An Efficient Load Balancing Technology in CDN
|
|
|
- Berenice Cameron
- 10 years ago
- Views:
Transcription
1 Issue 2, Volume 1, An Efficient Load Balancing Technology in CDN YUN BAI 1, BO JIA 2, JIXIANG ZHANG 3, QIANGGUO PU 1, NIKOS MASTORAKIS 4 1 College of Information and Electronic Engineering, University of Science and Technology of Suzhou, Jiangsu , CHINA 2 College of Information and Electronic Engineering, Zhejiang Gongshang University, Zhejiang , CHINA 3 Institute of Graphics and Image, Hangzhou Electronic University, Zhejiang , CHINA 4 Hellenic Naval Academy, TermaHatzikyriakou, Piraeus, GREECE Also: WSEAS, Ag. I. Theologou17-23, 15773, Zografou, Athens, GREECE Abstract: - The existing load balancing technology in CDN only emphasizes even load distribution among servers, and it doesn t make full use of network topology information and file access history, so user request can t get timely response. To solve the above problem, this paper puts forward a load balancing algorithm based on the Distributed binning strategy. This algorithm can make full use of network topology information and file access history as well as server load information, analyzing the popularity of files with the access history of the clusters of clients from the servers, efficiently finishing distribution and routing of the high popularity files among servers so that users can closely obtain the required contents, ease Internet congestion and enhance response speed of user accessing websites. Key-Words: - CDN, distributed binning strategy; history record, load balancing, network topology 1 Introduction At present, the technology of the content distribution network(cdn) has been extensively applied in Internet. Using CDN technology can make a user rapidly gain requested content. It efficiently eases network congestion and increases response speed of the user access to network [1-3]. The load balancing technology is one of the four elements in CDN [4]. It can ensure that the user request points to the nearest edge server with minimum load in the network, so that network content is efficiently distributed. The conventional load balancing technology in CDN mainly emphasizes a server load evenness index, and ignores the efficient application of network topology structure and file access history, which leads to long response time to a user request, even causes request failure[5]. As for each user request, CDN requests the center server to timely construct the network topology map of this request so as to measure the network distance, so the center server becomes the bottleneck of the whole network. If many user requests occur at the same time, the performance of the center server will fall rapidly, and ultimately affect running of the whole network. To efficiently realize load balancing, a certain strategy must be adopted to timely gain network topology information. People with K. W. Ross as the representative propose adopting IP address of network node to generate topology information [6]. Since there are many false IP addresses in the network, authenticity of topology information is not good. People with B. Krishnamurthy as the representative propose extracting topology information from BGP table of Internet core router [7]. Since some network structures are not managed by BGP, there is no BGP table in the core router, so it can t gain all topology information. People with Ratnasamy as the representative proposes adopting Distributed binning strategy to get topology information, and use ICMP ping method to measure RTT values from each node to some datum landmark node, and group gained RTT into vector in order, and then use this vector to represent topology information of network node[8]. After researching, people with J. Chu as the representative find out that 10% file account for 60% flow of the whole network, which shows that there is a big difference in file access frequency(that is, hotness )[9]. Based on disadvantage and limitation of current method, we put forward a load balancing algorithm in CDN based on the Distributed binning strategy. This algorithm can make full use of network topology information and file access history as well as server load information, analyzing hotness of a file and efficiently finishing the content distribution and routing of a hot file.
2 Issue 2, Volume 1, Load balancing technology 2.1 Distributed binning strategy To efficiently realize load balancing in CDN, first of all, there are two problems to be solved. One is that how to gain and maintain dynamic network topology information; and the other one is that how to find the edge server close to user group. Adopting the Distributed binning strategy is the best method of rapidly gaining edge server and topology information of client terminal. Requiring less about network infrastructure, this strategy is practical and extendable. The network topology information provided by applying this strategy can efficiently solve the problem of load balancing in CDN. Distributed binning strategy: 1. Assume that Internet is equipped with some nodes called landmark, and other network node can gain IP addresses of these landmark nodes by checking DNS. 2. By using ICMP ping, each node measures the RTT from itself to each landmark so as to get a node table concerning Distributed binning of relative distances from network nodes to these landmarks, and arrange RTT according to sort ascending. 3. As for time delay to different landmark, each node has a corresponding time delay in sort ascending. This sort represents the bin that this node belongs to, so that adjacent nodes have similar sort information, that is, adjacent nodes in network topology belong to the same bin. 4. After gaining bin of the node, make quantified handling with time delay of landmark. Divide time delay into 3 levels: level 0, time delay is 0~100ms; level 1, time delay is 101~200ms; level 2, time delay is more than 200ms. After quantified handling, it is known that the relative distance from network node to each landmark has a corresponding level. For instance, in Figure 1, three landmark nodes are used, the distance from node A to landmark L1, L2, L3 is 230ms, 55ms, and 115ms respectively. Therefore, the sort of relative distance from node A to each landmark node is L2L3L1, level vector of node A is 0 1 2, and bin of node A is L2L3L1:012. In this strategy, one network node only needs to measure the distance between itself and the landmark, and there is no need to know the distance between landmarks, and there is also no need to gain from the landmark node the distance of other node to the landmark. The landmark node doesn t need to make cross measurement, nor collect and expand the information measured. Distributed binning is very healthy to the fault with one or more landmark nodes. L1,L2,L3: L1 203 network node 2.2 Network model for load balancing Based on the above-mentioned Distributed binning strategy, assume that each edge server and each client terminal in CDN have their corresponding labels: IP address. With such topology information, we can easily realize load balancing in CDN about client clusters, edge server choices and overall dynamic. To describe the load balancing in CDN, firstly, we need to construct a network model. Assume that there are N network servers in the network, and that the capacity of these servers is C 1, C 2,, C n respectively, the responsible zone is Z 1, Z 2,, Z n respectively, and network load is W 1, W 2,, W n respectively. There are M files distributed in the network. Access cost of these files is O 1, O 2,, O m respectively, and the corresponding access frequency is f 1, f 2,, f m. In ideal load balancing, the network load distributed to each server should be in direct ratio to service capacity of server itself. Therefore, a server G should meet the equation (1). W N j= 1 G W Definition 1: W j 98 L3 L1,L2,L3:012 L1,L2,L3:012 α = K f xox, where, K x= α 1 L1,L2,L3:122 (1) W means total load of server K in CDN, f means access x frequency of file x stored in the server, O means x access cost of file x stored in the server, the file stored in the server includesα 1, α,, 2 α. e In practice, such perfect network model for load balancing is impossible. The goal of our load balancing is to provide optimal load balancing technology for CDN in small area. The following algorithm for content distribution and content L landmark node Fig. 1 Distributed Binning illustration = N C j= 1 G C j
3 Issue 2, Volume 1, routing based on the Distributed Binning strategy can realize this goal. 2.3 Algorithm for content distribution The algorithm for content distribution needs synthetically to take hotness degree of a file, effect of file size on server load, network distance between edge server and requesting client, etc. into comprehensive account. We establish a file access history table in CDN server, using C i (T) to stand for it, where subscript i means index number of a file. C i (T) means the access times of user group from the same sort vector T in the past time counted. The structure of the information table is shown in Figure 2. This table records the access of each file in the server in the past period of time. From this, we can analyze hotness degree of each file, and find out that which user group has highest demand for this file. The algorithm is summarized as follows: 1. For hotness of a file, set appropriate threshold valueα. 2. When the times of accessing a file by user group with same sort vector exceed α, start duplicating a file, select an edge server from edge servers with this sort vector to store duplicate of a file. The selected server shall be adjacent to user group with high demand for this file in topology. 3. When next time a member of this user group requests this file, the requested file content (duplicate) can be obtained from the near edge server by the following routing algorithm. As shown in Figure 2, the file with index number 12 has 30 accesses from the user group with sort vector 121. In this way, handling with access user is made. Next, select one of edge server that has the same sort vector with this user group, and store duplicate of file in it. After, when the user with same sort vector requests this file, the center server will directly point the request to the edge server having the duplicate of this file. 4. For the convenience of selecting appropriate edge server to store the duplicate of a hot file, firstly, the server having this hot file contacts the edge server to store the duplicate by sending message. After receiving the message, the edge server responds with its own load W, making use of file access history, and calculate W by the formula in Definition 1. According to the response information, select the edge server with minimum working load to save the duplicate of this file. Finally, establish the direct link to the duplicate of this file in the center server. 5. When the center server finds that user T of the edge server R requests this file, it will timely forward the request to R. File index No Sort information: access times Fig. 2 Sample history information table on server A IP This algorithm efficiently makes use of network topology information and file access history obtained by the Distributed binning strategy, makes a reasonable analysis on hotness of a file according to file access frequency, and quickly selects the edge server adjacent to the requesting client cluster according to network topology information, and in the meantime, selects the edge server to store duplicate of the file, make use of the previously mentioned network model for load balancing and sufficiently measures the load condition of candidate servers. 2.4 Algorithm for content routing The algorithm for content routing is to select optimal edge server by the network topology information obtained based on the Distributed binning strategy. In the meantime, it takes working load of each server into comprehensive account. It needs to periodically update the network topology information. This algorithm is summarized as follows: 1. For server group F(f 1,f 2,,f k ) with calculated level vector and a client terminal C. Assume that the level vector corresponding to the server group F is (v 1,v 2,,v k ), and the level vector of the client terminal making request is v c. 2. Select a server f x whose level vector v x is same or similar as v c from level vector of server group F. 3. If there are many such servers, calculate load sever W according to the Definition 1, and select a server with minimum load to return to client C, so as to meet equation (1) as far as possible. If there isn t, return to the address of original content server.
4 Issue 2, Volume 1, Test result and analysis Using C language and NS-2 network simulation software, we make a simulation test on the above algorithm for content routing. In the case of 20 servers, we compare two algorithms. User s network access time Tt is divided into 3 parts, that is, Tt=TcTpTr, where, Tt is the time from user requesting to receiving response, Tc is the time from user requesting to server receiving the request, Tp is the handling time of the center server from receiving request to response leaving the center server, Tr is the time from response leaving the center server to user receiving response. For Simple algorithm and the algorithm based on Distributed Binning, under same network environment condition, Tc is equal to Tr. The main difference in user s network access time lies in handling time Tp of the center server with user request. Assuming Tc and Tr are constants, we use 4 landmark nodes in the simulation. Computing time (second) Simple algorithm Distributed Binning algorithm Request amount (unit) Fig. 3 comparing with Simple algorithm about 20 servers When the number of server is 20, 50 respectively, we make simulation test on the performances of sample algorithmand the algorithm introduced in this paper. The test results are shown in Figure 3 and Figure 4. From Figure 3 and Figure 4, we know that comparing with Simple algorithm, the algorithm for content routing based on Distributed Binning remarkably reduces the handling time of the center server with the user request. With increase of number of server, the advantage of this algorithm is more superior. In Simple algorithm, for the divided server group and the host computer at client terminal that makes requests, the distance between the host computer at client terminal and each server in the network tree needs to be measured, and then select the edge server with minimum distance to return to requesting user. In the algorithm for content routing introduced in this paper, it doesn t need to measure network distance from client terminal to each edge server to select an optimal server. Only comparing the level vector provided by itself with the level vector that each server belongs to, can get the nearest server to the requesting user, and while considering the nearest network distance, it fully considers the load condition of the selected server, thus reduces the handling time of the center server, optimizes the network performance of CDN and improve application rate of Internet bandwidth. Computing time (second) Simple algorithm Distributed Binning algorithm Request amount (unit) Fig. 4 comparing with Simple algorithm about 50 servers 4 Conclusions This paper introduces a load balancing technology in CDN based on the Distributed Binning strategy, gives out a network model to measure load condition of a server, and proposes new algorithms for content distribution and content routing. This load balancing technology can efficiently finish content distribution and routing in CDN so that a user network request can get optimal response service, especially when there are more edge servers. It can greatly reduce time delay of network access, thus efficiently ease Internet congestion. This technology is helpful in researching more efficient models for measuring server load, so it has better application foreground. References: [1] Stardust. Com Inc., The Ins and Outs of Content Delivery Networks, White Papers, December 20,2000, cdn-streaming/cdn.pdf. [2] Stardust. Com Inc., Content Networking and Edge Services : Leveraging the Internet for Profit, Stardust, Sept 19, pdfs/cdn.whitepaper.pdf. [3] Matthew L., Content Delivery Network (CDN) 2A Reference Guide, detail, April 10, 2001, html.
5 Issue 2, Volume 1, [4] OLNN.CN.CDN, The Content distributed network technology, server, May 28, 2007, [5] W. D. Zhao, Content routing algorithms achieving network proximity in content delivery networks, Journal of Zhejiang University, Vol. 38, No. 4, p , April [6] B. Krishnamurthy, J. Wang, Y. Xie, Early Measurements of a Cluster-based Architecture for P2P System, ACM SIGCOMM, Nov [7] B. Krishnamurthy, J. Wang, On Network Aware Clustering of Web Clients, in ACM SIGCOMM, [8] S. Ratnasamy, M. Handley, R. M. Karp and S. Shenker, Topologically-Aware Overlay Construction and Server Selection, INFOCOM, [9] J. Chu, K. Labonte, B. N. Levine, Availability and Locality Measurements of Peer-to-Peer File Systems, in Proceedings of IT Com, Scalability and Traffic Control in IP Networks II Conferences, July 2002.
A Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
Traceroute-Based Topology Inference without Network Coordinate Estimation
Traceroute-Based Topology Inference without Network Coordinate Estimation Xing Jin, Wanqing Tu Department of Computer Science and Engineering The Hong Kong University of Science and Technology Clear Water
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
Content Delivery Networks. Shaxun Chen April 21, 2009
Content Delivery Networks Shaxun Chen April 21, 2009 Outline Introduction to CDN An Industry Example: Akamai A Research Example: CDN over Mobile Networks Conclusion Outline Introduction to CDN An Industry
Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network
Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network Jian Ni, Danny H. K. Tsang, Ivan S. H. Yeung, Xiaojun Hei Department of Electrical & Electronic Engineering Hong Kong University
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Argonne National Laboratory, Argonne, IL USA 60439
LEGS: A WSRF Service to Estimate Latency between Arbitrary Hosts on the Internet R Vijayprasanth 1, R Kavithaa 2,3, and Rajkumar Kettimuthu 2,3 1 Department of Information Technology Coimbatore Institute
A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer
A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer Technology in Streaming Media College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China [email protected]
Quality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
Internet Content Distribution
Internet Content Distribution Chapter 4: Content Distribution Networks (TUD Student Use Only) Chapter Outline Basics of content distribution networks (CDN) Why CDN? How do they work? Client redirection
Influence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks
Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks 1 Wang Zhanjie, 2 Zhang Yunyang 1, First Author Department of Computer Science,Dalian University of
An Optimization Model of Load Balancing in P2P SIP Architecture
An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, [email protected]
A Dynamic Load Balancing Algorithm For Web Applications
Computing For Nation Development, February 25 26, 2010 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi A Dynamic Load Balancing Algorithm For Web Applications 1 Sameena
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
Effective Load Balancing in P2P Systems
Effective Load Balancing in P2P Systems Zhiyong Xu Suffolk University [email protected] Laxmi Bhuyan University of California, Riverside [email protected] Abstract In DHT based P2P systems, various issues
A Method for Load Balancing based on Software- Defined Network
, pp.43-48 http://dx.doi.org/10.14257/astl.2014.45.09 A Method for Load Balancing based on Software- Defined Network Yuanhao Zhou 1, Li Ruan 1, Limin Xiao 1, Rui Liu 1 1. State Key Laboratory of Software
PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS
PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS Hongye Fu, Naoki Wakamiya, Masayuki Murata Graduate School of Information Science and Technology Osaka University
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
Analysis of QoS Routing Approach and the starvation`s evaluation in LAN
www.ijcsi.org 360 Analysis of QoS Routing Approach and the starvation`s evaluation in LAN 1 st Ariana Bejleri Polytechnic University of Tirana, Faculty of Information Technology, Computer Engineering Department,
Using UDP Packets to Detect P2P File Sharing
188 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 27 Using UDP Packets to Detect P2P File Sharing Tsang-Long Pao and Jian-Bo Chen Tatung University, Taipei,
A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming
A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming Chin Yong Goh 1,Hui Shyong Yeo 1, Hyotaek Lim 1 1 Dongseo University Busan, 617-716, South Korea [email protected], [email protected],
A Proxy-based Architecture for Multimedia Transmission
Proceedings of the 8th WSEAS International Conference on Automation and Information, Vancouver, Canada, June 19-21, 2007 322 A Proxy-based Architecture for Multimedia Transmission WANG DA-ZHEN [1,2], WAN
1.1. Abstract. 1.2. VPN Overview
1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
Fault-Tolerant Framework for Load Balancing System
Fault-Tolerant Framework for Load Balancing System Y. K. LIU, L.M. CHENG, L.L.CHENG Department of Electronic Engineering City University of Hong Kong Tat Chee Avenue, Kowloon, Hong Kong SAR HONG KONG Abstract:
A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration
Int. J. of Computers, Communications & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. V (2010), No. 5, pp. 862-870 A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network
Fuzzy Active Management for Assured Forwarding Traffic in Differentiated Services Network E.S. Ng, K.K. Phang, T.C. Ling, L.Y. Por Department of Computer Systems & Technology Faculty of Computer Science
2004 Networks UK Publishers. Reprinted with permission.
Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET
Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. IV (Jan. 2014), PP 47-52 Opnet Based simulation for route redistribution
Internet Anonymity and the Design Process - A Practical Approach
anon.next: A Framework for Privacy in the Next Generation Internet Matthew Wright Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA, [email protected],
Measuring CDN Performance. Hooman Beheshti, VP Technology
Measuring CDN Performance Hooman Beheshti, VP Technology Why this matters Performance is one of the main reasons we use a CDN Seems easy to measure, but isn t Performance is an easy way to comparison shop
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
The QoS of the Edge Router based on DiffServ
The QoS of the Edge Router based on DiffServ Zhang Nan 1, Mao Pengxuan 1, Xiao Yang 1, Kiseon Kim 2 1 Institute of Information and Science, Beijing Jiaotong University, Beijing 100044, China 2 Dept. of
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
A Survey on Load Balancing Techniques Using ACO Algorithm
A Survey on Load Balancing Techniques Using ACO Algorithm Preeti Kushwah Department of Computer Science & Engineering, Acropolis Institute of Technology and Research Indore bypass road Mangliya square
Research on P2P-SIP based VoIP system enhanced by UPnP technology
December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system
Study on Redundant Strategies in Peer to Peer Cloud Storage Systems
Applied Mathematics & Information Sciences An International Journal 2011 NSP 5 (2) (2011), 235S-242S Study on Redundant Strategies in Peer to Peer Cloud Storage Systems Wu Ji-yi 1, Zhang Jian-lin 1, Wang
Network Positioning System
Network Positioning System How service provider infrastructure can support rapid growth of video, cloud and application traffic Stefano Previdi [email protected] Distinguished Engineer Cisco Systems 1
International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
Towards Modelling The Internet Topology The Interactive Growth Model
Towards Modelling The Internet Topology The Interactive Growth Model Shi Zhou (member of IEEE & IEE) Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS
Optimizing a ëcontent-aware" Load Balancing Strategy for Shared Web Hosting Service Ludmila Cherkasova Hewlett-Packard Laboratories 1501 Page Mill Road, Palo Alto, CA 94303 [email protected] Shankar
New Structured P2P Network with Dynamic Load Balancing Scheme
New Structured P2P Network with Dynamic Load Balancing Scheme Atushi TAKEDA, Takuma OIDE and Akiko TAKAHASHI Department of Information Science, Tohoku Gakuin University Department of Information Engineering,
How To Understand The Power Of A Content Delivery Network (Cdn)
Overview 5-44 5-44 Computer Networking 5-64 Lecture 8: Delivering Content Content Delivery Networks Peter Steenkiste Fall 04 www.cs.cmu.edu/~prs/5-44-f4 Web Consistent hashing Peer-to-peer CDN Motivation
Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
Research on Trust Management Strategies in Cloud Computing Environment
Journal of Computational Information Systems 8: 4 (2012) 1757 1763 Available at http://www.jofcis.com Research on Trust Management Strategies in Cloud Computing Environment Wenjuan LI 1,2,, Lingdi PING
Analysis of Internet Topologies: A Historical View
Analysis of Internet Topologies: A Historical View Mohamadreza Najiminaini, Laxmi Subedi, and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/cnl Simon Fraser University Vancouver,
Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu
Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more
A Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
The Feasibility of Supporting Large-Scale Live Streaming Applications with Dynamic Application End-Points
The Feasibility of Supporting Large-Scale Live Streaming Applications with Dynamic Application End-Points Kay Sripanidkulchai, Aditya Ganjam, Bruce Maggs, and Hui Zhang Instructor: Fabian Bustamante Presented
New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints
New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints Santosh Kulkarni 1, Reema Sharma 2,Ishani Mishra 3 1 Department of ECE, KSSEM Bangalore,MIEEE, MIETE & ISTE 2 Department
Blog Post Extraction Using Title Finding
Blog Post Extraction Using Title Finding Linhai Song 1, 2, Xueqi Cheng 1, Yan Guo 1, Bo Wu 1, 2, Yu Wang 1, 2 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 2 Graduate School
A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster
, pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing
A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM
A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM Hideto Horiuchi, Naoki Wakamiya and Masayuki Murata Graduate School of Information Science and Technology, Osaka University 1
HPAM: Hybrid Protocol for Application Level Multicast. Yeo Chai Kiat
HPAM: Hybrid Protocol for Application Level Multicast Yeo Chai Kiat Scope 1. Introduction 2. Hybrid Protocol for Application Level Multicast (HPAM) 3. Features of HPAM 4. Conclusion 1. Introduction Video
A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers
, pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang
Locality-Aware Randomized Load Balancing Algorithms for DHT Networks
Locality-Aware ized Load Balancing Algorithms for DHT Networks Haiying Shen and Cheng-Zhong Xu Department of Electrical & Computer Engineering Wayne State University, Detroit, MI 4822 {shy,czxu}@ece.eng.wayne.edu
Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching
2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction
An Improved Available Bandwidth Measurement Algorithm based on Pathload
An Improved Available Bandwidth Measurement Algorithm based on Pathload LIANG ZHAO* CHONGQUAN ZHONG Faculty of Electronic Information and Electrical Engineering Dalian University of Technology Dalian 604
Modeling and Simulation of Queuing Scheduling Disciplines on Packet Delivery for Next Generation Internet Streaming Applications
Modeling and Simulation of Queuing Scheduling Disciplines on Packet Delivery for Next Generation Internet Streaming Applications Sarhan M. Musa Mahamadou Tembely Matthew N. O. Sadiku Pamela H. Obiomon
Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651. Research Article
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Comprehensive colliery safety monitoring system
Global Server Load Balancing
White Paper Overview Many enterprises attempt to scale Web and network capacity by deploying additional servers and increased infrastructure at a single location, but centralized architectures are subject
How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)
Policy Based QoS support using BGP Routing Priyadarsi Nanda and Andrew James Simmonds Department of Computer Systems Faculty of Information Technology University of Technology, Sydney Broadway, NSW Australia
ADAPTIVE LOAD BALANCING FOR CLUSTER USING CONTENT AWARENESS WITH TRAFFIC MONITORING Archana Nigam, Tejprakash Singh, Anuj Tiwari, Ankita Singhal
ADAPTIVE LOAD BALANCING FOR CLUSTER USING CONTENT AWARENESS WITH TRAFFIC MONITORING Archana Nigam, Tejprakash Singh, Anuj Tiwari, Ankita Singhal Abstract With the rapid growth of both information and users
Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014
Distributed Systems 25. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2014 November 16, 2014 2014 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University
The Power Marketing Information System Model Based on Cloud Computing
2011 International Conference on Computer Science and Information Technology (ICCSIT 2011) IPCSIT vol. 51 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V51.96 The Power Marketing Information
Approximate Object Location and Spam Filtering on Peer-to-Peer Systems
Approximate Object Location and Spam Filtering on Peer-to-Peer Systems Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph and John D. Kubiatowicz University of California, Berkeley The Problem
Dynamic Scalable Model for Video Conferencing (DSMVC) using Request Routing
Dynamic Scalable Model for Video Conferencing (DSMVC) using Request Routing Adeel Anwar Abbasi*, Tahir Mehmood** {*Department of Computer Sciences, Shaheed Zulfiqar Ali Bhutto Institute of Science and
Path Optimization in Computer Networks
Path Optimization in Computer Networks Roman Ciloci Abstract. The main idea behind path optimization is to find a path that will take the shortest amount of time to transmit data from a host A to a host
Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints
Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashad, Mashhad, Iran [email protected]
AN INITIAL PEER CONFIGURATION ALGORITHM
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETWORKS Tomoyuki Ishii and Atsushi Inoie * Department of Network Engineering, Kanagawa Institute of Technology, Atsugi-city, Japan
Web Caching and CDNs. Aditya Akella
Web Caching and CDNs Aditya Akella 1 Where can bottlenecks occur? First mile: client to its ISPs Last mile: server to its ISP Server: compute/memory limitations ISP interconnections/peerings: congestion
An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks
An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks Arunkumar C K M.Tech student, Dept. of ECE, Dayananda Sagar College of Engineering, VTU, Banglore, India ABSTRACT: Increasing demand
Proposition of a new approach to adapt SIP protocol to Ad hoc Networks
, pp.133-148 http://dx.doi.org/10.14257/ijseia.2014.8.7,11 Proposition of a new approach to adapt SIP protocol to Ad hoc Networks I. Mourtaji, M. Bouhorma, M. Benahmed and A. Bouhdir Computer and Communication
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM. Dr. T.Ravichandran, B.E (ECE), M.E(CSE), Ph.D., MISTE.,
AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM K.Kungumaraj, M.Sc., B.L.I.S., M.Phil., Research Scholar, Principal, Karpagam University, Hindusthan Institute of Technology, Coimbatore
Efficient Parallel Distributed Load Balancing in Content Delivery Networks
Efficient Parallel Distributed Load Balancing in Content Delivery Networks P.Jyothi*1, N.Rajesh*2, K.Ramesh Babu*3 M.Tech Scholar, Dept of CSE, MRECW, Maisammaguda, Secunderabad, Telangana State, India,
