Asymmetric Caching: Improved Network Deduplication for Mobile Devices

Size: px
Start display at page:

Download "Asymmetric Caching: Improved Network Deduplication for Mobile Devices"

Transcription

1 Asymmetric Caching: Improved Network Deduplication for Mobile Devices ShrutiSanadhya, 1 RaghupathySivakumar, 1 Kyu-Han Kim, 2 Paul Congdon, 2 SriramLakshmanan, 1 JatinderP Singh 3 1 Georgia Institute of Technology, Atlanta, GA, USA 2 HP Labs, Palo Alto, CA, USA 3 Xerox PARC, Palo Alto, CA, USA 1

2 Introduction Network traffic has a lot of redundancy 20% HTTP content accessed on smartphonesis redundant 1 Network deduplication(dedup) leverages this redundancy to conserve network bandwidth Regular Cache Mobile Cache C2 Mobile Sender Dedup Source SGSN Dedup Destination Receiver Rabin Fingerprinting C1 C 2 C3 Hashing H1 H3 Compress C1 C3 C1 C 2 C3 Inflate packet C1 C3 1 Qianet al,, Web Caching on Smartphones: Ideal vs. Reality, MobiSys2012 2

3 The Asymmetry Problem What happens when the mobile cache is more populated than the cache at dedup source? Regular Cache H3 C3 H4 C4 H5 C5 H6 C6 Mobile H7 C7 Cache H8 C8 C2 Mobile Cache Sender Dedup Source Dedup Destination Receiver How can all the past cached information at the mobile be successfully leveraged for dedup by any given dedup source? 3

4 Motivational Scenarios Multi-homed devices Cache WiFi Access Point Cache Mobile Device Cache 3G Base Station (BS) 4

5 Motivational Scenarios Multi-homed devices Resource pooling Cache Mobile Device BS BS RNC RNC BS: Base Station RNC: Radio Network Controller SGSN: Serving GPRS Support Node Cache Cache SGSN SGSN 5

6 Multi-homed devices Resource pooling Memory scalability Cache Motivational Scenarios Cache RNC Cache BS SGSN Cache BS: Base Station RNC: Radio Network Controller SGSN: Serving GPRS Support Node 6

7 Scope and Goals Scope Laptops/smartphones using 3G/WiFi Conserving cellular bandwidth Downstream and unencrypted traffic Goals Overall efficiency: Using downstream andupstream more efficiently Application agnostic: Applicable to any application Limited overheads: Deployable computational and memory complexities 7

8 Asymmetric Caching -Overview Regular Cache Feedback Cache H4 H3 C3 H4 C4 H5 C5 C2 Mobile Cache Sender Dedup Source Feedback Dedup Destination Receiver Mobile cache is more populated than dedup source On receiving downstream traffic, the mobile selectively advertises portions of its cache to dedup source Dedup source also maintains a feedback cache Both regular and feedback cache is used for dedup 8

9 When is feedback sent? Feedback is sent reactively Feedback is sent only when there is downstream traffic Feedback sent is specific to the ongoing traffic Downstream traffic Dedup Source Dedup Destination Feedback 9

10 Where from is feedback selected? Hashes at dedup destination can be organized as per: Order of arrival H1 H3 H4 H5 H6 H7 H8 H9 H10 Same flow (SrcIP, DestIP, SrcPort, DestPort ) H1 H6 H3 H4 H5 H7 H8 H9 H10 Same object (HTML, JPEG or CSS) H1 H6 H7 H3 H4 H9 H10 H8 H5 Objects help in effectively matching new and old content Application agnostic estimate of objects are flowlets 10

11 How are flowlets extracted? Sequence of bytes in a flow is a time-series Flowlets are piecewise stationary segments of a flow Check for flowlet boundary at start of each packet Consider byte series B [0:m] (1 st packet), B [m+1:n] (2 nd packet) and B [0:n] as autoregressive processes of order p: B [0:m] B i = Σ 1<=j<=p a i B i-j + σε, εis white noise d [0:m:n] = gain(b [0:n] ) gain(b [0:m] ) gain(b [m+1:n] ) B 0, B 1,.., B m, B m+1,, B n B [0:n] Gain in the noise power when B [0:n] is in one flowlet instead of different flowlets: B [0:m] and B [m+1:n] If d [0:m:n] > d thresh, then flowlet boundary exists at m B [m+1:n] 11

12 How is feedback selected? Find best matching past flowlet 12

13 How is feedback selected? Find best matching past flowlet H1 13

14 How is feedback selected? Find best matching past flowlet H1 H1 F1, F3 F1, F2, F3 14

15 How is feedback selected? Find best matching past flowlet H1 F1:H1,, H4, H5, H6, H7, H8, H9, H10, H11, H12,. H1 F1, F3 F1, F2, F3 F2:, H5, H10,. F3: H5, H8, H11, H12,.. Last hash matched 15

16 How is feedback selected? Find best matching past flowlet H1 F1:H1,, H4, H5, H6, H7, H8, H9, H10, H11, H12,. H1 F1, F3 F1, F2, F3 F2:, H5, H10,. F3: H5, H8, H11, H12,.. Last hash matched 16

17 How is feedback selected? Find best matching past flowlet H1 F1:H1,, H4, H5, H6, H7, H8, H9, H10, H11, H12,. H1 F1, F3 F1, F2, F3 F2:, H5, H10,. F3: H5, H8, H11, H12,.. Flowlet 1 (F1) is best matched Last hash matched 17

18 How is feedback selected? Find best matching past flowlet H1 F1:H1,, H4, H5, H6, H7, H8, H9, H10, H11, H12,. H1 F1, F3 F1, F2, F3 F2:, H5, H10,. F3: H5, H8, H11, H12,.. Flowlet 1 (F1) is best matched Last hash matched Find start of next feedback in the best matching flowlet 18

19 How is feedback selected? Find best matching past flowlet H1 F1:H1,, H4, H5, H6, H7, H8, H9, H10, H11, H12,. H1 F1, F3 F1, F2, F3 F2:, H5, H10,. F3: H5, H8, H11, H12,.. Flowlet 1 (F1) is best matched Last hash matched Find start of next feedback in the best matching flowlet Best matching past flowlet H1,, H4, H5, H6,H7, H8, H9,H10, H11, H12, H13, 19

20 How is feedback selected? Find best matching past flowlet H1 F1:H1,, H4, H5, H6, H7, H8, H9, H10, H11, H12,. H1 F1, F3 F1, F2, F3 F2:, H5, H10,. F3: H5, H8, H11, H12,.. Flowlet 1 (F1) is best matched Last hash matched Find start of next feedback in the best matching flowlet Best matching past flowlet H1,, H4, H5, H6,H7, H8, H9,H10, H11, H12, H13, Last hash matched 20

21 How is feedback selected? Find best matching past flowlet H1 F1:H1,, H4, H5, H6, H7, H8, H9, H10, H11, H12,. H1 F1, F3 F1, F2, F3 F2:, H5, H10,. F3: H5, H8, H11, H12,.. Flowlet 1 (F1) is best matched Last hash matched Find start of next feedback in the best matching flowlet Best matching past flowlet H1,, H4, H5, H6,H7, H8, H9,H10, H11, H12, H13, Last hash matched Last hash advertised 21

22 How is feedback selected? Find best matching past flowlet H1 H1 Flowlet 1 (F1) is best matched Last hash matched Find start of next feedback in the best matching flowlet Best matching past flowlet F1, F3 F1, F2, F3 δ: temporal offset H1,, H4, H5, H6,H7, H8, H9,H10, H11, H12, H13, Last hash matched F1:H1,, H4, H5, H6, H7, H8, H9, H10, H11, H12,. F2:, H5, H10,. F3: H5, H8, H11, H12,.. Last hash advertised δ 22

23 How is feedback selected? Find best matching past flowlet H1 H1 Flowlet 1 (F1) is best matched Last hash matched Find start of next feedback in the best matching flowlet Best matching past flowlet F1, F3 F1, F2, F3 δ: temporal offset H1,, H4, H5, H6,H7, H8, H9,H10, H11, H12, H13, Last hash matched F1:H1,, H4, H5, H6, H7, H8, H9, H10, H11, H12,. F2:, H5, H10,. F3: H5, H8, H11, H12,.. Last hash advertised δ Start of next feedback 23

24 How is the feedback used? Regular Cache Feedback Cache Dedup Source Dedup source maintains a feedback cache along with regular cache of baseline dedup 24

25 How is the feedback used? Regular Cache H1 Feedback Cache Dedup Source Dedup source maintains a feedback cache along with regular cache of baseline dedup Regular cache is populated by downstream data 25

26 How is the feedback used? Regular Cache H1 Feedback Cache Dedup Source Dedup source maintains a feedback cache along with regular cache of baseline dedup Regular cache is populated by downstream data 26

27 How is the feedback used? Regular Cache H1 Feedback Cache H3 H4 Dedup Source Dedup source maintains a feedback cache along with regular cache of baseline dedup Regular cache is populated by downstream data Feedback hashes are inserted in feedback cache 27

28 How is the feedback used? Regular Cache H1 Feedback Cache H3 H4 Dedup Source Dedup source maintains a feedback cache along with regular cache of baseline dedup Regular cache is populated by downstream data Feedback hashes are inserted in feedback cache Every downstream packet is dedupedusing both regular and feedback cache 28

29 Design Summary When is the feedback sent? Where from is the feedback chosen? How are flowlets extracted? How is the feedback selected? How is the feedback used? Reactively Flowlets at dedup destination Stationarity properties Best matching flowlet and pointers in past flowlet Stored in the feedback cache for dedup 29

30 Trace Based Analysis Data collection 25 laptop and 5 smartphoneusers over 3 months giving 26GB of unsecured downlink data WiFias well as 3G network Packet sniffing through Wireshark and Tcpdump Trace analysis Custom analyzer implemented in Python Mimic mobility by splitting trace into two halves: past and present Past trace populates the initial cache at the dedup destination This is the data remembered from previous networks access 30 random connections from the present create ongoing traffic Dedup is performed using asymmetric caching 30

31 Trace Analysis Results -I Redundancy identified # Redundant bytes found by asymmetric caching Actual # redundant bytes x 100 Average asymmetriccaching Average symmetriccaching Asymmetric caching leverages significant portion of the achievable redundancy 31

32 Trace Analysis Results -II Feedback efficiency # Bytes saved downstream # Bytes sent upstream Split of total hits across the caches at dedup source Asymmetric caching generates efficient and relevant feedback 32

33 Related Work Network layer approaches Spring et al, A protocol-independent technique for eliminating redundant network traffic. SIGCOMM, Aggarwalet al, EndRE: an end-system redundancy elimination service for enterprises. NSDI, Shenet al, REfactor-ingcontent overhearing to improve wireless performance. MobiCom, 2011 Transport layer approaches Zoharet al, The power of prediction: cloud bandwidth and cost reduction, SIGCOMM 2011 Application layer approaches Web browser caches and proxies Content Distribution Networks (CDNs) 33

34 Conclusion and Future Work A dedup strategy that leverages past remembered on mobile devices to perform dedup at any dedup source Application agnostically estimate different objects in a flow byusing stationarity properties of different content Trace analysis of 30 users shows that asymmetric caching: Leverages 89% of achievable redundancy Gives 6x feedback efficiency Prototype implementation on Linux desktop and Android smartphone with deployable overheads Future Work: Upstream dedup, i.e. reduce redundant content sent upstream Extending dedup to end-to-end encrypted traffic Study energy impact of asymmetric caching on mobile devices 34

35 Questions? 35

Asymmetric Caching: Improved Network Deduplication for Mobile Devices

Asymmetric Caching: Improved Network Deduplication for Mobile Devices Asymmetric Caching: Improved Network Deduplication for Mobile Devices Shruti Sanadhya, 1 Raghupathy Sivakumar, 1 Kyu-Han Kim, 2 Paul Congdon, 2 Sriram Lakshmanan, 1 Jatinder Pal Singh 3 1 Georgia Institute

More information

The Effect of Packet Loss on Redundancy Elimination in Cellular Wireless Networks

The Effect of Packet Loss on Redundancy Elimination in Cellular Wireless Networks The Effect of Packet Loss on Redundancy Elimination in Cellular Wireless Networks Cristian Lumezanu Georgia Tech lume@cc.gatech.edu Katherine Guo Alcatel-Lucent Bell Laboratories kguo@bell-labs.com Bobby

More information

HTTP-Level Deduplication with HTML5

HTTP-Level Deduplication with HTML5 HTTP-Level Deduplication with HTML5 Franziska Roesner and Ivayla Dermendjieva Networks Class Project, Spring 2010 Abstract In this project, we examine HTTP-level duplication. We first report on our initial

More information

Wide-area Network Acceleration for the Developing World. Sunghwan Ihm (Princeton) KyoungSoo Park (KAIST) Vivek S. Pai (Princeton)

Wide-area Network Acceleration for the Developing World. Sunghwan Ihm (Princeton) KyoungSoo Park (KAIST) Vivek S. Pai (Princeton) Wide-area Network Acceleration for the Developing World Sunghwan Ihm (Princeton) KyoungSoo Park (KAIST) Vivek S. Pai (Princeton) POOR INTERNET ACCESS IN THE DEVELOPING WORLD Internet access is a scarce

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014 Distributed Systems 25. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2014 November 16, 2014 2014 Paul Krzyzanowski 1 Motivation Serving web content from one location presents

More information

A Systemfor Scanning Traffic Detection in 3G WCDMA Network

A Systemfor Scanning Traffic Detection in 3G WCDMA Network 2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore A Systemfor Scanning Traffic Detection in 3G WCDMA Network Sekwon Kim +, Joohyung Oh and Chaetae Im Advanced Technology

More information

EE6390. Fall 1999. Research Report. Mobile IP in General Packet Radio System

EE6390. Fall 1999. Research Report. Mobile IP in General Packet Radio System EE6390 Introduction to Wireless Communications Systems Fall 1999 Research Report Mobile IP in General Packet Radio System Kelvin K. W. Wong Ramzi Hamati Date: Dec. 6, 1999 1.0 Abstract Tunneling is one

More information

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the

More information

THe exponential growth of mobile data traffic has led

THe exponential growth of mobile data traffic has led 1 Chunk and Object Level Deduplication for Web Optimization: A Hybrid Approach Ioannis Papapanagiotou, Student Member, IEEE, Robert D. Callaway, Member, IEEE, and Michael Devetsikiotis, Fellow, IEEE Abstract

More information

Inference and Performance Evaluation of Cellular Data Networks through End-to-End Measurements

Inference and Performance Evaluation of Cellular Data Networks through End-to-End Measurements Inference and Performance Evaluation of Cellular Data Networks through End-to-End Measurements Wei Wei, Chun Zhang, Hui Zang, Jim Kurose, Don Towsley Department of Computer Science University of Massachusetts,

More information

TCP Westwood for Wireless

TCP Westwood for Wireless TCP Westwood for Wireless מבוא רקע טכני בקרת עומס ב- TCP TCP על קשר אלחוטי שיפור תפוקה עם פרוטוקול TCP Westwood סיכום.1.2.3.4.5 Seminar in Computer Networks and Distributed Systems Hadassah College Spring

More information

Network Monitoring - A Practical Experience

Network Monitoring - A Practical Experience Experiences with a Multi-Protocol network monitor Andrew Moore Intel Research Fellow Computer Laboratory University of Cambridge In collaboration with: Ian Pratt, Jon Crowcroft, James Hall, Tim Granger,

More information

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents

More information

Hybrid Cloud Storage System. Oh well, I will write the report on May1 st

Hybrid Cloud Storage System. Oh well, I will write the report on May1 st Project 2 Hybrid Cloud Storage System Project due on May 1 st (11.59 EST) Start early J : We have three graded milestones Milestone 1: demo part 1 by March 29 th Milestone 2: demo part 2 by April 12 th

More information

What s New in VMware vsphere 5.5 Networking

What s New in VMware vsphere 5.5 Networking VMware vsphere 5.5 TECHNICAL MARKETING DOCUMENTATION Table of Contents Introduction.................................................................. 3 VMware vsphere Distributed Switch Enhancements..............................

More information

QuickSync: Improving Synchronization Efficiency for Mobile Cloud Storage Services

QuickSync: Improving Synchronization Efficiency for Mobile Cloud Storage Services QuickSync: Improving Synchronization Efficiency for Mobile Cloud Storage Services Xin Wang Department of Electrical and Computer Engineering Stony Brook University Stony Brook, New York, USA xwang@ece.sunysb.edu

More information

STeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Enhancing Performance Test Strategy for Mobile Applications

STeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Enhancing Performance Test Strategy for Mobile Applications STeP-IN SUMMIT 2013 10 th International Conference on Software Testing June 18 21, 2013 at Bangalore, INDIA Enhancing Performance Test Strategy for Mobile Applications by Nikita Kakaraddi, Technical Lead,

More information

Redefining Backup for VMware Environment. Copyright 2009 EMC Corporation. All rights reserved.

Redefining Backup for VMware Environment. Copyright 2009 EMC Corporation. All rights reserved. Redefining Backup for VMware Environment 1 Agenda VMware infrastructure backup and recovery challenges Introduction to EMC Avamar Avamar solutions for VMware infrastructure Key takeaways Copyright 2009

More information

TCP in Wireless Networks

TCP in Wireless Networks Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems

More information

On the Performance of Redundant Traffic Elimination in WLANs

On the Performance of Redundant Traffic Elimination in WLANs On the Performance of Redundant Traffic Elimination in WLANs Emir Halepovic, Majid Ghaderi and Carey Williamson Department of Computer Science University of Calgary, Calgary, AB, Canada Email: {emirh,

More information

Prediction System for Reducing the Cloud Bandwidth and Cost

Prediction System for Reducing the Cloud Bandwidth and Cost ISSN (e): 2250 3005 Vol, 04 Issue, 8 August 2014 International Journal of Computational Engineering Research (IJCER) Prediction System for Reducing the Cloud Bandwidth and Cost 1 G Bhuvaneswari, 2 Mr.

More information

Steelcape Product Overview and Functional Description

Steelcape Product Overview and Functional Description Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session

More information

Mobile Performance Testing Approaches and Challenges

Mobile Performance Testing Approaches and Challenges NOUS INFOSYSTEMS LEVERAGING INTELLECT Mobile Performance Testing Approaches and Challenges ABSTRACT Mobile devices are playing a key role in daily business functions as mobile devices are adopted by most

More information

Distributed Systems 19. Content Delivery Networks (CDN) Paul Krzyzanowski pxk@cs.rutgers.edu

Distributed Systems 19. Content Delivery Networks (CDN) Paul Krzyzanowski pxk@cs.rutgers.edu Distributed Systems 19. Content Delivery Networks (CDN) Paul Krzyzanowski pxk@cs.rutgers.edu 1 Motivation Serving web content from one location presents problems Scalability Reliability Performance Flash

More information

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007 Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?

More information

Source-domain DDoS Prevention

Source-domain DDoS Prevention bhattacharjee, LTS S 05 Page: 0 Source-domain DDoS Prevention Bobby Bhattacharjee Christopher Kommareddy Mark Shayman Dave Levin Richard La Vahid Tabatabaee University of Maryland bhattacharjee, LTS S

More information

A super-aggregation strategy for multi-homed mobile hosts with heterogeneous wireless interfaces

A super-aggregation strategy for multi-homed mobile hosts with heterogeneous wireless interfaces DOI 10.1007/s11276-014-0794-y A super-aggregation strategy for multi-homed mobile hosts with heterogeneous wireless interfaces Cheng-Lin Tsao Shruti Sanadhya Raghupathy Sivakumar Ó Springer Science+Business

More information

Content Delivery Networks

Content Delivery Networks Content Delivery Networks Terena 2000 ftp://ftpeng.cisco.com/sgai/t2000cdn.pdf Silvano Gai Cisco Systems, USA Politecnico di Torino, IT sgai@cisco.com Terena 2000 1 Agenda What are Content Delivery Networks?

More information

Introduction to Network Security Lab 1 - Wireshark

Introduction to Network Security Lab 1 - Wireshark Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication

More information

Mobile Computing/ Mobile Networks

Mobile Computing/ Mobile Networks Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple

More information

Metadata Feedback and Utilization for Data Deduplication Across WAN

Metadata Feedback and Utilization for Data Deduplication Across WAN Zhou B, Wen JT. Metadata feedback and utilization for data deduplication across WAN. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 31(3): 604 623 May 2016. DOI 10.1007/s11390-016-1650-6 Metadata Feedback

More information

SiteCelerate white paper

SiteCelerate white paper SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance

More information

MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?

MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect ashutosh_shinde@hotmail.com Validating if the workload generated by the load generating tools is applied

More information

Limitations of Packet Measurement

Limitations of Packet Measurement Limitations of Packet Measurement Collect and process less information: Only collect packet headers, not payload Ignore single packets (aggregate) Ignore some packets (sampling) Make collection and processing

More information

Improvement of Network Optimization and Cost Reduction in End To End Process Implementing in Clouds

Improvement of Network Optimization and Cost Reduction in End To End Process Implementing in Clouds Improvement of Network Optimization and Cost Reduction in End To End Process Implementing in Clouds A. Sree Valli 1, R. Chandrasekhar 2 PG Scholar, Department of C.S.E, KIET College, JNTUK A.P 1 Assistant

More information

Distributed Systems. 24. Content Delivery Networks (CDN) 2013 Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 24. Content Delivery Networks (CDN) 2013 Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 24. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2013 November 27, 2013 2013 Paul Krzyzanowski 1 Motivation Serving web content from one location presents

More information

Introduction to Mobile Performance Testing

Introduction to Mobile Performance Testing Introduction to Mobile Performance Testing Shlomi Zalma, Wilson Mar DT3338 at Noon, June 13, 2013 HOL330 in Sands 305 Why performance test mobile apps? Mobile apps are now: how customers locate stores

More information

Measured Performance of GSM HSCSD and GPRS

Measured Performance of GSM HSCSD and GPRS Measured Performance of GSM HSCSD and Jouni Korhonen Olli Aalto Andrei Gurtov Heimo Laamanen Sonera Corporation P.O.Box 97 51 Helsinki, Finland Abstract In this paper we present results of measurements

More information

UiO1 Web performance in practice Why we are waiting? Ten years after

UiO1 Web performance in practice Why we are waiting? Ten years after UiO1 Web performance in practice Why we are waiting? Ten years after Responsible: Matti Siekkinen, University of Oslo, siekkine@ifi.uio.no The objective of this assignment is to find out why do we wait

More information

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:

More information

Deduplication Demystified: How to determine the right approach for your business

Deduplication Demystified: How to determine the right approach for your business Deduplication Demystified: How to determine the right approach for your business Presented by Charles Keiper Senior Product Manager, Data Protection Quest Software Session Objective: To answer burning

More information

An Overview of Amazon Silk Amazon s new cloud-powered browser

An Overview of Amazon Silk Amazon s new cloud-powered browser An Overview of Amazon Silk Amazon s new cloud-powered browser Jon Jenkins Twitter - @jonjenk jjenkin@amazon.com O Reilly Velocity EU November 8, 2011 Web Page Complexity is Steadily Increasing Amazon s

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

Understanding Enterprise NAS

Understanding Enterprise NAS Anjan Dave, Principal Storage Engineer LSI Corporation Author: Anjan Dave, Principal Storage Engineer, LSI Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA

More information

Building a High Performance Deduplication System Fanglu Guo and Petros Efstathopoulos

Building a High Performance Deduplication System Fanglu Guo and Petros Efstathopoulos Building a High Performance Deduplication System Fanglu Guo and Petros Efstathopoulos Symantec Research Labs Symantec FY 2013 (4/1/2012 to 3/31/2013) Revenue: $ 6.9 billion Segment Revenue Example Business

More information

Reducing Replication Bandwidth for Distributed Document Databases

Reducing Replication Bandwidth for Distributed Document Databases Reducing Replication Bandwidth for Distributed Document Databases Lianghong Xu 1, Andy Pavlo 1, Sudipta Sengupta 2 Jin Li 2, Greg Ganger 1 Carnegie Mellon University 1, Microsoft Research 2 #1 You can

More information

Following statistics will show you the importance of mobile applications in this smart era,

Following statistics will show you the importance of mobile applications in this smart era, www.agileload.com There is no second thought about the exponential increase in importance and usage of mobile applications. Simultaneously better user experience will remain most important factor to attract

More information

Protecting Mobile Devices From TCP Flooding Attacks

Protecting Mobile Devices From TCP Flooding Attacks Protecting Mobile Devices From TCP Flooding Attacks Yogesh Swami % and Hannes Tschofenig* % Nokia Research Center, Palo Alto, CA, USA. * Siemens Corporate Technology, Munich, DE. 1 Motivation Anatomy of

More information

UKCMG Industry Forum November 2006

UKCMG Industry Forum November 2006 UKCMG Industry Forum November 2006 Capacity and Performance Management of IP Networks Using IP Flow Measurement Agenda Challenges of capacity and performance management of IP based networks What is IP

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

Multi-level Metadata Management Scheme for Cloud Storage System

Multi-level Metadata Management Scheme for Cloud Storage System , pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1

More information

Key Components of WAN Optimization Controller Functionality

Key Components of WAN Optimization Controller Functionality Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications

More information

Middleboxes. Firewalls. Internet Ideal: Simple Network Model. Internet Reality. Middleboxes. Firewalls. Globally unique idenpfiers

Middleboxes. Firewalls. Internet Ideal: Simple Network Model. Internet Reality. Middleboxes. Firewalls. Globally unique idenpfiers Ideal: Simple Network Model Middleboxes Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 hgp://www.cs.princeton.edu/courses/archive/spr12/cos461/ Globally unique

More information

Data Reduction: Deduplication and Compression. Danny Harnik IBM Haifa Research Labs

Data Reduction: Deduplication and Compression. Danny Harnik IBM Haifa Research Labs Data Reduction: Deduplication and Compression Danny Harnik IBM Haifa Research Labs Motivation Reducing the amount of data is a desirable goal Data reduction: an attempt to compress the huge amounts of

More information

Teridion. Rethinking Network Performance. The Internet. Lightning Fast. Technical White Paper July, 2015 www.teridion.com

Teridion. Rethinking Network Performance. The Internet. Lightning Fast. Technical White Paper July, 2015 www.teridion.com Teridion The Internet. Lightning Fast. Rethinking Network Performance Technical White Paper July, 2015 www.teridion.com Executive summary Online services face the growing dual challenge of supporting many

More information

networks Live & On-Demand Video Delivery without Interruption Wireless optimization the unsolved mystery WHITE PAPER

networks Live & On-Demand Video Delivery without Interruption Wireless optimization the unsolved mystery WHITE PAPER Live & On-Demand Video Delivery without Interruption Wireless optimization the unsolved mystery - Improving the way the world connects - WHITE PAPER Live On-Demand Video Streaming without Interruption

More information

Testing & Assuring Mobile End User Experience Before Production. Neotys

Testing & Assuring Mobile End User Experience Before Production. Neotys Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,

More information

Hitachi Content Platform (HCP)

Hitachi Content Platform (HCP) Copyright 2014 A*STAR Version 1.0 Hitachi Content Platform (HCP) HCP and HCP Anywhere Features Evaluation THIS DOCUMENT AND THE INFORMATION CONTAINED HEREIN IS PROVIDED ON AN "AS IS" BASIS WITHOUT ANY

More information

Birdstep Intelligent Mobile IP Client v2.0, Universal Edition. Seamless secure mobility across all networks. Copyright 2002 Birdstep Technology ASA

Birdstep Intelligent Mobile IP Client v2.0, Universal Edition. Seamless secure mobility across all networks. Copyright 2002 Birdstep Technology ASA White Paper Birdstep Intelligent Mobile IP Client v2.0, Universal Edition Seamless secure mobility across all networks Copyright 2002 Birdstep Technology ASA Haakon VII's gate 5B, N-0161 Oslo, Norway Tel:

More information

Mobile Application Performance

Mobile Application Performance Mobile Application Performance Tips & Tricks to Significantly Boost App Performance Ray Bennett Director, Microstrategy - Mobile Service Line 11km/s (7mps) Escape Velocity Performance Definition What is

More information

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather

More information

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1) Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

JXTA TM : Beyond P2P File Sharing the Emergence of Knowledge Addressable Networks

JXTA TM : Beyond P2P File Sharing the Emergence of Knowledge Addressable Networks JXTA TM : Beyond P2P File Sharing the Emergence of Knowledge Addressable Networks Bernard Traversat tra@jxta.org JXTA Chief Architect Sun Microsystems 2005 JavaOne SM Conference Session 7208 Extended and

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery

More information

Denial of Service Attacks and Resilient Overlay Networks

Denial of Service Attacks and Resilient Overlay Networks Denial of Service Attacks and Resilient Overlay Networks Angelos D. Keromytis Network Security Lab Computer Science Department, Columbia University Motivation: Network Service Availability Motivation:

More information

HP StoreOnce & Deduplication Solutions Zdenek Duchoň Pre-sales consultant

HP StoreOnce & Deduplication Solutions Zdenek Duchoň Pre-sales consultant DISCOVER HP StoreOnce & Deduplication Solutions Zdenek Duchoň Pre-sales consultant HP StorageWorks Data Protection Solutions HP has it covered Near continuous data protection Disk Mirroring Advanced Backup

More information

3Gen Data Deduplication Technical

3Gen Data Deduplication Technical 3Gen Data Deduplication Technical Discussion NOTICE: This White Paper may contain proprietary information protected by copyright. Information in this White Paper is subject to change without notice and

More information

Internet Ideal: Simple Network Model

Internet Ideal: Simple Network Model Middleboxes Reading: Ch. 8.4 Internet Ideal: Simple Network Model Globally unique identifiers Each node has a unique, fixed IP address reachable from everyone and everywhere Simple packet forwarding Network

More information

Hyper-converged IT drives: - TCO cost savings - data protection - amazing operational excellence

Hyper-converged IT drives: - TCO cost savings - data protection - amazing operational excellence Hyper-converged IT drives: - TCO cost savings - data protection - amazing operational excellence Sebastian Nowicki SimpliVity is one of the biggest innovations in enterprise computing since ware. ~John

More information

Introducing the Microsoft IIS deployment guide

Introducing the Microsoft IIS deployment guide Deployment Guide Deploying Microsoft Internet Information Services with the BIG-IP System Introducing the Microsoft IIS deployment guide F5 s BIG-IP system can increase the existing benefits of deploying

More information

Network Virtualization as Architecture and Its Applications. University of Tokyo/NICT Aki NAKAO. IETF 2009-ISOC Aki NAKAO

Network Virtualization as Architecture and Its Applications. University of Tokyo/NICT Aki NAKAO. IETF 2009-ISOC Aki NAKAO Network Virtualization as Architecture and Its Applications University of Tokyo/NICT Aki NAKAO 1 Research Activity on Future Internet PSTN JGN Strategic advancement of R&D by collaboration of industry,

More information

Barracuda Backup Deduplication. White Paper

Barracuda Backup Deduplication. White Paper Barracuda Backup Deduplication White Paper Abstract Data protection technologies play a critical role in organizations of all sizes, but they present a number of challenges in optimizing their operation.

More information

An Overview of Multipath TCP

An Overview of Multipath TCP An Overview of Multipath TCP Olivier Bonaventure, Mark Handley, and Costin Raiciu Olivier Bonaventure is a Professor at Catholic University of Louvain, Belgium. His research focus is primarily on Internet

More information

Administrivia. CSMA/CA: Recap. Mobility Management. Mobility Management. Channel Partitioning, Random Access and Scheduling

Administrivia. CSMA/CA: Recap. Mobility Management. Mobility Management. Channel Partitioning, Random Access and Scheduling Administrivia No lecture on Thurs. Last work will be out this week (not due, covers wireless) Extra office hours for next week and the week after. Channel Partitioning, Random Access and Scheduling Channel

More information

Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications

Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications Single Pass Load Balancing with Session Persistence in IPv6 Network C. J. (Charlie) Liu Network Operations Charter Communications Load Balancer Today o Load balancing is still in use today. It is now considered

More information

TCP PACKET CONTROL FOR WIRELESS NETWORKS

TCP PACKET CONTROL FOR WIRELESS NETWORKS TCP PACKET CONTROL FOR WIRELESS NETWORKS by Wan Gang Zeng B. Sc. in Computer Science, University of Ottawa, 2000 THESIS SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE

More information

On Effectively Exploiting Multiple Wireless Interfaces in Mobile Hosts

On Effectively Exploiting Multiple Wireless Interfaces in Mobile Hosts On Effectively Exploiting Multiple Wireless Interfaces in Mobile Hosts Cheng-Lin Tsao and Raghupathy Sivakumar School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta, GA

More information

Concept of Cache in web proxies

Concept of Cache in web proxies Concept of Cache in web proxies Chan Kit Wai and Somasundaram Meiyappan 1. Introduction Caching is an effective performance enhancing technique that has been used in computer systems for decades. However,

More information

TCP in Wireless Mobile Networks

TCP in Wireless Mobile Networks TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au

More information

Using Steelhead Appliances and Stingray Aptimizer to Accelerate Microsoft SharePoint WHITE PAPER

Using Steelhead Appliances and Stingray Aptimizer to Accelerate Microsoft SharePoint WHITE PAPER Using Steelhead Appliances and Stingray Aptimizer to Accelerate Microsoft SharePoint WHITE PAPER Introduction to Faster Loading Web Sites A faster loading web site or intranet provides users with a more

More information

Detection of illegal gateways in protected networks

Detection of illegal gateways in protected networks Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia firstname.lastname@ccdcoe.org 1. Introduction In this

More information

Anatomizing Application Performance Differences on Smartphones

Anatomizing Application Performance Differences on Smartphones Anatomizing Application Performance Differences on Smartphones Junxian Huang University of Michigan hjx@eecs.umich.edu Z. Morley Mao University of Michigan zmao@eecs.umich.edu Qiang Xu University of Michigan

More information

Inference and Evaluation of Split-Connection Approaches in Cellular Data Networks

Inference and Evaluation of Split-Connection Approaches in Cellular Data Networks Inference and Evaluation of Split-Connection Approaches in Cellular Data Networks Wei Wei 1, Chun Zhang 1, Hui Zang 2, Jim Kurose 1, and Don Towsley 1 1 Department of Computer Science, University of Massachusetts,

More information

Cloud Backup and Recovery for Endpoint Devices

Cloud Backup and Recovery for Endpoint Devices Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,

More information

Maximize Your Virtual Environment Investment with EMC Avamar. Rob Emsley Senior Director, Product Marketing

Maximize Your Virtual Environment Investment with EMC Avamar. Rob Emsley Senior Director, Product Marketing 1 Maximize Your Virtual Environment Investment with EMC Avamar Rob Emsley Senior Director, Product Marketing 2 Private Cloud is the Vision Virtualized Data Center Internal Cloud Trusted Flexible Control

More information

A Virtual Filer for VMware s Virtual SAN A Maginatics and VMware Joint Partner Brief

A Virtual Filer for VMware s Virtual SAN A Maginatics and VMware Joint Partner Brief A Virtual Filer for VMware s Virtual SAN A Maginatics and VMware Joint Partner Brief With the massive growth of unstructured data in today s enterprise environments, storage IT administrators are constantly

More information

CEMEX en Concreto con EMC. Jose Luis Bedolla EMC Corporation Back Up Recovery and Archiving

CEMEX en Concreto con EMC. Jose Luis Bedolla EMC Corporation Back Up Recovery and Archiving CEMEX en Concreto con EMC Jose Luis Bedolla EMC Corporation Back Up Recovery and Archiving 1 Agenda Cemex Challenges Avamar Overview Solution for Cemex Consulting Approach Solution Description Solution

More information

Recent Issues in Software Testing: Part B

Recent Issues in Software Testing: Part B Recent Issues in Software Testing: Part B W. Eric Wong Department of Computer Science The University of Texas at Dallas ewong@utdallas.edu http://www.utdallas.edu/~ewong Recent Issues in Software Testing

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

NSW Government. Wireless services (WiFi) Standard

NSW Government. Wireless services (WiFi) Standard NSW Government Wireless services (WiFi) Standard May 2014 CONTENTS 1. CONTEXT 2 1.1. Background 2 1.2. Purpose 2 1.3. Scope and application 2 2. STANDARDS GOVERNANCE 2 2.1. Standards to support the ICT

More information

Resource Pooling across the Internet. Mark Handley, UCL

Resource Pooling across the Internet. Mark Handley, UCL Resource Pooling across the Internet Mark Handley, UCL Resource Pooling Make a network's resources behave like a single pooled resource. Aim is to increase reliability, flexibility and efficiency. Method

More information

Hit Hanan & Faisal Faruqi Nexscience

Hit Hanan & Faisal Faruqi Nexscience Leveraging Mobile Technology for Oracle Databases Management Hit Hanan & Faisal Faruqi Nexscience Mobile Market.. The total number of PCs will reach 1.78 billion in three years, while the number of smart

More information