skip to main content
10.1145/1402958.1402984acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free Access

Packet caches on routers: the implications of universal redundant traffic elimination

Authors Info & Claims
Published:17 August 2008Publication History

ABSTRACT

Many past systems have explored how to eliminate redundant transfers from network links and improve network efficiency. Several of these systems operate at the application layer, while the more recent systems operate on individual packets. A common aspect of these systems is that they apply to localized settings, e.g. at stub network access links. In this paper, we explore the benefits of deploying packet-level redundant content elimination as a universal primitive on all Internet routers. Such a universal deployment would immediately reduce link loads everywhere. However, we argue that far more significant network-wide benefits can be derived by redesigning network routing protocols to leverage the universal deployment. We develop "redundancy-aware" intra- and inter-domain routing algorithms and show that they enable better traffic engineering, reduce link usage costs, and enhance ISPs' responsiveness to traffic variations. In particular, employing redundancy elimination approaches across redundancy-aware routes can lower intra and inter-domain link loads by 10-50%. We also address key challenges that may hinder implementation of redundancy elimination on fast routers. Our current software router implementation can run at OC48 speeds.

References

  1. Netequalizer Bandwidth Shaper. http://www.netequalizer.com/.Google ScholarGoogle Scholar
  2. Packeteer WAN optimization solutions. http://www.packeteer.com/.Google ScholarGoogle Scholar
  3. Peribit WAN Optimization. http://www.juniper.net/.Google ScholarGoogle Scholar
  4. Riverbed Networks. http://www.riverbed.com.Google ScholarGoogle Scholar
  5. A. Anand, A. Gupta, A. Akella, S. Seshan, and S. Shenker. Packet Caches on Routers: The Implications of Universal Redundant Traffic Elimination (Extended Version). Technical Report 1636, UW-Madison, June 2008.Google ScholarGoogle Scholar
  6. B. Fortz and M. Thorup. Internet Traffic Engineering by Optimizing OSPF Weights. In Infocom, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  7. T. Ballardie, P. Francis, and J. Crowcroft. Core based trees (CBT). SIGCOMM Comput. Commun. Rev., 23(4):85--95, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Caesar, D. Caldwell, N. Feamster, J. Rexford, A. Shaikh, and J. van der Merwe. Design and implementation of RCP. In NSDI, 2005.Google ScholarGoogle Scholar
  9. B. Davie and Y. Rekhter. MPLS: technology and applications. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. U. Erlingsson, M. Manasse, and F. McSherry. A cool and practical alternative to traditional hash tables. In WDAS, 2006.Google ScholarGoogle Scholar
  11. L. Fan, P. Cao, J. Almeida, and A. Z. Broder. Summary cache: a scalable wide-area Web cache sharing protocol. In ACM SIGCOMM, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. B. Fortz, J. Rexford, and M. Thorup. Traffic engineering with traditional IP routing protocols. In Infocom, 2002.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Myers, J. Rexford, G. Xie, H. Yan, J. Zhan, and H. Zhang. A clean slate 4D approach to network control and management. SIGCOMM Comput. Commun. Rev., 35(5):41--54, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Gupta, A. Akella, S. Seshan, S. Shenker, and J. Wang. Understanding and Exploiting Network Traffic Redundancy. Technical Report 1592, UW-Madison, April 2007.Google ScholarGoogle Scholar
  15. S. Kandula, D. Katabi, B. Davie, and A. Charny. Walking the tightrope: responsive yet stable traffic engineering. In ACM SIGCOMM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. U. Manber. Finding similar files in a large file system. In USENIX Winter Technical Conference, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. Medina, N. Taft, K. Salamatian, S. Bhattacharyya, and C. Diot. Traffic matrix estimation: existing techniques and new directions. In ACM SIGCOMM, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. R. Morris, E. Kohler, J. Jannotti, and M. F. Kaashoek. The Click modular router. SIGOPS Oper. Syst. Rev., 33(5):217--231, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A. Muthitacharoen, B. Chen, and D. Mazières. A low-bandwidth network file system. SIGOPS Oper. Syst. Rev., 35(5), 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. Rabin. Fingerprinting by Random Polynomials. Technical report, Harvard University, 1981. Technical Report, TR-15-81.Google ScholarGoogle Scholar
  21. M. Roughan, M. Thorup, and Y. Zhang. Performance of estimated traffic matrices in traffic engineering. In ACM SIGMETRICS, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. S. Singh, C. Estan, G. Varghese, and S. Savage. Automated worm fingerprinting. In OSDI, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. N. Spring, R. Mahajan, and D. Wetherall. Measuring ISP Topologies with Rocketfuel. In ACM SIGCOMM, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. N. Spring and D. Wetherall. A protocol-independent technique for eliminating redundant network traffic. In ACM SIGCOMM, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. A. Wolman et al. On the scale and performance of cooperative Web proxy caching. In ACM Symposium on Operating Systems Principles, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Packet caches on routers: the implications of universal redundant traffic elimination

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SIGCOMM '08: Proceedings of the ACM SIGCOMM 2008 conference on Data communication
      August 2008
      452 pages
      ISBN:9781605581750
      DOI:10.1145/1402958
      • cover image ACM SIGCOMM Computer Communication Review
        ACM SIGCOMM Computer Communication Review  Volume 38, Issue 4
        October 2008
        436 pages
        ISSN:0146-4833
        DOI:10.1145/1402946
        Issue’s Table of Contents

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 August 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate554of3,547submissions,16%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader