Relative Reduced Hops
|
|
- Roy McCormick
- 5 years ago
- Views:
Transcription
1 GreedyDual-Size: A Cost-Aware WWW Proxy Caching Algorithm Pei Cao Sandy Irani y 1 Introduction As the World Wide Web has grown in popularity in recent years, the percentage of network trac due to HTTP requests has steadily increased. Recent reports show that Web trac has constituted 40% of the network trac in 1996, compared to only 19% in Since the majority of Web documents requested are static documents (i.e. home pages, audio and video les), caching at various network points provides a natural way to reduce web trac. A common form of web caching is caching at HTTP proxies. Key to the eectiveness of proxy caches is a document replacement algorithm that can yield high hit ratio. Unfortunately, conventional wisdom which has been gained in the context of le caching and virtual memory page replacement does not necessarily transfer to Web caching. There are three primary dierences between Web caching and conventional paging problems. First, web caching is variable-size caching. Due to the restriction in HTTP protocols that allows only whole- le transfers, a cache hit only happens if the entire le is cached, while web documents vary dramatically in size. Second, web pages take dierent amount of time to download. A proxy that wishes to reduce the average latency of web accesses may want to adjust its replacement strategy based on the downloading latency. Third, access streams seen by the proxy cache is the union of web access streams from tens to thousands of users, instead of coming from a few programmed source as in the case of operating system paging. In addition, proxy caches are in a unique position to aect web trac on the Internet. Since the replacement algorithm decides whether a document gets cached and which documents are replaced, it affects which future requests will be cache hits. Thus, if Department of Computer Science, University of Wisconsin- Madison, cao@cs.wisc.edu. yinformation and Computer Science Department, University of California-Irvine, irani@ics.uci.edu. the institution employing the proxy must pay more on some network links than others, the replacement algorithm can favor expensive documents (i.e. those travelling through the expensive links) over cheap documents. If it is known that certain network paths are heavily congested, the caching algorithm can retain more documents which must travel on congested paths. Finally, the proxy cache can reduce its contribution to the network router load by caching more documents that travel many hops than those that travel few hops. Web cache replacement algorithms can incorporate these considerations by associating an appropriate network cost with every document. and minimizing the total cost incurred over a particular access stream. In this paper, we introduce a new algorithm, called GreedyDual-Size, which combines locality, size and latency/cost concerns eectively to achieve the best overall performance. GreedyDual-Size is a variation on a simple and elegant algorithm called GreedyDual (designed by Neal Young [You91b]), which handles uniform-size variable-cost cache replacement. Using trace-driven simulation, we show that GreedyDual- Size with appropriate cost denitions outperforms existing web caching algorithms in a number of performance aspects, including hit ratios, latency reduction, and network cost reduction. Due to space limitation we only report a subset of our results here; more details can be found in [CI97]. 2 Algorithm GreedyDual-Size The original GreedyDual algorithm is proposed by Young and Tarjan [You91b]. It is concerned with the case when pages in a cache have the same size, but incur dierent costs to fetch from a secondary storage. The algorithm associates a value, H, with each cached page p. Initially, when a page is brought into cache, H is set to be the cost of bringing the page into the cache (the cost is always non-negative). When a replacement needs to be made, the page with the
2 Algorithm GreedyDual: Initialize L 0. Process each request document in turn: The current request is for document p: (1) if p is already in memory, (2) H(p) L + c(p)=s(p). (3) if p is not in memory, (4) while there is not enough room in memory for p, (5) Let L min q2m H(q). (6) Evict q such that H(q) = L. (7) Bring p into memory and set H(p) L + c(p)=s(p) end Figure 1: Greedy Dual Algorithm. lowest H value, min H, is replaced, and then all pages reduce their H values by min H. If a page is accessed, its H value is restored to the cost of bringing it into the cache. Thus, the H values of recently accessed pages retain a larger portion of the original cost than those of pages that have not been accessed for a long time. By reducing the H values as time goes on and restoring them upon access, the algorithm integrates the locality and cost concerns in a seamless fashion. To incorporate the dierence sizes of the document, we extends the GreedyDual algorithm by setting H to cost=size upon accesses to a document, where cost is the cost of bringing the document, and size is the size of the document in bytes. We called the extended version the GreedyDual-Size algorithm. The denition of cost depends on the goal of the replacement algorithm: cost is set to 1 if the goal is to maximize hit ratio, it is set to the downloading latency if the goal is to minimize average latency, and it is set to the network cost if the goal is to minimize the total cost. At the rst glance, GreedyDual-Size would require k subtractions when a replacement is made, where k is the number of documents in cache. However, a different way of recording H removes these subtractions. The idea is to keep an \ination" value L, and let all future setting of H be oset by L. Figure 1 shows an ecient implementation of the algorithm. Using this technique, GreedyDual-Size can be implemented by maintaining a priority queue on the documents, based on their H value. Handling a hit requires O(log k) time and handling an eviction requires O(log k) time, since in both cases the queue needs update. 3 Simulation Results We compare the performance of GreedyDual-Size with, Size, Hybrid, and LRV. Size, Hybrid, LRV are \champion" algorithms on improving hit ratio and reducing average latency, as reported in [WASAF96, LRV97, WA97]. Size replaces the largest document in the cache rst. Hybrid is designed to minimize average downloading time, and it replaces the document with the lowest value of the function c s + W b b s z p (n p ) Wn, where c s is the estimated time to connect to the server, b s is the estimated bandwidth to the server, z p is the size of the document, n p is the number of times the document has been referenced, and W b and W n are constants. LRV replaces the document with the lowest value of the following function: V (i; t; s) = P1 (s)(1? D(t)) if i = 1 P i (1? D(t)) otherwise where i is the number of times the document has been accessed, t is time of last reference to the document, s is the size of the document, P i is the conditional probability that a document is reference i + 1 times given that it has been accessed i times, P i (s) is the conditional probability specic to documents of size s, and D(t) is calculated by: D(t) = :035 log(t + 1) + :45 1? e?t 2e6 : Essentially, LRV tries to improve hit ratios by taking into account of a document's reference frequency, time of last reference, and size. We consider four aspects of web caching benets: hit ratio, byte hit ratio, reduced latency, and reduced hops. By reduced latency, we mean the sum of downloading latency for the pages that hit in cache as a percentage of the sum of all downloading latencies. By reduced hops, we mean the sum of the network costs for the pages that hit in cache as a percentage of the sum of the network costs of all Web pages. We model the network cost associated with each document as \hops". In our simulation, each Web server has a hop value of 1 or 32, and we assign 1=8 of the servers with hop value 32, and 7=8 with hop value 1. The hop value can be thought of either as the number of network hops travelled by a document, or as the monetary cost associated with the document. We present the results on a subset of Digital Equipment Cooperations WWW proxy traces [DEC96](results on other proxy traces can be found in [CI97]). The subset includes HTTP requests made by users 0-512
3 Trace Total Total Hit Byte Reduced Reduced Requests GB Rate HR Latency Hops 8/29-9/ /5-9/ /12-9/ /19-9/ Table 1: Benets under a cache of innite size for each trace, measured as hit ratio, byte hit ratio, reduced latency, and reduced hops. The table also lists the total requests and the total data set size in GB for each trace. during each week, for the three and half week period from 8/29/96 to 9/22/96. Table 1 shows the performance benets under an innite-size cache for these traces. We consider GreedyDual-Size with three cost definitions. sets the cost for each document to be 1, thus trying to maximize hit ratio. GD- Size(packets) sets the cost for each document to 2 + size=536, i.e. estimated number of network packets sent and received if a miss to the document happens (1 packet for the request, 1 packet for the reply, and size=536 for extra data packets, assuming a 536-byte TCP segment size). It tries to maximize both hit ratio and byte hit ratio. Finally, GD-Size(hops) sets the cost for each document to the hop value of the document, trying to minimize network costs. Figures 2 and 3 show the hit ratio, byte hit ratio, reduced latency and reduced hops for various algorithms. The cache sizes are 0.5%, 5%, 10%, and 20% of the total data set sizes in each trace. The data are shown as a percentage of the corresponding value under the innite cache. The graphs show the averaged results on the four traces. The results show that provides the highest hit ratio and reduced latency, provides the highest byte hit ratio and relatively high hit ratio, and GD-Size(hops) provides the highest reduced hops. and GD-Size(hops) approaches the maximal achievable benets very fast, having over 95% of the maximal hit ratio or reduced hops when the cache size is only 5% of the total data set size. Some observations can help explain our results. GreedyDual-Size combines the locality, size and cost of a document by using (cost=size) (i.e. savings per byte) as the H value of a cached document. It then subtracts the H value of each document as it makes replacements, and re-instates the H value if a document is accessed again. Thus, a document with high H is initially cached, but if it is not accessed for a long time, it will be replaced. By subtracting and re-instating H, GreedyDual-Size combines locality, cost and size considerations without using any weight function or parameters. In contrast, does not consider document sizes and Size does not consider locality. LRV consider all relevant factors, but combines them in a complicated function that makes its performance trace-dependent. Hybrid performs poorly because it ignores the locality in reference streams, and thus has a very low hit ratio, which in turn results in low latency savings. In summary, if a proxy wants high hit ratio or low average latency, is the appropriate algorithm. If the proxy desires high byte hit ratio as well, then achieves a good balance among the dierent goals. If documents have associated network or monetary costs that do not change over time, or change slowly over time, then GD-Size(hops) is the appropriate replacement algorithm. 4 Conclusion In this paper, we introduce GreedyDual-Size web cache replacement algorithm, and show that it incorporates locality, size and cost considerations eectively to achieve the best performance. We also show that under GreedyDual- Size, web caches have the potential to regulate Web trac to avoid congested links. References [LRV97] P. Lorenzetti, L. Rizzo and L. Vicisano. Replacement Policies for a Proxy Cache. Manuscript. [CI97] Pei Cao and Sandy Irani. Cost-Aware Web Proxy Caching. Technical Report CS-1343, Computer Science Department, University of Wisconsin-Madison. [DEC96] Digital Equipment Cooperation, Digital's Web Proxy Traces ftp://ftp.digital.com/pub/dec/traces/proxy/webtraces.html.
4 LRV LRV Relative Hit Ratio Relative Byte Hit Ratio Figure 2: Relative hit ratio and byte hit ratio for, Size, LRV,, and. Hybrid GD-Size(hops) Relative Reduced Latency Relative Reduced Hops Figure 3: The left gure shows the relative reduced latency for, Size, Hybrid, and GD- Size(packets), and the right gure shows the relative reduced hops for, Size, and GD-Size(hops).
5 [WASAF96] S. Williams, M. Abrams, C.R. Standbridge, G.Abdulla and E.A. Fox. Removal Policies in Network Caches for World-Wide Web Documents. In Proceedings of the ACM Sigcomm96, August, 1996, Stanford University. [WA97] R. Wooster and M. Abrams. Proxy Caching the Estimates Page Load Delays. To appear in the 6th International World Wide Web Conference. [You91b] N. Young. The k-server dual and loose competitiveness for paging. Algorithmica, To appear. Rewritten version of \On-line caching as cache size varies", in The 2nd Annual ACM- SIAM Symposium on Discrete Algorithms, , 1991.
Trace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers
Proceeding of the 9th WSEAS Int. Conference on Data Networks, Communications, Computers, Trinidad and Tobago, November 5-7, 2007 378 Trace Driven Simulation of GDSF# and Existing Caching Algorithms for
More informationRole of Aging, Frequency, and Size in Web Cache Replacement Policies
Role of Aging, Frequency, and Size in Web Cache Replacement Policies Ludmila Cherkasova and Gianfranco Ciardo Hewlett-Packard Labs, Page Mill Road, Palo Alto, CA 9, USA cherkasova@hpl.hp.com CS Dept.,
More informationAn Efficient Web Cache Replacement Policy
In the Proc. of the 9th Intl. Symp. on High Performance Computing (HiPC-3), Hyderabad, India, Dec. 23. An Efficient Web Cache Replacement Policy A. Radhika Sarma and R. Govindarajan Supercomputer Education
More informationA New Web Cache Replacement Algorithm 1
A New Web Cache Replacement Algorithm Anupam Bhattacharjee, Biolob Kumar Debnath Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology, Dhaka-, Bangladesh
More informationImproving object cache performance through selective placement
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2006 Improving object cache performance through selective placement Saied
More informationOnline paging and caching
Title: Online paging and caching Name: Neal E. Young 1 Affil./Addr. University of California, Riverside Keywords: paging; caching; least recently used; -server problem; online algorithms; competitive analysis;
More informationOptimization of Proxy Caches using Proxy Filters
Optimization of Proxy Caches using Proxy Filters Fabian Weber, Marcel Daneck, Christoph Reich Hochschule Furtwangen University 78120 Furtwangen, Germany {fabian.weber, marcel.daneck, christoph.reich}@hs-furtwangen.de
More informationWeb Proxy Cache Replacement Policies Using Decision Tree (DT) Machine Learning Technique for Enhanced Performance of Web Proxy
Web Proxy Cache Replacement Policies Using Decision Tree (DT) Machine Learning Technique for Enhanced Performance of Web Proxy P. N. Vijaya Kumar PhD Research Scholar, Department of Computer Science &
More informationCOMMON INTERNET FILE SYSTEM PROXY
COMMON INTERNET FILE SYSTEM PROXY CS739 PROJECT REPORT ANURAG GUPTA, DONGQIAO LI {anurag, dongqiao}@cs.wisc.edu Computer Sciences Department University of Wisconsin, Madison Madison 53706, WI May 15, 1999
More informationA CONTENT-TYPE BASED EVALUATION OF WEB CACHE REPLACEMENT POLICIES
A CONTENT-TYPE BASED EVALUATION OF WEB CACHE REPLACEMENT POLICIES F.J. González-Cañete, E. Casilari, A. Triviño-Cabrera Department of Electronic Technology, University of Málaga, Spain University of Málaga,
More informationStudy of Piggyback Cache Validation for Proxy Caches in the World Wide Web
The following paper was originally published in the Proceedings of the USENIX Symposium on Internet Technologies and Systems Monterey, California, December 997 Study of Piggyback Cache Validation for Proxy
More informationPopularity-Aware GreedyDual-Size Web Proxy Caching Algorithms
Boston University OpenBU Computer Science http://open.bu.edu CAS: Computer Science: Technical Reports 1999-8-21 Popularity-Aware GreedyDual-Size Web Proxy Caching Algorithms Jin, Shudong Boston University
More informationAbstract Studying network protocols and distributed applications in real networks can be dicult due to the need for complex topologies, hard to nd phy
ONE: The Ohio Network Emulator Mark Allman, Adam Caldwell, Shawn Ostermann mallman@lerc.nasa.gov, adam@eni.net ostermann@cs.ohiou.edu School of Electrical Engineering and Computer Science Ohio University
More informationTHE CACHE REPLACEMENT POLICY AND ITS SIMULATION RESULTS
THE CACHE REPLACEMENT POLICY AND ITS SIMULATION RESULTS 1 ZHU QIANG, 2 SUN YUQIANG 1 Zhejiang University of Media and Communications, Hangzhou 310018, P.R. China 2 Changzhou University, Changzhou 213022,
More informationSeminar on. By Sai Rahul Reddy P. 2/2/2005 Web Caching 1
Seminar on By Sai Rahul Reddy P 2/2/2005 Web Caching 1 Topics covered 1. Why Caching 2. Advantages of Caching 3. Disadvantages of Caching 4. Cache-Control HTTP Headers 5. Proxy Caching 6. Caching architectures
More informationEvaluating the Impact of Different Document Types on the Performance of Web Cache Replacement Schemes *
Evaluating the Impact of Different Document Types on the Performance of Web Cache Replacement Schemes * Christoph Lindemann and Oliver P. Waldhorst University of Dortmund Department of Computer Science
More informationWeb Proxy Cache Replacement: Do's, Don'ts, and Expectations
Web Proxy Cache Replacement: Do's, Don'ts, and Expectations Peter Triantafillou {peter@ceid.upatras.gr} and Ioannis Aekaterinidis {jaikater@softnet.tuc.gr} Department of Computer Engineering and Informatics,
More informationBloom Filters. References:
Bloom Filters References: Li Fan, Pei Cao, Jussara Almeida, Andrei Broder, Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol, IEEE/ACM Transactions on Networking, Vol. 8, No. 3, June 2000.
More informationChapter The LRU* WWW proxy cache document replacement algorithm
Chapter The LRU* WWW proxy cache document replacement algorithm Chung-yi Chang, The Waikato Polytechnic, Hamilton, New Zealand, itjlc@twp.ac.nz Tony McGregor, University of Waikato, Hamilton, New Zealand,
More informationCache Replacement Strategies for Scalable Video Streaming in CCN
Cache Replacement Strategies for Scalable Video Streaming in CCN Junghwan Lee, Kyubo Lim, and Chuck Yoo Dept. Computer Science and Engineering Korea University Seoul, Korea {jhlee, kblim, chuck}@os.korea.ac.kr
More informationAn Integration Approach of Data Mining with Web Cache Pre-Fetching
An Integration Approach of Data Mining with Web Cache Pre-Fetching Yingjie Fu 1, Haohuan Fu 2, and Puion Au 2 1 Department of Computer Science City University of Hong Kong, Hong Kong SAR fuyingjie@tsinghua.org.cn
More informationAn Efficient LFU-Like Policy for Web Caches
An Efficient -Like Policy for Web Caches Igor Tatarinov (itat@acm.org) Abstract This study proposes Cubic Selection Sceme () a new policy for Web caches. The policy is based on the Least Frequently Used
More informationOn Caching Search Engine Results
Abstract: On Caching Search Engine Results Evangelos P. Markatos Institute of Computer Science (ICS) Foundation for Research & Technology - Hellas (FORTH) P.O.Box 1385 Heraklio, Crete, GR-711-10 GREECE
More informationGreedyDual* Web Caching Algorithm Exploiting the Two Sources of Temporal Locality in Web Request Streams Λ Shudong Jin and Azer Bestavros Computer Sci
GreedyDual* Web Caching Algorithm Exploiting the Two Sources of Temporal Locality in Web Request Streams Λ Shudong Jin and Azer Bestavros Computer Science Department Boston University Boston, MA 2215 fjins,bestg@cs.bu.edu
More informationrequest is not a cache hit when the summary indicates so (a false hit), the penalty is a wasted query message. If the request is a cache hit when the
Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol Li Fan, Pei Cao, and Jussara Almeida Department of Computer Science University of Wisconsin-Madison flfan,cao,jussarag@cs.wisc.edu Andrei
More informationCIT 668: System Architecture. Caching
CIT 668: System Architecture Caching Topics 1. Cache Types 2. Web Caching 3. Replacement Algorithms 4. Distributed Caches 5. memcached A cache is a system component that stores data so that future requests
More informationOperating Systems. Memory: replacement policies
Operating Systems Memory: replacement policies Last time caching speeds up data lookups if the data is likely to be re-requested again data structures for O(1)-lookup data source set-associative (hardware)
More informationInterme diate DNS. Local browse r. Authorit ative ... DNS
WPI-CS-TR-00-12 July 2000 The Contribution of DNS Lookup Costs to Web Object Retrieval by Craig E. Wills Hao Shang Computer Science Technical Report Series WORCESTER POLYTECHNIC INSTITUTE Computer Science
More informationReducing Disk Latency through Replication
Gordon B. Bell Morris Marden Abstract Today s disks are inexpensive and have a large amount of capacity. As a result, most disks have a significant amount of excess capacity. At the same time, the performance
More informationGD-Wheel: A Cost-Aware Replacement Policy for Key-Value Stores
GD-Wheel: A Cost-Aware Replacement Policy for Key-Value Stores Conglong Li Carnegie Mellon University conglonl@cs.cmu.edu Alan L. Cox Rice University alc@rice.edu Abstract Memory-based key-value stores,
More informationThe Last-Copy Approach for Distributed Cache Pruning in a Cluster of HTTP Proxies
The Last-Copy Approach for Distributed Cache Pruning in a Cluster of HTTP Proxies Reuven Cohen and Itai Dabran Technion, Haifa 32000, Israel Abstract. Web caching has been recognized as an important way
More informationCharacterizing Document Types to Evaluate Web Cache Replacement Policies
Characterizing Document Types to Evaluate Web Cache Replacement Policies F.J. Gonzalez-Cañete, E. Casilari, Alicia Triviño-Cabrera Dpto. Tecnología Electrónica, Universidad de Málaga, E.T.S.I. Telecomunicación,
More informationThe Multikey Web Cache Simulator: a Platform for Designing Proxy Cache Management Techniques
The Multikey Web Cache Simulator: a Platform for Designing Proxy Cache Management Techniques L.G. Cárdenas, J. Sahuquillo, A. Pont, and J.A. Gil 1 Departamento de Informática de Sistemas y Computadores
More informationFB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network
Congestion-free Routing of Streaming Multimedia Content in BMIN-based Parallel Systems Harish Sethu Department of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104, USA sethu@ece.drexel.edu
More informationVirtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing
Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,
More informationImproving the Performances of Proxy Cache Replacement Policies by Considering Infrequent Objects
Improving the Performances of Proxy Cache Replacement Policies by Considering Infrequent Objects Hon Wai Leong Department of Computer Science National University of Singapore 3 Science Drive 2, Singapore
More informationPerformance Consequences of Partial RED Deployment
Performance Consequences of Partial RED Deployment Brian Bowers and Nathan C. Burnett CS740 - Advanced Networks University of Wisconsin - Madison ABSTRACT The Internet is slowly adopting routers utilizing
More informationMedia Caching Support for Mobile Transit Clients
Media Caching Support for Mobile Transit Clients Hazem Gomaa Geoffrey Messier Robert Davies Department of Electrical and Computer Engineering University of Calgary Calgary, AB, Canada Email: {hagomaa,gmessier,davies}@ucalgary.ca
More informationSurveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web
Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web TR020701 April 2002 Erbil Yilmaz Department of Computer Science The Florida State University Tallahassee, FL 32306
More informationINTEGRATING INTELLIGENT PREDICTIVE CACHING AND STATIC PREFETCHING IN WEB PROXY SERVERS
INTEGRATING INTELLIGENT PREDICTIVE CACHING AND STATIC PREFETCHING IN WEB PROXY SERVERS Abstract J. B. PATIL Department of Computer Engineering R. C. Patel Institute of Technology, Shirpur. (M.S.), India
More informationENHANCING QoS IN WEB CACHING USING DIFFERENTIATED SERVICES
ENHANCING QoS IN WEB CACHING USING DIFFERENTIATED SERVICES P.Venketesh 1, S.N. Sivanandam 2, S.Manigandan 3 1. Research Scholar, 2. Professor and Head, 3. Research Scholar Department of Computer Science
More informationCAMP: A Cost Adaptive Multi-Queue Eviction Policy for Key-Value Stores
CAMP: A Cost Adaptive Multi-Queue Eviction Policy for Key-Value Stores Shahram Ghandeharizadeh, Sandy Irani, Jenny Lam, Jason Yap, Hieu Nguyen Database Laboratory Technical Report 2015-05 Computer Science
More informationCluster quality 15. Running time 0.7. Distance between estimated and true means Running time [s]
Fast, single-pass K-means algorithms Fredrik Farnstrom Computer Science and Engineering Lund Institute of Technology, Sweden arnstrom@ucsd.edu James Lewis Computer Science and Engineering University of
More informationLocality-Aware Request Distribution in Cluster-based Network Servers. Network servers based on clusters of commodity workstations
Locality-Aware Request Distribution in Cluster-based Network Servers Vivek S. Pai z, Mohit Aron y, Gaurav Banga y, Michael Svendsen y, Peter Druschel y, Willy Zwaenepoel y, Erich Nahum { z Department of
More informationReinforcement Learning Scheme. for Network Routing. Michael Littman*, Justin Boyan. School of Computer Science. Pittsburgh, PA
A Distributed Reinforcement Learning Scheme for Network Routing Michael Littman*, Justin Boyan Carnegie Mellon University School of Computer Science Pittsburgh, PA * also Cognitive Science Research Group,
More informationPopularity-Based PPM: An Effective Web Prefetching Technique for High Accuracy and Low Storage
Proceedings of 22 International Conference on Parallel Processing, (ICPP 22), Vancouver, Canada, August 18-21, 22. Popularity-Based : An Effective Web Prefetching Technique for High Accuracy and Low Storage
More informationHint-based Acceleration of Web Proxy Caches. Daniela Rosu Arun Iyengar Daniel Dias. IBM T.J.Watson Research Center
Hint-based Acceleration of Web Proxy Caches Daniela Rosu Arun Iyengar Daniel Dias IBM T.J.Watson Research Center P.O.Box 74, Yorktown Heights, NY 1598 Abstract Numerous studies show that proxy cache miss
More informationCache introduction. April 16, Howard Huang 1
Cache introduction We ve already seen how to make a fast processor. How can we supply the CPU with enough data to keep it busy? The rest of CS232 focuses on memory and input/output issues, which are frequently
More informationA Top-10 Approach to Prefetching on the Web. Evangelos P. Markatos and Catherine E. Chronaki. Institute of Computer Science (ICS)
A Top- Approach to Prefetching on the Web Evangelos P. Markatos and Catherine E. Chronaki Institute of Computer Science (ICS) Foundation for Research & Technology { Hellas () P.O.Box 1385 Heraklio, Crete,
More informationWeb Caching and Content Delivery
Web Caching and Content Delivery Caching for a Better Web Performance is a major concern in the Web Proxy caching is the most widely used method to improve Web performance Duplicate requests to the same
More informationLightweight caching strategy for wireless content delivery networks
Lightweight caching strategy for wireless content delivery networks Jihoon Sung 1, June-Koo Kevin Rhee 1, and Sangsu Jung 2a) 1 Department of Electrical Engineering, KAIST 291 Daehak-ro, Yuseong-gu, Daejeon,
More informationMULTIMEDIA PROXY CACHING FOR VIDEO STREAMING APPLICATIONS.
MULTIMEDIA PROXY CACHING FOR VIDEO STREAMING APPLICATIONS. Radhika R Dept. of Electrical Engineering, IISc, Bangalore. radhika@ee.iisc.ernet.in Lawrence Jenkins Dept. of Electrical Engineering, IISc, Bangalore.
More informationCONTENT DISTRIBUTION. Oliver Michel University of Illinois at Urbana-Champaign. October 25th, 2011
CONTENT DISTRIBUTION Oliver Michel University of Illinois at Urbana-Champaign October 25th, 2011 OVERVIEW 1. Why use advanced techniques for content distribution on the internet? 2. CoralCDN 3. Identifying
More informationPeer to Peer and Overlay Networks
The impact of P2P le sharing trac on the Internet ricardo.pereira@inesc-id.pt IST 28-11-2011 1 2 3 Algorithm Evaluation 4 Implementation Evaluation 5 Details Current proposals Dominating types of trac
More informationOn the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/220850337 On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement
More informationMemory. Objectives. Introduction. 6.2 Types of Memory
Memory Objectives Master the concepts of hierarchical memory organization. Understand how each level of memory contributes to system performance, and how the performance is measured. Master the concepts
More informationSoftware and Systems Research Center, Bell Labs, Murray Hill July 26, 1996 Prefetching Techniques for the Web Azer Bestavros Computer Science Departme
Networking and Distributed Systems Research Center, Bell Labs, Murray Hill July 25, 1996 Taming the WWW From Web Measurements to Web Protocol Design Azer Bestavros Computer Science Department Boston University
More informationEfficient FFT Algorithm and Programming Tricks
Connexions module: m12021 1 Efficient FFT Algorithm and Programming Tricks Douglas L. Jones This work is produced by The Connexions Project and licensed under the Creative Commons Attribution License Abstract
More informationMEMORY SENSITIVE CACHING IN JAVA
MEMORY SENSITIVE CACHING IN JAVA Iliyan Nenov, Panayot Dobrikov Abstract: This paper describes the architecture of memory sensitive Java cache, which benefits from both the on demand soft reference objects
More informationLecture 16. Today: Start looking into memory hierarchy Cache$! Yay!
Lecture 16 Today: Start looking into memory hierarchy Cache$! Yay! Note: There are no slides labeled Lecture 15. Nothing omitted, just that the numbering got out of sequence somewhere along the way. 1
More informationPlot SIZE. How will execution time grow with SIZE? Actual Data. int array[size]; int A = 0;
How will execution time grow with SIZE? int array[size]; int A = ; for (int i = ; i < ; i++) { for (int j = ; j < SIZE ; j++) { A += array[j]; } TIME } Plot SIZE Actual Data 45 4 5 5 Series 5 5 4 6 8 Memory
More informationAnalytical Modeling of Routing Algorithms in. Virtual Cut-Through Networks. Real-Time Computing Laboratory. Electrical Engineering & Computer Science
Analytical Modeling of Routing Algorithms in Virtual Cut-Through Networks Jennifer Rexford Network Mathematics Research Networking & Distributed Systems AT&T Labs Research Florham Park, NJ 07932 jrex@research.att.com
More informationA Prefetch Taxonomy. Viji Srinivasan, Edward S Davidson, Gary S Tyson.
A Prefetch Taxonomy Viji Srinivasan, Edward S Davidson, Gary S Tyson e-mail: sviji@eecs.umich.edu, davidson@eecs.umich.edu, tyson@eecs.umich.edu Abstract The dierence in processor and main memory cycle
More informationSummary Cache based Co-operative Proxies
Summary Cache based Co-operative Proxies Project No: 1 Group No: 21 Vijay Gabale (07305004) Sagar Bijwe (07305023) 12 th November, 2007 1 Abstract Summary Cache based proxies cooperate behind a bottleneck
More informationSF-LRU Cache Replacement Algorithm
SF-LRU Cache Replacement Algorithm Jaafar Alghazo, Adil Akaaboune, Nazeih Botros Southern Illinois University at Carbondale Department of Electrical and Computer Engineering Carbondale, IL 6291 alghazo@siu.edu,
More informationSummary Cache: A Scalable Wide-Area Web Cache Sharing Protocol
Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol Li Fan, Pei Cao and Jussara Almeida University of Wisconsin-Madison Andrei Broder Compaq/DEC System Research Center Why Web Caching One of
More informationLocality-Aware Request Distribution in Cluster-based Network Servers
Locality-Aware Request Distribution in Cluster-based Network Servers Vivek S. Pai z, Mohit Aron y, Gaurav Banga y, Michael Svendsen y, Peter Druschel y, Willy Zwaenepoel y, Erich Nahum { z Department of
More information1 Introduction The demand on the performance of memory subsystems is rapidly increasing with the advances in microprocessor architecture. The growing
Tango: a Hardware-based Data Prefetching Technique for Superscalar Processors 1 Shlomit S. Pinter IBM Science and Technology MATAM Advance Technology ctr. Haifa 31905, Israel E-mail: shlomit@vnet.ibm.com
More informationCalculating lower bounds for caching problems
Calculating lower bounds for caching problems Leah Epstein Rob van Stee Abstract We present a general method for computing lower bounds for various caching problems. We apply the method to two well known
More informationCache Controller with Enhanced Features using Verilog HDL
Cache Controller with Enhanced Features using Verilog HDL Prof. V. B. Baru 1, Sweety Pinjani 2 Assistant Professor, Dept. of ECE, Sinhgad College of Engineering, Vadgaon (BK), Pune, India 1 PG Student
More informationSmall-World Datacenters
2 nd ACM Symposium on Cloud Computing Oct 27, 2011 Small-World Datacenters Ji-Yong Shin * Bernard Wong +, and Emin Gün Sirer * * Cornell University + University of Waterloo Motivation Conventional networks
More informationTSAR : A Two Tier Sensor Storage Architecture using Interval Skip Graphs
TSAR : A Two Tier Sensor Storage Architecture using Interval Skip Graphs Authors: Peter Desnoyers, Deepak Ganesan, Prashant Shenoy ( University of Massachusetts, Amherst, MA) Presented by: Nikhil Raghavan
More informationHyperbolic Caching: Flexible Caching for Web Applications
Hyperbolic Caching: Flexible Caching for Web Applications Aaron Blankstein Princeton University (now @ Blockstack Inc.) Siddhartha Sen Microsoft Research NY Michael J. Freedman Princeton University Modern
More informationCaching for NASD. Department of Computer Science University of Wisconsin-Madison Madison, WI 53706
Caching for NASD Chen Zhou Wanli Yang {chenzhou, wanli}@cs.wisc.edu Department of Computer Science University of Wisconsin-Madison Madison, WI 53706 Abstract NASD is a totally new storage system architecture,
More informationQ.1 Explain Computer s Basic Elements
Q.1 Explain Computer s Basic Elements Ans. At a top level, a computer consists of processor, memory, and I/O components, with one or more modules of each type. These components are interconnected in some
More informationforward packets do not forward packets
Power-aware Routing in Wireless Packet Networks Javier Gomez, Andrew T. Campbell Dept. of Electrical Engineering Columbia University, N 10027, USA Mahmoud Naghshineh, Chatschik Bisdikian IBM T.J. Watson
More informationMemory Hierarchies &
Memory Hierarchies & Cache Memory CSE 410, Spring 2009 Computer Systems http://www.cs.washington.edu/410 4/26/2009 cse410-13-cache 2006-09 Perkins, DW Johnson and University of Washington 1 Reading and
More informationExample: CPU-bound process that would run for 100 quanta continuously 1, 2, 4, 8, 16, 32, 64 (only 37 required for last run) Needs only 7 swaps
Interactive Scheduling Algorithms Continued o Priority Scheduling Introduction Round-robin assumes all processes are equal often not the case Assign a priority to each process, and always choose the process
More informationWhy memory hierarchy
Why memory hierarchy (3 rd Ed: p.468-487, 4 th Ed: p. 452-470) users want unlimited fast memory fast memory expensive, slow memory cheap cache: small, fast memory near CPU large, slow memory (main memory,
More informationEfficient Resource Management for the P2P Web Caching
Efficient Resource Management for the P2P Web Caching Kyungbaek Kim and Daeyeon Park Department of Electrical Engineering & Computer Science, Division of Electrical Engineering, Korea Advanced Institute
More information2 IEICE TRANS. COMMUN., VOL. 0, NO Table 1 Classication of Replacement Policies. Replacement Re-reference likelihood Non-uniformity Policies T
IEICE TRANS. COMMUN., VOL. 0, NO. 0 2000 1 PAPER IEICE Transactions on Communications Exploitin Metadata of Absent Objects for Proxy Cache Consistency Jooyon Kim y,hyokyun Bahn yy, Nonmembers, and Kern
More informationIMPROVING LIVE PERFORMANCE IN HTTP ADAPTIVE STREAMING SYSTEMS
IMPROVING LIVE PERFORMANCE IN HTTP ADAPTIVE STREAMING SYSTEMS Kevin Streeter Adobe Systems, USA ABSTRACT While HTTP adaptive streaming (HAS) technology has been very successful, it also generally introduces
More informationHTRC Data API Performance Study
HTRC Data API Performance Study Yiming Sun, Beth Plale, Jiaan Zeng Amazon Indiana University Bloomington {plale, jiaazeng}@cs.indiana.edu Abstract HathiTrust Research Center (HTRC) allows users to access
More informationHeap-on-Top Priority Queues. March Abstract. We introduce the heap-on-top (hot) priority queue data structure that combines the
Heap-on-Top Priority Queues Boris V. Cherkassky Central Economics and Mathematics Institute Krasikova St. 32 117418, Moscow, Russia cher@cemi.msk.su Andrew V. Goldberg NEC Research Institute 4 Independence
More informationCS 61C: Great Ideas in Computer Architecture. The Memory Hierarchy, Fully Associative Caches
CS 61C: Great Ideas in Computer Architecture The Memory Hierarchy, Fully Associative Caches Instructor: Alan Christopher 7/09/2014 Summer 2014 -- Lecture #10 1 Review of Last Lecture Floating point (single
More informationImproving Performance of an L1 Cache With an. Associated Buer. Vijayalakshmi Srinivasan. Electrical Engineering and Computer Science,
Improving Performance of an L1 Cache With an Associated Buer Vijayalakshmi Srinivasan Electrical Engineering and Computer Science, University of Michigan, 1301 Beal Avenue, Ann Arbor, MI 48109-2122,USA.
More informationFrank Miller, George Apostolopoulos, and Satish Tripathi. University of Maryland. College Park, MD ffwmiller, georgeap,
Simple Input/Output Streaming in the Operating System Frank Miller, George Apostolopoulos, and Satish Tripathi Mobile Computing and Multimedia Laboratory Department of Computer Science University of Maryland
More informationChapter 6 Memory 11/3/2015. Chapter 6 Objectives. 6.2 Types of Memory. 6.1 Introduction
Chapter 6 Objectives Chapter 6 Memory Master the concepts of hierarchical memory organization. Understand how each level of memory contributes to system performance, and how the performance is measured.
More informationNetwork Design Considerations for Grid Computing
Network Design Considerations for Grid Computing Engineering Systems How Bandwidth, Latency, and Packet Size Impact Grid Job Performance by Erik Burrows, Engineering Systems Analyst, Principal, Broadcom
More informationEgemen Tanin, Tahsin M. Kurc, Cevdet Aykanat, Bulent Ozguc. Abstract. Direct Volume Rendering (DVR) is a powerful technique for
Comparison of Two Image-Space Subdivision Algorithms for Direct Volume Rendering on Distributed-Memory Multicomputers Egemen Tanin, Tahsin M. Kurc, Cevdet Aykanat, Bulent Ozguc Dept. of Computer Eng. and
More informationthis approach, a write is complete when the modication is registered in the server's le system. Part of the motivation of this study is to determine w
Maintaining Strong Cache Consistency in the World-Wide Web Chengjie Liu and Pei Cao Department of Computer Science University of Wisconsin-Madison Madison, WI 53706 Abstract As the Web continues to explode
More informationMeasuring KSA Broadband
Measuring KSA Broadband Meqyas, Q2 218 Report In 217, the CITC in partnership with SamKnows launched a project to measure internet performance. The project, named Meqyas, gives internet users in Saudi
More informationAn Evaluation of Information Retrieval Accuracy. with Simulated OCR Output. K. Taghva z, and J. Borsack z. University of Massachusetts, Amherst
An Evaluation of Information Retrieval Accuracy with Simulated OCR Output W.B. Croft y, S.M. Harding y, K. Taghva z, and J. Borsack z y Computer Science Department University of Massachusetts, Amherst
More informationperform well on paths including satellite links. It is important to verify how the two ATM data services perform on satellite links. TCP is the most p
Performance of TCP/IP Using ATM ABR and UBR Services over Satellite Networks 1 Shiv Kalyanaraman, Raj Jain, Rohit Goyal, Sonia Fahmy Department of Computer and Information Science The Ohio State University
More informationAnnouncement. Computer Architecture (CSC-3501) Lecture 20 (08 April 2008) Chapter 6 Objectives. 6.1 Introduction. 6.
Announcement Computer Architecture (CSC-350) Lecture 0 (08 April 008) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark Chapter 6 Objectives 6. Introduction Master the concepts of hierarchical memory
More information2 Improved Direct-Mapped Cache Performance by the Addition of a Small Fully-Associative Cache and Prefetch Buffers [1]
EE482: Advanced Computer Organization Lecture #7 Processor Architecture Stanford University Tuesday, June 6, 2000 Memory Systems and Memory Latency Lecture #7: Wednesday, April 19, 2000 Lecturer: Brian
More informationPerformance Fault Masking for Network-Attached Storage Devices
Performance Fault Masking for Network-Attached Storage Devices Omer Zaki and Brian Forney University of Wisconsin-Madison Computer Sciences Department 1210 W. Dayton St. Madison, WI 53705 {ozaki, bforney}@cs.wisc.edu
More informationAnalytical Cache Replacement for Large Caches and Multiple Block Containers
Analytical Cache Replacement for Large Caches and Multiple Block Containers David Vengerov david.vengerov@oracle.com Garret Swart garret.swart@oracle.com Draft of 2011/02/14 14:48 Abstract An important
More informationperformance data memory trace a.out Trace generator Performance Simulator branch trace
Cache Performance in Vector Supercomputers L. I. Kontothanassis y R. A. Sugumar z G. J. Faanes z J. E. Smith x M. L. Scott y y Computer Science Dept. z Cray Research Inc. x Dept. of Electrical & Computer
More informationAnalyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking
Analyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking Claudio Imbrenda Luca Muscariello Orange Labs Dario Rossi Telecom ParisTech Outline Motivation
More information