The present technology pertains to systems and methods for implementing in-network caching system. More specifically it is directed to reducing latency and network load in content delivery network by increasing the hit-ratio for clusters of in-network caches.
Internet traffic related to Video-on-Demand (VoD) and linear video streaming services is projected to approximately reach 74 TB/s by the year 2021, representing 82% of the total internet traffic. As such, Content Delivery Networks (CDN) have been deployed to facilitate scaling of the network while providing better Quality of Experience to clients. However, the sheer scale of the video traffic and the ever-increasing expectations with regards to the Quality of Experience raises stringent engineering challenges for Content delivery Networks. Under such conditions, network scalability becomes a critical problem for video delivery as traditional Content Delivery Networks (CDN) struggle to cope with the demand. Amongst those challenges, a crucial one involves enhancing the efficiency with which relevant resources are utilized (network, storage, and compute). This is an essential improvement as simple scale up in processing hardware in response to an increasing network load is, in many cases, insufficient to meet the required Quality of Experience for content user.
In order to describe the manner in which the above-recited and other advantages and features of the disclosure can be obtained, a more particular description of the principles briefly described above will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings. Understanding that these drawings depict only exemplary embodiments of the disclosure and are not therefore to be considered to be limiting of its scope, the principles herein are described and explained with additional specificity and detail through the use of the accompanying drawings in which:
Various example embodiments of the disclosure are discussed in detail below. While specific implementations are discussed, it should be understood that this is done for illustration purposes only. A person skilled in the relevant art will recognize that other components and configurations may be used without parting from the spirit and scope of the disclosure. Thus, the following description and drawings are illustrative and are not to be construed as limiting. Numerous specific details are described to provide a thorough understanding of the disclosure. However, in certain instances, well-known or conventional details are not described in order to avoid obscuring the description. References to one or an embodiment in the present disclosure can be references to the same embodiment or any embodiment; and, such references mean at least one of the embodiments.
Reference to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the disclosure. The appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Moreover, various features are described which may be exhibited by some embodiments and not by others.
The terms used in this specification generally have their ordinary meanings in the art, within the context of the disclosure, and in the specific context where each term is used. Alternative language and synonyms may be used for any one or more of the terms discussed herein, and no special significance should be placed upon whether or not a term is elaborated or discussed herein. In some cases, synonyms for certain terms are provided. A recital of one or more synonyms does not exclude the use of other synonyms. The use of examples anywhere in this specification including examples of any terms discussed herein is illustrative only, and is not intended to further limit the scope and meaning of the disclosure or of any example term. Likewise, the disclosure is not limited to various embodiments given in this specification.
Without intent to limit the scope of the disclosure, examples of instruments, apparatus, methods and their related results according to the embodiments of the present disclosure are given below. Note that titles or subtitles may be used in the examples for convenience of a reader, which in no way should limit the scope of the disclosure. Unless otherwise defined, technical and scientific terms used herein have the meaning as commonly understood by one of ordinary skill in the art to which this disclosure pertains. In the case of conflict, the present document, including definitions will control.
Additional features and advantages of the disclosure will be set forth in the description which follows, and in part will be obvious from the description, or can be learned by practice of the herein disclosed principles. The features and advantages of the disclosure can be realized and obtained by means of the instruments and combinations particularly pointed out in the appended claims. These and other features of the disclosure will become more fully apparent from the following description and appended claims, or can be learned by the practice of the principles set forth herein.
Disclosed are systems, methods, and computer-readable media for optimizing a hit rate performance and service level response times for a cluster of in-network cache servers. Aspects of the disclosed technology are directed to a filtering scheme based on a multi-level popularity assessment of content request traffic. In some embodiments of the present technology, a controller-tuned threshold parameter is used for differentiating between popular and semi-popular contents.
In one aspect of the present technology, a method includes specifying, at an edge device, a threshold parameter for partitioning a meta-cache, comprising a plurality of last requested content identifiers, into a popular portion and a semi-popular portion; re-directing, using an appropriate forwarding/routing protocol, a first cache-miss request generated for a content identifier in the semi-popular portion of the meta-cache, to one or more additional cache servers; re-directing, using appropriates forwarding/routing protocol, a second cache-miss request generated by the one or more additional cache servers for the content identifiers in the semi-popular portion of the meta-cache to an origin server hosting the requested content. Some embodiments of the present technology further comprise a step of tuning a value of the threshold parameter, using a Proportional-Integrate controller, to optimize a tradeoff between cache hit rate and one or more other network performance metrics.
As such, embodiments of the present technology provide for a multi-level popularity based filtering of content requests for enhancing a hit rate of edge cache servers in content delivery networks. In some embodiments, this is accomplished by maintaining a meta-cache of content-identifiers corresponding to a number of most recently requested contents along with a threshold parameter for partitioning meta-cache entries into popular and semi-popular categories. For example, contents identified as semi-popular are associated with a different cache miss forwarding policy as opposed to contents deemed as popular and similarly for contents deemed as unpopular. To further expand upon the aforementioned feature, in an event of cache-miss request for content identified in semi-popular portion of the meta-cache, the first receiving cache server may re-direct the request to another cache server that may have been pseudo-randomly chosen rather than forwarding the request directly to the origin server.
In one aspect of the present technology, a system includes one or more content-request filtering units communicatively coupled to one or more edge cache servers, each content-request filtering unit may further comprise: a meta-cache of a plurality of most recently requested content identifiers partitioned across a threshold index, into a popular and a semi-popular portions, wherein requests for content identifiers in the semi-popular portion are forwarded to an origin content server only in an event of a cache miss from each of a plurality of cache servers across which a semi-popular content request is sequentially steered. In some embodiments of the present technology, the system may further comprise one or more PI controller operative to tune the threshold parameter of the meta-cache to thereby optimize a trade-off between cache hit rate and one or more other performance attributes.
Therefore, a content filtering/routing unit comprising a meta-cache of most recently used content identifiers may apply a different cache-miss forwarding policy to requests for contents based on a popularity level of the aforementioned content. In some embodiments, the present technology includes a threshold parameter for differentiating between popular and semi-popular contents in the meta-cache of most recently used content identifiers. The threshold parameter may be tuned using a self-tuning Proportional-Integral controller, in accordance with some embodiments. For example, request for contents identified in a semi-popular portion of the meta cache may be re-directed to one or more additional cache servers after encountering an initial cash miss from a first cache server. Accordingly, embodiments of the present technology enable a more thorough cache search to be performed for requested contents prior to re-directing the content request to an origin content server.
Multi-tiered video Content Delivery Network (CDN) architectures, generally consist of three main components: (i) clients who request and consume video chunks, (ii) origin servers that serve the requested content, and (iii) edge caches, located closer to the clients (i.e., in an ISP network), which store the most popular video chunks to reduce the load on the origin servers. A key property to be satisfied by a Content Delivery Networks (CDN) is to serve content with small latency while minimizing the infrastructure costs. One approach to achieve low-latency content delivery without incurring significant infrastructure cost is based on caching popular content close to the users, while keeping less popular content on the more centralized servers. As such, a network of caches, each reasonably close to the clients, and capable of serving the same content as provided by a single origin server may be used to cache as much of the content as possible at the edge, and let as much as possible of the unpopular content be served by the origin server.
The rate at which content is requested and successfully served from a selected server, such as an edge cache server, can be termed a “hit rate.” The hit rate on edge caches has a strong impact on Quality of Experience (QoE) related factors, such as chunk download time. For example, it has been shown that cache misses increase server latency by up to an order of magnitude, which in turn translates into increased client start-up times. One reason for this degradation of server latency involves the incurred network cost of proxying Hypertext Transfer Protocol (HTTP or HTTPS) connections to the origin server in an event of a cache miss at a cache server. It is, therefore, important to the scalability of the CDN architecture that most requests for content are successfully served from edge caches, as this decreases the load on the origin servers.
However, as the load on edge caches increases, addressing the capacity issue by simply using more powerful servers or adding hardware resources may become prohibitively costly. Popularity based filtering at the edge may therefore become necessary in order to decide where the content should be cached, whether to re-direct the request or proxy the content, as well as where to re-direct content requests. Current architectures suffer from two main issues. Namely, upon cache miss, HTTP proxying is used in order to fetch content from the origin. This has a non-negligible performance cost compared to rerouting the requests towards the origin directly at layer 3. Furthermore, existing architectures do not utilize the horizontal scaling of the cache for collaboration between caches, instead, when there is a cache miss, the request is usually forwarded back to the origin, whereas trying another cache beforehand could be beneficial for semi-popular content.
The forgoing is addressed by embodiments of the present technology directed to system, method and computer-readable medium for video Content Delivery Networks (CDN) that utilizes chunk-level content addressing and multi-tiered content popularity assessment (in deployed networking technologies) to make intelligent decision with regards to optimal processing of content request and content delivery. The optimal processing of content-related traffic, in one regard, is directed to enhancing a hit ratio of a cache system, which in turn reduces latency and network loading associated with servicing of request for contents such as video. As such, some embodiments of the present invention are directed to increasing cache hit rate at the network edge while also reducing adverse impacts (i.e., latency and network load) associated with cache misses. To that end, embodiments of the disclosed technology utilize network-layer video chunk naming to facilitate popularity-based multi-tier classification for the requested contents.
In some embodiments, named-video chunks (content identifier embedded within network address of the request packet header) may be used in the forwarding plane within a system and/or configuration that is deployable in current IP-based networks. Accordingly, each video segment may be matched with a unique network identifier, using, for example, a 64-bit encoding to contain the video identifier, the identifier of the segment within the video, and potentially additional metadata such as the segment duration and the requested video bitrate/quality. An IPv6 address may then be constructed from this name. With reference to
In accordance to some embodiments of the present technology, chunk-level content addressing as part of the layer 3 address portion of a content request packet header may be used to provide content-awareness and tracking at the network layer. In some embodiments of the present technology the aforementioned Network level content-awareness and tracking may be used in conjunction with a Last Recently Used (LRU) filtering policy to provide a multi-level popularity based filtering of content requests. In some embodiments, popularity-based LRU filtering may be implemented by keeping a “meta-cache” of identifiers, driven by a Least Recently Used replacement policy. Presence of a content identifier in the meta-cache may be considered as an indicator of popularity. However, instead of classifying between “popular” and “unpopular” content, embodiments of the present technology disclose a three-tiered classification approach which classifies content between “popular”, “semi-popular” and “unpopular”. Thus enhancing an accuracy and efficiency with which the delivery of unpopular content are offloaded to the origin server and popular content are served at the cache.
In accordance with some embodiments of the present technology, chunk-level content addressing consists of assigning a unique and globally routable IPv6 address to each video chunk. Exposing the chunk and video identifiers in the IPv6 addresses space provides network layer visibility to the requested content. Accordingly, a content routing/filtering service, disposed between client system and network caching resources may be used to examine content request packets destined for one or more edge cache servers, in order to construct a meta-cache of the Last Recently Used content identifiers from the content-identifiers exposed as IP addresses in the content request packet. The content routing/filtering service may then assign specific popularity ratings (i.e., popular or a semi-popular rating) to different client-requested content based on the indexed position of the corresponding content identifier in the meta-cache of the Last Recently Used content identifiers. In some embodiments, the indexed position, for the purpose of popularity rating, may be determined in relation to a statically or dynamically computed threshold level. Contents may be identified as popular or semi-popular depending on whether the corresponding content identifier is disposed above or below the threshold level, while content identifiers missing from the meta-cache deemed to correspond to un-popular content. The content routing/filtering service may then make in-band content request forwarding decisions based on content popularity classification of the requested content.
According to some embodiments of the present technology, content deemed as popular may be served locally at the cache server. Conversely, requests for contents deemed as unpopular may be directed to the origin server and served by the same. For semi-popular content unavailable at the initial cache server, it may be likely that another (edge) cache has a copy of the content. Therefore, in those cases, rather than directly going back to the origin, embodiments provide for a detour through another pseudo-randomly-chosen edge cache. The re-direction/detour to a second cache server and/or the origin server on cache misses may be handled, in accordance to some embodiments, with the use of HTTP proxy. However, in some embodiments of the present technology, the re-direction/detour may be performed using a Segment Routing Load Balancing (SRLB) approach (such as, for example, 6 LB load balancing protocol) to improve performance. For example, in some embodiments of the disclosed technology, IPv6 Segment Routing (SRv6) is utilized to steer client requests through a chain of candidate servers based on a determined popularity level of the requested content. An example of SRv6 implementation is provided in
Referring back to
When considering the index of an element in the LRU cache, the smaller the index, the earlier the element appears in the cache list. As a consequence the smaller the index, the greater the popularity. A content may therefore be deemed as popular whenever its index is smaller than the threshold, and semi-popular whenever its index is greater than the threshold in accordance to some embodiments of the present technology. However, It should be noted that with respect to the illustration of the LRU cache 210 and 212 in
Conversely, flow line 218 corresponds to a scenario wherein the requested content identifier is not found in the meta-cache 210 of the LRU filter 206 (i.e., unpopular content). As such, LRU filter 206 adds/inserts the missing content Identifier at the top of meta-cache 210 (which causes the removal of the last content identifier in the meta-cache if it is full), and the query is refused (i.e. the request is directly forwarded to the origin server 216.)
As described, embodiments of the present technology provide for a mid-level rating of popularity (semi-popular) that is between unpopular and popular level. In the example CDN 200 of
In some embodiments, the aforementioned cache system may be implemented as a doubly linked list joined to a hash map of pointers to entries within the list. In one embodiment of the present technology, a size of the meta-cache is set to six times the size of the cache to which it filters access. This provides almost-optimal hit-rate in the case of a light load (where threshold is thus equal to size)
Some embodiments of the present technology is directed to a filtering scheme for semi-popular content that involves re-directing a cache miss from a first receiving cache server to another cache server. This feature is based on the likelihood that a semi-popular content will be available at another edge cache, and thus incurring the forwarding latency of triangular routing between two caches to visit another cache before going back to the origin (which is typically geographically farther away) is deemed as worthwhile. To that purpose, in accordance to some embodiments, IPv6 Segment Routing (SRv6) and Segment Routing Load Balancing (SRLB) protocol(s) may be leveraged to visit multiple pseudo-randomly-chosen caches before re-directing the request back to the origin server.
The accepting server (which may be any of the cache or origin server), upon acceptance of the new-connection packet from the client 304, inserts its network or segment address as metadata into the response packet back to the client. The dispatcher (302) then records the address of the responding server for the remainder of the lifetime of the connection. Accordingly, when the client issues a further packet (e.g. TCP ACK) to the accepting server, the dispatcher inserts a Segment Routing header with only one segment identifier, that identifies the accepting server from the original trio of servers identified in the SID list 306 (namely, cache server 1, cache server 3 and origin server.)
Therefore once a response containing metadata with the address of the accepting server is received by the dispatcher, all subsequent packets associated with the established connection (to the accepting server) will only include the one segment identifier (from the three specified in the original Segment Identifier list embedded in the initial content request or new-connection packet) corresponding to the server/node which accepted the content request and terminated the connection. Consequently, the client is able to establish a direct data connection to the accepting server for the delivery of the requested content.
With reference to the example in
Referring back to
However, if the requested content identifier (extracted from the content request packet) is found in the semi-popular portion of the meta-cache (items 210 and 212 in
Finally, if the requested content identifier, extracted from the client request packet destined towards the initial receiving cache (cache server 1), is not found anywhere in the meta-cache (illustrated as items 210 and 212 in
Hence, with high probability, unpopular content are not served by the edge cache but rather directly offloaded (at the network layer) to the origin server. The offloaded connections no longer need to be proxied at the edge, thus avoiding unnecessary HTTP terminations and the cache of the edge proxy is not be polluted with unpopular content, consequently increasing the hit rate.
In accordance to some embodiments of the present technology, a Proportional Integral (PI) controller may be used to tune the parameters of the LRU filter. For example, a PI controller may be used to tune the (popularity) threshold parameter which partitions a meta-cache of last recently requested content identifiers into popular and semi-popular portions, in such a way to control and optimize a trade-off between cache hit rate performance and average response time of network cache servers. For example, raising the popularity threshold in the meta-cache of an LRU filter, brings about an increase in the number of requests accepted at the corresponding cache server, hence a corresponding increase in the response time of the cache server. In some embodiments, a PI controller may be used in conjunction with the LRU filter in order to tune a popularity threshold parameter (for identification of popular content) of the LRU filter. A PI-controller accomplishes this by, for example, taking the current response time of the associated cache server (to which the LRU filters access), as an input parameter, and comparing it with an objective flow completion time, to make according adjustments to a value of the (popularity) threshold parameter of the LRU filter, until a desired balance is reached. In this way, PI controller may be used to optimize network cache access.
In one embodiment of the invention, a PI-controller may be implemented using a self-tuning PI such as Yaksha that controls a web server response time by filtering requests according to an acceptance probability. One advantage of such self-tuning PI-controller is that it may act as an independent module in front of the cache without requiring any integration effort. Furthermore, the self-tuning functionality obviates requirements for human input or prior-knowledge of the server Characteristics.
According to some embodiment, Yaksha-based filtering may be adapted for operation as prescribed by some embodiments of the present technology, by converting the filtering criteria from an acceptance probability into a Last Recently Used (LRU) popularity threshold.
If the request pattern follows a Poisson arrival and the popularity distribution q(r) is known, in accordance to some embodiments, Che's approximation may be utilized to compute the probability of accepting a request for a content as a function of the content popularity threshold. Content popularity threshold, may be defined by equation (1.1), wherein k represent the content popularity threshold and p(k), as defined by equation 1.2, represents the probability of accepting a request as a function of the content popularity threshold, k. The parameter tc in equation 1.1 and 1.2 corresponds to the root of the equation 1.1.
The probability function defined by (1.2) may then be inverted in order to compute k as a function of the acceptance probability output by a Yaksha filter (i.e., a self-tuning PI, configured to filter server requests in accordance to an acceptance probability.) This is illustrated in
It should be noted that embodiments of the disclosed technology provide for any self-tuning PI-controller to be used directly on the popularity threshold parameter k. In some embodiments, the tuning may be performed on server-side metrics, such as CPU usage or TCP queue length instead of the flow completion time. Such metrics may be more precise and instantaneous than flow completion time but may require tighter coupling of the acceptance system and the cache server.
The disclosure now turns to
To enable user interaction with the computing device 600, an input device 645 can represent any number of input mechanisms, such as a microphone for speech, a touch-sensitive screen for gesture or graphical input, keyboard, mouse, motion input, speech and so forth. An output device 635 can also be one or more of a number of output mechanisms known to those of skill in the art. In some instances, multimodal systems can enable a user to provide multiple types of input to communicate with the computing device 600. The communications interface 640 can generally govern and manage the user input and system output. There is no restriction on operating on any particular hardware arrangement and therefore the basic features here may easily be substituted for improved hardware or firmware arrangements as they are developed.
Storage device 630 is a non-volatile memory and can be a hard disk or other types of computer readable media which can store data that are accessible by a computer, such as magnetic cassettes, flash memory cards, solid state memory devices, digital versatile disks, cartridges, random access memories (RAMs) 625, read only memory (ROM) 620, and hybrids thereof.
The storage device 630 can include services 632, 634, 636 for controlling the processor 610. Other hardware or software modules are contemplated. The storage device 630 can be connected to the system connection 605. In one aspect, a hardware module that performs a particular function can include the software component stored in a computer-readable medium in connection with the necessary hardware components, such as the processor 610, connection 605, output device 635, and so forth, to carry out the function.
The interfaces 702 are typically provided as modular interface cards (sometimes referred to as “line cards”). Generally, they control the sending and receiving of data packets over the network and sometimes support other peripherals used with the network device 700. Among the interfaces that may be provided are Ethernet interfaces, frame relay interfaces, cable interfaces, DSL interfaces, token ring interfaces, and the like. In addition, various very high-speed interfaces may be provided such as fast token ring interfaces, wireless interfaces, Ethernet interfaces, Gigabit Ethernet interfaces, ATM interfaces, HSSI interfaces, POS interfaces, FDDI interfaces, WIFI interfaces, 3G/4G/5G cellular interfaces, CAN BUS, LoRA, and the like. Generally, these interfaces may include ports appropriate for communication with the appropriate media. In some cases, they may also include an independent processor and, in some instances, volatile RAM. The independent processors may control such communications intensive tasks as packet switching, media control, signal processing, crypto processing, and management. By providing separate processors for the communications intensive tasks, these interfaces allow the master microprocessor 704 to efficiently perform routing computations, network diagnostics, security functions, etc.
Although the system shown in
Regardless of the network device's configuration, it may employ one or more memories or memory modules (including memory 706) configured to store program instructions for the general-purpose network operations and mechanisms for roaming, route optimization and routing functions described herein. The program instructions may control the operation of an operating system and/or one or more applications, for example. The memory or memories may also be configured to store tables such as mobility binding, registration, and association tables, etc. Memory 706 could also hold various software containers and virtualized execution environments and data.
The network device 700 can also include an application-specific integrated circuit (ASIC), which can be configured to perform routing, switching, and/or other operations. The ASIC can communicate with other components in the network device 700 via the connection 710, to exchange data and signals and coordinate various types of operations by the network device 700, such as routing, switching, and/or data storage operations, for example.
If the indexed position of the incoming content-identifier is higher (closer to the top) in the LRU meta-cache than the threshold index (812) the content is deemed as popular and the operation moves to step 814 wherein the associated cache server (Cache 1) is checked for the requested content. If the content is present in Cache 1 (816), it is served directly therefrom at step 818. If the content is not present in Cache 1 (820), the operation moves to step 822 wherein the requested content is proxied, by Cache 1, from the origin server. The content is then inserted into Cache 1 at step 824.
However, if the indexed position of the incoming content-identifier is lower (closer to the bottom) in the meta-cache than the threshold index (826), the corresponding content is deemed as ‘semi-popular’ and the operation moves to step 834 wherein the content-request is re-directed, for example by a first LRU filtering/routing service serving the first cache server (cache 1), to a second LRU filtering/routing service serving a secondary cache server (Cache 2).
In some embodiments, the forwarding and redirection operation may be implemented using an SRv6 based approach, wherein segment identifiers for each of the first and the second cache servers and the origin servers are inserted as an SID list into a header of the content-request packet from the client.
Referring back to the example process flow 800 in
However, if the indexed position of the incoming content-identifier is lower (closer to the bottom) in the LRU meta-cache than the threshold index (845), the corresponding content is deemed as ‘semi-popular’ and the operation moves to step 846 wherein the content-request is re-directed, for example by the second LRU filtering/routing service serving the secondary cache server (cache 2), to the Origin server (846).
In some embodiments the computer-readable storage devices, mediums, and memories can include a cable or wireless signal containing a bit stream and the like. However, when mentioned, non-transitory computer-readable storage media expressly exclude media such as energy, carrier signals, electromagnetic waves, and signals per se.
Methods according to the above-described examples can be implemented using computer-executable instructions that are stored or otherwise available from computer readable media. Such instructions can comprise, for example, instructions and data which cause or otherwise configure a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Portions of computer resources used can be accessible over a network. The computer executable instructions may be, for example, binaries, intermediate format instructions such as assembly language, firmware, or source code. Examples of computer-readable media that may be used to store instructions, information used, and/or information created during methods according to described examples include magnetic or optical disks, flash memory, USB devices provided with non-volatile memory, networked storage devices, and so on.
Devices implementing methods according to these disclosures can comprise hardware, firmware and/or software, and can take any of a variety of form factors. Typical examples of such form factors include laptops, smart phones, small form factor personal computers, personal digital assistants, and so on. Functionality described herein also can be embodied in peripherals or add-in cards. Such functionality can also be implemented on a circuit board among different chips or different processes executing in a single device, by way of further example.
The instructions, media for conveying such instructions, computing resources for executing them, and other structures for supporting such computing resources are means for providing the functions described in these disclosures.
Although a variety of examples and other information was used to explain aspects within the scope of the appended claims, no limitation of the claims should be implied based on particular features or arrangements in such examples, as one of ordinary skill would be able to use these examples to derive a wide variety of implementations. Further and although some subject matter may have been described in language specific to examples of structural features and/or method steps, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to these described features or acts. For example, such functionality can be distributed differently or performed in components other than those identified herein. Rather, the described features and steps are disclosed as examples of components of systems and methods within the scope of the appended claims.
Number | Name | Date | Kind |
---|---|---|---|
5983281 | Ogle | Nov 1999 | A |
6351775 | Yu | Feb 2002 | B1 |
7454571 | Sucharitakul | Nov 2008 | B1 |
7761594 | Mowat | Jul 2010 | B1 |
8095764 | Bauer | Jan 2012 | B1 |
8151077 | Bauer | Apr 2012 | B1 |
8250198 | Zhang | Aug 2012 | B2 |
8612028 | Karlsson | Dec 2013 | B2 |
8856281 | Van der Merwe | Oct 2014 | B2 |
9129033 | Jenkins | Sep 2015 | B1 |
9167049 | Fliam | Oct 2015 | B2 |
9268651 | Salyers | Feb 2016 | B1 |
9268652 | Salyers | Feb 2016 | B1 |
9274956 | Salyers | Mar 2016 | B1 |
9350822 | Li | May 2016 | B2 |
9432794 | Agrawal | Aug 2016 | B2 |
9553924 | Duzett | Jan 2017 | B1 |
9559889 | Vincent | Jan 2017 | B1 |
9794148 | Ramachandran | Oct 2017 | B1 |
9979617 | Meyer | May 2018 | B1 |
10225365 | Hotchkies | Mar 2019 | B1 |
10261938 | Jenkins | Apr 2019 | B1 |
10311372 | Hotchkies | Jun 2019 | B1 |
10320934 | Ghosh | Jun 2019 | B1 |
10516568 | Jain | Dec 2019 | B2 |
20020143798 | Lisiecki | Oct 2002 | A1 |
20020198953 | O'Rourke | Dec 2002 | A1 |
20030101231 | Kausik | May 2003 | A1 |
20030101265 | Dantzig | May 2003 | A1 |
20030110272 | du Castel | Jun 2003 | A1 |
20040098541 | Megiddo | May 2004 | A1 |
20040230753 | Amiri | Nov 2004 | A1 |
20050066326 | Herbeck | Mar 2005 | A1 |
20050120000 | Ziauddin | Jun 2005 | A1 |
20050182754 | Madan | Aug 2005 | A1 |
20060090033 | Betancourt | Apr 2006 | A1 |
20060271972 | Pai | Nov 2006 | A1 |
20060288119 | Kim | Dec 2006 | A1 |
20080147878 | Kottomtharayil | Jun 2008 | A1 |
20080195755 | Lu | Aug 2008 | A1 |
20080205268 | Imai | Aug 2008 | A1 |
20080208961 | Kim | Aug 2008 | A1 |
20090254661 | Fullagar | Oct 2009 | A1 |
20100325303 | Wang | Dec 2010 | A1 |
20100332595 | Fullagar | Dec 2010 | A1 |
20110078312 | Rimae | Mar 2011 | A1 |
20110113200 | Moses | May 2011 | A1 |
20110264865 | Mobarak | Oct 2011 | A1 |
20110280143 | Li | Nov 2011 | A1 |
20120041970 | Ghosh | Feb 2012 | A1 |
20120047344 | Sheaffer | Feb 2012 | A1 |
20120110015 | Nath | May 2012 | A1 |
20120124294 | Atkisson | May 2012 | A1 |
20120151141 | Bell, Jr. | Jun 2012 | A1 |
20120203866 | Yoo et al. | Aug 2012 | A1 |
20120259861 | Gong | Oct 2012 | A1 |
20120317307 | Ravindran | Dec 2012 | A1 |
20130080611 | Li | Mar 2013 | A1 |
20130185038 | Radu | Jul 2013 | A1 |
20130204961 | Fliam | Aug 2013 | A1 |
20130227048 | Xie | Aug 2013 | A1 |
20130227051 | Khakpour | Aug 2013 | A1 |
20130227166 | Ravindran | Aug 2013 | A1 |
20130263194 | Zhang | Oct 2013 | A1 |
20130290465 | Harrison | Oct 2013 | A1 |
20140025841 | Li | Jan 2014 | A1 |
20140044127 | Li | Feb 2014 | A1 |
20140068196 | Benoit | Mar 2014 | A1 |
20140237071 | Friman | Aug 2014 | A1 |
20140344379 | Chakraborti | Nov 2014 | A1 |
20140359043 | Gao | Dec 2014 | A1 |
20150092551 | Moisand | Apr 2015 | A1 |
20150113166 | Mosko | Apr 2015 | A1 |
20150113575 | Li | Apr 2015 | A1 |
20150180719 | Wu | Jun 2015 | A1 |
20150254249 | Mosko | Sep 2015 | A1 |
20150263916 | Phillips | Sep 2015 | A1 |
20150341467 | Lim | Nov 2015 | A1 |
20160021162 | Surcouf | Jan 2016 | A1 |
20160034394 | McKean | Feb 2016 | A1 |
20160088072 | Likhtarov | Mar 2016 | A1 |
20160088115 | Agnew | Mar 2016 | A1 |
20160094471 | Newton | Mar 2016 | A1 |
20160248678 | Zhao | Aug 2016 | A1 |
20160373464 | Kikuchi | Dec 2016 | A1 |
20170026224 | Townsley | Jan 2017 | A1 |
20170026286 | Surcouf | Jan 2017 | A1 |
20170026449 | Cuduvalli Ravikanth Rao | Jan 2017 | A1 |
20170064717 | Filsfils | Mar 2017 | A1 |
20170078433 | Radhakrishnan | Mar 2017 | A1 |
20170111468 | Ash | Apr 2017 | A1 |
20170126903 | Cohen | May 2017 | A1 |
20170171114 | Dao | Jun 2017 | A1 |
20170195447 | Panagos | Jul 2017 | A1 |
20170257452 | Hoiles | Sep 2017 | A1 |
20170264702 | Dao | Sep 2017 | A1 |
20170295132 | Li | Oct 2017 | A1 |
20170302575 | Ward | Oct 2017 | A1 |
20170310744 | Maslak | Oct 2017 | A1 |
20170329720 | Bedi | Nov 2017 | A1 |
20180034900 | Kamiyama | Feb 2018 | A1 |
20180054482 | Ruiz | Feb 2018 | A1 |
20180091619 | Power | Mar 2018 | A1 |
20180131580 | Tomkins | May 2018 | A1 |
20180219783 | Pfister | Aug 2018 | A1 |
20180241671 | Bosch | Aug 2018 | A1 |
20180278680 | Liu | Sep 2018 | A1 |
20180278688 | Gal | Sep 2018 | A1 |
20180302490 | Surcouf | Oct 2018 | A1 |
20190007522 | Satzke | Jan 2019 | A1 |
20190037042 | Kwak | Jan 2019 | A1 |
20190042867 | Chen | Feb 2019 | A1 |
20190043201 | Strong | Feb 2019 | A1 |
20190079928 | Kumar | Mar 2019 | A1 |
20190199616 | Jones | Jun 2019 | A1 |
20190236016 | Jawahar | Aug 2019 | A1 |
20190320034 | Newton | Oct 2019 | A1 |
20190349268 | Pai | Nov 2019 | A1 |
20200073905 | Deng | Mar 2020 | A1 |
20200076892 | Surcouf | Mar 2020 | A1 |
20200162385 | Thiagaraj | May 2020 | A1 |
20200204626 | Zhang | Jun 2020 | A1 |
20210182215 | Wang | Jun 2021 | A1 |
Number | Date | Country |
---|---|---|
2624524 | Aug 2013 | EP |
WO 2009068952 | Jun 2009 | WO |
Entry |
---|
J. Hachem, N. Karamchandani and S. N. Diggavi, “Coded Caching for Multi-level Popularity and Access,” in IEEE Transactions on Information Theory, vol. 63, No. 5, pp. 3108-3141, May 2017, doi: 10.1109/TIT.2017.2664817. (Year: 2017). |
V. Mathur, P. Patil, V. Apte and K. M. Moudgalya, “Adaptive admission control for web applications with variable capacity,” 2009 17th International Workshop on Quality of Service, Charleston, SC, USA, 2009, pp. 1-5, doi: 10.1109/IWQoS.2009.5201411. (Year: 2009). |
Y. Desmouceaux, P. Pfister, J. Tollet, M. Townsley and T. Clausen, “6LB: Scalable and Application-Aware Load Balancing with Segment Routing,” in IEEE/ACM Transactions on Networking, vol. 26, No. 2, pp. 819-834, Apr. 2018, doi: 10.1109/TNET.2018.2799242. (Year: 2018). |
Y. Desmouceaux, P. Pfister, J. Tollet, M. Townsley and T. Clausen, “SRLB: The Power of Choices in Load Balancing with Segment Routing,” 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA, 2017, pp. 2011-2016, doi: 10.1109/ICDCS.2017.180. (Year: 2017). |
A. Kamra, V. Misra and E. M. Nahum, “Yaksha: a self-tuning controller for managing the performance of 3-tiered Web sites,” Twelfth IEEE International Workshop on Quality of Service, 2004. IWQOS 2004., Montreal, QC, Canada, 2004, pp. 47-56, doi: 10.1109/IWQOS.2004.1309356. (Year: 2004). |
K. M. Agrawal, T. Venkatesh and D. Medhi, “A dynamic popularity-based partial caching scheme for video on demand service in IPTV networks,” 2014 Sixth International Conference on Communication Systems and Networks (COMSNETS), 2014, pp. 1-8, doi: 10.1109/COMSNETS.2014.6734888. (Year: 2014). |
Najaflou, Nima, et al. “Popularity-Based Hierarchical Caching for Next Generation Content Delivery Networks.” International Conference on Industrial Networks and Intelligent Systems. Springer, Cham, 2021. (Year: 2021). |
Y. Desmouceaux, M. Enguehard, V. Nguyen, P. Pfister, W. Shao and É. Vyncke, “A Content-aware Data-plane for Efficient and Scalable Video Delivery,” 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2019, pp. 10-18. (Year : 2019). |
T. Janaszka, D. Bursztynowski and M. Dzida, “On popularity-based load balancing in content networks,” 2012 24th International Teletraffic Congress (ITC 24), 2012, pp. 1-8. (Year: 2012). |
International Search Report and Written Opinion from the International Searching Authority, dated May 7, 2020, 13 pages, for corresponding International Patent Application No. PCT/US2020/015452. |
Number | Date | Country | |
---|---|---|---|
20200244758 A1 | Jul 2020 | US |