did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780201615708

Web Caching and Replication

by ;
  • ISBN13:

    9780201615708

  • ISBN10:

    0201615703

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2001-12-01
  • Publisher: Addison-Wesley Professional
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $49.99

Summary

In Web Caching and Replication, two AT&T Labs experts bring together real-world implementations, the latest IETF and W3C technical standards, and the field's most advanced research, offering systematic guidance for maximizing Web scalability and performance. The authors first introduce key concepts of Web caching and replication.They introduce HTTP's support for caching and replication, and broadly characterize Web behavior, offering practical rules of thumb for optimizing performance. Next, they focus on caching, helping implementers realistically assess proxy caching, deploy proxies in corporate and ISP networks; and utilize cooperative proxy caching. They offer in-depth insights into cache consistency, and caching the "uncacheable" -- including "cookied" and dynamic content. Part III introduces today's best techniques for web replication, offering in-depth coverage of content delivery networks, server selection, content placement, and more. For all networking professionals, IT professionals, and engineers involved with building or optimizing Internet services or equipment; for content delivery specialists and service providers; and for owners of large sites concerned about scalability and performance.

Table of Contents

Preface xv
Intended Audience xvi
Organization of the Book xvi
Acknowledgments xix
Introduction xxi
The Basics of Web Caching xxiii
The Basics of Web Replication xxv
Beyond Performance xxx
Summary xxxi
PART I BACKGROUND 1(76)
Network Layers and Protocols
3(6)
The ISO/OSI Reference Model
3(2)
Network Components at Different Layers
5(1)
Overview of Internet Protocols
6(2)
Summary
8(1)
The Internet Protocol and Routing
9(12)
Addressing
9(2)
IP Datagram Header
11(2)
Routing
13(4)
Routing within ASs
14(1)
Routing between ASs
15(2)
Multicast
17(3)
Summary
20(1)
Transmission Control Protocol
21(12)
Segment Header
22(2)
Opening a Connection
24(2)
Closing a Connection
26(1)
Flow Control
27(1)
Congestion Control
28(2)
Retransmission
30(1)
Summary
30(3)
Application Protocols for the Web
33(14)
Uniform Resource Locators
33(2)
The Domain Name System
35(3)
Name Hierarchy
35(1)
The DNS Protocol
36(2)
The HyperText Transfer Protocol
38(3)
The HTTP Request
39(1)
The HTTP Response
40(1)
The HTTP Message Exchange
41(2)
Hyperlinks and Embedded Objects
43(2)
Summary
45(2)
HTTP Support for Caching and Replication
47(16)
Conditional Requests
47(2)
Conditional Headers Used for Caching
48(1)
Conditional Headers Used for Replication
48(1)
Age and Expiration of Cached Objects
49(1)
Request Redirection
50(1)
Range Requests
51(1)
The cache-control Header
52(4)
cache-control Header Directives in Requests
52(1)
cache-control Header Directives in Responses
53(1)
Example of the cache-control Header
54(2)
Storing State for a Stateless Server: Cookies
56(2)
Support for Server Sharing
58(1)
Expanded Object Identifiers
58(1)
Learning the Proxy Chain
58(2)
Cacheability of Web Content
60(1)
Summary
61(2)
Web Behavior Rules of Thumb
63(14)
Evaluation Methods
64(2)
Live Measurements
64(1)
Trace-Based Methods
64(1)
Benchmarking
65(1)
Object Size
66(2)
Object Types and Cacheability
68(1)
Object Popularity
69(1)
Locality of Reference
70(3)
Temporal Locality
70(2)
Spatial Locality
72(1)
Rate of Object Modifications
73(1)
Other Observations
73(2)
Summary: Rules of Thumb for the Web
75(2)
PART II WEB CACHING 77(152)
Proxy Caching: Realistic Expectations
79(16)
Do Proxy Caches Deserve a Hearing?
80(1)
Latency Reduction
81(9)
An Optimistic Bound on Latency Reduction
82(1)
A Pessimistic View of Latency Reduction
83(1)
TCP Connection Caching
84(2)
Connection Caching versus Data Caching
86(1)
TCP Connection Splitting
87(2)
Environment-Specific TCP Optimizations
89(1)
Bandwidth Savings
90(2)
Proxies and Streaming Media
92(1)
Summary
93(2)
Proxy Deployment
95(26)
Overview of Internet Connectivity Architectures
95(3)
Nontransparent Proxy Deployment
98(1)
Explicit Client Configuration
98(1)
Browser Autoconfiguration
98(1)
Proxy Auto-Discovery
99(1)
Transparent Proxy Deployment
99(18)
Multipath Problem
102(2)
Interception Mechanisms
104(3)
Layer 4 Switch as an Intercepter
107(2)
Router as an Intercepter
109(2)
Layer 7 Switch as an Intercepter
111(2)
Intercepting Link
113(2)
Performance Pitfalls
115(2)
Security and Access Control Issues
117(2)
Proxies and Web Server Access Control
117(1)
Proxies and Security
118(1)
Summary
119(2)
Cooperative Proxy Caching
121(32)
Shared Cache: How Big Is Big Enough?
122(2)
Issues in Cooperative Proxy Caching
124(1)
Location Management
125(13)
Broadcast Queries
125(3)
Hierarchical Caching
128(1)
URL Hashing
129(4)
Directory-Based Cooperation
133(2)
Directory Structures
135(3)
Caching on a Global Scale: Proxy Pruning
138(7)
System Model
139(2)
Cache Routing
141(2)
Vicinity Caching
143(2)
An Overview of Existing Platforms
145(6)
Cache Hierarchies
145(3)
Caching as a Service of a Network Access Point
148(1)
Satellite Broadcast Cache Service
149(2)
Summary
151(2)
Cache Consistency
153(24)
Cache Validation
154(5)
The Basic Validation Scenario
155(1)
Implicit Time to Live
156(1)
Fine-Tuning Validation
157(1)
Asynchronous and Piggyback Cache Validation
158(1)
Cache Invalidation
159(11)
Leases
160(1)
Subscriptions
161(2)
Delayed versus Immediate Updates
163(1)
Volumes
164(2)
Volume Lease Protocols
166(2)
Piggyback and Delayed Invalidation
168(1)
Invalidation in Cache Routing
169(1)
Issues in Cooperative Cache Consistency
170(4)
Validation with Cooperative Proxies
170(2)
Non-Monotonic Delivery Problem
172(2)
Summary
174(3)
Replacement Policy
177(6)
Replacement Policy Metrics
177(1)
Replacement Policy Algorithms
178(2)
The Value of Replacement Policy
180(1)
Summary
180(3)
Prefetching
183(24)
Performance Metrics
183(2)
Performance Bounds of Prefetching
185(1)
Taxonomy
186(1)
Nondata Prefetching
186(2)
Nontransparent Prefetching
188(2)
User Nontransparency
188(1)
Server Nontransparency
189(1)
Server Push versus Client Pull
190(1)
Information Used in Prefetching Algorithms
191(3)
User-Specific Information
191(1)
Group Information
192(1)
Multiuser Information
193(1)
Prediction Algorithms
194(11)
Popularity-Based Predictions
194(1)
Markov Modeling
195(2)
Examples of Algorithms Using First-Order Markov Modeling
197(2)
Exploiting Longer Request Sequences
199(5)
Structure Algorithms
204(1)
Summary
205(2)
Caching the Uncacheable
207(22)
A Note on Implementation
207(2)
Modified Content and Stale Delivery Avoidance
209(4)
Cache-Friendly Approaches to Stale Delivery Avoidance
210(1)
Utilizing Cached Stale Content
210(3)
Cookied Content
213(3)
Cache-Friendly Usage of Cookies
213(1)
Caching Cookied Content
214(1)
The Semantic Transparency Issue
215(1)
Expressly Uncacheable Content and Hit Metering
216(1)
Cache-Friendly Approaches to Hit Metering
216(1)
Caching Expressly Uncacheable Content
217(1)
Dynamic Content
217(8)
Cache-Friendly Design of Dynamic Content
218(1)
Base-Instance Caching
219(2)
Template Caching
221(2)
Base-Instance Caching versus Template Caching
223(2)
Active Proxies
225(2)
Summary
227(2)
PART III WEB REPLICATION 229(72)
Basic Mechanisms for Request Distribution
231(16)
Content-Blind Request Distribution with Full Replication
231(7)
Client Redirection
232(1)
Redirection by a Balancing Switch
233(2)
Redirection by a Web Site's DNS
235(2)
Anycast
237(1)
Content-Blind Request Distribution with Partial Replication
238(3)
Using Surrogates as Server Replicas
239(1)
Back-End Distributed File Systems
240(1)
Content-Aware Request Distribution
241(4)
Client Redirection by a Java Applet
241(1)
HTTP Redirection
242(1)
Redirection by an L7 Switch
243(1)
Fine-Granularity Domain Names
244(1)
Summary
245(2)
Content Delivery Networks
247(30)
Types of CDNs
249(3)
Delivering Requests to a CDN
252(2)
Finding Origin Servers
254(1)
Request Distribution in CDNs
255(3)
DNS/Balancing Switch Redirection
255(1)
Two-Level DNS Redirection
256(1)
Anycast/DNS Redirection
257(1)
Pitfalls of DNS-Based Request Distribution
258(1)
Fine-Tuning DNS Request Distribution
259(3)
Post-DNS Request Distribution by Triangular Communication
260(1)
Post-DNS Request Distribution with HTTP Redirection and URL Rewriting
261(1)
Data Consistency in CDNs
262(2)
Streaming Content Delivery
264(6)
Using Multicast for Streaming Content Delivery
265(1)
Using Application-Level Multicast for Streaming Content Delivery
266(2)
Constructing a Distribution Tree
268(2)
Supporting Secure Content Access
270(4)
SSL Overview
270(2)
Performance Impact of Supporting SSL in a CDN
272(1)
Key Management
273(1)
Content Retrieval from the Origin Server
274(1)
Summary
274(3)
Server Selection
277(24)
Metrics
277(9)
Proximity Metrics
278(2)
Server Load Metrics
280(1)
Aggregate Metrics
281(3)
Internet Mapping Services
284(1)
Aging of Metrics
284(2)
Algorithms
286(7)
Obtaining Passive Measurements
287(1)
Avoiding Oscillations
288(3)
Supporting Client Stickiness
291(1)
Respecting the Affinity of Server Caches
292(1)
Server Selection with Multiple Metrics
293(1)
DNS-Based Server Selection
294(3)
A Typical DNS Server-Selection Scheme
294(1)
Estimating Hidden Load Factors
295(2)
Why Choose a Server When You Can Have Them All?
297(1)
Summary
298(3)
PART IV FURTHER DIRECTIONS 301(20)
Adding Value at the Edge
303(12)
Content Filtering
303(1)
Content Transcoding
304(2)
Watermarking
306(1)
Custom Usage Reporting
306(1)
Implementing New Services with an Edge Server API
307(1)
The ICAP Protocol
308(2)
Distributing Web Applications
310(3)
How to Replicate Applications
310(1)
Where to Replicate Applications
311(2)
Summary
313(2)
Content Distribution Internetworking
315(6)
Pros and Cons of CDI
315(1)
Request Distribution
316(2)
Content Distribution
318(1)
Accounting
319(1)
Summary
320(1)
Glossary 321(10)
Bibliography 331(14)
Index 345

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program