WAVE: Popularity-based and Collaborative In-network Caching for Content-Oriented Networks

Size: px
Start display at page:

Download "WAVE: Popularity-based and Collaborative In-network Caching for Content-Oriented Networks"

Transcription

1 WAVE: Popularity-based and Collaborative In-network Caching for Content-Oriented Networks K. D. Cho et al., IEEE INFOCOM 2012 Workshop, pp , March January 17, 2013 Byeong-Gi Kim Park Laboratory, Waseda University

2 Outline Introduction WAVE: A Content Caching Scheme Simulation Results Conclusion

3 I. Introduction Content-Oriented Networking Content retrievals Efficient load balancing Content-oriented routing In-network Caching Faster content delivery Better content availability

4 I. Introduction (cont.) Chunk-based Caching Small sized chunks can provide shorter transfer delay and less processing overhead than file-based caching Replacing chunks instead of a whole file may increase the storage efficiency How to distribute chunks of the same file? Design Challenge Reduce communication and maintenance overhead E.g., web caches and CDNs require an explicit coordination between caches so substantial overhead is incurred Provide efficient content delivery and cache usage Lower latency, lower network resource use, etc.

5 II. WAVE: A Content Caching Scheme Characteristics Popularity-based Adjust the number of chunks to be cached considering the content popularity (i.e., access count) Simple Require no knowledge of access patterns Only two counters per file are required Decentralized No need of central server Incrementally deployable Downstream router can decide whether the router needs to cache the incoming data or not WAVE routers can operate with legacy routers

6 II. WAVE: A Content Caching Scheme Assumption Chunk Request instead of File Request 100 chunks will be requested by 100 chunk requests Chunk Marking and Forwarding Independent caching decision Minimum information for the caching decision is required Cache suggestion flag On-path Caching Chunk will be cached at a C-router along the path Chunk will be transferred from the C-router

7 II. WAVE (cont.) Fig. 1. Illustration of WAVE operations.

8 II. WAVE (cont.) Chunk Caching Algorithm What to cache What to replace Where to cache

9 II. WAVE (cont.) What to cache Fig. 2. Content caching example in a C-router.

10 II. WAVE (cont.) What to replace Use LRU (Least Recently Used) WAVE maintains the access history in the unit of a file to find a victim chunk to be replaced When the last cached chunk is replaced, the access history for the file can be removed

11 II. WAVE (cont.) Where to cache Direction and location should be considered carefully Direction WAVE distributes the chunks in the direction from which the chunk requests come Location One-hop distribution Multi-hop distribution ISP crossing distribution

12 III. Simulation Results Simulation Environment Use a discrete event-driven simulator Stub Stub Domain Domain (10) (10) Transit Domain (5) Stub Domain (10) Stub Domain (10) Stub Domain (10) 1,000 end hosts 10 original servers 100,000 files 1GB size content (Divided into 100 chunks) Zipf distribution with parameter GB storage size

13 III. Simulation Results (cont.) Network-wide Performance Average Hop Count Fast content retrieval Link Stress Traffic amount transferred over a particular link Load balance Inter-ISP Traffic Reduction The number of content downloads from original server

14 III. Simulation Results (cont.) Fig. 3. Performance comparison of WAVE against ProbCache, AllCache, CDN, and client-server.

15 III. Simulation Results (cont.) Cache-related Performance Cache Hit Ratio Cache Replacement Count Caching Efficiency Defined as the average number of cache hit counts divided by the number of aching events Relative Hop Count Defined as the ratio of how many hops a chunk is distant from the end hosts on average depending on its index to the average hop count Number of Chunks

16 III. Simulation Results (cont.) Fig. 4. Cache performance comparison of WAVE against ProbCache, UniCache, and AllCache model.

17 IV. Conclusion WAVE was proposed for efficient caching and delivery of content To reflect the content popularity, WAVE exponentially increases the number of chunks of a file to be cached as its request increases WAVE achieves higher cache hit ratio and less frequent cache replacements than other on-demand caching schemes

How To Understand The Power Of Icdn

How To Understand The Power Of Icdn MobiArch 2014 R-iCDN: an Approach Supporting Flexible Content Routing for ISP-operated CDN Song Ci High Performance Network Lab, Institute of Acoustics, Chinese Academy of Sciences Outline I. Background

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems

More information

Content Delivery Networks. Shaxun Chen April 21, 2009

Content Delivery Networks. Shaxun Chen April 21, 2009 Content Delivery Networks Shaxun Chen April 21, 2009 Outline Introduction to CDN An Industry Example: Akamai A Research Example: CDN over Mobile Networks Conclusion Outline Introduction to CDN An Industry

More information

Data Center Content Delivery Network

Data Center Content Delivery Network BM 465E Distributed Systems Lecture 4 Networking (cont.) Mehmet Demirci Today Overlay networks Data centers Content delivery networks Overlay Network A virtual network built on top of another network Overlay

More information

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu Dilip Kumar Krishnappa, Samamon Khemmarat, Lixin Gao, Michael Zink University of Massachusetts Amherst,

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching

Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching 2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network

Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network Jian Ni, Danny H. K. Tsang, Ivan S. H. Yeung, Xiaojun Hei Department of Electrical & Electronic Engineering Hong Kong University

More information

Research Topics on Information-Centric Networking: Caching, Routing and Virtualization

Research Topics on Information-Centric Networking: Caching, Routing and Virtualization Research Topics on Information-Centric Networking: Caching, Routing and Virtualization Thomas Silverston JFLI, Japanese-French Laboratory for Informatics (CNRS UMI3527) The University of Tokyo May, 21

More information

A Novel Caching Scheme for Internet based Mobile Ad Hoc Networks

A Novel Caching Scheme for Internet based Mobile Ad Hoc Networks A Novel Caching Scheme for Internet based Mobile Ad Hoc Networks Sunho Lim, Wang-Chien Lee, Guohong Cao, and Chita R. Das Department of Computer Science & Engineering The Pennsylvania State University

More information

Network Level Multihoming and BGP Challenges

Network Level Multihoming and BGP Challenges Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology [email protected] Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.

More information

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,

More information

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY

A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL Using OPNET 14.5 Modeler NORTH CAROLINA STATE UNIVERSITY SUBMITTED BY: SHOBHANK SHARMA [email protected] Page 1 ANALYSIS OF OSPF ROUTING PROTOCOL A. Introduction

More information

An Efficient Scheme to Remove Crawler Traffic from the Internet

An Efficient Scheme to Remove Crawler Traffic from the Internet An Efficient Scheme to Remove Crawler Traffic from the Internet X. Yuan, M. H. MacGregor, J. Harms Department of Computing Science University of Alberta Edmonton, Alberta, Canada Email: xiaoqin,macg,harms

More information

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks Young J. Lee and George F. Riley School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA 30332

More information

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks

More information

The Effect of Caches for Mobile Broadband Internet Access

The Effect of Caches for Mobile Broadband Internet Access The Effect of s for Mobile Jochen Eisl, Nokia Siemens Networks, Munich, Germany Haßlinger, Deutsche Telekom Technik,, Darmstadt, Germany IP-based content delivery: CDN & cache architecture Impact of access

More information

Testing & Assuring Mobile End User Experience Before Production. Neotys

Testing & Assuring Mobile End User Experience Before Production. Neotys Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,

More information

The Value of Content Distribution Networks Mike Axelrod, Google [email protected]. Google Public

The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com. Google Public The Value of Content Distribution Networks Mike Axelrod, Google [email protected] Introduction Well understood facts: o Fast is better than slow but it costs more to be fast o Network has to be fast and

More information

Should Internet Service Providers Fear Peer-Assisted Content Distribution?

Should Internet Service Providers Fear Peer-Assisted Content Distribution? Should Internet Service Providers Fear Peer-Assisted Content Distribution? Thomas Karagiannis, UC Riverside Pablo Rodriguez, Microsoft Research Cambridge Konstantina Papagiannaki, Intel Research Cambridge

More information

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar

More information

Traceroute-Based Topology Inference without Network Coordinate Estimation

Traceroute-Based Topology Inference without Network Coordinate Estimation Traceroute-Based Topology Inference without Network Coordinate Estimation Xing Jin, Wanqing Tu Department of Computer Science and Engineering The Hong Kong University of Science and Technology Clear Water

More information

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],

More information

AKAMAI WHITE PAPER. Delivering Dynamic Web Content in Cloud Computing Applications: HTTP resource download performance modelling

AKAMAI WHITE PAPER. Delivering Dynamic Web Content in Cloud Computing Applications: HTTP resource download performance modelling AKAMAI WHITE PAPER Delivering Dynamic Web Content in Cloud Computing Applications: HTTP resource download performance modelling Delivering Dynamic Web Content in Cloud Computing Applications 1 Overview

More information

How To Protect Your Network From A Ddos Attack On A Network With Pip (Ipo) And Pipi (Ipnet) From A Network Attack On An Ip Address Or Ip Address (Ipa) On A Router Or Ipa

How To Protect Your Network From A Ddos Attack On A Network With Pip (Ipo) And Pipi (Ipnet) From A Network Attack On An Ip Address Or Ip Address (Ipa) On A Router Or Ipa Defenses against Distributed Denial of Service Attacks Adrian Perrig, Dawn Song, Avi Yaar CMU Internet Threat: DDoS Attacks Denial of Service (DoS) attack: consumption (exhaustion) of resources to deny

More information

Path Selection Methods for Localized Quality of Service Routing

Path Selection Methods for Localized Quality of Service Routing Path Selection Methods for Localized Quality of Service Routing Xin Yuan and Arif Saifee Department of Computer Science, Florida State University, Tallahassee, FL Abstract Localized Quality of Service

More information

Web Caching and CDNs. Aditya Akella

Web Caching and CDNs. Aditya Akella Web Caching and CDNs Aditya Akella 1 Where can bottlenecks occur? First mile: client to its ISPs Last mile: server to its ISP Server: compute/memory limitations ISP interconnections/peerings: congestion

More information

Bloom Filter based Inter-domain Name Resolution: A Feasibility Study

Bloom Filter based Inter-domain Name Resolution: A Feasibility Study Bloom Filter based Inter-domain Name Resolution: A Feasibility Study Konstantinos V. Katsaros, Wei Koong Chai and George Pavlou University College London, UK Outline Inter-domain name resolution in ICN

More information

networks Live & On-Demand Video Delivery without Interruption Wireless optimization the unsolved mystery WHITE PAPER

networks Live & On-Demand Video Delivery without Interruption Wireless optimization the unsolved mystery WHITE PAPER Live & On-Demand Video Delivery without Interruption Wireless optimization the unsolved mystery - Improving the way the world connects - WHITE PAPER Live On-Demand Video Streaming without Interruption

More information

Concept of Cache in web proxies

Concept of Cache in web proxies Concept of Cache in web proxies Chan Kit Wai and Somasundaram Meiyappan 1. Introduction Caching is an effective performance enhancing technique that has been used in computer systems for decades. However,

More information

Characterizing and Mitigating Web Performance Bottlenecks in Broadband Access Networks

Characterizing and Mitigating Web Performance Bottlenecks in Broadband Access Networks Characterizing and Mitigating Web Performance Bottlenecks in Broadband Access Networks Srikanth Sundaresan, Nazanin Magharei, Nick Feamster, Renata Teixeira {srikanth.sundaresan,nazanin,feamster}@cc.gatech.edu,

More information

Internet Anonymity and the Design Process - A Practical Approach

Internet Anonymity and the Design Process - A Practical Approach anon.next: A Framework for Privacy in the Next Generation Internet Matthew Wright Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA, [email protected],

More information

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

A Topology-Aware Relay Lookup Scheme for P2P VoIP System Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Optical interconnection networks with time slot routing

Optical interconnection networks with time slot routing Theoretical and Applied Informatics ISSN 896 5 Vol. x 00x, no. x pp. x x Optical interconnection networks with time slot routing IRENEUSZ SZCZEŚNIAK AND ROMAN WYRZYKOWSKI a a Institute of Computer and

More information

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,

More information

Evaluating Cooperative Web Caching Protocols for Emerging Network Technologies 1

Evaluating Cooperative Web Caching Protocols for Emerging Network Technologies 1 Evaluating Cooperative Web Caching Protocols for Emerging Network Technologies 1 Christoph Lindemann and Oliver P. Waldhorst University of Dortmund Department of Computer Science August-Schmidt-Str. 12

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]

More information

Deploying in a Distributed Environment

Deploying in a Distributed Environment Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each

More information

Towards Autonomic DDoS Mitigation using Software Defined Networking

Towards Autonomic DDoS Mitigation using Software Defined Networking Towards Autonomic DDoS Mitigation using Software Defined Networking Authors: Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Hervé Debar NDSS Workshop on Security of Emerging Networking Technologies (SENT

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks

Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks Chin-Tser Huang, Prasanth Kalakota, Alexander B. Alexandrov Department of Computer Science and Engineering University

More information

Internet Content Distribution

Internet Content Distribution Internet Content Distribution Chapter 2: Server-Side Techniques (TUD Student Use Only) Chapter Outline Server-side techniques for content distribution Goals Mirrors Server farms Surrogates DNS load balancing

More information

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and

More information

Multimedia Caching Strategies for Heterogeneous Application and Server Environments

Multimedia Caching Strategies for Heterogeneous Application and Server Environments Multimedia Tools and Applications 4, 279 312 (1997) c 1997 Kluwer Academic Publishers. Manufactured in The Netherlands. Multimedia Caching Strategies for Heterogeneous Application and Server Environments

More information

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

Efficient Parallel Distributed Load Balancing in Content Delivery Networks

Efficient Parallel Distributed Load Balancing in Content Delivery Networks Efficient Parallel Distributed Load Balancing in Content Delivery Networks P.Jyothi*1, N.Rajesh*2, K.Ramesh Babu*3 M.Tech Scholar, Dept of CSE, MRECW, Maisammaguda, Secunderabad, Telangana State, India,

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

HPAM: Hybrid Protocol for Application Level Multicast. Yeo Chai Kiat

HPAM: Hybrid Protocol for Application Level Multicast. Yeo Chai Kiat HPAM: Hybrid Protocol for Application Level Multicast Yeo Chai Kiat Scope 1. Introduction 2. Hybrid Protocol for Application Level Multicast (HPAM) 3. Features of HPAM 4. Conclusion 1. Introduction Video

More information

Blind SDN vs. Insightful SDN in a Mobile Backhaul Environment Extending SDN with Network State+

Blind SDN vs. Insightful SDN in a Mobile Backhaul Environment Extending SDN with Network State+ White Paper Network State+ - Driving Visibility for Performance Assurance and SDN Blind SDN vs. Insightful SDN in a Mobile Backhaul Environment Extending SDN with Network State+ Introduction While the

More information

Measuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD

Measuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD Measuring the Web: Part I - - Content Delivery Networks Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD Acknowledgement Material presented in these slides is borrowed from presentajons

More information

A Proposed Service Broker Strategy in CloudAnalyst for Cost-Effective Data Center Selection

A Proposed Service Broker Strategy in CloudAnalyst for Cost-Effective Data Center Selection A Proposed Service Broker Strategy in CloudAnalyst for Cost-Effective Selection Dhaval Limbani*, Bhavesh Oza** *(Department of Information Technology, S. S. Engineering College, Bhavnagar) ** (Department

More information

Deployment considerations draft-ietf-alto-deployments-08

Deployment considerations draft-ietf-alto-deployments-08 Deployment considerations draft-ietf-alto-deployments-08 Martin Stiemerling, Sebastian Kiesel, Stefano Previdi, Michael Scharf Presented by Vijay Gurbani IETF 88, Vancouver, Canada, Nov. 2013 Status of

More information

The old Internet. Software in the Network: Outline. Traditional Design. 1) Basic Caching. The Arrival of Software (in the network)

The old Internet. Software in the Network: Outline. Traditional Design. 1) Basic Caching. The Arrival of Software (in the network) The old Software in the Network: What Happened and Where to Go Prof. Eric A. Brewer UC Berkeley Inktomi Corporation Local networks with local names and switches IP creates global namespace and links the

More information

CDN and Traffic-structure

CDN and Traffic-structure CDN and Traffic-structure Outline Basics CDN Traffic Analysis 2 Outline Basics CDN Building Blocks Services Evolution Traffic Analysis 3 A Centralized Web! Slow content must traverse multiple backbones

More information

Implementation of Buffer Cache Simulator for Hybrid Main Memory and Flash Memory Storages

Implementation of Buffer Cache Simulator for Hybrid Main Memory and Flash Memory Storages Implementation of Buffer Cache Simulator for Hybrid Main Memory and Flash Memory Storages Soohyun Yang and Yeonseung Ryu Department of Computer Engineering, Myongji University Yongin, Gyeonggi-do, Korea

More information

Smart Queue Scheduling for QoS Spring 2001 Final Report

Smart Queue Scheduling for QoS Spring 2001 Final Report ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang([email protected]) & Liu Tang([email protected])

More information

The Survey Report on DNS Cache & Recursive Service in China Mainland

The Survey Report on DNS Cache & Recursive Service in China Mainland The Survey Report on DNS Cache & Recursive Service in China Mainland Wei WANG, Chinese Academy of Sciences Zhiwei YAN, China Internet Network Information Center Motivation Improve the traditional recursive

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

ECE 7650 Scalable and Secure Internet Services and Architecture ---- A Systems Perspective

ECE 7650 Scalable and Secure Internet Services and Architecture ---- A Systems Perspective ECE 7650 Scalable and Secure Internet Services and Architecture ---- A Systems Perspective Part II: Data Center Software Architecture: Topic 1: Distributed File Systems Finding a needle in Haystack: Facebook

More information

Making the Internet fast, reliable and secure. DE-CIX Customer Summit - 2014. Steven Schecter <[email protected]>

Making the Internet fast, reliable and secure. DE-CIX Customer Summit - 2014. Steven Schecter <schecter@akamai.com> Making the Internet fast, reliable and secure DE-CIX Customer Summit - 2014 Steven Schecter What is a Content Distribution Network RFCs and Internet Drafts define a CDN as: Content

More information

The Effectiveness of Request Redirection on CDN Robustness

The Effectiveness of Request Redirection on CDN Robustness The Effectiveness of Request Redirection on CDN Robustness Limin Wang, Vivek Pai and Larry Peterson Presented by: Eric Leshay Ian McBride Kai Rasmussen 1 Outline! Introduction! Redirection Strategies!

More information

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As) Policy Based QoS support using BGP Routing Priyadarsi Nanda and Andrew James Simmonds Department of Computer Systems Faculty of Information Technology University of Technology, Sydney Broadway, NSW Australia

More information

Lecture 6 Content Distribution and BitTorrent

Lecture 6 Content Distribution and BitTorrent ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Lecture 6 Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent

More information

A Performance Analysis of Secure HTTP Protocol

A Performance Analysis of Secure HTTP Protocol A Performance Analysis of Secure Protocol Xubin He, Member, IEEE Department of Electrical and Computer Engineering Tennessee Technological University Cookeville, TN 3855, U.S.A [email protected] Abstract

More information

Using Synology SSD Technology to Enhance System Performance Synology Inc.

Using Synology SSD Technology to Enhance System Performance Synology Inc. Using Synology SSD Technology to Enhance System Performance Synology Inc. Synology_SSD_Cache_WP_ 20140512 Table of Contents Chapter 1: Enterprise Challenges and SSD Cache as Solution Enterprise Challenges...

More information

Experimentation with the YouTube Content Delivery Network (CDN)

Experimentation with the YouTube Content Delivery Network (CDN) Experimentation with the YouTube Content Delivery Network (CDN) Siddharth Rao Department of Computer Science Aalto University, Finland [email protected] Sami Karvonen Department of Computer Science

More information

In-Network Caching vs. Redundancy Elimination

In-Network Caching vs. Redundancy Elimination In-Network Caching vs. Redundancy Elimination Liang Wang, Walter Wong, Jussi Kangasharju Department of Computer Science, University of Helsinki, Finland School of Electrical and Computer Engineering, University

More information

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Maitreya Natu Dept. of Computer and Information Sciences University of Delaware, Newark, DE, USA, 19716 Email: [email protected]

More information

Managing Storage Space in a Flash and Disk Hybrid Storage System

Managing Storage Space in a Flash and Disk Hybrid Storage System Managing Storage Space in a Flash and Disk Hybrid Storage System Xiaojian Wu, and A. L. Narasimha Reddy Dept. of Electrical and Computer Engineering Texas A&M University IEEE International Symposium on

More information

DNS traffic analysis -- Issues of IPv6 and CDN --

DNS traffic analysis -- Issues of IPv6 and CDN -- DNS traffic analysis -- Issues of IPv6 and CDN -- Kazunori Fujiwara ^, Akira Sato, Kenichi Yoshida University of Tsukuba ^Japan Registry Services Co., Ltd (JPRS) July 29, 2012 IEPG meeting at Vancouver

More information