ANALYSIS OF THE WEB, PROCESSOR SPEED AND BANDWIDTH GROWTH: IMPACT ON SEARCH ENGINE DESIGN

Size: px
Start display at page:

Download "ANALYSIS OF THE WEB, PROCESSOR SPEED AND BANDWIDTH GROWTH: IMPACT ON SEARCH ENGINE DESIGN"

Transcription

1 ANALYSIS OF THE WEB, PROCESSOR SPEED AND BANDWIDTH GROWTH: IMPACT ON SEARCH ENGINE DESIGN K. Satya Sai Prakash Network Systems Laboratory IIT Madras, Chennai India Phone: ssai@acm.org S. V. Raghavan Network Systems Laboratory IIT Madras, Chennai India Phone: svr@cs.iitm.ernet.in ABSTRACT World Wide Web (web) is perceived as an unstructured and uncontrolled system. This paper explores the web growth, processor speedup, and bandwidth growth over the time and proves that the web in its entirety is not an uncontrolled system that explodes indefinitely. Critical observation and analysis of the web, processor speedup, and bandwidth growth, prompted us to conjecture that the Internet information processing index (I) is constant. Global tendencies in WWW/Internet indicate that huge data is getting accumulated on the web. User base too is growing at a rapid pace apart from the bandwidth and processor speeds. In the present web scenario, processor speed (S), bandwidth (B), and the volume of the web data (V) are the three vital parameters. We made careful study and conjectured that I = k (B * S)/V The above relation provides a control over the web content organization and the access. This study makes an invaluable contribution in the design of Search Engines that need to skim through the huge volumes of web data (part of which dynamically changes), design of audio, video-rendering systems over Internet and in establishing ISPs and the client network architecture designs. KEYWORDS Moore s Law, Neilsons Law, Search Engine, Internet 1. INTRODUCTION Since the inception of the concept of Internet, the number of systems that are coming into the purview of the Internet is growing exponentially. World s computing and communication environment is under the hood of the web. Web is expanding exponentially with the content created by the increasing number of users. All possible information is posted on the web today. Be it a riddle, game, report, news item, recipe and what not; think of an item, it can be found on the web. Person or a thing can be searched and contacted over web. id has become an alias to every individual. At this juncture it is important to understand the advancements in the silicon industry, so that we know the computing system s processing ability and communication systems speedup [4]. Understanding the global tendencies of Internet/WWW is very essential to design the infrastructure for a clientele or ISP. This also helps in designing real-time interactive application networks. Certainly it plays a

2 role in designing the new generation search engines that need to index all the web data to yield recent and relevant results as a minimal possible result-set with minimal/optimal infrastructure. Gordon Moore made a detailed observation about the processor speedup and gave his law [1][2], as The number of transistors integrated on leading edge circuits would continue to double every 18 months until the fundamental physical limits are reached. Figure 1. Moore s Law Neilson s law [4] states that a high-end user's connection speed grows by 5% per year. Parkinson s law states that data expands to fill the space available for storage and the storage capacity is doubling every 18 months. Figure 2. Neilson s Law Also in [6] the authors observed that the web is doubling every 14 months. Web Pages (millions) Figure 3. Web Growth Data is fit into the curve y = 12.83x x 2 + 1E+8x 1E+11 with R 2 =.9989

3 2. CONJECTURE The Internet information processing index (I) is constant. In this context we have three vital parameters V (Volume of the Web data), B (bandwidth over the Internet), S (Processor Speed). It can be seen that, I B (S and V constant), I S (B and V constant) and I 1/V (B and S constant) Hence I = k B * S / V, k is a constant of proportionality. From the observations made in the previous section, we noted that the annual growth of B, S and V are 5%, 66.67% and 85.71% respectively. Then k is about {I 1 = B*S/V, with k = 1, then I 2 = (r 1 B+B)*(r 2 S+S)/(r 3 V+V) where r 1, r 2, r 3, are annual growth rates of B, S and V respectively. Then I 2 = [(1+r 1 )*(1+r 2 )/(1+r 3 )] B*S/V, i.e. I 2 = k I 1, where k = (1+r 1 )*(1+r 2 )/(1+r 3 ). Substituting r 1 =.5, r 2 =.667 and r 3 =.857, we get k = 1.35} In general, I n = [B(1+r 1 ) n ]*[S(1+r 2 ) n ]/V(1+r 3 ) n, I n = k (B*S)/V. That implies, k = (1+r 1 ) n *(1+r 2 ) n /(1+r 3 ) n, where n is number of years. This explains the improved rendering of the web data generally experienced by the end user, when there is infrastructure enhancement. More effort is being made to study the other possible relations that could exist between three vital web parameters, like, I = k 1 B S/V Where B S is the number of bytes received at the available bandwidth B that are processed by the processor with speed S. Also the non-linear relation ship between the parameters is given as I = k 2 B * S /V Memory (M) growth is not taken into consideration in view of its rapid growth in comparison with bandwidth growth. Equilibrium of data processing system depends on min {B, M}. 3. CASESTUDY GOOGLE Google s initial infrastructure as a research product was described in [14]. In 1997, they started with 4 machines downloading and analyzing 26 million pages. Today it runs on 1 Linux-cluster indexing about 3 billion documents and responding to 25 million queries a day. Google is keeping pace with the growing web in indexing the web. The following plot illustrates that the computing systems growth is at a constant rate at Google. No. of Machines Figure 4. Google s Computing Resource Growth Curve fitting exercise yielded that y = x 4E+6, with R 2 = 1 First derivative of the above curve gives us the rate of change. dy/dx = d/dx(1999.2x 4E+6) =

4 Hence Google is procuring 2 Linux boxes a year to keep pace with the growing web and user queries. Google s document indexing capability grows exponentially since It can be seen in the following plot. Web Pages (millions) The above plot fits into the curve, y = x x 2 2E+8x + 1E+11 with R 2 = 1 Figure 5. Google s Web Indexing Rate Figure 6 shows the increase in the Google s popularity in terms of increased queries per day. Queris Per Day (millions) y = x x 2-3E+7x + 2E+1 R 2 = Figure 6. Google s Query Hits With reference to the above conjecture take a look at how the Search Engines have performed over 3 years [5]. The following pattern is obtained and observed. Figure 7. Google s Performance Sm Summer, F Fall, W Winter, Sp Spring (No survey was reported by NPD in Summer 98).

5 The average successful search rate is 8% and the variation is about 5% that is consistent with the above stated conjecture. 4. OBSERVATIONS AND DISCUSSION Observing the growth of the web, processor speed and bandwidth and calculating as per the above formulation we get the following: When the Bandwidth (B) and Processor Speed (S) are Kbps and KHz and the web data is in the order of Mega bits. So we can see that B*S/V is O(1). As B and S leap into Mbps and MHz, web data is exploding into Tera bits again conforming to O(1). From this intuition, we conclude that I = k. (since B * S/V is tending towards 1). It is seen from the plot (Fig. 8) that the growth is consistent with the observations made earlier B (Mbps) S(MHz) V(Millions of pages) Figure 8. Growth of Processor Speed, Bandwidth and Web Detailed best-fit exercises yield the following plots for processor speedup, bandwidth growth, and web growth. Processor Growth: 16 y =.2517x x 3 + 6E+6x 2-8E+9x + 4E R 2 = Figure 9. Growth of Processor Speed

6 Bandwidth Growth: y = x x + 1E+8 R 2 = Figure 1. Growth of Bandwidth Web Growth: y = x x 3 + 3E+7x 2-4E+1x + 2E+13 R 2 = Figure 11. Growth of Web With bandwidth (B), Processor speed (S) and Memory (M), web data processing and rendering are done at the following rate. Let each update size be u b bytes. No. of updates per day: N No. of cycles per update to process: u c per update Also, each query size: q b bytes No. of queries per day: M No. of cycles per query to process: q c per query Then the system is under control only if, N * u b + M * q b min {B, M} and N * u c + M * q c S, Where N = N/24*6*6 and M = M/24*6*6. Here updates indicate data processing and queries indicate data rendering. Conjecture can be looked with reference to the subsystems, as the inherent processing speed, bandwidth vary at large from a sub system to subsystem. Consider the following typical client server communication across Internet.

7 Web Server B S B C Client S C S S B I Internet S S Web Server speed B S Web Server bandwidth B I Internet bandwidth S C Client speed B C Client bandwidth Figure 12. C - S Communication across Internet Here we can find subsystems like Server, Client and Internet with varying bandwidths and processor speeds. The data processing index is given by Data Processing Index (I D ) = Data Rendered/ Total Data (in KB) 5. SARVAGNA NEXT GENERATION SEARCH ENGINE In this section we give an over view of the prototype new generation search engine we are building. We compare and contrast the design and architecture of Sarvagna with Google. SARVAGNA is a Scalable, Available, Reliable, Versatile, Adaptive, Global, Novel, and Accurate new generation Search engine. It is built in accordance with the generic architecture [1] and design standards [11]. Its data collection, processing and rendering are based on push based protocols proposed in [9][12]. Complete functional and implementation details of SARVAGNA will be made available in a technical report. Figure 13. SARVGNA User Interface

8 Table 1. Architecture, Design and Implementation Issues Issue Google Sarvagna Architecture Single Unit Decoupled Units (IIE & RRE) Infrastructure 1 Linux cluster Itanium II Web Indexing Employs Robots. (PULL) PUSH based Protocols Recency 28days Periodicity Instantaneous Relevancy Pigeon ranking and Link Popularity K q -K f based Technique Implementation C/C++ Visual Studio.Net Aim of this brief section is to introduce the reader to a next generation search engine that is architecturally different from the existing search engine crop and whose design is adaptive to the web dynamics. 6. CONCLUSION Though web is a growing entity, we can perceive that a controlling law is governing the web growth, processor speedup and the bandwidth growth. Global tendency of Internet/WWW is to explode. So technological innovations, advancements in electronics and enhanced processor speed and bandwidth can not reduce the total access time of the web information because of the simultaneous rapid growth of the web. At the same time information growth is kept under check with the infrastructure enhancement. This has a pounding effect on Search Engine Technology, ISP Design and Access Network Design. We brought out a simple relation that is possibly governing the web information growth, processor speed growth and bandwidth growth. Future work is aimed at, Deriving an accurate value for the proportionality constant, k Studying the improvement of Recency and Relevancy of Search Engine based on this system. Studying the possible non-linear relationships between S, B and V. REFERENCES 1. Dr. Gordon E. Moore, April 1965, "Cramming More Components Onto Integrated Circuits", Electronics, 38(8) Special Report, September 199, "Gigabit Network Test-beds", IEEE Computer, 29(9), pp Brian E. Brewington and George Cybenko, 2, "How Dynamic is the Web?", www9/computer Networks Journal, 33(1-6), pp Michalis Faloutsos, Petros Faloutsos and Christos Faloutsos. "On Power-Law Relationships of the Internet Topology", ACM SIGCOMM, pp: , Jacob W Green, Hyper Dog: Up to date Web Monitoring through Meta Computers, MS Report, Baltimore, Maryland, October 2 9. K. Satya Sai Prakash and S. V. Raghavan, Web Recency Maintenance Protocol, Proceedings of 4 th International Workshop on distributed Computing, LNCS 2571, Springer 2, pp: K. Satya Sai Prakash and S. V. Raghavan, DIAPANGSE: Distributed Intelligent Agent based Parallel Architecture for Next Generation Search Engines, In the proceeding s of 5 th International Conference on Information Technology (CIT 22), Bhubaneshwar, India, Tata McGraw Hill, pp: K.Satya Sai Prakash and S. V. Raghavan, Workload Characterization and Performance Analysis of R 2 Protocols, Technical Report (TR-NSL-IITMadras-SAISVR-I). 12.K. Satya Sai Prakash and S. V. Raghavan, User Relevancy Improvisation Protocol, Technical Report (TR-NSL- IITMadras-SAISVR-II) Sergy Brin and Lawrence Page, April 1998, The Anatomy of Large Scale Hyper textual Web Search Engine, 7 th World Wide Web Conference, Brisbane, Australia. URL: http: //www7.scu.edu.au/programme/fullpapers/1921/com1921.htm

Real-Time Analysis of CDN in an Academic Institute: A Simulation Study

Real-Time Analysis of CDN in an Academic Institute: A Simulation Study Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management

More information

Distributed Dynamic Load Balancing for Iterative-Stencil Applications

Distributed Dynamic Load Balancing for Iterative-Stencil Applications Distributed Dynamic Load Balancing for Iterative-Stencil Applications G. Dethier 1, P. Marchot 2 and P.A. de Marneffe 1 1 EECS Department, University of Liege, Belgium 2 Chemical Engineering Department,

More information

Distributed File System. MCSN N. Tonellotto Complements of Distributed Enabling Platforms

Distributed File System. MCSN N. Tonellotto Complements of Distributed Enabling Platforms Distributed File System 1 How do we get data to the workers? NAS Compute Nodes SAN 2 Distributed File System Don t move data to workers move workers to the data! Store data on the local disks of nodes

More information

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying

More information

Advanced Peer to Peer Discovery and Interaction Framework

Advanced Peer to Peer Discovery and Interaction Framework Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering

More information

Grid Computing Vs. Cloud Computing

Grid Computing Vs. Cloud Computing International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid

More information

An Architecture Model of Sensor Information System Based on Cloud Computing

An Architecture Model of Sensor Information System Based on Cloud Computing An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National

More information

A Statistically Customisable Web Benchmarking Tool

A Statistically Customisable Web Benchmarking Tool Electronic Notes in Theoretical Computer Science 232 (29) 89 99 www.elsevier.com/locate/entcs A Statistically Customisable Web Benchmarking Tool Katja Gilly a,, Carlos Quesada-Granja a,2, Salvador Alcaraz

More information

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we

More information

BW-EML SAP Standard Application Benchmark

BW-EML SAP Standard Application Benchmark BW-EML SAP Standard Application Benchmark Heiko Gerwens and Tobias Kutning (&) SAP SE, Walldorf, Germany tobas.kutning@sap.com Abstract. The focus of this presentation is on the latest addition to the

More information

The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage

The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage sponsored by Dan Sullivan Chapter 1: Advantages of Hybrid Storage... 1 Overview of Flash Deployment in Hybrid Storage Systems...

More information

Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2

Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2 Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2 Department of Computer Engineering, YMCA University of Science & Technology, Faridabad,

More information

Interconnect Efficiency of Tyan PSC T-630 with Microsoft Compute Cluster Server 2003

Interconnect Efficiency of Tyan PSC T-630 with Microsoft Compute Cluster Server 2003 Interconnect Efficiency of Tyan PSC T-630 with Microsoft Compute Cluster Server 2003 Josef Pelikán Charles University in Prague, KSVI Department, Josef.Pelikan@mff.cuni.cz Abstract 1 Interconnect quality

More information

Public Online Data - The Importance of Colorful Query Trainers

Public Online Data - The Importance of Colorful Query Trainers BROWSING LARGE ONLINE DATA WITH QUERY PREVIEWS Egemen Tanin * egemen@cs.umd.edu Catherine Plaisant plaisant@cs.umd.edu Ben Shneiderman * ben@cs.umd.edu Human-Computer Interaction Laboratory and Department

More information

CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012 CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012 Important: No cheating will be tolerated. No extension. CS 5480 total points = 32 CS 6480 total

More information

A Performance Analysis of Secure HTTP Protocol

A Performance Analysis of Secure HTTP Protocol A Performance Analysis of Secure Protocol Xubin He, Member, IEEE Department of Electrical and Computer Engineering Tennessee Technological University Cookeville, TN 3855, U.S.A hexb@tntech.edu Abstract

More information

Concept and Project Objectives

Concept and Project Objectives 3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the

More information

Data Refinery with Big Data Aspects

Data Refinery with Big Data Aspects International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 655-662 International Research Publications House http://www. irphouse.com /ijict.htm Data

More information

Exploiting Remote Memory Operations to Design Efficient Reconfiguration for Shared Data-Centers over InfiniBand

Exploiting Remote Memory Operations to Design Efficient Reconfiguration for Shared Data-Centers over InfiniBand Exploiting Remote Memory Operations to Design Efficient Reconfiguration for Shared Data-Centers over InfiniBand P. Balaji, K. Vaidyanathan, S. Narravula, K. Savitha, H. W. Jin D. K. Panda Network Based

More information

Performance analysis and comparison of virtualization protocols, RDP and PCoIP

Performance analysis and comparison of virtualization protocols, RDP and PCoIP Performance analysis and comparison of virtualization protocols, RDP and PCoIP Jiri Kouril, Petra Lambertova Department of Telecommunications Brno University of Technology Ustav telekomunikaci, Purkynova

More information

Design and Implementation of Domain based Semantic Hidden Web Crawler

Design and Implementation of Domain based Semantic Hidden Web Crawler Design and Implementation of Domain based Semantic Hidden Web Crawler Manvi Department of Computer Engineering YMCA University of Science & Technology Faridabad, India Ashutosh Dixit Department of Computer

More information

An apparatus for P2P classification in Netflow traces

An apparatus for P2P classification in Netflow traces An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA

More information

CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING

CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING Journal homepage: http://www.journalijar.com INTERNATIONAL JOURNAL OF ADVANCED RESEARCH RESEARCH ARTICLE CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING R.Kohila

More information

Packet Flow Analysis and Congestion Control of Big Data by Hadoop

Packet Flow Analysis and Congestion Control of Big Data by Hadoop Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.456

More information

Using In-Memory Computing to Simplify Big Data Analytics

Using In-Memory Computing to Simplify Big Data Analytics SCALEOUT SOFTWARE Using In-Memory Computing to Simplify Big Data Analytics by Dr. William Bain, ScaleOut Software, Inc. 2012 ScaleOut Software, Inc. 12/27/2012 T he big data revolution is upon us, fed

More information

Internet Traffic Measurement

Internet Traffic Measurement Internet Traffic Measurement Internet Traffic Measurement Network Monitor Placement Measurement Analysis Tools Measurement Result Reporting Probing Mechanism Vantage Points Edge vs Core Hardware vs Software

More information

Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan

Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan Application Level Congestion Control Enhancements in High BDP Networks Anupama Sundaresan Organization Introduction Motivation Implementation Experiments and Results Conclusions 2 Developing a Grid service

More information

Understanding the Performance of an X550 11-User Environment

Understanding the Performance of an X550 11-User Environment Understanding the Performance of an X550 11-User Environment Overview NComputing's desktop virtualization technology enables significantly lower computing costs by letting multiple users share a single

More information

Keywords: Big Data, HDFS, Map Reduce, Hadoop

Keywords: Big Data, HDFS, Map Reduce, Hadoop Volume 5, Issue 7, July 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Configuration Tuning

More information

Performance Modeling and Analysis of a Database Server with Write-Heavy Workload

Performance Modeling and Analysis of a Database Server with Write-Heavy Workload Performance Modeling and Analysis of a Database Server with Write-Heavy Workload Manfred Dellkrantz, Maria Kihl 2, and Anders Robertsson Department of Automatic Control, Lund University 2 Department of

More information

Hadoop Technology for Flow Analysis of the Internet Traffic

Hadoop Technology for Flow Analysis of the Internet Traffic Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet

More information

LCMON Network Traffic Analysis

LCMON Network Traffic Analysis LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia adamblack@swin.edu.au Abstract The Swinburne

More information

Application Performance Analysis of the Cortex-A9 MPCore

Application Performance Analysis of the Cortex-A9 MPCore This project in ARM is in part funded by ICT-eMuCo, a European project supported under the Seventh Framework Programme (7FP) for research and technological development Application Performance Analysis

More information

STeP-IN SUMMIT 2014. June 2014 at Bangalore, Hyderabad, Pune - INDIA. Mobile Performance Testing

STeP-IN SUMMIT 2014. June 2014 at Bangalore, Hyderabad, Pune - INDIA. Mobile Performance Testing STeP-IN SUMMIT 2014 11 th International Conference on Software Testing June 2014 at Bangalore, Hyderabad, Pune - INDIA Mobile Performance Testing by Sahadevaiah Kola, Senior Test Lead and Sachin Goyal

More information

Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. Christopher Roblee Vincent Berk George Cybenko

Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. Christopher Roblee Vincent Berk George Cybenko Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems Christopher Roblee Vincent Berk George Cybenko These slides are based on the paper Implementing Large-Scale Autonomic Server

More information

A Novel Mobile Crawler System Based on Filtering off Non-Modified Pages for Reducing Load on the Network

A Novel Mobile Crawler System Based on Filtering off Non-Modified Pages for Reducing Load on the Network 272 The International Arab Journal of Information Technology, Vol. 8, No. 3, July 2011 A Novel Mobile Crawler System Based on Filtering off Non-Modified Pages for Reducing Load on the Network Rajender

More information

CHAPTER 4 PERFORMANCE ANALYSIS OF CDN IN ACADEMICS

CHAPTER 4 PERFORMANCE ANALYSIS OF CDN IN ACADEMICS CHAPTER 4 PERFORMANCE ANALYSIS OF CDN IN ACADEMICS The web content providers sharing the content over the Internet during the past did not bother about the users, especially in terms of response time,

More information

A Measurement Study of Peer-to-Peer File Sharing Systems

A Measurement Study of Peer-to-Peer File Sharing Systems CSF641 P2P Computing 點 對 點 計 算 A Measurement Study of Peer-to-Peer File Sharing Systems Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble Department of Computer Science and Engineering University

More information

A SIMULATOR FOR LOAD BALANCING ANALYSIS IN DISTRIBUTED SYSTEMS

A SIMULATOR FOR LOAD BALANCING ANALYSIS IN DISTRIBUTED SYSTEMS Mihai Horia Zaharia, Florin Leon, Dan Galea (3) A Simulator for Load Balancing Analysis in Distributed Systems in A. Valachi, D. Galea, A. M. Florea, M. Craus (eds.) - Tehnologii informationale, Editura

More information

Lizy Kurian John Electrical and Computer Engineering Department, The University of Texas as Austin

Lizy Kurian John Electrical and Computer Engineering Department, The University of Texas as Austin BUS ARCHITECTURES Lizy Kurian John Electrical and Computer Engineering Department, The University of Texas as Austin Keywords: Bus standards, PCI bus, ISA bus, Bus protocols, Serial Buses, USB, IEEE 1394

More information

Parallelism and Cloud Computing

Parallelism and Cloud Computing Parallelism and Cloud Computing Kai Shen Parallel Computing Parallel computing: Process sub tasks simultaneously so that work can be completed faster. For instances: divide the work of matrix multiplication

More information

Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012

Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012 Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012 January 29th, 2008 Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. way-back machine Web 1998 way-back

More information

NETWORK REQUIREMENTS FOR HIGH-SPEED REAL-TIME MULTIMEDIA DATA STREAMS

NETWORK REQUIREMENTS FOR HIGH-SPEED REAL-TIME MULTIMEDIA DATA STREAMS NETWORK REQUIREMENTS FOR HIGH-SPEED REAL-TIME MULTIMEDIA DATA STREAMS Andrei Sukhov 1), Prasad Calyam 2), Warren Daly 3), Alexander Iliin 4) 1) Laboratory of Network Technologies, Samara Academy of Transport

More information

Delphi 2015 SP1-AP1 System Requirements

Delphi 2015 SP1-AP1 System Requirements Delphi 2015 SP1-AP1 System Requirements Revision 1.2 Newmarket International Inc. July 24,2015 newmarketinc.com Copyright 2015 Newmarket International, Inc., an Amadeus company. All rights reserved. This

More information

ADAPTIVE LOAD BALANCING FOR CLUSTER USING CONTENT AWARENESS WITH TRAFFIC MONITORING Archana Nigam, Tejprakash Singh, Anuj Tiwari, Ankita Singhal

ADAPTIVE LOAD BALANCING FOR CLUSTER USING CONTENT AWARENESS WITH TRAFFIC MONITORING Archana Nigam, Tejprakash Singh, Anuj Tiwari, Ankita Singhal ADAPTIVE LOAD BALANCING FOR CLUSTER USING CONTENT AWARENESS WITH TRAFFIC MONITORING Archana Nigam, Tejprakash Singh, Anuj Tiwari, Ankita Singhal Abstract With the rapid growth of both information and users

More information

Inverted files and dynamic signature files for optimisation of Web directories

Inverted files and dynamic signature files for optimisation of Web directories s and dynamic signature files for optimisation of Web directories Fidel Cacheda, Angel Viña Department of Information and Communication Technologies Facultad de Informática, University of A Coruña Campus

More information

Bandwidth consumption: Adaptive Defense and Adaptive Defense 360

Bandwidth consumption: Adaptive Defense and Adaptive Defense 360 Contents 1. 2. 3. 4. How Adaptive Defense communicates with the Internet... 3 Bandwidth consumption summary table... 4 Estimating bandwidth usage... 5 URLs required by Adaptive Defense... 6 1. How Adaptive

More information

A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique

A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique Jyoti Malhotra 1,Priya Ghyare 2 Associate Professor, Dept. of Information Technology, MIT College of

More information

DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER

DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER M.Vishwashanthi 1, S.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Anurag Group

More information

DISTRIBUTED internet systems monitoring is already

DISTRIBUTED internet systems monitoring is already Proceedings of the 2013 Federated Conference on Computer Science and Information Systems pp. 801 805 Content Delivery Network Monitoring with Limited Resources Krzysztof Kaczmarski, Marcin Pilarski Faculty

More information

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos (gss7@sfu.ca) (sna14@sfu.ca)

More information

Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic

Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic William Acosta and Surendar Chandra University of Notre Dame, Notre Dame IN, 46556, USA {wacosta,surendar}@cse.nd.edu Abstract.

More information

See Criminal Internet Communication as it Happens.

See Criminal Internet Communication as it Happens. A PRODUCT OF See Criminal Internet Communication as it Happens. In Real Time or Recreated. From the Field or From Your Desk. That s Intelligence. That s Intellego. 2 / Visual Reconstruction & Analysis

More information

How To Monitor Performance On Eve

How To Monitor Performance On Eve Performance Monitoring on Networked Virtual Environments C. Bouras 1, 2, E. Giannaka 1, 2 Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet applications,

More information

UML Modeling of Network Topologies for Distributed Computer System

UML Modeling of Network Topologies for Distributed Computer System Journal of Computing and Information Technology - CIT 17, 2009, 4, 327 334 doi:10.2498/cit.1001319 327 UML Modeling of Network Topologies for Distributed Computer System Vipin Saxena and Deepak Arora Department

More information

Cloud Computing with Azure PaaS for Educational Institutions

Cloud Computing with Azure PaaS for Educational Institutions International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 139-144 International Research Publications House http://www. irphouse.com /ijict.htm Cloud

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Association of System Performance Professionals The Computer Measurement Group, commonly called CMG, is a not for profit, worldwide organization of data processing professionals committed to the measurement

More information

Performance Evaluation of Linux Bridge

Performance Evaluation of Linux Bridge Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet

More information

4 Internet QoS Management

4 Internet QoS Management 4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control

More information

E-commerce: Load Testing and the Advantages of Open Source Model

E-commerce: Load Testing and the Advantages of Open Source Model Extending Open Source solution for Performance testing of Web (http\https) application ABSTRACT In this research paper we examine the need for load testing and highlight the shortcomings of open source

More information

Make search become the internal function of Internet

Make search become the internal function of Internet Make search become the internal function of Internet Wang Liang 1, Guo Yi-Ping 2, Fang Ming 3 1, 3 (Department of Control Science and Control Engineer, Huazhong University of Science and Technology, WuHan,

More information

The Benefits of Purpose Built Super Efficient Video Servers

The Benefits of Purpose Built Super Efficient Video Servers Whitepaper Deploying Future Proof On Demand TV and Video Services: The Benefits of Purpose Built Super Efficient Video Servers The Edgeware Storage System / Whitepaper / Edgeware AB 2010 / Version1 A4

More information

Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.

Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age. Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Load Measurement

More information

Design of Remote data acquisition system based on Internet of Things

Design of Remote data acquisition system based on Internet of Things , pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; Niuling@zknu.edu.cn

More information

Data-Driven Decisions: Role of Operations Research in Business Analytics

Data-Driven Decisions: Role of Operations Research in Business Analytics Data-Driven Decisions: Role of Operations Research in Business Analytics Dr. Radhika Kulkarni Vice President, Advanced Analytics R&D SAS Institute April 11, 2011 Welcome to the World of Analytics! Lessons

More information

Latency on a Switched Ethernet Network

Latency on a Switched Ethernet Network Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency

More information

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal

More information

Following statistics will show you the importance of mobile applications in this smart era,

Following statistics will show you the importance of mobile applications in this smart era, www.agileload.com There is no second thought about the exponential increase in importance and usage of mobile applications. Simultaneously better user experience will remain most important factor to attract

More information

Priority Queuing of Network Game Traffic over a DOCSIS Cable Modem Link

Priority Queuing of Network Game Traffic over a DOCSIS Cable Modem Link Priority Queuing of Network Game Traffic over a DOCSIS Cable Modem Link Jason But, Shaun Burriss and Grenville Armitage Centre for Advanced Internet Architectures Swinburne University of Technology Melbourne,

More information

MINISTRY OF HEALTH CUSTOMER PROPOSAL

MINISTRY OF HEALTH CUSTOMER PROPOSAL WENEO VIDEO CONFERENCING SOLUTION FOR MINISTRY OF HEALTH CUSTOMER PROPOSAL PRASHANTA S. CHOWDHURY Business Executive Dew Drop Enterprises Ltd Mobile: +256-750 665 388 P.O. BOX 35377 KAMPALA, UGANDA Friday,

More information

How To Build A Cloud Computer

How To Build A Cloud Computer Introducing the Singlechip Cloud Computer Exploring the Future of Many-core Processors White Paper Intel Labs Jim Held Intel Fellow, Intel Labs Director, Tera-scale Computing Research Sean Koehl Technology

More information

Building well-balanced CDN 1

Building well-balanced CDN 1 Proceedings of the Federated Conference on Computer Science and Information Systems pp. 679 683 ISBN 978-83-60810-51-4 Building well-balanced CDN 1 Piotr Stapp, Piotr Zgadzaj Warsaw University of Technology

More information

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India sudha.mooki@gmail.com 2 Department

More information

CMiS: A Cloud Computing Based Management Information System

CMiS: A Cloud Computing Based Management Information System International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 1 (2014), pp. 15-20 International Research Publications House http://www. irphouse.com /ijict.htm CMiS:

More information

A Performance Study of Load Balancing Strategies for Approximate String Matching on an MPI Heterogeneous System Environment

A Performance Study of Load Balancing Strategies for Approximate String Matching on an MPI Heterogeneous System Environment A Performance Study of Load Balancing Strategies for Approximate String Matching on an MPI Heterogeneous System Environment Panagiotis D. Michailidis and Konstantinos G. Margaritis Parallel and Distributed

More information

Big Data: Study in Structured and Unstructured Data

Big Data: Study in Structured and Unstructured Data Big Data: Study in Structured and Unstructured Data Motashim Rasool 1, Wasim Khan 2 mail2motashim@gmail.com, khanwasim051@gmail.com Abstract With the overlay of digital world, Information is available

More information

NetFlow-Based Approach to Compare the Load Balancing Algorithms

NetFlow-Based Approach to Compare the Load Balancing Algorithms 6 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.1, October 8 NetFlow-Based Approach to Compare the Load Balancing Algorithms Chin-Yu Yang 1, and Jian-Bo Chen 3 1 Dept.

More information

Web intelligence on Big Data in Today s Life. Web intelligence on Big Data in Today s Life,

Web intelligence on Big Data in Today s Life. Web intelligence on Big Data in Today s Life, Web intelligence on Big Data in Today s Life Updesh Kumar Jaiswal I.M.S Engineering College,Ghaziabad, U.P, India updesh1984@gmail.com Abhishek Gupta I.M.S. Engineering College, Ghaziabad, U.P, India abhishekftp@yahoo.com

More information

Energy Constrained Resource Scheduling for Cloud Environment

Energy Constrained Resource Scheduling for Cloud Environment Energy Constrained Resource Scheduling for Cloud Environment 1 R.Selvi, 2 S.Russia, 3 V.K.Anitha 1 2 nd Year M.E.(Software Engineering), 2 Assistant Professor Department of IT KSR Institute for Engineering

More information

Comparative Analysis of Congestion Control Algorithms Using ns-2

Comparative Analysis of Congestion Control Algorithms Using ns-2 www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,

More information

Botnet Detection by Abnormal IRC Traffic Analysis

Botnet Detection by Abnormal IRC Traffic Analysis Botnet Detection by Abnormal IRC Traffic Analysis Gu-Hsin Lai 1, Chia-Mei Chen 1, and Ray-Yu Tzeng 2, Chi-Sung Laih 2, Christos Faloutsos 3 1 National Sun Yat-Sen University Kaohsiung 804, Taiwan 2 National

More information

Management of Very Large Security Event Logs

Management of Very Large Security Event Logs Management of Very Large Security Event Logs Balasubramanian Ramaiah Myungsook Klassen Computer Science Department, California Lutheran University 60 West Olsen Rd, Thousand Oaks, CA 91360, USA Abstract

More information

Performance Characteristics of VMFS and RDM VMware ESX Server 3.0.1

Performance Characteristics of VMFS and RDM VMware ESX Server 3.0.1 Performance Study Performance Characteristics of and RDM VMware ESX Server 3.0.1 VMware ESX Server offers three choices for managing disk access in a virtual machine VMware Virtual Machine File System

More information

Development of Framework System for Managing the Big Data from Scientific and Technological Text Archives

Development of Framework System for Managing the Big Data from Scientific and Technological Text Archives Development of Framework System for Managing the Big Data from Scientific and Technological Text Archives Mi-Nyeong Hwang 1, Myunggwon Hwang 1, Ha-Neul Yeom 1,4, Kwang-Young Kim 2, Su-Mi Shin 3, Taehong

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

Comparision of k-means and k-medoids Clustering Algorithms for Big Data Using MapReduce Techniques

Comparision of k-means and k-medoids Clustering Algorithms for Big Data Using MapReduce Techniques Comparision of k-means and k-medoids Clustering Algorithms for Big Data Using MapReduce Techniques Subhashree K 1, Prakash P S 2 1 Student, Kongu Engineering College, Perundurai, Erode 2 Assistant Professor,

More information

Using Tableau Software with Hortonworks Data Platform

Using Tableau Software with Hortonworks Data Platform Using Tableau Software with Hortonworks Data Platform September 2013 2013 Hortonworks Inc. http:// Modern businesses need to manage vast amounts of data, and in many cases they have accumulated this data

More information

From Centralization to Distribution: A Comparison of File Sharing Protocols

From Centralization to Distribution: A Comparison of File Sharing Protocols From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015

More information

HOW TO EVALUATE AND SELECT TOOL A HIGH-END LOAD TESTING. Marquis Harding Reality Test P R E S E N T A T I O N. Presentation. Bio

HOW TO EVALUATE AND SELECT TOOL A HIGH-END LOAD TESTING. Marquis Harding Reality Test P R E S E N T A T I O N. Presentation. Bio Presentation P R E S E N T A T I O N Bio E6 Thursday, March 8, 2001 11:30 AM HOW TO EVALUATE AND SELECT A HIGH-END LOAD TESTING TOOL Marquis Harding Reality Test International Conference On Software Test

More information

Testing & Assuring Mobile End User Experience Before Production. Neotys

Testing & Assuring Mobile End User Experience Before Production. Neotys Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,

More information

Azure Media Service Cloud Video Delivery KILROY HUGHES MICROSOFT AZURE MEDIA 2015.08.20

Azure Media Service Cloud Video Delivery KILROY HUGHES MICROSOFT AZURE MEDIA 2015.08.20 Azure Media Service Cloud Video Delivery KILROY HUGHES MICROSOFT AZURE MEDIA 2015.08.20 Azure Cloud Topology Public cloud providers such as Amazon Web Service, Google, IBM, Rackspace, etc. have similar

More information

CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY?

CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY? CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY? Appears in: 2010, Computer, IEEE Computer Society Authors: Karthik Kumar and Yung-Hsiang Lu Electrical and Computer Engineering,

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

Massive Cloud Auditing using Data Mining on Hadoop

Massive Cloud Auditing using Data Mining on Hadoop Massive Cloud Auditing using Data Mining on Hadoop Prof. Sachin Shetty CyberBAT Team, AFRL/RIGD AFRL VFRP Tennessee State University Outline Massive Cloud Auditing Traffic Characterization Distributed

More information

IOS110. Virtualization 5/27/2014 1

IOS110. Virtualization 5/27/2014 1 IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to

More information

PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS

PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS Amar More 1 and Sarang Joshi 2 1 Department of Computer Engineering, Pune Institute of Computer Technology, Maharashtra,

More information

Scalable Internet Services and Load Balancing

Scalable Internet Services and Load Balancing Scalable Services and Load Balancing Kai Shen Services brings ubiquitous connection based applications/services accessible to online users through Applications can be designed and launched quickly and

More information

Oracle Database Scalability in VMware ESX VMware ESX 3.5

Oracle Database Scalability in VMware ESX VMware ESX 3.5 Performance Study Oracle Database Scalability in VMware ESX VMware ESX 3.5 Database applications running on individual physical servers represent a large consolidation opportunity. However enterprises

More information

Moore s Law and Network Optimization

Moore s Law and Network Optimization Moore s Law and Network Optimization Constantine D. Polychronopoulos University of Illinois at Urbana-Champaign Onassis Foundation Science Lecture Series 2008 Computer Science ITE - Crete July 2008 1 Moore

More information

Performance Monitoring of Parallel Scientific Applications

Performance Monitoring of Parallel Scientific Applications Performance Monitoring of Parallel Scientific Applications Abstract. David Skinner National Energy Research Scientific Computing Center Lawrence Berkeley National Laboratory This paper introduces an infrastructure

More information