Submitting: Barak Pinhas037584042 Gil Fiss031801731 Laurent Levy 921012076.

Slides:



Advertisements
Similar presentations
Cache Replacement Algorithm Outline Exiting document replacement algorithm Squids cache replacement algorithm Ideal Problem.
Advertisements

Cost-Based Cache Replacement and Server Selection for Multimedia Proxy Across Wireless Internet Qian Zhang Zhe Xiang Wenwu Zhu Lixin Gao IEEE Transactions.
A Survey of Web Cache Replacement Strategies Stefan Podlipnig, Laszlo Boszormenyl University Klagenfurt ACM Computing Surveys, December 2003 Presenter:
Scheduling in Web Server Clusters CS 260 LECTURE 3 From: IBM Technical Report.
Latency-sensitive hashing for collaborative Web caching Presented by: Xin Qi Yong Yang 09/04/2002.
Caching Strategies in Transcoding-Enabled Proxy System for Streaming Media Distribution Networks Bo Shen Sung-Ju Lee Sujoy Basu IEEE Transactions On Multimedia,
1 Routing and Scheduling in Web Server Clusters. 2 Reference The State of the Art in Locally Distributed Web-server Systems Valeria Cardellini, Emiliano.
1 11 Web Caching Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB CACHING  Cache Definition  Goals of Web Caching  Motivations for.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Multimedia Proxy Caching Mechanism for Quality Adaptive Streaming Applications in the Internet R. Rejaie, H. Yu, M. Handley, D. Estrin.
1 A Comparison of Load Balancing Techniques for Scalable Web Servers Haakon Bryhni, University of Oslo Espen Klovning and Øivind Kure, Telenor Reserch.
Improving Proxy Cache Performance: Analysis of Three Replacement Policies Dilley, J.; Arlitt, M. A journal paper of IEEE Internet Computing, Volume: 3.
Improving Robustness in Distributed Systems Jeremy Russell Software Engineering Honours Project.
Locality-Aware Request Distribution in Cluster-based Network Servers 1. Introduction and Motivation --- Why have this idea? 2. Strategies --- How to implement?
Web Cache Behavior The Laboratory of Computer Communication and Networking Submitted by: Lena Vardit Liraz
Analysis of Web Caching Architectures: Hierarchical and Distributed Caching Pablo Rodriguez, Christian Spanner, and Ernst W. Biersack IEEE/ACM TRANSACTIONS.
Improving Proxy Cache Performance: Analysis of Three Replacement Policies John Dilley and Martin Arlitt IEEE internet computing volume3 Nov-Dec 1999 Chun-Fu.
Web Caching Robert Grimm New York University. Before We Get Started  Interoperability testing  Type theory 101.
Performance Evaluation of IPv6 Packet Classification with Caching Author: Kai-Yuan Ho, Yaw-Chung Chen Publisher: ChinaCom 2008 Presenter: Chen-Yu Chaug.
Fair Scheduling in Web Servers CS 213 Lecture 17 L.N. Bhuyan.
Internet Cache Pollution Attacks and Countermeasures Yan Gao, Leiwen Deng, Aleksandar Kuzmanovic, and Yan Chen Electrical Engineering and Computer Science.
A Survey of proxy Cache Evaluation Techniques 系統實驗室 田坤銘
Web Caching Robert Grimm New York University. Before We Get Started  Illustrating Results  Type Theory 101.
Web Caching Schemes For The Internet – cont. By Jia Wang.
Capacity planning for web sites. Promoting a web site Thoughts on increasing web site traffic but… Two possible scenarios…
Least Popularity-per-Byte Replacement Algorithm for a Proxy Cache Kyungbaek Kim and Daeyeon Park. Korea Advances Institute of Science and Technology (KAIST)
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 34 – Media Server (Part 3) Klara Nahrstedt Spring 2012.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
Web Caching and Content Delivery. Caching for a Better Web Performance is a major concern in the Web Proxy caching is the most widely used method to improve.
1 Proxy-Assisted Techniques for Delivering Continuous Multimedia Streams Lixin Gao, Zhi-Li Zhang, and Don Towsley.
Distributed Data Stores – Facebook Presented by Ben Gooding University of Arkansas – April 21, 2015.
By Ravi Shankar Dubasi Sivani Kavuri A Popularity-Based Prediction Model for Web Prefetching.
1 Ekow J. Otoo Frank Olken Arie Shoshani Adaptive File Caching in Distributed Systems.
A User Experience-based Cloud Service Redeployment Mechanism KANG Yu.
Achieving Load Balance and Effective Caching in Clustered Web Servers Richard B. Bunt Derek L. Eager Gregory M. Oster Carey L. Williamson Department of.
Server Load Balancing. Introduction Why is load balancing of servers needed? If there is only one web server responding to all the incoming HTTP requests.
Infrastructure for Better Quality Internet Access & Web Publishing without Increasing Bandwidth Prof. Chi Chi Hung School of Computing, National University.
On the Scale and Performance of Cooperative Web Proxy Caching University of Washington Alec Wolman, Geoff Voelker, Nitin Sharma, Neal Cardwell, Anna Karlin,
Web Cache Replacement Policies: Properties, Limitations and Implications Fabrício Benevenuto, Fernando Duarte, Virgílio Almeida, Jussara Almeida Computer.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
Data Structures & Algorithms and The Internet: A different way of thinking.
Scalable Web Server on Heterogeneous Cluster CHEN Ge.
Design and Analysis of Advanced Replacement Policies for WWW Caching Kai Cheng, Yusuke Yokota, Yahiko Kambayashi Department of Social Informatics Graduate.
Understanding the Performance of Web Caching System with an Analysis Model and Simulation Xiaosong Hu Nur Zincir-Heywood Sep
Kiew-Hong Chua a.k.a Francis Computer Network Presentation 12/5/00.
استاد : مهندس حسین پور ارائه دهنده : احسان جوانمرد Google Architecture.
AlvisP2P : Scalable Peer-to-Peer Text Retrieval in a Structured P2P Network Toan Luu, Gleb Skobeltsyn, Fabius Klemm, Maroje Puh, Ivana Podnar Zarko, Martin.
Server to Server Communication Redis as an enabler Orion Free
Multicache-Based Content Management for Web Caching Kai Cheng and Yahiko Kambayashi Graduate School of Informatics, Kyoto University Kyoto JAPAN.
PROP: A Scalable and Reliable P2P Assisted Proxy Streaming System Computer Science Department College of William and Mary Lei Guo, Songqing Chen, and Xiaodong.
Evaluating Content Management Techniques for Web Proxy Caches Martin Arlitt, Ludmila Cherkasova, John Dilley, Rich Friedrich and Tai Jin Proceeding on.
Measuring the Capacity of a Web Server USENIX Sympo. on Internet Tech. and Sys. ‘ Koo-Min Ahn.
 Cachet Technologies 1998 Cachet Technologies Technology Overview February 1998.
Energy-Efficient Data Caching and Prefetching for Mobile Devices Based on Utility Huaping Shen, Mohan Kumar, Sajal K. Das, and Zhijun Wang P 邱仁傑.
Data Indexing in Peer- to-Peer DHT Networks Garces-Erice, P.A.Felber, E.W.Biersack, G.Urvoy-Keller, K.W.Ross ICDCS 2004.
An Overview of Proxy Caching Algorithms Haifeng Wang.
Evaluating Content Management Technique for Web Proxy Cache M. Arlitt, L. Cherkasova, J. Dilley, R. Friedrich and T. Jin MinSu Shin.
Content Delivery Networks: Status and Trends Speaker: Shao-Fen Chou Advisor: Dr. Ho-Ting Wu 5/8/
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Introduction to Performance Testing Performance testing is the process of determining the speed or effectiveness of a computer, network, software program.
Overview on Web Caching COSC 513 Class Presentation Instructor: Prof. M. Anvari Student name: Wei Wei ID:
Presented by Michael Rainey South Mississippi Linux Users Group
Clustered Web Server Model
N-Tier Architecture.
Energy Conservation in Content Distribution Networks
The Impact of Replacement Granularity on Video Caching
Data Dissemination and Management (2) Lecture 10
On the Scale and Performance of Cooperative Web Proxy Caching
Internet: Quality of Service Mechanisms at Application Level
Data Dissemination and Management (2) Lecture 10
Presentation transcript:

Submitting: Barak Pinhas Gil Fiss Laurent Levy

Caching by proxy servers The World-Wide Web evolution since its introduction in 1990 has evolved from a simple client server model into a complex distributed architecture. This evolution has been driven largely due to the scaling problems associated with exponential growth. One of the core infrastructure components that have been employed to meet the demands of this growth is caching by proxy servers.

A proxy server is an intermediary program which acts as both a server and a client for the purpose of making requests on behalf of other clients. The proxy’s cache stores cacheable responses in order to reduce the response time and network bandwidth consumption on future, equivalent requests. A proxy:

Proxy cache capacity The proxy cache must utilize a clean-up algorithm to determine which documents to throw away when its capacity limit is reached. When the proxy free space reaches a certain limit, a number of web pages are cleared from the proxy.

Proxy cluster director user Proxy #1 Proxy #2 Proxy #n Web server 1.The user request for a web page 2.The director select a proxy to handle the request 4.if the requested web page is not in the proxy’s cahce,the proxy searches the neighboring proxies for the web page,and if the web page is not found in the neighboring proxies the proxy takes the page from the web server. 3.The proxy checks if he has the requested page

Proxy cache capacity Methods to determine the web pages that would be cleared: LFU aging Least Frequently Used aging. The document which has been requested least frequently is cleared from the cache. LRU aging Least Recently Used aging. The document which has been requested least recently is cleared from the cache. Perfect LFU Perfect Least Frequently Used aging. In this method the document which has been requested least frequently is cleared from the cache.

Project’s aims and measurements Proxy servers that cache web pages can potentially reduce: The number of requests that arrive to the web servers ( the load on web servers in units of web pages). The volume of network traffic resulting from document requests ( the load on web servers in units of bytes). The latency that an end user experiences in retrieving a document

Selection methods for the Director 1. RRM - Round Robin selection method When a page request arrives, the director selects the proxy that is after the last selected proxy in a predetermined fixed order.

2.Hash Function The hash key is the URL, when a new request arrives with a given URL the request goes to the proxy number hash(URL). Index k director Proxy #1 Proxy #k Proxy #n Hash function Selection methods for the Director

The Hash function is: Hash(Url Number) = mod Selection methods for the Director

3.Unfinished job evaluating the number of jobs that the proxy takes care of and giving the request to the proxy with the least jobs at the time of the request. 1.The director selects the proxy with the least tasks Proxy #1Proxy #2 Proxy #3 tasks time tasks time At the time of the request, proxy #1 has 1 task At the time of the request, proxy #2 has 2 task At the time of the request, proxy #3 has 2 task Selection methods for the Director

5. BLFU – byte least frequently used. Selection methods for the Director In this Method each proxy has a BLFU Value ( In The PLFU method the system remembers the usage frequency record of each request after that request was erased. )

Selection methods for the Director Proxies with BLFU Value higher then a certain Verge are ignored

4. PLFU – perfect LFU: Selection methods for the Director In this Method each proxy has a PLFU Value ( In The PLFU method the system remembers the usage frequency record of each request after that request was erased. )

Selection methods for the Director Proxies with PLFU Value higher then a certain Verge are ignored

Expected results We expected ROUND-ROBIN oriented selection methods (RRM TASKS and PLFU/BLFU) to get a lower local hit ratio then the hash selection methods, mainly because while using the hash method a cluster hit will always come with a local hit. That is why a hash function that is not even might lead a a lower cluster hit rate. Among the ROUND-ROBIN oriented selection methods we expected the “even load distribution“ methods like TASKS and PLFU/BLFU to get a better hit ratio then the plain RRM because we expected these methods to grant us an even distribution and that way less pruning and a more adaptive cluster (a better cluster hit ratio). Object hit ratio

Expected results Byte hit ratio We expected the methods that takes requests sizes into consideration to get a better byte hit ratio Load distribution We expected the methods that strive to achieve a better distribution (like RRM TASKS and PLFU/BLFU) to get a better load distribution then the Hash method. We expected the following best results ranking: BLFU/PLFU - because of the “perfect” technique used. TASK - because of the load distribution. RRM - because of a simple distribution. HASH – because the hash keying might not be even.

The results In this graph we see a significant advantage to the hash selection method. The average hit rate for the hash selection method is about 62%-65%. But a disadvantage of this method is that the load distribution is not even. All the other method produced about 50% hit rate. Comparing the director selection methods

Hit rate As we can see in the graph,the best result of hit rate was in hash for the director method and LFU,LRU and PLFU for the proxies pruning method. In the next place we see the task method for the director and PLFU for the proxy pruning method. Comparing all the possible director selection and proxy pruning methods

Byte hit rate In this graph we can see again that the hash method for the director Got the best results. Comparing to the hit rate we can see that the hash method result differs More From other method result in the byte hit rate campers to the hit rate graph. Comparing all the possible director selection and proxy pruning methods

Load distribution In this graph we see that there is no even distribution among the proxies. Proxy #1 got more request in compare to the other proxies when hash method Was chosen for the director method,and proxy #5 got more request when tasks Method was chosen for the director. Comparing all the possible director selection and proxy pruning methods