Relative Reduced Hops

Size: px
Start display at page:

Download "Relative Reduced Hops"

Transcription

1 GreedyDual-Size: A Cost-Aware WWW Proxy Caching Algorithm Pei Cao Sandy Irani y 1 Introduction As the World Wide Web has grown in popularity in recent years, the percentage of network trac due to HTTP requests has steadily increased. Recent reports show that Web trac has constituted 40% of the network trac in 1996, compared to only 19% in Since the majority of Web documents requested are static documents (i.e. home pages, audio and video les), caching at various network points provides a natural way to reduce web trac. A common form of web caching is caching at HTTP proxies. Key to the eectiveness of proxy caches is a document replacement algorithm that can yield high hit ratio. Unfortunately, conventional wisdom which has been gained in the context of le caching and virtual memory page replacement does not necessarily transfer to Web caching. There are three primary dierences between Web caching and conventional paging problems. First, web caching is variable-size caching. Due to the restriction in HTTP protocols that allows only whole- le transfers, a cache hit only happens if the entire le is cached, while web documents vary dramatically in size. Second, web pages take dierent amount of time to download. A proxy that wishes to reduce the average latency of web accesses may want to adjust its replacement strategy based on the downloading latency. Third, access streams seen by the proxy cache is the union of web access streams from tens to thousands of users, instead of coming from a few programmed source as in the case of operating system paging. In addition, proxy caches are in a unique position to aect web trac on the Internet. Since the replacement algorithm decides whether a document gets cached and which documents are replaced, it affects which future requests will be cache hits. Thus, if Department of Computer Science, University of Wisconsin- Madison, cao@cs.wisc.edu. yinformation and Computer Science Department, University of California-Irvine, irani@ics.uci.edu. the institution employing the proxy must pay more on some network links than others, the replacement algorithm can favor expensive documents (i.e. those travelling through the expensive links) over cheap documents. If it is known that certain network paths are heavily congested, the caching algorithm can retain more documents which must travel on congested paths. Finally, the proxy cache can reduce its contribution to the network router load by caching more documents that travel many hops than those that travel few hops. Web cache replacement algorithms can incorporate these considerations by associating an appropriate network cost with every document. and minimizing the total cost incurred over a particular access stream. In this paper, we introduce a new algorithm, called GreedyDual-Size, which combines locality, size and latency/cost concerns eectively to achieve the best overall performance. GreedyDual-Size is a variation on a simple and elegant algorithm called GreedyDual (designed by Neal Young [You91b]), which handles uniform-size variable-cost cache replacement. Using trace-driven simulation, we show that GreedyDual- Size with appropriate cost denitions outperforms existing web caching algorithms in a number of performance aspects, including hit ratios, latency reduction, and network cost reduction. Due to space limitation we only report a subset of our results here; more details can be found in [CI97]. 2 Algorithm GreedyDual-Size The original GreedyDual algorithm is proposed by Young and Tarjan [You91b]. It is concerned with the case when pages in a cache have the same size, but incur dierent costs to fetch from a secondary storage. The algorithm associates a value, H, with each cached page p. Initially, when a page is brought into cache, H is set to be the cost of bringing the page into the cache (the cost is always non-negative). When a replacement needs to be made, the page with the

2 Algorithm GreedyDual: Initialize L 0. Process each request document in turn: The current request is for document p: (1) if p is already in memory, (2) H(p) L + c(p)=s(p). (3) if p is not in memory, (4) while there is not enough room in memory for p, (5) Let L min q2m H(q). (6) Evict q such that H(q) = L. (7) Bring p into memory and set H(p) L + c(p)=s(p) end Figure 1: Greedy Dual Algorithm. lowest H value, min H, is replaced, and then all pages reduce their H values by min H. If a page is accessed, its H value is restored to the cost of bringing it into the cache. Thus, the H values of recently accessed pages retain a larger portion of the original cost than those of pages that have not been accessed for a long time. By reducing the H values as time goes on and restoring them upon access, the algorithm integrates the locality and cost concerns in a seamless fashion. To incorporate the dierence sizes of the document, we extends the GreedyDual algorithm by setting H to cost=size upon accesses to a document, where cost is the cost of bringing the document, and size is the size of the document in bytes. We called the extended version the GreedyDual-Size algorithm. The denition of cost depends on the goal of the replacement algorithm: cost is set to 1 if the goal is to maximize hit ratio, it is set to the downloading latency if the goal is to minimize average latency, and it is set to the network cost if the goal is to minimize the total cost. At the rst glance, GreedyDual-Size would require k subtractions when a replacement is made, where k is the number of documents in cache. However, a different way of recording H removes these subtractions. The idea is to keep an \ination" value L, and let all future setting of H be oset by L. Figure 1 shows an ecient implementation of the algorithm. Using this technique, GreedyDual-Size can be implemented by maintaining a priority queue on the documents, based on their H value. Handling a hit requires O(log k) time and handling an eviction requires O(log k) time, since in both cases the queue needs update. 3 Simulation Results We compare the performance of GreedyDual-Size with, Size, Hybrid, and LRV. Size, Hybrid, LRV are \champion" algorithms on improving hit ratio and reducing average latency, as reported in [WASAF96, LRV97, WA97]. Size replaces the largest document in the cache rst. Hybrid is designed to minimize average downloading time, and it replaces the document with the lowest value of the function c s + W b b s z p (n p ) Wn, where c s is the estimated time to connect to the server, b s is the estimated bandwidth to the server, z p is the size of the document, n p is the number of times the document has been referenced, and W b and W n are constants. LRV replaces the document with the lowest value of the following function: V (i; t; s) = P1 (s)(1? D(t)) if i = 1 P i (1? D(t)) otherwise where i is the number of times the document has been accessed, t is time of last reference to the document, s is the size of the document, P i is the conditional probability that a document is reference i + 1 times given that it has been accessed i times, P i (s) is the conditional probability specic to documents of size s, and D(t) is calculated by: D(t) = :035 log(t + 1) + :45 1? e?t 2e6 : Essentially, LRV tries to improve hit ratios by taking into account of a document's reference frequency, time of last reference, and size. We consider four aspects of web caching benets: hit ratio, byte hit ratio, reduced latency, and reduced hops. By reduced latency, we mean the sum of downloading latency for the pages that hit in cache as a percentage of the sum of all downloading latencies. By reduced hops, we mean the sum of the network costs for the pages that hit in cache as a percentage of the sum of the network costs of all Web pages. We model the network cost associated with each document as \hops". In our simulation, each Web server has a hop value of 1 or 32, and we assign 1=8 of the servers with hop value 32, and 7=8 with hop value 1. The hop value can be thought of either as the number of network hops travelled by a document, or as the monetary cost associated with the document. We present the results on a subset of Digital Equipment Cooperations WWW proxy traces [DEC96](results on other proxy traces can be found in [CI97]). The subset includes HTTP requests made by users 0-512

3 Trace Total Total Hit Byte Reduced Reduced Requests GB Rate HR Latency Hops 8/29-9/ /5-9/ /12-9/ /19-9/ Table 1: Benets under a cache of innite size for each trace, measured as hit ratio, byte hit ratio, reduced latency, and reduced hops. The table also lists the total requests and the total data set size in GB for each trace. during each week, for the three and half week period from 8/29/96 to 9/22/96. Table 1 shows the performance benets under an innite-size cache for these traces. We consider GreedyDual-Size with three cost definitions. sets the cost for each document to be 1, thus trying to maximize hit ratio. GD- Size(packets) sets the cost for each document to 2 + size=536, i.e. estimated number of network packets sent and received if a miss to the document happens (1 packet for the request, 1 packet for the reply, and size=536 for extra data packets, assuming a 536-byte TCP segment size). It tries to maximize both hit ratio and byte hit ratio. Finally, GD-Size(hops) sets the cost for each document to the hop value of the document, trying to minimize network costs. Figures 2 and 3 show the hit ratio, byte hit ratio, reduced latency and reduced hops for various algorithms. The cache sizes are 0.5%, 5%, 10%, and 20% of the total data set sizes in each trace. The data are shown as a percentage of the corresponding value under the innite cache. The graphs show the averaged results on the four traces. The results show that provides the highest hit ratio and reduced latency, provides the highest byte hit ratio and relatively high hit ratio, and GD-Size(hops) provides the highest reduced hops. and GD-Size(hops) approaches the maximal achievable benets very fast, having over 95% of the maximal hit ratio or reduced hops when the cache size is only 5% of the total data set size. Some observations can help explain our results. GreedyDual-Size combines the locality, size and cost of a document by using (cost=size) (i.e. savings per byte) as the H value of a cached document. It then subtracts the H value of each document as it makes replacements, and re-instates the H value if a document is accessed again. Thus, a document with high H is initially cached, but if it is not accessed for a long time, it will be replaced. By subtracting and re-instating H, GreedyDual-Size combines locality, cost and size considerations without using any weight function or parameters. In contrast, does not consider document sizes and Size does not consider locality. LRV consider all relevant factors, but combines them in a complicated function that makes its performance trace-dependent. Hybrid performs poorly because it ignores the locality in reference streams, and thus has a very low hit ratio, which in turn results in low latency savings. In summary, if a proxy wants high hit ratio or low average latency, is the appropriate algorithm. If the proxy desires high byte hit ratio as well, then achieves a good balance among the dierent goals. If documents have associated network or monetary costs that do not change over time, or change slowly over time, then GD-Size(hops) is the appropriate replacement algorithm. 4 Conclusion In this paper, we introduce GreedyDual-Size web cache replacement algorithm, and show that it incorporates locality, size and cost considerations eectively to achieve the best performance. We also show that under GreedyDual- Size, web caches have the potential to regulate Web trac to avoid congested links. References [LRV97] P. Lorenzetti, L. Rizzo and L. Vicisano. Replacement Policies for a Proxy Cache. Manuscript. [CI97] Pei Cao and Sandy Irani. Cost-Aware Web Proxy Caching. Technical Report CS-1343, Computer Science Department, University of Wisconsin-Madison. [DEC96] Digital Equipment Cooperation, Digital's Web Proxy Traces ftp://ftp.digital.com/pub/dec/traces/proxy/webtraces.html.

4 LRV LRV Relative Hit Ratio Relative Byte Hit Ratio Figure 2: Relative hit ratio and byte hit ratio for, Size, LRV,, and. Hybrid GD-Size(hops) Relative Reduced Latency Relative Reduced Hops Figure 3: The left gure shows the relative reduced latency for, Size, Hybrid, and GD- Size(packets), and the right gure shows the relative reduced hops for, Size, and GD-Size(hops).

5 [WASAF96] S. Williams, M. Abrams, C.R. Standbridge, G.Abdulla and E.A. Fox. Removal Policies in Network Caches for World-Wide Web Documents. In Proceedings of the ACM Sigcomm96, August, 1996, Stanford University. [WA97] R. Wooster and M. Abrams. Proxy Caching the Estimates Page Load Delays. To appear in the 6th International World Wide Web Conference. [You91b] N. Young. The k-server dual and loose competitiveness for paging. Algorithmica, To appear. Rewritten version of \On-line caching as cache size varies", in The 2nd Annual ACM- SIAM Symposium on Discrete Algorithms, , 1991.

Trace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers

Trace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers Proceeding of the 9th WSEAS Int. Conference on Data Networks, Communications, Computers, Trinidad and Tobago, November 5-7, 2007 378 Trace Driven Simulation of GDSF# and Existing Caching Algorithms for

More information

Role of Aging, Frequency, and Size in Web Cache Replacement Policies

Role of Aging, Frequency, and Size in Web Cache Replacement Policies Role of Aging, Frequency, and Size in Web Cache Replacement Policies Ludmila Cherkasova and Gianfranco Ciardo Hewlett-Packard Labs, Page Mill Road, Palo Alto, CA 9, USA cherkasova@hpl.hp.com CS Dept.,

More information

An Efficient Web Cache Replacement Policy

An Efficient Web Cache Replacement Policy In the Proc. of the 9th Intl. Symp. on High Performance Computing (HiPC-3), Hyderabad, India, Dec. 23. An Efficient Web Cache Replacement Policy A. Radhika Sarma and R. Govindarajan Supercomputer Education

More information

A New Web Cache Replacement Algorithm 1

A New Web Cache Replacement Algorithm 1 A New Web Cache Replacement Algorithm Anupam Bhattacharjee, Biolob Kumar Debnath Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology, Dhaka-, Bangladesh

More information

Improving object cache performance through selective placement

Improving object cache performance through selective placement University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2006 Improving object cache performance through selective placement Saied

More information

Online paging and caching

Online paging and caching Title: Online paging and caching Name: Neal E. Young 1 Affil./Addr. University of California, Riverside Keywords: paging; caching; least recently used; -server problem; online algorithms; competitive analysis;

More information

Optimization of Proxy Caches using Proxy Filters

Optimization of Proxy Caches using Proxy Filters Optimization of Proxy Caches using Proxy Filters Fabian Weber, Marcel Daneck, Christoph Reich Hochschule Furtwangen University 78120 Furtwangen, Germany {fabian.weber, marcel.daneck, christoph.reich}@hs-furtwangen.de

More information

Web Proxy Cache Replacement Policies Using Decision Tree (DT) Machine Learning Technique for Enhanced Performance of Web Proxy

Web Proxy Cache Replacement Policies Using Decision Tree (DT) Machine Learning Technique for Enhanced Performance of Web Proxy Web Proxy Cache Replacement Policies Using Decision Tree (DT) Machine Learning Technique for Enhanced Performance of Web Proxy P. N. Vijaya Kumar PhD Research Scholar, Department of Computer Science &

More information

COMMON INTERNET FILE SYSTEM PROXY

COMMON INTERNET FILE SYSTEM PROXY COMMON INTERNET FILE SYSTEM PROXY CS739 PROJECT REPORT ANURAG GUPTA, DONGQIAO LI {anurag, dongqiao}@cs.wisc.edu Computer Sciences Department University of Wisconsin, Madison Madison 53706, WI May 15, 1999

More information

A CONTENT-TYPE BASED EVALUATION OF WEB CACHE REPLACEMENT POLICIES

A CONTENT-TYPE BASED EVALUATION OF WEB CACHE REPLACEMENT POLICIES A CONTENT-TYPE BASED EVALUATION OF WEB CACHE REPLACEMENT POLICIES F.J. González-Cañete, E. Casilari, A. Triviño-Cabrera Department of Electronic Technology, University of Málaga, Spain University of Málaga,

More information

Study of Piggyback Cache Validation for Proxy Caches in the World Wide Web

Study of Piggyback Cache Validation for Proxy Caches in the World Wide Web The following paper was originally published in the Proceedings of the USENIX Symposium on Internet Technologies and Systems Monterey, California, December 997 Study of Piggyback Cache Validation for Proxy

More information

Popularity-Aware GreedyDual-Size Web Proxy Caching Algorithms

Popularity-Aware GreedyDual-Size Web Proxy Caching Algorithms Boston University OpenBU Computer Science http://open.bu.edu CAS: Computer Science: Technical Reports 1999-8-21 Popularity-Aware GreedyDual-Size Web Proxy Caching Algorithms Jin, Shudong Boston University

More information

Abstract Studying network protocols and distributed applications in real networks can be dicult due to the need for complex topologies, hard to nd phy

Abstract Studying network protocols and distributed applications in real networks can be dicult due to the need for complex topologies, hard to nd phy ONE: The Ohio Network Emulator Mark Allman, Adam Caldwell, Shawn Ostermann mallman@lerc.nasa.gov, adam@eni.net ostermann@cs.ohiou.edu School of Electrical Engineering and Computer Science Ohio University

More information

THE CACHE REPLACEMENT POLICY AND ITS SIMULATION RESULTS

THE CACHE REPLACEMENT POLICY AND ITS SIMULATION RESULTS THE CACHE REPLACEMENT POLICY AND ITS SIMULATION RESULTS 1 ZHU QIANG, 2 SUN YUQIANG 1 Zhejiang University of Media and Communications, Hangzhou 310018, P.R. China 2 Changzhou University, Changzhou 213022,

More information

Seminar on. By Sai Rahul Reddy P. 2/2/2005 Web Caching 1

Seminar on. By Sai Rahul Reddy P. 2/2/2005 Web Caching 1 Seminar on By Sai Rahul Reddy P 2/2/2005 Web Caching 1 Topics covered 1. Why Caching 2. Advantages of Caching 3. Disadvantages of Caching 4. Cache-Control HTTP Headers 5. Proxy Caching 6. Caching architectures

More information

Evaluating the Impact of Different Document Types on the Performance of Web Cache Replacement Schemes *

Evaluating the Impact of Different Document Types on the Performance of Web Cache Replacement Schemes * Evaluating the Impact of Different Document Types on the Performance of Web Cache Replacement Schemes * Christoph Lindemann and Oliver P. Waldhorst University of Dortmund Department of Computer Science

More information

Web Proxy Cache Replacement: Do's, Don'ts, and Expectations

Web Proxy Cache Replacement: Do's, Don'ts, and Expectations Web Proxy Cache Replacement: Do's, Don'ts, and Expectations Peter Triantafillou {peter@ceid.upatras.gr} and Ioannis Aekaterinidis {jaikater@softnet.tuc.gr} Department of Computer Engineering and Informatics,

More information

Bloom Filters. References:

Bloom Filters. References: Bloom Filters References: Li Fan, Pei Cao, Jussara Almeida, Andrei Broder, Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol, IEEE/ACM Transactions on Networking, Vol. 8, No. 3, June 2000.

More information

Chapter The LRU* WWW proxy cache document replacement algorithm

Chapter The LRU* WWW proxy cache document replacement algorithm Chapter The LRU* WWW proxy cache document replacement algorithm Chung-yi Chang, The Waikato Polytechnic, Hamilton, New Zealand, itjlc@twp.ac.nz Tony McGregor, University of Waikato, Hamilton, New Zealand,

More information

Cache Replacement Strategies for Scalable Video Streaming in CCN

Cache Replacement Strategies for Scalable Video Streaming in CCN Cache Replacement Strategies for Scalable Video Streaming in CCN Junghwan Lee, Kyubo Lim, and Chuck Yoo Dept. Computer Science and Engineering Korea University Seoul, Korea {jhlee, kblim, chuck}@os.korea.ac.kr

More information

An Integration Approach of Data Mining with Web Cache Pre-Fetching

An Integration Approach of Data Mining with Web Cache Pre-Fetching An Integration Approach of Data Mining with Web Cache Pre-Fetching Yingjie Fu 1, Haohuan Fu 2, and Puion Au 2 1 Department of Computer Science City University of Hong Kong, Hong Kong SAR fuyingjie@tsinghua.org.cn

More information

An Efficient LFU-Like Policy for Web Caches

An Efficient LFU-Like Policy for Web Caches An Efficient -Like Policy for Web Caches Igor Tatarinov (itat@acm.org) Abstract This study proposes Cubic Selection Sceme () a new policy for Web caches. The policy is based on the Least Frequently Used

More information

On Caching Search Engine Results

On Caching Search Engine Results Abstract: On Caching Search Engine Results Evangelos P. Markatos Institute of Computer Science (ICS) Foundation for Research & Technology - Hellas (FORTH) P.O.Box 1385 Heraklio, Crete, GR-711-10 GREECE

More information

GreedyDual* Web Caching Algorithm Exploiting the Two Sources of Temporal Locality in Web Request Streams Λ Shudong Jin and Azer Bestavros Computer Sci

GreedyDual* Web Caching Algorithm Exploiting the Two Sources of Temporal Locality in Web Request Streams Λ Shudong Jin and Azer Bestavros Computer Sci GreedyDual* Web Caching Algorithm Exploiting the Two Sources of Temporal Locality in Web Request Streams Λ Shudong Jin and Azer Bestavros Computer Science Department Boston University Boston, MA 2215 fjins,bestg@cs.bu.edu

More information

request is not a cache hit when the summary indicates so (a false hit), the penalty is a wasted query message. If the request is a cache hit when the

request is not a cache hit when the summary indicates so (a false hit), the penalty is a wasted query message. If the request is a cache hit when the Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol Li Fan, Pei Cao, and Jussara Almeida Department of Computer Science University of Wisconsin-Madison flfan,cao,jussarag@cs.wisc.edu Andrei

More information

CIT 668: System Architecture. Caching

CIT 668: System Architecture. Caching CIT 668: System Architecture Caching Topics 1. Cache Types 2. Web Caching 3. Replacement Algorithms 4. Distributed Caches 5. memcached A cache is a system component that stores data so that future requests

More information

Operating Systems. Memory: replacement policies

Operating Systems. Memory: replacement policies Operating Systems Memory: replacement policies Last time caching speeds up data lookups if the data is likely to be re-requested again data structures for O(1)-lookup data source set-associative (hardware)

More information

Interme diate DNS. Local browse r. Authorit ative ... DNS

Interme diate DNS. Local browse r. Authorit ative ... DNS WPI-CS-TR-00-12 July 2000 The Contribution of DNS Lookup Costs to Web Object Retrieval by Craig E. Wills Hao Shang Computer Science Technical Report Series WORCESTER POLYTECHNIC INSTITUTE Computer Science

More information

Reducing Disk Latency through Replication

Reducing Disk Latency through Replication Gordon B. Bell Morris Marden Abstract Today s disks are inexpensive and have a large amount of capacity. As a result, most disks have a significant amount of excess capacity. At the same time, the performance

More information

GD-Wheel: A Cost-Aware Replacement Policy for Key-Value Stores

GD-Wheel: A Cost-Aware Replacement Policy for Key-Value Stores GD-Wheel: A Cost-Aware Replacement Policy for Key-Value Stores Conglong Li Carnegie Mellon University conglonl@cs.cmu.edu Alan L. Cox Rice University alc@rice.edu Abstract Memory-based key-value stores,

More information

The Last-Copy Approach for Distributed Cache Pruning in a Cluster of HTTP Proxies

The Last-Copy Approach for Distributed Cache Pruning in a Cluster of HTTP Proxies The Last-Copy Approach for Distributed Cache Pruning in a Cluster of HTTP Proxies Reuven Cohen and Itai Dabran Technion, Haifa 32000, Israel Abstract. Web caching has been recognized as an important way

More information

Characterizing Document Types to Evaluate Web Cache Replacement Policies

Characterizing Document Types to Evaluate Web Cache Replacement Policies Characterizing Document Types to Evaluate Web Cache Replacement Policies F.J. Gonzalez-Cañete, E. Casilari, Alicia Triviño-Cabrera Dpto. Tecnología Electrónica, Universidad de Málaga, E.T.S.I. Telecomunicación,

More information

The Multikey Web Cache Simulator: a Platform for Designing Proxy Cache Management Techniques

The Multikey Web Cache Simulator: a Platform for Designing Proxy Cache Management Techniques The Multikey Web Cache Simulator: a Platform for Designing Proxy Cache Management Techniques L.G. Cárdenas, J. Sahuquillo, A. Pont, and J.A. Gil 1 Departamento de Informática de Sistemas y Computadores

More information

FB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network

FB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network Congestion-free Routing of Streaming Multimedia Content in BMIN-based Parallel Systems Harish Sethu Department of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104, USA sethu@ece.drexel.edu

More information

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,

More information

Improving the Performances of Proxy Cache Replacement Policies by Considering Infrequent Objects

Improving the Performances of Proxy Cache Replacement Policies by Considering Infrequent Objects Improving the Performances of Proxy Cache Replacement Policies by Considering Infrequent Objects Hon Wai Leong Department of Computer Science National University of Singapore 3 Science Drive 2, Singapore

More information

Performance Consequences of Partial RED Deployment

Performance Consequences of Partial RED Deployment Performance Consequences of Partial RED Deployment Brian Bowers and Nathan C. Burnett CS740 - Advanced Networks University of Wisconsin - Madison ABSTRACT The Internet is slowly adopting routers utilizing

More information

Media Caching Support for Mobile Transit Clients

Media Caching Support for Mobile Transit Clients Media Caching Support for Mobile Transit Clients Hazem Gomaa Geoffrey Messier Robert Davies Department of Electrical and Computer Engineering University of Calgary Calgary, AB, Canada Email: {hagomaa,gmessier,davies}@ucalgary.ca

More information

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web TR020701 April 2002 Erbil Yilmaz Department of Computer Science The Florida State University Tallahassee, FL 32306

More information

INTEGRATING INTELLIGENT PREDICTIVE CACHING AND STATIC PREFETCHING IN WEB PROXY SERVERS

INTEGRATING INTELLIGENT PREDICTIVE CACHING AND STATIC PREFETCHING IN WEB PROXY SERVERS INTEGRATING INTELLIGENT PREDICTIVE CACHING AND STATIC PREFETCHING IN WEB PROXY SERVERS Abstract J. B. PATIL Department of Computer Engineering R. C. Patel Institute of Technology, Shirpur. (M.S.), India

More information

ENHANCING QoS IN WEB CACHING USING DIFFERENTIATED SERVICES

ENHANCING QoS IN WEB CACHING USING DIFFERENTIATED SERVICES ENHANCING QoS IN WEB CACHING USING DIFFERENTIATED SERVICES P.Venketesh 1, S.N. Sivanandam 2, S.Manigandan 3 1. Research Scholar, 2. Professor and Head, 3. Research Scholar Department of Computer Science

More information

CAMP: A Cost Adaptive Multi-Queue Eviction Policy for Key-Value Stores

CAMP: A Cost Adaptive Multi-Queue Eviction Policy for Key-Value Stores CAMP: A Cost Adaptive Multi-Queue Eviction Policy for Key-Value Stores Shahram Ghandeharizadeh, Sandy Irani, Jenny Lam, Jason Yap, Hieu Nguyen Database Laboratory Technical Report 2015-05 Computer Science

More information

Cluster quality 15. Running time 0.7. Distance between estimated and true means Running time [s]

Cluster quality 15. Running time 0.7. Distance between estimated and true means Running time [s] Fast, single-pass K-means algorithms Fredrik Farnstrom Computer Science and Engineering Lund Institute of Technology, Sweden arnstrom@ucsd.edu James Lewis Computer Science and Engineering University of

More information

Locality-Aware Request Distribution in Cluster-based Network Servers. Network servers based on clusters of commodity workstations

Locality-Aware Request Distribution in Cluster-based Network Servers. Network servers based on clusters of commodity workstations Locality-Aware Request Distribution in Cluster-based Network Servers Vivek S. Pai z, Mohit Aron y, Gaurav Banga y, Michael Svendsen y, Peter Druschel y, Willy Zwaenepoel y, Erich Nahum { z Department of

More information

Reinforcement Learning Scheme. for Network Routing. Michael Littman*, Justin Boyan. School of Computer Science. Pittsburgh, PA

Reinforcement Learning Scheme. for Network Routing. Michael Littman*, Justin Boyan. School of Computer Science. Pittsburgh, PA A Distributed Reinforcement Learning Scheme for Network Routing Michael Littman*, Justin Boyan Carnegie Mellon University School of Computer Science Pittsburgh, PA * also Cognitive Science Research Group,

More information

Popularity-Based PPM: An Effective Web Prefetching Technique for High Accuracy and Low Storage

Popularity-Based PPM: An Effective Web Prefetching Technique for High Accuracy and Low Storage Proceedings of 22 International Conference on Parallel Processing, (ICPP 22), Vancouver, Canada, August 18-21, 22. Popularity-Based : An Effective Web Prefetching Technique for High Accuracy and Low Storage

More information

Hint-based Acceleration of Web Proxy Caches. Daniela Rosu Arun Iyengar Daniel Dias. IBM T.J.Watson Research Center

Hint-based Acceleration of Web Proxy Caches. Daniela Rosu Arun Iyengar Daniel Dias. IBM T.J.Watson Research Center Hint-based Acceleration of Web Proxy Caches Daniela Rosu Arun Iyengar Daniel Dias IBM T.J.Watson Research Center P.O.Box 74, Yorktown Heights, NY 1598 Abstract Numerous studies show that proxy cache miss

More information

Cache introduction. April 16, Howard Huang 1

Cache introduction. April 16, Howard Huang 1 Cache introduction We ve already seen how to make a fast processor. How can we supply the CPU with enough data to keep it busy? The rest of CS232 focuses on memory and input/output issues, which are frequently

More information

A Top-10 Approach to Prefetching on the Web. Evangelos P. Markatos and Catherine E. Chronaki. Institute of Computer Science (ICS)

A Top-10 Approach to Prefetching on the Web. Evangelos P. Markatos and Catherine E. Chronaki. Institute of Computer Science (ICS) A Top- Approach to Prefetching on the Web Evangelos P. Markatos and Catherine E. Chronaki Institute of Computer Science (ICS) Foundation for Research & Technology { Hellas () P.O.Box 1385 Heraklio, Crete,

More information

Web Caching and Content Delivery

Web Caching and Content Delivery Web Caching and Content Delivery Caching for a Better Web Performance is a major concern in the Web Proxy caching is the most widely used method to improve Web performance Duplicate requests to the same

More information

Lightweight caching strategy for wireless content delivery networks

Lightweight caching strategy for wireless content delivery networks Lightweight caching strategy for wireless content delivery networks Jihoon Sung 1, June-Koo Kevin Rhee 1, and Sangsu Jung 2a) 1 Department of Electrical Engineering, KAIST 291 Daehak-ro, Yuseong-gu, Daejeon,

More information

MULTIMEDIA PROXY CACHING FOR VIDEO STREAMING APPLICATIONS.

MULTIMEDIA PROXY CACHING FOR VIDEO STREAMING APPLICATIONS. MULTIMEDIA PROXY CACHING FOR VIDEO STREAMING APPLICATIONS. Radhika R Dept. of Electrical Engineering, IISc, Bangalore. radhika@ee.iisc.ernet.in Lawrence Jenkins Dept. of Electrical Engineering, IISc, Bangalore.

More information

CONTENT DISTRIBUTION. Oliver Michel University of Illinois at Urbana-Champaign. October 25th, 2011

CONTENT DISTRIBUTION. Oliver Michel University of Illinois at Urbana-Champaign. October 25th, 2011 CONTENT DISTRIBUTION Oliver Michel University of Illinois at Urbana-Champaign October 25th, 2011 OVERVIEW 1. Why use advanced techniques for content distribution on the internet? 2. CoralCDN 3. Identifying

More information

Peer to Peer and Overlay Networks

Peer to Peer and Overlay Networks The impact of P2P le sharing trac on the Internet ricardo.pereira@inesc-id.pt IST 28-11-2011 1 2 3 Algorithm Evaluation 4 Implementation Evaluation 5 Details Current proposals Dominating types of trac

More information

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/220850337 On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement

More information

Memory. Objectives. Introduction. 6.2 Types of Memory

Memory. Objectives. Introduction. 6.2 Types of Memory Memory Objectives Master the concepts of hierarchical memory organization. Understand how each level of memory contributes to system performance, and how the performance is measured. Master the concepts

More information

Software and Systems Research Center, Bell Labs, Murray Hill July 26, 1996 Prefetching Techniques for the Web Azer Bestavros Computer Science Departme

Software and Systems Research Center, Bell Labs, Murray Hill July 26, 1996 Prefetching Techniques for the Web Azer Bestavros Computer Science Departme Networking and Distributed Systems Research Center, Bell Labs, Murray Hill July 25, 1996 Taming the WWW From Web Measurements to Web Protocol Design Azer Bestavros Computer Science Department Boston University

More information

Efficient FFT Algorithm and Programming Tricks

Efficient FFT Algorithm and Programming Tricks Connexions module: m12021 1 Efficient FFT Algorithm and Programming Tricks Douglas L. Jones This work is produced by The Connexions Project and licensed under the Creative Commons Attribution License Abstract

More information

MEMORY SENSITIVE CACHING IN JAVA

MEMORY SENSITIVE CACHING IN JAVA MEMORY SENSITIVE CACHING IN JAVA Iliyan Nenov, Panayot Dobrikov Abstract: This paper describes the architecture of memory sensitive Java cache, which benefits from both the on demand soft reference objects

More information

Lecture 16. Today: Start looking into memory hierarchy Cache$! Yay!

Lecture 16. Today: Start looking into memory hierarchy Cache$! Yay! Lecture 16 Today: Start looking into memory hierarchy Cache$! Yay! Note: There are no slides labeled Lecture 15. Nothing omitted, just that the numbering got out of sequence somewhere along the way. 1

More information

Plot SIZE. How will execution time grow with SIZE? Actual Data. int array[size]; int A = 0;

Plot SIZE. How will execution time grow with SIZE? Actual Data. int array[size]; int A = 0; How will execution time grow with SIZE? int array[size]; int A = ; for (int i = ; i < ; i++) { for (int j = ; j < SIZE ; j++) { A += array[j]; } TIME } Plot SIZE Actual Data 45 4 5 5 Series 5 5 4 6 8 Memory

More information

Analytical Modeling of Routing Algorithms in. Virtual Cut-Through Networks. Real-Time Computing Laboratory. Electrical Engineering & Computer Science

Analytical Modeling of Routing Algorithms in. Virtual Cut-Through Networks. Real-Time Computing Laboratory. Electrical Engineering & Computer Science Analytical Modeling of Routing Algorithms in Virtual Cut-Through Networks Jennifer Rexford Network Mathematics Research Networking & Distributed Systems AT&T Labs Research Florham Park, NJ 07932 jrex@research.att.com

More information

A Prefetch Taxonomy. Viji Srinivasan, Edward S Davidson, Gary S Tyson.

A Prefetch Taxonomy. Viji Srinivasan, Edward S Davidson, Gary S Tyson. A Prefetch Taxonomy Viji Srinivasan, Edward S Davidson, Gary S Tyson e-mail: sviji@eecs.umich.edu, davidson@eecs.umich.edu, tyson@eecs.umich.edu Abstract The dierence in processor and main memory cycle

More information

Summary Cache based Co-operative Proxies

Summary Cache based Co-operative Proxies Summary Cache based Co-operative Proxies Project No: 1 Group No: 21 Vijay Gabale (07305004) Sagar Bijwe (07305023) 12 th November, 2007 1 Abstract Summary Cache based proxies cooperate behind a bottleneck

More information

SF-LRU Cache Replacement Algorithm

SF-LRU Cache Replacement Algorithm SF-LRU Cache Replacement Algorithm Jaafar Alghazo, Adil Akaaboune, Nazeih Botros Southern Illinois University at Carbondale Department of Electrical and Computer Engineering Carbondale, IL 6291 alghazo@siu.edu,

More information

Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol

Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol Li Fan, Pei Cao and Jussara Almeida University of Wisconsin-Madison Andrei Broder Compaq/DEC System Research Center Why Web Caching One of

More information

Locality-Aware Request Distribution in Cluster-based Network Servers

Locality-Aware Request Distribution in Cluster-based Network Servers Locality-Aware Request Distribution in Cluster-based Network Servers Vivek S. Pai z, Mohit Aron y, Gaurav Banga y, Michael Svendsen y, Peter Druschel y, Willy Zwaenepoel y, Erich Nahum { z Department of

More information

1 Introduction The demand on the performance of memory subsystems is rapidly increasing with the advances in microprocessor architecture. The growing

1 Introduction The demand on the performance of memory subsystems is rapidly increasing with the advances in microprocessor architecture. The growing Tango: a Hardware-based Data Prefetching Technique for Superscalar Processors 1 Shlomit S. Pinter IBM Science and Technology MATAM Advance Technology ctr. Haifa 31905, Israel E-mail: shlomit@vnet.ibm.com

More information

Calculating lower bounds for caching problems

Calculating lower bounds for caching problems Calculating lower bounds for caching problems Leah Epstein Rob van Stee Abstract We present a general method for computing lower bounds for various caching problems. We apply the method to two well known

More information

Cache Controller with Enhanced Features using Verilog HDL

Cache Controller with Enhanced Features using Verilog HDL Cache Controller with Enhanced Features using Verilog HDL Prof. V. B. Baru 1, Sweety Pinjani 2 Assistant Professor, Dept. of ECE, Sinhgad College of Engineering, Vadgaon (BK), Pune, India 1 PG Student

More information

Small-World Datacenters

Small-World Datacenters 2 nd ACM Symposium on Cloud Computing Oct 27, 2011 Small-World Datacenters Ji-Yong Shin * Bernard Wong +, and Emin Gün Sirer * * Cornell University + University of Waterloo Motivation Conventional networks

More information

TSAR : A Two Tier Sensor Storage Architecture using Interval Skip Graphs

TSAR : A Two Tier Sensor Storage Architecture using Interval Skip Graphs TSAR : A Two Tier Sensor Storage Architecture using Interval Skip Graphs Authors: Peter Desnoyers, Deepak Ganesan, Prashant Shenoy ( University of Massachusetts, Amherst, MA) Presented by: Nikhil Raghavan

More information

Hyperbolic Caching: Flexible Caching for Web Applications

Hyperbolic Caching: Flexible Caching for Web Applications Hyperbolic Caching: Flexible Caching for Web Applications Aaron Blankstein Princeton University (now @ Blockstack Inc.) Siddhartha Sen Microsoft Research NY Michael J. Freedman Princeton University Modern

More information

Caching for NASD. Department of Computer Science University of Wisconsin-Madison Madison, WI 53706

Caching for NASD. Department of Computer Science University of Wisconsin-Madison Madison, WI 53706 Caching for NASD Chen Zhou Wanli Yang {chenzhou, wanli}@cs.wisc.edu Department of Computer Science University of Wisconsin-Madison Madison, WI 53706 Abstract NASD is a totally new storage system architecture,

More information

Q.1 Explain Computer s Basic Elements

Q.1 Explain Computer s Basic Elements Q.1 Explain Computer s Basic Elements Ans. At a top level, a computer consists of processor, memory, and I/O components, with one or more modules of each type. These components are interconnected in some

More information

forward packets do not forward packets

forward packets do not forward packets Power-aware Routing in Wireless Packet Networks Javier Gomez, Andrew T. Campbell Dept. of Electrical Engineering Columbia University, N 10027, USA Mahmoud Naghshineh, Chatschik Bisdikian IBM T.J. Watson

More information

Memory Hierarchies &

Memory Hierarchies & Memory Hierarchies & Cache Memory CSE 410, Spring 2009 Computer Systems http://www.cs.washington.edu/410 4/26/2009 cse410-13-cache 2006-09 Perkins, DW Johnson and University of Washington 1 Reading and

More information

Example: CPU-bound process that would run for 100 quanta continuously 1, 2, 4, 8, 16, 32, 64 (only 37 required for last run) Needs only 7 swaps

Example: CPU-bound process that would run for 100 quanta continuously 1, 2, 4, 8, 16, 32, 64 (only 37 required for last run) Needs only 7 swaps Interactive Scheduling Algorithms Continued o Priority Scheduling Introduction Round-robin assumes all processes are equal often not the case Assign a priority to each process, and always choose the process

More information

Why memory hierarchy

Why memory hierarchy Why memory hierarchy (3 rd Ed: p.468-487, 4 th Ed: p. 452-470) users want unlimited fast memory fast memory expensive, slow memory cheap cache: small, fast memory near CPU large, slow memory (main memory,

More information

Efficient Resource Management for the P2P Web Caching

Efficient Resource Management for the P2P Web Caching Efficient Resource Management for the P2P Web Caching Kyungbaek Kim and Daeyeon Park Department of Electrical Engineering & Computer Science, Division of Electrical Engineering, Korea Advanced Institute

More information

2 IEICE TRANS. COMMUN., VOL. 0, NO Table 1 Classication of Replacement Policies. Replacement Re-reference likelihood Non-uniformity Policies T

2 IEICE TRANS. COMMUN., VOL. 0, NO Table 1 Classication of Replacement Policies. Replacement Re-reference likelihood Non-uniformity Policies T IEICE TRANS. COMMUN., VOL. 0, NO. 0 2000 1 PAPER IEICE Transactions on Communications Exploitin Metadata of Absent Objects for Proxy Cache Consistency Jooyon Kim y,hyokyun Bahn yy, Nonmembers, and Kern

More information

IMPROVING LIVE PERFORMANCE IN HTTP ADAPTIVE STREAMING SYSTEMS

IMPROVING LIVE PERFORMANCE IN HTTP ADAPTIVE STREAMING SYSTEMS IMPROVING LIVE PERFORMANCE IN HTTP ADAPTIVE STREAMING SYSTEMS Kevin Streeter Adobe Systems, USA ABSTRACT While HTTP adaptive streaming (HAS) technology has been very successful, it also generally introduces

More information

HTRC Data API Performance Study

HTRC Data API Performance Study HTRC Data API Performance Study Yiming Sun, Beth Plale, Jiaan Zeng Amazon Indiana University Bloomington {plale, jiaazeng}@cs.indiana.edu Abstract HathiTrust Research Center (HTRC) allows users to access

More information

Heap-on-Top Priority Queues. March Abstract. We introduce the heap-on-top (hot) priority queue data structure that combines the

Heap-on-Top Priority Queues. March Abstract. We introduce the heap-on-top (hot) priority queue data structure that combines the Heap-on-Top Priority Queues Boris V. Cherkassky Central Economics and Mathematics Institute Krasikova St. 32 117418, Moscow, Russia cher@cemi.msk.su Andrew V. Goldberg NEC Research Institute 4 Independence

More information

CS 61C: Great Ideas in Computer Architecture. The Memory Hierarchy, Fully Associative Caches

CS 61C: Great Ideas in Computer Architecture. The Memory Hierarchy, Fully Associative Caches CS 61C: Great Ideas in Computer Architecture The Memory Hierarchy, Fully Associative Caches Instructor: Alan Christopher 7/09/2014 Summer 2014 -- Lecture #10 1 Review of Last Lecture Floating point (single

More information

Improving Performance of an L1 Cache With an. Associated Buer. Vijayalakshmi Srinivasan. Electrical Engineering and Computer Science,

Improving Performance of an L1 Cache With an. Associated Buer. Vijayalakshmi Srinivasan. Electrical Engineering and Computer Science, Improving Performance of an L1 Cache With an Associated Buer Vijayalakshmi Srinivasan Electrical Engineering and Computer Science, University of Michigan, 1301 Beal Avenue, Ann Arbor, MI 48109-2122,USA.

More information

Frank Miller, George Apostolopoulos, and Satish Tripathi. University of Maryland. College Park, MD ffwmiller, georgeap,

Frank Miller, George Apostolopoulos, and Satish Tripathi. University of Maryland. College Park, MD ffwmiller, georgeap, Simple Input/Output Streaming in the Operating System Frank Miller, George Apostolopoulos, and Satish Tripathi Mobile Computing and Multimedia Laboratory Department of Computer Science University of Maryland

More information

Chapter 6 Memory 11/3/2015. Chapter 6 Objectives. 6.2 Types of Memory. 6.1 Introduction

Chapter 6 Memory 11/3/2015. Chapter 6 Objectives. 6.2 Types of Memory. 6.1 Introduction Chapter 6 Objectives Chapter 6 Memory Master the concepts of hierarchical memory organization. Understand how each level of memory contributes to system performance, and how the performance is measured.

More information

Network Design Considerations for Grid Computing

Network Design Considerations for Grid Computing Network Design Considerations for Grid Computing Engineering Systems How Bandwidth, Latency, and Packet Size Impact Grid Job Performance by Erik Burrows, Engineering Systems Analyst, Principal, Broadcom

More information

Egemen Tanin, Tahsin M. Kurc, Cevdet Aykanat, Bulent Ozguc. Abstract. Direct Volume Rendering (DVR) is a powerful technique for

Egemen Tanin, Tahsin M. Kurc, Cevdet Aykanat, Bulent Ozguc. Abstract. Direct Volume Rendering (DVR) is a powerful technique for Comparison of Two Image-Space Subdivision Algorithms for Direct Volume Rendering on Distributed-Memory Multicomputers Egemen Tanin, Tahsin M. Kurc, Cevdet Aykanat, Bulent Ozguc Dept. of Computer Eng. and

More information

this approach, a write is complete when the modication is registered in the server's le system. Part of the motivation of this study is to determine w

this approach, a write is complete when the modication is registered in the server's le system. Part of the motivation of this study is to determine w Maintaining Strong Cache Consistency in the World-Wide Web Chengjie Liu and Pei Cao Department of Computer Science University of Wisconsin-Madison Madison, WI 53706 Abstract As the Web continues to explode

More information

Measuring KSA Broadband

Measuring KSA Broadband Measuring KSA Broadband Meqyas, Q2 218 Report In 217, the CITC in partnership with SamKnows launched a project to measure internet performance. The project, named Meqyas, gives internet users in Saudi

More information

An Evaluation of Information Retrieval Accuracy. with Simulated OCR Output. K. Taghva z, and J. Borsack z. University of Massachusetts, Amherst

An Evaluation of Information Retrieval Accuracy. with Simulated OCR Output. K. Taghva z, and J. Borsack z. University of Massachusetts, Amherst An Evaluation of Information Retrieval Accuracy with Simulated OCR Output W.B. Croft y, S.M. Harding y, K. Taghva z, and J. Borsack z y Computer Science Department University of Massachusetts, Amherst

More information

perform well on paths including satellite links. It is important to verify how the two ATM data services perform on satellite links. TCP is the most p

perform well on paths including satellite links. It is important to verify how the two ATM data services perform on satellite links. TCP is the most p Performance of TCP/IP Using ATM ABR and UBR Services over Satellite Networks 1 Shiv Kalyanaraman, Raj Jain, Rohit Goyal, Sonia Fahmy Department of Computer and Information Science The Ohio State University

More information

Announcement. Computer Architecture (CSC-3501) Lecture 20 (08 April 2008) Chapter 6 Objectives. 6.1 Introduction. 6.

Announcement. Computer Architecture (CSC-3501) Lecture 20 (08 April 2008) Chapter 6 Objectives. 6.1 Introduction. 6. Announcement Computer Architecture (CSC-350) Lecture 0 (08 April 008) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark Chapter 6 Objectives 6. Introduction Master the concepts of hierarchical memory

More information

2 Improved Direct-Mapped Cache Performance by the Addition of a Small Fully-Associative Cache and Prefetch Buffers [1]

2 Improved Direct-Mapped Cache Performance by the Addition of a Small Fully-Associative Cache and Prefetch Buffers [1] EE482: Advanced Computer Organization Lecture #7 Processor Architecture Stanford University Tuesday, June 6, 2000 Memory Systems and Memory Latency Lecture #7: Wednesday, April 19, 2000 Lecturer: Brian

More information

Performance Fault Masking for Network-Attached Storage Devices

Performance Fault Masking for Network-Attached Storage Devices Performance Fault Masking for Network-Attached Storage Devices Omer Zaki and Brian Forney University of Wisconsin-Madison Computer Sciences Department 1210 W. Dayton St. Madison, WI 53705 {ozaki, bforney}@cs.wisc.edu

More information

Analytical Cache Replacement for Large Caches and Multiple Block Containers

Analytical Cache Replacement for Large Caches and Multiple Block Containers Analytical Cache Replacement for Large Caches and Multiple Block Containers David Vengerov david.vengerov@oracle.com Garret Swart garret.swart@oracle.com Draft of 2011/02/14 14:48 Abstract An important

More information

performance data memory trace a.out Trace generator Performance Simulator branch trace

performance data memory trace a.out Trace generator Performance Simulator branch trace Cache Performance in Vector Supercomputers L. I. Kontothanassis y R. A. Sugumar z G. J. Faanes z J. E. Smith x M. L. Scott y y Computer Science Dept. z Cray Research Inc. x Dept. of Electrical & Computer

More information

Analyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking

Analyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking Analyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking Claudio Imbrenda Luca Muscariello Orange Labs Dario Rossi Telecom ParisTech Outline Motivation

More information