SOFTENG710/COMPSCI 711
|
|
- Rosaline Willis
- 7 years ago
- Views:
Transcription
1 Steps on accessing a web site The time for DNS server to resolve the web server s name to IP address (if necessary). Not shown in the diagram The time for the client to set up a TCP connection with the web server The time for the request transmitted from the client to the web server The time for the web server to parse the request and generate a web page The time for the response transmitted from the host to client The time when all the information are received by the client The time for the client browser to render the page Not shown in the diagram 1 2 How to reduce the response time Reduce the network latency (i.e. transmission delay) Place servers closer to the clients Could be significant Reduce the amount of information that have to be sent to the clients Benefits the users that connect to the servers through low- bandwidth networks For a given bandwidth, less information to be transmitted means less time is needed for transmission Reduce the load on the web server Generate the response faster How to achieve these? Proxy server, caching server A proxy server normally caches web contents. But, web contents can be cached on other types of servers as well. Web Cache A web cache usually sits between the web server and clients Watches requests come by, and saves copies of the responses for them. When there is a coming request for the same URL resource, the web cache can retrieve the cached response and send it back to the client without asking for the web server to serve this request again
2 Advantages of Web Caching Reducing network latency There is a distance between clients and web servers. Caching web object locally can dramatically reduce transmitting latency Reducing bandwidth consumption Cache the web objects close to the client side Reponses to the same requests do not need to be transferred again between the proxy server that caches the web objects and the origin web server. Reducing server load Some of the requests do not need to be handled by the origin server. As some requests can be served from proxy servers, the origin web server can direct more capability to deal with other requests. Improve the response time for the non-cached contents. 5 6 Browser Categories of Web Caching Many web browsers support caching. When a web page is first requested, the browser saves the web page in the disk. If the page is requested again or the user clicks the Back button, the cached page might be used. In some cases, the browser might need to check with the remote web server to see whether the cached page is still valid. If it is valid, the page in the local disk is used. Examples: Firefox, IE. Proxy Server There are two types of proxy servers, i.e. forward proxy and reverse proxy A forward proxy is an intermediate system that enables a browser to connect to a remote network to which it normally does not have access. A forward proxy can also be used to cache data, reducing load on the networks between the forward proxy and the remote web server. A reverse proxy (http accelerator) is installed in front of web servers. All connections coming from the Internet addressed to one of the web servers are routed through the proxy server, which may either deal with the request itself or pass the request to the web server behind
3 Proxy servers are located in various locations throughout the Web. hierarchical caching structure Each cache serves many clients, which may be users or other caches. When the request is not served by a local cache, the request is passed on to a higher h level l in the hierarchy, until reaching a root cache, which, having no parent, would request the object from the origin server. 9 cooperative caching architecture Caches communicate with each other as peers (e.g., using an inter-cache protocol). On a miss, a cache would ask a predetermined set of peers whether they already have the missing object. If so, the request would be routed to the first responding cache. Otherwise, the cache attempts to retrieve the object directly from the origin server. This approach can prevent storage of multiple copies and reduce origin server retrievals Suffers from increased inter-cache communication. Instead of asking peers directly about each request, a peer periodically gives peers a summary of the contents of the cache 10 Database Server server-side cache When queries are made to the back-end database, the result of such queries is cached as materialized views at the database server. When the same query is made again to the database, the database server can use the cached view for it, which h reduces the computation cost on the database server
4 Database Accelerator It caches the common data sets for the database to accelerate the processing of the database query operations. When the application server does database queries, it can query on these common data sets without passing the queries to the database server. Reduce the communication between application server and database server Reduce the workload for the back-end database. Examples: Oracle Application Server Database Cache, TimesTen Web Application Server Application servers cache the result of dynamic generated web page. Reduces the workload on the application server and back-end database. Changes in the back-end database can invalidate the cached page. Examples: BEA WebLogic, IBM WebSphere Content Delivery/Distribution Network (CDN) CDN is designed to place of content caching servers at the edge of network around the world. It reduces the traffic congestion on the network and the latency perceived by users. The caching servers at the edge side of network are called edge servers which can cache HTML pages, images, audio and video files. Examples: Akamai, Digital Island When the client requests a web page, the request is firstly sent to a forward proxy. The forward proxy then decides which edge server to communicate with. If none of the edge servers cache this page, the request is delivered to the web server. Otherwise, one of the edge servers, which is closest to the client, will serve the request. Examples: Akamai EdgeSuite, IBM WebSphere Edge Server
5 Potential problems The end user see stale (e.g., old or out-of-date) content, compared to what is available on the origin server (i.e., fresh content). HTTP does not ensure strong consistency Caching tends to improve the response times only for cached responses that are subsequently requested (i.e., hits). Misses that are processed by a cache generally have decreased speed. Thus, a cache only benefits requests for content already stored in it. Caching is limited it by a high h rate of change of source data. Some responses cannot or should not be cached Web server will set and send the HTTP headers that determine cacheability Dynamic Data Page Dynamic data pages are generated by applications according to the underlying frequently changing data sources such as databases and files. Dynamic data pages are usually generated on the demand of user s request. Dynamic pages have two characteristics: high volatility and high variation It is volatile because not only it changes more frequently but also its change is unpredictable. It is various because it is often customized or personalized from a set of content fragments. Compared to a static page, a dynamic data page is expensive to create. more valuable to cache a dynamic data page 19 Proxy-based Dynamic Page Caching Proxy-based caching approaches can be classified into three broad categories page-level caching fragment-level l caching data-centric caching In the page-level caching, the proxy server caches full- page outputs. Many commercial products have applied this approach. Compared to no-caching, the page-level caching has the following advantages: reduce the page generation delay reduce the delay associated with packet filtering and other firewall-relatedrelated delays reduce the bandwidth required to transmit the content from the web server to the proxy 20 5
6 The page-level caching has the following limitations i i There is often very little reusability of full HTML pages A personalised page displaying the name of the user at the top of the page: the cached page in the proxy is only reusable if the same user accesses to the same page Unnecessary invalidation If there is only one element of the page becomes invalid, then the whole page needs to be invalidated in the cache. 21 Fragment-level caching Fragment-level caching requires establishing a template for each dynamically generated page. The template file specifies the contents and layout of the page. Essentially, each page is factored into a number of fragments of differing cacheability profiles and different caching expiration time. The fragments and the templates of the pages are maintained as separate elements on the origin servers and the proxy servers. A web page is assembled at proxy caching server when the page is requested. Popularized by Akamai as part of the Edge Side Includes (ESI) initiative 22 Edge Side Includes (ESI) Edge Side Includes (ESI) is a simple markup language used to define web page fragments of differing cacheability profiles and different caching expiration time. ESI defines some tags that can be used in the template files. A template file is a normal HTML file with ESI tags. Amongst the ESI tags, esi: include is used to include a fragment. <html> <body> <esi:include src= /> <esi:include src= /> <esi:include src= /> <esi:include src= /> </body> </html> advertise navigation i personalize news
7 Compared with page-level caching approach, fragment-level l caching approach can improve hit rates as it can specify granular caching capability. According to the properties of different fragments, the fragment can be set with different caching expiring time and cacheability. Further reading Data-centric caching Fragment-level caching requires the web pages to be factored into a number of fragments Data-centric caching focuses on the contents of the data being transmitted. Carried out by the underlying mechanism. Does not require the cooperation of the web page authors We will look at two schemes: Value-Based Web Caching S. C. Rhea, K. Liang and E. Brewer, Value-Based Web Caching, Proc. of the 12th International Conference on World Wide Web,,pp , 2003 Delta encoding Jeffrey C. Mogul, Fred Douglis, Anja Feldmann, Balachander Krishnamurthy, Potential benefits of delta encoding and data compression for HTTP, 1997 Value-Based Web Caching A lot of information being transmitted over the Internet are redundant, since they are identical % text-based responses were caused by resource modifications. Many modifications only change the contents of the information being transmitted by a small amount. Aliasing, which means two distinct URIs reference the same data, also results in redundant data being transmitted over the network. Aliased data account for 36% of the data transferred Value-based web caching exploits similarities between data to eliminate redundant data transmission caused by resource modification and aliasing
8 A page is broken into blocks of approximately 2KB each, and each block is named by its fingerprint (i.e. digest) calculated using a secure hash function MD5. According to the properties p of MD5, it is highly unlikely that two blocks containing different contents have the same fingerprint. Two blocks are regarded as identical if their fingerprints are the same. The cached blocks are indexed using their fingerprints. If the responses to two requests contain identical blocks, the identical blocks do not need to be sent again in the second response. The scheme was proposed to reduce the latency of the users connecting to the Internet through h low-speed connection The scheme uses two kinds of proxies. One resides on the user s PC, called child proxy; The other one resides on the user s ISP, called parent proxy. The child proxy caches the contents of the blocks and their fingerprints. The parent proxy only records the fingerprints of the blocks that are cached on the child proxy. The origin server is responsible for partitioning pages into blocks and computing the fingerprints. When a parent proxy receives the blocks that constitute the response to a user s request, the parent proxy determines which blocks the child proxy already has by checking the fingerprints of the received blocks. The parent proxy only sends the blocks that the child proxy does not have to the child proxy. The child proxy assembles the page according to the received/cached blocks and delivers the page to the user
9 Instead of using a fixed block size, e.g. 2KB per block, the scheme uses Rabin functions to determine how to partition a page into blocks. The benefit of this approach is that modifications to a page would only affect the block(s) in which the modifications occur. Determine the boundary according to the value of the blocks. Let f be a function mapping n one-byte inputs uniformly and randomly to the set {0,, 2047}. Place a block boundary before byte i in a resource if the value of f on the n bytes proceeding byte i is 0. Since f is uniform and random, we expect to evaluate it on average 2048 times before finding a zero; thus the expected block size from this technique is 2 kb Delta encoding In delta encoding, the origin server generates many different base files. When a user s request arrives, the server finds the base file that is closest to the response to be sent back to the user. The difference ( delta ) between the response and the chosen base file is computed. Then, the delta and a reference to the base file are sent back to the user. The bandwidth savings stem from the fact that the base file is commonly used and the user has a local copy of the base file. Thus, the user can obtain the requested page by applying the delta to the base file
10 client request V1 V1 server 734 exam is cancelled. V2 734 exam is not cancelled. V3 734 exam is on
Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014
Distributed Systems 25. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2014 November 16, 2014 2014 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
More informationDistributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
More informationSiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
More informationDistributed Systems 19. Content Delivery Networks (CDN) Paul Krzyzanowski pxk@cs.rutgers.edu
Distributed Systems 19. Content Delivery Networks (CDN) Paul Krzyzanowski pxk@cs.rutgers.edu 1 Motivation Serving web content from one location presents problems Scalability Reliability Performance Flash
More informationDistributed Systems. 24. Content Delivery Networks (CDN) 2013 Paul Krzyzanowski. Rutgers University. Fall 2013
Distributed Systems 24. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2013 November 27, 2013 2013 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
More informationHow To Understand The Power Of A Content Delivery Network (Cdn)
Overview 5-44 5-44 Computer Networking 5-64 Lecture 8: Delivering Content Content Delivery Networks Peter Steenkiste Fall 04 www.cs.cmu.edu/~prs/5-44-f4 Web Consistent hashing Peer-to-peer CDN Motivation
More information1. Comments on reviews a. Need to avoid just summarizing web page asks you for:
1. Comments on reviews a. Need to avoid just summarizing web page asks you for: i. A one or two sentence summary of the paper ii. A description of the problem they were trying to solve iii. A summary of
More informationLecture 8a: WWW Proxy Servers and Cookies
Internet and Intranet Protocols and Applications Lecture 8a: WWW Proxy Servers and Cookies March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Terminology Origin
More informationLecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at
Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at distributing load b. QUESTION: What is the context? i. How
More informationVarnish the Drupal way
Varnish the Drupal way About me Boyan Borisov Team Leader @ Propeople boyanb@propeople.dk @boyan_borisov Skype: boian.borisov hap://linkedin.com/in/ boyanborisov What is Varnish? Reverse proxy cache server...
More informationLecture 8a: WWW Proxy Servers and Cookies
Internet and Intranet Protocols and Applications Lecture 8a: WWW Proxy Servers and Cookies March 12, 2003 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Terminology Origin
More informationMeeting Worldwide Demand for your Content
Meeting Worldwide Demand for your Content Evolving to a Content Delivery Network A Lucent Technologies White Paper By L. R. Beaumont 4/25/01 Meeting Worldwide Demand for your Content White Paper Table
More informationCleaning Encrypted Traffic
Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation
More informationCITS1231 Web Technologies. Client, Server, the Internet, and the Web
CITS1231 Web Technologies Client, Server, the Internet, and the Web Topic Outline How does the Internet work Client Server Architecture Connections Communications Protocols Addressing Routing One of the
More informationAccelerating Zope applications with Squid and ESI
Accelerating Zope applications with Squid and ESI Simon Eisenmann 7. Jun 2004 Göteborg, EuroPython 2004 2004 struktur AG page 1 2004 struktur AG Squid in front of Zope - Why? Massive speedup. Only sanitized
More informationAKAMAI WHITE PAPER. Turbo-Charging Dynamic Web Sites with Akamai EdgeSuite SM
Turbo-Charging Dynamic Web Sites with Akamai EdgeSuite SM 1 Table of Contents Introduction...........................................................3 Next-Generation E-Business Applications...............................
More informationImplementing Reverse Proxy Using Squid. Prepared By Visolve Squid Team
Implementing Reverse Proxy Using Squid Prepared By Visolve Squid Team Introduction What is Reverse Proxy Cache About Squid How Reverse Proxy Cache work Configuring Squid as Reverse Proxy Configuring Squid
More informationThe Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com. Google Public
The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com Introduction Well understood facts: o Fast is better than slow but it costs more to be fast o Network has to be fast and
More informationScalable Internet Services and Load Balancing
Scalable Services and Load Balancing Kai Shen Services brings ubiquitous connection based applications/services accessible to online users through Applications can be designed and launched quickly and
More informationAccelerating Wordpress for Pagerank and Profit
Slide No. 1 Accelerating Wordpress for Pagerank and Profit Practical tips and tricks to increase the speed of your site, improve conversions and climb the search rankings By: Allan Jude November 2011 Vice
More informationOverlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.
Overlay Networks An overlay is a logical network on top of the physical network Routing Overlays The simplest kind of overlay Virtual Private Networks (VPN), supported by the routers If no router support
More informationContent Delivery Networks. Shaxun Chen April 21, 2009
Content Delivery Networks Shaxun Chen April 21, 2009 Outline Introduction to CDN An Industry Example: Akamai A Research Example: CDN over Mobile Networks Conclusion Outline Introduction to CDN An Industry
More informationACCELERATING DYNAMIC WEB CONTENT DELIVERY USING KEYWORD-BASED FRAGMENT DETECTION a
Journal of Web Engineering, Vol. 4, No. 1 (2005) 079 099 c Rinton Press ACCELERATING DYNAMIC WEB CONTENT DELIVERY USING KEYWORD-BASED FRAGMENT DETECTION a DANIEL BRODIE b, AMRISH GUPTA, WEISONG SHI Department
More informationThis presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.
This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1. WD31_VirtualApplicationSharedServices.ppt Page 1 of 29 This presentation covers the shared
More informationDEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft IIS Prerequisites and configuration
More informationF-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt 1 Lecture 10: Application Layer 2 Application Layer Where our applications are running Using services provided by
More informationScalable Internet Services and Load Balancing
Scalable Services and Load Balancing Kai Shen Services brings ubiquitous connection based applications/services accessible to online users through Applications can be designed and launched quickly and
More informationHow To Model The Content Delivery Network (Cdn) From A Content Bridge To A Cloud (Cloud)
Kingston University London In network content caching contributing to the Future Internet Architecture Dissertation submitted for the Degree of Master of Science in Networking and Data Communications By
More informationHTTP-Level Deduplication with HTML5
HTTP-Level Deduplication with HTML5 Franziska Roesner and Ivayla Dermendjieva Networks Class Project, Spring 2010 Abstract In this project, we examine HTTP-level duplication. We first report on our initial
More informationSWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet
SWE 444 Internet and Web Application Development Introduction to Web Technology Dr. Ahmed Youssef Internet It is a network of networks connected and communicating using TCP/IP communication protocol 2
More informationCoyote Point Systems White Paper
Five Easy Steps to Implementing Application Load Balancing for Non-Stop Availability and Higher Performance. Coyote Point Systems White Paper Load Balancing Guide for Application Server Administrators
More information<Insert Picture Here> Oracle Web Cache 11g Overview
Oracle Web Cache 11g Overview Oracle Web Cache Oracle Web Cache is a secure reverse proxy cache and a compression engine deployed between Browser and HTTP server Browser and Content
More informationDATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach, Kurose, Ross Slides: - Course book Slides - Slides from Princeton University COS461
More informationProtocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
More informationStep-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local
More informationFirst Midterm for ECE374 03/09/12 Solution!!
1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
More information5 Easy Steps to Implementing Application Load Balancing for Non-Stop Availability and Higher Performance
5 Easy Steps to Implementing Application Load Balancing for Non-Stop Availability and Higher Performance DEPLOYMENT GUIDE Prepared by: Jim Puchbauer Coyote Point Systems Inc. The idea of load balancing
More informationOptimizing Object Freshness Controls in Web Caches
Optimizing Object Freshness Controls in Web Caches Mark Nottingham 12/192 Little Collins Street Melbourne VIC 3000 Australia mnot@pobox.com Abstract Mechanisms for controlling object freshness and refresh
More informationBASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
More informationDEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
More informationThe Application Front End Understanding Next-Generation Load Balancing Appliances
White Paper Overview To accelerate download times for end users and provide a high performance, highly secure foundation for Web-enabled content and applications, networking functions need to be streamlined.
More informationSSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
More informationMeasuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD
Measuring the Web: Part I - - Content Delivery Networks Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD Acknowledgement Material presented in these slides is borrowed from presentajons
More informationICP. Cache Hierarchies. Squid. Squid Cache ICP Use. Squid. Squid
Caching & CDN s 15-44: Computer Networking L-21: Caching and CDNs HTTP APIs Assigned reading [FCAB9] Summary Cache: A Scalable Wide- Area Cache Sharing Protocol [Cla00] Freenet: A Distributed Anonymous
More informationSnare for Firefox Snare Agent for the Firefox Browser
Snare Agent for the Firefox Browser InterSect Alliance International Pty Ltd Page 1 of 11 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be
More informationDeliuery Networks. A Practical Guide to Content. Gilbert Held. Second Edition. CRC Press. Taylor & Francis Group
A Practical Guide to Content Deliuery Networks Second Edition Gilbert Held CRC Press Taylor & Francis Group Boca Raton London NewYork CRC Press is an imprint of the Taylor & Francis Croup, an informa business
More informationDeployment Guide Microsoft IIS 7.0
Deployment Guide Microsoft IIS 7.0 DG_IIS_022012.1 TABLE OF CONTENTS 1 Introduction... 4 2 Deployment Guide Overview... 4 3 Deployment Guide Prerequisites... 4 4 Accessing the AX Series Load Balancer...
More informationIntroducing the Microsoft IIS deployment guide
Deployment Guide Deploying Microsoft Internet Information Services with the BIG-IP System Introducing the Microsoft IIS deployment guide F5 s BIG-IP system can increase the existing benefits of deploying
More informationUsing Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management
More informationComputer Networking LAB 2 HTTP
Computer Networking LAB 2 HTTP 1 OBJECTIVES The basic GET/response interaction HTTP message formats Retrieving large HTML files Retrieving HTML files with embedded objects HTTP authentication and security
More informationQuestion: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
More informationSuperLumin Nemesis. Administration Guide. February 2011
SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility
More informationLab - Observing DNS Resolution
Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the nslookup Command on Mail
More informationThe old Internet. Software in the Network: Outline. Traditional Design. 1) Basic Caching. The Arrival of Software (in the network)
The old Software in the Network: What Happened and Where to Go Prof. Eric A. Brewer UC Berkeley Inktomi Corporation Local networks with local names and switches IP creates global namespace and links the
More informationThe Root of the Matter: Hints or Slaves
The Root of the Matter: Hints or Slaves David Malone October 21, 2003 Abstract We consider the possibility of having a name server act as a slave to the root zone, rather than caching
More informationM3-R3: INTERNET AND WEB DESIGN
M3-R3: INTERNET AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF ANSWER
More informationUsing Steelhead Appliances and Stingray Aptimizer to Accelerate Microsoft SharePoint WHITE PAPER
Using Steelhead Appliances and Stingray Aptimizer to Accelerate Microsoft SharePoint WHITE PAPER Introduction to Faster Loading Web Sites A faster loading web site or intranet provides users with a more
More informationRepeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.
Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.
More informationFront-End Performance Testing and Optimization
Front-End Performance Testing and Optimization Abstract Today, web user turnaround starts from more than 3 seconds of response time. This demands performance optimization on all application levels. Client
More informationProtocolo HTTP. Web and HTTP. HTTP overview. HTTP overview
Web and HTTP Protocolo HTTP Web page consists of objects Object can be HTML file, JPEG image, Java applet, audio file, Web page consists of base HTML-file which includes several referenced objects Each
More informationWeb Caching and CDNs. Aditya Akella
Web Caching and CDNs Aditya Akella 1 Where can bottlenecks occur? First mile: client to its ISPs Last mile: server to its ISP Server: compute/memory limitations ISP interconnections/peerings: congestion
More informationWorking With Virtual Hosts on Pramati Server
Working With Virtual Hosts on Pramati Server 13 Overview Virtual hosting allows a single machine to be addressed by different names. There are two ways for configuring Virtual Hosts. They are: Domain Name
More informationAKAMAI WHITE PAPER. How To Deliver Fast, Engaging Responsive Web Design Sites
AKAMAI WHITE PAPER How To Deliver Fast, Engaging Responsive Web Design Sites TABLE OF CONTENTS MOBILE IMPACTS THE BOTTOM LINE 1 RESPONSIVE WEB DESIGN ADOPTION IS GROWING FAST 1 FAST, QUALITY WEB EXPERIENCES
More informationExecutive Brief for Sharing Sites & Digital Content Providers. Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits
Executive Brief for Sharing Sites & Digital Content Providers Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits Executive Summary The Opportunity/Challenge The revenue
More informationUsing email over FleetBroadband
Using email over FleetBroadband Version 01 20 October 2007 inmarsat.com/fleetbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
More informationCache Configuration Reference
Sitecore CMS 6.2 Cache Configuration Reference Rev: 2009-11-20 Sitecore CMS 6.2 Cache Configuration Reference Tips and Techniques for Administrators and Developers Table of Contents Chapter 1 Introduction...
More informationUnderstanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
More informationWeb. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.
JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming
More informationThe Application Delivery Controller Understanding Next-Generation Load Balancing Appliances
White Paper Overview To accelerate response times for end users and provide a high performance, highly secure and scalable foundation for Web applications and rich internet content, application networking
More informationLoad Balancing BEA WebLogic Servers with F5 Networks BIG-IP v9
Load Balancing BEA WebLogic Servers with F5 Networks BIG-IP v9 Introducing BIG-IP load balancing for BEA WebLogic Server Configuring the BIG-IP for load balancing WebLogic Servers Introducing BIG-IP load
More informationResults-Oriented Application Acceleration with FastView Because Every Second Counts Whitepaper
Results-Oriented Application Acceleration with FastView Because Every Second Counts Whitepaper Table of Contents Executive Summary...3 Why Website Performance Matters...3 What Affects Website Performance...5
More informationConfiguring Network Address Translation (NAT)
8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and
More informationCSC2231: Akamai. http://www.cs.toronto.edu/~stefan/courses/csc2231/05au. Stefan Saroiu Department of Computer Science University of Toronto
CSC2231: Akamai http://www.cs.toronto.edu/~stefan/courses/csc2231/05au Stefan Saroiu Department of Computer Science University of Toronto Administrivia Project proposals due today!!! No lecture on Monday:
More informationA TECHNICAL REVIEW OF CACHING TECHNOLOGIES
WHITEPAPER Over the past 10 years, the use of applications to enable business processes has evolved drastically. What was once a nice-to-have is now a mainstream staple that exists at the core of business,
More informationImproving Network Performance and Document Dissemination by Enhancing Cache Consistency on the Web Using Proxy and Server Negotiation
Improving Network Performance and Document Dissemination by Enhancing Cache Consistency on the Web Using Proxy and Server Negotiation Felicia R. Doswell Dissertation submitted to the Faculty of the Virginia
More informationConcept of Cache in web proxies
Concept of Cache in web proxies Chan Kit Wai and Somasundaram Meiyappan 1. Introduction Caching is an effective performance enhancing technique that has been used in computer systems for decades. However,
More informationFirst Steps to Using PacketShaper ISP
First Steps to Using PacketShaper ISP TABLE OF CONTENTS OVERVIEW...1 DETERMINING YOUR PACKETSHAPER ISP DEPLOYMENT STRATEGY...2 ISP Upstream Link...2 Cable or DSL Head End...2 USING THE CLASSIFICATION-ACCELERATOR
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationGiving life to today s media distribution services
Giving life to today s media distribution services FIA - Future Internet Assembly Athens, 17 March 2014 Presenter: Nikolaos Efthymiopoulos Network architecture & Management Group Copyright University of
More informationProtocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
More informationTMS Phone Books Troubleshoot Guide
TMS Phone Books Troubleshoot Guide Document ID: 118705 Contributed by Adam Wamsley and Magnus Ohm, Cisco TAC Engineers. Jan 05, 2015 Contents Introduction Prerequisites Requirements Components Used Related
More informationCDN and Traffic-structure
CDN and Traffic-structure Outline Basics CDN Traffic Analysis 2 Outline Basics CDN Building Blocks Services Evolution Traffic Analysis 3 A Centralized Web! Slow content must traverse multiple backbones
More informationComputer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------
More informationHighly Available Mobile Services Infrastructure Using Oracle Berkeley DB
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides
More informationDEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft Outlook Web
More informationTELE 301 Network Management. Lecture 17: File Transfer & Web Caching
TELE 301 Network Management Lecture 17: File Transfer & Web Caching Haibo Zhang Computer Science, University of Otago TELE301 Lecture 17: File Transfer & Web Caching 1 Today s Focus FTP & Web Caching!
More informationDOCUMENTS ON WEB OBJECTIVE QUESTIONS
MODULE 11 DOCUMENTS ON WEB OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module for
More informationHow WebSphere Caches Dynamic Content for High-Volume Web Sites
How WebSphere Caches Dynamic Content for High-Volume Web Sites Authors: High-Volume Web Site Team Web address: ibm.com/websphere/developer/zones/hvws Management contact: Larry Hsiung larryh@us.ibm.com
More informationCisco Expressway Basic Configuration
Cisco Expressway Basic Configuration Deployment Guide Cisco Expressway X8.1 D15060.03 August 2014 Contents Introduction 4 Example network deployment 5 Network elements 6 Internal network elements 6 DMZ
More informationIdentifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data
Identifying the Number of to improve Website Usability from Educational Institution Web Log Data Arvind K. Sharma Dept. of CSE Jaipur National University, Jaipur, Rajasthan,India P.C. Gupta Dept. of CSI
More informationATIS Open Web Alliance. Jim McEachern Senior Technology Consultant ATIS
Jim McEachern Senior Technology Consultant ATIS Objective This presentation provides an introduction to the, and the motivation behind its formation. 2 Overview SPDY was introduced by Google to reduce
More informationArti Tyagi Sunita Choudhary
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Usage Mining
More informationVideo Streaming with Network Coding
Video Streaming with Network Coding Kien Nguyen, Thinh Nguyen, and Sen-Ching Cheung Abstract Recent years have witnessed an explosive growth in multimedia streaming applications over the Internet. Notably,
More informationStreamServe Persuasion SP4 StreamServe Connect for SAP - Business Processes
StreamServe Persuasion SP4 StreamServe Connect for SAP - Business Processes User Guide Rev A StreamServe Persuasion SP4StreamServe Connect for SAP - Business Processes User Guide Rev A SAP, mysap.com,
More informationProxySG TechBrief Implementing a Reverse Proxy
ProxySG TechBrief Implementing a Reverse Proxy What is a reverse proxy? The Blue Coat ProxySG provides the basis for a robust and flexible Web communications solution. In addition to Web policy management,
More informationFAQs for Oracle iplanet Proxy Server 4.0
FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle
More information1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?
Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet
More informationMicrosoft TMG Replacement with NetScaler
Microsoft TMG Replacement with NetScaler Replacing Microsoft Forefront TMG with NetScaler for Optimization This deployment guide focuses on replacing Microsoft Forefront Threat Management Gateway (TMG)
More information