Open Access Open Access  Restricted Access Subscription or Fee Access

Improved Congestion Control for Packet Switched Networks and the Web Servers

G. Thilip Kumar, Dr. R. Balasubramanian

Abstract


Cluster based web server has become a critical issue in various concert. Since user-level communication is an effective technique to reduce the intra-cluster communication overhead, cluster-based Web server design utilizing user-level communication mechanisms has been a popular research focus in recent times. In this context, the overall objective of this research is to explore several design issues in order to enhance the performance of cluster-based network servers based on user-level communication mechanisms. Due to their complexity, the performance of cluster-based Web servers is dependent on various design choices and demands imposed on the systems. Therefore, we investigate several design issues with different system environments as explained below. First, we propose a coscheduled server model, which coschedules the communication processes of a request. Its main objective is to minimize the response time of requests that need intra-cluster communication. It has two familiar techniques called Dynamic Coscheduling and DCS with immediate blocking. Secondly, SSL is providing the cluster-based application servers and it proposes a SSL with BF. Hence, improving the concert of SSL-enabled application servers is serious for designing scalable and high concert data center. Finally, it proposes a NIC data caching scheme, and it improves the distributed Web server’s performance. Although NIC memory is traditionally used for communication, it can be used for improving performance as well because modern NICs are equipped with much larger amounts of memory.

To investigate these techniques, it develops a widespread recreation testbed that captures the underlying communication layer in a cluster, the coscheduling algorithms, and the characteristics of a distributed Web server model. Extensive experiments of three proposed schemes using this testbed show that performance of cluster-based Web servers can significantly increase by employing these techniques.


Keywords


Cluster Based Web, Dynamic Coscheduling, NIC, Secure Socket Layer.

Full Text:

PDF

References


S. Agarwal, G.S. Choi, C. R. Das, A. B. Yoo, and S. Nagar. Co-ordinated Coscheduling in time-sharing Clusters through a Generic Framework. In Proceedings of International Conference on Cluster Computing, December 2003.

Allen and T. Dierks. The TLS Protocol Version 1.0. Internet Draft. Internet Engineering Task Force, November 1997. http://www.ietf.org/rfc/rfc2246.txt.

Martin F. Arlitt and Carey L. Williamson. Web Server Workload Characterization: The Search for Invariants. ACM SIGMETRICS Performance Evaluation Review, 24(1):126–137, 1996.

Mohit Aron, Peter Druschel, and Willy Zwaenepoel. Efficient Support for P-HTTP in Cluster-BasedWeb Servers. In Proceedings of the USENIX 1999 Annual Technical Conference, pages 185–198, June 1999.

J. Feigenbaum, A. Johnson, and P.F. Syverson, “A Model of Onion Routing with Provable Anonymity,” Proc. Conf. Financial Cryptography, Springer, pp. 57-71, 2007.

S. Goldwasser, S. Micali, and R.L. Rivest, “A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks,” SIAM J. Computing, vol. 17, no. 2, pp. 281-308, 1988.

J.E. Holt and K.E. Seamons, “Nym: Practical Pseudonymity for Anonymous Networks,” Internet Security Research Lab Technical Report 2006-4, Brigham Young Univ., June 2006.

P.C. Johnson, A. Kapadia, P.P. Tsang, and S.W. Smith, “Nymble: Anonymous IP-Address Blocking,” Proc. Conf. Privacy Enhancing Technologies, Springer, pp. 113-133, 2007.

Juels and J.G. Brainard, “Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks,” Proc. Network and Distributed System Security Symp. (NDSS), 1999.

Kiayias, Y. Tsiounis, and M. Yung, “Traceable Signatures,” Proc. Int’l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT), Springer, pp. 571-589, 2004.

B.N. Levine, C. Shields, and N.B. Margolin, “A Survey of Solutions to the Sybil Attack,” Technical Report 2006-052, Univ. of Massachusetts, Oct. 2006.

Lysyanskaya, R.L. Rivest, A. Sahai, and S. Wolf, “Pseudonym Systems,” Proc. Conf. Selected Areas in Cryptography, Springer, pp. 184-199, 1999.

S. Micali, “NOVOMODO: Scalable Certificate Validation and Simplified PKI Management,” Proc. First Ann. PKI Research Workshop, Apr. 2002.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.