Seminar on. By Sai Rahul Reddy P. 2/2/2005 Web Caching 1
|
|
- Tracy Dickerson
- 5 years ago
- Views:
Transcription
1 Seminar on By Sai Rahul Reddy P 2/2/2005 Web Caching 1
2 Topics covered 1. Why Caching 2. Advantages of Caching 3. Disadvantages of Caching 4. Cache-Control HTTP Headers 5. Proxy Caching 6. Caching architectures 7. Prefetching 8. Cache Replacement Strategies 9. Cache Coherence Mechanisms 10. Dynamic Caching 2/2/2005 Web Caching 2
3 Why Caching The World Wide Web is of an exponential growth in size, which results in network congestion and server overloading (the size of static Web pages increases approximately 15 % per month). http// Additionally, each Internet data request from the end-user can lead to large and variable delays. Such slow response times make Internet use and E-commerce undesirable and impractical for the end- user. 2/2/2005 Web Caching 3
4 Advantages of Caching 1. Web caching reduces bandwidth consumption, thereby decreases network traffic and lessens network congestion. 2. Web caching reduces access latency due to two reasons: a) Frequently accessed documents are fetched from nearby proxy caches instead of remote data servers, the transmission delay is minimized. b) Because of the reduction in network traffic, those documents not cached can also be retrieved relatively faster than without caching due to less congestion along the path and less workload at the server. 3. Web caching reduces the workload of the remote Web server by disseminating data among the proxy caches over the wide area network. 4. If the remote server is not available due to the remote server's crash, the client can obtain a cached copy at the proxy. Thus, the robustness of the Web service is enhanced. 2/2/2005 Web Caching 4
5 Disadvantages of using a caching 1. The main disadvantage is that a client might be looking at stale data due to the lack of proper proxy updating. 2. The access latency may increase in the case of a cache miss due to the extra proxy processing. Hence, cache hit rate should be maximized and the cost of a cache miss should be minimized when designing a caching system. 3. A single proxy cache is always a bottleneck. A limit has to be set for the number of clients a proxy can serve. An efficiency lower bound should also be enforced. 4. A single proxy is a single point of failure. 5. Using a proxy cache will reduce the hits on the original remote server which might disappoint a lot of information providers, since they cannot maintain a true log of the hits to their pages. Hence, they might decide not to allow their documents to be cacheable 2/2/2005 Web Caching 5
6 HTTP 1.1 GET / HTTP/1.1 Host: mail.yahoo.com If-Modified-Since:date Connection:close Typical HTTP 1.1 request Header HTTP/ OK Date: Fri, 30 Oct :19:41 GMT Server: Apache/1.3.3 (Unix) Cache-Control: max-age=3600, must-revalidate Expires: Fri, 30 Oct :19:41 GMT Last-Modified: Mon, 29 Jun :28:12 GMT ETag: "3e fbbc" Content-Length: 1040 Content-Type: text/html Typical HTTP 1.1 response Header 2/2/2005 Web Caching 6
7 Cache-Control HTTP Headers max-age=[seconds] specifies the maximum amount of time that an representation will be considered fresh. Similar to Expires, this directive is relative to the time of the request, rather than absolute. [seconds] is the number of seconds from the time of the request you wish the representation to be fresh for. s-maxage=[seconds] similar to max-age, except that it only applies to shared (e.g., proxy) caches. public marks authenticated responses as cacheable; normally, if HTTP authentication is required, responses are automatically uncacheable. no-cache forces caches to submit the request to the origin server for validation before releasing a cached copy, every time. This is useful to assure that authentication is respected (in combination with public), or to maintain rigid freshness, without sacrificing all of the benefits of caching. no-store instructs caches not to keep a copy of the representation under any conditions. must-revalidate tells caches that they must obey any freshness information you give them about a representation. HTTP allows caches to serve stale representations under special conditions; by specifying this header, you re telling the cache that you want it to strictly follow your rules. proxy-revalidate similar to must-revalidate, except that it only applies to proxy caches. 2/2/2005 Web Caching 7
8 What is cacheable? Objects that have a long freshness time,small in size and have high access latency (when fetched from the origin server) are the objects best suited for caching. The following objects cannot be normally cached. Objects that are password-protected Any URLs with /cgi-bin/ or any other pre-configured patterns (for example, if a URL contains?, it is indicative that the URL is calling a program with the portion after the? as its argument.) Any file exceeding a pre-defined limit. SSL requests, which are tunneled through and not cached. 2/2/2005 Web Caching 8
9 Proxy Caching Forward Proxy Caching Reverse Proxy Caching Transparent Proxy Caching Router transparent Switch transparent proxy caching 2/2/2005 Web Caching 9
10 Caching architectures Hierarchical caching architecture (Figure) Caches placed at different network levels: Client, Institutional, Regional, National. When a document is found it travels down the hierarchy Problems: 1) Additional Delays 2) Higher Level Caches potential Bottlenecks 3) Several Copies of Document Stored Distributed caching architecture (Figure) No intermediate caches. Only Institutional Caches. Have mechanisms to share documents: ICP, CARP, Cache Digests (Ex) 2/2/2005 Web Caching 10
11 Prefetching Why Prefetching? Maximum cache hit rate can be achieved by any caching algorithm is usually no more than 40 % to 50%. Prefetching can be applied in 3 ways 1. Between browser clients and Web servers 2. Between proxies and Web servers 3. Between browser clients and proxies 2/2/2005 Web Caching 11
12 Cache Replacement Policies Traditional replacement policies and its direct extensions: 1. Least Recently Used (LRU): LRU evicts the object which was requested the least recently. 2. Lease Frequently used (LFU): LFU evicts the object which is accessed least frequently. 3. Pitkow/Recker Strategy: It evicts objects in LRU order, except if all objects are accessed within the same day, in which case the largest one is removed. 2/2/2005 Web Caching 12
13 Cache Replacement Policies Key based Replacement Policies 1. LRU-MIN: If there are any objects in the cache which have size being at least S, LRU-MIN evicts the least recently used such object from the cache. If there are no objects with size being at least S, then LRU-MIN starts evicting objects in LRU order of size being at least S/2. That is, the object who has the largest log(size) and is the least recently used object among all objects with the same log(size) will be evicted first. 2. LRU-Threshold: It is the same as LRU, but objects larger than a certain threshold size are never cached. 3. Lowest Latency First: It minimizes average latency by evicting the document with the lowest download latency first. 2/2/2005 Web Caching 13
14 Cache Replacement Policies Cost based replacement strategies Greedy Dual Size (GD-Size) Associates a cost with each object and evicts object with the lowest cost/size. Hierarchical Greedy Dual (Hierarchical GD) The function for an object i from server s depends on the following parameters: c s (time to contact server s), b s (available bandwidth to server s). The function is defined as where W b and W n are weighting parameters. Estimates for c s and b s are based on the time to fetch documents from server s in the recent past. 2/2/2005 Web Caching 14
15 Cache Coherency Mechanisms 1. Strong Cache Consistency (a) Client Validation (b) Server invalidation 2. Weak cache consistency (a) Adaptive TTL (b) Piggyback Invalidation -- Piggyback Cache Invalidation -- Piggyback Server Invalidation 2/2/2005 Web Caching 15
16 Dynamic Data Caching Active Cache Web server Accelerators 2/2/2005 Web Caching 16
17 Overview of Dynamic proxy caching system 2/2/2005 Web Caching 17
18 Conclusion Web service becomes more popular -- More network congestion -- More server overloading Web caching one of the effective techniques Caching Dynamic pages, cache routing, proxy placement 2/2/2005 Web Caching 18
19 Hierarchical caching architecture (Back) 2/2/2005 Web Caching 19
20 (Back) 2/2/2005 Web Caching 20
21 Example (Bloom Filters) S = {14, 63, 57, 31} m = 12 (i.e., 3 bits per key) k = 3; h 1 (x) = (x + 1) mod 12; h 2 (x) = (3x + 2) mod 12; h 3 (x) = (5x+3) mod 12 x h 1 h 2 h V /2/2005 Web Caching 21
22 Example: Membership Test Does 20 belongs to S? Answer:h 1 (20) = (20 + 1) mod 12 = 9 V (Back) 2/2/2005 Web Caching 22
A Scalable Efficient Robust Adaptive (SERA) Architecture for the Next Generation of Web Service
A Scalable Efficient Robust Adaptive (SERA) Architecture for the Next Generation of Web Service Jia Wang Cornell Network Research Group (C/NRG) Department of Computer Science, Cornell University Ithaca,
More informationCIT 668: System Architecture. Caching
CIT 668: System Architecture Caching Topics 1. Cache Types 2. Web Caching 3. Replacement Algorithms 4. Distributed Caches 5. memcached A cache is a system component that stores data so that future requests
More informationCOMP6218: Content Caches. Prof Leslie Carr
COMP6218: Content Caches Prof Leslie Carr 1 Slashdot.org The Slashdot effect, also known as slashdotting, occurs when a popular website links to a smaller site, causing a massive increase in traffic 2
More informationModelling and Analysis of Push Caching
Modelling and Analysis of Push Caching R. G. DE SILVA School of Information Systems, Technology & Management University of New South Wales Sydney 2052 AUSTRALIA Abstract: - In e-commerce applications,
More information1-1. Switching Networks (Fall 2010) EE 586 Communication and. September Lecture 10
EE 586 Communication and Switching Networks (Fall 2010) Lecture 10 September 17 2010 1-1 Announcement Send me your group and get group ID HW3 (short) out on Monday Personal leave for next two weeks No
More informationCaching. Caching Overview
Overview Responses to specific URLs cached in intermediate stores: Motivation: improve performance by reducing response time and network bandwidth. Ideally, subsequent request for the same URL should be
More informationProxying. Why and How. Alon Altman. Haifa Linux Club. Proxying p.1/24
Proxying p.1/24 Proxying Why and How Alon Altman alon@haifux.org Haifa Linux Club Proxying p.2/24 Definition proxy \Prox"y\, n.; pl. Proxies. The agency for another who acts through the agent; authority
More informationWeb Engineering. Basic Technologies: Protocols and Web Servers. Husni
Web Engineering Basic Technologies: Protocols and Web Servers Husni Husni@trunojoyo.ac.id Basic Web Technologies HTTP and HTML Web Servers Proxy Servers Content Delivery Networks Where we will be later
More informationSquirrel case-study. Decentralized peer-to-peer web cache. Traditional centralized web cache. Based on the Pastry peer-to-peer middleware system
Decentralized peer-to-peer web cache Based on the Pastry peer-to-peer middleware system Traditional centralized web cache 1 2 Decentralized caching of web pages use the resources of peers (web browsers/clients)
More informationCSE/EE 461 HTTP and the Web
CSE/EE 461 HTTP and the Web Last Time The Transport Layer Focus How does TCP share bandwidth? Topics AIMD Slow Start Application Presentation Session Transport Network Data Link Fast Retransmit / Fast
More informationConfiguring Caching Services
CHAPTER 8 This chapter describes how to configure conventional caching services (HTTP, FTP [FTP-over-HTTP caching and native FTP caching], HTTPS, and DNS caching) for centrally managed Content Engines.
More informationToday: World Wide Web! Traditional Web-Based Systems!
Today: World Wide Web! WWW principles Case Study: web caching as an illustrative example Invalidate versus updates Push versus Pull Cooperation between replicas Lecture 22, page 1 Traditional Web-Based
More informationReminders. - Open book, open notes, closed laptop - Bring textbook - Bring printouts of slides & any notes you may have taken
Reminders Lab 3 due today Midterm exam Monday - Open book, open notes, closed laptop - Bring textbook - Bring printouts of slides & any notes you may have taken David Mazières moving office hours next
More informationCMSC 332 Computer Networking Web and FTP
CMSC 332 Computer Networking Web and FTP Professor Szajda CMSC 332: Computer Networks Project The first project has been posted on the website. Check the web page for the link! Due 2/2! Enter strings into
More informationWeb, HTTP and Web Caching
Web, HTTP and Web Caching 1 HTTP overview HTTP: hypertext transfer protocol Web s application layer protocol client/ model client: browser that requests, receives, displays Web objects : Web sends objects
More informationLast Class: Consistency Models. Today: Implementation Issues
Last Class: Consistency Models Need for replication Data-centric consistency Strict, linearizable, sequential, causal, FIFO Lecture 15, page 1 Today: Implementation Issues Replica placement Use web caching
More informationApplication Layer. Applications and application-layer protocols. Goals:
Application Layer Goals: Conceptual aspects of network application protocols Client paradigm Service models Learn about protocols by examining popular application-level protocols HTTP DNS 1 Applications
More informationA taste of HTTP v1.1. additions. HTTP v1.1: introduces many complexities no longer an easy protocol to implement. G.Bianchi, G.Neglia, V.
Why HTTP needed extensions? A taste of HTTP v1.1 additions HTTP v1.1: introduces many complexities no longer an easy protocol to implement Simple (one packet) ) Web Page SYN Retrieval Time Propagation
More informationLecture 7b: HTTP. Feb. 24, Internet and Intranet Protocols and Applications
Internet and Intranet Protocols and Applications Lecture 7b: HTTP Feb. 24, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu WWW - HTTP/1.1 Web s application layer protocol
More informationOutline Computer Networking. HTTP Basics (Review) How to Mark End of Message? (Review)
Outline 15-441 Computer Networking Lecture 25 The Web HTTP review and details (more in notes) Persistent HTTP review HTTP caching Content distribution networks Lecture 19: 2006-11-02 2 HTTP Basics (Review)
More informationCS4/MSc Computer Networking. Lecture 3: The Application Layer
CS4/MSc Computer Networking Lecture 3: The Application Layer Computer Networking, Copyright University of Edinburgh 2005 Network Applications Examine a popular network application: Web Client-server architecture
More informationA Survey of Web Caching Schemes for the Internet
A Survey of Web Caching Schemes for the Internet Jia Wang Cornell Network Research Group (C/NRG) Department of Computer Science, Cornell University Ithaca, NY 14853-7501 jiawang@cs.cornell.edu Abstract
More informationWeb. Computer Organization 4/16/2015. CSC252 - Spring Web and HTTP. URLs. Kai Shen
Web and HTTP Web Kai Shen Web: the Internet application for distributed publishing and viewing of content Client/server model server: hosts published content and sends the content upon request client:
More informationHyperText Transfer Protocol
Outline Introduce Socket Programming Domain Name Service (DNS) Standard Application-level Protocols email (SMTP) HTTP HyperText Transfer Protocol Defintitions A web page consists of a base HTML-file which
More informationApplication Protocols and HTTP
Application Protocols and HTTP 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Lab #0 due
More informationYioop Full Historical Indexing In Cache Navigation. Akshat Kukreti
Yioop Full Historical Indexing In Cache Navigation Akshat Kukreti Agenda Introduction History Feature Cache Page Validation Feature Conclusion Demo Introduction Project goals History feature for enabling
More informationFeatures of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy
Que: -Proxy server Introduction: Proxy simply means acting on someone other s behalf. A Proxy acts on behalf of the client or user to provide access to a network service, and it shields each side from
More informationBloom Filters. References:
Bloom Filters References: Li Fan, Pei Cao, Jussara Almeida, Andrei Broder, Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol, IEEE/ACM Transactions on Networking, Vol. 8, No. 3, June 2000.
More informationHow Far Can Client-Only Solutions Go for Mobile Browser Speed?
How Far Can Client-Only Solutions Go for Mobile Browser Speed? u Presenter: Ye Li LOGO Introduction u Web browser is one of the most important applications on mobile devices. It is known to be slow, taking
More informationApplications & Application-Layer Protocols: The Web & HTTP
CPSC 360 Network Programming Applications & Application-Layer Protocols: The Web & HTTP Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu http://www.cs.clemson.edu/~mweigle/courses/cpsc360
More informationChapter The LRU* WWW proxy cache document replacement algorithm
Chapter The LRU* WWW proxy cache document replacement algorithm Chung-yi Chang, The Waikato Polytechnic, Hamilton, New Zealand, itjlc@twp.ac.nz Tony McGregor, University of Waikato, Hamilton, New Zealand,
More informationEE 122: HyperText Transfer Protocol (HTTP)
Background EE 122: HyperText Transfer Protocol (HTTP) Ion Stoica Nov 25, 2002 World Wide Web (WWW): a set of cooperating clients and servers that communicate through HTTP HTTP history - First HTTP implementation
More informationA CONTENT-TYPE BASED EVALUATION OF WEB CACHE REPLACEMENT POLICIES
A CONTENT-TYPE BASED EVALUATION OF WEB CACHE REPLACEMENT POLICIES F.J. González-Cañete, E. Casilari, A. Triviño-Cabrera Department of Electronic Technology, University of Málaga, Spain University of Málaga,
More informationThe Effectiveness of Cache Coherence Implemented on the Web
The Effectiveness of Cache Coherence Implemented on the Web Felicia Doswell and Marc Abrams Department of Computer Science Virginia Tech Blacksburg, Virginia 246 fdoswell,abrams @.vt.edu Abstract The popularity
More informationPhysical characteristics (such as packaging, volatility, and erasability Organization.
CS 320 Ch 4 Cache Memory 1. The author list 8 classifications for memory systems; Location Capacity Unit of transfer Access method (there are four:sequential, Direct, Random, and Associative) Performance
More informationEvaluation of Strong Consistency Web Caching Techniques
World Wide Web: Internet and Web Information Systems, 5, 95 123, 2002 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. Evaluation of Strong Consistency Web Caching Techniques L. Y. CAO
More informationWeb-based Energy-efficient Cache Invalidation in Wireless Mobile Environment
Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment Y.-K. Chang, M.-H. Hong, and Y.-W. Ting Dept. of Computer Science & Information Engineering, National Cheng Kung University
More informationScalability, Performance & Caching
COMP 150-IDS: Internet Scale Distributed Systems (Spring 2015) Scalability, Performance & Caching Noah Mendelsohn Tufts University Email: noah@cs.tufts.edu Web: http://www.cs.tufts.edu/~noah Copyright
More informationEngineering server driven consistency for large scale dynamic web services
Engineering server driven consistency for large scale dynamic web services Jian Yin, Lorenzo Alvisi, Mike Dahlin, Calvin Lin Department of Computer Sciences University of Texas at Austin Arun Iyengar IBM
More informationWeb, HTTP, Caching, CDNs
Web, HTTP, Caching, CDNs Outline Web HyperText Transfer Protocol (HTTP) Inefficiencies in HTTP HTTP Persistent Connections Caching CDNs Consistent Hashing CS 640 1 Web Original goal of the web: mechanism
More informationYahoo Traffic Server -a Powerful Cloud Gatekeeper
Yahoo Traffic Server -a Powerful Cloud Gatekeeper Shih-Yong Wang Yahoo! Taiwan 2010 COSCUP Aug 15, 2010 What is Proxy Caching? Proxy Caching explicit client configuration transparent emulate responses
More informationDeployment Guide AX Series with Oracle E-Business Suite 12
Deployment Guide AX Series with Oracle E-Business Suite 12 DG_OEBS_032013.1 TABLE OF CONTENTS 1 Introduction... 4 2 Deployment Prerequisites... 4 3 Oracle E-Business Topology... 5 4 Accessing the AX Series
More informationConfiguring an Optimization HTTP Action List
CHAPTER 2 Configuring an Optimization HTTP Action List This chapter describes how to configure an optimization HTTP action list for the Cisco 4700 Series Application Control Engine (ACE) appliance. An
More informationScalability, Performance & Caching
COMP 150-IDS: Internet Scale Distributed Systems (Spring 2018) Scalability, Performance & Caching Noah Mendelsohn Tufts University Email: noah@cs.tufts.edu Web: http://www.cs.tufts.edu/~noah Copyright
More informationToday: World Wide Web
Today: World Wide Web WWW principles Case Study: web caching as an illustrative example Invalidate versus updates Push versus Pull Cooperation between replicas Lecture 22, page 1 Traditional Web-Based
More informationA Proxy Caching Scheme for Continuous Media Streams on the Internet
A Proxy Caching Scheme for Continuous Media Streams on the Internet Eun-Ji Lim, Seong-Ho park, Hyeon-Ok Hong, Ki-Dong Chung Department of Computer Science, Pusan National University Jang Jun Dong, San
More informationToday: World Wide Web. Traditional Web-Based Systems
Today: World Wide Web WWW principles Case Study: web caching as an illustrative example Invalidate versus updates Push versus Pull Cooperation between replicas Lecture 22, page 1 Traditional Web-Based
More informationChapter 6 Objectives
Chapter 6 Memory Chapter 6 Objectives Master the concepts of hierarchical memory organization. Understand how each level of memory contributes to system performance, and how the performance is measured.
More informationRelative Reduced Hops
GreedyDual-Size: A Cost-Aware WWW Proxy Caching Algorithm Pei Cao Sandy Irani y 1 Introduction As the World Wide Web has grown in popularity in recent years, the percentage of network trac due to HTTP
More informationLecture 6 Application Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 6 Application Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Application-layer protocols Application: communicating, distributed processes running in network hosts
More informationA Review of Web Caching Techniques and Caching Algorithms for Effective and Improved Caching
A Review of Web Techniques and Algorithms for Effective and Improved Pranay Nanda (Post Graduate Student) Amity School of Engineering and Technology Amity University, Rajasthan Shamsher Singh (Astt Prof)
More informationHypertext Transport Protocol HTTP/1.1
Hypertext Transport Protocol HTTP/1.1 Jim Gettys Digital Equipment Corporation, ISBU Visiting Scientist, World Wide Web Consortium 10/17/96 20-Apr-01 1 Acknowledgments HTTP/1.1 Authors Roy Fielding (UCI)
More informationWeb as a Distributed System
Web as a Distributed System The World Wide Web is a large distributed system. In 1998 comprises 70-75% of Internet traffic. With large transfers of streaming media and p2p, no longer a majority of bytes,
More informationInktomi. Network. Products. Traffic Server 4.0. Inktomi. Administrator s Guide
Inktomi Network Products Traffic Server 4.0 Administrator s Guide Inktomi Document Release 4.0 October 13, 2000 Copyright 1999-2000 Inktomi Corporation. All Rights Reserved. This document contains proprietary
More informationInternet Content Distribution
Internet Content Distribution Chapter 1: Introduction Jussi Kangasharju Chapter Outline Introduction into content distribution Basic concepts TCP DNS HTTP Outline of the rest of the course Kangasharju:
More informationDynamics and Cachability of Web Sites: Implications for Inverted Capacity Networks
Dynamics and Cachability of Web Sites: Implications for Inverted Capacity Networks Sebastian Zander 1, Grenville Armitage, Clancy Malcolm Center for Advanced Internet Architectures. Technical Report 030405B
More informationTrace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers
Proceeding of the 9th WSEAS Int. Conference on Data Networks, Communications, Computers, Trinidad and Tobago, November 5-7, 2007 378 Trace Driven Simulation of GDSF# and Existing Caching Algorithms for
More information0 0& Basic Background. Now let s get into how things really work!
+,&&-# Department of Electrical Engineering and Computer Sciences University of California Berkeley Basic Background General Overview of different kinds of networks General Design Principles Architecture
More informationCHAPTER 4 OPTIMIZATION OF WEB CACHING PERFORMANCE BY CLUSTERING-BASED PRE-FETCHING TECHNIQUE USING MODIFIED ART1 (MART1)
71 CHAPTER 4 OPTIMIZATION OF WEB CACHING PERFORMANCE BY CLUSTERING-BASED PRE-FETCHING TECHNIQUE USING MODIFIED ART1 (MART1) 4.1 INTRODUCTION One of the prime research objectives of this thesis is to optimize
More informationINFT 803. Fall Semester, Ph.D. Candidate: Rosana Holliday
INFT 803 Fall Semester, 1999 Ph.D. Candidate: Rosana Holliday Papers Addressed Removal Policies in Network Caches for World-Wide Web Documents Performance of Web Proxy Caching in Heterogeneous Bandwidth
More informationCS 355. Computer Networking. Wei Lu, Ph.D., P.Eng.
CS 355 Computer Networking Wei Lu, Ph.D., P.Eng. Chapter 2: Application Layer Overview: Principles of network applications? Introduction to Wireshark Web and HTTP FTP Electronic Mail SMTP, POP3, IMAP DNS
More informationWeb Caching and Content Delivery
Web Caching and Content Delivery Caching for a Better Web Performance is a major concern in the Web Proxy caching is the most widely used method to improve Web performance Duplicate requests to the same
More informationCS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP
CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering
More informationImproving the WWW: caching or multicast?
Computer Networks and ISDN Systems 30 (1998) 2223 2243 Improving the WWW: caching or multicast? Pablo Rodriguez Ł,1, Keith W. Ross 1, Ernst W. Biersack 1 Institut EURECOM, 2229, route des Crêtes, BP 193,
More informationImproving the WWW: Caching or Multicast?
Improving the WWW: Caching or Multicast? Pablo Rodriguez Keith W. Ross Ernst W. Biersack Institut EURECOM 2229, route des Crêtes, BP 193 694, Sophia Antipolis Cedex, FRANCE frodrigue, ross, erbig@eurecom.fr
More informationCreate Decryption Policies to Control HTTPS Traffic
Create Decryption Policies to Control HTTPS Traffic This chapter contains the following sections: Overview of Create Decryption Policies to Control HTTPS Traffic, page 1 Managing HTTPS Traffic through
More informationApplying Sequential Consistency to Web Caching
Applying Sequential Consistency to Web Caching Francisco J. Torres-Rojas and Esteban Meneses Abstract Web caches have several advantages for reducing the server load, minimizing the network traffic and
More informationGoals. Facebook s Scaling Problem. Scaling Strategy. Facebook Three Layer Architecture. Workload. Memcache as a Service.
Goals Memcache as a Service Tom Anderson Rapid application development - Speed of adding new features is paramount Scale Billions of users Every user on FB all the time Performance Low latency for every
More informationApplication Layer Introduction; HTTP; FTP
Application Layer Introduction; HTTP; FTP Tom Kelliher, CS 325 Feb. 4, 2011 1 Administrivia Announcements Assignment Read 2.4 2.6. From Last Time Packet-switched network characteristics; protocol layers
More informationEvaluation of Strong Consistency Web Caching Techniques
Evaluation of Strong Consistency Web Caching Techniques Y. Cao and M.T. Özsu ({y2cao, tozsu}@uwaterloo.ca) University of Waterloo, School of Computer Science, Waterloo, Ontario, Canada N2L 3G1 Abstract.
More informationEECS 122: Introduction to Computer Networks DNS and WWW. Internet Names & Addresses
EECS 122: Introduction to Computer Networks DNS and WWW Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776 Internet
More informationCSSE 460 Computer Networks Group Projects: Implement a Simple HTTP Web Proxy
CSSE 460 Computer Networks Group Projects: Implement a Simple HTTP Web Proxy Project Overview In this project, you will implement a simple web proxy that passes requests and data between a web client and
More informationCOSC 2206 Internet Tools. The HTTP Protocol
COSC 2206 Internet Tools The HTTP Protocol http://www.w3.org/protocols/ What is TCP/IP? TCP: Transmission Control Protocol IP: Internet Protocol These network protocols provide a standard method for sending
More informationMobile Transport Layer
Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:
More informationA COHERENCE-REPLACEMENT PROTOCOL FOR WEB PROXY CACHE SYSTEMS
International Journal of Computers and Applications, Vol. 28, No. 1, 2006 A COHERENCE-REPLACEMENT PROTOCOL FOR WEB PROXY CACHE SYSTEMS J. Aguilar and E.L. Leiss Abstract As World Wide Web usage has grown
More informationOn Improving the Performance of Cache Invalidation in Mobile Environments
Mobile Networks and Applications 7, 291 303, 2002 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. On Improving the Performance of Cache Invalidation in Mobile Environments GUOHONG CAO
More informationEngineering Server-Driven Consistency for Large Scale Dynamic Web Services
Engineering Server-Driven Consistency for Large Scale Dynamic Web Services Jian Yin, Lorenzo Alvisi, Mike Dahlin Department of Computer Sciences University of Texas at Austin yin, lorenzo, dahlin@cs.utexas.edu
More informationCOMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ
COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Web Access: HTTP 16501018 Mehmet KORKMAZ World Wide Web What is WWW? WWW = World Wide Web = Web!= Internet Internet is a global system of interconnected computer
More informationCASE STUDY USER INTERNET MANAGEMENT DESIGN CHOICES
CASE STUDY USER INTERNET MANAGEMENT DESIGN CHOICES This paper provides a technical overview of the different design architectures used for User Internet Management (UIM). There are generally three architectures
More informationOverview Content Delivery Computer Networking Lecture 15: The Web Peter Steenkiste. Fall 2016
Overview Content Delivery 15-441 15-441 Computer Networking 15-641 Lecture 15: The Web Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Web Protocol interactions HTTP versions Caching Cookies
More informationContent Distribu-on Networks (CDNs)
Second Half of the Course Content Distribu-on Networks (CDNs) Mike Freedman COS 461: Computer Networks h@p://www.cs.princeton.edu/courses/archive/spr14/cos461/ Applica-on case studies Content distribu-on,
More informationChapter 8. Virtual Memory
Operating System Chapter 8. Virtual Memory Lynn Choi School of Electrical Engineering Motivated by Memory Hierarchy Principles of Locality Speed vs. size vs. cost tradeoff Locality principle Spatial Locality:
More informationDeployment Scenarios for Standalone Content Engines
CHAPTER 3 Deployment Scenarios for Standalone Content Engines This chapter introduces some sample scenarios for deploying standalone Content Engines in enterprise and service provider environments. This
More informationLab 1: Improving performance by LAN Hardware Upgrade
Lab 1: Improving performance by LAN Hardware Upgrade Objective In this lab, OPNET s IT Guru Academic Edition advanced modeling software will be used to study performance improvements in LAN obtained by
More informationHTTPS File Transfer. Specification
HTTPS File Transfer Specification Version 1.4 5-Apr-2017 Date Version Description 30-Aug-2010 1.0 Original Version 30-Jun-2011 1.1 Added FAQ 29-Jun-2015 1.2 ilink administration added 1-Sep-2015 1.3 Updated
More informationWeb Programming 4) PHP and the Web
Web Programming 4) PHP and the Web Emmanuel Benoist Fall Term 2013-14 Berner Fachhochschule Haute cole spcialise bernoise Berne University of Applied Sciences 1 PHP a language for Web applications Presentation
More informationInternet Caching Architecture
GET http://server.edu/file.html HTTP/1.1 Caching Architecture Proxy proxy.net #/bin/csh #This script NCSA mosaic with a proxy setenv http_proxy http://proxy.net:8001 setenv ftp_proxy http://proxy.net:8001
More informationBrowser behavior can be quite complex, using more HTTP features than the basic exchange, this trace will show us how much gets transferred.
Lab Exercise HTTP Objective HTTP (HyperText Transfer Protocol) is the main protocol underlying the Web. HTTP functions as a request response protocol in the client server computing model. A web browser,
More informationThe Application Layer HTTP and FTP
The Application Layer HTTP and FTP File Transfer Protocol (FTP) Allows a user to copy files to/from remote hosts Client program connects to FTP server provides a login id and password allows the user to
More informationCoordinated En-Route Web Caching
This is the Pre-Published Version En-Route Web Caching Xueyan Tang & Samuel T. Chanson Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Hong Kong E-mail:
More informationDynamic Metadata Management for Petabyte-scale File Systems
Dynamic Metadata Management for Petabyte-scale File Systems Sage Weil Kristal T. Pollack, Scott A. Brandt, Ethan L. Miller UC Santa Cruz November 1, 2006 Presented by Jae Geuk, Kim System Overview Petabytes
More informationAddressed Issue. P2P What are we looking at? What is Peer-to-Peer? What can databases do for P2P? What can databases do for P2P?
Peer-to-Peer Data Management - Part 1- Alex Coman acoman@cs.ualberta.ca Addressed Issue [1] Placement and retrieval of data [2] Server architectures for hybrid P2P [3] Improve search in pure P2P systems
More informationLecture 2: Memory Systems
Lecture 2: Memory Systems Basic components Memory hierarchy Cache memory Virtual Memory Zebo Peng, IDA, LiTH Many Different Technologies Zebo Peng, IDA, LiTH 2 Internal and External Memories CPU Date transfer
More informationConfiguring Request Authentication and Authorization
CHAPTER 15 Configuring Request Authentication and Authorization Request authentication and authorization is a means to manage employee use of the Internet and restrict access to online content. This chapter
More informationThe Web is a large distributed database were copies of objects are replicated and used in multiple places. The dominant consistency mechanism
Chapter 1 THE TIME-TO-LIVE BASED CONSISTENCY MECHANISM: Understanding performance issues and their impact Edith Cohen AT&T Labs-Research Florham Park, NJ, USA edith@research.att.com Haim Kaplan Tel-Aviv
More informationLecture 9a: Sessions and Cookies
CS 655 / 441 Fall 2007 Lecture 9a: Sessions and Cookies 1 Review: Structure of a Web Application On every interchange between client and server, server must: Parse request. Look up session state and global
More informationSummary Cache: A Scalable Wide-Area Web Cache Sharing Protocol
Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol Li Fan, Pei Cao and Jussara Almeida University of Wisconsin-Madison Andrei Broder Compaq/DEC System Research Center Why Web Caching One of
More information416 Distributed Systems. March 23, 2018 CDNs
416 Distributed Systems March 23, 2018 CDNs Outline DNS Design (317) Content Distribution Networks 2 Typical Workload (Web Pages) Multiple (typically small) objects per page File sizes are heavy-tailed
More informationCMPSC 311- Introduction to Systems Programming Module: Caching
CMPSC 311- Introduction to Systems Programming Module: Caching Professor Patrick McDaniel Fall 2016 Reminder: Memory Hierarchy L0: Registers CPU registers hold words retrieved from L1 cache Smaller, faster,
More informationAssignment 5. Georgia Koloniari
Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last
More information