heavily weight history in ewma

49 Conclusions 1. Experiences Naming Fault Tolerance Resource management 2. Revisit CoralCDN s design Current design unnecessary for deployment / most use Easy changes to promote flash crowd mi:ga:on

50 Can we reach Internet scale? Ini:al beta release of browser based P2P web cache

CONTENT DISTRIBUTION. Oliver Michel University of Illinois at Urbana-Champaign. October 25th, 2011

CONTENT DISTRIBUTION. Oliver Michel University of Illinois at Urbana-Champaign. October 25th, 2011 CONTENT DISTRIBUTION Oliver Michel University of Illinois at Urbana-Champaign October 25th, 2011 OVERVIEW 1. Why use advanced techniques for content distribution on the internet? 2. CoralCDN 3. Identifying

More information

Democratizing Content Publication with Coral

Democratizing Content Publication with Coral Democratizing Content Publication with Mike Freedman Eric Freudenthal David Mazières New York University NSDI 2004 A problem Feb 3: Google linked banner to julia fractals Users clicking directed to Australian

More information

Democratizing Content Publication with Coral

Democratizing Content Publication with Coral Democratizing Content Publication with Mike Freedman Eric Freudenthal David Mazières New York University www.scs.cs.nyu.edu/coral A problem Feb 3: Google linked banner to julia fractals Users clicking

More information

Venugopal Ramasubramanian Emin Gün Sirer SIGCOMM 04

Venugopal Ramasubramanian Emin Gün Sirer SIGCOMM 04 The Design and Implementation of a Next Generation Name Service for the Internet Venugopal Ramasubramanian Emin Gün Sirer SIGCOMM 04 Presenter: Saurabh Kadekodi Agenda DNS overview Current DNS Problems

More information

The Application Layer HTTP and FTP

The Application Layer HTTP and FTP The Application Layer HTTP and FTP File Transfer Protocol (FTP) Allows a user to copy files to/from remote hosts Client program connects to FTP server provides a login id and password allows the user to

More information

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time

More information

CSE 124: Networked Services Lecture-17

CSE 124: Networked Services Lecture-17 Fall 2010 CSE 124: Networked Services Lecture-17 Instructor: B. S. Manoj, Ph.D http://cseweb.ucsd.edu/classes/fa10/cse124 11/30/2010 CSE 124 Networked Services Fall 2010 1 Updates PlanetLab experiments

More information

Content Distribution. Today. l Challenges of content delivery l Content distribution networks l CDN through an example

Content Distribution. Today. l Challenges of content delivery l Content distribution networks l CDN through an example Content Distribution Today l Challenges of content delivery l Content distribution networks l CDN through an example Trends and application need " Some clear trends Growing number of and faster networks

More information

Multimedia Streaming. Mike Zink

Multimedia Streaming. Mike Zink Multimedia Streaming Mike Zink Technical Challenges Servers (and proxy caches) storage continuous media streams, e.g.: 4000 movies * 90 minutes * 10 Mbps (DVD) = 27.0 TB 15 Mbps = 40.5 TB 36 Mbps (BluRay)=

More information

The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla

The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Venugopalan Ramasubramanian Emin Gün Sirer Presented By: Kamalakar Kambhatla * Slides adapted from the paper -

More information

THE FLEXIBLE DATA-STRUCTURE SERVER THAT COULD.

THE FLEXIBLE DATA-STRUCTURE SERVER THAT COULD. REDIS THE FLEXIBLE DATA-STRUCTURE SERVER THAT COULD. @_chriswhitten_ REDIS REDIS April 10, 2009; 6 years old Founding Author: Salvatore Sanfilippo Stable release: 3.0.3 / June 4, 2015; 3 months ago Fundamental

More information

Yahoo Traffic Server -a Powerful Cloud Gatekeeper

Yahoo Traffic Server -a Powerful Cloud Gatekeeper Yahoo Traffic Server -a Powerful Cloud Gatekeeper Shih-Yong Wang Yahoo! Taiwan 2010 COSCUP Aug 15, 2010 What is Proxy Caching? Proxy Caching explicit client configuration transparent emulate responses

More information

From Internet Data Centers to Data Centers in the Cloud

From Internet Data Centers to Data Centers in the Cloud From Internet Data Centers to Data Centers in the Cloud This case study is a short extract from a keynote address given to the Doctoral Symposium at Middleware 2009 by Lucy Cherkasova of HP Research Labs

More information

Flexible, Wide-Area Storage for Distributed Systems Using Semantic Cues

Flexible, Wide-Area Storage for Distributed Systems Using Semantic Cues Flexible, Wide-Area Storage for Distributed Systems Using Semantic Cues Jeremy Stribling Thesis Defense, August 6, 2009 Including material previously published in: Flexible, Wide-Area Storage for Distributed

More information

Squirrel case-study. Decentralized peer-to-peer web cache. Traditional centralized web cache. Based on the Pastry peer-to-peer middleware system

Squirrel case-study. Decentralized peer-to-peer web cache. Traditional centralized web cache. Based on the Pastry peer-to-peer middleware system Decentralized peer-to-peer web cache Based on the Pastry peer-to-peer middleware system Traditional centralized web cache 1 2 Decentralized caching of web pages use the resources of peers (web browsers/clients)

More information

Subway : Peer-To-Peer Clustering of Clients for Web Proxy

Subway : Peer-To-Peer Clustering of Clients for Web Proxy Subway : Peer-To-Peer Clustering of Clients for Web Proxy Kyungbaek Kim and Daeyeon Park Department of Electrical Engineering & Computer Science, Division of Electrical Engineering, Korea Advanced Institute

More information

MINIATURE WORLD: MEASURING AND REPLICATING REAL-WORLD BLOCKCHAIN DEPLOYMENTS

MINIATURE WORLD: MEASURING AND REPLICATING REAL-WORLD BLOCKCHAIN DEPLOYMENTS MINIATURE WORLD: MEASURING AND REPLICATING REAL-WORLD BLOCKCHAIN DEPLOYMENTS Adem Efe Gencer with Ittay Eyal, Emin Gün Sirer, and Robbert van Renesse Jan 26 th, 2016 Initiative for CryptoCurrencies and

More information

Configuring Caching Services

Configuring Caching Services CHAPTER 8 This chapter describes how to configure conventional caching services (HTTP, FTP [FTP-over-HTTP caching and native FTP caching], HTTPS, and DNS caching) for centrally managed Content Engines.

More information

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at

More information

Installation and Deployment

Installation and Deployment This section includes troubleshooting topics about installation and deployment issues. Use of Forward Proxies in Your System, page 1 Use of Reverse Proxies in Your System, page 2 Auto-Deployment Fails

More information

Internet Technology 3/2/2016

Internet Technology 3/2/2016 Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology

More information

Spotify Behind the Scenes

Spotify Behind the Scenes A Eulogy to P2P (?) Spotify gkreitz@spotify.com KTH, May 7 2014 What is Spotify? Lightweight on-demand streaming Large catalogue, over 20 million tracks 1 Available in 28 countries. Over 24 million active

More information

Read the following information carefully, before you begin an upgrade.

Read the following information carefully, before you begin an upgrade. Read the following information carefully, before you begin an upgrade. Review Supported Upgrade Paths, page 1 Review Time Taken for Upgrade, page 1 Review Available Cisco APIC-EM Ports, page 2 Securing

More information

CSE 5306 Distributed Systems. Naming

CSE 5306 Distributed Systems. Naming CSE 5306 Distributed Systems Naming 1 Naming Names play a critical role in all computer systems To access resources, uniquely identify entities, or refer to locations To access an entity, you have resolve

More information

Distributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018

Distributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018 Distributed Systems 21. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2018 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance

More information

CS November 2018

CS November 2018 Distributed Systems 21. Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2018 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance

More information

Scaling Internet TV Content Delivery ALEX GUTARIN DIRECTOR OF ENGINEERING, NETFLIX

Scaling Internet TV Content Delivery ALEX GUTARIN DIRECTOR OF ENGINEERING, NETFLIX Scaling Internet TV Content Delivery ALEX GUTARIN DIRECTOR OF ENGINEERING, NETFLIX Inventing Internet TV Available in more than 190 countries 104+ million subscribers Lots of Streaming == Lots of Traffic

More information

Handling Flash Crowds from your Garage

Handling Flash Crowds from your Garage Handling Flash Crowds from your Garage Jeremy Elson, Jon Howell Microsoft Research presented by: Vrije Universiteit Amsterdam March 2, 2012 Overview Flash crowds Building blocks of a scalable system Scaling

More information

CCDP-ARCH. Section 11. Content Networking

CCDP-ARCH. Section 11. Content Networking CCDP-ARCH Section 11 As a designer, content networking technologies allows you to intelligently distribute content throughout the network, thereby reducing WAN bandwidth requirements. For example, a user

More information

Web as a Distributed System

Web as a Distributed System Web as a Distributed System The World Wide Web is a large distributed system. In 1998 comprises 70-75% of Internet traffic. With large transfers of streaming media and p2p, no longer a majority of bytes,

More information

automating server selection with OASIS

automating server selection with OASIS MICHAEL J. FREEDMAN automating server selection with OASIS Michael J. Freedman is a doctoral student at NYU, currently visiting Stanford University, and received his M.Eng. and S.B. degrees from MIT. His

More information

Distributed Systems Final Exam

Distributed Systems Final Exam 15-440 Distributed Systems Final Exam Name: Andrew: ID December 12, 2011 Please write your name and Andrew ID above before starting this exam. This exam has 14 pages, including this title page. Please

More information

CS155b: E-Commerce. Lecture 3: Jan 16, How Does the Internet Work? Acknowledgements: S. Bradner and R. Wang

CS155b: E-Commerce. Lecture 3: Jan 16, How Does the Internet Work? Acknowledgements: S. Bradner and R. Wang CS155b: E-Commerce Lecture 3: Jan 16, 2001 How Does the Internet Work? Acknowledgements: S. Bradner and R. Wang Internet Protocols Design Philosophy ordered set of goals 1. multiplexed utilization of existing

More information

ReST 2000 Roy Fielding W3C

ReST 2000 Roy Fielding W3C Outline What is ReST? Constraints in ReST REST Architecture Components Features of ReST applications Example of requests in REST & SOAP Complex REST request REST Server response Real REST examples REST

More information

CSE 5306 Distributed Systems

CSE 5306 Distributed Systems CSE 5306 Distributed Systems Naming Jia Rao http://ranger.uta.edu/~jrao/ 1 Naming Names play a critical role in all computer systems To access resources, uniquely identify entities, or refer to locations

More information

Peer-to-peer computing research a fad?

Peer-to-peer computing research a fad? Peer-to-peer computing research a fad? Frans Kaashoek kaashoek@lcs.mit.edu NSF Project IRIS http://www.project-iris.net Berkeley, ICSI, MIT, NYU, Rice What is a P2P system? Node Node Node Internet Node

More information

Computer Networks. HTTP and more. Jianping Pan Spring /20/17 CSC361 1

Computer Networks. HTTP and more. Jianping Pan Spring /20/17 CSC361 1 Computer Networks HTTP and more Jianping Pan Spring 2017 1/20/17 CSC361 1 First things first W1 due next Monday (Jan 23) submit a single PDF file through connex Noah posted a docx for for questions on

More information

CE693: Adv. Computer Networking

CE693: Adv. Computer Networking CE693: Adv. Computer Networking L-17 Naming Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are obtained from other

More information

Overview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste

Overview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Overview 5-44 5-44 Computer Networking 5-64 Lecture 6: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Web Consistent hashing Peer-to-peer Motivation Architectures Discussion CDN Video Fall

More information

Using PlanetLab for Network Research: Myths, Realities, and Best Practices

Using PlanetLab for Network Research: Myths, Realities, and Best Practices Using PlanetLab for Network Research: Myths, Realities, and Best Practices Authors: Neil Spring, Larry Peterson, Andy Bavier, and Vivek Pai Akshat Thirani EECS 395/495 14 Jan, 2016 What is PlanetLab? PlanetLab

More information

The Google File System

The Google File System The Google File System Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung December 2003 ACM symposium on Operating systems principles Publisher: ACM Nov. 26, 2008 OUTLINE INTRODUCTION DESIGN OVERVIEW

More information

CSC2231: DNS with DHTs

CSC2231: DNS with DHTs CSC2231: DNS with DHTs http://www.cs.toronto.edu/~stefan/courses/csc2231/05au Stefan Saroiu Department of Computer Science University of Toronto Administrivia Next lecture: P2P churn Understanding Availability

More information

Data Centers. Tom Anderson

Data Centers. Tom Anderson Data Centers Tom Anderson Transport Clarification RPC messages can be arbitrary size Ex: ok to send a tree or a hash table Can require more than one packet sent/received We assume messages can be dropped,

More information

CSE 124: QUANTIFYING PERFORMANCE AT SCALE AND COURSE REVIEW. George Porter December 6, 2017

CSE 124: QUANTIFYING PERFORMANCE AT SCALE AND COURSE REVIEW. George Porter December 6, 2017 CSE 124: QUANTIFYING PERFORMANCE AT SCALE AND COURSE REVIEW George Porter December 6, 2017 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA

More information

Finding a needle in Haystack: Facebook's photo storage

Finding a needle in Haystack: Facebook's photo storage Finding a needle in Haystack: Facebook's photo storage The paper is written at facebook and describes a object storage system called Haystack. Since facebook processes a lot of photos (20 petabytes total,

More information

Finding a Needle in a Haystack. Facebook s Photo Storage Jack Hartner

Finding a Needle in a Haystack. Facebook s Photo Storage Jack Hartner Finding a Needle in a Haystack Facebook s Photo Storage Jack Hartner Paper Outline Introduction Background & Previous Design Design & Implementation Evaluation Related Work Conclusion Facebook Photo Storage

More information

An Introduction to Overlay Networks PlanetLab: A Virtual Overlay Network Testbed

An Introduction to Overlay Networks PlanetLab: A Virtual Overlay Network Testbed An Introduction to Overlay Networks PlanetLab: A Virtual Overlay Network Testbed Suhas Mathur suhas@winlab.rutgers.edu Communication Networks II Spring 2005 Talk Outline Introduction: The future internet

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 8. Internet Applications Internet Applications Overview Domain Name Service (DNS) Electronic Mail File Transfer Protocol (FTP) WWW and HTTP Content

More information

ArcGIS for Server: Administration and Security. Amr Wahba

ArcGIS for Server: Administration and Security. Amr Wahba ArcGIS for Server: Administration and Security Amr Wahba awahba@esri.com Agenda ArcGIS Server architecture Distributing and scaling components Implementing security Monitoring server logs Automating server

More information

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0 BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web

More information

Peer-to-Peer Systems and Distributed Hash Tables

Peer-to-Peer Systems and Distributed Hash Tables Peer-to-Peer Systems and Distributed Hash Tables CS 240: Computing Systems and Concurrency Lecture 8 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Selected

More information

Measuring IPv6 Day. Geoff Huston APNIC

Measuring IPv6 Day. Geoff Huston APNIC Measuring IPv6 Day Geoff Huston APNIC My brief for this session... It would be great if you could consider to include following topics in your presentation:! What you observed on World IPv6 day:!! Statistics

More information

Configuring CWMP Service

Configuring CWMP Service CHAPTER 12 This chapter describes how to configure the CWMP service in Cisco Broadband Access Center (BAC). Topics covered are:, page 12-1 Configuring Service Ports on the DPE, page 12-2 Disabling Connection

More information

Microsoft Exchange Server 2013 and 2016 Deployment

Microsoft Exchange Server 2013 and 2016 Deployment Microsoft Exchange Server 2013 and 2016 Deployment Barracuda Networks has conducted interoperability tests using the Barracuda Load Balancer ADC and Microsoft Exchange Server 2013 and Microsoft Exchange

More information

Google File System. Arun Sundaram Operating Systems

Google File System. Arun Sundaram Operating Systems Arun Sundaram Operating Systems 1 Assumptions GFS built with commodity hardware GFS stores a modest number of large files A few million files, each typically 100MB or larger (Multi-GB files are common)

More information

COMP6218: Content Caches. Prof Leslie Carr

COMP6218: Content Caches. Prof Leslie Carr COMP6218: Content Caches Prof Leslie Carr 1 Slashdot.org The Slashdot effect, also known as slashdotting, occurs when a popular website links to a smaller site, causing a massive increase in traffic 2

More information

Trek: Testable Replicated Key-Value Store

Trek: Testable Replicated Key-Value Store Trek: Testable Replicated Key-Value Store Yen-Ting Liu, Wen-Chien Chen Stanford University Abstract This paper describes the implementation of Trek, a testable, replicated key-value store with ZooKeeper-like

More information

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica Examination Architecture of Distributed Systems (2IMN10 / 2II45), on Monday November 2, 2015, from 13.30 to 16.30 hours. Indicate on

More information

WWW, REST, and Web Services

WWW, REST, and Web Services WWW, REST, and Web Services Instructor: Yongjie Zheng Aprile 18, 2017 CS 5553: Software Architecture and Design World Wide Web (WWW) What is the Web? What challenges does the Web have to address? 2 What

More information

DEPLOYMENT GUIDE. Deploying F5 for High Availability and Scalability of Microsoft Dynamics 4.0

DEPLOYMENT GUIDE. Deploying F5 for High Availability and Scalability of Microsoft Dynamics 4.0 DEPLOYMENT GUIDE Deploying F5 for High Availability and Scalability of Microsoft Dynamics 4.0 Introducing the F5 and Microsoft Dynamics CRM configuration Microsoft Dynamics CRM is a full customer relationship

More information

Deployment Scenarios for Standalone Content Engines

Deployment Scenarios for Standalone Content Engines CHAPTER 3 Deployment Scenarios for Standalone Content Engines This chapter introduces some sample scenarios for deploying standalone Content Engines in enterprise and service provider environments. This

More information

Smart Links for SEO. Miva Module for Miva Merchant 5. Contents

Smart Links for SEO. Miva Module for Miva Merchant 5. Contents Smart Links for SEO user manual Miva Module for Miva Merchant 5 Contents Introduction Requirements Installation Rewrite Rules Template Customization Best Practices Support copyright 2009 by NetBlazon LLC

More information

ONOS OVERVIEW. Architecture, Abstractions & Application

ONOS OVERVIEW. Architecture, Abstractions & Application ONOS OVERVIEW Architecture, Abstractions & Application WHAT IS ONOS? Open Networking Operating System (ONOS) is an open source SDN network operating system (controller). Mission: to enable Service Providers

More information

Distributed Systems. Hajussüsteemid MTAT Distributed File Systems. (slides: adopted from Meelis Roos DS12 course) 1/25

Distributed Systems. Hajussüsteemid MTAT Distributed File Systems. (slides: adopted from Meelis Roos DS12 course) 1/25 Hajussüsteemid MTAT.08.024 Distributed Systems Distributed File Systems (slides: adopted from Meelis Roos DS12 course) 1/25 Examples AFS NFS SMB/CIFS Coda Intermezzo HDFS WebDAV 9P 2/25 Andrew File System

More information

Architecting Network for Branch Offices with Cisco Unified Wireless

Architecting Network for Branch Offices with Cisco Unified Wireless Architecting Network for Branch Offices with Cisco Unified Wireless Karan Sheth - Sr. Technical Marketing Engineer Objective Design & Deploy Branch Network That Increases Business Resiliency 2 Agenda Learn

More information

1 Modular architecture

1 Modular architecture 1 Modular architecture UI customization IIS ID assignment Authorizer selection HTML/CSS/JS HTML/CSS/JS skin skin API User module Admin module Attribute validation Resource assignment Escalation / delegation

More information

416 Distributed Systems. March 23, 2018 CDNs

416 Distributed Systems. March 23, 2018 CDNs 416 Distributed Systems March 23, 2018 CDNs Outline DNS Design (317) Content Distribution Networks 2 Typical Workload (Web Pages) Multiple (typically small) objects per page File sizes are heavy-tailed

More information

Before You Update: Important Notes

Before You Update: Important Notes Before you update, familiarize yourself with the update process, the system's behavior during the update, compatibility issues, and required pre or post-update configuration changes. Caution Note Do not

More information

Scalable overlay Networks

Scalable overlay Networks Scalable overlay Networks Dr. Samu Varjonen 15.02.2018 Scalable overlay networks 15.02.2018 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01.

More information

CSE 124: CONTENT-DISTRIBUTION NETWORKS. George Porter December 4, 2017

CSE 124: CONTENT-DISTRIBUTION NETWORKS. George Porter December 4, 2017 CSE 124: CONTENT-DISTRIBUTION NETWORKS George Porter December 4, 2017 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) Creative Commons

More information

More on Testing and Large Scale Web Apps

More on Testing and Large Scale Web Apps More on Testing and Large Scale Web Apps Testing Functionality Tests - Unit tests: E.g. Mocha - Integration tests - End-to-end - E.g. Selenium - HTML CSS validation - forms and form validation - cookies

More information

SCI - NIH/NCRR Site. Web Log Analysis Yearly Report Report Range: 01/01/ :00:00-12/31/ :59:59.

SCI - NIH/NCRR Site. Web Log Analysis Yearly Report Report Range: 01/01/ :00:00-12/31/ :59:59. SCI - NIH/NCRR Site Web Log Analysis Yearly Report 2003 Report Range: 01/01/2003 00:00:00-12/31/2003 23:59:59 www.webtrends.com Table of Contents General Statistics...5 Page Views Over Time...8 Top Pages

More information

CSE 124: Networked Services Lecture-15

CSE 124: Networked Services Lecture-15 Fall 2010 CSE 124: Networked Services Lecture-15 Instructor: B. S. Manoj, Ph.D http://cseweb.ucsd.edu/classes/fa10/cse124 11/18/2010 CSE 124 Networked Services Fall 2010 1 Updates Signup sheet for PlanetLab

More information

FUJITSU Cloud Service K5 - API Management Service Description

FUJITSU Cloud Service K5 - API Management Service Description FUJITSU Cloud Service K5 - API Management Service Description August 8, 2018 1. API Management Service Overview API Management Service is built on Apigee Edge, an integrated API platform product provided

More information

Reducing Outgoing Traffic of Proxy Cache by Using Client-Cluster

Reducing Outgoing Traffic of Proxy Cache by Using Client-Cluster Reducing Outgoing Traffic of Proxy Cache by Using Client-Cluster Kyungbaek Kim and Daeyeon Park Abstract: Many web cache systems and policies concerning them have been proposed. These studies, however,

More information

Today: World Wide Web! Traditional Web-Based Systems!

Today: World Wide Web! Traditional Web-Based Systems! Today: World Wide Web! WWW principles Case Study: web caching as an illustrative example Invalidate versus updates Push versus Pull Cooperation between replicas Lecture 22, page 1 Traditional Web-Based

More information

Deploying the BIG-IP System v10 with Oracle s BEA WebLogic

Deploying the BIG-IP System v10 with Oracle s BEA WebLogic DEPLOYMENT GUIDE Deploying the BIG-IP System v10 with Oracle s BEA WebLogic Version 1.0 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Oracle s BEA WebLogic Prerequisites and

More information

Web Caching and Content Delivery

Web Caching and Content Delivery Web Caching and Content Delivery Caching for a Better Web Performance is a major concern in the Web Proxy caching is the most widely used method to improve Web performance Duplicate requests to the same

More information

Privileged Remote Access Failover Configuration

Privileged Remote Access Failover Configuration Privileged Remote Access Failover Configuration 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property of

More information

Network Coordinates in the Wild

Network Coordinates in the Wild Network Coordinates in the Wild Jonathan Ledlie Margo Seltzer Paul Gardner Harvard University Aelitis / Azureus Hourglass Project http://www.eecs.harvard.edu/~syrah/hourglass Jonathan Ledlie - Harvard

More information

Distributed redirection for the Globule platform

Distributed redirection for the Globule platform Distributed redirection for the Globule platform Aline Baggio October 2004 Technical report IR-CS-010 Abstract Replication in the World-Wide Web covers a wide range of techniques. Often, the redirection

More information

Data Processing at the Speed of 100 Gbps using Apache Crail. Patrick Stuedi IBM Research

Data Processing at the Speed of 100 Gbps using Apache Crail. Patrick Stuedi IBM Research Data Processing at the Speed of 100 Gbps using Apache Crail Patrick Stuedi IBM Research The CRAIL Project: Overview Data Processing Framework (e.g., Spark, TensorFlow, λ Compute) Spark-IO Albis Pocket

More information

Multi-Level Priority Queues

Multi-Level Priority Queues The (MPQ) feature allows you to configure multiple priority queues for multiple traffic classes by specifying a different priority level for each of the traffic classes in a single service policy map.

More information

Applied Architectures

Applied Architectures Applied Architectures Software Architecture Lecture 17 Copyright Richard N. Taylor, Nenad Medvidovic, and Eric M. Dashofy. All rights reserved. Objectives Illustrate how principles have been used to solve

More information

Secure Access Troubleshooting Rewrite related issues (Core/Web Based Access)

Secure Access Troubleshooting Rewrite related issues (Core/Web Based Access) Secure Access Troubleshooting Rewrite related issues (Core/Web Based Access) Published June 2015 Why do certain web-based applications have issues through the rewrite engine compared to accessing the resource

More information

INF3190 Data Communication. Application Layer

INF3190 Data Communication. Application Layer Application Layer Carsten Griwodz Email: griff@ifi.uio.no Coding for adaptation Adapt audiovisual quality to your bandwidth share Coding for Adaptive Streaming: MPEG-1 Frames can be dropped In a controlled

More information

CSE 486/586 Distributed Systems

CSE 486/586 Distributed Systems CSE 486/586 Distributed Systems Content Distribution Networks Slides by Steve Ko Computer Sciences and Engineering University at Buffalo CSE 486/586 Understanding Your Workload Engineering principle Make

More information

MySQL As A Service. Operationalizing 19 Years of Infrastructure at GoDaddy

MySQL As A Service. Operationalizing 19 Years of Infrastructure at GoDaddy MySQL As A Service Operationalizing 19 Years of Infrastructure at GoDaddy WHOAMI Nathan Northcutt Senior Software Engineer MySQL DevOps ~10 years performance engineering & distributed data services. Email:

More information

Apéndice B. Reportes de Pruebas de Estrés

Apéndice B. Reportes de Pruebas de Estrés Apéndice B Reportes de Pruebas de Estrés Apéndice B Reportes de Pruebas de Estrés Paessler Web Server Stress Tool Test Report ** Test Logfile by Webserver Stress Tool, Version. Trial Edition ** - by Paessler

More information

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology 2005 / High Speed Networks II Outline Introduction Mobility Support Overview of IPv6 Mobility Support Handover Management Mobility Support What means Mobility Support? allow transparent routing of IPv6

More information

BIG-IP Access Policy Manager : Secure Web Gateway. Version 12.1

BIG-IP Access Policy Manager : Secure Web Gateway. Version 12.1 BIG-IP Access Policy Manager : Secure Web Gateway Version 12.1 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...11 About Secure Web Gateway for web access...11 About the benefits

More information

FutureNet IV Fourth International Workshop on the Network of the Future, in conjunction with IEEE ICC

FutureNet IV Fourth International Workshop on the Network of the Future, in conjunction with IEEE ICC Sasu Tarkoma, Dmitriy Kuptsov, and Petri Savolainen Helsinki Institute for Information Technology University of Helsinki and Aalto University Pasi Sarolahti Aalto University FutureNet IV Fourth International

More information

Evaluating external network bandwidth load for Google Apps

Evaluating external network bandwidth load for Google Apps Evaluating external network bandwidth load for Google Apps This document describes how to perform measurements to better understand how much network load will be caused by using a software as a service

More information

CS November 2017

CS November 2017 Distributed Systems 21. Delivery Networks () Paul Krzyzanowski Rutgers University Fall 2017 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance Flash

More information

Ambry: LinkedIn s Scalable Geo- Distributed Object Store

Ambry: LinkedIn s Scalable Geo- Distributed Object Store Ambry: LinkedIn s Scalable Geo- Distributed Object Store Shadi A. Noghabi *, Sriram Subramanian +, Priyesh Narayanan +, Sivabalan Narayanan +, Gopalakrishna Holla +, Mammad Zadeh +, Tianwei Li +, Indranil

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

Overview. Internet in Pakistan. How I Stumbled Upon this? Information Access and Communication Networks in the Developing-world. Poor Man s Broadband

Overview. Internet in Pakistan. How I Stumbled Upon this? Information Access and Communication Networks in the Developing-world. Poor Man s Broadband Digital Divide Information Access and Communication Networks in the Developing-world Umar Saif LUMS, Pakistan umar@lums.edu.pk umar@mit.edu Overview Poor Man s Broadband Poor Man s Cache Packet Containment

More information

Topics in P2P Networked Systems

Topics in P2P Networked Systems 600.413 Topics in P2P Networked Systems Week 4 Measurements Andreas Terzis Slides from Stefan Saroiu Content Delivery is Changing Thirst for data continues to increase (more data & users) New types of

More information

vsan Mixed Workloads First Published On: Last Updated On:

vsan Mixed Workloads First Published On: Last Updated On: First Published On: 03-05-2018 Last Updated On: 03-05-2018 1 1. Mixed Workloads on HCI 1.1.Solution Overview Table of Contents 2 1. Mixed Workloads on HCI 3 1.1 Solution Overview Eliminate the Complexity

More information

Reliable High-Performance HTTP Infrastructure with nginx and Lua. Sean Cribbs Senior Principal Engineer, Comcast

Reliable High-Performance HTTP Infrastructure with nginx and Lua. Sean Cribbs Senior Principal Engineer, Comcast Reliable High-Performance HTTP Infrastructure with nginx and Lua Sean Cribbs Senior Principal Engineer, Comcast Cable @seancribbs Background Consumer Consumer Internal Internal Consumer Partner API Management

More information