Web Content Delivery Reading: Section 9.1.2 and 9.4.3 COS 461: Computer Networks Spring 2009 (MW 1:30-2:50 in CS105) Mike Freedman Teaching Assistants:

Slides:



Advertisements
Similar presentations
Nick Feamster CS 3251: Computer Networking I Spring 2013
Advertisements

1 Server Selection & Content Distribution Networks (slides by Srini Seshan, CS CMU)
HyperText Transfer Protocol (HTTP)
EEC-484/584 Computer Networks Lecture 6 Wenbing Zhao
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Chapter 9 Application Layer, HTTP Professor Rick Han University of Colorado at Boulder
Application Layer  We will learn about protocols by examining popular application-level protocols  HTTP  FTP  SMTP / POP3 / IMAP  Focus on client-server.
Distributed Systems Spring 2009
Chapter 2: Application Layer
EEC-484/584 Computer Networks Discussion Session for HTTP and DNS Wenbing Zhao
HyperText Transfer Protocol (HTTP) Computer Networks Computer Networks Spring 2012 Spring 2012.
15-441: Computer Networking The “Web” Thomas Harris (slides from Srini Seshan’s Fall ’01 course)
How the web works: HTTP and CGI explained
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
HTTP and Web Content Delivery COS 461: Computer Networks Spring 2011 Mike Freedman
Web Content Delivery Reading: Section and COS 461: Computer Networks Spring 2010 (MW 3:00-4:20 in CS105) Mike Freedman
Chapter 2 Application Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July.
Web, HTTP and Web Caching
Application Layer  We will learn about protocols by examining popular application-level protocols  HTTP  FTP  SMTP / POP3 / IMAP  Focus on client-server.
2/9/2004 Web and HTTP February 9, /9/2004 Assignments Due – Reading and Warmup Work on Message of the Day.
Caching and Content Distribution Networks. Web Caching r As an example, we use the web to illustrate caching and other related issues browser Web Proxy.
Content Distribution Networks CPE 401 / 601 Computer Network Systems Modified from Ravi Sundaram, Janardhan R. Iyengar, and others.
Network Protocols: Design and Analysis Polly Huang EE NTU
CS640: Introduction to Computer Networks Aditya Akella Lecture 18 - The Web, Caching and CDNs.
FTP (File Transfer Protocol) & Telnet
HTTP Reading: Section and COS 461: Computer Networks Spring
CP476 Internet Computing Lecture 5 : HTTP, WWW and URL 1 Lecture 5. WWW, HTTP and URL Objective: to review the concepts of WWW to understand how HTTP works.
Rensselaer Polytechnic Institute Shivkumar Kalvanaraman, Biplab Sikdar 1 The Web: the http protocol http: hypertext transfer protocol Web’s application.
20-1 Last time □ NAT □ Application layer ♦ Intro ♦ Web / HTTP.
2: Application Layer1 Internet apps: their protocols and transport protocols Application remote terminal access Web file transfer streaming multimedia.
Week 11: Application Layer1 Web and HTTP First some jargon r Web page consists of objects r Object can be HTML file, JPEG image, Java applet, audio file,…
Maryam Elahi University of Calgary – CPSC 441.  HTTP stands for Hypertext Transfer Protocol.  Used to deliver virtually all files and other data (collectively.
Introduction 1 Lecture 6 Application Layer (HTTP) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
2: Application Layer1 Web and HTTP First some jargon Web page consists of base HTML-file which includes several referenced objects Object can be HTML file,
1 Computer Communication & Networks Lecture 28 Application Layer: HTTP & WWW p Waleed Ejaz
Sistem Jaringan dan Komunikasi Data #9. DNS The Internet Directory Service  the Domain Name Service (DNS) provides mapping between host name & IP address.
CS640: Introduction to Computer Networks Aditya Akella Lecture 4 - Application Protocols, Performance.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
Hui Zhang, Fall Computer Networking Web, HTTP, Caching.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 8 Omar Meqdadi Department of Computer Science and Software Engineering University of.
HyperText Transfer Protocol (HTTP) RICHI GUPTA CISC 856: TCP/IP and Upper Layer Protocols Fall 2007 Thanks to Dr. Amer, UDEL for some of the slides used.
Application Layer 2-1 Chapter 2 Application Layer 2.2 Web and HTTP.
CIS679: Lecture 13 r Review of Last Lecture r More on HTTP.
CSx760 Computer Networks1 HTTP. CSx760 Computer Networks2 The Web: Some Jargon r Web page: m consists of “objects” m addressed by a URL r Most Web pages.
CSE 524: Lecture 4 Application layer protocols. Administrative ● Reading assignment Chapter 2 ● Mid-term exam may be delayed to 11/2/2004 – Mostly on.
Application Layer 2-1 Lecture 4: Web and HTTP. Web and HTTP First, a review… web page consists of objects object can be HTML file, JPEG image, Java applet,
Important r There will be NO CLASS on Friday 1/30/2015! r Please mark you calendars 1.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP.
EE 122: Lecture 21 (HyperText Transfer Protocol - HTTP) Ion Stoica Nov 20, 2001 (*)
Content Distribution Network, Proxy CDN: Distributed Environment
Overview of Servlets and JSP
Computer Networking Lecture 25 – The Web.
1 COMP 431 Internet Services & Protocols HTTP Persistence & Web Caching Jasleen Kaur February 11, 2016.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 7 Omar Meqdadi Department of Computer Science and Software Engineering University of.
EEC-484/584 Computer Networks Lecture 4 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Computer Networking The Web. 2 Web history 1945: Vannevar Bush, “As we may think”, Atlantic Monthly, July, describes the idea of a distributed.
HyperText Transfer Protocol (HTTP) Deepti Kulkarni CISC 856: TCP/IP and Upper Layer Protocols Fall 2008 Acknowledgements Professor Amer Richi Gupta.
Content Distribution Networks (CDNs)
Week 11: Application Layer 1 Web and HTTP r Web page consists of objects r Object can be HTML file, JPEG image, Java applet, audio file,… r Web page consists.
© Janice Regan, CMPT 128, Jan 2007 CMPT 371 Data Communications and Networking HTTP 0.
2: Application Layer 1 Chapter 2 Application Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added.
Content Distribution Networks
Block 5: An application layer protocol: HTTP
HTTP request message: general format
Web Caching, Content Delivery Networks, Consistent Hashing
Computer Communication & Networks
Lecture 6 – Web Optimizations
Content Distribution Networks
Hypertext Transfer Protocol (HTTP)
CSCI-351 Data communication and Networks
Presentation transcript:

Web Content Delivery Reading: Section and COS 461: Computer Networks Spring 2009 (MW 1:30-2:50 in CS105) Mike Freedman Teaching Assistants: Wyatt Lloyd and Jeff Terrace 1

Outline HTTP review Persistent HTTP HTTP caching Proxying and content distribution networks – Web proxies – Hierarchical networks and Internet Cache Protocol (ICP) – Modern distributed CDNs (Akamai) 2

HTTP Basics (Review) HTTP layered over bidirectional byte stream – Almost always TCP Interaction – Client sends request to server, followed by response from server to client – Requests/responses are encoded in text Stateless – Server maintains no info about past client requests 3

HTTP Request Request line – Method GET – return URI HEAD – return headers only of GET response POST – send data to the server (forms, etc.) – URL (relative) E.g., /index.html – HTTP version 4

HTTP Request (cont.) Request headers – Authorization – authentication info – Acceptable document types/encodings – From – user – If-Modified-Since – Referrer – what caused this page to be requested – User-Agent – client software Blank-line Body 5

HTTP Request 6

HTTP Request Example GET / HTTP/1.1 Accept: */* Accept-Language: en-us Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 5.0) Host: Connection: Keep-Alive 7

HTTP Response Status-line – HTTP version – 3 digit response code 1XX – informational 2XX – success – 200 OK 3XX – redirection – 301 Moved Permanently – 303 Moved Temporarily – 304 Not Modified 4XX – client error – 404 Not Found 5XX – server error – 505 HTTP Version Not Supported – Reason phrase 8

HTTP Response (cont.) Headers – Location – for redirection – Server – server software – WWW-Authenticate – request for authentication – Allow – list of methods supported (get, head, etc) – Content-Encoding – E.g x-gzip – Content-Length – Content-Type – Expires – Last-Modified Blank-line Body 9

HTTP Response Example HTTP/ OK Date: Tue, 27 Mar :49:38 GMT Server: Apache/ (Unix) (Red-Hat/Linux) mod_ssl/2.7.1 OpenSSL/0.9.5a DAV/1.0.2 PHP/4.0.1pl2 mod_perl/1.24 Last-Modified: Mon, 29 Jan :54:18 GMT ETag: "7a11f-10ed-3a75ae4a" Accept-Ranges: bytes Content-Length: 4333 Keep-Alive: timeout=15, max=100 Connection: Keep-Alive Content-Type: text/html ….. 10

How to Mark End of Message? Content-Length – Must know size of transfer in advance Close connection – Only server can do this Implied length – E.g., 304 never have body content Transfer-Encoding: chunked (HTTP/1.1) – After headers, each chunk is content length in hex, CRLF, then body. Final chunk is length 0. 11

Outline HTTP review Persistent HTTP HTTP caching Proxying and content distribution networks – Web proxies – Hierarchical networks and Internet Cache Protocol (ICP) – Modern distributed CDNs (Akamai) 12

Single Transfer Example Client 13 Server SYN ACK DAT FIN ACK 0 RTT 1 RTT 2 RTT 3 RTT 4 RTT Server reads from disk FIN Server reads from disk Client opens TCP connection Client sends HTTP request for HTML Client parses HTML Client opens TCP connection Client sends HTTP request for image Image begins to arrive

Problems with simple model Multiple connection setups – Three-way handshake each time Short transfers are hard on TCP – Stuck in slow start – Loss recovery is poor when windows are small Lots of extra connections – Increases server state/processing – Server forced to keep TIME_WAIT connection state 14

TCP Interaction: Short Transfers Multiple connection setups – Three-way handshake each time Round-trip time estimation – Maybe large at the start of a connection (e.g., 3 seconds) – Leads to latency in detecting lost packets Congestion window – Small value at beginning of connection (e.g., 1 MSS) – May not reach a high value before transfer is done Detecting packet loss – Timeout: slow  – Duplicate ACK Requires many packets in flight Which doesn’t happen for very short transfers  15

Persistent Connection Example Client 16 Server ACK DAT ACK 0 RTT 1 RTT 2 RTT Server reads from disk Client sends HTTP request for HTML Client parses HTML Client sends HTTP request for image Image begins to arrive DAT Server reads from disk DAT

Persistent HTTP Non-persistent HTTP issues: Requires 2 RTTs per object OS must allocate resources for each TCP connection But browsers often open parallel TCP connections to fetch referenced objects Persistent HTTP: Server leaves connection open after sending response Subsequent HTTP messages between same client/server are sent over connection Persistent without pipelining: Client issues new request only when previous response has been received One RTT for each object Persistent with pipelining: Default in HTTP/1.1 Client sends requests as soon as it encounters referenced object As little as one RTT for all the referenced objects 17

Outline HTTP review Persistent HTTP HTTP caching Proxying and content distribution networks – Web proxies – Hierarchical networks and Internet Cache Protocol (ICP) – Modern distributed CDNs (Akamai) 18

HTTP Caching Clients often cache documents – When should origin be checked for changes? – Every time? Every session? Date? HTTP includes caching information in headers – HTTP 0.9/1.0 used: “Expires: ”; “Pragma: no-cache” – HTTP/1.1 has “Cache-Control” “No-Cache”, “Private”, “Max-age: ” “E-tag: ” If not expired, use cached copy If expired, use condition GET request to origin – “If-Modified-Since: ”, “If-None-Match: ” – 304 (“Not Modified”) or 200 (“OK”) response 19

Example Cache Check Request GET / HTTP/1.1 Accept: */* Accept-Language: en-us Accept-Encoding: gzip, deflate If-Modified-Since: Mon, 29 Jan :54:18 GMT If-None-Match: "7a11f-10ed-3a75ae4a" User-Agent: Mozilla/4.0 (compat; MSIE 5.5; Windows NT 5.0) Host: Connection: Keep-Alive 20

Example Cache Check Response HTTP/ Not Modified Date: Tue, 27 Mar :50:51 GMT Server: Apache/ (Unix) (Red-Hat/Linux) mod_ssl/2.7.1 OpenSSL/0.9.5a DAV/1.0.2 PHP/ 4.0.1pl2 mod_perl/1.24 Connection: Keep-Alive Keep-Alive: timeout=15, max=100 ETag: "7a11f-10ed-3a75ae4a” 21

Web Proxy Caches User configures browser: Web accesses via cache Browser sends all HTTP requests to cache – Object in cache: cache returns object – Else: cache requests object from origin, then returns to client 22 client Proxy server client HTTP request HTTP response HTTP request HTTP response origin server origin server

Caching Example (1) Assumptions Average object size = 100K bits Avg. request rate from browsers to origin servers = 15/sec Delay from institutional router to any origin server and back to router = 2 sec Consequences Utilization on LAN = 15% Utilization on access link = 100% Total delay = Internet delay + access delay + LAN delay = 2 sec + minutes + milliseconds 23 origin servers public Internet institutional network 10 Mbps LAN 1.5 Mbps access link

Caching Example (2) Possible Solution Increase bandwidth of access link to, say, 10 Mbps Often a costly upgrade Consequences Utilization on LAN = 15% Utilization on access link = 15% Total delay = Internet delay + access delay + LAN delay = 2 sec + minutes + milliseconds 24 origin servers public Internet institutional network 10 Mbps LAN 10 Mbps access link

Caching Example (3) Install Cache Support hit rate is 40% Consequences 40% requests satisfied almost immediately (say 10 msec) 60% requests satisfied by origin Utilization of access link down to 60%, yielding negligible delays Weighted average of delays =.6*2 s +.4*10 ms < 1.3 s 25 origin servers public Internet institutional network 10 Mbps LAN 10 Mbps access link institutional cache

When a single cache isn’t enough What if the working set is > proxy disk? – Cooperation! A static hierarchy – Check local – If miss, check siblings – If miss, fetch through parent Internet Cache Protocol (ICP) – ICPv2 in RFC 2186 (& 2187) – UDP-based, short timeout 26 public Internet Parent web cache

Problems Significant fraction (>50%?) of HTTP objects uncachable Sources of dynamism? – Dynamic data: Stock prices, scores, web cams – CGI scripts: results based on passed parameters – Cookies: results may be based on passed data – SSL: encrypted data is not cacheable – Advertising / analytics: owner wants to measure # hits Random strings in content to ensure unique counting 27

Content Distribution Networks (CDNs) Content providers are CDN customers Content replication CDN company installs thousands of servers throughout Internet – In large datacenters – Or, close to users CDN replicates customers’ content When provider updates content, CDN updates servers 28 origin server in North America CDN distribution node CDN server in S. America CDN server in Europe CDN server in Asia

Content Distribution Networks & Server Selection Replicate content on many servers Challenges – How to replicate content – Where to replicate content – How to find replicated content – How to choose among know replicas – How to direct clients towards replica 29

Server Selection Which server? – Lowest load: to balance load on servers – Best performance: to improve client performance Based on Geography? RTT? Throughput? Load? – Any alive node: to provide fault tolerance How to direct clients to a particular server? – As part of routing: anycast, cluster load balancing – As part of application: HTTP redirect – As part of naming: DNS 30

Trade-offs between approaches Routing based (IP anycast) – Pros: Transparent to clients, works when browsers cache failed addresses, circumvents many routing issues – Cons: Application based (HTTP redirects) – Pros: – Cons: Naming based (DNS selection) – Pros: – Cons: 31

Trade-offs between approaches Routing based (IP anycast) – Pros: Transparent to clients, works when browsers cache failed addresses, circumvents many routing issues – Cons: Little control, complex, scalability, TCP can’t recover, … Application based (HTTP redirects) – Pros: – Cons: Naming based (DNS selection) – Pros: – Cons: 32

Trade-offs between approaches Routing based (IP anycast) – Pros: Transparent to clients, works when browsers cache failed addresses, circumvents many routing issues – Cons: Little control, complex, scalability, TCP can’t recover, … Application based (HTTP redirects) – Pros: Application-level, fine-grained control – Cons: Additional load and RTTs, hard to cache Naming based (DNS selection) – Pros: – Cons: 33

Trade-offs between approaches Routing based (IP anycast) – Pros: Transparent to clients, works when browsers cache failed addresses, circumvents many routing issues – Cons: Little control, complex, scalability, TCP can’t recover, … Application based (HTTP redirects) – Pros: Application-level, fine-grained control – Cons: Additional load and RTTs, hard to cache Naming based (DNS selection) – Pros: Well-suitable for caching, reduce RTTs – Cons: Request by resolver not client, request for domain not URL, hidden load factor of resolver’s population Much of this data can be estimated “over time” 34

Outline HTTP review Persistent HTTP HTTP caching Proxying and content distribution networks – Web proxies – Hierarchical networks and Internet Cache Protocol (ICP) – Modern distributed CDNs (Akamai) 35

How Akamai Works Clients fetch html document from primary server – E.g. fetch index.html from cnn.com URLs for replicated content are replaced in HTML – E.g. replaced with – Or, cache.cnn.com, and CNN adds CNAME (alias) for cache.cnn.com  a73.g.akamai.net Client resolves aXYZ.g.akamaitech.net hostname 36

How Akamai Works Akamai only replicates static content – At least, simple version. Akamai also lets sites write code that run on their servers, but that’s a pretty different beast Modified name contains original file name Akamai server is asked for content – First checks local cache – If not in cache, requests from primary server and caches file 37

How Akamai Works Root server gives NS record for akamai.net This nameserver returns NS record for g.akamai.net – Nameserver chosen to be in region of client’s name server – TTL is large g.akamai.net nameserver chooses server in region – Should try to chose server that has file in cache (How?) – Uses aXYZ name and hash – TTL is small (Why?) – Small modification to before: (Why?) CNAME cache.cnn.com  cache.cnn.com.akamaidns.net CNAME cache.cnn.com.akamaidns.net  a73.g.akamai.net 38

Simple Hashing Given document group XYZ, choose a server to use – Suppose we use modulo Number servers from 1…n – Place document XYZ on server (XYZ mod n) – What happens when a servers fails? n  n-1 Same if different people have different measures of n – Why might this be bad? 39

Consistent Hashing “view” = subset of all hash buckets that are visible – For this conversation, “view” is O(n) neighbors – But don’t need strong consistency on views Desired features – Balanced: in any one view, load is equal across buckets – Smoothness: little impact on hash bucket contents when buckets are added/removed – Spread: small set of hash buckets that may hold an object regardless of views – Load: across views, # objects assigned to hash bucket is small 40

Consistent Hashing Bucket 14 Construction – Assign each of C hash buckets to random points on mod 2 n circle; hash key size = n – Map object to random position on circle – Hash of object = closest clockwise bucket Desired features – Balanced: No bucket responsible for large number of objects – Smoothness: Addition of bucket does not cause movement among existing buckets – Spread and load: Small set of buckets that lie near object Used layer in P2P Distributed Hash Tables (DHTs)

How Akamai Works End-user 42 cnn.com (content provider)DNS root serverAkamai server Akamai high-level DNS server Akamai low-level DNS server Nearby hash-chosen Akamai server GET index. html GET /cnn.com/foo.jpg 12 GET foo.jpg 5

How Akamai Works – Already Cached End-user 43 cnn.com (content provider)DNS root serverAkamai server 12 Akamai high-level DNS server Akamai low-level DNS server Nearby hash-chosen Akamai server GET index. html GET /cnn.com/foo.jpg

Summary HTTP: Simple text-based file exchange protocol – Support for status/error responses, authentication, client- side state maintenance, cache maintenance Interactions with TCP – Connection setup, reliability, state maintenance – Persistent connections How to improve performance – Persistent connections – Caching – Replication: Web proxies, cooperative proxies, and CDNs 44