W. K. Chai, D. He, I. Psaras and G. Pavlou "Cache "Less for More" in Information-Centric Networks (Extended Version)", Elsevier Computer Communications, Special Issue on Information-Centric Networking, vol. 36, no. 7, pp. 758-770, 1 April 2013, (DOI) 10.1016/j.comcom.2013.01.007.
W. K. Chai, D. He, I. Psaras, G. Pavlou, "Cache "Less for More" in Information-centric Networks", Proceedings of the 11th IFIP Networking, Prague, Czech Republic, 21-25 May 2012. BEST PAPER AWARD
Ambari's 3.0 focuses and lays the ground work for Multi-everything architecture (multi-mpacks, multi-service instances, multi-component instances etc).
- Management Packs (MPacks) enables Ambari to remove the tight coupling with existing Hortonworks Data Platform (HDP) and Hortonworks Data Flow (HDF) stacks and enables bringing-in and manage any service into Ambari.
- Ambari 3.0 goal is to enable deployments of multiple MPack instances, where a MPack can have a dependency on another MPack and a given service can have service dependency on another service instance from within or outside the Mpack.
Ambari's 3.0 focuses and lays the ground work for Multi-everything architecture (multi-mpacks, multi-service instances, multi-component instances etc).
- Management Packs (MPacks) enables Ambari to remove the tight coupling with existing Hortonworks Data Platform (HDP) and Hortonworks Data Flow (HDF) stacks and enables bringing-in and manage any service into Ambari.
- Ambari 3.0 goal is to enable deployments of multiple MPack instances, where a MPack can have a dependency on another MPack and a given service can have service dependency on another service instance from within or outside the Mpack.
ambari 3.0, apache, hortonworks, hortonworks data flow (hdf, hortonworks data platform (hdp), management packs, mpacks, multi everything architecture, multiple component instance, multiple mpacks architecture, multiple service instance, stacks
XDP in Practice: DDoS Mitigation @CloudflareC4Media
Video and slides synchronized, mp3 and slide download available at URL https://bit.ly/2NtlaER.
Gilberto Bertin discusses the architecture of Cloudflare’s automatic DDoS mitigation pipeline, the initial packet filtering solution based on Iptables, and why Cloudflare had to introduce userspace offload. Bertin also describes how they switched from a proprietary offload technology to XDP for network stack bypass and how they are using XDP to load balance traffic. Filmed at qconlondon.com.
Gilberto Bertin works as a System Engineer at Cloudflare London. After working on variety of technologies like P2P VPNs and userspace TCP/IP stacks, he joined the Cloudflare DDoS team in London to help filter all the bad internet traffic.
Ambari's 3.0 focuses and lays the ground work for Multi-everything architecture (multi-mpacks, multi-service instances, multi-component instances etc).
- Management Packs (MPacks) enables Ambari to remove the tight coupling with existing Hortonworks Data Platform (HDP) and Hortonworks Data Flow (HDF) stacks and enables bringing-in and manage any service into Ambari.
- Ambari 3.0 goal is to enable deployments of multiple MPack instances, where a MPack can have a dependency on another MPack and a given service can have service dependency on another service instance from within or outside the Mpack.
Ambari's 3.0 focuses and lays the ground work for Multi-everything architecture (multi-mpacks, multi-service instances, multi-component instances etc).
- Management Packs (MPacks) enables Ambari to remove the tight coupling with existing Hortonworks Data Platform (HDP) and Hortonworks Data Flow (HDF) stacks and enables bringing-in and manage any service into Ambari.
- Ambari 3.0 goal is to enable deployments of multiple MPack instances, where a MPack can have a dependency on another MPack and a given service can have service dependency on another service instance from within or outside the Mpack.
ambari 3.0, apache, hortonworks, hortonworks data flow (hdf, hortonworks data platform (hdp), management packs, mpacks, multi everything architecture, multiple component instance, multiple mpacks architecture, multiple service instance, stacks
XDP in Practice: DDoS Mitigation @CloudflareC4Media
Video and slides synchronized, mp3 and slide download available at URL https://bit.ly/2NtlaER.
Gilberto Bertin discusses the architecture of Cloudflare’s automatic DDoS mitigation pipeline, the initial packet filtering solution based on Iptables, and why Cloudflare had to introduce userspace offload. Bertin also describes how they switched from a proprietary offload technology to XDP for network stack bypass and how they are using XDP to load balance traffic. Filmed at qconlondon.com.
Gilberto Bertin works as a System Engineer at Cloudflare London. After working on variety of technologies like P2P VPNs and userspace TCP/IP stacks, he joined the Cloudflare DDoS team in London to help filter all the bad internet traffic.
Content delivery networks (CDNs) distribute much of the Internet content by caching and serving the objects requested by users. A major goal of a CDN is to maximize the hit rates of its caches, thereby enabling faster content downloads to the users. Content caching involves two components: an admission algorithm to decide whether to cache an object and an eviction algorithm to decide which object to evict from the cache when it is full. In this paper, we focus on cache admission and propose an algorithm called RL-Cache that uses model-free reinforcement learning (RL) to decide whether or not to admit a requested object into the CDN's cache. Unlike prior approaches that use a small set of criteria for decision making, RL-Cache weights a large set of features that include the object size, recency, and frequency of access. We develop a publicly available implementation of RL-Cache and perform an evaluation using production traces for the image, video, and web traffic classes from Akamai's CDN. The evaluation shows that RL-Cache improves the hit rate in comparison with the state of the art and imposes only a modest resource overhead on the CDN servers. Further, RL-Cache is robust enough that it can be trained in one location and executed on request traces of the same or different traffic classes in other locations of the same geographic region.
Enhancing proxy based web caching system using clustering based pre fetching ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Available network bandwidth schema to improve performance in tcp protocolsIJCNCJournal
The TCP congestion control mechanism in standard implementations presents several problems, for
example, large queue lengths in network routers and packet losses, a misleading reduce of the transmission
rate when there are link failures, among others. This paper proposes a schema to congestion control in
TCP protocols, called NGWA, witch is based on the network bandwidth. The NGWA provides information
considering the available bandwidth of the network infrastructure to the endpoints of the TCP connection.
Hence, it helps in choosing a better transmission rate for TCP improving its performance. Simulation
results show superior performance of the proposed scheme when compared to those obtained by TCP New
Reno and standard TCP. A physical implementation in the Linux kernel was performed to prove the correct
operation of the proposal.
NYC Hadoop Meetup - MapR, Architecture, Philosophy and ApplicationsJason Shao
Slides from: http://www.meetup.com/Hadoop-NYC/events/34411232/
There are a number of assumptions that come with using standard Hadoop that are based on Hadoop's initial architecture. Many of these assumptions can be relaxed with more advanced architectures such as those provided by MapR. These changes in assumptions have ripple effects throughout the system architecture. This is significant because many systems like Mahout provide multiple implementations of various algorithms with very different performance and scaling implications.
I will describe several case studies and use these examples to show how these changes can simplify systems or, in some cases, make certain classes of programs run an order of magnitude faster.
About the speaker: Ted Dunning - Chief Application Architect (MapR)
Ted has held Chief Scientist positions at Veoh Networks, ID Analytics and at MusicMatch, (now Yahoo Music). Ted is responsible for building the most advanced identity theft detection system on the planet, as well as one of the largest peer-assisted video distribution systems and ground-breaking music and video recommendations systems. Ted has 15 issued and 15 pending patents and contributes to several Apache open source projects including Hadoop, Zookeeper and Hbase. He is also a committer for Apache Mahout. Ted earned a BS degree in electrical engineering from the University of Colorado; a MS degree in computer science from New Mexico State University; and a Ph.D. in computing science from Sheffield University in the United Kingdom. Ted also bought the drinks at one of the very first Hadoop User Group meetings.
Using open source tools for network device dataplane testing.
Our experiences from redGuardian DDoS mitigation scrubber testing.
Presented at PLNOG 20 (2018).
Detailed design for a robust counter as well as design for a completely on-line multi-armed bandit implementation that uses the new Bayesian Bandit algorithm.
Content delivery networks (CDNs) distribute much of the Internet content by caching and serving the objects requested by users. A major goal of a CDN is to maximize the hit rates of its caches, thereby enabling faster content downloads to the users. Content caching involves two components: an admission algorithm to decide whether to cache an object and an eviction algorithm to decide which object to evict from the cache when it is full. In this paper, we focus on cache admission and propose an algorithm called RL-Cache that uses model-free reinforcement learning (RL) to decide whether or not to admit a requested object into the CDN's cache. Unlike prior approaches that use a small set of criteria for decision making, RL-Cache weights a large set of features that include the object size, recency, and frequency of access. We develop a publicly available implementation of RL-Cache and perform an evaluation using production traces for the image, video, and web traffic classes from Akamai's CDN. The evaluation shows that RL-Cache improves the hit rate in comparison with the state of the art and imposes only a modest resource overhead on the CDN servers. Further, RL-Cache is robust enough that it can be trained in one location and executed on request traces of the same or different traffic classes in other locations of the same geographic region.
Enhancing proxy based web caching system using clustering based pre fetching ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Available network bandwidth schema to improve performance in tcp protocolsIJCNCJournal
The TCP congestion control mechanism in standard implementations presents several problems, for
example, large queue lengths in network routers and packet losses, a misleading reduce of the transmission
rate when there are link failures, among others. This paper proposes a schema to congestion control in
TCP protocols, called NGWA, witch is based on the network bandwidth. The NGWA provides information
considering the available bandwidth of the network infrastructure to the endpoints of the TCP connection.
Hence, it helps in choosing a better transmission rate for TCP improving its performance. Simulation
results show superior performance of the proposed scheme when compared to those obtained by TCP New
Reno and standard TCP. A physical implementation in the Linux kernel was performed to prove the correct
operation of the proposal.
NYC Hadoop Meetup - MapR, Architecture, Philosophy and ApplicationsJason Shao
Slides from: http://www.meetup.com/Hadoop-NYC/events/34411232/
There are a number of assumptions that come with using standard Hadoop that are based on Hadoop's initial architecture. Many of these assumptions can be relaxed with more advanced architectures such as those provided by MapR. These changes in assumptions have ripple effects throughout the system architecture. This is significant because many systems like Mahout provide multiple implementations of various algorithms with very different performance and scaling implications.
I will describe several case studies and use these examples to show how these changes can simplify systems or, in some cases, make certain classes of programs run an order of magnitude faster.
About the speaker: Ted Dunning - Chief Application Architect (MapR)
Ted has held Chief Scientist positions at Veoh Networks, ID Analytics and at MusicMatch, (now Yahoo Music). Ted is responsible for building the most advanced identity theft detection system on the planet, as well as one of the largest peer-assisted video distribution systems and ground-breaking music and video recommendations systems. Ted has 15 issued and 15 pending patents and contributes to several Apache open source projects including Hadoop, Zookeeper and Hbase. He is also a committer for Apache Mahout. Ted earned a BS degree in electrical engineering from the University of Colorado; a MS degree in computer science from New Mexico State University; and a Ph.D. in computing science from Sheffield University in the United Kingdom. Ted also bought the drinks at one of the very first Hadoop User Group meetings.
Using open source tools for network device dataplane testing.
Our experiences from redGuardian DDoS mitigation scrubber testing.
Presented at PLNOG 20 (2018).
Detailed design for a robust counter as well as design for a completely on-line multi-armed bandit implementation that uses the new Bayesian Bandit algorithm.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Dcim distributed cache invalidation method for maintaining cache consistency ...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
In this lecture we analyze key-values databases. At first we introduce key-value characteristics, advantages and disadvantages.
Then we analyze the major Key-Value data stores and finally we discuss about Dynamo DB.
In particular we consider how Dynamo DB: How is implemented
1. Motivation Background
2. Partitioning: Consistent Hashing
3. High Availability for writes: Vector Clocks
4. Handling temporary failures: Sloppy Quorum
5. Recovering from failures: Merkle Trees
6. Membership and failure detection: Gossip Protocol
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
To get this project in ONLINE or through TRAINING Sessions, Contact:JP INFOTECH, Old No.31, New No.86, 1st Floor, 1st Avenue, Ashok Pillar, Chennai -83.
Landmark: Next to Kotak Mahendra Bank.
Pondicherry Office: JP INFOTECH, #45, Kamaraj Salai, Thattanchavady, Puducherry -9.
Landmark: Next to VVP Nagar Arch.
Mobile: (0) 9952649690 , Email: jpinfotechprojects@gmail.com, web: www.jpinfotech.org
Blog: www.jpinfotech.blogspot.com
Memory system, and not processor speed, is often the bottleneck for many applications.
Memory system performance is largely captured by two parameters, latency and bandwidth.
Latency is the time from the issue of a memory request to the time the data is available at the processor.
Bandwidth is the rate at which data can be pumped to the processor by the memory system.
Kubernetes @ Squarespace (SRE Portland Meetup October 2017)Kevin Lynch
In this presentation I talk about our motivation to converting our microservices to run on Kubernetes. I discuss many of the technical challenges we encountered along the way, including networking issues, Java issues, monitoring and alerting, and managing all of our resources!
[EUC2016] DockerCap: a software-level power capping orchestrator for Docker c...Matteo Ferroni
Internet of Things (IoT) is experiencing a huge hype these days, thanks to the increasing capabilities of embedded devices that enable their adoption in new fields of application (e.g. Wireless Sensor Networks, Connected Cars, Health Care, etc.). On the one hand, this is leading to an increasing adoption of multi-tenancy solutions for Cloud and Fog Computing, to analyze and store the data produced. On the other hand, power consumption has become a major concern for almost every digital system, from the smallest embedded circuits to the biggest computer clusters, with all the shades in between. Fine-grain control mechanisms are then needed to cap power consumption at each level of the stack, still guaranteeing Service Level Agreements (SLA) to the hosted applications. In this work, we propose DockerCap, a software-level power capping orchestrator for Docker containers that follows an Observe-Decide-Act loop structure: this allows to quickly react to changes that impact on the power consumption by managing resources of each container at run-time, to ensure the desired power cap. We show how we are able to obtain results comparable with the state of the art power capping solution provided by Intel RAPL, still being able to tune the performances of the containers and even guarantee SLA constraints.
Full paper: http://ieeexplore.ieee.org/document/7982228/
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Securing your Kubernetes cluster_ a step-by-step guide to success !
Cache "Less for More" in Information-centric Networks (CL4M)
1. Cache “Less for More” in Information-
Centric Networks
W. K. Chai, D. He, I. Psaras and G. Pavlou (presenter)
Department of Electronic & Electrical Engineering
University College London
London WC1E 6EA
United Kingdom
2. Background: Caching in Information-Centric
Networking (ICN)
• In Information-Centric Networking (ICN), contents are named.
• Content requests can be served from any node having the content
identified by the content name.
• ICN features ubiquitous in-network caching:
– potentially every router caching indiscriminately all content fragments
that traverse it
– if a matching request is received while a fragment is still in its cache
store, it will be forwarded to the requester from that element, avoiding
going to the hosting server.
• Specifically, NNC* proposes:
– A router caches every content chunk that traverses it with the
assumption that routers are equipped with (large) cache stores.
– A least recently used (LRU) cache eviction policy is used.
2*V. Jacobson, et al., “Networking Named Content,” Proc. ACM CoNEXT, 2009, pp. 1-12.
3. Argument & Objective
• The Argument: indiscriminate universal caching strategy is
unnecessarily costly and sub-optimal
– High content replacement frequency may result in content
being replaced before getting a hit.
• The Objective: to study alternative in-network caching
strategies for enhancing the overall content delivery
performance.
– We address the central question of whether caching only at
specific sub-set of node(s) en route the delivery path can
achieve better gain.
– If yes, which are these nodes to cache and how can we
identify them?
3
4. “Cache All” vs “Random” Strategies
• Ubiquitous caching (NNC+LRU): caches every content in every
node along the delivery path and uses LRU eviction strategy
• Random caching strategy (Rdm+LRU): caches at one randomly
selected node along the delivery path and also uses LRU eviction
4
0 50 100 150 200
0.49
0.5
0.51
0.52
0.53
0.54
0.55
0.56
0.57
Time, t(s)
InstantaneousHopReductionRatio,β(t)
NNC+LRU
Rdm+LRU
0 50 100 150 200
0.42
0.44
0.46
0.48
0.5
0.52
0.54
0.56
0.58
Time, t(s)
InstantaneousServerHitReductionRatio,γ(t)
NNC+LRU
Rdm+LRU
Simple random caching outperforming ubiquitous caching in the number of hops to hit the
content (left) and reduced server hits (right).
5. Approach & Rationale
• The approach: to cache content only in selected node(s) for each
content request
• The rationale: some nodes have higher probability of getting a
cache hit than others.
– By strategically caching the content at “better” node(s), we can
decrease the cache eviction rate and increase the cache hit.
– Illustrative example:
5
– Events: t=0, client A requests a content from S1 and t=1, client B
requests a content from S1
– If NNC, ubiquitous caching at v1, v2, v3 and v4 but only v3 necessary
for the request from client B
– v3 being the “important” node in this case.
v2
v6
v5v1 v3s1
Client C
Client B
v4 Client A
6. (Ego Network) Betweenness Centrality
6
• The betweenness centrality (Betw+LRU): measures the number
of times a specific node lies on the content delivery path between
all pairs of nodes in a network topology.
– The basic idea is that if a node lies along a high number of content
delivery paths, then it is more likely to get a cache hit.
– Caching only at those “important” nodes reduces the cache
replacement rate while still caching content where a cache hit is most
probable to happen.
• The Ego Network Betweenness centrality (EgoBetw-LRU):
– The ego network consists of a node together with all its immediate
neighbours and all the links among those nodes.
– The idea is for each node, v to compute its CB(v) based on its ego
network rather than the entire network topology.
7. Operation
• Betw+LRU and EgoBetw+LRU caching:
– Operates at per request level.
– The CB value is pre-computed offline and configured to every
router by the network management system.
– The content request message records the highest centrality
value among all the intermediate nodes.
– This value is copied onto the content messages.
– On the way to the requesting user, each router matches its own
CB against the attached one
• The content is cached only if the two values match.
• If more nodes have the same highest centrality value, all of them
will cache the content.
7
8. Features
• Betw+LRU and EgoBetw+LRU:
– cache content at nodes which have high probability of
getting cache hits
– both approaches always spread content towards users
• If a content is popular at a specific region of the Internet, then this
content will eventually be cached in that region
– is lightweight - each node independently makes its caching
decision solely based on its own CB
• neither requiring information exchange with other nodes nor
inference of server location or of traffic patterns.
8
9. Metrics
9
• In-network caching aims to:
1. Reduce the content delivery latency whereby a cached content near
the client can be fetched faster than from the server
2. Reduce traffic and congestion since content traverses fewer links
when there is a cache hit
3. Alleviate server load as every cache hit means serving one less
request.
– where Hr(t) = the hop count from client to server requesting fr from
time t-1 to t and hr(t) = the hop count from the content client to the
first node where a cache hit occurs for fr from t-1 to t.
– where Wr(t) = the number of request for fr from t-1 to t and wr(t) = the
number of server hits for fr from t-1 to t.
10. Performance Evaluation on k-ary Trees
• Instantaneous performance for a 5-level binary tree (k=2,
D=4)
0 50 100 150 200
0.38
0.4
0.42
0.44
0.46
0.48
0.5
Time, t(s)
InstantaneousHopReductionRatio,β(t)
NNC+LRU Betw+LRU EgoBetw+LRU Rdm+LRU
0 20 40 60 80 100 120 140 160 180 200
0.18
0.2
0.22
0.24
0.26
0.28
0.3
0.32
0.34
0.36
Time, t(s)
InstantaneousServerHitReductionRatio,γ(t)
NNC+LRU Betw+LRU EgoBetw+LRU Rdm+LRU
Instantaneous behavior of the caching schemes for a binary tree; (left) β, (right) γ.
10
11. Performance Evaluation on k-ary Trees
• k-ary trees with varying k and D.
4 5 6
0.35
0.4
0.45
0.5
0.55
Binary tree depth, D
HopReductionRatio,β
NNC+LRU
Betw+LRU
EgoBetw+LRU
Rdm+LRU
2 3 4 5
0.32
0.34
0.36
0.38
0.4
0.42
0.44
0.46
0.48
0.5
Spread factor, k
HopReductionRatio,β
NNC+LRU
Betw+LRU
EgoBetw+LRU
Rdm+LRU
Betw+LRU consistently outperforms the rest over different D (left) and k (right).11
12. Performance Evaluation on Scale-free Graphs
• Scale-free graphs
– Barabasi-Albert (BA) graphs preferential attachment
– N = 100 and mean valence = 2
0 50 100 150 200
0.36
0.38
0.4
0.42
0.44
0.46
0.48
0.5
Time, t(s)
InstantaneousHopReductionRatio,β(t)
NNC+LRU
Betw+LRU
EgoBetw+LRU
Rdm+LRU
0 50 100 150 200
0.16
0.18
0.2
0.22
0.24
0.26
0.28
0.3
0.32
0.34
0.36
Time, t(s)
InstantaneousServerHitReductionRatio,γ(t)
NNC+LRU
Betw+LRU
EgoBetw+LRU
Rdm+LRU
Instantaneous behavior of the caching schemes in a B-A graph; (left) β, (right) γ.
12
13. Performance Evaluation on Scale-free Graphs
• 10 generations of B-A graphs with N = 100 and
mean valence = 2.
1 2 3 4 5 6 7 8 9 10
0.38
0.4
0.42
0.44
0.46
0.48
0.5
0.52
Graph ID
HopReductionRatio,β
NNC+LRU
Betw+LRU
EgoBetw+LRU
Rdm+LRU
0 20 40 60 80 100
0
0.2
0.4
0.6
0.8
1
1.2
1.4
Betweenness
0 20 40 60 80 100
0
5
10
15
20
25
30
35
EgoNetworkBetweenness
Node ID
Betweenness
Ego Network Betweenness
Caching performance with different 100-node B-A graphs (left) and a sample ego network
betweenness and betweenness values of the nodes in a B-A graph (right).
13
14. Evaluation on Real Internet Topology
• Real-world Internet topology
– Large domain-level topology extracted from the CAIDA dataset
– Root at tier-1 ISP (AS7018)
– 6,804 domains and 10,205 links
Instantaneous behavior of the caching schemes in a large-scale real Internet topology; (left) β,
(right) γ. 14
0 20 40 60 80 100
0.5
0.55
0.6
0.65
0.7
0.75
Time, t (s)
InstantaneousHopReductionRatio,β(t)
NNC+LRU
Betw+LRU
EgoBetw+LRU
Random+LRU
0 20 40 60 80 100
0.2
0.25
0.3
0.35
0.4
0.45
0.5
0.55
Time, t (s)
InstantaneousServerHitReductionRatio,γ(t)
NNC+LRU
Betw+LRU
EgoBetw+LRU
Rdm+LRU
15. Summary and Conclusions
• We argue against the necessity of a ubiquitous caching
strategy in ICN and investigate the possibility of caching less to
achieve higher performance gain.
• We demonstrate that even a simple random caching strategy
(Rdm+LRU) can outperform (though inconsistently) the current
pervasive caching paradigm under the conditions
– that the network topology has low number of distinct delivery paths
– high average delivery path length.
• We propose a caching strategy based on the concept of
betweenness centrality (Betw+LRU)
– content is only cached at the nodes having the highest probability of
getting a cache hit along the content delivery path.
– also proposed an approximation of it (EgoBetw+LRU) for scalable and
distributed realization in dynamic network environments.
15
16. Summary and Conclusions (cont’d)
• We compare the performance of our proposals against the
ubiquitous caching of the NNC proposal (NNC+LRU).
• Observations:
– Betw+LRU consistently achieves the best hop and server
reduction ratios across topologies having different structural
properties without being restricted by the operating conditions
required by Rdm+LRU.
– EgoBetw+LRU approximates closely Betw+LRU in non-regular
topologies (e.g., B-A graphs, real Internet topology)
• a practical candidate for the deployment of this approach.
– Besides synthetic topologies (i.e., k-ary trees and B-A graphs), the
observations are further verified with a large-scale real Internet
topology.
• We conclude that indeed caching less can achieve more and
our proposed (Ego)Betw+LRU is a candidate for realizing this
promise. 16
17. • Work done in the context of the EU FP7 project COMET which we lead
technically - http://www.comet-project.org/
• W. K. Chai, I. Psaras, G. Pavlou, et. al., “CURLING: Content-
ubiquitous Resolution and Delivery Infrastructure for Next-generation
Services,” IEEE Commun. Mag., vol. 49, no. 3, pp. 112-120, 2011.
• I. Psaras, R. Clegg, R. Landa, W. K. Chai and G. Pavlou, “Modelling
and Evaluation of CCN-caching Trees,” Proc. of IFIP Networking,
Valencia, Spain, May 2011.
• I. Psaras, W. K. Chai and G. Pavlou, “To Cache or Not To Cache:
Probabilistic In-Network Caching for Information-Centric Networks,” to
appear in the ACM SIGCOMM ICN Workshop, August 2012.
17
Related Publications