SlideShare a Scribd company logo
Caching Techniques ,[object Object],[object Object],[object Object],[object Object],Sanjoy Sanyal:http://www.itforintelligentfolks.blogspot.com/
Basic Operations of a Web Cache  Client Cache Sever HTTP:GET Stored? Fresh? HTTP:GET HTTP:RESPONSE tSore Copy? HTTP:RESPONSE No Yes HTTP:RESPONSE HTTP:GET File modified Caching works on the principle that the client request can be served from the cache  Sanjoy Sanyal:http://www.itforintelligentfolks.blogspot.com/
Replacement Rules for Items in the Cache ,[object Object],[object Object],[object Object],[object Object],[object Object],These rules can be used to decide which files will be replaced as new items are stored in the cache  Sanjoy Sanyal:http://www.itforintelligentfolks.blogspot.com/
Decision to store or serve from the cache ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Specified in HTTP protocol From the client From the server Sanjoy Sanyal:http://www.itforintelligentfolks.blogspot.com/
Placing a Network in a Cache: Forward Proxy Internet Web Server Web Clients Web Cache Forward Proxy Workgroup LAN Forward Proxy acts on behalf of content consumers The Request is first sent over the LAN to the Forward Proxy Network administrators set up Forward  Proxy to help speed up web access for users  Sanjoy Sanyal:http://www.itforintelligentfolks.blogspot.com/
Try This! ,[object Object],[object Object],[object Object],[object Object],Sanjoy Sanyal:http://www.itforintelligentfolks.blogspot.com/
Placing a Network in a Cache: Reverse Proxy Internet Web Servers Web Clients Web Cache Reverse Proxy Sever LAN Also called sever accelerator Reverse Proxy acts on behalf of origin server The Request is sent first to the reverse proxy cache  Web Farms set up reverse proxies to improve performance &scalability.  Also reverse proxies can be located remotely near customers. Sanjoy Sanyal:http://www.itforintelligentfolks.blogspot.com/
Placing a Network in a Cache: Interception Proxy Internet Web Server Web Clients Web Cache Interception Proxy ISP  Network Interception Proxy acts on behalf of the content traffic (the ISP) The Request is first sent over the ISP Network to the Interception Proxy ISPs set up Interception Proxy to help speed up web access for customers and reduce wide area bandwidth costs  Sanjoy Sanyal:http://www.itforintelligentfolks.blogspot.com/
Cache Techniques for Streaming Media ,[object Object],[object Object],[object Object],[object Object],[object Object],Buffer stores several seconds of data Constant Bit Rate outflow Variable Bit Rate inflow Sanjoy Sanyal:http://www.itforintelligentfolks.blogspot.com/
Delays in Multimedia Streaming Server Client Client Request Playback begins Connection Delay Buffer Delay Total Delay = Connection Delay + Buffer Delay Sanjoy Sanyal:http://www.itforintelligentfolks.blogspot.com/
Fast Prefix Caching Server Client Cache Client Request To Cache Buffer From Stored Prefix From Cache Buffer ConnectionDelay Buffer Delay Playback Begins Prefix caching reduces the connection delay  The client request is served by previously stored multimedia data Locating the cache close to the client and employing a fast connection reduces the connection delay Other advantage: the cache can serve as a splitter for multiple clients with only one connection to server  Sanjoy Sanyal:http://www.itforintelligentfolks.blogspot.com/
Dynamic Caching Ring Buffer Server Client 1 Client 2 Patch t T+  Data for Client 1 Data for Client 2 Start caching Serve Client 2 from Cache How it works: Client 2 requests the same streaming object as Client 1  When Client 2 receives start of stream Client 1 has already received    seconds of stream  The  temporal distance  between the clients  is   The data streamed to Client 1 is cached in the  ring buffer  to be served to Client 2  Client 2 is served the initial    seconds of stream by a  patch  from the server or a prefix T+2  Sanjoy Sanyal:http://www.itforintelligentfolks.blogspot.com/
Summary ,[object Object],[object Object],[object Object],Sanjoy Sanyal:http://www.itforintelligentfolks.blogspot.com/

More Related Content

What's hot

Usenix LISA 2012 - Choosing a Proxy
Usenix LISA 2012 - Choosing a ProxyUsenix LISA 2012 - Choosing a Proxy
Usenix LISA 2012 - Choosing a Proxy
Leif Hedstrom
 
Clug 2012 March web server optimisation
Clug 2012 March   web server optimisationClug 2012 March   web server optimisation
Clug 2012 March web server optimisation
grooverdan
 
Web Server Load Balancer
Web Server Load BalancerWeb Server Load Balancer
Web Server Load Balancer
MobME Technical
 
Content Caching with NGINX and NGINX Plus
Content Caching with NGINX and NGINX PlusContent Caching with NGINX and NGINX Plus
Content Caching with NGINX and NGINX Plus
Kevin Jones
 
Memcached Presentation
Memcached PresentationMemcached Presentation
Memcached Presentation
Asif Ali
 
Php & web server performace
Php & web server performacePhp & web server performace
Php & web server performaceTuyển Đoàn
 
High Availability Content Caching with NGINX
High Availability Content Caching with NGINXHigh Availability Content Caching with NGINX
High Availability Content Caching with NGINX
Kevin Jones
 
Varnish SSL / TLS
Varnish SSL / TLSVarnish SSL / TLS
Varnish SSL / TLS
Varnish Software
 
NGINX High-performance Caching
NGINX High-performance CachingNGINX High-performance Caching
NGINX High-performance Caching
NGINX, Inc.
 
Extending functionality in nginx, with modules!
Extending functionality in nginx, with modules!Extending functionality in nginx, with modules!
Extending functionality in nginx, with modules!
Trygve Vea
 
ChinaNetCloud Training - HAProxy Intro
ChinaNetCloud Training - HAProxy IntroChinaNetCloud Training - HAProxy Intro
ChinaNetCloud Training - HAProxy Intro
ChinaNetCloud
 
Web Performance Optimization with HTTP/3
Web Performance Optimization with HTTP/3Web Performance Optimization with HTTP/3
Web Performance Optimization with HTTP/3
SangJin Kang
 
HTTP Caching For The Win - REST Fest 2013
HTTP Caching For The Win - REST Fest 2013HTTP Caching For The Win - REST Fest 2013
HTTP Caching For The Win - REST Fest 2013
Phil Harvey
 
Nginx dhruba mandal
Nginx dhruba mandalNginx dhruba mandal
Nginx dhruba mandal
Dhrubaji Mandal ♛
 
New features in PMTA 5.0
New features in PMTA 5.0New features in PMTA 5.0
New features in PMTA 5.0
SparkPost
 
A memcached implementation in Java
A memcached implementation in JavaA memcached implementation in Java
A memcached implementation in Javaelliando dias
 
Memcache
MemcacheMemcache
Memcache
Abhinav Singh
 
NGINX: High Performance Load Balancing
NGINX: High Performance Load BalancingNGINX: High Performance Load Balancing
NGINX: High Performance Load Balancing
NGINX, Inc.
 
Building your own CDN using Amazon EC2
Building your own CDN using Amazon EC2Building your own CDN using Amazon EC2
Building your own CDN using Amazon EC2
SergeyChernyshev
 

What's hot (20)

Usenix LISA 2012 - Choosing a Proxy
Usenix LISA 2012 - Choosing a ProxyUsenix LISA 2012 - Choosing a Proxy
Usenix LISA 2012 - Choosing a Proxy
 
Clug 2012 March web server optimisation
Clug 2012 March   web server optimisationClug 2012 March   web server optimisation
Clug 2012 March web server optimisation
 
Web Server Load Balancer
Web Server Load BalancerWeb Server Load Balancer
Web Server Load Balancer
 
Content Caching with NGINX and NGINX Plus
Content Caching with NGINX and NGINX PlusContent Caching with NGINX and NGINX Plus
Content Caching with NGINX and NGINX Plus
 
Memcached Presentation
Memcached PresentationMemcached Presentation
Memcached Presentation
 
Php & web server performace
Php & web server performacePhp & web server performace
Php & web server performace
 
High Availability Content Caching with NGINX
High Availability Content Caching with NGINXHigh Availability Content Caching with NGINX
High Availability Content Caching with NGINX
 
Varnish SSL / TLS
Varnish SSL / TLSVarnish SSL / TLS
Varnish SSL / TLS
 
NGINX High-performance Caching
NGINX High-performance CachingNGINX High-performance Caching
NGINX High-performance Caching
 
Extending functionality in nginx, with modules!
Extending functionality in nginx, with modules!Extending functionality in nginx, with modules!
Extending functionality in nginx, with modules!
 
ChinaNetCloud Training - HAProxy Intro
ChinaNetCloud Training - HAProxy IntroChinaNetCloud Training - HAProxy Intro
ChinaNetCloud Training - HAProxy Intro
 
Web Performance Optimization with HTTP/3
Web Performance Optimization with HTTP/3Web Performance Optimization with HTTP/3
Web Performance Optimization with HTTP/3
 
ReplacingSquidWithATS
ReplacingSquidWithATSReplacingSquidWithATS
ReplacingSquidWithATS
 
HTTP Caching For The Win - REST Fest 2013
HTTP Caching For The Win - REST Fest 2013HTTP Caching For The Win - REST Fest 2013
HTTP Caching For The Win - REST Fest 2013
 
Nginx dhruba mandal
Nginx dhruba mandalNginx dhruba mandal
Nginx dhruba mandal
 
New features in PMTA 5.0
New features in PMTA 5.0New features in PMTA 5.0
New features in PMTA 5.0
 
A memcached implementation in Java
A memcached implementation in JavaA memcached implementation in Java
A memcached implementation in Java
 
Memcache
MemcacheMemcache
Memcache
 
NGINX: High Performance Load Balancing
NGINX: High Performance Load BalancingNGINX: High Performance Load Balancing
NGINX: High Performance Load Balancing
 
Building your own CDN using Amazon EC2
Building your own CDN using Amazon EC2Building your own CDN using Amazon EC2
Building your own CDN using Amazon EC2
 

Similar to Caching Techniquesfor Content Delivery

Cdn
CdnCdn
Cdn technology overview
Cdn technology overviewCdn technology overview
Cdn technology overview
Yoohyun Kim
 
NY Web Perf Meetup: Peeling the Web Performance Onion
NY Web Perf Meetup: Peeling the Web Performance OnionNY Web Perf Meetup: Peeling the Web Performance Onion
NY Web Perf Meetup: Peeling the Web Performance Onion
Catchpoint Systems
 
IWMW 2003: C7 Bandwidth Management Techniques: Technical And Policy Issues
IWMW 2003: C7 Bandwidth Management Techniques: Technical And Policy IssuesIWMW 2003: C7 Bandwidth Management Techniques: Technical And Policy Issues
IWMW 2003: C7 Bandwidth Management Techniques: Technical And Policy Issues
IWMW
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
Jayaprakash Nagaruru
 
21 Www Web Services
21 Www Web Services21 Www Web Services
21 Www Web Services
royans
 
Think async
Think asyncThink async
Think async
Bhakti Mehta
 
UOW-Caching and new ways to improve response time (Paper)
UOW-Caching and new ways to improve response time (Paper)UOW-Caching and new ways to improve response time (Paper)
UOW-Caching and new ways to improve response time (Paper)
Guson Kuntarto
 
Web server
Web serverWeb server
Web server
Nirav Daraniya
 
cara menginstall router
cara menginstall routercara menginstall router
cara menginstall router
Bobby Bobby
 
Spreadshirt Techcamp 2018 - Hold until Told
Spreadshirt Techcamp 2018 - Hold until ToldSpreadshirt Techcamp 2018 - Hold until Told
Spreadshirt Techcamp 2018 - Hold until Told
Martin Breest
 
Unit-5_Application_QoS.pdfcomputer network
Unit-5_Application_QoS.pdfcomputer networkUnit-5_Application_QoS.pdfcomputer network
Unit-5_Application_QoS.pdfcomputer network
4SI21CS112RakeshMS
 
Unit VI Overlays
Unit VI OverlaysUnit VI Overlays
Unit VI Overlayssangusajjan
 
Dynamic Content Acceleration: Lightning Fast Web Apps with Amazon CloudFront ...
Dynamic Content Acceleration: Lightning Fast Web Apps with Amazon CloudFront ...Dynamic Content Acceleration: Lightning Fast Web Apps with Amazon CloudFront ...
Dynamic Content Acceleration: Lightning Fast Web Apps with Amazon CloudFront ...
Amazon Web Services
 
Web Performance in the Age of HTTP/2 - FEDay Conference, Guangzhou, China 19/...
Web Performance in the Age of HTTP/2 - FEDay Conference, Guangzhou, China 19/...Web Performance in the Age of HTTP/2 - FEDay Conference, Guangzhou, China 19/...
Web Performance in the Age of HTTP/2 - FEDay Conference, Guangzhou, China 19/...
Holger Bartel
 
Caching and Its Main Types
Caching and Its Main TypesCaching and Its Main Types
Caching and Its Main Types
HTS Hosting
 
Ui perf
Ui perfUi perf

Similar to Caching Techniquesfor Content Delivery (20)

Cdn
CdnCdn
Cdn
 
Cdn technology overview
Cdn technology overviewCdn technology overview
Cdn technology overview
 
Cookie
CookieCookie
Cookie
 
NY Web Perf Meetup: Peeling the Web Performance Onion
NY Web Perf Meetup: Peeling the Web Performance OnionNY Web Perf Meetup: Peeling the Web Performance Onion
NY Web Perf Meetup: Peeling the Web Performance Onion
 
IWMW 2003: C7 Bandwidth Management Techniques: Technical And Policy Issues
IWMW 2003: C7 Bandwidth Management Techniques: Technical And Policy IssuesIWMW 2003: C7 Bandwidth Management Techniques: Technical And Policy Issues
IWMW 2003: C7 Bandwidth Management Techniques: Technical And Policy Issues
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
21 Www Web Services
21 Www Web Services21 Www Web Services
21 Www Web Services
 
Think async
Think asyncThink async
Think async
 
UOW-Caching and new ways to improve response time (Paper)
UOW-Caching and new ways to improve response time (Paper)UOW-Caching and new ways to improve response time (Paper)
UOW-Caching and new ways to improve response time (Paper)
 
Web server
Web serverWeb server
Web server
 
cara menginstall router
cara menginstall routercara menginstall router
cara menginstall router
 
Spreadshirt Techcamp 2018 - Hold until Told
Spreadshirt Techcamp 2018 - Hold until ToldSpreadshirt Techcamp 2018 - Hold until Told
Spreadshirt Techcamp 2018 - Hold until Told
 
Unit-5_Application_QoS.pdfcomputer network
Unit-5_Application_QoS.pdfcomputer networkUnit-5_Application_QoS.pdfcomputer network
Unit-5_Application_QoS.pdfcomputer network
 
Unit VI Overlays
Unit VI OverlaysUnit VI Overlays
Unit VI Overlays
 
5-WebServers.ppt
5-WebServers.ppt5-WebServers.ppt
5-WebServers.ppt
 
Performance engineering
Performance engineeringPerformance engineering
Performance engineering
 
Dynamic Content Acceleration: Lightning Fast Web Apps with Amazon CloudFront ...
Dynamic Content Acceleration: Lightning Fast Web Apps with Amazon CloudFront ...Dynamic Content Acceleration: Lightning Fast Web Apps with Amazon CloudFront ...
Dynamic Content Acceleration: Lightning Fast Web Apps with Amazon CloudFront ...
 
Web Performance in the Age of HTTP/2 - FEDay Conference, Guangzhou, China 19/...
Web Performance in the Age of HTTP/2 - FEDay Conference, Guangzhou, China 19/...Web Performance in the Age of HTTP/2 - FEDay Conference, Guangzhou, China 19/...
Web Performance in the Age of HTTP/2 - FEDay Conference, Guangzhou, China 19/...
 
Caching and Its Main Types
Caching and Its Main TypesCaching and Its Main Types
Caching and Its Main Types
 
Ui perf
Ui perfUi perf
Ui perf
 

More from sanjoysanyal

Windindustryin India
Windindustryin IndiaWindindustryin India
Windindustryin Indiasanjoysanyal
 
Solar Industryin India
Solar Industryin IndiaSolar Industryin India
Solar Industryin Indiasanjoysanyal
 
Bio Fuel Industryin India
Bio Fuel Industryin IndiaBio Fuel Industryin India
Bio Fuel Industryin Indiasanjoysanyal
 
Introduction to Carbon Markets
Introduction to Carbon Markets Introduction to Carbon Markets
Introduction to Carbon Markets
sanjoysanyal
 
Virtualization VMWare technology
Virtualization VMWare technologyVirtualization VMWare technology
Virtualization VMWare technology
sanjoysanyal
 
Microsoft Virtualization View
Microsoft Virtualization View Microsoft Virtualization View
Microsoft Virtualization View
sanjoysanyal
 
Introductionto Solar
Introductionto SolarIntroductionto Solar
Introductionto Solarsanjoysanyal
 
Introductionto Solar
Introductionto SolarIntroductionto Solar
Introductionto Solarsanjoysanyal
 
Topic6 Basic Web Services Technology
Topic6 Basic Web Services TechnologyTopic6 Basic Web Services Technology
Topic6 Basic Web Services Technologysanjoysanyal
 
Topic6 Basic Web Services Technology
Topic6 Basic Web Services TechnologyTopic6 Basic Web Services Technology
Topic6 Basic Web Services Technologysanjoysanyal
 
Topic5 Web Services
Topic5 Web ServicesTopic5 Web Services
Topic5 Web Servicessanjoysanyal
 
Topic4 Application Servers
Topic4 Application ServersTopic4 Application Servers
Topic4 Application Serverssanjoysanyal
 
Topic3 Enterprise Application Integration
Topic3 Enterprise Application IntegrationTopic3 Enterprise Application Integration
Topic3 Enterprise Application Integrationsanjoysanyal
 
Topic2 Understanding Middleware
Topic2 Understanding MiddlewareTopic2 Understanding Middleware
Topic2 Understanding Middlewaresanjoysanyal
 
Topic1 Understanding Distributed Information Systems
Topic1 Understanding Distributed Information SystemsTopic1 Understanding Distributed Information Systems
Topic1 Understanding Distributed Information Systemssanjoysanyal
 
Content Navigation
Content NavigationContent Navigation
Content Navigationsanjoysanyal
 
Instantmessagingprotocols
InstantmessagingprotocolsInstantmessagingprotocols
Instantmessagingprotocolssanjoysanyal
 
Peerto Peer Networks
Peerto Peer NetworksPeerto Peer Networks
Peerto Peer Networkssanjoysanyal
 

More from sanjoysanyal (20)

business
businessbusiness
business
 
Solar
SolarSolar
Solar
 
Windindustryin India
Windindustryin IndiaWindindustryin India
Windindustryin India
 
Solar Industryin India
Solar Industryin IndiaSolar Industryin India
Solar Industryin India
 
Bio Fuel Industryin India
Bio Fuel Industryin IndiaBio Fuel Industryin India
Bio Fuel Industryin India
 
Introduction to Carbon Markets
Introduction to Carbon Markets Introduction to Carbon Markets
Introduction to Carbon Markets
 
Virtualization VMWare technology
Virtualization VMWare technologyVirtualization VMWare technology
Virtualization VMWare technology
 
Microsoft Virtualization View
Microsoft Virtualization View Microsoft Virtualization View
Microsoft Virtualization View
 
Introductionto Solar
Introductionto SolarIntroductionto Solar
Introductionto Solar
 
Introductionto Solar
Introductionto SolarIntroductionto Solar
Introductionto Solar
 
Topic6 Basic Web Services Technology
Topic6 Basic Web Services TechnologyTopic6 Basic Web Services Technology
Topic6 Basic Web Services Technology
 
Topic6 Basic Web Services Technology
Topic6 Basic Web Services TechnologyTopic6 Basic Web Services Technology
Topic6 Basic Web Services Technology
 
Topic5 Web Services
Topic5 Web ServicesTopic5 Web Services
Topic5 Web Services
 
Topic4 Application Servers
Topic4 Application ServersTopic4 Application Servers
Topic4 Application Servers
 
Topic3 Enterprise Application Integration
Topic3 Enterprise Application IntegrationTopic3 Enterprise Application Integration
Topic3 Enterprise Application Integration
 
Topic2 Understanding Middleware
Topic2 Understanding MiddlewareTopic2 Understanding Middleware
Topic2 Understanding Middleware
 
Topic1 Understanding Distributed Information Systems
Topic1 Understanding Distributed Information SystemsTopic1 Understanding Distributed Information Systems
Topic1 Understanding Distributed Information Systems
 
Content Navigation
Content NavigationContent Navigation
Content Navigation
 
Instantmessagingprotocols
InstantmessagingprotocolsInstantmessagingprotocols
Instantmessagingprotocols
 
Peerto Peer Networks
Peerto Peer NetworksPeerto Peer Networks
Peerto Peer Networks
 

Recently uploaded

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 

Recently uploaded (20)

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

Caching Techniquesfor Content Delivery

  • 1.
  • 2. Basic Operations of a Web Cache Client Cache Sever HTTP:GET Stored? Fresh? HTTP:GET HTTP:RESPONSE tSore Copy? HTTP:RESPONSE No Yes HTTP:RESPONSE HTTP:GET File modified Caching works on the principle that the client request can be served from the cache Sanjoy Sanyal:http://www.itforintelligentfolks.blogspot.com/
  • 3.
  • 4.
  • 5. Placing a Network in a Cache: Forward Proxy Internet Web Server Web Clients Web Cache Forward Proxy Workgroup LAN Forward Proxy acts on behalf of content consumers The Request is first sent over the LAN to the Forward Proxy Network administrators set up Forward Proxy to help speed up web access for users Sanjoy Sanyal:http://www.itforintelligentfolks.blogspot.com/
  • 6.
  • 7. Placing a Network in a Cache: Reverse Proxy Internet Web Servers Web Clients Web Cache Reverse Proxy Sever LAN Also called sever accelerator Reverse Proxy acts on behalf of origin server The Request is sent first to the reverse proxy cache Web Farms set up reverse proxies to improve performance &scalability. Also reverse proxies can be located remotely near customers. Sanjoy Sanyal:http://www.itforintelligentfolks.blogspot.com/
  • 8. Placing a Network in a Cache: Interception Proxy Internet Web Server Web Clients Web Cache Interception Proxy ISP Network Interception Proxy acts on behalf of the content traffic (the ISP) The Request is first sent over the ISP Network to the Interception Proxy ISPs set up Interception Proxy to help speed up web access for customers and reduce wide area bandwidth costs Sanjoy Sanyal:http://www.itforintelligentfolks.blogspot.com/
  • 9.
  • 10. Delays in Multimedia Streaming Server Client Client Request Playback begins Connection Delay Buffer Delay Total Delay = Connection Delay + Buffer Delay Sanjoy Sanyal:http://www.itforintelligentfolks.blogspot.com/
  • 11. Fast Prefix Caching Server Client Cache Client Request To Cache Buffer From Stored Prefix From Cache Buffer ConnectionDelay Buffer Delay Playback Begins Prefix caching reduces the connection delay The client request is served by previously stored multimedia data Locating the cache close to the client and employing a fast connection reduces the connection delay Other advantage: the cache can serve as a splitter for multiple clients with only one connection to server Sanjoy Sanyal:http://www.itforintelligentfolks.blogspot.com/
  • 12. Dynamic Caching Ring Buffer Server Client 1 Client 2 Patch t T+  Data for Client 1 Data for Client 2 Start caching Serve Client 2 from Cache How it works: Client 2 requests the same streaming object as Client 1 When Client 2 receives start of stream Client 1 has already received  seconds of stream The temporal distance between the clients is  The data streamed to Client 1 is cached in the ring buffer to be served to Client 2 Client 2 is served the initial  seconds of stream by a patch from the server or a prefix T+2  Sanjoy Sanyal:http://www.itforintelligentfolks.blogspot.com/
  • 13.