Asymmetric Caching: Improved Network Deduplication for Mobile Devices
|
|
- Collin Lamb
- 8 years ago
- Views:
Transcription
1 Asymmetric Caching: Improved Network Deduplication for Mobile Devices ShrutiSanadhya, 1 RaghupathySivakumar, 1 Kyu-Han Kim, 2 Paul Congdon, 2 SriramLakshmanan, 1 JatinderP Singh 3 1 Georgia Institute of Technology, Atlanta, GA, USA 2 HP Labs, Palo Alto, CA, USA 3 Xerox PARC, Palo Alto, CA, USA 1
2 Introduction Network traffic has a lot of redundancy 20% HTTP content accessed on smartphonesis redundant 1 Network deduplication(dedup) leverages this redundancy to conserve network bandwidth Regular Cache Mobile Cache C2 Mobile Sender Dedup Source SGSN Dedup Destination Receiver Rabin Fingerprinting C1 C 2 C3 Hashing H1 H3 Compress C1 C3 C1 C 2 C3 Inflate packet C1 C3 1 Qianet al,, Web Caching on Smartphones: Ideal vs. Reality, MobiSys2012 2
3 The Asymmetry Problem What happens when the mobile cache is more populated than the cache at dedup source? Regular Cache H3 C3 H4 C4 H5 C5 H6 C6 Mobile H7 C7 Cache H8 C8 C2 Mobile Cache Sender Dedup Source Dedup Destination Receiver How can all the past cached information at the mobile be successfully leveraged for dedup by any given dedup source? 3
4 Motivational Scenarios Multi-homed devices Cache WiFi Access Point Cache Mobile Device Cache 3G Base Station (BS) 4
5 Motivational Scenarios Multi-homed devices Resource pooling Cache Mobile Device BS BS RNC RNC BS: Base Station RNC: Radio Network Controller SGSN: Serving GPRS Support Node Cache Cache SGSN SGSN 5
6 Multi-homed devices Resource pooling Memory scalability Cache Motivational Scenarios Cache RNC Cache BS SGSN Cache BS: Base Station RNC: Radio Network Controller SGSN: Serving GPRS Support Node 6
7 Scope and Goals Scope Laptops/smartphones using 3G/WiFi Conserving cellular bandwidth Downstream and unencrypted traffic Goals Overall efficiency: Using downstream andupstream more efficiently Application agnostic: Applicable to any application Limited overheads: Deployable computational and memory complexities 7
8 Asymmetric Caching -Overview Regular Cache Feedback Cache H4 H3 C3 H4 C4 H5 C5 C2 Mobile Cache Sender Dedup Source Feedback Dedup Destination Receiver Mobile cache is more populated than dedup source On receiving downstream traffic, the mobile selectively advertises portions of its cache to dedup source Dedup source also maintains a feedback cache Both regular and feedback cache is used for dedup 8
9 When is feedback sent? Feedback is sent reactively Feedback is sent only when there is downstream traffic Feedback sent is specific to the ongoing traffic Downstream traffic Dedup Source Dedup Destination Feedback 9
10 Where from is feedback selected? Hashes at dedup destination can be organized as per: Order of arrival H1 H3 H4 H5 H6 H7 H8 H9 H10 Same flow (SrcIP, DestIP, SrcPort, DestPort ) H1 H6 H3 H4 H5 H7 H8 H9 H10 Same object (HTML, JPEG or CSS) H1 H6 H7 H3 H4 H9 H10 H8 H5 Objects help in effectively matching new and old content Application agnostic estimate of objects are flowlets 10
11 How are flowlets extracted? Sequence of bytes in a flow is a time-series Flowlets are piecewise stationary segments of a flow Check for flowlet boundary at start of each packet Consider byte series B [0:m] (1 st packet), B [m+1:n] (2 nd packet) and B [0:n] as autoregressive processes of order p: B [0:m] B i = Σ 1<=j<=p a i B i-j + σε, εis white noise d [0:m:n] = gain(b [0:n] ) gain(b [0:m] ) gain(b [m+1:n] ) B 0, B 1,.., B m, B m+1,, B n B [0:n] Gain in the noise power when B [0:n] is in one flowlet instead of different flowlets: B [0:m] and B [m+1:n] If d [0:m:n] > d thresh, then flowlet boundary exists at m B [m+1:n] 11
12 How is feedback selected? Find best matching past flowlet 12
13 How is feedback selected? Find best matching past flowlet H1 13
14 How is feedback selected? Find best matching past flowlet H1 H1 F1, F3 F1, F2, F3 14
15 How is feedback selected? Find best matching past flowlet H1 F1:H1,, H4, H5, H6, H7, H8, H9, H10, H11, H12,. H1 F1, F3 F1, F2, F3 F2:, H5, H10,. F3: H5, H8, H11, H12,.. Last hash matched 15
16 How is feedback selected? Find best matching past flowlet H1 F1:H1,, H4, H5, H6, H7, H8, H9, H10, H11, H12,. H1 F1, F3 F1, F2, F3 F2:, H5, H10,. F3: H5, H8, H11, H12,.. Last hash matched 16
17 How is feedback selected? Find best matching past flowlet H1 F1:H1,, H4, H5, H6, H7, H8, H9, H10, H11, H12,. H1 F1, F3 F1, F2, F3 F2:, H5, H10,. F3: H5, H8, H11, H12,.. Flowlet 1 (F1) is best matched Last hash matched 17
18 How is feedback selected? Find best matching past flowlet H1 F1:H1,, H4, H5, H6, H7, H8, H9, H10, H11, H12,. H1 F1, F3 F1, F2, F3 F2:, H5, H10,. F3: H5, H8, H11, H12,.. Flowlet 1 (F1) is best matched Last hash matched Find start of next feedback in the best matching flowlet 18
19 How is feedback selected? Find best matching past flowlet H1 F1:H1,, H4, H5, H6, H7, H8, H9, H10, H11, H12,. H1 F1, F3 F1, F2, F3 F2:, H5, H10,. F3: H5, H8, H11, H12,.. Flowlet 1 (F1) is best matched Last hash matched Find start of next feedback in the best matching flowlet Best matching past flowlet H1,, H4, H5, H6,H7, H8, H9,H10, H11, H12, H13, 19
20 How is feedback selected? Find best matching past flowlet H1 F1:H1,, H4, H5, H6, H7, H8, H9, H10, H11, H12,. H1 F1, F3 F1, F2, F3 F2:, H5, H10,. F3: H5, H8, H11, H12,.. Flowlet 1 (F1) is best matched Last hash matched Find start of next feedback in the best matching flowlet Best matching past flowlet H1,, H4, H5, H6,H7, H8, H9,H10, H11, H12, H13, Last hash matched 20
21 How is feedback selected? Find best matching past flowlet H1 F1:H1,, H4, H5, H6, H7, H8, H9, H10, H11, H12,. H1 F1, F3 F1, F2, F3 F2:, H5, H10,. F3: H5, H8, H11, H12,.. Flowlet 1 (F1) is best matched Last hash matched Find start of next feedback in the best matching flowlet Best matching past flowlet H1,, H4, H5, H6,H7, H8, H9,H10, H11, H12, H13, Last hash matched Last hash advertised 21
22 How is feedback selected? Find best matching past flowlet H1 H1 Flowlet 1 (F1) is best matched Last hash matched Find start of next feedback in the best matching flowlet Best matching past flowlet F1, F3 F1, F2, F3 δ: temporal offset H1,, H4, H5, H6,H7, H8, H9,H10, H11, H12, H13, Last hash matched F1:H1,, H4, H5, H6, H7, H8, H9, H10, H11, H12,. F2:, H5, H10,. F3: H5, H8, H11, H12,.. Last hash advertised δ 22
23 How is feedback selected? Find best matching past flowlet H1 H1 Flowlet 1 (F1) is best matched Last hash matched Find start of next feedback in the best matching flowlet Best matching past flowlet F1, F3 F1, F2, F3 δ: temporal offset H1,, H4, H5, H6,H7, H8, H9,H10, H11, H12, H13, Last hash matched F1:H1,, H4, H5, H6, H7, H8, H9, H10, H11, H12,. F2:, H5, H10,. F3: H5, H8, H11, H12,.. Last hash advertised δ Start of next feedback 23
24 How is the feedback used? Regular Cache Feedback Cache Dedup Source Dedup source maintains a feedback cache along with regular cache of baseline dedup 24
25 How is the feedback used? Regular Cache H1 Feedback Cache Dedup Source Dedup source maintains a feedback cache along with regular cache of baseline dedup Regular cache is populated by downstream data 25
26 How is the feedback used? Regular Cache H1 Feedback Cache Dedup Source Dedup source maintains a feedback cache along with regular cache of baseline dedup Regular cache is populated by downstream data 26
27 How is the feedback used? Regular Cache H1 Feedback Cache H3 H4 Dedup Source Dedup source maintains a feedback cache along with regular cache of baseline dedup Regular cache is populated by downstream data Feedback hashes are inserted in feedback cache 27
28 How is the feedback used? Regular Cache H1 Feedback Cache H3 H4 Dedup Source Dedup source maintains a feedback cache along with regular cache of baseline dedup Regular cache is populated by downstream data Feedback hashes are inserted in feedback cache Every downstream packet is dedupedusing both regular and feedback cache 28
29 Design Summary When is the feedback sent? Where from is the feedback chosen? How are flowlets extracted? How is the feedback selected? How is the feedback used? Reactively Flowlets at dedup destination Stationarity properties Best matching flowlet and pointers in past flowlet Stored in the feedback cache for dedup 29
30 Trace Based Analysis Data collection 25 laptop and 5 smartphoneusers over 3 months giving 26GB of unsecured downlink data WiFias well as 3G network Packet sniffing through Wireshark and Tcpdump Trace analysis Custom analyzer implemented in Python Mimic mobility by splitting trace into two halves: past and present Past trace populates the initial cache at the dedup destination This is the data remembered from previous networks access 30 random connections from the present create ongoing traffic Dedup is performed using asymmetric caching 30
31 Trace Analysis Results -I Redundancy identified # Redundant bytes found by asymmetric caching Actual # redundant bytes x 100 Average asymmetriccaching Average symmetriccaching Asymmetric caching leverages significant portion of the achievable redundancy 31
32 Trace Analysis Results -II Feedback efficiency # Bytes saved downstream # Bytes sent upstream Split of total hits across the caches at dedup source Asymmetric caching generates efficient and relevant feedback 32
33 Related Work Network layer approaches Spring et al, A protocol-independent technique for eliminating redundant network traffic. SIGCOMM, Aggarwalet al, EndRE: an end-system redundancy elimination service for enterprises. NSDI, Shenet al, REfactor-ingcontent overhearing to improve wireless performance. MobiCom, 2011 Transport layer approaches Zoharet al, The power of prediction: cloud bandwidth and cost reduction, SIGCOMM 2011 Application layer approaches Web browser caches and proxies Content Distribution Networks (CDNs) 33
34 Conclusion and Future Work A dedup strategy that leverages past remembered on mobile devices to perform dedup at any dedup source Application agnostically estimate different objects in a flow byusing stationarity properties of different content Trace analysis of 30 users shows that asymmetric caching: Leverages 89% of achievable redundancy Gives 6x feedback efficiency Prototype implementation on Linux desktop and Android smartphone with deployable overheads Future Work: Upstream dedup, i.e. reduce redundant content sent upstream Extending dedup to end-to-end encrypted traffic Study energy impact of asymmetric caching on mobile devices 34
35 Questions? 35
Asymmetric Caching: Improved Network Deduplication for Mobile Devices
Asymmetric Caching: Improved Network Deduplication for Mobile Devices Shruti Sanadhya, 1 Raghupathy Sivakumar, 1 Kyu-Han Kim, 2 Paul Congdon, 2 Sriram Lakshmanan, 1 Jatinder Pal Singh 3 1 Georgia Institute
More informationThe Effect of Packet Loss on Redundancy Elimination in Cellular Wireless Networks
The Effect of Packet Loss on Redundancy Elimination in Cellular Wireless Networks Cristian Lumezanu Georgia Tech lume@cc.gatech.edu Katherine Guo Alcatel-Lucent Bell Laboratories kguo@bell-labs.com Bobby
More informationHTTP-Level Deduplication with HTML5
HTTP-Level Deduplication with HTML5 Franziska Roesner and Ivayla Dermendjieva Networks Class Project, Spring 2010 Abstract In this project, we examine HTTP-level duplication. We first report on our initial
More informationWide-area Network Acceleration for the Developing World. Sunghwan Ihm (Princeton) KyoungSoo Park (KAIST) Vivek S. Pai (Princeton)
Wide-area Network Acceleration for the Developing World Sunghwan Ihm (Princeton) KyoungSoo Park (KAIST) Vivek S. Pai (Princeton) POOR INTERNET ACCESS IN THE DEVELOPING WORLD Internet access is a scarce
More informationLIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
More informationDistributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014
Distributed Systems 25. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2014 November 16, 2014 2014 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
More informationA Systemfor Scanning Traffic Detection in 3G WCDMA Network
2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore A Systemfor Scanning Traffic Detection in 3G WCDMA Network Sekwon Kim +, Joohyung Oh and Chaetae Im Advanced Technology
More informationEE6390. Fall 1999. Research Report. Mobile IP in General Packet Radio System
EE6390 Introduction to Wireless Communications Systems Fall 1999 Research Report Mobile IP in General Packet Radio System Kelvin K. W. Wong Ramzi Hamati Date: Dec. 6, 1999 1.0 Abstract Tunneling is one
More informationTCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the
More informationTHe exponential growth of mobile data traffic has led
1 Chunk and Object Level Deduplication for Web Optimization: A Hybrid Approach Ioannis Papapanagiotou, Student Member, IEEE, Robert D. Callaway, Member, IEEE, and Michael Devetsikiotis, Fellow, IEEE Abstract
More informationInference and Performance Evaluation of Cellular Data Networks through End-to-End Measurements
Inference and Performance Evaluation of Cellular Data Networks through End-to-End Measurements Wei Wei, Chun Zhang, Hui Zang, Jim Kurose, Don Towsley Department of Computer Science University of Massachusetts,
More informationTCP Westwood for Wireless
TCP Westwood for Wireless מבוא רקע טכני בקרת עומס ב- TCP TCP על קשר אלחוטי שיפור תפוקה עם פרוטוקול TCP Westwood סיכום.1.2.3.4.5 Seminar in Computer Networks and Distributed Systems Hadassah College Spring
More informationNetwork Monitoring - A Practical Experience
Experiences with a Multi-Protocol network monitor Andrew Moore Intel Research Fellow Computer Laboratory University of Cambridge In collaboration with: Ian Pratt, Jon Crowcroft, James Hall, Tim Granger,
More informationDistributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
More informationHybrid Cloud Storage System. Oh well, I will write the report on May1 st
Project 2 Hybrid Cloud Storage System Project due on May 1 st (11.59 EST) Start early J : We have three graded milestones Milestone 1: demo part 1 by March 29 th Milestone 2: demo part 2 by April 12 th
More informationWhat s New in VMware vsphere 5.5 Networking
VMware vsphere 5.5 TECHNICAL MARKETING DOCUMENTATION Table of Contents Introduction.................................................................. 3 VMware vsphere Distributed Switch Enhancements..............................
More informationQuickSync: Improving Synchronization Efficiency for Mobile Cloud Storage Services
QuickSync: Improving Synchronization Efficiency for Mobile Cloud Storage Services Xin Wang Department of Electrical and Computer Engineering Stony Brook University Stony Brook, New York, USA xwang@ece.sunysb.edu
More informationSTeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Enhancing Performance Test Strategy for Mobile Applications
STeP-IN SUMMIT 2013 10 th International Conference on Software Testing June 18 21, 2013 at Bangalore, INDIA Enhancing Performance Test Strategy for Mobile Applications by Nikita Kakaraddi, Technical Lead,
More informationRedefining Backup for VMware Environment. Copyright 2009 EMC Corporation. All rights reserved.
Redefining Backup for VMware Environment 1 Agenda VMware infrastructure backup and recovery challenges Introduction to EMC Avamar Avamar solutions for VMware infrastructure Key takeaways Copyright 2009
More informationTCP in Wireless Networks
Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems
More informationOn the Performance of Redundant Traffic Elimination in WLANs
On the Performance of Redundant Traffic Elimination in WLANs Emir Halepovic, Majid Ghaderi and Carey Williamson Department of Computer Science University of Calgary, Calgary, AB, Canada Email: {emirh,
More informationPrediction System for Reducing the Cloud Bandwidth and Cost
ISSN (e): 2250 3005 Vol, 04 Issue, 8 August 2014 International Journal of Computational Engineering Research (IJCER) Prediction System for Reducing the Cloud Bandwidth and Cost 1 G Bhuvaneswari, 2 Mr.
More informationSteelcape Product Overview and Functional Description
Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session
More informationMobile Performance Testing Approaches and Challenges
NOUS INFOSYSTEMS LEVERAGING INTELLECT Mobile Performance Testing Approaches and Challenges ABSTRACT Mobile devices are playing a key role in daily business functions as mobile devices are adopted by most
More informationDistributed Systems 19. Content Delivery Networks (CDN) Paul Krzyzanowski pxk@cs.rutgers.edu
Distributed Systems 19. Content Delivery Networks (CDN) Paul Krzyzanowski pxk@cs.rutgers.edu 1 Motivation Serving web content from one location presents problems Scalability Reliability Performance Flash
More informationMultihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
More informationSource-domain DDoS Prevention
bhattacharjee, LTS S 05 Page: 0 Source-domain DDoS Prevention Bobby Bhattacharjee Christopher Kommareddy Mark Shayman Dave Levin Richard La Vahid Tabatabaee University of Maryland bhattacharjee, LTS S
More informationA super-aggregation strategy for multi-homed mobile hosts with heterogeneous wireless interfaces
DOI 10.1007/s11276-014-0794-y A super-aggregation strategy for multi-homed mobile hosts with heterogeneous wireless interfaces Cheng-Lin Tsao Shruti Sanadhya Raghupathy Sivakumar Ó Springer Science+Business
More informationContent Delivery Networks
Content Delivery Networks Terena 2000 ftp://ftpeng.cisco.com/sgai/t2000cdn.pdf Silvano Gai Cisco Systems, USA Politecnico di Torino, IT sgai@cisco.com Terena 2000 1 Agenda What are Content Delivery Networks?
More informationIntroduction to Network Security Lab 1 - Wireshark
Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication
More informationMobile Computing/ Mobile Networks
Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple
More informationMetadata Feedback and Utilization for Data Deduplication Across WAN
Zhou B, Wen JT. Metadata feedback and utilization for data deduplication across WAN. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 31(3): 604 623 May 2016. DOI 10.1007/s11390-016-1650-6 Metadata Feedback
More informationSiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
More informationMEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect ashutosh_shinde@hotmail.com Validating if the workload generated by the load generating tools is applied
More informationLimitations of Packet Measurement
Limitations of Packet Measurement Collect and process less information: Only collect packet headers, not payload Ignore single packets (aggregate) Ignore some packets (sampling) Make collection and processing
More informationImprovement of Network Optimization and Cost Reduction in End To End Process Implementing in Clouds
Improvement of Network Optimization and Cost Reduction in End To End Process Implementing in Clouds A. Sree Valli 1, R. Chandrasekhar 2 PG Scholar, Department of C.S.E, KIET College, JNTUK A.P 1 Assistant
More informationDistributed Systems. 24. Content Delivery Networks (CDN) 2013 Paul Krzyzanowski. Rutgers University. Fall 2013
Distributed Systems 24. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2013 November 27, 2013 2013 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
More informationIntroduction to Mobile Performance Testing
Introduction to Mobile Performance Testing Shlomi Zalma, Wilson Mar DT3338 at Noon, June 13, 2013 HOL330 in Sands 305 Why performance test mobile apps? Mobile apps are now: how customers locate stores
More informationMeasured Performance of GSM HSCSD and GPRS
Measured Performance of GSM HSCSD and Jouni Korhonen Olli Aalto Andrei Gurtov Heimo Laamanen Sonera Corporation P.O.Box 97 51 Helsinki, Finland Abstract In this paper we present results of measurements
More informationUiO1 Web performance in practice Why we are waiting? Ten years after
UiO1 Web performance in practice Why we are waiting? Ten years after Responsible: Matti Siekkinen, University of Oslo, siekkine@ifi.uio.no The objective of this assignment is to find out why do we wait
More informationApplications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
More informationOverview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
More information5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network
5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:
More informationDeduplication Demystified: How to determine the right approach for your business
Deduplication Demystified: How to determine the right approach for your business Presented by Charles Keiper Senior Product Manager, Data Protection Quest Software Session Objective: To answer burning
More informationAn Overview of Amazon Silk Amazon s new cloud-powered browser
An Overview of Amazon Silk Amazon s new cloud-powered browser Jon Jenkins Twitter - @jonjenk jjenkin@amazon.com O Reilly Velocity EU November 8, 2011 Web Page Complexity is Steadily Increasing Amazon s
More informationCOMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
More informationUnderstanding Enterprise NAS
Anjan Dave, Principal Storage Engineer LSI Corporation Author: Anjan Dave, Principal Storage Engineer, LSI Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA
More informationBuilding a High Performance Deduplication System Fanglu Guo and Petros Efstathopoulos
Building a High Performance Deduplication System Fanglu Guo and Petros Efstathopoulos Symantec Research Labs Symantec FY 2013 (4/1/2012 to 3/31/2013) Revenue: $ 6.9 billion Segment Revenue Example Business
More informationReducing Replication Bandwidth for Distributed Document Databases
Reducing Replication Bandwidth for Distributed Document Databases Lianghong Xu 1, Andy Pavlo 1, Sudipta Sengupta 2 Jin Li 2, Greg Ganger 1 Carnegie Mellon University 1, Microsoft Research 2 #1 You can
More informationFollowing statistics will show you the importance of mobile applications in this smart era,
www.agileload.com There is no second thought about the exponential increase in importance and usage of mobile applications. Simultaneously better user experience will remain most important factor to attract
More informationProtecting Mobile Devices From TCP Flooding Attacks
Protecting Mobile Devices From TCP Flooding Attacks Yogesh Swami % and Hannes Tschofenig* % Nokia Research Center, Palo Alto, CA, USA. * Siemens Corporate Technology, Munich, DE. 1 Motivation Anatomy of
More informationUKCMG Industry Forum November 2006
UKCMG Industry Forum November 2006 Capacity and Performance Management of IP Networks Using IP Flow Measurement Agenda Challenges of capacity and performance management of IP based networks What is IP
More informationTransport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
More informationMulti-level Metadata Management Scheme for Cloud Storage System
, pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1
More informationKey Components of WAN Optimization Controller Functionality
Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications
More informationMiddleboxes. Firewalls. Internet Ideal: Simple Network Model. Internet Reality. Middleboxes. Firewalls. Globally unique idenpfiers
Ideal: Simple Network Model Middleboxes Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 hgp://www.cs.princeton.edu/courses/archive/spr12/cos461/ Globally unique
More informationData Reduction: Deduplication and Compression. Danny Harnik IBM Haifa Research Labs
Data Reduction: Deduplication and Compression Danny Harnik IBM Haifa Research Labs Motivation Reducing the amount of data is a desirable goal Data reduction: an attempt to compress the huge amounts of
More informationTeridion. Rethinking Network Performance. The Internet. Lightning Fast. Technical White Paper July, 2015 www.teridion.com
Teridion The Internet. Lightning Fast. Rethinking Network Performance Technical White Paper July, 2015 www.teridion.com Executive summary Online services face the growing dual challenge of supporting many
More informationnetworks Live & On-Demand Video Delivery without Interruption Wireless optimization the unsolved mystery WHITE PAPER
Live & On-Demand Video Delivery without Interruption Wireless optimization the unsolved mystery - Improving the way the world connects - WHITE PAPER Live On-Demand Video Streaming without Interruption
More informationTesting & Assuring Mobile End User Experience Before Production. Neotys
Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,
More informationHitachi Content Platform (HCP)
Copyright 2014 A*STAR Version 1.0 Hitachi Content Platform (HCP) HCP and HCP Anywhere Features Evaluation THIS DOCUMENT AND THE INFORMATION CONTAINED HEREIN IS PROVIDED ON AN "AS IS" BASIS WITHOUT ANY
More informationBirdstep Intelligent Mobile IP Client v2.0, Universal Edition. Seamless secure mobility across all networks. Copyright 2002 Birdstep Technology ASA
White Paper Birdstep Intelligent Mobile IP Client v2.0, Universal Edition Seamless secure mobility across all networks Copyright 2002 Birdstep Technology ASA Haakon VII's gate 5B, N-0161 Oslo, Norway Tel:
More informationMobile Application Performance
Mobile Application Performance Tips & Tricks to Significantly Boost App Performance Ray Bennett Director, Microstrategy - Mobile Service Line 11km/s (7mps) Escape Velocity Performance Definition What is
More informationCHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
More informationLecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)
Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationJXTA TM : Beyond P2P File Sharing the Emergence of Knowledge Addressable Networks
JXTA TM : Beyond P2P File Sharing the Emergence of Knowledge Addressable Networks Bernard Traversat tra@jxta.org JXTA Chief Architect Sun Microsystems 2005 JavaOne SM Conference Session 7208 Extended and
More informationFrequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
More informationAn enhanced TCP mechanism Fast-TCP in IP networks with wireless links
Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,
More informationMobile Communications Chapter 9: Mobile Transport Layer
Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery
More informationDenial of Service Attacks and Resilient Overlay Networks
Denial of Service Attacks and Resilient Overlay Networks Angelos D. Keromytis Network Security Lab Computer Science Department, Columbia University Motivation: Network Service Availability Motivation:
More informationHP StoreOnce & Deduplication Solutions Zdenek Duchoň Pre-sales consultant
DISCOVER HP StoreOnce & Deduplication Solutions Zdenek Duchoň Pre-sales consultant HP StorageWorks Data Protection Solutions HP has it covered Near continuous data protection Disk Mirroring Advanced Backup
More information3Gen Data Deduplication Technical
3Gen Data Deduplication Technical Discussion NOTICE: This White Paper may contain proprietary information protected by copyright. Information in this White Paper is subject to change without notice and
More informationInternet Ideal: Simple Network Model
Middleboxes Reading: Ch. 8.4 Internet Ideal: Simple Network Model Globally unique identifiers Each node has a unique, fixed IP address reachable from everyone and everywhere Simple packet forwarding Network
More informationHyper-converged IT drives: - TCO cost savings - data protection - amazing operational excellence
Hyper-converged IT drives: - TCO cost savings - data protection - amazing operational excellence Sebastian Nowicki SimpliVity is one of the biggest innovations in enterprise computing since ware. ~John
More informationIntroducing the Microsoft IIS deployment guide
Deployment Guide Deploying Microsoft Internet Information Services with the BIG-IP System Introducing the Microsoft IIS deployment guide F5 s BIG-IP system can increase the existing benefits of deploying
More informationNetwork Virtualization as Architecture and Its Applications. University of Tokyo/NICT Aki NAKAO. IETF 2009-ISOC Aki NAKAO
Network Virtualization as Architecture and Its Applications University of Tokyo/NICT Aki NAKAO 1 Research Activity on Future Internet PSTN JGN Strategic advancement of R&D by collaboration of industry,
More informationBarracuda Backup Deduplication. White Paper
Barracuda Backup Deduplication White Paper Abstract Data protection technologies play a critical role in organizations of all sizes, but they present a number of challenges in optimizing their operation.
More informationAn Overview of Multipath TCP
An Overview of Multipath TCP Olivier Bonaventure, Mark Handley, and Costin Raiciu Olivier Bonaventure is a Professor at Catholic University of Louvain, Belgium. His research focus is primarily on Internet
More informationAdministrivia. CSMA/CA: Recap. Mobility Management. Mobility Management. Channel Partitioning, Random Access and Scheduling
Administrivia No lecture on Thurs. Last work will be out this week (not due, covers wireless) Extra office hours for next week and the week after. Channel Partitioning, Random Access and Scheduling Channel
More informationSingle Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications
Single Pass Load Balancing with Session Persistence in IPv6 Network C. J. (Charlie) Liu Network Operations Charter Communications Load Balancer Today o Load balancing is still in use today. It is now considered
More informationTCP PACKET CONTROL FOR WIRELESS NETWORKS
TCP PACKET CONTROL FOR WIRELESS NETWORKS by Wan Gang Zeng B. Sc. in Computer Science, University of Ottawa, 2000 THESIS SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE
More informationOn Effectively Exploiting Multiple Wireless Interfaces in Mobile Hosts
On Effectively Exploiting Multiple Wireless Interfaces in Mobile Hosts Cheng-Lin Tsao and Raghupathy Sivakumar School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta, GA
More informationConcept of Cache in web proxies
Concept of Cache in web proxies Chan Kit Wai and Somasundaram Meiyappan 1. Introduction Caching is an effective performance enhancing technique that has been used in computer systems for decades. However,
More informationTCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
More information12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
More informationPerformance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au
More informationUsing Steelhead Appliances and Stingray Aptimizer to Accelerate Microsoft SharePoint WHITE PAPER
Using Steelhead Appliances and Stingray Aptimizer to Accelerate Microsoft SharePoint WHITE PAPER Introduction to Faster Loading Web Sites A faster loading web site or intranet provides users with a more
More informationDetection of illegal gateways in protected networks
Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia firstname.lastname@ccdcoe.org 1. Introduction In this
More informationAnatomizing Application Performance Differences on Smartphones
Anatomizing Application Performance Differences on Smartphones Junxian Huang University of Michigan hjx@eecs.umich.edu Z. Morley Mao University of Michigan zmao@eecs.umich.edu Qiang Xu University of Michigan
More informationInference and Evaluation of Split-Connection Approaches in Cellular Data Networks
Inference and Evaluation of Split-Connection Approaches in Cellular Data Networks Wei Wei 1, Chun Zhang 1, Hui Zang 2, Jim Kurose 1, and Don Towsley 1 1 Department of Computer Science, University of Massachusetts,
More informationCloud Backup and Recovery for Endpoint Devices
Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,
More informationMaximize Your Virtual Environment Investment with EMC Avamar. Rob Emsley Senior Director, Product Marketing
1 Maximize Your Virtual Environment Investment with EMC Avamar Rob Emsley Senior Director, Product Marketing 2 Private Cloud is the Vision Virtualized Data Center Internal Cloud Trusted Flexible Control
More informationA Virtual Filer for VMware s Virtual SAN A Maginatics and VMware Joint Partner Brief
A Virtual Filer for VMware s Virtual SAN A Maginatics and VMware Joint Partner Brief With the massive growth of unstructured data in today s enterprise environments, storage IT administrators are constantly
More informationCEMEX en Concreto con EMC. Jose Luis Bedolla EMC Corporation Back Up Recovery and Archiving
CEMEX en Concreto con EMC Jose Luis Bedolla EMC Corporation Back Up Recovery and Archiving 1 Agenda Cemex Challenges Avamar Overview Solution for Cemex Consulting Approach Solution Description Solution
More informationRecent Issues in Software Testing: Part B
Recent Issues in Software Testing: Part B W. Eric Wong Department of Computer Science The University of Texas at Dallas ewong@utdallas.edu http://www.utdallas.edu/~ewong Recent Issues in Software Testing
More informationTCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
More informationNSW Government. Wireless services (WiFi) Standard
NSW Government Wireless services (WiFi) Standard May 2014 CONTENTS 1. CONTEXT 2 1.1. Background 2 1.2. Purpose 2 1.3. Scope and application 2 2. STANDARDS GOVERNANCE 2 2.1. Standards to support the ICT
More informationResource Pooling across the Internet. Mark Handley, UCL
Resource Pooling across the Internet Mark Handley, UCL Resource Pooling Make a network's resources behave like a single pooled resource. Aim is to increase reliability, flexibility and efficiency. Method
More informationHit Hanan & Faisal Faruqi Nexscience
Leveraging Mobile Technology for Oracle Databases Management Hit Hanan & Faisal Faruqi Nexscience Mobile Market.. The total number of PCs will reach 1.78 billion in three years, while the number of smart
More information