A Comprehensive Web Workload Characterization

Size: px
Start display at page:

Download "A Comprehensive Web Workload Characterization"

Transcription

1 A Comprehensive Web Workload Characterization J.A.Lacort, A. Pont +, J.A. Gil +, J. Sahuquillo + Department of Systems Engineering and Control + Department of Computer Engineering Abstract Polytechnic University of Valencia Camino de Vera, s/n ,Valencia (Spain) jualalu@isa.upv.es, {apont, jagil, jsahuqui}@disca.upv.es The current and incoming Web are designed according to recent technology breakthroughs and the new topics of social interests, which are two heterogeneous aspects suffering continuous changes when not complete revolutions. Therefore, any drawn conclusion about different aspects related with the Web and its infrastructure will remain valid for a limited period of time. In addition, the Web contents and traffic are highly dependent on the interests of Web Clients. A relevant or shocking event may have a great impact on the Web traffic during a period of time, which will depend on for how long the event keeps being relevant or shocking. This paper focuses on the Web Workload characterization, which is a prerequisite to accomplish both technical and performance evaluation studies. The workload analysed in this paper has been collected over a year to identify current and future trends or new behaviours in either Web objects or users. The consequences of an event, which shook the local society, were also analysed, to measure how the workload parameters change under special circumstances. Main characteristics of the Web workload ranging from the percentage of dynamic against static contents to the cache hits per hour or even the concentration of requests per site have been measured to assess their values and identify consistent changes. Other characteristics to be analysed were chosen based on their variation during the mentioned events. Analysed data were collected by a Proxy Server providing services to a vast community (50K potential users, 122M requests and 810GB transferred). Keywords: workload characterization, web performance, measurement techniques. 1 Introduction As the Web is suffering continuous changes both in contents and technology, the majority of conclusions and assertions must be periodically reviewed [4], [8]. This paper presents two different studies. The first one analyses the workload characteristics and identifies future trends. To grasp a good understanding of these parameters is crucial in order to achieve a high efficiency from all the elements compounding the Web [1], [12]. A second analysis measures the effects that a shocking event has over the Web traffic. Some social events can concentrate big interest and have big impact on the characteristics of workloads of both the Web and Proxy Servers [3], [9]. The event studied was the terrorist attacks in Madrid on the 11 th of March (11M). The study of how the Web behaves during these peaks of activity is highly important, as it determines its usefulness under these circumstances. These special circumstances become more and more common as the resources get more constrained. Thus, the study can unveil difficulties that we will have to face in the near future. This work has been partially supported by the Spanish Government Grant CYCYT TIC C03-02 P67/1

2 The main goal of our web workload characterization is to identify characteristics of the workload that remain stabilized and others that vary according to a trend over a period of time, or as a result of an unusual event. The rest of this paper is organized as follows. In section 2 the system environment is described. In section 3 the results of the workload characterization are presented, both analysing a long period of time and a short period during which the parameters are suitable to be widely modified. Finally, section 4 presents some concluding remarks about both studies. 2 System Environment The analysis has been made over logs collected from the Proxy Server of the Polytechnic University of Valencia (UPV), where figures relating potential Web users and machines with access to the Web or Web Clients has increased from around 39k potential users and 14k Web Clients in 2001 to an estimate 50k potential users and 23k Web Clients in Proxy configuration Squid [13] was the software used in the Proxy Servers during all the period analysed. It is out of the scope of this paper to analyse the efficiency of their configurations Selecting dates Two periods of time have been selected to best fit the study s purposes. In almost any study focused on the Web, a year is typically a period of time long enough. We have selected traces over such a long period of time, to identify trends in the characteristics analysed. Dates representative of the University activity were preferred, that is, periods of time excluding local holidays or those when presence of students could be lower than average. Short periods of inactivity due to hardware or software failure were not excluded from the study. For the first analysis, we selected three weeks within this period from which the traces were obtained, namely: Week 1 (W1.1): Monday 3 rd to Sunday 9 th of February Week 2 (W1.2): Monday 5 th to Sunday 11 th of May Week 3 (W1.3): Monday 2 nd to Sunday 8 th of February To assess the effects of 11M on the Web, we need to characterize the workload during the time that breaking news about the events were published on the Web. A measurement of the same parameters in previous days is required to numerically establish the relevance of the incidents. For this purpose, traces from the week that preceded the attacks, have been considered. Week 4 (W2.1): Monday 1 st to the 5 th of March Week 5 (W2.2): Monday 8 th to the 12 th of March Weekend days have not been included this time, as they could make impossible to distinguish changes due to a different level of activity and those motivated by the analysed events themselves Filtering the logs In order to avoid analysing erroneous log entries, a simplification of the logs has been made by excluding the requests that do not match the access.log standard of Squid. A negligible percentage of the initial log entries were expelled from the study because of this reason. Because of the volume of information that needs to be analysed, a tool to process the data is required. A series of customized scripts were developed in PERL language for this purpose. 3 Workload Characterization 3.1 Workload Characteristics and Future Trends P67/2

3 There are several characteristics in a web workload worth to be analysed and therefore, a selection needed to be done to make the study feasible. The characteristics presented were those found more representative of the workload and its evolution Requests The volume of requests received is the most significant characteristic to probe, in order to establish the activity of a Proxy and how it evolves over a period of time. Table 1 shows these data corresponding to the three weeks mentioned above (W1.1, W1.2 and W1.3). Day of the week Week Item MON TUE WED THU FRI SAT SUN Thousands of Requests Gigabytes Transferred W1.1 Standard Deviation Average Thousands of Requests Gigabytes Transferred W1.2 Standard Deviation Average Thousands of Requests Gigabytes Transferred W1.3 Standard Deviation Average Table 1. Number and distribution of the requests received by the Proxy Sever As expected, the number of requests and volume of bytes transferred from the Proxy Server drops during the weekend, due to a lower presence of users. On Saturdays the activity is around 10% of a typical working day, and it gets even lower on Sundays. It is outstanding, though not surprising, the high value of the standard deviation of the size of the files transferred, what illustrates the wide range of sizes the web objects present. Table 2 presents an additional analysis, were data has been summarised by week. Item Week W1.1 W1.2 W1.3 (w1.3-w1.1) Thousands of Requests Gigabytes Transferred Standard Deviation Average Table 2. Number of requests and bytes transferred summarized per week The success achieved by the Web over the period can be summarized in a few facts: The number of requests rose by nearly a half (49.1 %). The volume of information managed grew an astonishing 77.2 %. The average size of the Web object requested is 18.8% higher, with the consequent increase in the standard deviation Considerations about usage Given the distribution of the day activity in the University, the requests are made primarily within the working hours, 8 to 20, concentrating on the morning that is the busiest period of the day for most of the users, declining around lunch time (13 to 15 hours), see Figure 1. In other works the activity concentrates towards the last hours of the day [2]. P67/3

4 Figure 1. Number of requests per hour for the period analysed Figures 2a, 2b and 2c, show both the average size of the requests and the Proxy hit rate, for W1.1, W1.2 and W1.3. When the average size of the Web object requested is considered, the higher values are reached on the periods with lower usage, when the Web is less exploited. The chances of a request resulting in a hit in the cache of the Proxy Server improve with the number of requests [10]. Data in Figures 2a, 2b and 2c confirm this fact. Figure 2a.Proxy Hit rate and average size of the requests against request per hour for W1.1 Figure 2b. Proxy Hit rate and average size of the requests against request per hour for W1.2 P67/4

5 3.1.3 Web object types Figure 2c. Proxy Hit rate and average size of the requests against request per hour for W1.3 To understand the type of information accessed through the Web this section classifies the requests based on the file type. The selection of file types filtered has been made considering those native and popular in the Web. The results obtained are presented in Table 3 by number of requests (left side) and by volume of bytes transferred (right side), since the effects are different according to each criterion. The two most popular graphic formats, gif and jpg, account for around 60% of the number of requests that a Proxy receives, with gif format around 4 to 5 times more popular than jpg. One can see how static pages (htm) are losing weight, from 4.3% in W1.1 to 3.6% in W1.3, against dynamic pages (js, php, cgi, cfm and asp), from 9.2% in W1.1 to 15.1% in W1.3. This confirms that the new generation of Web applications is becoming more and more popular. Also, css files increased from 2.3% in W1.1 to 2.6% in W1.3, what indicates the growing presence of the latest design web standards in the Web, while graphic format png tripled from 0.2 in W1.1 to 0.6 in W1.3. Number of requests Volume of bytes transferred Dates Week Week W1.1 W1.2 W1.3 W1.1 W1.2 W1.3 Type Requests Requests Requests AVG AVG AVG (thousands) % (thousands) % (thousands) % (KB) % (KB) % (KB) % cgi htm gif js php cfm asp jpg css png Total Table 3. Number of requests and volume of bytes transferred classified by Web object type While the set of extensions selected account for four out of five requests, when attending to traffic, they account for less than half of the bytes transferred, mainly due to the small size in average of gif objects. The increase in the amount of requests of php objects are followed by a proportional increase in the volume of bytes transferred (from 2.2% in W1.1 to 4.4% in W1.3), reaffirming the fact that the Web is getting more and more dynamic Site Popularity The thousands of different domains visited weekly, more than 65k in W1.3, are not equally popular. The results of the Top 5 sites visited account for around 10% of the total. It proves that the interests of the Web P67/5

6 clients do not differ widely and concentrates on a few sites. This concentration will become even higher under certain circumstances, as will be discussed in section Figure 3. Percentage of requests to Top 5 sites per week for W1.1, W1.2 and W1.3 Figure 4 shows the visits per site versus the ranking position of the site represented on log-log scale. The curve indicates that the request frequency is proportional to 1/i α, following a Zipf-like distribution [6]. This allows estimating the popularity of a site or a set of sites based on its ranking position. In our traces α takes values, presented in Table 4, expectable for a homogeneous environment. Figure 4. Frequency of site accesses versus site ranking Parameter Week W1.1 W1.2 W1.3 α Table 4. Value of α parameter of Zipf Distribution P67/6

7 3.2 Workload Characteristics Affected Following are some of the characteristics analysed, which were outstandingly affected by the 11M events. Additional analyses were conducted for some other characteristics not obtaining clear evidence of variation. Traces from some particular Web Server, which were stressed over the period, would have been valuable to conduct different measurements sessions Requests and response time In W2.1 the requests kept stabilized at around 5 million a day, see Figure 5. In W2.2 from an unusual high volume of requests on Monday, the activity evolved towards normal values. Although it is difficult to estimate the decrease of requests due to the cancellation of classes from 11a.m. on 11M to the next Monday, the number of requests to the Proxy Server did not increase dramatically due to the events on the day or following day. However, when considering response time, the effect of the events arises. During W2.1 the response time varied between 1000 and 1500 milliseconds. For W2.2 response time varied from 1000 to over 2000 milliseconds, except for a peak on the day of the events, when average response time arrived to nearly 3500 milliseconds. Figure 5. Thousands of requests to the proxy and response time (ms) per week There are several potential reasons for this service degradation. A main one could be the fact that the activity on the Web concentrates on a few servers which can be prepared or not to manage this eventuality. On the other hand, the importance of offering the latest information will require a continuous update of the Web pages and will constraint the Proxy s efficiency Site Popularity To establish how 11M affected the sites popularity, we measured the Top 5 visited sites, depicted in Figure 6. The popularity achieved by the top sites during 11M (W2.2 Thu.) was way above normal values. As expected, the most popular sites were those offering information and news related to the events, mainly on line newspapers and radio stations. P67/7

8 Figure 6. Percentage of requests to Top 5 sites per weekday for W2.1 and W2.2 This concentration of visits in a few sites stressed the Web Servers which hosted these extremely popular sites, which struggled to manage the unusually large volume of requests, worsening the quality of service offered to the Web Clients Efficiency of the Proxy Proxy Servers are expected to improve the Web s efficiency, especially when the circumstances seem to favour a high Proxy Hits rate. To analyse if this is the case for our traces, we filtered the requests classifying them according to the HTTP protocol [5] into three categories listed in Table 5. Squid label TCP_HIT TCP_IMS_HIT TCP_MEM_HIT Explanation A valid Copy of the requested object was in the cache. The client issued an IMS (if-modified-since) request for an object, which was in the cache and fresh. A valid copy of the requested object was in the cache and it was in memory, thus avoiding disk access. Table 5. Classification of the requests considered Proxy Hits These categories correspond to the case when the cache had a fresh-cached copy [7]. Different categories imply different benefits, but in any case the client s request did not need to be attended by the Web Server, what alleviated its congestion. Figure 7 shows Hits of fresh-cached copies slightly increased from 40.5% on Thursday of W2.1 to 42.6% for Thursday of W2.2 and from 31.1% on Friday of W2.1 to 40.8% on Friday of W2.2). The highest increase comes from the requests that fell in the MEM_HIT category. These happen to be the most beneficial of the listed, from a Proxy efficiency point of view and rose from 4.2 and 2.3% on Thursday and Friday of W2.1 to 6.5 and 4.4% on Thursday and Friday of W2.2, around 50% increase on each day comparing on a week basis. P67/8

9 4 Conclusions Figure 7. Percentage of requests by Proxy Hit category per weekday for W2.1 and W2.2 This paper has presented a web workload characterization analysis made over more than 122M requests and 810GB of data transferred, during five measurement sessions (W1.1, W1.2, W1.3, W2.1 and W2.2) within a year. Below we summarize the main conclusions obtained from this work. Some remarkable workload characteristics observed are: Graphic files are the most common files in the Web, especially gif formatted, that are responsible of around half of the total accessed in the Web. Their small average size never exceeds 1.7 KB, which makes them not so relevant when considering volume of bytes transferred. File sizes present an enormous dispersion, shown by a Standard Deviation, which reaches their maximum value of 305.7KB in W3. These conclusions are consistent with previous research. The new trends observed during the analysed period are: There is an important increase in the use of the Web in only one year, 49% more requests and 77% more bytes transferred. The noticeable increase of requests for dynamic pages (64.1% higher) against a decrease in the demand of static pages, (6.3% lower), proofs that the new generation of Web applications is gaining presence. New standards for web page design and file formats are increasing presence, confirming that web applications and services are becoming more professional. These last conclusions confirm the evolution of the Web workload and remark the need of periodic analysis to better understand how their characteristics evolve. Regarding the analysis of the effects of 11M on the Web traffic, the most outstanding results are: The response times were longer on 11M, nearly tripling expected values (from 1000 to 1500 ms the previous week (W2.1) to a peak of nearly 3500ms on 11M). The efficiency of the Proxy Server was slightly higher on 11M (total fresh-cached hits rose from 5% on 11M up to 30% the day after). More work needs to be done to provide alternative mechanisms which palliates the service degradation observed on periods of time of unexpected high demand. P67/9

10 References [1] M. Arlitt and C. Williamson, ``Web Server Workload Characterization: The Search for Invariants'', Proceedings of the 1996 ACM SIGMETRICS Conference on the Measurement and Modeling of Computer Systems, Philadelphia, PA, pp , May 23-26, [2] Martin Arlitt, Rich Friedrich, and Tai Jin. Workload characterization of a Web proxy in a cable modem environment. Performance Evaluation Review, Vol. 27, No. 2. September [3] M. Arlitt and T. Jin, ``Workload Characterization of the 1998 World Cup Web Site'', IEEE Network, Vol. 14, No. 3, pp , May/June [4] P. Barford, A. Bestavros, A. Bradley, and M. E. Crovella. Changes in Web Client Access Patterns: Characteristics and Caching Implications. World Wide Web, Special Issue on Characterization and Performance Evaluation, Vol. 2, pp [5] T. Bernes-Lee, R. Fielding, H. Nielsen. RFC 1945; Hypertext transfer protocol, HTTP/ [6] Lee Breslau, Pei Cao, Li Fan, Graham Phillips and Scott Shenker. Web Caching and Zipf-like Distributions: Evidence and Implications. Proceedings of the Conference on Computer Communications (IEEE Infocom), (New York), March [7] E. Cohen and H. Kaplan. Refreshment policies for Web content caches. In Proceedings of the IEEE INFOCOM'01 Conference [8] Sally Floyd, Vern Paxson. Why we don t know How to Simulate the Internet. Proceedings of the 1997 Winter Simulation Conference. December [9] Iyengar, A.K., Squillante, M.S. and Zhang, L. Analysis and Characterization of Large-Scale Web Server Access Patterns and Performance. World Wide Web, vol. 2, pp [10] Ch. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley [11] Lacort, J. A. A Proxy workload Characterization. Department of Computer Engineering (DISCA), Internal Report [12] M. Rabinovich, O. Spatscheck. Web Caching and Replication. Addison-Wesley [13] Squid. ( P67/10

Characterizing Document Types to Evaluate Web Cache Replacement Policies

Characterizing Document Types to Evaluate Web Cache Replacement Policies Characterizing Document Types to Evaluate Web Cache Replacement Policies F.J. Gonzalez-Cañete, E. Casilari, Alicia Triviño-Cabrera Dpto. Tecnología Electrónica, Universidad de Málaga, E.T.S.I. Telecomunicación,

More information

A CONTENT-TYPE BASED EVALUATION OF WEB CACHE REPLACEMENT POLICIES

A CONTENT-TYPE BASED EVALUATION OF WEB CACHE REPLACEMENT POLICIES A CONTENT-TYPE BASED EVALUATION OF WEB CACHE REPLACEMENT POLICIES F.J. González-Cañete, E. Casilari, A. Triviño-Cabrera Department of Electronic Technology, University of Málaga, Spain University of Málaga,

More information

Characterizing Home Pages 1

Characterizing Home Pages 1 Characterizing Home Pages 1 Xubin He and Qing Yang Dept. of Electrical and Computer Engineering University of Rhode Island Kingston, RI 881, USA Abstract Home pages are very important for any successful

More information

Evaluating the Impact of Different Document Types on the Performance of Web Cache Replacement Schemes *

Evaluating the Impact of Different Document Types on the Performance of Web Cache Replacement Schemes * Evaluating the Impact of Different Document Types on the Performance of Web Cache Replacement Schemes * Christoph Lindemann and Oliver P. Waldhorst University of Dortmund Department of Computer Science

More information

Q WEB APPLICATION ATTACK STATISTICS

Q WEB APPLICATION ATTACK STATISTICS WEB APPLICATION ATTACK STATISTICS CONTENTS Introduction...3 Results at a glance...4 Web application attacks: statistics...5 Attack types...5 Attack trends...8 Conclusions... 11 2 INTRODUCTION This report

More information

Dynamic Broadcast Scheduling in DDBMS

Dynamic Broadcast Scheduling in DDBMS Dynamic Broadcast Scheduling in DDBMS Babu Santhalingam #1, C.Gunasekar #2, K.Jayakumar #3 #1 Asst. Professor, Computer Science and Applications Department, SCSVMV University, Kanchipuram, India, #2 Research

More information

WebTraff: A GUI for Web Proxy Cache Workload Modeling and Analysis

WebTraff: A GUI for Web Proxy Cache Workload Modeling and Analysis WebTraff: A GUI for Web Proxy Cache Workload Modeling and Analysis Nayden Markatchev Carey Williamson Department of Computer Science University of Calgary E-mail: {nayden,carey}@cpsc.ucalgary.ca Abstract

More information

ENHANCING QoS IN WEB CACHING USING DIFFERENTIATED SERVICES

ENHANCING QoS IN WEB CACHING USING DIFFERENTIATED SERVICES ENHANCING QoS IN WEB CACHING USING DIFFERENTIATED SERVICES P.Venketesh 1, S.N. Sivanandam 2, S.Manigandan 3 1. Research Scholar, 2. Professor and Head, 3. Research Scholar Department of Computer Science

More information

Characterizing Web User Sessions

Characterizing Web User Sessions Characterizing Web User Sessions Martin Arlitt Internet and Mobile Systems Laboratory HP Laboratories Palo Alto HPL-2-43 May, 2 E-mail: arlitt@hpl.hp.com World-Wide Web, characterization, user sessions,

More information

BUP2 5/2 12/4/07 12:49 AM Page 1. Introduction

BUP2 5/2 12/4/07 12:49 AM Page 1. Introduction BUP2 5/2 12/4/07 12:49 AM Page 1 Introduction This booklet will give you easy to follow instructions to allow you to set your BUP2 Programmer to the Weekday/Weekend, (same times Monday - Friday, different

More information

A NEW PERFORMANCE EVALUATION TECHNIQUE FOR WEB INFORMATION RETRIEVAL SYSTEMS

A NEW PERFORMANCE EVALUATION TECHNIQUE FOR WEB INFORMATION RETRIEVAL SYSTEMS A NEW PERFORMANCE EVALUATION TECHNIQUE FOR WEB INFORMATION RETRIEVAL SYSTEMS Fidel Cacheda, Francisco Puentes, Victor Carneiro Department of Information and Communications Technologies, University of A

More information

Trace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers

Trace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers Proceeding of the 9th WSEAS Int. Conference on Data Networks, Communications, Computers, Trinidad and Tobago, November 5-7, 2007 378 Trace Driven Simulation of GDSF# and Existing Caching Algorithms for

More information

Topics in P2P Networked Systems

Topics in P2P Networked Systems 600.413 Topics in P2P Networked Systems Week 4 Measurements Andreas Terzis Slides from Stefan Saroiu Content Delivery is Changing Thirst for data continues to increase (more data & users) New types of

More information

Evaluation of Performance of Cooperative Web Caching with Web Polygraph

Evaluation of Performance of Cooperative Web Caching with Web Polygraph Evaluation of Performance of Cooperative Web Caching with Web Polygraph Ping Du Jaspal Subhlok Department of Computer Science University of Houston Houston, TX 77204 {pdu, jaspal}@uh.edu Abstract This

More information

DUTCH BENCHMARK The 2017 Edition

DUTCH  BENCHMARK The 2017 Edition DUTCH EMAIL BENCHMARK 07 Management summary Dutch National Email Benchmark 07 With the increased digitalization of societies and due to the high return on investment, the use of email marketing is strategically

More information

Efficient Resource Management for the P2P Web Caching

Efficient Resource Management for the P2P Web Caching Efficient Resource Management for the P2P Web Caching Kyungbaek Kim and Daeyeon Park Department of Electrical Engineering & Computer Science, Division of Electrical Engineering, Korea Advanced Institute

More information

A Comparative Study of Web Prefetching Techniques Focusing on User s Perspective

A Comparative Study of Web Prefetching Techniques Focusing on User s Perspective A Comparative Study of Web Prefetching Techniques Focusing on User s Perspective Josep Domènech Ana Pont Julio Sahuquillo José A. Gil Department of Computing Engineering (DISCA) Universitat Politècnica

More information

Proactive-Caching based Information Centric Networking Architecture for Reliable Green Communication in ITS

Proactive-Caching based Information Centric Networking Architecture for Reliable Green Communication in ITS ITU Kaleidoscope 2015 Trust in the Information Society Proactive-Caching based Information Centric Networking Architecture for Reliable Green Communication in ITS Presenter: Prof. PhD. Takuro SATO Waseda

More information

File Size Distribution on UNIX Systems Then and Now

File Size Distribution on UNIX Systems Then and Now File Size Distribution on UNIX Systems Then and Now Andrew S. Tanenbaum, Jorrit N. Herder*, Herbert Bos Dept. of Computer Science Vrije Universiteit Amsterdam, The Netherlands {ast@cs.vu.nl, jnherder@cs.vu.nl,

More information

How Young Children Are Watching TV and DVDs: From the June 2013 Rating Survey on Young Children s TV Viewing

How Young Children Are Watching TV and DVDs: From the June 2013 Rating Survey on Young Children s TV Viewing How Young Children Are Watching TV and DVDs: From the June 2013 Rating Survey on Young Children s TV Viewing By Yuriko Anraku Introduction This paper reports on the results from the Rating Survey on Young

More information

An Adaptive Prefetching Method for Web Caches

An Adaptive Prefetching Method for Web Caches An Adaptive Prefetching Method for Web Caches Jaeeun Jeon, Gunhoon Lee, Ki ong Lee, and Byoungchul Ahn Yeungnam nievrsity, School of Electrical Engineering and Computer Science 201-1 aedong, Gyungsan,

More information

Technical papers Web caches

Technical papers Web caches Technical papers Web caches Web caches What is a web cache? In their simplest form, web caches store temporary copies of web objects. They are designed primarily to improve the accessibility and availability

More information

Andersson, Mikael; Bengtsson, Anders; Höst, Martin; Nyberg, Christian; Holst, Jan

Andersson, Mikael; Bengtsson, Anders; Höst, Martin; Nyberg, Christian; Holst, Jan Web server traffic in crisis conditions Andersson, Mikael; Bengtsson, Anders; Höst, Martin; Nyberg, Christian; Holst, Jan 25 Link to publication Citation for published version (APA): Andersson, M., Bengtsson,

More information

MINING OPERATIONAL DATA FOR IMPROVING GSM NETWORK PERFORMANCE

MINING OPERATIONAL DATA FOR IMPROVING GSM NETWORK PERFORMANCE MINING OPERATIONAL DATA FOR IMPROVING GSM NETWORK PERFORMANCE Antonio Leong, Simon Fong Department of Electrical and Electronic Engineering University of Macau, Macau Edison Lai Radio Planning Networks

More information

Improving object cache performance through selective placement

Improving object cache performance through selective placement University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2006 Improving object cache performance through selective placement Saied

More information

Proxy Server Systems Improvement Using Frequent Itemset Pattern-Based Techniques

Proxy Server Systems Improvement Using Frequent Itemset Pattern-Based Techniques Proceedings of the 2nd International Conference on Intelligent Systems and Image Processing 2014 Proxy Systems Improvement Using Frequent Itemset Pattern-Based Techniques Saranyoo Butkote *, Jiratta Phuboon-op,

More information

Scheduling. Scheduling Tasks At Creation Time CHAPTER

Scheduling. Scheduling Tasks At Creation Time CHAPTER CHAPTER 13 This chapter explains the scheduling choices available when creating tasks and when scheduling tasks that have already been created. Tasks At Creation Time The tasks that have the scheduling

More information

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web TR020701 April 2002 Erbil Yilmaz Department of Computer Science The Florida State University Tallahassee, FL 32306

More information

Performance Modeling and Evaluation of Web Systems with Proxy Caching

Performance Modeling and Evaluation of Web Systems with Proxy Caching Performance Modeling and Evaluation of Web Systems with Proxy Caching Yasuyuki FUJITA, Masayuki MURATA and Hideo MIYAHARA a a Department of Infomatics and Mathematical Science Graduate School of Engineering

More information

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,

More information

Chapter The LRU* WWW proxy cache document replacement algorithm

Chapter The LRU* WWW proxy cache document replacement algorithm Chapter The LRU* WWW proxy cache document replacement algorithm Chung-yi Chang, The Waikato Polytechnic, Hamilton, New Zealand, itjlc@twp.ac.nz Tony McGregor, University of Waikato, Hamilton, New Zealand,

More information

Emulating Web Cache Replacement Algorithms versus a Real System

Emulating Web Cache Replacement Algorithms versus a Real System Emulating Web Cache Replacement Algorithms versus a Real System L.G. Cárdenas, J.A. Gil, J. Sahuquillo and A.Pont 1 Polytechnic University of Valencia, Camino de Vera, s/n Valencia, 46022 SPAIN luicaral@doctor.upv.es,

More information

Popularity-Based PPM: An Effective Web Prefetching Technique for High Accuracy and Low Storage

Popularity-Based PPM: An Effective Web Prefetching Technique for High Accuracy and Low Storage Proceedings of 22 International Conference on Parallel Processing, (ICPP 22), Vancouver, Canada, August 18-21, 22. Popularity-Based : An Effective Web Prefetching Technique for High Accuracy and Low Storage

More information

NinthDecimal Mobile Audience Insights Report. Q Spotlight on Quick Service (QSR) & Casual Dining Restaurants

NinthDecimal Mobile Audience Insights Report. Q Spotlight on Quick Service (QSR) & Casual Dining Restaurants NinthDecimal Mobile Audience Insights Report Q4 2013 Spotlight on Quick Service (QSR) & Casual Dining Restaurants Research Overview Consumer Dining Frequency 2 Mobile Influence on Path to Purchase 3-7

More information

The Total Network Volume chart shows the total traffic volume for the group of elements in the report.

The Total Network Volume chart shows the total traffic volume for the group of elements in the report. Tjänst: Network Health Total Network Volume and Total Call Volume Charts Public The Total Network Volume chart shows the total traffic volume for the group of elements in the report. Chart Description

More information

A Simple and Efficient Mechanism to Prevent Saturation in Wormhole Networks Λ

A Simple and Efficient Mechanism to Prevent Saturation in Wormhole Networks Λ A Simple and Efficient Mechanism to Prevent Saturation in Wormhole Networks Λ E. Baydal, P. López and J. Duato Depto. Informática de Sistemas y Computadores Universidad Politécnica de Valencia, Camino

More information

Evaluating Cache-Layering to Improve Web Cache System Performance

Evaluating Cache-Layering to Improve Web Cache System Performance Evaluating Cache-Layering to Improve Web Cache System Performance Bruno Abrahão Fabrício Benevenuto Departamento de Ciência da Computação Universidade Federal de Minas Gerais Av. Antônio Carlos, 6627,

More information

ESTIMATING PARAMETERS FOR MODIFIED GREENSHIELD S MODEL AT FREEWAY SECTIONS FROM FIELD OBSERVATIONS

ESTIMATING PARAMETERS FOR MODIFIED GREENSHIELD S MODEL AT FREEWAY SECTIONS FROM FIELD OBSERVATIONS 0 ESTIMATING PARAMETERS FOR MODIFIED GREENSHIELD S MODEL AT FREEWAY SECTIONS FROM FIELD OBSERVATIONS Omor Sharif University of South Carolina Department of Civil and Environmental Engineering 00 Main Street

More information

Quantitative Models for Performance Enhancement of Information Retrieval from Relational Databases

Quantitative Models for Performance Enhancement of Information Retrieval from Relational Databases Quantitative Models for Performance Enhancement of Information Retrieval from Relational Databases Jenna Estep Corvis Corporation, Columbia, MD 21046 Natarajan Gautam Harold and Inge Marcus Department

More information

Client-server Basics. 1. Motivation

Client-server Basics. 1. Motivation Page 1 of 8 Client-server Basics Oxford Brookes University 2004 Contents 1. Motivation 2. Basic Model of the Web 3. Extensions - Caching and Proxies 4. High Performance Web Servers 5. Web Services Appendices

More information

CIMA Certificate BA Interactive Timetable

CIMA Certificate BA Interactive Timetable CIMA Certificate BA Interactive Timetable 2018 Nottingham & Leicester Version 3.2 Information last updated 09/03/18 Please note: Information and dates in this timetable are subject to change. Introduction

More information

Broadband Traffic Report: Download Growth Slows for a Second Year Running

Broadband Traffic Report: Download Growth Slows for a Second Year Running Broadband Traffic Report: Download Growth Slows for a Second Year Running 1.1 Overview In this report, we analyze traffic over the broadband access services operated by IIJ and present the results each

More information

On the Relationship of Server Disk Workloads and Client File Requests

On the Relationship of Server Disk Workloads and Client File Requests On the Relationship of Server Workloads and Client File Requests John R. Heath Department of Computer Science University of Southern Maine Portland, Maine 43 Stephen A.R. Houser University Computing Technologies

More information

Improving the Performances of Proxy Cache Replacement Policies by Considering Infrequent Objects

Improving the Performances of Proxy Cache Replacement Policies by Considering Infrequent Objects Improving the Performances of Proxy Cache Replacement Policies by Considering Infrequent Objects Hon Wai Leong Department of Computer Science National University of Singapore 3 Science Drive 2, Singapore

More information

Combining In-Transit Buffers with Optimized Routing Schemes to Boost the Performance of Networks with Source Routing?

Combining In-Transit Buffers with Optimized Routing Schemes to Boost the Performance of Networks with Source Routing? Combining In-Transit Buffers with Optimized Routing Schemes to Boost the Performance of Networks with Source Routing? J. Flich 1,P.López 1, M. P. Malumbres 1, J. Duato 1, and T. Rokicki 2 1 Dpto. Informática

More information

DDG: An Efficient Prefetching Algorithm for Current Web Generation

DDG: An Efficient Prefetching Algorithm for Current Web Generation DDG: An Efficient Prefetching Algorithm for Current Web Generation Josep Domènech, José A. Gil, Julio Sahuquillo, Ana Pont Department of Computer Engineering (DISCA) Universitat Politècnica de València.

More information

A Web Requests Initiation Framework for Client-Side High Concurrency

A Web Requests Initiation Framework for Client-Side High Concurrency 2016 International Conference on Information Engineering and Communications Technology (IECT 2016) ISBN: 978-1-60595-375-5 Transcribe@Replay: A Web Requests Initiation Framework for Client-Side High Concurrency

More information

MONITORING REPORT ON THE WEBSITE OF THE STATISTICAL SERVICE OF CYPRUS DECEMBER The report is issued by the.

MONITORING REPORT ON THE WEBSITE OF THE STATISTICAL SERVICE OF CYPRUS DECEMBER The report is issued by the. REPUBLIC OF CYPRUS STATISTICAL SERVICE OF CYPRUS MONITORING REPORT ON THE WEBSITE OF THE STATISTICAL SERVICE OF CYPRUS DECEMBER The report is issued by the Monitoring Report STATISTICAL DISSEMINATION AND

More information

IAB Ireland Video On Demand 2017

IAB Ireland Video On Demand 2017 IAB Ireland Video On Demand 2017 October 2017 In association with: Study Methodology 2 iab Ireland wants to understand and provide marketers with a wide range of insights into the consumption and attitudes

More information

Dixit Verma Characterization and Implications of Flash Crowds and DoS attacks on websites

Dixit Verma Characterization and Implications of Flash Crowds and DoS attacks on websites Characterization and Implications of Flash Crowds and DoS attacks on websites Dixit Verma Department of Electrical & Computer Engineering Missouri University of Science and Technology dv6cb@mst.edu 9 Feb

More information

An Approach for Determining the Health of the DNS

An Approach for Determining the Health of the DNS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

Chapter 10 Protecting Virtual Environments

Chapter 10 Protecting Virtual Environments Chapter 10 Protecting Virtual Environments 164 - Protecting Virtual Environments As more datacenters move to virtualize their environments and the number of virtual machines and the physical hosts they

More information

SAT A Split-Up Cache Model to Boost the Performance of Web Cache Replacement Policies

SAT A Split-Up Cache Model to Boost the Performance of Web Cache Replacement Policies BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 11, No 4 Sofia 2011 SAT A Split-Up Cache Model to Boost the Performance of Web Cache Replacement Policies Geetha Krishnan 1,

More information

A Capacity Planning Methodology for Distributed E-Commerce Applications

A Capacity Planning Methodology for Distributed E-Commerce Applications A Capacity Planning Methodology for Distributed E-Commerce Applications I. Introduction Most of today s e-commerce environments are based on distributed, multi-tiered, component-based architectures. The

More information

Performance and cost effectiveness of caching in mobile access networks

Performance and cost effectiveness of caching in mobile access networks Performance and cost effectiveness of caching in mobile access networks Jim Roberts (IRT-SystemX) joint work with Salah Eddine Elayoubi (Orange Labs) ICN 2015 October 2015 The memory-bandwidth tradeoff

More information

BUT2 7day 11/4/07 11:07 PM Page 1. Introduction

BUT2 7day 11/4/07 11:07 PM Page 1. Introduction BUT2 7day 11/4/07 11:07 PM Page 1 Introduction This booklet will give you easy to follow instructions to allow you to set your BUT2 Timeswitch to the 7 Day, (different times every day) program. Contents

More information

DDOS-GUARD Q DDoS Attack Report

DDOS-GUARD Q DDoS Attack Report DDOS-GUARD Q4 2017 DDoS Attack Report 02 12,7% Number of attacks also dropped by 12,7% in comparison with same period in 2016 4613 Total number of DDoS attacks 36,8% Number of attacks dropped by 36.8%

More information

CSE 124: Networked Services Lecture-17

CSE 124: Networked Services Lecture-17 Fall 2010 CSE 124: Networked Services Lecture-17 Instructor: B. S. Manoj, Ph.D http://cseweb.ucsd.edu/classes/fa10/cse124 11/30/2010 CSE 124 Networked Services Fall 2010 1 Updates PlanetLab experiments

More information

Web File Transmission by Object Packaging Performance Comparison with HTTP 1.0 and HTTP 1.1 Persistent Connection

Web File Transmission by Object Packaging Performance Comparison with HTTP 1.0 and HTTP 1.1 Persistent Connection Web File Transmission by Performance Comparison with and Hiroshi Fujinoki, Murugesan Sanjay, and Chintan Shah Department of Computer Science Southern Illinois University at Edwardsville Edwardsville, Illinois

More information

Website minute read. Understand the business implications, tactics, costs, and creation process of an effective website.

Website minute read. Understand the business implications, tactics, costs, and creation process of an effective website. Website 101 Understand the business implications, tactics, costs, and creation process of an effective website. 8 minute read Mediant Web Development What to Expect 1. Why a Good Website is Crucial 2.

More information

The Multikey Web Cache Simulator: a Platform for Designing Proxy Cache Management Techniques

The Multikey Web Cache Simulator: a Platform for Designing Proxy Cache Management Techniques The Multikey Web Cache Simulator: a Platform for Designing Proxy Cache Management Techniques L.G. Cárdenas, J. Sahuquillo, A. Pont, and J.A. Gil 1 Departamento de Informática de Sistemas y Computadores

More information

Content Delivery and File Sharing in the Modern Internet

Content Delivery and File Sharing in the Modern Internet Content Delivery and File Sharing in the Modern Internet Henry M. Levy Department of Computer Science and Engineering University of Washington Seattle, WA Content Delivery and File Sharing in the Modern

More information

Multimedia Streaming. Mike Zink

Multimedia Streaming. Mike Zink Multimedia Streaming Mike Zink Technical Challenges Servers (and proxy caches) storage continuous media streams, e.g.: 4000 movies * 90 minutes * 10 Mbps (DVD) = 27.0 TB 15 Mbps = 40.5 TB 36 Mbps (BluRay)=

More information

Introduction CJ s Cross-Device Tracking Solution Key Strategies Shopping & Device Paths Average Order Value...

Introduction CJ s Cross-Device Tracking Solution Key Strategies Shopping & Device Paths Average Order Value... Table of Contents Introduction... 01 CJ s Cross-Device Tracking Solution... 02 Key Strategies... 03 Shopping & Device Paths... 04 Average Order Value... 05 Holiday 2017... 06 Time to Conversion... 07 Day

More information

Optimizing Parallel Access to the BaBar Database System Using CORBA Servers

Optimizing Parallel Access to the BaBar Database System Using CORBA Servers SLAC-PUB-9176 September 2001 Optimizing Parallel Access to the BaBar Database System Using CORBA Servers Jacek Becla 1, Igor Gaponenko 2 1 Stanford Linear Accelerator Center Stanford University, Stanford,

More information

MULTIMEDIA PROXY CACHING FOR VIDEO STREAMING APPLICATIONS.

MULTIMEDIA PROXY CACHING FOR VIDEO STREAMING APPLICATIONS. MULTIMEDIA PROXY CACHING FOR VIDEO STREAMING APPLICATIONS. Radhika R Dept. of Electrical Engineering, IISc, Bangalore. radhika@ee.iisc.ernet.in Lawrence Jenkins Dept. of Electrical Engineering, IISc, Bangalore.

More information

Some Observations of Internet Stream Lifetimes

Some Observations of Internet Stream Lifetimes Some Observations of Internet Stream Lifetimes Nevil Brownlee CAIDA, UC San Diego, and The University of Auckland, New Zealand nevil@auckland.ac.nz Abstract. We present measurements of stream lifetimes

More information

SIMON FRASER UNIVERSITY (SFU)

SIMON FRASER UNIVERSITY (SFU) powered by Telax A CASE STUDY SIMON FRASER UNIVERSITY (SFU) LEADING THE WAY FOR EDUCATIONAL INSTITUTIONS 1 powered by Telax Established: 1965 Alumni: 120,000 Concurrent Seats: 15 Students: 30,000 Faculty:

More information

2013 Association Marketing Benchmark Report

2013 Association  Marketing Benchmark Report 2013 Association Email Marketing Benchmark Report Part I: Key Metrics 1 TABLE of CONTENTS About Informz.... 3 Introduction.... 4 Key Findings.... 5 Overall Association Metrics... 6 Results by Country of

More information

A: 90% - 100% B: 80% - <90% C: 70% - <80% D: 60% - <70% F: < 60% Important Dates:

A: 90% - 100% B: 80% - <90% C: 70% - <80% D: 60% - <70% F: < 60% Important Dates: Department of Electronics Engineering Technology Division of Architecture, Engineering, & Technology West Campus Building 9, Room 140 (407) 582-1902/1903 http://www.valenciacollege.edu/west/engineering/

More information

CMPE 280 Web UI Design and Development

CMPE 280 Web UI Design and Development San José State University Department of Computer Engineering CMPE 280 Web UI Design and Development Section 2 Spring 2019 Course and Contact Information Instructor: Ron Mak Office Location: ENG 250 Email:

More information

Statement of Research for Taliver Heath

Statement of Research for Taliver Heath Statement of Research for Taliver Heath Research on the systems side of Computer Science straddles the line between science and engineering. Both aspects are important, so neither side should be ignored

More information

Bloom Filters. References:

Bloom Filters. References: Bloom Filters References: Li Fan, Pei Cao, Jussara Almeida, Andrei Broder, Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol, IEEE/ACM Transactions on Networking, Vol. 8, No. 3, June 2000.

More information

Frequency-based NCQ-aware disk cache algorithm

Frequency-based NCQ-aware disk cache algorithm LETTER IEICE Electronics Express, Vol.11, No.11, 1 7 Frequency-based NCQ-aware disk cache algorithm Young-Jin Kim a) Ajou University, 206, World cup-ro, Yeongtong-gu, Suwon-si, Gyeonggi-do 443-749, Republic

More information

NEW ZEALAND DIPLOMA IN WEB DEVELOPMENT AND DESIGN

NEW ZEALAND DIPLOMA IN WEB DEVELOPMENT AND DESIGN NEW ZEALAND DIPLOMA IN WEB DEVELOPMENT AND DESIGN (LEVEL 5) 2018 START DATES: 5 FEBRUARY 12 MARCH 16 APRIL Last Updated 12 December 2017 Want to be a Web Developer in the exciting world of IT? There s

More information

Applying Sequential Consistency to Web Caching

Applying Sequential Consistency to Web Caching Applying Sequential Consistency to Web Caching Francisco J. Torres-Rojas and Esteban Meneses Abstract Web caches have several advantages for reducing the server load, minimizing the network traffic and

More information

Nights & Weekend ROB & PHIL DECEMBER 12, 2008

Nights & Weekend ROB & PHIL DECEMBER 12, 2008 Nights & Weekend ROB & PHIL DECEMBER 12, 2008 Input Surveys R&IS Student Assistant R&IS Faculty & Staff Access Services Students Statistics Totals Services R&IS & Access Service Seniority R&IS Student

More information

Visualization of Internet Traffic Features

Visualization of Internet Traffic Features Visualization of Internet Traffic Features Jiraporn Pongsiri, Mital Parikh, Miroslova Raspopovic and Kavitha Chandra Center for Advanced Computation and Telecommunications University of Massachusetts Lowell,

More information

Analyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking

Analyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking Analyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking Claudio Imbrenda Luca Muscariello Orange Labs Dario Rossi Telecom ParisTech Outline Motivation

More information

Global and Application Levels Exception Detection System, Based on MASF Technique Igor Trubin, Ph.D. Capital One Services, Inc.

Global and Application Levels Exception Detection System, Based on MASF Technique Igor Trubin, Ph.D. Capital One Services, Inc. Global and Application Levels Exception Detection System, Based on MASF Technique Igor Trubin, Ph.D. Capital One Services, Inc. The paper describes one site's experience of using Multivariate Adaptive

More information

SUMMER Early Registration Begins On... Summer Hours. Tuition (per child): JUNE 2019

SUMMER Early Registration Begins On... Summer Hours. Tuition (per child): JUNE 2019 SUMMER 2019 JUNE 2019 SUN MON TUE WED THU FRI SAT 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 30 24 25 26 27 28 29 JULY 2019 SUN MON TUE WED THU FRI SAT 1 2 3 4 5 6 7 8 9 10 11 12 13 14

More information

Changes in the Web from 2000 to 2007

Changes in the Web from 2000 to 2007 Changes in the Web from 2000 to 2007 Ramin Sadre and Boudewijn R. Haverkort University of Twente Centre for Telematics and Information Technology Faculty of Electrical Engineering, Mathematics and Computer

More information

Fluid models for evaluating threshold-based control policies for survivability of a distributed network

Fluid models for evaluating threshold-based control policies for survivability of a distributed network Fluid models for evaluating threshold-based control policies for survivability of a distributed network Vineet Aggarwal ICF Consulting 9 Lee Highway, Fairfax, VA Nataraan Gautam Marcus Department of Industrial

More information

Partial Caching Scheme for Streaming Multimedia Data in Ad-hoc Network

Partial Caching Scheme for Streaming Multimedia Data in Ad-hoc Network , pp.106-110 http://dx.doi.org/10.14257/astl.2014.51.25 Partial Caching Scheme for Streaming Multimedia Data in Ad-hoc Network Backhyun Kim and Iksoo Kim 1 Faculty of Liberal Education, Incheon National

More information

Web Caching and Content Delivery

Web Caching and Content Delivery Web Caching and Content Delivery Caching for a Better Web Performance is a major concern in the Web Proxy caching is the most widely used method to improve Web performance Duplicate requests to the same

More information

Daily Math Week 10 ( ) Mon. October 21, 2013 Tues. October 22, 2013 Wed. October 23, 2013 Thurs. October 24, 2013 Fri.

Daily Math Week 10 ( ) Mon. October 21, 2013 Tues. October 22, 2013 Wed. October 23, 2013 Thurs. October 24, 2013 Fri. Daily Math Week 10 (2013-2014) Mon. October 21, 2013 Tues. October 22, 2013 Wed. October 23, 2013 Thurs. October 24, 2013 Fri. October 25, 2013 1 Monday, October 21, 2013 1 st Solve 2x + 4x 2 = 26 2 Monday,

More information

CIMA Strategic Level Classroom Courses For March & May 2014 Exams

CIMA Strategic Level Classroom Courses For March & May 2014 Exams CIMA Strategic Level Classroom Courses For March & May 201 Exams If you require further information, would like to talk about your study needs or would like to enrol for a course: Call + (0) 180 355 325

More information

Web File Transmission by Object Packaging Performance Comparison with HTTP 1.0 and HTTP 1.1 Persistent Connection

Web File Transmission by Object Packaging Performance Comparison with HTTP 1.0 and HTTP 1.1 Persistent Connection Web File Transmission by Performance Comparison with HTTP 1. and Hiroshi Fujinoki, Murugesan Sanjay, and Chintan Shah Department of Computer Science Southern Illinois University at Edwardsville Edwardsville,

More information

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/220850337 On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement

More information

OpenCache. A Platform for Efficient Video Delivery. Matthew Broadbent. 1 st Year PhD Student

OpenCache. A Platform for Efficient Video Delivery. Matthew Broadbent. 1 st Year PhD Student OpenCache A Platform for Efficient Video Delivery Matthew Broadbent 1 st Year PhD Student Motivation Consumption of video content on the Internet is constantly expanding Video-on-demand is an ever greater

More information

Job sample: SCOPE (VLDBJ, 2012)

Job sample: SCOPE (VLDBJ, 2012) Apollo High level SQL-Like language The job query plan is represented as a DAG Tasks are the basic unit of computation Tasks are grouped in Stages Execution is driven by a scheduler Job sample: SCOPE (VLDBJ,

More information

CPSC 641: WAN Measurement. Carey Williamson Department of Computer Science University of Calgary

CPSC 641: WAN Measurement. Carey Williamson Department of Computer Science University of Calgary CPSC 641: WAN Measurement Carey Williamson Department of Computer Science University of Calgary WAN Traffic Measurements There have been several studies of wide area network traffic (i.e., Internet traffic)

More information

NET0183 Networks and Communications

NET0183 Networks and Communications Lectures 7 and 8 Measured performance of an Ethernet Ethernet is a CSMA/CD network. Carrier Sense Multiple Access with Collision Detection 1 Historical Case Study http://portal.acm.org/beta/citation.cfm?id=359044

More information

Graph Structure Over Time

Graph Structure Over Time Graph Structure Over Time Observing how time alters the structure of the IEEE data set Priti Kumar Computer Science Rensselaer Polytechnic Institute Troy, NY Kumarp3@rpi.edu Abstract This paper examines

More information

Q WEB APPLICATION ATTACK STATISTICS

Q WEB APPLICATION ATTACK STATISTICS WEB APPLICATION ATTACK STATISTICS CONTENTS Introduction...3 Results at a glance...4 Web application attacks: statistics...5 Attack types...5 Attack trends...11 Conclusion...13 2 INTRODUCTION This report

More information

Performance of a Switched Ethernet: A Case Study

Performance of a Switched Ethernet: A Case Study Performance of a Switched Ethernet: A Case Study M. Aboelaze A Elnaggar Dept. of Computer Science Dept of Electrical Engineering York University Sultan Qaboos University Toronto Ontario Alkhod 123 Canada

More information

PeerApp Case Study. November University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs

PeerApp Case Study. November University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs PeerApp Case Study University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs November 2010 Copyright 2010-2011 PeerApp Ltd. All rights reserved 1 Executive Summary

More information

Conditional Formatting

Conditional Formatting Microsoft Excel 2013: Part 5 Conditional Formatting, Viewing, Sorting, Filtering Data, Tables and Creating Custom Lists Conditional Formatting This command can give you a visual analysis of your raw data

More information

PERFORMANCE MEASUREMENT OF WORLD WIDE WEB SERVERS

PERFORMANCE MEASUREMENT OF WORLD WIDE WEB SERVERS PERFORMANCE MEASUREMENT OF WORLD WIDE WEB SERVERS Cristina Hava & Liam Murphy 1 Abstract The World Wide Web (WWW, or Web) is one of the most important Internet services, and has been largely responsible

More information

Webinar Benchmarks Report

Webinar Benchmarks Report ON24 BENCHMARKS ON24 BENCHMARKS REPORT REPORT ON24 Webinar Benchmarks Report 2015 EMEA EDITION ON24 Webinar Benchmarks Report 2015 edition 1 TABLE OF CONTENTS EXECUTIVE SUMMARY 03 METHODOLOGY PRE-WEBINAR

More information