๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Connection caching: model and algorithms

โœ Scribed by Edith Cohen; Haim Kaplan; Uri Zwick


Publisher
Elsevier Science
Year
2003
Tongue
English
Weight
380 KB
Volume
67
Category
Article
ISSN
0022-0000

No coin nor oath required. For personal study only.

โœฆ Synopsis


We introduce a theoretical model for connection caching. In our model each host maintains (caches) a limited number of open connections to other hosts. A request may utilize an open connection in which case it is a hit, or it may require to open a new connection in which case it is a miss. Establishment of a new connection may force termination (eviction) of another connection at each of the endpoints. The goal is to serve the request sequence with minimum number of misses. This model differs from the standard caching model as it involves many caches which affect each other: a decision to terminate a connection by one node affects the cache of another node that is forced to accept the termination. Our motivation to study the problem stems from Web applications, namely the transmission of Hyper Text Transfer Protocol (HTTP) messages over persistent Transmission Control Protocol (TCP) connections. We consider both the off-line connection caching problem where the request sequence is given in advance, and the online connection caching problem, where the algorithm has to serve a request when it arrives without knowledge of future requests. In the off-line settings we show that finding the optimal strategy is NP-hard. We also derive natural algorithms from the optimal cache replacement algorithm for standard caching and prove that the miss rate of these algorithms is within a factor of 2 from optimal. In the online setting we study several families of distributed algorithms that can be implemented by running an independent process at each node. The algorithms differ by the amount of communication which they utilize between pairs of hosts engaged in an open connection. We show optimal k-competitive deterministic algorithms that utilize one communication bit per open connection, where k is the size of the largest cache in the network. On the other hand without such communication bit the best algorithms which we describe are only รฐ2k ร€ 1รž-competitive.

We also analyze what one can gain by using randomization at different levels of allowed communication.


๐Ÿ“œ SIMILAR VOLUMES


Algorithms for multicast connection unde
โœ Jun Gu; Xiao-Dong Hu; Mu-Hong Zhang ๐Ÿ“‚ Article ๐Ÿ“… 2002 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 139 KB

Given a source node and a set of destination nodes in a network, multicast routing problem is usually treated as Steiner tree problem. Unlike this well-known tree based routing model, multicast routing under multi-path model is to find a set of paths rooted at the source node such that in each path

Competitive Algorithms for Relaxed List
โœ Marek Chrobak; John Noga ๐Ÿ“‚ Article ๐Ÿ“… 2000 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 188 KB

We study relaxed list update problem RLUP , in which access requests are made to items stored in a list. The cost to access the jth item x is c , where j j c F c for all i. After the access, x can be repeatedly swapped, at no cost, with i i q1 j any item that precedes it in the list. This problem w

Hardness and algorithms for rainbow conn
โœ Sourav Chakraborty; Eldar Fischer; Arie Matsliah; Raphael Yuster ๐Ÿ“‚ Article ๐Ÿ“… 2009 ๐Ÿ› Springer US ๐ŸŒ English โš– 585 KB