Seminar on. By Sai Rahul Reddy P. 2/2/2005 Web Caching 1

Size: px
Start display at page:

Download "Seminar on. By Sai Rahul Reddy P. 2/2/2005 Web Caching 1"

Transcription

1 Seminar on By Sai Rahul Reddy P 2/2/2005 Web Caching 1

2 Topics covered 1. Why Caching 2. Advantages of Caching 3. Disadvantages of Caching 4. Cache-Control HTTP Headers 5. Proxy Caching 6. Caching architectures 7. Prefetching 8. Cache Replacement Strategies 9. Cache Coherence Mechanisms 10. Dynamic Caching 2/2/2005 Web Caching 2

3 Why Caching The World Wide Web is of an exponential growth in size, which results in network congestion and server overloading (the size of static Web pages increases approximately 15 % per month). http// Additionally, each Internet data request from the end-user can lead to large and variable delays. Such slow response times make Internet use and E-commerce undesirable and impractical for the end- user. 2/2/2005 Web Caching 3

4 Advantages of Caching 1. Web caching reduces bandwidth consumption, thereby decreases network traffic and lessens network congestion. 2. Web caching reduces access latency due to two reasons: a) Frequently accessed documents are fetched from nearby proxy caches instead of remote data servers, the transmission delay is minimized. b) Because of the reduction in network traffic, those documents not cached can also be retrieved relatively faster than without caching due to less congestion along the path and less workload at the server. 3. Web caching reduces the workload of the remote Web server by disseminating data among the proxy caches over the wide area network. 4. If the remote server is not available due to the remote server's crash, the client can obtain a cached copy at the proxy. Thus, the robustness of the Web service is enhanced. 2/2/2005 Web Caching 4

5 Disadvantages of using a caching 1. The main disadvantage is that a client might be looking at stale data due to the lack of proper proxy updating. 2. The access latency may increase in the case of a cache miss due to the extra proxy processing. Hence, cache hit rate should be maximized and the cost of a cache miss should be minimized when designing a caching system. 3. A single proxy cache is always a bottleneck. A limit has to be set for the number of clients a proxy can serve. An efficiency lower bound should also be enforced. 4. A single proxy is a single point of failure. 5. Using a proxy cache will reduce the hits on the original remote server which might disappoint a lot of information providers, since they cannot maintain a true log of the hits to their pages. Hence, they might decide not to allow their documents to be cacheable 2/2/2005 Web Caching 5

6 HTTP 1.1 GET / HTTP/1.1 Host: mail.yahoo.com If-Modified-Since:date Connection:close Typical HTTP 1.1 request Header HTTP/ OK Date: Fri, 30 Oct :19:41 GMT Server: Apache/1.3.3 (Unix) Cache-Control: max-age=3600, must-revalidate Expires: Fri, 30 Oct :19:41 GMT Last-Modified: Mon, 29 Jun :28:12 GMT ETag: "3e fbbc" Content-Length: 1040 Content-Type: text/html Typical HTTP 1.1 response Header 2/2/2005 Web Caching 6

7 Cache-Control HTTP Headers max-age=[seconds] specifies the maximum amount of time that an representation will be considered fresh. Similar to Expires, this directive is relative to the time of the request, rather than absolute. [seconds] is the number of seconds from the time of the request you wish the representation to be fresh for. s-maxage=[seconds] similar to max-age, except that it only applies to shared (e.g., proxy) caches. public marks authenticated responses as cacheable; normally, if HTTP authentication is required, responses are automatically uncacheable. no-cache forces caches to submit the request to the origin server for validation before releasing a cached copy, every time. This is useful to assure that authentication is respected (in combination with public), or to maintain rigid freshness, without sacrificing all of the benefits of caching. no-store instructs caches not to keep a copy of the representation under any conditions. must-revalidate tells caches that they must obey any freshness information you give them about a representation. HTTP allows caches to serve stale representations under special conditions; by specifying this header, you re telling the cache that you want it to strictly follow your rules. proxy-revalidate similar to must-revalidate, except that it only applies to proxy caches. 2/2/2005 Web Caching 7

8 What is cacheable? Objects that have a long freshness time,small in size and have high access latency (when fetched from the origin server) are the objects best suited for caching. The following objects cannot be normally cached. Objects that are password-protected Any URLs with /cgi-bin/ or any other pre-configured patterns (for example, if a URL contains?, it is indicative that the URL is calling a program with the portion after the? as its argument.) Any file exceeding a pre-defined limit. SSL requests, which are tunneled through and not cached. 2/2/2005 Web Caching 8

9 Proxy Caching Forward Proxy Caching Reverse Proxy Caching Transparent Proxy Caching Router transparent Switch transparent proxy caching 2/2/2005 Web Caching 9

10 Caching architectures Hierarchical caching architecture (Figure) Caches placed at different network levels: Client, Institutional, Regional, National. When a document is found it travels down the hierarchy Problems: 1) Additional Delays 2) Higher Level Caches potential Bottlenecks 3) Several Copies of Document Stored Distributed caching architecture (Figure) No intermediate caches. Only Institutional Caches. Have mechanisms to share documents: ICP, CARP, Cache Digests (Ex) 2/2/2005 Web Caching 10

11 Prefetching Why Prefetching? Maximum cache hit rate can be achieved by any caching algorithm is usually no more than 40 % to 50%. Prefetching can be applied in 3 ways 1. Between browser clients and Web servers 2. Between proxies and Web servers 3. Between browser clients and proxies 2/2/2005 Web Caching 11

12 Cache Replacement Policies Traditional replacement policies and its direct extensions: 1. Least Recently Used (LRU): LRU evicts the object which was requested the least recently. 2. Lease Frequently used (LFU): LFU evicts the object which is accessed least frequently. 3. Pitkow/Recker Strategy: It evicts objects in LRU order, except if all objects are accessed within the same day, in which case the largest one is removed. 2/2/2005 Web Caching 12

13 Cache Replacement Policies Key based Replacement Policies 1. LRU-MIN: If there are any objects in the cache which have size being at least S, LRU-MIN evicts the least recently used such object from the cache. If there are no objects with size being at least S, then LRU-MIN starts evicting objects in LRU order of size being at least S/2. That is, the object who has the largest log(size) and is the least recently used object among all objects with the same log(size) will be evicted first. 2. LRU-Threshold: It is the same as LRU, but objects larger than a certain threshold size are never cached. 3. Lowest Latency First: It minimizes average latency by evicting the document with the lowest download latency first. 2/2/2005 Web Caching 13

14 Cache Replacement Policies Cost based replacement strategies Greedy Dual Size (GD-Size) Associates a cost with each object and evicts object with the lowest cost/size. Hierarchical Greedy Dual (Hierarchical GD) The function for an object i from server s depends on the following parameters: c s (time to contact server s), b s (available bandwidth to server s). The function is defined as where W b and W n are weighting parameters. Estimates for c s and b s are based on the time to fetch documents from server s in the recent past. 2/2/2005 Web Caching 14

15 Cache Coherency Mechanisms 1. Strong Cache Consistency (a) Client Validation (b) Server invalidation 2. Weak cache consistency (a) Adaptive TTL (b) Piggyback Invalidation -- Piggyback Cache Invalidation -- Piggyback Server Invalidation 2/2/2005 Web Caching 15

16 Dynamic Data Caching Active Cache Web server Accelerators 2/2/2005 Web Caching 16

17 Overview of Dynamic proxy caching system 2/2/2005 Web Caching 17

18 Conclusion Web service becomes more popular -- More network congestion -- More server overloading Web caching one of the effective techniques Caching Dynamic pages, cache routing, proxy placement 2/2/2005 Web Caching 18

19 Hierarchical caching architecture (Back) 2/2/2005 Web Caching 19

20 (Back) 2/2/2005 Web Caching 20

21 Example (Bloom Filters) S = {14, 63, 57, 31} m = 12 (i.e., 3 bits per key) k = 3; h 1 (x) = (x + 1) mod 12; h 2 (x) = (3x + 2) mod 12; h 3 (x) = (5x+3) mod 12 x h 1 h 2 h V /2/2005 Web Caching 21

22 Example: Membership Test Does 20 belongs to S? Answer:h 1 (20) = (20 + 1) mod 12 = 9 V (Back) 2/2/2005 Web Caching 22

A Scalable Efficient Robust Adaptive (SERA) Architecture for the Next Generation of Web Service

A Scalable Efficient Robust Adaptive (SERA) Architecture for the Next Generation of Web Service A Scalable Efficient Robust Adaptive (SERA) Architecture for the Next Generation of Web Service Jia Wang Cornell Network Research Group (C/NRG) Department of Computer Science, Cornell University Ithaca,

More information

CIT 668: System Architecture. Caching

CIT 668: System Architecture. Caching CIT 668: System Architecture Caching Topics 1. Cache Types 2. Web Caching 3. Replacement Algorithms 4. Distributed Caches 5. memcached A cache is a system component that stores data so that future requests

More information

COMP6218: Content Caches. Prof Leslie Carr

COMP6218: Content Caches. Prof Leslie Carr COMP6218: Content Caches Prof Leslie Carr 1 Slashdot.org The Slashdot effect, also known as slashdotting, occurs when a popular website links to a smaller site, causing a massive increase in traffic 2

More information

Modelling and Analysis of Push Caching

Modelling and Analysis of Push Caching Modelling and Analysis of Push Caching R. G. DE SILVA School of Information Systems, Technology & Management University of New South Wales Sydney 2052 AUSTRALIA Abstract: - In e-commerce applications,

More information

1-1. Switching Networks (Fall 2010) EE 586 Communication and. September Lecture 10

1-1. Switching Networks (Fall 2010) EE 586 Communication and. September Lecture 10 EE 586 Communication and Switching Networks (Fall 2010) Lecture 10 September 17 2010 1-1 Announcement Send me your group and get group ID HW3 (short) out on Monday Personal leave for next two weeks No

More information

Caching. Caching Overview

Caching. Caching Overview Overview Responses to specific URLs cached in intermediate stores: Motivation: improve performance by reducing response time and network bandwidth. Ideally, subsequent request for the same URL should be

More information

Proxying. Why and How. Alon Altman. Haifa Linux Club. Proxying p.1/24

Proxying. Why and How. Alon Altman. Haifa Linux Club. Proxying p.1/24 Proxying p.1/24 Proxying Why and How Alon Altman alon@haifux.org Haifa Linux Club Proxying p.2/24 Definition proxy \Prox"y\, n.; pl. Proxies. The agency for another who acts through the agent; authority

More information

Web Engineering. Basic Technologies: Protocols and Web Servers. Husni

Web Engineering. Basic Technologies: Protocols and Web Servers. Husni Web Engineering Basic Technologies: Protocols and Web Servers Husni Husni@trunojoyo.ac.id Basic Web Technologies HTTP and HTML Web Servers Proxy Servers Content Delivery Networks Where we will be later

More information

Squirrel case-study. Decentralized peer-to-peer web cache. Traditional centralized web cache. Based on the Pastry peer-to-peer middleware system

Squirrel case-study. Decentralized peer-to-peer web cache. Traditional centralized web cache. Based on the Pastry peer-to-peer middleware system Decentralized peer-to-peer web cache Based on the Pastry peer-to-peer middleware system Traditional centralized web cache 1 2 Decentralized caching of web pages use the resources of peers (web browsers/clients)

More information

CSE/EE 461 HTTP and the Web

CSE/EE 461 HTTP and the Web CSE/EE 461 HTTP and the Web Last Time The Transport Layer Focus How does TCP share bandwidth? Topics AIMD Slow Start Application Presentation Session Transport Network Data Link Fast Retransmit / Fast

More information

Configuring Caching Services

Configuring Caching Services CHAPTER 8 This chapter describes how to configure conventional caching services (HTTP, FTP [FTP-over-HTTP caching and native FTP caching], HTTPS, and DNS caching) for centrally managed Content Engines.

More information

Today: World Wide Web! Traditional Web-Based Systems!

Today: World Wide Web! Traditional Web-Based Systems! Today: World Wide Web! WWW principles Case Study: web caching as an illustrative example Invalidate versus updates Push versus Pull Cooperation between replicas Lecture 22, page 1 Traditional Web-Based

More information

Reminders. - Open book, open notes, closed laptop - Bring textbook - Bring printouts of slides & any notes you may have taken

Reminders. - Open book, open notes, closed laptop - Bring textbook - Bring printouts of slides & any notes you may have taken Reminders Lab 3 due today Midterm exam Monday - Open book, open notes, closed laptop - Bring textbook - Bring printouts of slides & any notes you may have taken David Mazières moving office hours next

More information

CMSC 332 Computer Networking Web and FTP

CMSC 332 Computer Networking Web and FTP CMSC 332 Computer Networking Web and FTP Professor Szajda CMSC 332: Computer Networks Project The first project has been posted on the website. Check the web page for the link! Due 2/2! Enter strings into

More information

Web, HTTP and Web Caching

Web, HTTP and Web Caching Web, HTTP and Web Caching 1 HTTP overview HTTP: hypertext transfer protocol Web s application layer protocol client/ model client: browser that requests, receives, displays Web objects : Web sends objects

More information

Last Class: Consistency Models. Today: Implementation Issues

Last Class: Consistency Models. Today: Implementation Issues Last Class: Consistency Models Need for replication Data-centric consistency Strict, linearizable, sequential, causal, FIFO Lecture 15, page 1 Today: Implementation Issues Replica placement Use web caching

More information

Application Layer. Applications and application-layer protocols. Goals:

Application Layer. Applications and application-layer protocols. Goals: Application Layer Goals: Conceptual aspects of network application protocols Client paradigm Service models Learn about protocols by examining popular application-level protocols HTTP DNS 1 Applications

More information

A taste of HTTP v1.1. additions. HTTP v1.1: introduces many complexities no longer an easy protocol to implement. G.Bianchi, G.Neglia, V.

A taste of HTTP v1.1. additions. HTTP v1.1: introduces many complexities no longer an easy protocol to implement. G.Bianchi, G.Neglia, V. Why HTTP needed extensions? A taste of HTTP v1.1 additions HTTP v1.1: introduces many complexities no longer an easy protocol to implement Simple (one packet) ) Web Page SYN Retrieval Time Propagation

More information

Lecture 7b: HTTP. Feb. 24, Internet and Intranet Protocols and Applications

Lecture 7b: HTTP. Feb. 24, Internet and Intranet Protocols and Applications Internet and Intranet Protocols and Applications Lecture 7b: HTTP Feb. 24, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu WWW - HTTP/1.1 Web s application layer protocol

More information

Outline Computer Networking. HTTP Basics (Review) How to Mark End of Message? (Review)

Outline Computer Networking. HTTP Basics (Review) How to Mark End of Message? (Review) Outline 15-441 Computer Networking Lecture 25 The Web HTTP review and details (more in notes) Persistent HTTP review HTTP caching Content distribution networks Lecture 19: 2006-11-02 2 HTTP Basics (Review)

More information

CS4/MSc Computer Networking. Lecture 3: The Application Layer

CS4/MSc Computer Networking. Lecture 3: The Application Layer CS4/MSc Computer Networking Lecture 3: The Application Layer Computer Networking, Copyright University of Edinburgh 2005 Network Applications Examine a popular network application: Web Client-server architecture

More information

A Survey of Web Caching Schemes for the Internet

A Survey of Web Caching Schemes for the Internet A Survey of Web Caching Schemes for the Internet Jia Wang Cornell Network Research Group (C/NRG) Department of Computer Science, Cornell University Ithaca, NY 14853-7501 jiawang@cs.cornell.edu Abstract

More information

Web. Computer Organization 4/16/2015. CSC252 - Spring Web and HTTP. URLs. Kai Shen

Web. Computer Organization 4/16/2015. CSC252 - Spring Web and HTTP. URLs. Kai Shen Web and HTTP Web Kai Shen Web: the Internet application for distributed publishing and viewing of content Client/server model server: hosts published content and sends the content upon request client:

More information

HyperText Transfer Protocol

HyperText Transfer Protocol Outline Introduce Socket Programming Domain Name Service (DNS) Standard Application-level Protocols email (SMTP) HTTP HyperText Transfer Protocol Defintitions A web page consists of a base HTML-file which

More information

Application Protocols and HTTP

Application Protocols and HTTP Application Protocols and HTTP 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Lab #0 due

More information

Yioop Full Historical Indexing In Cache Navigation. Akshat Kukreti

Yioop Full Historical Indexing In Cache Navigation. Akshat Kukreti Yioop Full Historical Indexing In Cache Navigation Akshat Kukreti Agenda Introduction History Feature Cache Page Validation Feature Conclusion Demo Introduction Project goals History feature for enabling

More information

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy Que: -Proxy server Introduction: Proxy simply means acting on someone other s behalf. A Proxy acts on behalf of the client or user to provide access to a network service, and it shields each side from

More information

Bloom Filters. References:

Bloom Filters. References: Bloom Filters References: Li Fan, Pei Cao, Jussara Almeida, Andrei Broder, Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol, IEEE/ACM Transactions on Networking, Vol. 8, No. 3, June 2000.

More information

How Far Can Client-Only Solutions Go for Mobile Browser Speed?

How Far Can Client-Only Solutions Go for Mobile Browser Speed? How Far Can Client-Only Solutions Go for Mobile Browser Speed? u Presenter: Ye Li LOGO Introduction u Web browser is one of the most important applications on mobile devices. It is known to be slow, taking

More information

Applications & Application-Layer Protocols: The Web & HTTP

Applications & Application-Layer Protocols: The Web & HTTP CPSC 360 Network Programming Applications & Application-Layer Protocols: The Web & HTTP Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu http://www.cs.clemson.edu/~mweigle/courses/cpsc360

More information

Chapter The LRU* WWW proxy cache document replacement algorithm

Chapter The LRU* WWW proxy cache document replacement algorithm Chapter The LRU* WWW proxy cache document replacement algorithm Chung-yi Chang, The Waikato Polytechnic, Hamilton, New Zealand, itjlc@twp.ac.nz Tony McGregor, University of Waikato, Hamilton, New Zealand,

More information

EE 122: HyperText Transfer Protocol (HTTP)

EE 122: HyperText Transfer Protocol (HTTP) Background EE 122: HyperText Transfer Protocol (HTTP) Ion Stoica Nov 25, 2002 World Wide Web (WWW): a set of cooperating clients and servers that communicate through HTTP HTTP history - First HTTP implementation

More information

A CONTENT-TYPE BASED EVALUATION OF WEB CACHE REPLACEMENT POLICIES

A CONTENT-TYPE BASED EVALUATION OF WEB CACHE REPLACEMENT POLICIES A CONTENT-TYPE BASED EVALUATION OF WEB CACHE REPLACEMENT POLICIES F.J. González-Cañete, E. Casilari, A. Triviño-Cabrera Department of Electronic Technology, University of Málaga, Spain University of Málaga,

More information

The Effectiveness of Cache Coherence Implemented on the Web

The Effectiveness of Cache Coherence Implemented on the Web The Effectiveness of Cache Coherence Implemented on the Web Felicia Doswell and Marc Abrams Department of Computer Science Virginia Tech Blacksburg, Virginia 246 fdoswell,abrams @.vt.edu Abstract The popularity

More information

Physical characteristics (such as packaging, volatility, and erasability Organization.

Physical characteristics (such as packaging, volatility, and erasability Organization. CS 320 Ch 4 Cache Memory 1. The author list 8 classifications for memory systems; Location Capacity Unit of transfer Access method (there are four:sequential, Direct, Random, and Associative) Performance

More information

Evaluation of Strong Consistency Web Caching Techniques

Evaluation of Strong Consistency Web Caching Techniques World Wide Web: Internet and Web Information Systems, 5, 95 123, 2002 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. Evaluation of Strong Consistency Web Caching Techniques L. Y. CAO

More information

Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment

Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment Y.-K. Chang, M.-H. Hong, and Y.-W. Ting Dept. of Computer Science & Information Engineering, National Cheng Kung University

More information

Scalability, Performance & Caching

Scalability, Performance & Caching COMP 150-IDS: Internet Scale Distributed Systems (Spring 2015) Scalability, Performance & Caching Noah Mendelsohn Tufts University Email: noah@cs.tufts.edu Web: http://www.cs.tufts.edu/~noah Copyright

More information

Engineering server driven consistency for large scale dynamic web services

Engineering server driven consistency for large scale dynamic web services Engineering server driven consistency for large scale dynamic web services Jian Yin, Lorenzo Alvisi, Mike Dahlin, Calvin Lin Department of Computer Sciences University of Texas at Austin Arun Iyengar IBM

More information

Web, HTTP, Caching, CDNs

Web, HTTP, Caching, CDNs Web, HTTP, Caching, CDNs Outline Web HyperText Transfer Protocol (HTTP) Inefficiencies in HTTP HTTP Persistent Connections Caching CDNs Consistent Hashing CS 640 1 Web Original goal of the web: mechanism

More information

Yahoo Traffic Server -a Powerful Cloud Gatekeeper

Yahoo Traffic Server -a Powerful Cloud Gatekeeper Yahoo Traffic Server -a Powerful Cloud Gatekeeper Shih-Yong Wang Yahoo! Taiwan 2010 COSCUP Aug 15, 2010 What is Proxy Caching? Proxy Caching explicit client configuration transparent emulate responses

More information

Deployment Guide AX Series with Oracle E-Business Suite 12

Deployment Guide AX Series with Oracle E-Business Suite 12 Deployment Guide AX Series with Oracle E-Business Suite 12 DG_OEBS_032013.1 TABLE OF CONTENTS 1 Introduction... 4 2 Deployment Prerequisites... 4 3 Oracle E-Business Topology... 5 4 Accessing the AX Series

More information

Configuring an Optimization HTTP Action List

Configuring an Optimization HTTP Action List CHAPTER 2 Configuring an Optimization HTTP Action List This chapter describes how to configure an optimization HTTP action list for the Cisco 4700 Series Application Control Engine (ACE) appliance. An

More information

Scalability, Performance & Caching

Scalability, Performance & Caching COMP 150-IDS: Internet Scale Distributed Systems (Spring 2018) Scalability, Performance & Caching Noah Mendelsohn Tufts University Email: noah@cs.tufts.edu Web: http://www.cs.tufts.edu/~noah Copyright

More information

Today: World Wide Web

Today: World Wide Web Today: World Wide Web WWW principles Case Study: web caching as an illustrative example Invalidate versus updates Push versus Pull Cooperation between replicas Lecture 22, page 1 Traditional Web-Based

More information

A Proxy Caching Scheme for Continuous Media Streams on the Internet

A Proxy Caching Scheme for Continuous Media Streams on the Internet A Proxy Caching Scheme for Continuous Media Streams on the Internet Eun-Ji Lim, Seong-Ho park, Hyeon-Ok Hong, Ki-Dong Chung Department of Computer Science, Pusan National University Jang Jun Dong, San

More information

Today: World Wide Web. Traditional Web-Based Systems

Today: World Wide Web. Traditional Web-Based Systems Today: World Wide Web WWW principles Case Study: web caching as an illustrative example Invalidate versus updates Push versus Pull Cooperation between replicas Lecture 22, page 1 Traditional Web-Based

More information

Chapter 6 Objectives

Chapter 6 Objectives Chapter 6 Memory Chapter 6 Objectives Master the concepts of hierarchical memory organization. Understand how each level of memory contributes to system performance, and how the performance is measured.

More information

Relative Reduced Hops

Relative Reduced Hops GreedyDual-Size: A Cost-Aware WWW Proxy Caching Algorithm Pei Cao Sandy Irani y 1 Introduction As the World Wide Web has grown in popularity in recent years, the percentage of network trac due to HTTP

More information

Lecture 6 Application Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 Application Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 Application Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Application-layer protocols Application: communicating, distributed processes running in network hosts

More information

A Review of Web Caching Techniques and Caching Algorithms for Effective and Improved Caching

A Review of Web Caching Techniques and Caching Algorithms for Effective and Improved Caching A Review of Web Techniques and Algorithms for Effective and Improved Pranay Nanda (Post Graduate Student) Amity School of Engineering and Technology Amity University, Rajasthan Shamsher Singh (Astt Prof)

More information

Hypertext Transport Protocol HTTP/1.1

Hypertext Transport Protocol HTTP/1.1 Hypertext Transport Protocol HTTP/1.1 Jim Gettys Digital Equipment Corporation, ISBU Visiting Scientist, World Wide Web Consortium 10/17/96 20-Apr-01 1 Acknowledgments HTTP/1.1 Authors Roy Fielding (UCI)

More information

Web as a Distributed System

Web as a Distributed System Web as a Distributed System The World Wide Web is a large distributed system. In 1998 comprises 70-75% of Internet traffic. With large transfers of streaming media and p2p, no longer a majority of bytes,

More information

Inktomi. Network. Products. Traffic Server 4.0. Inktomi. Administrator s Guide

Inktomi. Network. Products. Traffic Server 4.0. Inktomi. Administrator s Guide Inktomi Network Products Traffic Server 4.0 Administrator s Guide Inktomi Document Release 4.0 October 13, 2000 Copyright 1999-2000 Inktomi Corporation. All Rights Reserved. This document contains proprietary

More information

Internet Content Distribution

Internet Content Distribution Internet Content Distribution Chapter 1: Introduction Jussi Kangasharju Chapter Outline Introduction into content distribution Basic concepts TCP DNS HTTP Outline of the rest of the course Kangasharju:

More information

Dynamics and Cachability of Web Sites: Implications for Inverted Capacity Networks

Dynamics and Cachability of Web Sites: Implications for Inverted Capacity Networks Dynamics and Cachability of Web Sites: Implications for Inverted Capacity Networks Sebastian Zander 1, Grenville Armitage, Clancy Malcolm Center for Advanced Internet Architectures. Technical Report 030405B

More information

Trace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers

Trace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers Proceeding of the 9th WSEAS Int. Conference on Data Networks, Communications, Computers, Trinidad and Tobago, November 5-7, 2007 378 Trace Driven Simulation of GDSF# and Existing Caching Algorithms for

More information

0 0& Basic Background. Now let s get into how things really work!

0 0& Basic Background. Now let s get into how things really work! +,&&-# Department of Electrical Engineering and Computer Sciences University of California Berkeley Basic Background General Overview of different kinds of networks General Design Principles Architecture

More information

CHAPTER 4 OPTIMIZATION OF WEB CACHING PERFORMANCE BY CLUSTERING-BASED PRE-FETCHING TECHNIQUE USING MODIFIED ART1 (MART1)

CHAPTER 4 OPTIMIZATION OF WEB CACHING PERFORMANCE BY CLUSTERING-BASED PRE-FETCHING TECHNIQUE USING MODIFIED ART1 (MART1) 71 CHAPTER 4 OPTIMIZATION OF WEB CACHING PERFORMANCE BY CLUSTERING-BASED PRE-FETCHING TECHNIQUE USING MODIFIED ART1 (MART1) 4.1 INTRODUCTION One of the prime research objectives of this thesis is to optimize

More information

INFT 803. Fall Semester, Ph.D. Candidate: Rosana Holliday

INFT 803. Fall Semester, Ph.D. Candidate: Rosana Holliday INFT 803 Fall Semester, 1999 Ph.D. Candidate: Rosana Holliday Papers Addressed Removal Policies in Network Caches for World-Wide Web Documents Performance of Web Proxy Caching in Heterogeneous Bandwidth

More information

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng.

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng. CS 355 Computer Networking Wei Lu, Ph.D., P.Eng. Chapter 2: Application Layer Overview: Principles of network applications? Introduction to Wireshark Web and HTTP FTP Electronic Mail SMTP, POP3, IMAP DNS

More information

Web Caching and Content Delivery

Web Caching and Content Delivery Web Caching and Content Delivery Caching for a Better Web Performance is a major concern in the Web Proxy caching is the most widely used method to improve Web performance Duplicate requests to the same

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Improving the WWW: caching or multicast?

Improving the WWW: caching or multicast? Computer Networks and ISDN Systems 30 (1998) 2223 2243 Improving the WWW: caching or multicast? Pablo Rodriguez Ł,1, Keith W. Ross 1, Ernst W. Biersack 1 Institut EURECOM, 2229, route des Crêtes, BP 193,

More information

Improving the WWW: Caching or Multicast?

Improving the WWW: Caching or Multicast? Improving the WWW: Caching or Multicast? Pablo Rodriguez Keith W. Ross Ernst W. Biersack Institut EURECOM 2229, route des Crêtes, BP 193 694, Sophia Antipolis Cedex, FRANCE frodrigue, ross, erbig@eurecom.fr

More information

Create Decryption Policies to Control HTTPS Traffic

Create Decryption Policies to Control HTTPS Traffic Create Decryption Policies to Control HTTPS Traffic This chapter contains the following sections: Overview of Create Decryption Policies to Control HTTPS Traffic, page 1 Managing HTTPS Traffic through

More information

Applying Sequential Consistency to Web Caching

Applying Sequential Consistency to Web Caching Applying Sequential Consistency to Web Caching Francisco J. Torres-Rojas and Esteban Meneses Abstract Web caches have several advantages for reducing the server load, minimizing the network traffic and

More information

Goals. Facebook s Scaling Problem. Scaling Strategy. Facebook Three Layer Architecture. Workload. Memcache as a Service.

Goals. Facebook s Scaling Problem. Scaling Strategy. Facebook Three Layer Architecture. Workload. Memcache as a Service. Goals Memcache as a Service Tom Anderson Rapid application development - Speed of adding new features is paramount Scale Billions of users Every user on FB all the time Performance Low latency for every

More information

Application Layer Introduction; HTTP; FTP

Application Layer Introduction; HTTP; FTP Application Layer Introduction; HTTP; FTP Tom Kelliher, CS 325 Feb. 4, 2011 1 Administrivia Announcements Assignment Read 2.4 2.6. From Last Time Packet-switched network characteristics; protocol layers

More information

Evaluation of Strong Consistency Web Caching Techniques

Evaluation of Strong Consistency Web Caching Techniques Evaluation of Strong Consistency Web Caching Techniques Y. Cao and M.T. Özsu ({y2cao, tozsu}@uwaterloo.ca) University of Waterloo, School of Computer Science, Waterloo, Ontario, Canada N2L 3G1 Abstract.

More information

EECS 122: Introduction to Computer Networks DNS and WWW. Internet Names & Addresses

EECS 122: Introduction to Computer Networks DNS and WWW. Internet Names & Addresses EECS 122: Introduction to Computer Networks DNS and WWW Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776 Internet

More information

CSSE 460 Computer Networks Group Projects: Implement a Simple HTTP Web Proxy

CSSE 460 Computer Networks Group Projects: Implement a Simple HTTP Web Proxy CSSE 460 Computer Networks Group Projects: Implement a Simple HTTP Web Proxy Project Overview In this project, you will implement a simple web proxy that passes requests and data between a web client and

More information

COSC 2206 Internet Tools. The HTTP Protocol

COSC 2206 Internet Tools. The HTTP Protocol COSC 2206 Internet Tools The HTTP Protocol http://www.w3.org/protocols/ What is TCP/IP? TCP: Transmission Control Protocol IP: Internet Protocol These network protocols provide a standard method for sending

More information

Mobile Transport Layer

Mobile Transport Layer Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:

More information

A COHERENCE-REPLACEMENT PROTOCOL FOR WEB PROXY CACHE SYSTEMS

A COHERENCE-REPLACEMENT PROTOCOL FOR WEB PROXY CACHE SYSTEMS International Journal of Computers and Applications, Vol. 28, No. 1, 2006 A COHERENCE-REPLACEMENT PROTOCOL FOR WEB PROXY CACHE SYSTEMS J. Aguilar and E.L. Leiss Abstract As World Wide Web usage has grown

More information

On Improving the Performance of Cache Invalidation in Mobile Environments

On Improving the Performance of Cache Invalidation in Mobile Environments Mobile Networks and Applications 7, 291 303, 2002 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. On Improving the Performance of Cache Invalidation in Mobile Environments GUOHONG CAO

More information

Engineering Server-Driven Consistency for Large Scale Dynamic Web Services

Engineering Server-Driven Consistency for Large Scale Dynamic Web Services Engineering Server-Driven Consistency for Large Scale Dynamic Web Services Jian Yin, Lorenzo Alvisi, Mike Dahlin Department of Computer Sciences University of Texas at Austin yin, lorenzo, dahlin@cs.utexas.edu

More information

COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ

COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Web Access: HTTP 16501018 Mehmet KORKMAZ World Wide Web What is WWW? WWW = World Wide Web = Web!= Internet Internet is a global system of interconnected computer

More information

CASE STUDY USER INTERNET MANAGEMENT DESIGN CHOICES

CASE STUDY USER INTERNET MANAGEMENT DESIGN CHOICES CASE STUDY USER INTERNET MANAGEMENT DESIGN CHOICES This paper provides a technical overview of the different design architectures used for User Internet Management (UIM). There are generally three architectures

More information

Overview Content Delivery Computer Networking Lecture 15: The Web Peter Steenkiste. Fall 2016

Overview Content Delivery Computer Networking Lecture 15: The Web Peter Steenkiste. Fall 2016 Overview Content Delivery 15-441 15-441 Computer Networking 15-641 Lecture 15: The Web Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Web Protocol interactions HTTP versions Caching Cookies

More information

Content Distribu-on Networks (CDNs)

Content Distribu-on Networks (CDNs) Second Half of the Course Content Distribu-on Networks (CDNs) Mike Freedman COS 461: Computer Networks h@p://www.cs.princeton.edu/courses/archive/spr14/cos461/ Applica-on case studies Content distribu-on,

More information

Chapter 8. Virtual Memory

Chapter 8. Virtual Memory Operating System Chapter 8. Virtual Memory Lynn Choi School of Electrical Engineering Motivated by Memory Hierarchy Principles of Locality Speed vs. size vs. cost tradeoff Locality principle Spatial Locality:

More information

Deployment Scenarios for Standalone Content Engines

Deployment Scenarios for Standalone Content Engines CHAPTER 3 Deployment Scenarios for Standalone Content Engines This chapter introduces some sample scenarios for deploying standalone Content Engines in enterprise and service provider environments. This

More information

Lab 1: Improving performance by LAN Hardware Upgrade

Lab 1: Improving performance by LAN Hardware Upgrade Lab 1: Improving performance by LAN Hardware Upgrade Objective In this lab, OPNET s IT Guru Academic Edition advanced modeling software will be used to study performance improvements in LAN obtained by

More information

HTTPS File Transfer. Specification

HTTPS File Transfer. Specification HTTPS File Transfer Specification Version 1.4 5-Apr-2017 Date Version Description 30-Aug-2010 1.0 Original Version 30-Jun-2011 1.1 Added FAQ 29-Jun-2015 1.2 ilink administration added 1-Sep-2015 1.3 Updated

More information

Web Programming 4) PHP and the Web

Web Programming 4) PHP and the Web Web Programming 4) PHP and the Web Emmanuel Benoist Fall Term 2013-14 Berner Fachhochschule Haute cole spcialise bernoise Berne University of Applied Sciences 1 PHP a language for Web applications Presentation

More information

Internet Caching Architecture

Internet Caching Architecture GET http://server.edu/file.html HTTP/1.1 Caching Architecture Proxy proxy.net #/bin/csh #This script NCSA mosaic with a proxy setenv http_proxy http://proxy.net:8001 setenv ftp_proxy http://proxy.net:8001

More information

Browser behavior can be quite complex, using more HTTP features than the basic exchange, this trace will show us how much gets transferred.

Browser behavior can be quite complex, using more HTTP features than the basic exchange, this trace will show us how much gets transferred. Lab Exercise HTTP Objective HTTP (HyperText Transfer Protocol) is the main protocol underlying the Web. HTTP functions as a request response protocol in the client server computing model. A web browser,

More information

The Application Layer HTTP and FTP

The Application Layer HTTP and FTP The Application Layer HTTP and FTP File Transfer Protocol (FTP) Allows a user to copy files to/from remote hosts Client program connects to FTP server provides a login id and password allows the user to

More information

Coordinated En-Route Web Caching

Coordinated En-Route Web Caching This is the Pre-Published Version En-Route Web Caching Xueyan Tang & Samuel T. Chanson Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Hong Kong E-mail:

More information

Dynamic Metadata Management for Petabyte-scale File Systems

Dynamic Metadata Management for Petabyte-scale File Systems Dynamic Metadata Management for Petabyte-scale File Systems Sage Weil Kristal T. Pollack, Scott A. Brandt, Ethan L. Miller UC Santa Cruz November 1, 2006 Presented by Jae Geuk, Kim System Overview Petabytes

More information

Addressed Issue. P2P What are we looking at? What is Peer-to-Peer? What can databases do for P2P? What can databases do for P2P?

Addressed Issue. P2P What are we looking at? What is Peer-to-Peer? What can databases do for P2P? What can databases do for P2P? Peer-to-Peer Data Management - Part 1- Alex Coman acoman@cs.ualberta.ca Addressed Issue [1] Placement and retrieval of data [2] Server architectures for hybrid P2P [3] Improve search in pure P2P systems

More information

Lecture 2: Memory Systems

Lecture 2: Memory Systems Lecture 2: Memory Systems Basic components Memory hierarchy Cache memory Virtual Memory Zebo Peng, IDA, LiTH Many Different Technologies Zebo Peng, IDA, LiTH 2 Internal and External Memories CPU Date transfer

More information

Configuring Request Authentication and Authorization

Configuring Request Authentication and Authorization CHAPTER 15 Configuring Request Authentication and Authorization Request authentication and authorization is a means to manage employee use of the Internet and restrict access to online content. This chapter

More information

The Web is a large distributed database were copies of objects are replicated and used in multiple places. The dominant consistency mechanism

The Web is a large distributed database were copies of objects are replicated and used in multiple places. The dominant consistency mechanism Chapter 1 THE TIME-TO-LIVE BASED CONSISTENCY MECHANISM: Understanding performance issues and their impact Edith Cohen AT&T Labs-Research Florham Park, NJ, USA edith@research.att.com Haim Kaplan Tel-Aviv

More information

Lecture 9a: Sessions and Cookies

Lecture 9a: Sessions and Cookies CS 655 / 441 Fall 2007 Lecture 9a: Sessions and Cookies 1 Review: Structure of a Web Application On every interchange between client and server, server must: Parse request. Look up session state and global

More information

Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol

Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol Li Fan, Pei Cao and Jussara Almeida University of Wisconsin-Madison Andrei Broder Compaq/DEC System Research Center Why Web Caching One of

More information

416 Distributed Systems. March 23, 2018 CDNs

416 Distributed Systems. March 23, 2018 CDNs 416 Distributed Systems March 23, 2018 CDNs Outline DNS Design (317) Content Distribution Networks 2 Typical Workload (Web Pages) Multiple (typically small) objects per page File sizes are heavy-tailed

More information

CMPSC 311- Introduction to Systems Programming Module: Caching

CMPSC 311- Introduction to Systems Programming Module: Caching CMPSC 311- Introduction to Systems Programming Module: Caching Professor Patrick McDaniel Fall 2016 Reminder: Memory Hierarchy L0: Registers CPU registers hold words retrieved from L1 cache Smaller, faster,

More information

Assignment 5. Georgia Koloniari

Assignment 5. Georgia Koloniari Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last

More information