230 likes | 243 Views
Explore the role of web caching in reducing response time, internet traffic, and total delays in computer networks. Learn about proxy servers, DNS protocols, layered protocols, and more.
E N D
EEC-484/584Computer Networks Lecture 6 Wenbing Zhao wenbing@ieee.org
Outline • Reminder: • Feb 19, no class due to President’s Day • Feb 21, quiz#1 (Ch.1 & Ch.7) • Lecture 1-6; lab 1-2 • Feb 26, 3pm: CSU Data center tour • 10th floor of Rhodes Tower • Feb 26, 6-8pm: Java Tutorial #1 • Web Caching • DNS Resource Records • In-class Exercises EEC-484/584: Computer Networks
user sets browser: Web accesses via proxy server browser sends all HTTP requests to proxy server object in cache: returns cached object else cache requests object from origin server, then returns object to client Web Caching Goal: satisfy client request without involving origin server origin server Proxy server HTTP request HTTP request client HTTP response HTTP response HTTP request HTTP response client origin server EEC-484/584: Computer Networks
Proxy server acts as both client and server Typically proxy server is installed by ISP (university, company, residential ISP) Why Web caching? Reduce response time for client request Reduce traffic on an institution’s access link Internet dense with caches: enables “poor” content providers to effectively deliver content More about Web Caching EEC-484/584: Computer Networks
Assumptions Average object size = 100,000 bits Avg. request rate from institution’s browsers to origin servers = 15/sec Delay from institutional router to any origin server and back to router = 2 sec Non-Caching Example origin servers public Internet 1.5 Mbps access link institutional network 10 Mbps LAN EEC-484/584: Computer Networks
Consequences Utilization on LAN = 15% Utilization on access link = 100% Total delay = Internet delay + access delay + LAN delay = 2 sec + minutes + milliseconds Non-Caching Example origin servers public Internet 1.5 Mbps access link institutional network 10 Mbps LAN EEC-484/584: Computer Networks
Possible solution Increase bandwidth of access link to, say, 10 Mbps Consequences Utilization on LAN = 15% Utilization on access link = 15% Total delay = Internet delay + access delay + LAN delay = 2 sec + msecs + msecs Often a costly upgrade Non-Caching Example origin servers public Internet 10 Mbps access link institutional network 10 Mbps LAN EEC-484/584: Computer Networks
Install proxy server Suppose hit rate is 0.4 Consequence 40% requests will be satisfied almost immediately 60% requests satisfied by origin server Utilization of access link reduced to 60%, resulting in negligible delays (say 10 msec) Total avg delay = Internet delay + access delay + LAN delay = .6*(2.01) secs + .4*milliseconds < 1.4 secs Caching Example origin servers public Internet 1.5 Mbps access link institutional network 10 Mbps LAN Institutional Proxy server EEC-484/584: Computer Networks
Type A RR • Type A DNS records map a host name to an IPv4 address EEC-484/584: Computer Networks
Type NS RR • Type NS records within the zone file are authoritative records for the zone's name servers EEC-484/584: Computer Networks
Type CNAME RR • A Type CNAME record maps an alias or nickname to the real or Canonical name EEC-484/584: Computer Networks
Type MX RR • Type MX records Specifies the name and relative preference of mail servers for the zone EEC-484/584: Computer Networks
DNS Protocol, Messages Name, type fields for a query RRs in response to query records for authoritative servers additional “helpful” info that may be used EEC-484/584: Computer Networks
Layered Protocols • Q1. If the unit exchanged at the data link level is called a frame and the unit exchanged at the network level is called a packet, do frames encapsulate packets or do packets encapsulate frames? Explain your answer. EEC-484/584: Computer Networks
Layered Protocols • Q2. A system has an n-layer protocol hierarchy. Applications generate messages of length M bytes. At each of the layers, an h-byte header is added. What fraction of the network bandwidth is filled with headers? EEC-484/584: Computer Networks
Reliable Communication • Q3. When a file is transferred between two computers, two acknowledgement strategies are possible. In the first one, the file is chopped up into packets, which are individually acknowledged by the receiver, but the file transfer as a whole is not acknowledged. In the second one, the packets are not acknowledged individually, but the entire file is acknowledged when it arrives. Discuss these two approaches. EEC-484/584: Computer Networks
URL • Q4. Imagine that someone in the CS Department at Stanford has just written a new program that he wants to distribute by FTP. He puts the program in the FTP directory ftp/pub/freebies/newprog.c. What is the URL for this program likely to be? EEC-484/584: Computer Networks
HTTP and Caching • Q5. The If-Modified-Since header can be used to check whether a cached page is still valid. Requests can be made for pages containing images, sound, video, and so on, as well as HTML. Do you think the effectiveness of this technique is better or worse for JPEG images ascompared to HTML? EEC-484/584: Computer Networks
Web and Caching • Q6. Consider an institutional network connected to the internet. Suppose that the average object size is 900,000 bits and that the average request rate from the institution’s browsers to the origin servers is 1.5 requests per second. The bandwidth of the access link is 1.5 Mbps. Also suppose that the amount of time it takes from when the router on the Internet side of the access link forwards an HTTP request until it receives the response in two seconds on average. Model the total average response time as the sum of the average access delay (that is, the delay from Internet router to institution router) and the average Internet delay. (continued on next slide) EEC-484/584: Computer Networks
Web and Caching • Q6 (cont’d) For the average access delay, use D/(1-Db), where D is the average time required to send an object over the access link and b is the arrival rate of objects to the access link. • Find the total average response time. • Now suppose a cache is installed in the institutional LAN. Suppose the high rate is 0.4. Find the total response time. EEC-484/584: Computer Networks
DNS • Q7. DNS typically uses UDP instead of TCP. If a DNS packet is lost, there is no automatic recovery. Does this cause a problem, and if so, how is it solved? EEC-484/584: Computer Networks
DNS • Q8.Although it was not mentioned in the text, an alternative form for a URL is to use the IP address instead of its DNS name. An example of using an IP address is http://192.31.231.66/index.html. How does the browser know whether the name following the scheme is a DNS name or an IP address. EEC-484/584: Computer Networks
DNS, Web, HTTP • Q9. Suppose within your Web browser you click on a link to obtain a Web page. The IP address for the associated URL is not cached in your local host, so a DNS look-up is necessary to obtain the IP address. Suppose that n DNS servers are visited before your host receives the IP address from DNS; the successive visits incur an RTT of RTT1, …, RTTn. Further suppose that the Web page associated with the link contains exactly one object, consisting of a small amount of HTML text. Let RTT0 denote the RTT between the local host and the server containing the object. Assuming 0 transmission time of the object, how much time elapses from when the client clicks on the link until the client receives the object? EEC-484/584: Computer Networks