evaluating content management techniques for web proxy caches

15
Evaluating Content Management Techniques for Web Proxy Caches Martin Arlitt, Ludmila Cherkasova, John Dilley, Ri ch Friedrich and Tai Jin Hewlett-Packard Laboratories 4th International WWW Caching Workshop 元元元元元元元元元 元元元元元 元元元 1999.10.06

Upload: errol

Post on 18-Jan-2016

32 views

Category:

Documents


0 download

DESCRIPTION

Evaluating Content Management Techniques for Web Proxy Caches. Martin Arlitt, Ludmila Cherkasova, John Dilley, Rich Friedrich and Tai Jin Hewlett-Packard Laboratories 4th International WWW Caching Workshop 元智大學資訊工程所 系統實驗室 陳桂慧 1999.10.06. Outline. Key workload characteristic - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Evaluating Content Management Techniques for Web Proxy Caches

Evaluating Content Management Techniques for Web Proxy Caches

Martin Arlitt, Ludmila Cherkasova, John Dilley, Rich Friedrich and Tai Jin

Hewlett-Packard Laboratories

4th International WWW Caching Workshop

元智大學資訊工程所 系統實驗室陳桂慧

1999.10.06

Page 2: Evaluating Content Management Techniques for Web Proxy Caches

Outline

• Key workload characteristic• Experimental design • Simulation results• Conclusion

Page 3: Evaluating Content Management Techniques for Web Proxy Caches

Key Workload Characteristics

• Cacheable objects• Object set sizes• Object sizes• Recency of reference• Frequency of reference• Turnover

Page 4: Evaluating Content Management Techniques for Web Proxy Caches

Experimental Design

• Cache size– 256 MB, 1 GB, 4 GB, 16 GB, 64 GB, 256 GB and

1TB…...

• Cache replacement policy– LRU, SIZE, GD-Size, LFU, GDSF, LFU-DA

– LAT, HYB

• Performance metrics– Hit rate

– Byte hit rate

Page 5: Evaluating Content Management Techniques for Web Proxy Caches

Replacement Algorithm (1)

• Least-Recently-Used (LRU)– replaces the object requested least recently.

• SIZE– replaces the largest object.

• LFU– replaces the least frequently used object.

• GreedyDual-Size (GD-Size)– replaces the object with the lowest utility.

– Ki = Ci / Si + L

Page 6: Evaluating Content Management Techniques for Web Proxy Caches

Replacement Algorithm (2)

• GreedyDual-Size with Frequency (GDSF)– Ki = Fi * Ci / Si + L

• Least Frequently Used with Dynamic Aging(LFU-DA)– Ki = Ci * Fi + L

Page 7: Evaluating Content Management Techniques for Web Proxy Caches

Hybrid Algorithm (HYB)

• Motivated by Bolot and Joschka’s algorithmW1rtti + W2 si + (W3 + W4 si)/ti

– ti : the time since the document was last referenced

– rtti : the time it took to retrieve the document

• (clatser(i) + WB/cbwser(i))(nrefi** WN)/ si

– nrefi : the number of references to document i since it last entered the cache

– si : the size in bytes of document i– WB and WN : constants that set the relative importance of the variables

cbwser(i) and nrefj

Page 8: Evaluating Content Management Techniques for Web Proxy Caches

Latency Estimation Algorithm (LAT)

• clatj = (1-ALPHA) clatj + ALPHA sclat

• cbwj = (1-ALPHA) cbwj + ALPHA scbw.– Clatj : estimated latency (time) to open a connection to the

server– cbwj : estimated bandwidth of the connection– sclat and scbw : the connection establishment latency and

bandwidth for that document are measured

• di = clatser(i) + si/cbwser(i)– ser(i) : the server on which document i resides

– si : the document's size – di : LAT selects for replacement the document i with the smallest

download time estimate

Page 9: Evaluating Content Management Techniques for Web Proxy Caches

• Comparison of existing replacement policies

GD-Size(1)LFU-AgingSIZELFUGD-Size(P)LRU

LFU-AgingGD-Size(P)LRULFUGD-Size(1) SIZE

Page 10: Evaluating Content Management Techniques for Web Proxy Caches

• Comparison of proposed policies to existing replacement policies

GDSF-HitsGD-Size(1)LFU-AgingLFU-DAGD-Size(P)LRU

LFU-AgingLFU-DAGD-Size(P)LRU GDSF-HitsGD-Size(1)

Page 11: Evaluating Content Management Techniques for Web Proxy Caches

Virtual Caches

• An approach that can focus on both of high hit rates and high byte rate.– each virtual cache (VC) is then managed with its own rep

lacement policy. • initially all objects are added to VC 0,

• replacements from VC i are moved to VC i+1,

• replacements from VC n-1 are evicted from the cache.

• all objects that are reaccessed while in the cache (i.e., cache hits) are reinserted in VC 0 .

– this allows in-demand objects to stay in the cache for a longer period of time.

Page 12: Evaluating Content Management Techniques for Web Proxy Caches

GDSF-HitsVC-HB-75/25VC-HB-50/50VC-HB-25/75LFU-DALRU

LFU-DAVC-HB-25/75VC-HB-50/50VC-HB-75/25LRUGDSF-Hits

• Analysis of Virtual Cache Performance – VC0 using GDSF-Hits, VC1 using LFU-DA.

Page 13: Evaluating Content Management Techniques for Web Proxy Caches

• Analysis of Virtual Cache Management – VC0 using LFU-DA, VC1 using GDSF-Hits.

GDSF-HitsVC-HB-25/75VC-HB-50/50VC-HB-75/25 LFU-DALRU

LFU-DAVC-HB-25/75VC-HB-50/50VC-HB-75/25GDSF-HitsLRU

Page 14: Evaluating Content Management Techniques for Web Proxy Caches

• Analysis of Virtual Cache Management – effects of VC order on performance

VC-BH-25/75VC-HB-75/25VC-BH-50/50VC-HB-50/50 VC-BH-75/25VC-HB-25/75

VC-HB-25/75 VC-BH-75/25 VC-HB-50/50 VC-BH-50/50VC-HB-75/25VC-BH-25/75

Page 15: Evaluating Content Management Techniques for Web Proxy Caches

Conclusion

• Size-based policies achieve higher hit rates than other policies.

• Frequency-based policies are more effective at improving the byte hit rate of a proxy cache.

• Virtual caches as an approach provide optimal cache performance for multiple metrics simultaneously.