AN EFFECTIVE WAY FOR COST REDUCTION OF CLOUD BANDWIDTH BASED ON PREDICTION



Similar documents
Department of CSE KMM institute of technology and Science Tirupati, Andhra Pradesh, India

Prediction System for Reducing the Cloud Bandwidth and Cost

A Novel Approach for Calculation Based Cloud Band Width and Cost Diminution Method

OFFLOADING THE CLIENT-SERVER TRE EFFORT FOR MINIMIZING CLOUD BANDWITH AND COST

Improvement of Network Optimization and Cost Reduction in End To End Process Implementing in Clouds

Periodically Predicting Client s Bandwidth & Cost Acknowledgements Sends to Cloud Server to Optimize Resource Usage

Enhanced PACK Approach for Traffic Redundancy Elimination

PREDICTION BASED CLOUD BANDWIDTHAND COSTREDUCTION SYSTEMOFCLOUD COMPUTING

PACK: PREDICTION-BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 1, FEBRUARY PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System

The Power of Prediction: Cloud Bandwidth and Cost Reduction

Distributed Management for Load Balancing in Prediction-Based Cloud

Public Auditing for Shared Data in the Cloud by Using AES

Cisco WAAS Context-Aware DRE, the Adaptive Cache Architecture

A TECHNICAL REVIEW OF CACHING TECHNOLOGIES

THe exponential growth of mobile data traffic has led

Multi-level Metadata Management Scheme for Cloud Storage System

A Survey on Aware of Local-Global Cloud Backup Storage for Personal Purpose

Celleration: Loss-Resilient Traffic Redundancy Elimination for Cellular Data

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT

The Effect of Packet Loss on Redundancy Elimination in Cellular Wireless Networks

WAN OPTIMIZATION FOR MICROSOFT SHAREPOINT BPOS

On the Performance of Redundant Traffic Elimination in WLANs

PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM

PUBLIC ANALYZING FOR SHARED AND SECURE INFORMATION STORAGE IN CLOUD USING STEGANOGRAPHY

Key Components of WAN Optimization Controller Functionality

Wherever there is a conflict, the Addenda to the RFP document and the RFP document (in that order) override the explanations that are provided here.

White Paper. Enterprise IPTV and Video Streaming with the Blue Coat ProxySG >

networks Live & On-Demand Video Delivery without Interruption Wireless optimization the unsolved mystery WHITE PAPER

Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing

The International Journal Of Science & Technoledge (ISSN X)

HTTP-Level Deduplication with HTML5

IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD

Accelerating Cloud Based Services

ORUTA: SECRECY PRESERVING POPULACE INSPECTING FOR OUTSOURCED DATA IN CLOUD

WAN Optimization for Microsoft SharePoint BPOS >

Cisco WAAS Express. Product Overview. Cisco WAAS Express Benefits. The Cisco WAAS Express Advantage

Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud

WAN optimization and acceleration products reduce cost and bandwidth requirements while speeding throughput.

Eliminating the Need for WAN Acceleration Using the Cloud

White Paper: Nasuni Cloud NAS. Nasuni Cloud NAS. Combining the Best of Cloud and On-premises Storage

WHITE PAPER. How Deduplication Benefits Companies of All Sizes An Acronis White Paper

Whitepaper. Controlling the Network Edge to Accommodate Increasing Demand

MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT

Masters Project Proxy SG

PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

De-duplication-based Archival Storage System

How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet

Wide-area Network Acceleration for the Developing World. Sunghwan Ihm (Princeton) KyoungSoo Park (KAIST) Vivek S. Pai (Princeton)

Index Terms : Load rebalance, distributed file systems, clouds, movement cost, load imbalance, chunk.

Per-Flow Queuing Allot's Approach to Bandwidth Management

A First Look at Mobile Cloud Storage Services: Architecture, Experimentation and Challenge

In-Network Caching vs. Redundancy Elimination

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Remote IT Infrastructure Consolidation

A Network Control Plane for Massive Video Delivery

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

FIVE WAYS TO OPTIMIZE MOBILE WEBSITE PERFORMANCE WITH PAGE SPEED

Managing Mobile Devices Over Cellular Data Networks

Data Deduplication: An Essential Component of your Data Protection Strategy

Ipanema Technologies: A True Synergy Between WAN Optimization and Application Performance Management

An Active Packet can be classified as

Executive summary. Introduction Trade off between user experience and TCO payoff

PIVOTAL CRM ARCHITECTURE

Peer-to-peer Cooperative Backup System

The assignment of chunk size according to the target data characteristics in deduplication backup system

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May ISSN

CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR

A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique

Technical Brief. VBrick Rev & DME Interoperability with Cisco Wide Area Application Services (WAAS) and Akamai Connect

Top Ten Questions. to Ask Your Primary Storage Provider About Their Data Efficiency. May Copyright 2014 Permabit Technology Corporation

DXi Accent Technical Background

OPTIMIZED CONSUMPTION AND ACCESS OF REMOTE DISPLAY ON MOBILE DEVICE ENVIRONMENT

Technical Overview Simple, Scalable, Object Storage Software

Reducing Backups with Data Deduplication

ISSN Vol.04,Issue.19, June-2015, Pages:

5 Easy Steps to Implementing Application Load Balancing for Non-Stop Availability and Higher Performance

Scalable TCP Session Monitoring with Symmetric Receive-side Scaling

The Evolution of Application Acceleration:

Blue Coat Security First Steps. Solution for HTTP Object Caching

Frequently Asked Questions

How To Make A Backup System More Efficient

WHITE PAPER Windows File Sharing (CIFS) Optimization

Optimizing Data Center Networks for Cloud Computing

INVESTIGATION OF RENDERING AND STREAMING VIDEO CONTENT OVER CLOUD USING VIDEO EMULATOR FOR ENHANCED USER EXPERIENCE

White Paper. Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge. citrix.com

WHITE PAPER. Data Center Fabrics. Why the Right Choice is so Important to Your Business

SECURITY THREATS TO CLOUD COMPUTING

Presented by Philippe Bogaerts Senior Field Systems Engineer Securing application delivery in the cloud

UniFS A True Global File System

Distributed file system in cloud based on load rebalancing algorithm

Ethernet. Ethernet. Network Devices

Using Steelhead Appliances and Stingray Aptimizer to Accelerate Microsoft SharePoint WHITE PAPER

How To Understand The Difference Between Network Analysis And Network Monitoring

HIGH-SPEED BRIDGE TO CLOUD STORAGE

Transcription:

AN EFFECTIVE WAY FOR COST REDUCTION OF CLOUD BANDWIDTH BASED ON PREDICTION 1 T.BHARGAVI, 2 Dr. P. VENKATESWARLU, 3 B.V. SRIKANTH 1 M.Tech (CSE) student, Department of Computer Science & Engineering Nagole Institute of Technology & Science, Kuntloor (V), Hayathnagar (M), RR District, Hyderabad, Telangana,India. abhargavi2812@gmail.com. 2 Professor & HOD, Department of Computer Science & Engineering Nagole Institute of Technology & Science, Kuntloor (V), Hayathnagar (M), RR District, Hyderabad, Telangana,India. venkat123.pedakolmi@gmail.com 3 Associate Professor, Department of Computer Science & Engineering Nagole Institute of Technology & Science, Kuntloor (V), Hayathnagar (M), RR District, Hyderabad, Telangana,India. bvsrikanth123@gmail.com ABSTRACT Cloud computing is a fast growing field that is arguably a whole new computing paradigm. In cloud computing, computing resources sq. live provided as services over the net and users can access resources on supported their payments. however for server specific TRE approach it's powerful to handle the traffic efficiently and it doesn t suites for the cloud setting due to high method costs. throughout this paper we have a tendency to give a survey on the new traffic redundancy technique referred to as novel-tre collectively referred to as receiver based mostly TRE. This novel-tre has necessary choices like detective work the redundancy at the client, every which way rotatingappear enchained, matches incoming chunks with a antecedently received chunk chain or native file and sending to the server for predicting the long run information and no would love of server to ceaselessly maintain shopper state. INTRODUCTION Cloud computing is rising form of delivery within which applications, knowledge and resources area unit apace provisioned as standardized offerings to users with a versatile worth. The cloud computing paradigm has achieved widespread adoption in recent years. Its success is due mostly to customers ability to use services on demand with a pay-as-you go evaluation model, which has evidenced convenient in several respects. Low prices and high flexibility create migrating to the cloud compelling. Cloud computing is that the long unreal vision of computing as a utility, where users will remotely store their knowledge into the cloud thus enjoy the ondemand prime quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users may be eased from the burden of native knowledge storage and maintenance. Traffic redundancy and elimination approach is employed for minimizing the price. Traffic redundancy stems from common end-users activities, such as repeatedly accessing, downloading, distributing and modifying a similar or similar data things (documents, data, web and video). TRE is employed to eliminate the transmission of redundant content and, therefore, to considerably cut back the network price. In commonest TRE solutions, each the sender and the receiver ex- methane series and compare signatures of information chunks, parsed in step with the information content before their transmission. When redundant chunks area unit detected, the sender replaces the transmission of every redundant chunk with its sturdy signature. industrial TRE solutions area unit well-liked at enterprise networks, and

involve the readying of two or a lot of proprietary protocol, state synchronous middle-boxes at each the computer network entry points of information centres and branch offices, eliminating repetitive traffic between them (e.g., Cisco, bed, Quantum, Juniper, Blue-coat, Expand Networks and F5).While proprietary middle-boxes area unit well-liked purpose solutions among enterprises, they're not as engaging during a cloud environment. First, cloud suppliers cannot take pleasure in a technology whose goal is to cut back client information measure bills, and thus aren't seemingly to speculate in one. Moreover, a hard and fast client-side and server-side middle-box try resolution is inefficient for a combination of a mobile surroundings, that detaches the shopper from a hard and fast location, and cloud-side physical property that motivates work distribution and migration among knowledge centres. Therefore, it is commonly in agreement that a universal, software-based, end-to-end TRE is crucial in today s pervasive surroundings. This enables the employment of a customary protocol stack and makes a TRE within end-to-end secured traffic (e.g., SSL) doable.in this paper, we show that cloud physical property imply a replacement TRE resolution that does not need the server to unendingly maintain clients standing. First, cloud load leveling and power optimizations could result in a server-side method and knowledge migration surroundings, in which TRE solutions that need full synchronization between the server and the shopper area unit laborious to accomplish or could lose potency owing to lost synchronization. Moreover, the recognition of made media that consume high information measure motivates CDN solutions, within which the service purpose for fastened and mobile users could amendment dynamically according to the relative service purpose locations and hundreds. Finally, if associate degree end-to-end resolution is utilized, its extra computational and storage prices at the cloud-side ought to be weighed against its information measure saving gains. Clearly, a TRE solution that puts most of its procedure effort on the cloudside2 might intercommunicate be less efficient than the one that leverages the combined client-side capabilities. Given associate degree end-toend resolution, we've found through our experiments that senderbased end-to-end TRE solutions add a substantial load to the servers, which can eradicate the cloud price saving addressed by the TRE within the 1st place. Moreover, our experiments additional show that current end-to-end solutions conjointly suffer from the requirement to take care of end-to-end synchronization that will result in degraded TRE potency. In this paper, we have a tendency to gift a novel receiverbased end-to-end TRE resolution that depends on the power of predictions to eliminate redundant traffic between the cloud and its end-users. during this resolution, every receiver observes the incoming stream and tries to match its chunks with a previously received chunk chain or a piece chain of a neighborhood file. Using the long-run chunks meta-data info unbroken regionally, the receiver sends to the server predictions that in- cloud chunks signatures and simple to verify hints of the sender s future knowledge. Upon a touch match the sender triggers the TRE operation, saving the cloud s TRE procedure effort within the absence of traffic redundancy. Offloading the procedure effort from the cloud to an oversized group of purchasers forms a load distribution action, as every shopper processes solely its TRE half. The receiver-based TRE resolution addresses quality issues common to quasi-mobile desktop/laptops procedure environments. one in all them is cloud physical property as a result of that the servers area unit dynamically relocated round the federate cloud, therefore inflicting purchasers to interact with multiple ever-changing servers. Another property is informatics dynamics, that compel roaming users to oft amendment informatics addresses. additionally to the receiver- based mostly operation, we also suggest a hybrid approach, that permits electric battery power-driven

mobile device to shift the TRE computation over- head back to the cloud by triggering a sender-based end-to-end TRE like.to validate the receiver-based TRE thought, we have a tendency to enforced, tested and performed realistic experiments with PACK at intervals a cloud setting. Our experiments demonstrate a cloud price reduction achieved at an affordable shopper effort whereas gaining additional information measure savings at the shopper facet. The implementation code, over 25,000 lines of C and Java. Our implementation utilizes the communications protocol choices field, supporting all TCP-based applications like net, video streaming, mail, etc.we propose a brand new omputationally light-weight unitization (fingerprinting) theme termed PACK chunking. PACK unitization may be a new different for Rabin fingerprinting historically utilized by RE applications. Experiments show that our approach will reach processing speeds over three Gbps, a minimum of two hundredth quicker than Rabin process. In addition, we have a tendency to valuate our resolution and compare it to previous end-to-end solutions victimisation terabytes of real video traffic consumed by 40,000 distinct purchasers, captured at intervals associate degree ISP, and traffic obtained during a social network service for over a month. We demonstrate that our resolution achieves half-hour redundancy elimination while not considerably touching the procedure effort of the sender, leading to a two hundredth reduction of the cost to the cloud client. The paper is organized as follows: Section two reviews existing TRE solutions. In Section three we have a tendency to gift our receiverbased TRE resolution and justify the prediction method and the prediction-based TRE mechanism. In Section four we have a tendency to present optimizations to the receiver-side algorithms. Section five evaluates knowledge redundancy during a cloud and compares PACK to sender-based TRE. Section six details our implementation and discusses our experiments and results. RELATED WORK Several TRE techniques are explored in recent years. A protocol -independent TRE was planned. The paper describes a packet-level TRE, utilizing the algorithms given. Several industrial TRE solutions delineate, have combined the sender-based TRE concepts of with the algorithmic and implementation approach of together with protocol specific optimizations for middle-boxes solutions. especially, describes how to flee with multilateral handclasp between the sender and also the receiver if a full state synchronization is maintained. These papers assume that the routers square measure equipped with information caches, which they search those routes that create a much better use of the cached information. Our paper builds on the latter s finding that an finish to finish redundancy elimination answer, might acquire most of the middle-box s information measure savings, motivating the good thing about low price computer code end-to-end solutions. Wanax could be a TRE system for the developing world wherever storage and WAN information measure square measure scarce. It's a software-based middle-box replacement for the overpriced industrial hardware. In this theme, the sender middle-box holds back the transmission control protocol stream and sends information signatures to the receiver middlebox. The receiver checks whether the info is found in its native cache. information chunks that aren't found within the cache square measure fetched from the sender middle-box or a close-by receiver middle-box. Naturally, such a theme incurs a three-wayhandshake latency for non-cached information. EndRE could be a sender-based end-to-end TRE for enterprise networks. It uses a brand new unitization theme that's quicker than the commonlyused Rabin fingerprint, however is restricted to chunks as little as 32-64 bytes. not like PACK, EndRE needs the server to keep up a fully and faithfully synchronised cache for every shopper. to

stick with the server s memory necessities these caches square measure unbroken little (around 1 zero MB per client), creating the system inadequate for medium-to-large content or long-run redundancy. EndRE is server specific, hence not suitable for a CDN or cloud surroundings. To the most effective of our information none of the previous works have addressed the wants for a cloud computing friendly, finish-to- end TRE that forms PACK s focus. We assume throughout the paper that the cloudside, following this internet service model, is dominated by a sender operation. THE PACK ALGORITHM For the sake of clarity, we have a tendency to describe the fundamental receiverdriven operation of the PACK protocol. many enhancements and optimizations square measure introduced. series, by traversing the sequence of LRU chunk pointers that square measure enclosed within the chunks metadata. victimization the made chain, the receiver sends a prediction to the sender for the following information. a part of every chunk s prediction, termed a touch, is a straightforward to reason perform with atiny low enough false-positive worth, like the worth of the last computer memory unit within the foretold information or a byte-wide XOR check of all or designated bytes. The prediction sent to the receiver includes the vary of the expected information, the hint and also the signature of the chunk. The sender identifies the expected target its buffered data, and verifies the hint for that vary. If the result matches the received hint, it continues to perform the a lot of computationally intensive SHA-1 signature operation. Upon a signature match, the sender sends a confirmation message to the receiver, enabling it to repeat the matched information from its native storage.second precondition from occurring. The stream of information received at the PACK receiver is parsed to a sequence of variable size, content-based signed chunks. The chunks square measure then compared to the receiver native storage, termed chunk store. If an identical chunk is found within the local chunk store, the receiver retrieves the sequence of subsequent chunks, named as a B) Receiver Side Chunk Storage Predictive ACK uses the new continuous chains theme that described, therein each chunk area unit associated with all different chunks by their recent received approach of order. The prophetic ACK receivers got to keep a piece storage,

that it s a really large size cache of chunks and their information. Chunk s information includes the information chunk s signature and one pointer to the successive chunk within the recent received stream that contain this chunk. Cache and index technique area unit utilized to expeditiously maintain and retrieve the each hold on chunks and its signature and the chains created by traverse the chunk pointers. A) Receiver Side Algorithm The arrival of a brand new data, the receiver facet system that respective signature for each chunk and see the match in its local (temporary) chunk storage. If the chunk s match is founded, the receiver facet determines whether or not it s an area of a formerly received chunk chain, mistreatment the chunks information (data about data) otherwise If affirmative, the receiver send a prediction to the sender facet for the many new expected chain chunks. It carries a starting purpose within the computer memory unit stream that's offset and therefore the identity of many sequent chunks. C) Sender Side Algorithm Sender receives a prophetic message from the receiver facet and it tries to match the received predictions to its buffered however to be sent data. for each prediction, the sender needs to determine that corresponding protocol vary of sequence and verifies it. If that hint match, the sender measures the a lot of computationally intensive Secure Hash Algorithm- one signature for the anticipated data vary and match the result to the signature received within the prophetic message of information. during this case if the hint doesn't same, a computationally expansive operation is saved. If the 2 Secure Hash Algorith-one signatures compare, the sender will safely assume that the receiver s prediction method is completely correct. and, it replace the complete outgoing buffered information with a prophetic ACK message.

OPTIMIZATIONS A) adaptative Receiver Virtual Window Predictive ACK change the receiver facet to domestically capture the sender knowledge once a neighborhood or temporary copy is obtainable, thus eliminating the need to end this info through the network. during this term the receiver s winning of that recent local knowledge because the reception of visual knowledge. B) Cloud Server Acting as a Receiver In a developing trend, cloud computing storage is obtaining a dominant player from backup of store and sharing of knowledge services to the yank National Library and e -mail services. during this most of those Services, the cloud is employed often the receiver of the information. C) hierarchical Approach Predictive ACK s receiver facet based mostly mode is a smaller amount of efficient if changes within the info square measure scattered. In this scenario, the prediction continuation square measure ofttimes interrupted, during this flip, forces the sender to convey to the raw data transmission till a brand new comparison is found at the receiver facet and It reportable back to the sender facet. To that end, we've got to gift the prophetical ACK hierarchical mode of operation. Expected Results After execution we willget the results like below After execution we will get the traffic volume redundency of data as below and CONCLUSION Cloud computing is predicted to trigger high demand for TRE solutions because the quantity of knowledge changed between the cloud and its users is predicted to dramatically increase. The cloud environment redefines the TRE system needs, making proprietary middle-box solutions inadequate. Consequently, there is a rising would like for a TRE answer that reduces the cloud s operational value whereas accounting for application latencies, user quality, and cloud snap. In this paper, we've got conferred PACK, a receiverbased, cloud-friendly, end-to-end TRE that's supported novel speculative principles that scale back latency and cloud operational value. PACK doesn't need the server to continuously maintain clients standing, therefore sanctioning cloud elasticity and user quality whereas protective long-run redundancy. Moreover, PACK is capable of eliminating redundancy supported content incoming to the consumer from multiple servers while not applying a multilateral acknowledgement. Our analysis employing a wide assortment of content varieties shows that PACK meets the expected style goals and has clear advantages over sender-based TRE, particularly once the cloud computation value and buffering needs area unit necessary. Moreover, PACK imposes further effort on the sender only redundancy is exploited, therefore reducing the cloud

overall value. Two attention-grabbing future extensions will give further benefits to the PACK thought. First, our implementation maintains chains by keeping for any chunk solely the last ascertained subsequent chunk in associate degree LRU fashion. a remarkable extension to the current work is that the applied mathematics study of chains of chunks that will change multiple potentialities in each the chunk order and also the corresponding predictions. The system may also permit creating over one prediction at a time, and it's enough that one among them are going to be correct for thriving traffic elimination. A second promising direction is that the mode of operation improvement of the hybrid sender receiver approach supported shared selections derived from receiver s power or server s value changes. REFERENCES [1]E. Zohar, I. Cidon, and O. Mokryn, The power of prediction: Cloud bandwidth and cost reduction, in Proc. SIGCOMM, 2011, pp. 86 97. [2]M. Armbrust, A. Fox, R. Griffith, A. D. Joseph,R.Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, A view of cloud computing, Commun. ACM, vol. 53, no. 4, pp. 50 58, 2010. [3]U. Manber, Finding similar files in a large file system, in Proc. USENIX Winter Tech. Conf., 1994, pp. 1 10. [4]N. T. Spring and D. Wetherall, A protocol-independent technique for eliminating redundant network traffic, in Proc. SIGCOMM, 2000, vol.30, pp. 87 95. [5]A. Muthitacharoen, B. Chen, and D. Mazières, A lowbandwidth network file system, in Proc. SOSP, 2001, pp.174-187. [6]E. Lev-Ran, I. Cidon, and I. Z. Ben-Shaul, Method and apparatus for reducing network traffic over low bandwidth links, US Patent 7636767, Nov. 2009. [7]S.Mccanne andm. Demmer, Content-based segmentation scheme for data compression in storage and transmission including hierarchical segment representation, US Patent 6828925, Dec. 2004. [8]R. Williams, Method for partitioning a block of data into subblocks and for storing and communicating such subblocks, US Patent 5990810, Nov. 1999. [9]Juniper Networks, Sunnyvale, CA, USA, Application acceleration, 1996 [Online]. Available: http://www.juniper.net/us/en/products-services/applicationacceleration. [10]Blue Coat Systems, Sunnyvale, CA, USA, MACH5, 1996[Online]. Available: http://www.bluecoat.com /products/mach5 [11]Expand Networks, Riverbed Technology, San Francisco, CA, USA, Application acceleration and WAN optimization, 1998 [Online].Available:http://www.expand.com/technology/applicationacceleration.aspx.

[12]F5, Seattle,WA, USA, WAN optimization, 1996 [Online]. Available:http://www.f5.com/solutions/acceleration/wanoptimization. [13]A. Flint, The next workplace revolution, Nov. 2012 [Online].Available: http://m.theatlanticcities.com/jobs-andeconomy/2012/11/nextworkplace-revolution/3904/ [14]A. Anand, C. Muthukrishnan, A. Akella, and R. Ramjee, Redundancy in network traffic: Findings and implications, in Proc. SIGMETRICS, 2009, pp. 37 48. [15]B. Aggarwal, A. Akella, A. Anand, A. Balachandran, P. Chitnis, C. Muthukrishnan, R. Ramjee, and G. Varghese, EndRE: An end-system redundancy elimination service for enterprises, in Proc. NSDI, 2010, pp. 28 28.