ADAPTIVE DISTRIBUTED CACHING WITH MINIMAL MEMORY USAGE
|
|
|
- Asher Banks
- 10 years ago
- Views:
Transcription
1 ADAPTIVE DISTRIBUTED CACHING WITH MINIMAL MEMORY USAGE Markus J. Kaiser, Kwok Ching Tsui and Jiming Liu Department of Computer Science Hong Kong Baptist University Kowloon Tong, Kowloon, Hong Kong ABSTRACT We have shown previously that our Adaptive Distributed Caching (ADC) algorithm is able to compete with typical hashing based approaches in the realm of distributed proxy systems. In our first approach, we allowed the algorithm to run with the assumption of unlimited system resources (e.g. physical RAM). In this paper we introduce an extension to ADC, which gives the algorithm the capability to perform in more realistic environments with limited memory. We will discuss the arising problem, introduce the new ADC and provide experimental results, which will show that our algorithm is able to achieve the performance characteristic of our previous work even with limited resources. 1. INTRODUCTION The Internet is growing exponentially and web caches have been shown to be a feasible way to reduce the overall network traffic [6]. A cache is usually placed between the requesting clients and the resolving origin server, storing transferred objects for future retrieval and reducing the overall request latency for cached objects [8]. Proxies that are not able to resolve an incoming request have to make a choice between either forwarding the request directly to the origin server or query a neighboring proxy for the needed object. The idea that a proxy can forward requests to another peer lead to research in the area of cooperative proxies and distributed proxy systems [7]. Cooperative proxies try to combine their individual caches in such a way that maximum cache usage is achieved while acting transparently as one single loadbalanced proxy cache [11]. Previous research on cooperative proxies can be found in the area of hierarchical [7] and hashing approaches [9], adaptive caching [2], CacheMesh [1] and our previously introduced algorithms - SOAP [5] and ADC [3]. CLIENTS PROXIES SERVERS Client Proxy A Proxy B Proxy C Server A Server B Server C Figure 1. Ideal Cooperation 1.1. Hierarchical vs. Hashing Common approaches for cooperative proxy systems encompass mostly solutions based on hierarchical cache structures or classical hashing algorithms [9]. While hierarchically organized proxies forward unresolved requests to sibling and parent caches using ICP, hashing proxies, like CARP [10], map the object-id (URL) of an unresolved request onto the same proxy peer based on a globally known hashing function Adaptive Distributed Caching (ADC) Preliminary work on ADC is covered by our studies in proxy load balancing by a central coordinator [4] and SOAP, which introduced the idea of adaptive forwarding by evaluating the response time for each requested object [5]. We introduced in our latest work an algorithm for adaptive distributed caching (ADC) based on a set of autonomous proxy agents. We have shown that our algorithm is well able to find a balance between optimal cache usage and distribution of hot documents and reaches good values for the object allocation results that are comparable with the near-ideal hashing algorithm.
2 Server PROXIES Client The reminder of this paper is organized in the following way: we will first restate the core components of the ADC algorithm and its limitations, introduce the latest changes and improvements to overcome the problem of memory limitation in the following section, followed by a set of experimentations for evaluating our modifications. The paper will be concluded by a final discussion and future work. 2. ADAPTIVE DISTRIBUTED CACHING THROUGH PROXY AGENTS 2.1. Previous Work In our latest paper, we introduced an adaptive distributed caching algorithm that combines the advantages of hierarchical distributed caching (allowing multiple copies of the same object) and of hashing based distributed caching (fast allocation through global agreement). Our proxy agents maintain multiple copies of the frequently requested objects to balance the user request load between the cooperative proxies when hot documents experience a high request rate and reduce the number of copies in situations where only few requests are experienced. In both cases the algorithm allows the distributed proxy agents to agree on the specific location of one object without the need for a central coordinator or a broadcasting protocol Algorithm Figure 2. Request Forwarding Path The core of the ADC algorithm can be divided into two local techniques that allow global stabilization: Request Forwarding and Selective Caching with its components Mapping Table and Self-Organization by Multi-Casting. The same version of the algorithm is installed on every running proxy Selective Caching & Aging Selective Caching was introduced in our previous work to allow each proxy to autonomously specialize on a specific set of cached data [3]. In hierarchical and hashing systems, every proxy stores all passing objects regardless of its future significance and uses the LRU algorithm as cache replacement strategy. This approach creates a high cache fluctuation rate with minimal reliability in regard to the cached content. Proxy agents based on ADC keep track of the average request frequency of all requested objects based on the last three experienced requests. The learned data in the form of time gap between two requests will be used to decide whether the new data should be cached or discarded. A newly arrived object will only be cached if its average request time is smaller than the worst case currently residing in the cache Mapping Table The mapping table is a local data structure within every proxy for resolving the object location to be used by the forwarding process using the object ID (URL). In a more abstract sense we can see the mapping table as a direct replacement of the static hashing function, used in hashing approaches, to map object IDs onto their unique location. It is the main objective of our algorithm to allow all existing mapping tables to agree on a unique location for each object without a broadcasting protocol or central coordinator. The size of the mapping table is the main focus of this paper. In our previous work we allowed the table to grow infinitely, keeping track of all previously experienced objects, which usually leads to out of memory problems and performance drawbacks. In the following section we will introduce a way to limit the mapping table while still keeping the performance at the previously attained level. 3. MAPPING TABLE FOR LIMITED SYSTEM RESOURCES As previously mentioned, our algorithm for adaptive distributed caching assumes infinite resource capacity for the local mapping table in every proxy. This scenario is highly unrealistic and it was the ultimate goal of this paper to identify an extension to ADC so that it is more suitable for a realistic situation while keeping the performance characteristics achieved previously. Different approaches and modifications have been tried out to overcome the stated obstacle and the introduction of additional single and multiple mapping tables appeared as the most suitable to achieve our goal Problems Encountered At this point let us give an example of the underlying problems that arise when we limit the mapping table to an infinite size. Whenever a previously un-requested object is experienced by one of the proxies, it should have an entry in the mapping table so that future requests for it can use the stored information for the computation of the request frequency. Essentially each mapping table entry should exist long enough to allow the occurrence of another hit.
3 OBJ-ID PROXY LAST AVG HITS Proxy[5] Proxy[4] Proxy[1] Proxy[2] Proxy[1] Proxy[7] Proxy[4] In our previous algorithm, each newly created entry will remain in the mapping table forever, leading to a growing mapping table. Depending on the amount of unique requested objects, the system will eventually run out of memory. In the case of a limited-size mapping table, it will fill up over time and existing entries will sooner or later be replaced by new requests. As described earlier, we use the average time between two requests to decide whether an object should be stored or discarded. Therefore, each newly created entry should stay long enough in the mapping table so that a repeat request can occur to allow the algorithm to compute the average request time New Algorithm Figure 3. A Sample Single Table To deal with the above problem, we found it useful to part the mapping table into a section for objects that are requested more than once and another one for new objects that are only requested once. The underlying idea can be stated as follows Single Table The single table is used to simply keep track of the current flow of requests. Each unknown object will receive a new entry on the top of the table and displacing the oldest entry at the bottom of the table the well-known LRU algorithm. It is a requirement of the single table that it is large enough so that requests with at least two hits can occur. Preliminary studies have shown that the minimum table size is highly dependent on the experienced request pattern and more work is necessary to characterize this relationship. When an existing entry in the mapping table experiences another hit, the time difference between the two requests will be used as a first approximation of the average object request frequency and the object will move from the single table to the multiple table (described below). The LAST column represents the local time value, for the last time when the specific object was requested while the AVG value represents the average time between two requests of the same type (Figure 3). OBJ-ID PROXY LAST AVG HITS Proxy[8] This Proxy[1] This Proxy[4] Proxy[8] Proxy[4] Figure 4. A Sample Multiple Table Multiple Table The multiple table is also restricted in its size and contains only objects that were requested more than once ordered by their average request time. Once the table is filled, newly arriving objects from the single table have to have a lower average value than the worst case currently residing in the table before it will be placed at the appropriate position. Removed objects from the multiple table will be placed into the single table as a regular entry, giving it the chance to be hit again later. The forwarding address for elements with the THIS value marks objects for which this proxy itself is responsible when future requests arrive and unresolved queries need to be forwarded to the origin server. The general structure of the multiple table is the same as that of the single table and it should be pointed out that the table is always ordered in ascending order of the fourth column (average request time). This order allows the simple identification of the object with the worst average time and quick insertions/deletions based using binary search Cached Table The cached table in a proxy within the ADC architecture keeps track of all currently cached objects there. This table is very similar to the previously described multiple table, with the exception that the table entries represent actually stored objects. Similar to the multiple table, this table is also ordered by the average request value in column four and new objects have to outperform at least the worst case in (the last row) the table and will be placed in the appropriate position within it. Elements that drop out of the bottom of this table move back to the multiple table which gives them the chance to be hit again in the near future or to drop out completely over time Noisy Hits Splitting up the mapping table from our previous work into a single and a multiple table has overcome the obstacle of limited resources but has introduced a new problem of Noisy Hits. When we order the mapping table based on the average request time, an object that has been requested only two times but within a very short time frame and never again will be wrongly placed into the mapping table (or even the caching part in the worst case)
4 and uses up resources that could otherwise be assigned to more frequently requested objects. Different approaches have been tried out to filter out the noisy hits. When considering simplicity of the algorithm and computational cost, we decided that each object has to be hit at least twice to enter the multiple table, and at least three times before moving them into the caching table. With this approach, we are losing a small percentage of the overall hit-rate by compromising objects that were requested only once or twice, but it allows the algorithm to focus on the more important, well-established objects. 4. EXPERIMENTATION To validate/verify the new algorithm described above, we ran multiple simulations over a set of artificially created request patterns based on the polygraph test bed [15] and compared the results to those of a common hashing based algorithm ZIPF Test Set In our previous paper [3], we introduced a simple artificially created request pattern based on ZIPF distribution over a set of 10,000 unique objects with 500,000 requests. We simulated a set of 10 proxies with a total cache size of 1,000 objects (each proxy is able to store 100 objects). For the simulation with the ZIPF data, we select 1000 entries as the average multiple table size, a value that was chosen based on preliminary studies, and compare the results of ADC to the two hashing algorithms. Figure 8 shows that for our own ZIPF distribution, the ADC algorithm is well able to compete with both hashing approaches POLYGRAPH Test Set For the second session of experimentations, we tried to create artificial data that represents closer the request patterns experienced on a real system and used the widely used Polygraph tool to build a file with 2.3 million requests. Figure 5 shows the source code of the polygraph language. We used the standard Polymix 4 file without the initial fill-phase. Essentially, the final request file pattern contains two peak request rates over a set of approximately 1.5 million requests with some request gaps in between Hit-Rate We ran the Polymix 4 file against ADC and both hashing algorithms, and describe in this section the observed hit rate. REQUESTS HITS [%] ALGORITHM COMPARISON HASH ALL HASH SELL ADC HIT RATE Figure 5. Algorithm comparison /* PolyMix-4 workload */ TheBench.peak_req_rate = 100/sec; FillRate = TheBench.peak_req_rate; ProxyCacheSize = 1MB; 301 Figure 6. Polygraph Settings HIT - RATE - POLYGRAPH MA-5000 MA AVERAGE Figure 6 shows the hit rates in three sections. The first part covers the hashing algorithm with always caching; the second part the hashing with selective caching and the last part the ADC based approach. All three sections come with three graphs, a moving average over that 5,000 and 50,000 and all requests. It is clear that the updated version of the ADC algorithm (with single, multiple and caching tables) outperforms both hashing algorithms over the set of 2.3 million requests. It is also clear that the new ADC algorithm requires a certain learning phase, which comes with an additional overhead as can be observed in the slowly increasing graph of the total average hit-rate Hops Rate & Execution Time In the second part of this section we take a look at the average hops rate, which represents the effort to search for a specific cached object. One hop is defined by the request Figure 7. Hit Rate Polygraph
5 being forwarded from one proxy to another one towards the target server and on its way back. Our results show that both hashing approaches need on average around 5.5 hops to resolve a requested object. The ADC approach starts off with around 8 hops per request and decreases to an average of around 7 hops, an acceptable overhead in comparison to the ideal function based search procedure of hashing. 5. CONCLUSION In this paper we extended the existing ADC algorithm so that it is capable of performing under resource restrictions like physical RAM. For this purpose we introduced a way to limit the mapping table by splitting it up into a table for single requested objects, multiple requested objects and cached objects. In the experimentation we compared the new algorithm to two typical hashing based algorithms using the artificial data sets of a ZIPF distribution over 10,000 objects and the 2.3 million requests received from the widely used benchmark tool called Polygraph. The results show that our modifications to ADC have no major performance drawbacks with respect to changes in the single table size and the new ADC is well able to outperform both hashing approaches in to the case of the polygraph benchmark data set. Additionally, the new ADC achieves competitive results under the categories of HOPS and execution time. We will continue to focus on the distribution of the simulation over a set of multiple machines with a focus on changes in the infrastructure and overall execution time in relationship to the single and multiple table size. We will also look into the problem of noisy hits, the relationship between incoming request distribution and single table size, ways to shorten the learning period. 6. ACKNOWLEDGEMENT Research and Development, First Asia-Pacific Conference, WI 2001, p [5] M.J. Kaiser, K.C. Tsui, J. Liu, Self-organized Autonomous Web Proxies, Conference on Autonomous Agents & Multi-agent Systems, IEEE [6] J. Wang, A survey of Web Caching Schemes for the Internet, ACM Computer Communication Review, 29(5):36--46, October [7] P. Rodriguez, C. Spanner, E.W. Biersack, Web Caching Architectures: Hierarchical and Distributed Caching. 4th International Caching Workshop, [8] A. Wolman, G.M. Voelker, N. Sharma, N. Cardwell, A. Karlin, H.M. Levy, On the Scale and Performance of Cooperative Web Proxy Caching, SOSP-17, 12/1999. [9] K.W. Ross, Hash-Routing for Collections of Shared Web Caches, IEEE Network Magazine, 11, 7:37--44, Nov-Dec [10] J. Cohen, N. Phadnis, V. Valloppillil, K.W. Ross, Cache array routing protocol v.1.1, Sept. 1997, Internet Draft. [11] K.-L. Wu, Philip S. Yu, Load Balancing and Hot Spot Relief for Hash Routing among a Collection of Proxy Caches, Proceedings of the 19th IEEE International Conference on Distributed Computing Systems [12] C.-Y. Chiang, Y. Li, M.T. Liu, M.E. Muller, On Request Forwarding for Dynamic Web Caching Hierarchies, In Proceedings of the 20th International Conference on Distributed Computing Systems (ICDCS'00), Taipei, Taiwan, April 2000 [13] J. Dilley, M. Arlitt, Improving Proxy Cache Performance: Analysis of three Replacement Policies, IEEE Internet Computing, Nov.-Dec [14] L. Breslau, P. Cao, L. Fan, Graham Phillips, Scott Shenker, Web Caching and Zipf-like Distributions: Evidence and Implications, Technical Report 1371, Computer Sciences Dept, Univ. of Wisconsin-Madison, April [15] This work is supported by Baptist University research grant FRG/01-02/I REFERENCES [1] Z. Wang, Cachemesh: A Distributed Cache System for World Wide Web, Web Cache Workshop, [2] S. Michel, K. Nguyen, A. Rosenstein, L. Zhang, Adaptive Web Caching: Towards a New Caching Architecture, 3rd International WWW Caching Workshop, June [3] M.J. Kaiser, K.C. Tsui, J. Liu, Adaptive Distributed Caching, Congress on Evolutionary Computation, IEEE [4] K.C. Tsui, J. Liu, H.L. Liu, Autonomy Oriented Load Balancing in Proxy Cache Servers, Web Intelligence:
Distributed Proxy Server Management: A Self-Organized Approach
Distributed Proxy Server Management: A Self-Organized Approach K.C. Tsui ([email protected]) Department of Computer Science, Hong Kong Baptist University, Kowloon Tong, Kowloon, Hong Kong M.J. Kaiser
Self-Organized Load Balancing in Proxy Servers: Algorithms and Performance
Self-Organized Load Balancing in Proxy Servers: Algorithms and Performance Kwok Ching Tsui ([email protected]) Department of Computer Science, Hong Kong Baptist University Jiming Liu ([email protected])
Evaluating Cooperative Web Caching Protocols for Emerging Network Technologies 1
Evaluating Cooperative Web Caching Protocols for Emerging Network Technologies 1 Christoph Lindemann and Oliver P. Waldhorst University of Dortmund Department of Computer Science August-Schmidt-Str. 12
Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching
2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network
Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network Jian Ni, Danny H. K. Tsang, Ivan S. H. Yeung, Xiaojun Hei Department of Electrical & Electronic Engineering Hong Kong University
Locality Based Protocol for MultiWriter Replication systems
Locality Based Protocol for MultiWriter Replication systems Lei Gao Department of Computer Science The University of Texas at Austin [email protected] One of the challenging problems in building replication
A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems*
A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems* Junho Jang, Saeyoung Han, Sungyong Park, and Jihoon Yang Department of Computer Science and Interdisciplinary Program
Concept of Cache in web proxies
Concept of Cache in web proxies Chan Kit Wai and Somasundaram Meiyappan 1. Introduction Caching is an effective performance enhancing technique that has been used in computer systems for decades. However,
Path Selection Methods for Localized Quality of Service Routing
Path Selection Methods for Localized Quality of Service Routing Xin Yuan and Arif Saifee Department of Computer Science, Florida State University, Tallahassee, FL Abstract Localized Quality of Service
OpenFlow Based Load Balancing
OpenFlow Based Load Balancing Hardeep Uppal and Dane Brandon University of Washington CSE561: Networking Project Report Abstract: In today s high-traffic internet, it is often desirable to have multiple
WAVE: Popularity-based and Collaborative In-network Caching for Content-Oriented Networks
WAVE: Popularity-based and Collaborative In-network Caching for Content-Oriented Networks K. D. Cho et al., IEEE INFOCOM 2012 Workshop, pp. 316-321, March 2012. January 17, 2013 Byeong-Gi Kim Park Laboratory,
1. Comments on reviews a. Need to avoid just summarizing web page asks you for:
1. Comments on reviews a. Need to avoid just summarizing web page asks you for: i. A one or two sentence summary of the paper ii. A description of the problem they were trying to solve iii. A summary of
A STUDY OF WORKLOAD CHARACTERIZATION IN WEB BENCHMARKING TOOLS FOR WEB SERVER CLUSTERS
382 A STUDY OF WORKLOAD CHARACTERIZATION IN WEB BENCHMARKING TOOLS FOR WEB SERVER CLUSTERS Syed Mutahar Aaqib 1, Lalitsen Sharma 2 1 Research Scholar, 2 Associate Professor University of Jammu, India Abstract:
Efficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:
Dynamic Load Balancing for Cluster-based Publish/Subscribe System
Dynamic Load Balancing for Cluster-based Publish/Subscribe System Hojjat Jafarpour, Sharad Mehrotra and Nalini Venkatasubramanian Department of Computer Science University of California, Irvine {hjafarpo,
Bloom Filter based Inter-domain Name Resolution: A Feasibility Study
Bloom Filter based Inter-domain Name Resolution: A Feasibility Study Konstantinos V. Katsaros, Wei Koong Chai and George Pavlou University College London, UK Outline Inter-domain name resolution in ICN
Measuring the Performance of Prefetching Proxy Caches
Measuring the Performance of Prefetching Proxy Caches Brian D. Davison [email protected] Department of Computer Science Rutgers, The State University of New Jersey The Problem Traffic Growth User
A Time Efficient Algorithm for Web Log Analysis
A Time Efficient Algorithm for Web Log Analysis Santosh Shakya Anju Singh Divakar Singh Student [M.Tech.6 th sem (CSE)] Asst.Proff, Dept. of CSE BU HOD (CSE), BUIT, BUIT,BU Bhopal Barkatullah University,
MAGENTO HOSTING Progressive Server Performance Improvements
MAGENTO HOSTING Progressive Server Performance Improvements Simple Helix, LLC 4092 Memorial Parkway Ste 202 Huntsville, AL 35802 [email protected] 1.866.963.0424 www.simplehelix.com 2 Table of Contents
Cloud Computing for Agent-based Traffic Management Systems
Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion
Fault-Tolerant Framework for Load Balancing System
Fault-Tolerant Framework for Load Balancing System Y. K. LIU, L.M. CHENG, L.L.CHENG Department of Electronic Engineering City University of Hong Kong Tat Chee Avenue, Kowloon, Hong Kong SAR HONG KONG Abstract:
How To Understand The Power Of Icdn
MobiArch 2014 R-iCDN: an Approach Supporting Flexible Content Routing for ISP-operated CDN Song Ci High Performance Network Lab, Institute of Acoustics, Chinese Academy of Sciences Outline I. Background
Chapter 2 Addendum (More on Virtualization)
Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)
Preserving Message Integrity in Dynamic Process Migration
Preserving Message Integrity in Dynamic Process Migration E. Heymann, F. Tinetti, E. Luque Universidad Autónoma de Barcelona Departamento de Informática 8193 - Bellaterra, Barcelona, Spain e-mail: [email protected]
Graph Database Proof of Concept Report
Objectivity, Inc. Graph Database Proof of Concept Report Managing The Internet of Things Table of Contents Executive Summary 3 Background 3 Proof of Concept 4 Dataset 4 Process 4 Query Catalog 4 Environment
A Cloud Data Center Optimization Approach Using Dynamic Data Interchanges
A Cloud Data Center Optimization Approach Using Dynamic Data Interchanges Efstratios Rappos Institute for Information and Communication Technologies, Haute Ecole d Ingénierie et de Geston du Canton de
Resource Allocation Schemes for Gang Scheduling
Resource Allocation Schemes for Gang Scheduling B. B. Zhou School of Computing and Mathematics Deakin University Geelong, VIC 327, Australia D. Walsh R. P. Brent Department of Computer Science Australian
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at
Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at distributing load b. QUESTION: What is the context? i. How
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
A Hybrid Load Balancing Policy underlying Cloud Computing Environment
A Hybrid Load Balancing Policy underlying Cloud Computing Environment S.C. WANG, S.C. TSENG, S.S. WANG*, K.Q. YAN* Chaoyang University of Technology 168, Jifeng E. Rd., Wufeng District, Taichung 41349
Real-Time Analysis of CDN in an Academic Institute: A Simulation Study
Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management
Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network
White paper Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network July 2001 Executive Summary Rich media content like audio and video streaming over the Internet is becoming
Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Load Measurement
A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique
A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique Jyoti Malhotra 1,Priya Ghyare 2 Associate Professor, Dept. of Information Technology, MIT College of
A Novel Caching Scheme for Internet based Mobile Ad Hoc Networks
A Novel Caching Scheme for Internet based Mobile Ad Hoc Networks Sunho Lim, Wang-Chien Lee, Guohong Cao, and Chita R. Das Department of Computer Science & Engineering The Pennsylvania State University
Multicast-based Distributed LVS (MD-LVS) for improving. scalability and availability
Multicast-based Distributed LVS (MD-LVS) for improving scalability and availability Haesun Shin, Sook-Heon Lee, and Myong-Soon Park Internet Computing Lab. Department of Computer Science and Engineering,
Tableau Server Scalability Explained
Tableau Server Scalability Explained Author: Neelesh Kamkolkar Tableau Software July 2013 p2 Executive Summary In March 2013, we ran scalability tests to understand the scalability of Tableau 8.0. We wanted
Support of Multimedia SIP Applications over Proactive MANETs Extension of OLSR for Service Discovery
Support of Multimedia SIP Applications over Proactive MANETs Extension of OLSR for Service Discovery Li Li and Louise Lamont CRC Canada Outline Overview of MANET Service Discovery Schemes OLSR Extension
DUP: Dynamic-tree Based Update Propagation in Peer-to-Peer Networks
: Dynamic-tree Based Update Propagation in Peer-to-Peer Networks Liangzhong Yin and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University University Park, PA 16802
Globule: a Platform for Self-Replicating Web Documents
Globule: a Platform for Self-Replicating Web Documents Guillaume Pierre Maarten van Steen Vrije Universiteit, Amsterdam Internal report IR-483 January 2001 Abstract Replicating Web documents at a worldwide
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
Information Searching Methods In P2P file-sharing systems
Information Searching Methods In P2P file-sharing systems Nuno Alberto Ferreira Lopes PhD student (nuno.lopes () di.uminho.pt) Grupo de Sistemas Distribuídos Departamento de Informática Universidade do
Performance Modeling and Analysis of a Database Server with Write-Heavy Workload
Performance Modeling and Analysis of a Database Server with Write-Heavy Workload Manfred Dellkrantz, Maria Kihl 2, and Anders Robertsson Department of Automatic Control, Lund University 2 Department of
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network Parama Bhaumik 1, Somprokash Bandyopadhyay 2 1 Dept. of Information Technology, Jadavpur
Test Run Analysis Interpretation (AI) Made Easy with OpenLoad
Test Run Analysis Interpretation (AI) Made Easy with OpenLoad OpenDemand Systems, Inc. Abstract / Executive Summary As Web applications and services become more complex, it becomes increasingly difficult
Virtualization Technologies (ENCS 691K Chapter 3)
Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing
A Case for Dynamic Selection of Replication and Caching Strategies
A Case for Dynamic Selection of Replication and Caching Strategies Swaminathan Sivasubramanian Guillaume Pierre Maarten van Steen Dept. of Mathematics and Computer Science Vrije Universiteit, Amsterdam,
Superior Disaster Recovery with Radware s Global Server Load Balancing (GSLB) Solution
Superior Disaster Recovery with Radware s Global Server Load Balancing (GSLB) Solution White Paper January 2012 Radware GSLB Solution White Paper Page 1 Table of Contents 1. EXECUTIVE SUMMARY... 3 2. GLOBAL
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
A Reputation Management System in Structured Peer-to-Peer Networks
A Reputation Management System in Structured Peer-to-Peer Networks So Young Lee, O-Hoon Kwon, Jong Kim and Sung Je Hong Dept. of Computer Science & Engineering, Pohang University of Science and Technology
A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment
A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment Weisong Chen, Cho-Li Wang, and Francis C.M. Lau Department of Computer Science, The University of Hong Kong {wschen,
American Journal of Engineering Research (AJER) 2013 American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-2, Issue-4, pp-39-43 www.ajer.us Research Paper Open Access
Internet Content Distribution
Internet Content Distribution Chapter 4: Content Distribution Networks (TUD Student Use Only) Chapter Outline Basics of content distribution networks (CDN) Why CDN? How do they work? Client redirection
Tushar Joshi Turtle Networks Ltd
MySQL Database for High Availability Web Applications Tushar Joshi Turtle Networks Ltd www.turtle.net Overview What is High Availability? Web/Network Architecture Applications MySQL Replication MySQL Clustering
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
Performance Workload Design
Performance Workload Design The goal of this paper is to show the basic principles involved in designing a workload for performance and scalability testing. We will understand how to achieve these principles
A Virtual Machine Searching Method in Networks using a Vector Space Model and Routing Table Tree Architecture
A Virtual Machine Searching Method in Networks using a Vector Space Model and Routing Table Tree Architecture Hyeon seok O, Namgi Kim1, Byoung-Dai Lee dept. of Computer Science. Kyonggi University, Suwon,
IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION N.Vijaya Sunder Sagar 1, M.Dileep Kumar 2, M.Nagesh 3, Lunavath Gandhi
An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents
An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents M. Anber and O. Badawy Department of Computer Engineering, Arab Academy for Science and Technology
Design and Implementation of Smart Camera Network for Efficient Wide Area Surveillance
Vol.5, Issue (04), pp.-8 http://dx.doi.org/0.457/ijeic.04.5..0 Design and Implementation of Smart Camera Network for Efficient Wide Area Surveillance Soomi Yang Department of Information Security, The
Copyright www.agileload.com 1
Copyright www.agileload.com 1 INTRODUCTION Performance testing is a complex activity where dozens of factors contribute to its success and effective usage of all those factors is necessary to get the accurate
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Measuring Cache and Memory Latency and CPU to Memory Bandwidth
White Paper Joshua Ruggiero Computer Systems Engineer Intel Corporation Measuring Cache and Memory Latency and CPU to Memory Bandwidth For use with Intel Architecture December 2008 1 321074 Executive Summary
Load Balancing in Distributed Data Base and Distributed Computing System
Load Balancing in Distributed Data Base and Distributed Computing System Lovely Arya Research Scholar Dravidian University KUPPAM, ANDHRA PRADESH Abstract With a distributed system, data can be located
Storage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann
Storage Systems Autumn 2009 Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Scaling RAID architectures Using traditional RAID architecture does not scale Adding news disk implies
A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM
A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM Dr.S. DHANALAKSHMI 1, R. ANUPRIYA 2 1 Prof & Head, 2 Research Scholar Computer Science and Applications, Vivekanandha College of Arts and Sciences
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
Scalable Source Routing
Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable
Intrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
4D WebSTAR 5.1: Performance Advantages
4D WebSTAR 5.1: Performance Advantages CJ Holmes, Director of Engineering, 4D WebSTAR OVERVIEW This white paper will discuss a variety of performance benefits of 4D WebSTAR 5.1 when compared to other Web
LOAD BALANCING AS A STRATEGY LEARNING TASK
LOAD BALANCING AS A STRATEGY LEARNING TASK 1 K.KUNGUMARAJ, 2 T.RAVICHANDRAN 1 Research Scholar, Karpagam University, Coimbatore 21. 2 Principal, Hindusthan Institute of Technology, Coimbatore 32. ABSTRACT
A Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
Original-page small file oriented EXT3 file storage system
Original-page small file oriented EXT3 file storage system Zhang Weizhe, Hui He, Zhang Qizhen School of Computer Science and Technology, Harbin Institute of Technology, Harbin E-mail: [email protected]
HyLARD: A Hybrid Locality-Aware Request Distribution Policy in Cluster-based Web Servers
TANET2007 臺 灣 網 際 網 路 研 討 會 論 文 集 二 HyLARD: A Hybrid Locality-Aware Request Distribution Policy in Cluster-based Web Servers Shang-Yi Zhuang, Mei-Ling Chiang Department of Information Management National
2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment
R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI
Tableau Server 7.0 scalability
Tableau Server 7.0 scalability February 2012 p2 Executive summary In January 2012, we performed scalability tests on Tableau Server to help our customers plan for large deployments. We tested three different
Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets
Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: [email protected] # K.Meena 2, Assistant Professor
DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION
DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION A DIABLO WHITE PAPER AUGUST 2014 Ricky Trigalo Director of Business Development Virtualization, Diablo Technologies
15-418 Final Project Report. Trading Platform Server
15-418 Final Project Report Yinghao Wang [email protected] May 8, 214 Trading Platform Server Executive Summary The final project will implement a trading platform server that provides back-end support
Basics Of Replication: SQL Server 2000
Basics Of Replication: SQL Server 2000 Table of Contents: Replication: SQL Server 2000 - Part 1 Replication Benefits SQL Server Platform for Replication Entities for the SQL Server Replication Model Entities
