On the Performance and Scalability of a Data Mirroring Approach for I2-DSI Bert J

Total Page:16

File Type:pdf, Size:1020Kb

On the Performance and Scalability of a Data Mirroring Approach for I2-DSI Bert J B. Dempsey and D. Weiss On the Performance and Scalability of a Data Mirroring Approach for I2-DSI Bert J. Dempsey, Debra Weiss University of North Carolina at Chapel Hill [email protected] Abstract This paper presents work on scaleable design for the automated synchronization of large collections of files replicated across multiple hosts. Unlike conventional mirroring tools, our approach addresses multiple-site file synchronization by capturing file-tree update information in an output file during an initial file synchronization session. Once the update file is available, it can be transmitted over the network using parallel point-to-point file transfers or reliable multicasting and then processed at the remote sites. This paper outlines of how the above concept has been implemented as a modification to the open-source mirroring tool, rsync. It then presents performance experiments designed to characterize the server-side processing costs and network throughput requirements under realistic workloads on large storage servers. The performance experiments use the WAN testbed of the Internet2 Distributed Storage Infrastructure (I2-DSI) project, the context for this work, and the results provide guidance on the scalability of I2-DSI using the proposed data mirroring scheme. Keywords: mirroring, distributed storage, replication, Internet2, reliable multicast, I2-DSI. and bottlenecks caused by hierarchical 1. Introduction processing of client requests, the limits Client-server applications on the Internet of caching dynamically generated server benefit from the use of content responses, and the tendency of some replication through improved access for content providers to eschew caching in widely distributed clients and balancing order to retain server-side control [1]. load across different servers and network paths. Content replication can be Mirroring source objects across server employed either in front of the server platforms is another approach to content (proxy-based caching of server replication. Among its key advantages responses) or behind the server are (1) the ability to replicate server-side (mirroring of source objects). On- functionality such as server-managed demand replication of server responses secure logins, (2) replication benefits for at proxy-based caches is widely any client-server protocol, not just HTTP deployed within the current WWW services, and (3) a basis for constructing where hierarchical or distributed manageable, deterministic control of the arrangements of cooperating caches replication process for the content handle HTTP requests and, less provider and service provider. In the commonly, those of other access current Internet, server-side replication protocols. While an important is most commonly employed for (1) the component of the current and future limited (but valuable) case of sharing Internet, proxy-based caching is tied to highly popular static file archives served specific protocols and has well-studied by FTP or HTTP or for (2) more general performance limitations. Problematic replication between servers controlled by aspects of proxy caching include delays a single organization where strong NetStore 1999 - 1 - B. Dempsey and D. Weiss uniformity can be imposed on the server AFS. A primary advantage of our platforms. approach is that it provides a highly portable and easily modified data The context of our work is the Internet2 mirroring mechanism. Application-level Distributed Storage Initiative (I2-DSI) solutions, however, are unlikely to project [2], which is developing match the throughput achievable with replication middleware to extend source- kernel-level solutions. This paper object replication to loosely-coupled, provides empirical evidence that the file heterogeneous platforms. I2-DSI relies replication solution proposed here for I2- on a set of dedicated, geographically DSI will provide adequate performance distributed replication hosts (I2-DSI for the current I2-DSI testbed and scale servers) in the network on which user up with the number of I2-DSI replication content will be hosted. Application hosts. developers publish collections of source objects (I2-DSI content channels [3]) in The rest of the paper proceeds as conjunction with the I2-DSI interface follows. Section 2 presents the describing supported content types and motivation and design of a novel file the standard services available on the mirroring approach and the scenario for replication hosts. Current content its use within I2-DSI. In Section 3 channels are linked at [2]. As part of performance aspects of the solution are Internet2, the I2-DSI project aims to explored through controlled experiments develop an open architecture for that measure server load and the replication services to serve the 140 available network bandwidth using the Internet2 universities and, subsequently, I2-DSI project testbed. Section 4 gives the wider Internet community. additional discussion of related work, Proprietary solutions for application and Section 5 summarizes the findings hosting and replication are now of the paper. appearing in commercial efforts [4] [5]. 2 Rsync+ In this paper a design is presented for The data mirroring tool developed here, scaleable replication of large collections rsync+, is a modification to the open- of files in support of file-oriented source file-mirroring tool, rsync. Rsync replication across the I2-DSI servers.1 [7] is a widely used data mirroring tool Our design is a novel adaptation of an designed to automate synchronization of existing data mirroring tool, rsync, that file hierarchies residing on the same runs in user space and manages data machine or, alternatively, on machines replication through operating system across the Internet. Rsync has gained calls to the filesystem. Alternative popularity due to its rich feature set for approaches include block-level controlling the synchronization process, management of file replication either at and its open-source C code the middleware layer [6] or within a implementation has enabled it to be distributed filesystem such as NFS or ported to many Unix platforms and MS NT. A distinctive feature of rsync (and thus rsync+) is its use of block-level 1 I2-DSI ultimately expects to support multiple replication mechanisms in order to enable the checksumming to perform differential largest possible set of applications to benefit file update when an existing file has from its replication services. NetStore 1999 - 2 - B. Dempsey and D. Weiss been updated, i.e., has a new disk image replication evokes a set of rsync under the same file name. sessions, one for each remote I2-DSI replication host that carries the channel. As shown, the clients for this I2-DSI Channel provider channel access the replication hosts nearest to them using resolution import mechanisms that are part of the I2-DSI replication architecture. M The modifications developed for rsync+ rsync src/ S1::src/ are a response to two factors in the rsync src/ S2::src/ scenario in Figure 2.1 that result in rsync src/ S3::src/ inefficiency and limit scalability. First, M performs the same processing on the src/ directory for each of the three rsync sessions required to update the slave clients S3 hosts (S1, S2, and S3). This processing includes checking file status information S1 and, if a file has been modified, S2 computing checksums, and thus it can be compute-intensive for large file trees clients and/or large individual file objects. With multiple point-to-point rsync sessions, Figure 2.1: An Rsync Scenario for the processing load on M increases with Content Replication in I2-DSI the number of remote servers being In its current form, rsync synchronizes updated. Secondly, M transmits identical remote directory hierarchies during an data streams over the network in each of interactive network session involving the three master-slave rsync sessions two sites, the master site and a slave. (S1, S2, S3). Thus, for example, its use in the I2-DSI context would follow the scenario shown To enable efficient multiple-site in Figure 2.1. In the scenario shown, a synchronization, the rsync source code channel provider places new or modified was modified to create new modes of files for a file-based channel stored in operation, as shown in Figure 2.2. the directory, src/, on the master I2-DSI Options in rsync+ (the –f and –F flags) server, denoted as M. For our purposes, enable the end-to-end update process to the import mechanism here is not be decomposed into three independent specified. In the current I2-DSI actions: architecture, modifications to the source Step 1: the generation of replica objects in a channel are localized to a update information at the master master channel copy at one I2-DSI site, server, here M. The set of all other I2- Step 2: the network transport of DSI replication servers on which the update information from the channel is carried are shown within the master to the slave sites, and shaded area as S1, S2, and S3. On M Step 3: the processing of the then, a script managing channel update information at each slave NetStore 1999 - 3 - B. Dempsey and D. Weiss site in order to synchronize the 3 Performance Analysis slave’s files with those at the master. This section focuses on empirical results gathered to characterize the performance The key feature of rsync+ is then that it of and to provide insight into the decouples network communication (Step scalability of the data mirroring scenario 2) from filesystem update actions (Steps depicted in Figure 2.2. The data 1 and 3). This decoupling eliminates represents performance measurements redundant processing at the master site gathered from network and server and enables the use of parallel network experiments running on high- (TCP) connections or a reliable multicast performance servers within the I2-DSI transport protocol to deliver data (Step WAN testbed. In particular, the results 2) from a single master site to the quantify the balance between server multiple slave sites, resulting in a processing throughput for file scaleable approach to multiple-site file synchronization actions, server synchronization.
Recommended publications
  • Arxiv:1907.07120V1 [Cs.CY] 16 Jul 2019 1 Introduction That China Hindered Access to I2P by Poisoning DNS Resolu- Tions of the I2P Homepage and Three Reseed Servers
    Measuring I2P Censorship at a Global Scale Nguyen Phong Hoang Sadie Doreen Michalis Polychronakis Stony Brook University The Invisible Internet Project Stony Brook University Abstract required flexibility for conducting fine-grained measurements on demand. We demonstrate these benefits by conducting an The prevalence of Internet censorship has prompted the in-depth investigation of the extent to which the I2P (invis- creation of several measurement platforms for monitoring ible Internet project) anonymity network is blocked across filtering activities. An important challenge faced by these different countries. platforms revolves around the trade-off between depth of mea- Due to the prevalence of Internet censorship and online surement and breadth of coverage. In this paper, we present surveillance in recent years [7, 34, 62], many pro-privacy and an opportunistic censorship measurement infrastructure built censorship circumvention tools, such as proxy servers, virtual on top of a network of distributed VPN servers run by vol- private networks (VPN), and anonymity networks have been unteers, which we used to measure the extent to which the developed. Among these tools, Tor [23] (based on onion rout- I2P anonymity network is blocked around the world. This ing [39,71]) and I2P [85] (based on garlic routing [24,25,33]) infrastructure provides us with not only numerous and ge- are widely used by privacy-conscious and censored users, as ographically diverse vantage points, but also the ability to they provide a higher level of privacy and anonymity [42]. conduct in-depth measurements across all levels of the net- In response, censors often hinder access to these services work stack.
    [Show full text]
  • SSGRR-2002S - Papers
    General Chairman Deputy General Chairman Veljko Milutinovic, Frédéric Patricelli, School of Electrical Engineering, Telecom Italia Learning Services University of Belgrade (Head of International Education) Conference organization staff: Conference Managers: Miodrag Stefanovic Cesira Verticchio Conference Staff Renato Ciampa Veronica Ferrucci Maria Rosaria Fiori Maria Grazia Guidone Natasa Kukulj Bratislav Milic Zaharije Radivojevic Milan Savic These pages are optimized for Internet Explorer 4+ or Netscape Navigator v4+ and resolution of 1024x768 pixels in high color. Designed by SSGRR SSGRR-2002s - Papers 1. .NET All New? Jürgen Sellentin, Jochen Rütschlin 2. A center for Knowledge Factory Network Services (KoFNet) as a support to e-business Giuseppe Visaggio, Piernicola Fiore 3. A concept-oriented math teaching and diagnosis system Wei-Chang Shann, Peng-Chang Chen 4. A contradiction-free proof procedure with visualization for extended logic programs Susumu Yamasaki, Mariko Sasakura 5. A Framework For Developing Emerging Information Technologies Strategic Plan Amran Rasli 6. A Generic Approach to the Design of Linear Output Feedback Controllers Yazdan Bavafa-Toosi, Ali Khaki-Sedigh 7. A Knowledge Management Framework for Integrated design Niek du Preez, Bernard Katz 8. A Method Component Programming Tool with Object Databases Masayoshi Aritsugi, Hidehisa Takamizawa, Yusuke Yoshida and Yoshinari Kanamori 9. A Model for Business Process Supporting Web Applications Niko Kleiner, Joachim Herbst 10. A Natural Language Processor for Querying Cindi Niculae Stratica, Leila Kosseim, Bipin C. Desai 11. A New Approach to the Construction of Parallel File Systems for Clusters Felix Garcia, Alejandro Calderón, Jesús Carretero, Javier Fernández, Jose M. Perez 12. A New model of On-Line Learning file:///F¦/papers.html (1/15)2004/03/22 13:16:33 SSGRR-2002s - Papers Marjan Gusev, Ljupco N.
    [Show full text]
  • Appendix a the Ten Commandments for Websites
    Appendix A The Ten Commandments for Websites Welcome to the appendixes! At this stage in your learning, you should have all the basic skills you require to build a high-quality website with insightful consideration given to aspects such as accessibility, search engine optimization, usability, and all the other concepts that web designers and developers think about on a daily basis. Hopefully with all the different elements covered in this book, you now have a solid understanding as to what goes into building a website (much more than code!). The main thing you should take from this book is that you don’t need to be an expert at everything but ensuring that you take the time to notice what’s out there and deciding what will best help your site are among the most important elements of the process. As you leave this book and go on to updating your website over time and perhaps learning new skills, always remember to be brave, take risks (through trial and error), and never feel that things are getting too hard. If you choose to learn skills that were only briefly mentioned in this book, like scripting, or to get involved in using content management systems and web software, go at a pace that you feel comfortable with. With that in mind, let’s go over the 10 most important messages I would personally recommend. After that, I’ll give you some useful resources like important websites for people learning to create for the Internet and handy software. Advice is something many professional designers and developers give out in spades after learning some harsh lessons from what their own bitter experiences.
    [Show full text]
  • WP-MIRROR 0.7.4 Reference Manual
    WP-MIRROR 0.7.4 Reference Manual Dr. Kent L. Miller November 22, 2014 DRAFT 1 DRAFT 2 To Tylery DRAFT i WP-MIRROR 0.7.4 Reference Manual Legal Notices Copyright (C) 2012–2014 Dr. Kent L. Miller. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled “GNU Free Documentation License”. THIS PUBLICATION AND THE INFORMATION HEREIN ARE FURNISHED AS IS, ARE FURNISHED FOR INFORMATIONAL USE ONLY, ARE SUBJECT TO CHANGE WITH- OUT NOTICE, AND SHOULD NOT BE CONSTRUED AS A COMMITMENT BY THE AU- THOR. THE AUTHOR ASSUMES NO RESPONSIBILITY OR LIABILITY FOR ANY ER- RORS OR INACCURACIES THAT MAY APPEAR IN THE INFORMATIONAL CONTENT CONTAINED IN THIS MANUAL, MAKES NO WARRANTY OF ANY KIND (EXPRESS, IMPLIED, OR STATUTORY) WITH RESPECT TO THIS PUBLICATION,AND EXPRESSLY DISCLAIMS ANY AND ALL WARRANTIES OF MERCHANTABILITY, FITNESS FOR PAR- TICULAR PURPOSES, AND NONINFRINGEMENT OF THIRD-PARTY RIGHTS. The WP-MIRROR logotype (see margin) was released by the author into the public domain on 2014-Apr-10. See https://www.mediawiki.org/wiki/File:Wp-mirror.png. This logotype fea- tures a sunflower that is derived from 119px-Mediawiki logo sunflower Tournesol 5x rev2.png, which is also in the public domain. See https://en.wikipedia.org/wiki/File:Mediawiki_logo_sunflower_Tournesol_5x.png.
    [Show full text]
  • An Analysis of Selection of Mirror Sites for Parallel Processing
    IJSART - Volume 5 Issue 4 – APRIL 2019 ISSN [ONLINE]: 2395-1052 An Analysis of Selection of Mirror Sites for Parallel Processing Pallavi Vishwakarma1, Neha Khare2 1, 2 Dept of Computer Science 1, 2 Takshshila Institute of Engineering & Technology, Jabalpur MP, India Abstract- With the recent development of internet, we are able that describes and gives information about other data. The to retrieve documents from multiple server sites, like the package metadata is usually just a copy of the embedded mirror sites, to increase the downloading speed, make better package metadata for all packages on the repository. Package use of available network bandwidth and parallel processing managers download the package metadata from a repository speed of servers. Recent work by Rodriguez, Kirpal, and so that they know which packages are available from that Biersack [1] studied how to use the existing HTTP protocol repository. for retrieving documents from mirror sites in parallel to reduce the download time and to improve the reliability. The proposed approach utilizes to retrieve specific data in a mirror server site, which requires no changes on existing server and client settings. In this Work, we present a mathematical model that describes the problem of parallel download from multiple mirror sites. Based on the model, we present algorithms for selecting the best subset of mirror sites for parallel download. The proposed algorithm is implemented. Keywords- Server selection, Parallel download, HTTP, Protocol, mirror site, HTTP, FTP, Meta data, NSGA-II, AMOSA. Fig-1 Application of Meta data I. INTRODUCTION This also provides the package manager with dependency information needed to perform dependency A mirror website is a site that is a reproduction of an resolution.
    [Show full text]
  • September 2001
    THE ISBA BULLETIN Vol. 8 No. 3 September 2001 The o±cial bulletin of the International Society for Bayesian Analysis A WORD FROM forthcoming in the next few (Spain, June 2002). Details can THE PRESIDENT weeks. be found on our web site at The Executive Committee and www.bayesian.org. A very by Alicia Carriquiry the Board of Directors of ISBA promising new venture for ISBA ISBA President have been actively discussing is an international meeting [email protected] several issues of importance to planned for 2003, that will be ISBA and its membership. jointly sponsored by the IMS; Dear ISBA members: Underway are discussions, for stay tuned for more news in the I hope that this issue of the example, on the always elusive coming months. Bulletin finds everyone in good problem of our stagnant ' $ health and in good spirits. For membership numbers. Contents our members in the United How should we try to ➤ Nominating Committee States, a special hope that the increase the number of ISBA ☛ Page 2 appalling tragedy of September members? In the recent past, 11 did not affect family or ISBA has made efforts on a ➤ 2002 Mitchell Prize friends in any serious way. variety of fronts to attract and ☛ Page 2 First of all, I’d like to extend then retain new members. the warmest congratulations on A very convenient and secure ➤ ISBA Elections behalf of ISBA to our new system to register and pay dues ☛ Page 3 Savage Award winners: Peter online has been in operation for ➤ Bayesian history Hoff, Tzee-Ming Huang, and some time now, thanks to the ☛ Page 7 Jeremy Oakley, and also to Tim efforts of our Treasurer Val Hanson who obtained an Johnson and of our Web Master ➤ Bayesian history honorable mention.
    [Show full text]
  • Pirate Bay Download Torrent File No Magnet Pirate Bay Download Torrent File No Magnet
    pirate bay download torrent file no magnet Pirate bay download torrent file no magnet. Last Updated: 22 May, 2021, EST. Benefits and Disadvantages of Pirate Bay. For those who love to use Pirate Bay, the filesharing website is a modern-day, digital Robinhood. Pirate Bay is a network of users who provide and benefit from the free exchange of information, media, and digital goods. Therefore, the site bypasses the money-hungry hierarchy of otherwise powerful media companies and distributors. However, to those who are against it, Pirate Bay is infamous, and with infamy, there comes a certain degree of risk. Here are the benefits and disadvantages of Pirate Bay: Access a growing collection of magnet links on Pirate Bay website. Don’t miss out! Benefits of Pirate Bay. Free: One of the most noticeable benefits of Pirate Bay is that the content is free. Content can be downloaded and used at your leisure without even having to provide a credit card number. (Who doesn’t like free, right?) No Restrictions: Click to bypass restrictions on thepiratebay.app. New content available. Another benefit of Pirate Bay is that the information downloaded does not have restrictions or other restraints imposed by the corporation profiting from it. For instance, there are no commercials, ads, or other industrial add-ons that prevent you from just enjoying the downloaded media. Disadvantages of Pirate Bay. Legality: Pirate Bay as a filesharing service is legal. However, downloading much of what is available, copyrighted material, precisely, is illegal. Using Pirate Bay and downloading the newest movie or game is Piracy, which is an offense.
    [Show full text]
  • Performance Characteristics of Mirror Servers on the Internet Andy Myers Peter Dinda Hui Zhang Carnegie Mellon University
    Performance Characteristics of Mirror Servers on the Internet Andy Myers Peter Dinda Hui Zhang Carnegie Mellon University Pittsburgh, PA g facm,pdinda,hzhang @cs.cmu.edu Abstract— As a growing number of web sites introduce mirrors to in- How is the probability that a server’s performance will drop crease throughput, the challenge for clients becomes determining which relative to other servers affected by time scale? mirror will offer the best performance when a document is to be re- trieved. In this paper we present findings from measuring 9 clients scat- Does a drop in a server’s performance indicate it has become tered throughout the United States retrieving over 490,000 documents from less likely to offer better performance than other servers? 47 production web servers which mirror three different web sites. We have To answer the first question, we have looked at the time re- severalinteresting findings that may aid in the design of protocols for choos- ing among mirror servers. Though server performance varies widely, we quired to retrieve a document from each mirror server of a site. have observed that a server’s performance relative to other servers is more We have found that the difference in performance between the stable and is independent of time scale. In addition, a change in an indi- best and worst servers is typically larger than an order of mag- vidual server’s transfer time is not a strong indicator that its performance nitude, and can grow larger than two orders of magnitude on relative to other servers has changed.
    [Show full text]
  • Website and Types of Website
    Website and types of website A website (also spelled Web site[1]) is a collection of related web pages, images, videos or other digital assets that are addressed relative to a common Uniform Resource Locator (URL), often consisting of only the domain name, or the IP address, and the root path ('/') in an Internet Protocol-based network. A web site is hosted on at least one web server, accessible via a network such as the Internet or a private local area network. A web page is a document, typically written in plain text interspersed with formatting instructions of Hypertext Markup Language (HTML, XHTML). A web page may incorporate elements from other websites with suitable markup anchors. Web pages are accessed and transported with the Hypertext Transfer Protocol (HTTP), which may optionally employ encryption (HTTP Secure, HTTPS) to provide security and privacy for the user of the web page content. The user's application, often a web browser, renders the page content according to its HTML markup instructions onto a display terminal. All publicly accessible websites collectively constitute the World Wide Web. The pages of a website can usually be accessed from a simple Uniform Resource Locator called the homepage. The URLs of the pages organize them into a hierarchy, although hyperlinking between them conveys the reader's perceived site structure and guides the reader's navigation of the site. Some websites require a subscription to access some or all of their content. Examples of subscription sites include many business sites, parts of many news sites, academic journal sites, gaming sites, message boards, web-based e-mail, services, social networking websites, and sites providing real-time stock market data.
    [Show full text]
  • Notorious Markets
    Contents 1 Overview 3 Positive Developments Since the 2015 Out-of-Cycle Review of Notorious Markets 5 Issue Focus: Stream Ripping 6 Results of the 2016 Out-of-Cycle Review of Notorious Markets 22 Public Information Results of the 2016 Out-of-Cycle Review of Notorious Markets Overview Commercial-scale trademark counterfeiting and copyright piracy cause sig- nificant financial losses for right holders and legitimate businesses, under- mine critical U.S. comparative advantages in innovation and creativity to the detriment of American workers, and can pose significant risks to consumer health and safety. The Notorious Markets List (List) highlights prominent online and physical marketplaces that reportedly engage in and facilitate substantial copyright piracy and trademark counterfeiting.[1] A goal of the List is to motivate appropriate action by owners and operators in the private sector, as well as governments, to reduce piracy and counterfeiting. The Office of the United States Trade Representative (USTR) has developed the List under the auspices of the annual Special 301 process.[2] USTR solicited comments regarding poten- tial markets to highlight in this year’s List through a Request for Public Comments published in the Federal Register (WWW.REGULATIONS.GOV, Docket Number USTR-2016-0013). The List is based on publicly-available information. USTR highlights these markets not only because they exemplify global counterfeiting and piracy concerns, but also because the scale of infringing activity in such markets can cause sig- nificant economic harm to U.S. intellectual property rights (IPR) holders. Some of the identified markets reportedly host a combination of legitimate and unauthorized activities.
    [Show full text]
  • Autodesk Subscription Renewal Price
    Autodesk Subscription Renewal Price Cyclical Winford always surfs his upper-case if Renado is clairvoyant or remise off-key. How-to Gene disseises imputably, he dirtying his Hilda very doggone. Pavel antagonising his varicosity inclose puffingly or pointedly after Noland bows and ransacks underwater, palatable and unprovisioned. Once a Lumion Pro Student License Key has expired, Lumion should be uninstalled. Access Ansys License Server from outside campus; Comsol. No headings were frequent on that page. Double into your email and prosper again. You can aim your subscription or thin your automatic renewal settings any time after purchase from amid My wedding page. Use this mushroom to deprive your product key become your Microsoft account as easy re. Hul have a plus, autodesk subscription renewal price. Henchman, it touch show locations of nearby. Is applicable local computer can collaborate on the subscription renewal price change the current. Millions of soap use XMind to clarify thinking, a complex information, brainstorming, get work organized, remote and wrap from home WFH. No liquid to swirl about viruses or anything related as the files are taken current from Github. List prices do indeed include taxes. We hang a community built and ran sub. We are here to help anyone understand, why please contact us to discuss internal best options for emergency company. Do you waiting an excellent you want paper share outright the seek team? LIcense for every user was cost prohibitive, plus maintaining maintenance for upgrades. The result of spear is a shift discretion from channel sales and towards direct sales, with customers able to steer direct use the Autodesk Online Store.
    [Show full text]
  • Dynamic Load Balancing Algorithms for Heterogeneous Web Server Clusters
    International Journal of Scientific Research in ______________________________ Review Paper . Computer Science and Engineering Vol.5, Issue.4, pp.56-59, August (2017) E-ISSN: 2320-7639 Dynamic Load Balancing Algorithms for Heterogeneous Web Server Clusters Deepti Sharma1*, Vijay B. Aggarwal2 - 1*Dept. of IT, Jagan Institute of Management Studies, Rohini, India 2DIT, JIMS, Rohini, Delhi, India Corresponding Author: [email protected] Available online at: www.isroset.org Received 10th Jun 2017, Revised 16th Jul 2017, Accepted 12th Aug 2017, Online 30th Aug 2017 Abstract Today, the World Wide Web is growing at an increasing rate and occupied a big percentage of the traffic in the Internet. These systems lead to overloaded and congested proxy servers. Load Balancing and Clustering of web servers helps in balancing this load among various web servers. In this paper we have given solution for load balancing Clustering using three different algorithms and frameworks. The objective of this paper is to enhance the execution time of a server, increasing reliability and optimizing the system performance. These are achieved through simulations on the proposed methods. Keywords: Dynamic Load Balancing, Cluster System, load sharing, web traces I. INTRODUCTION particular website, the response time from that website also In current scenario, Internet is acting as a backbone of increases, because of any of the reason: communication by offering an efficient and stable network for millions of effected workers round the globe. Among -Bandwidth of web server various (email, file sharing, Newsgroup, websites, Instant - HTTP Request Type messaging / chat, fax server, search engine, www) services -Level of traffic volume on the web site.
    [Show full text]