[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/1855711.1855739acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnsdiConference Proceedingsconference-collections
Article

EndRE: an end-system redundancy elimination service for enterprises

Published: 28 April 2010 Publication History

Abstract

In many enterprises today, WAN optimizers are being deployed in order to eliminate redundancy in network traffic and reduce WAN access costs. In this paper, we present the design and implementation of EndRE, an alternate approach where redundancy elimination (RE) is provided as an end system service. Unlike middleboxes, such an approach benefits both end-to-end encrypted traffic as well as traffic on last-hop wireless links to mobile devices.
EndRE needs to be fast, adaptive and parsimonious in memory usage in order to opportunistically leverage resources on end hosts. Thus, we design a new fingerprinting scheme called SampleByte that is much faster than Rabin fingerprinting while delivering similar compression gains. Unlike Rabin fingerprinting, SampleByte can also adapt its CPU usage depending on server load. Further, we introduce optimizations to reduce server memory footprint by 33-75% compared to prior approaches. Using several terabytes of network traffic traces from 11 enterprise sites, testbed experiments and a pilot deployment, we show that EndRE delivers 26% bandwidth savings on average, processes payloads at speeds of 1.5- 4Gbps, reduces end-to-end latencies by up to 30%, and translates bandwidth savings into equivalent energy savings on mobile smartphones.

References

[1]
Cisco Wide Area Application Acceleration Services. http: //www.cisco.com/en/US/products/ps5680/Products_ Sub_Category_Home.html.
[2]
Jenkins Hash. http://burtleburtle.net/bob/c/lookup3.c.
[3]
Peribit Networks (Acquired by Juniper in 2005): WAN Optimization Solution. http://www.juniper.net/.
[4]
Power Monitor, Monsoon Solutions. http://www.msoon.com/ powermonitor/powermonitor.html.
[5]
Riverbed Networks: WAN Optimization. http://www.riverbed. com/solutions/optimize/.
[6]
Windows Filtering Platform. http://msdn.microsoft.com/ en-us/library/aa366509(V.85).aspx.
[7]
A. Anand, A. Gupta, A. Akella, S. Seshan, and S. Shenker. Packet Caches on Routers: The Implications of Universal Redundant Traffic Elimination. In ACM SIGCOMM, Seattle, WA, Aug. 2008.
[8]
A. Anand, C. Muthukrishnan, A. Akella, and R. Ramjee. Redundant in Network Traffic: Findings and Implications. In ACM SIGMETRICS, Seattle, WA, June 2009.
[9]
S. Annapureddy, M. J. Freedman, and D. Mazires. Shark: Scaling file servers via cooperative caching. In NSDI, 2005.
[10]
M. Arlitt and C. Williamson. An analysis of tcp reset behavior on the internet. ACM CCR, 35(1), 2005.
[11]
K. C. Barr and K. Asanovic. Energy-aware lossless data compression. IEEE Transactions on Computer Systems, 24(3):250-291, Aug 2006.
[12]
F. Douglis and A. Iyengar. Application-specific delta-encoding via resemblance detection. In USENIX, 2003.
[13]
J. Eriksson, S. Agarwal, P. Bahl, and J. Padhye. Feasibility study of mesh networks for all-wireless offices. In MobiSys, 2006.
[14]
J. C. Mogul, F. Douglis, A. Feldmann, and B. Krishnamurthy. Potential benefits of delta encoding and data compression for http. In SIGCOMM, pages 181-194, 1997.
[15]
A. Muthitacharoen, B. Chen, and D. Mazières. A low-bandwidth network file system. SIGOPS Oper. Syst. Rev., 35(5), 2001.
[16]
R. Pang, M. Allman, M. Bennett, J. Lee, V. Paxson, and B. Tierney. A first look at modern enterprise traffic. In IMC, 2005.
[17]
H. Pucha, D. G. Andersen, and M. Kaminsky. Exploiting similarity for multi-source downloads using file handprints. In NSDI, 2007.
[18]
M. Rabin. Fingerprinting by random polynomials. Technical report, Harvard University, 1981. Technical Report, TR-15-81.
[19]
S. C. Rhea, K. Liang, and E. Brewer. Value-Based Web Caching. In 12th World Wide Web Conference, 2003.
[20]
N. T. Spring and D.Wetherall. A protocol-independent technique for eliminating redundant network traffic. In SIGCOMM, pages 87-95, 2000.
[21]
N. Tolia, M. Kaminsky, D. G. Andersen, and S. Patil. An architecture for Internet data transfer. In NSDI, 2006.

Cited By

View all
  • (2021)GoSeed: Optimal Seeding Plan for Deduplicated StorageACM Transactions on Storage10.1145/345330117:3(1-28)Online publication date: 16-Aug-2021
  • (2021)Asymptotic Analysis of Data Deduplication with a Constant Number of Substitutions2021 IEEE International Symposium on Information Theory (ISIT)10.1109/ISIT45174.2021.9517909(3296-3301)Online publication date: 12-Jul-2021
  • (2020)GoSeedProceedings of the 18th USENIX Conference on File and Storage Technologies10.5555/3386691.3386710(193-208)Online publication date: 24-Feb-2020
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
NSDI'10: Proceedings of the 7th USENIX conference on Networked systems design and implementation
April 2010
29 pages

Sponsors

  • USENIX Assoc: USENIX Assoc

In-Cooperation

Publisher

USENIX Association

United States

Publication History

Published: 28 April 2010

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2021)GoSeed: Optimal Seeding Plan for Deduplicated StorageACM Transactions on Storage10.1145/345330117:3(1-28)Online publication date: 16-Aug-2021
  • (2021)Asymptotic Analysis of Data Deduplication with a Constant Number of Substitutions2021 IEEE International Symposium on Information Theory (ISIT)10.1109/ISIT45174.2021.9517909(3296-3301)Online publication date: 12-Jul-2021
  • (2020)GoSeedProceedings of the 18th USENIX Conference on File and Storage Technologies10.5555/3386691.3386710(193-208)Online publication date: 24-Feb-2020
  • (2018)ResQProceedings of the 15th USENIX Conference on Networked Systems Design and Implementation10.5555/3307441.3307466(283-297)Online publication date: 9-Apr-2018
  • (2018)A Global Survey on Data DeduplicationInternational Journal of Grid and High Performance Computing10.4018/IJGHPC.201810010310:4(43-66)Online publication date: 1-Oct-2018
  • (2018)One size does not fit allProceedings of the 18th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing10.1109/CCGRID.2018.00036(213-222)Online publication date: 1-May-2018
  • (2018)Data deduplication techniques for efficient cloud storage managementThe Journal of Supercomputing10.1007/s11227-017-2210-874:5(2035-2085)Online publication date: 1-May-2018
  • (2017)CoREIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2016.257892828:2(446-461)Online publication date: 1-Feb-2017
  • (2017)A Fast and Accurate Hardware String Matching Module with Bloom FiltersIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2016.257703328:2(305-317)Online publication date: 1-Feb-2017
  • (2017)2016 Reviewers for IEEE Transactions on Network and Service ManagementIEEE Transactions on Network and Service Management10.1109/TNSM.2017.267343914:1(2-7)Online publication date: 1-Mar-2017
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media