SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 198-204 © IAEME
198
NETWORK TRAFFIC OPTIMIZATION FOR PERFORMANCE
IMPROVEMENT IN THE WEB SERVICE INFRASTRUCTURES BY
CATEGORIZATION OF THE WEB CONTENTS WITH SIZE REDUCTION
APPROACH
Dr. Suryakant B Patil1
, Ms. Sonal S Deshmukh2
, Ms. Anuja D Bharate3
, Dr. Preeti Patil4
1
Professor, JSPM’s Imperial College of Engineering & Research, Wagholi, Pune
2, 3
PG Research Scholar, JSPM’s ICOER, Wagholi, Pune
4
Dean (SA), HOD & Professor, KIT’s COE, Kolhapur
ABSTRACT
Nowadays, the network traffic is tremendously increased. This has affected on the additional
requirements of the bandwidth, require more time to access the data from server which means
increased in response time. In this paper, we are proposing the mechanism of Latency Time, using
the algorithm MD5, with the help of hash key and using the formula to improve the efficiency or
performance of the system. The problem in proxy server cache memory is Content aliasing, means,
the same content occurs multiple times. With the help of proxy servers, users can directly fetch the
data, rather to go towards web server. So, the workload of web server will be reduced. The main goal
is to find the Response time with different downlink rate, according to the institute schedule which
we surveyed, minimize the bandwidth utilization and improve the performance of the proxy server
which can be measured by removal of content aliasing.
For this experimentation, we surveyed JSPM’s Wagholi campus, having 5 institutes in it.
Categories and Subject Descriptors
C.2.3 [Network Operation]: Network Management
C.4 [Performance of System]: Design Studies
GENERAL TERMS: Performance, Reliability, Experimentation, Algorithms.
Keywords: Content aliasing, MD5, Latency Time, Proxy Server.
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING
AND TECHNOLOGY (IJARET)
ISSN 0976 - 6480 (Print)
ISSN 0976 - 6499 (Online)
Volume 5, Issue 4, April (2014), pp. 198-204
© IAEME: www.iaeme.com/ijaret.asp
Journal Impact Factor (2014): 7.8273 (Calculated by GISI)
www.jifactor.com
IJARET
© I A E M E
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 198-204 © IAEME
199
1. INTRODUCTION
In the field of web server management, researchers have focused on aliasing in proxy server
caches for a long time [6]. Web caching consists of storing frequently referred objects on a caching
server instead of the original server, so that web servers can make better use of network bandwidth,
reduce the workload on servers, and improve the response time for users [12, 14]. Aliasing means
giving multiple names to the same thing.
Aliasing in proxy server caches occurs when the same content is stored in cache multiple
times [5]. A proxy server acts as a mediator between the original server and the clients.
On the World Wide Web, aliasing commonly occurs when a client makes two requests, and
both the requests have the same payload. Currently, browsers perform cache lookups using Uniform
Resource Locators (URLs) as identifiers. Aliasing causes repetitive data transfers even when the
current request has already been cached under a different URL [8, 11].
Websites that contain the same content are called mirrors. Mirrors are redundancy
mechanisms built into the web space to serve web pages faster, but they cost in terms of cache space
[9, 13]. As the amount of web traffic increases, the efficient utilization of network bandwidth
increasingly becomes more important. The Technique needs to analyze web traffic and understand its
characteristics to be able to optimize the use of network bandwidth, to reduce network latency, and to
improve response time for users [1].
Nowadays, usage of World Wide Web has been tremendously increased. In any
organization/institute, internet is using by most of the students, faculties, administrative department
for different purposes [4, 7].
The web pages, which are accessed by the all users, that get stored somewhere, we call that
storage “Cache proxy memory”, which is available at client side.
It may happen that, some of the users requests for same URL’s, so the pages get stored
multiple times in cache memory. So duplication occurs & it grabs more space, which causes to the
poor performance. So the eviction of content is very necessary. Therefore, we are using various
methods. After the removal of content aliasing, results are better performance, less space. Still there
may be lots of other content in cache, which occupies more space. So, it is mandatory to filter that
content from cache by using various replacement policies such as FIFO, LRU, LFU, etc.
FIFO: It is first in first out policy, manage by queue. When cache get full then it is mandatory to
avail some space. So, this scheme removes the pages, which get inserted first.
LRU: It is Least Recently Used policy, which filter out the web pages that will not be used in near
future.
LFU: It is Least Frequently Used policy, which evicts the web pages which are not frequently used.
From our survey, it is observed that the static data is used more than dynamic data. So, to keep the
static content in the cache is beneficial, as dynamic gets updated frequently. For same request of
users, proxy doesn’t have to access the web server and web server’s workload also gets reduced. So
it results to improve the latency time of cache.
II. LITERATURE SURVEY
Shivkumar and Garcia-Molina investigated mirroring in a large crawler data set and reported
that in the WebTV client trace far more aliasing happens than expected. In fact, they reported that
36% of reply bodies are accessible through more than one URL [7]. Similarly, surveyed techniques
for identifying mirrors on the Internet [3].Investigated mirroring in a large crawler data set and
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 198-204 © IAEME
200
reported that roughly 10% of popular hosts are mirrored to some extent [3].Considered approximate
mirroring or “syntactic similarity” [3]. Although they introduce sophisticated measures of document
similarity, they report that most “clusters” of similar documents in a large crawler data set contain
only identical documents.
Duplication has both positive and negative aspects. On one hand the redundancy makes
retrieval easier: if a search engine has missed one copy, maybe it has the other; or if one page has
become unavailable, maybe a replica can be retrieved. On the other hand, from the point of view of
search engines storing duplicate content is a waste of resources and from the user’s point of view,
getting duplicate answers in response to a query is a nuisance.
The principal reason for duplication on the Web is the systematic replication of content
across distinct hosts, a phenomenon known as “mirroring” (These notions are defined more precisely
below.) It is estimated that at least 10% of the hosts on the WWW are mirrored. Each document on
the WWW has a unique name called the Universal Resource Locator (URL). The URL consists of
three disjoint parts, namely the access method, a hostname, and a path.
III. EXPERIMENTATION AND RESULTS
Besides the obvious goals of Web caching system, a Web caching system having a number of
properties. They are fast access, robustness, transparency, scalability, efficiency, adaptivity, stability,
load balanced, ability to deal with heterogeneity, and simplicity. Discuss below.
• Fast access: From user’s point of view, access latency is an important measurement of the
quality of Web service. A desirable caching system should aim at reducing Web access latency.
In particular, it should provide user a lower latency on average than those without employing a
caching system. Robustness. From user’s prospect, the robustness means availability, which is
another important measurement of quality of Web service. User’s desire to have Web service
available whenever they want. The robustness has three aspects. First, it’s desirable that a few
proxies crash wouldn’t tear the entire system down. The caching system should eliminate the
single point failure as much as possible. Second, the caching system should fall back gracefully
in case of failures. Third, the caching system would be design in such a way that it’s easy to
recover from a failure.
• Transparency: A Web caching system should be transparent for the user, the only results user
should notice are faster response and higher availability.
• Scalability: We have seen an explosive growth in network size and density in last decades and
is facing a more rapid increasing growth in near future. The key to success in such an
environment is the scalability. We would like a caching scheme to scale well along the
increasing size and density of network. This requires all protocols employed in the caching
system to be a slight weight as possible.
• Efficiency: There are two aspects to efficiency. First, how much over head does the Web
caching system impose on network? We would like a caching system to impose a minimal
additional burden on the network. This includes both control packets and extra data packets
incurred by using a caching system. Second, the caching system shouldn’t adopt any scheme
which leads to underutilization of critical resources in network.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 198-204 © IAEME
201
• Load balancing: It’s desirable that the caching scheme distributes the load evenly through the
entire network. A single proxy/server shouldn’t be a bottleneck (or hotspot) and there by
degrades the performance of a portion of the network or even slow down the entire service
system.
• Ability to deal with heterogeneity: As networks grow in scale and coverage, they span arrange
of hardware and software architectures. The Web caching scheme need adapt to arrange of
network architectures.
Fig. 1: Content Classification for different Content categories.
• Simplicity: Simplicity is always an asset. Simpler schemes are easier to implement and likely to
be accepted as international standards. We would like an ideal Web caching mechanism to be
simple to deploy.
• Adaptivity: It’s desirable to make the caching system adapt to the dynamic changing of the user
demand and the network environment. The adaptivity involves several aspects: cache
management, cache routing, proxy placement, etc. This is essential to achieve optimal
performance.
• Stability: The schemes used in Web caching system shouldn’t introduce in stabilities into the
network.
Campus includes total 5 institutes, we observed all that.Figure1 shows, the classification of all
the static data for whole campus. Figure1 directly shows that, in which category the user is
mostly interested. As we surveyed at our Institute Campus, most of the students request for the
same pages, so duplication may occur. So, the cache require more space, which leads to poor
performance. The blue line(upper line) in figure shows the content which has duplication(with
CA) and red line(lower line) shows the content without duplication(without CA).
0
1000
2000
3000
4000
5000
6000
GIF PNG JPG HTML
Size(KB)
Content Categories
JSPM's Wagholi Campus Classification Content Categories
With CA
Without CA
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 198-204 © IAEME
202
Fig. 2: Total data classification for Campus with and without Content Aliasing
Figure2 shows that, the classification of static and dynamic data for whole campus. The
joined bar shows the duplicated and not-duplicated data. So, just observing the figure, data get
reduced after duplication.
Fig. 3: Size Reduction in different institutes at JSPM’s Wagholi Campus
Figure3 shows that, data for different institutes at JSPM’s Wagholi Campus.HTTP defines
several headers which were specifically designed to support caching. Though the HTTP specification
specifies certain behaviors for web caches, it does not specify how to keep cached objects up to date.
From our survey, at JSPM’s Wagholi Campus, we come up with some measures of the various
categories and sizes.
0
5000
10000
15000
20000
25000
STATIC DYNAMIC TOTAL
Size(KB)
Category
JSPM's Wagholi Campus Classification Static Dynamic
With CA
Without CA
0
1000
2000
3000
4000
5000
6000
7000
8000
9000
ICOER BSIOTR CHARAK ENIAC KAUTILYA TOTAL
Size(KB)
Various Institutes
Size Reductions in all Institutes of JSPM's Wagholi
Before CA
After CA
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 198-204 © IAEME
203
The HTTP GET message is used to retrieve a web object given its URL. However GET alone
does not guarantee that it will return a fresh object. HTTP headers that may effect caching can be
classified into two categories. The first category includes headers appended to retrieve a web object
for cache control. The second category includes headers appended when a web object is returned.
IV. CONCLUSION
In an Environment where saving bandwidth on the shared external network is of utmost
importance, the proxy cache should use a replacement policy that achieves high byte hit rates. A
proxy cache could also utilize multiple replacement policies. This work can be further optimize by
the Daemon Process, which can be design and run periodically to check the consistency of the data
cached and the data at the web server. This can be scheduled during the slack time with the less
traffic which will not add any additional toll on the bandwidth. When caching is implemented,
frequently accessed content is stored close to the users, eliminating this duplicated effort. A request
from a user’s browser is first sent to the network’s caching server. If the requested contentfound in
the web cache and the information is fresh, the content is sent directly back to the requester, skipping
an upstream journey to the target website. Which we have shown here with our experimentations at
JSPM’s Wagholi Campus with end result is marginable reduction in the size followed by bandwidth.
REFERENCES
[1] KartikBommepally, Glisa T. K., Jeena J. Prakash, SanasamRanbir Singh and Hema A Murthy
“Internet Activity Analysis through Proxy Log” IEEE, 2010.
[2] Jun Wu; Ravindran, K., "Optimization algorithms for proxy server placement in content
distribution networks," Integrated Network Management-Workshops, 2009.
[3] Ngamsuriyaroj, S. ; Rattidham, P. ; Rassameeroj, I. ; Wongbuchasin, P. ; Aramkul, N. ;
Rungmano, S. “Performance Evaluation of Load Balanced Web Proxies” IEEE, 2011.
[4] Chen, W.; Martin, P.; Hassanein, H.S., "Caching dynamic content on the Web," Canadian
Conference on Electrical and Computer Engineering, 2003, vol.2, no., pp. 947- 950 vol.2, 4-7
May 2003.
[5] Sadhna Ahuja, Tao Wu and Sudhir Dixit “On the Effects of Content Compression on Web
Cache Performance,” Proceedings of the International Conference on Information
Technology: Computers and Communications, 2003.
[6] A. Mahanti, C. Williamson, and D. Eager, “Traffic Analysis of a Web Proxy Caching
Hierarchy,” IEEE Network Magazine, May 2000.
[7] N. Shivakumar and H. Garcia-Molina, “Finding near Replicas of Documents on the Web”
Proc. Workshop on Web Databases, Mar. 1998.
[8] Jeffrey C. mogul “A trace-based analysis of duplicate suppression in HTTP,” Compaq
Computer Corporation Western Research Laboratory, Nov. 1999.
[9] S B Patil, SachinChavan, PreetiPatil; “High Quality Design and Methodology Aspects to
Enhance Large Scale Web Services”, International Journal of Advances in Engineering &
Technology (IJAET-2012), ISSN: 2231-1963, March 2012, Volume3, Issue1, Pages175-185.
(Journal Impact Factor: 1.96)
[10] Prof. S B Patil, Sachin Chavan, Dr. Preeti Patil and Prof. Sunita R Patil, “High Quality
Design to Enhance and Improve Performance of Large Scale Web Applications”,
International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 1,
2012, pp. 198 - 205, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. (Journal Impact
Factor: 1.0425)
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 198-204 © IAEME
204
[11] S B Patil, D. B. Kulkarni; “Improving web performance through Hierarchical caching &
content aliasing”, The 7th International Conference on “Information Integration and Web-
based Applications & Services”, 19-21 September 2005, Kuala Lumpur, Malaysia.
[12] Srikantha Rao, PreetiPatil, S B Patil, SunitaPatil“Customized Approach for Efficient Data
Storing and Retrieving from University Database Using Repetitive Frequency Indexing”,
IEEE INTERNATIONAL CONFERENCE PUBLICATIONS, RAIT 2012, ISM Dhanbad,
Jahrkhand, March 15–17, 2012 (Aavailable on IEEE Xplore) Print ISBN: 978-1-4577-0694-
3, Digital Object Identifier: 10.1109/RAIT.2012.6194612 Page(s): 511 – 514
[13] Srikantha Rao, PreetiPatil, S B Patil;“Enhanced Software Development Strategy implying
High Quality Design for Large Scale Database Projects”, International Conference and
Workshop on Emerging Trends in Technology ICWET 2012, ISBN: 978-0-615-58717-2,
TCET Mumbai, February 22–25, 2012, Pages: 508-513
[14] Srikantha Rao, PreetiPatil, S B Patil;“Object-Oriented Software Engineering Paradigm: A
Seamless Interface in Software Development Life Cycle”, ACM_Asia_Pacific International
Conference on Advances in Computing (ICAC-2008), Anuradha Engineering College,
Chikhali, Feb 2008.
[15] S.Saira Thabasum, “Need for Design Patterns and Frameworks for Quality Software
Development”, International Journal of Computer Engineering & Technology (IJCET),
Volume 3, Issue 1, 2012, pp. 54 - 58, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[16] Dr.K.Prasadh and R.Senthilkumar, “Nonhomogeneous Network Traffic Control System
Using Queueing Theory”, International Journal of Computer Engineering & Technology
(IJCET), Volume 3, Issue 3, 2012, pp. 394 - 405, ISSN Print: 0976 – 6367, ISSN Online:
0976 – 6375.
[17] Sachin Chavan and Nitin Chavan, “Improving Access Latency of Web Browser by using
Content Aliasing in Proxy Cache Server”, International Journal of Computer Engineering &
Technology (IJCET), Volume 4, Issue 2, 2013, pp. 356 - 365, ISSN Print: 0976 – 6367,
ISSN Online: 0976 – 6375.

Mais conteúdo relacionado

Mais procurados

A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
cscpconf
 
Privacy preserving public auditing for
Privacy preserving public auditing forPrivacy preserving public auditing for
Privacy preserving public auditing for
karthika kathirvel
 

Mais procurados (7)

A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
 
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Privacy preserving public auditing for
Privacy preserving public auditing forPrivacy preserving public auditing for
Privacy preserving public auditing for
 
Secure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageSecure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storage
 
IRJET- Cloud based Deduplication using Middleware Approach
IRJET- Cloud based Deduplication using Middleware ApproachIRJET- Cloud based Deduplication using Middleware Approach
IRJET- Cloud based Deduplication using Middleware Approach
 

Destaque

(579080107) motores de busqueda. nilson
(579080107) motores de busqueda. nilson(579080107) motores de busqueda. nilson
(579080107) motores de busqueda. nilson
Jesús Mosquera
 
Criação publicitária
Criação publicitáriaCriação publicitária
Criação publicitária
Lívia Prado
 
El Poder De La Mente
El Poder De La MenteEl Poder De La Mente
El Poder De La Mente
paquitaguapa
 

Destaque (20)

30120140504019
3012014050401930120140504019
30120140504019
 
10120140504008
1012014050400810120140504008
10120140504008
 
50120140501007 2-3
50120140501007 2-350120140501007 2-3
50120140501007 2-3
 
30120130406028
3012013040602830120130406028
30120130406028
 
30120140504017
3012014050401730120140504017
30120140504017
 
LA ROBOTICA
LA ROBOTICA LA ROBOTICA
LA ROBOTICA
 
Dom morfo p_climato_1
Dom morfo p_climato_1Dom morfo p_climato_1
Dom morfo p_climato_1
 
Cannova sansone settembre 2008 drs996
Cannova sansone settembre 2008 drs996Cannova sansone settembre 2008 drs996
Cannova sansone settembre 2008 drs996
 
Importancia de la tributacion
Importancia de la tributacionImportancia de la tributacion
Importancia de la tributacion
 
Geografia sergio marucci_12a2_carrasco
Geografia sergio marucci_12a2_carrascoGeografia sergio marucci_12a2_carrasco
Geografia sergio marucci_12a2_carrasco
 
(579080107) motores de busqueda. nilson
(579080107) motores de busqueda. nilson(579080107) motores de busqueda. nilson
(579080107) motores de busqueda. nilson
 
Criação publicitária
Criação publicitáriaCriação publicitária
Criação publicitária
 
Red social diapositivas
Red social diapositivasRed social diapositivas
Red social diapositivas
 
Mercado navideño
Mercado navideñoMercado navideño
Mercado navideño
 
DIAS DE AMORES PERDIDOS
DIAS DE AMORES PERDIDOSDIAS DE AMORES PERDIDOS
DIAS DE AMORES PERDIDOS
 
El Poder De La Mente
El Poder De La MenteEl Poder De La Mente
El Poder De La Mente
 
Diapositivas finales aprendizaje
Diapositivas finales aprendizajeDiapositivas finales aprendizaje
Diapositivas finales aprendizaje
 
Papa francisco
Papa franciscoPapa francisco
Papa francisco
 
Fisica electiva2
Fisica electiva2Fisica electiva2
Fisica electiva2
 
Apresentação reforma
Apresentação reformaApresentação reforma
Apresentação reforma
 

Semelhante a 20120140504021

HitBand: A Prefetching Model to Increase Hit Rate and Reduce Bandwidth Consum...
HitBand: A Prefetching Model to Increase Hit Rate and Reduce Bandwidth Consum...HitBand: A Prefetching Model to Increase Hit Rate and Reduce Bandwidth Consum...
HitBand: A Prefetching Model to Increase Hit Rate and Reduce Bandwidth Consum...
American International University of Bangladesh
 
Volume 2-issue-6-2056-2060
Volume 2-issue-6-2056-2060Volume 2-issue-6-2056-2060
Volume 2-issue-6-2056-2060
Editor IJARCET
 
Volume 2-issue-6-2056-2060
Volume 2-issue-6-2056-2060Volume 2-issue-6-2056-2060
Volume 2-issue-6-2056-2060
Editor IJARCET
 
Improving access latency of web browser by using content aliasing in
Improving access latency of web browser by using content aliasing inImproving access latency of web browser by using content aliasing in
Improving access latency of web browser by using content aliasing in
IAEME Publication
 
International Journal of Computer Science and Security Volume (3) Issue (1)
International Journal of Computer Science and Security Volume (3) Issue (1)International Journal of Computer Science and Security Volume (3) Issue (1)
International Journal of Computer Science and Security Volume (3) Issue (1)
CSCJournals
 

Semelhante a 20120140504021 (20)

50120140504023 2-3
50120140504023 2-350120140504023 2-3
50120140504023 2-3
 
50120140504023 2
50120140504023 250120140504023 2
50120140504023 2
 
Hybrid web caching framework for reduction of web
Hybrid web caching framework for reduction of webHybrid web caching framework for reduction of web
Hybrid web caching framework for reduction of web
 
HitBand: A Prefetching Model to Increase Hit Rate and Reduce Bandwidth Consum...
HitBand: A Prefetching Model to Increase Hit Rate and Reduce Bandwidth Consum...HitBand: A Prefetching Model to Increase Hit Rate and Reduce Bandwidth Consum...
HitBand: A Prefetching Model to Increase Hit Rate and Reduce Bandwidth Consum...
 
Swapnil_Chaudhari_paper
Swapnil_Chaudhari_paperSwapnil_Chaudhari_paper
Swapnil_Chaudhari_paper
 
Volume 2-issue-6-2056-2060
Volume 2-issue-6-2056-2060Volume 2-issue-6-2056-2060
Volume 2-issue-6-2056-2060
 
Volume 2-issue-6-2056-2060
Volume 2-issue-6-2056-2060Volume 2-issue-6-2056-2060
Volume 2-issue-6-2056-2060
 
Enhancing proxy based web caching system using clustering based pre fetching ...
Enhancing proxy based web caching system using clustering based pre fetching ...Enhancing proxy based web caching system using clustering based pre fetching ...
Enhancing proxy based web caching system using clustering based pre fetching ...
 
50120140504006
5012014050400650120140504006
50120140504006
 
Improving access latency of web browser by using content aliasing in
Improving access latency of web browser by using content aliasing inImproving access latency of web browser by using content aliasing in
Improving access latency of web browser by using content aliasing in
 
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
 
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
 
A Comparative Study of Recommendation System Using Web Usage Mining
A Comparative Study of Recommendation System Using Web Usage Mining A Comparative Study of Recommendation System Using Web Usage Mining
A Comparative Study of Recommendation System Using Web Usage Mining
 
Web personalization using clustering of web usage data
Web personalization using clustering of web usage dataWeb personalization using clustering of web usage data
Web personalization using clustering of web usage data
 
Web usage Mining Based on Request Dependency Graph
Web usage Mining Based on Request Dependency GraphWeb usage Mining Based on Request Dependency Graph
Web usage Mining Based on Request Dependency Graph
 
Search Engine Scrapper
Search Engine ScrapperSearch Engine Scrapper
Search Engine Scrapper
 
International Journal of Computer Science and Security Volume (3) Issue (1)
International Journal of Computer Science and Security Volume (3) Issue (1)International Journal of Computer Science and Security Volume (3) Issue (1)
International Journal of Computer Science and Security Volume (3) Issue (1)
 
IRJET-Multi -Stage Smart Deep Web Crawling Systems: A Review
IRJET-Multi -Stage Smart Deep Web Crawling Systems: A ReviewIRJET-Multi -Stage Smart Deep Web Crawling Systems: A Review
IRJET-Multi -Stage Smart Deep Web Crawling Systems: A Review
 

Mais de IAEME Publication

A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 

Mais de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

20120140504021

  • 1. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 198-204 © IAEME 198 NETWORK TRAFFIC OPTIMIZATION FOR PERFORMANCE IMPROVEMENT IN THE WEB SERVICE INFRASTRUCTURES BY CATEGORIZATION OF THE WEB CONTENTS WITH SIZE REDUCTION APPROACH Dr. Suryakant B Patil1 , Ms. Sonal S Deshmukh2 , Ms. Anuja D Bharate3 , Dr. Preeti Patil4 1 Professor, JSPM’s Imperial College of Engineering & Research, Wagholi, Pune 2, 3 PG Research Scholar, JSPM’s ICOER, Wagholi, Pune 4 Dean (SA), HOD & Professor, KIT’s COE, Kolhapur ABSTRACT Nowadays, the network traffic is tremendously increased. This has affected on the additional requirements of the bandwidth, require more time to access the data from server which means increased in response time. In this paper, we are proposing the mechanism of Latency Time, using the algorithm MD5, with the help of hash key and using the formula to improve the efficiency or performance of the system. The problem in proxy server cache memory is Content aliasing, means, the same content occurs multiple times. With the help of proxy servers, users can directly fetch the data, rather to go towards web server. So, the workload of web server will be reduced. The main goal is to find the Response time with different downlink rate, according to the institute schedule which we surveyed, minimize the bandwidth utilization and improve the performance of the proxy server which can be measured by removal of content aliasing. For this experimentation, we surveyed JSPM’s Wagholi campus, having 5 institutes in it. Categories and Subject Descriptors C.2.3 [Network Operation]: Network Management C.4 [Performance of System]: Design Studies GENERAL TERMS: Performance, Reliability, Experimentation, Algorithms. Keywords: Content aliasing, MD5, Latency Time, Proxy Server. INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET) ISSN 0976 - 6480 (Print) ISSN 0976 - 6499 (Online) Volume 5, Issue 4, April (2014), pp. 198-204 © IAEME: www.iaeme.com/ijaret.asp Journal Impact Factor (2014): 7.8273 (Calculated by GISI) www.jifactor.com IJARET © I A E M E
  • 2. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 198-204 © IAEME 199 1. INTRODUCTION In the field of web server management, researchers have focused on aliasing in proxy server caches for a long time [6]. Web caching consists of storing frequently referred objects on a caching server instead of the original server, so that web servers can make better use of network bandwidth, reduce the workload on servers, and improve the response time for users [12, 14]. Aliasing means giving multiple names to the same thing. Aliasing in proxy server caches occurs when the same content is stored in cache multiple times [5]. A proxy server acts as a mediator between the original server and the clients. On the World Wide Web, aliasing commonly occurs when a client makes two requests, and both the requests have the same payload. Currently, browsers perform cache lookups using Uniform Resource Locators (URLs) as identifiers. Aliasing causes repetitive data transfers even when the current request has already been cached under a different URL [8, 11]. Websites that contain the same content are called mirrors. Mirrors are redundancy mechanisms built into the web space to serve web pages faster, but they cost in terms of cache space [9, 13]. As the amount of web traffic increases, the efficient utilization of network bandwidth increasingly becomes more important. The Technique needs to analyze web traffic and understand its characteristics to be able to optimize the use of network bandwidth, to reduce network latency, and to improve response time for users [1]. Nowadays, usage of World Wide Web has been tremendously increased. In any organization/institute, internet is using by most of the students, faculties, administrative department for different purposes [4, 7]. The web pages, which are accessed by the all users, that get stored somewhere, we call that storage “Cache proxy memory”, which is available at client side. It may happen that, some of the users requests for same URL’s, so the pages get stored multiple times in cache memory. So duplication occurs & it grabs more space, which causes to the poor performance. So the eviction of content is very necessary. Therefore, we are using various methods. After the removal of content aliasing, results are better performance, less space. Still there may be lots of other content in cache, which occupies more space. So, it is mandatory to filter that content from cache by using various replacement policies such as FIFO, LRU, LFU, etc. FIFO: It is first in first out policy, manage by queue. When cache get full then it is mandatory to avail some space. So, this scheme removes the pages, which get inserted first. LRU: It is Least Recently Used policy, which filter out the web pages that will not be used in near future. LFU: It is Least Frequently Used policy, which evicts the web pages which are not frequently used. From our survey, it is observed that the static data is used more than dynamic data. So, to keep the static content in the cache is beneficial, as dynamic gets updated frequently. For same request of users, proxy doesn’t have to access the web server and web server’s workload also gets reduced. So it results to improve the latency time of cache. II. LITERATURE SURVEY Shivkumar and Garcia-Molina investigated mirroring in a large crawler data set and reported that in the WebTV client trace far more aliasing happens than expected. In fact, they reported that 36% of reply bodies are accessible through more than one URL [7]. Similarly, surveyed techniques for identifying mirrors on the Internet [3].Investigated mirroring in a large crawler data set and
  • 3. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 198-204 © IAEME 200 reported that roughly 10% of popular hosts are mirrored to some extent [3].Considered approximate mirroring or “syntactic similarity” [3]. Although they introduce sophisticated measures of document similarity, they report that most “clusters” of similar documents in a large crawler data set contain only identical documents. Duplication has both positive and negative aspects. On one hand the redundancy makes retrieval easier: if a search engine has missed one copy, maybe it has the other; or if one page has become unavailable, maybe a replica can be retrieved. On the other hand, from the point of view of search engines storing duplicate content is a waste of resources and from the user’s point of view, getting duplicate answers in response to a query is a nuisance. The principal reason for duplication on the Web is the systematic replication of content across distinct hosts, a phenomenon known as “mirroring” (These notions are defined more precisely below.) It is estimated that at least 10% of the hosts on the WWW are mirrored. Each document on the WWW has a unique name called the Universal Resource Locator (URL). The URL consists of three disjoint parts, namely the access method, a hostname, and a path. III. EXPERIMENTATION AND RESULTS Besides the obvious goals of Web caching system, a Web caching system having a number of properties. They are fast access, robustness, transparency, scalability, efficiency, adaptivity, stability, load balanced, ability to deal with heterogeneity, and simplicity. Discuss below. • Fast access: From user’s point of view, access latency is an important measurement of the quality of Web service. A desirable caching system should aim at reducing Web access latency. In particular, it should provide user a lower latency on average than those without employing a caching system. Robustness. From user’s prospect, the robustness means availability, which is another important measurement of quality of Web service. User’s desire to have Web service available whenever they want. The robustness has three aspects. First, it’s desirable that a few proxies crash wouldn’t tear the entire system down. The caching system should eliminate the single point failure as much as possible. Second, the caching system should fall back gracefully in case of failures. Third, the caching system would be design in such a way that it’s easy to recover from a failure. • Transparency: A Web caching system should be transparent for the user, the only results user should notice are faster response and higher availability. • Scalability: We have seen an explosive growth in network size and density in last decades and is facing a more rapid increasing growth in near future. The key to success in such an environment is the scalability. We would like a caching scheme to scale well along the increasing size and density of network. This requires all protocols employed in the caching system to be a slight weight as possible. • Efficiency: There are two aspects to efficiency. First, how much over head does the Web caching system impose on network? We would like a caching system to impose a minimal additional burden on the network. This includes both control packets and extra data packets incurred by using a caching system. Second, the caching system shouldn’t adopt any scheme which leads to underutilization of critical resources in network.
  • 4. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 198-204 © IAEME 201 • Load balancing: It’s desirable that the caching scheme distributes the load evenly through the entire network. A single proxy/server shouldn’t be a bottleneck (or hotspot) and there by degrades the performance of a portion of the network or even slow down the entire service system. • Ability to deal with heterogeneity: As networks grow in scale and coverage, they span arrange of hardware and software architectures. The Web caching scheme need adapt to arrange of network architectures. Fig. 1: Content Classification for different Content categories. • Simplicity: Simplicity is always an asset. Simpler schemes are easier to implement and likely to be accepted as international standards. We would like an ideal Web caching mechanism to be simple to deploy. • Adaptivity: It’s desirable to make the caching system adapt to the dynamic changing of the user demand and the network environment. The adaptivity involves several aspects: cache management, cache routing, proxy placement, etc. This is essential to achieve optimal performance. • Stability: The schemes used in Web caching system shouldn’t introduce in stabilities into the network. Campus includes total 5 institutes, we observed all that.Figure1 shows, the classification of all the static data for whole campus. Figure1 directly shows that, in which category the user is mostly interested. As we surveyed at our Institute Campus, most of the students request for the same pages, so duplication may occur. So, the cache require more space, which leads to poor performance. The blue line(upper line) in figure shows the content which has duplication(with CA) and red line(lower line) shows the content without duplication(without CA). 0 1000 2000 3000 4000 5000 6000 GIF PNG JPG HTML Size(KB) Content Categories JSPM's Wagholi Campus Classification Content Categories With CA Without CA
  • 5. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 198-204 © IAEME 202 Fig. 2: Total data classification for Campus with and without Content Aliasing Figure2 shows that, the classification of static and dynamic data for whole campus. The joined bar shows the duplicated and not-duplicated data. So, just observing the figure, data get reduced after duplication. Fig. 3: Size Reduction in different institutes at JSPM’s Wagholi Campus Figure3 shows that, data for different institutes at JSPM’s Wagholi Campus.HTTP defines several headers which were specifically designed to support caching. Though the HTTP specification specifies certain behaviors for web caches, it does not specify how to keep cached objects up to date. From our survey, at JSPM’s Wagholi Campus, we come up with some measures of the various categories and sizes. 0 5000 10000 15000 20000 25000 STATIC DYNAMIC TOTAL Size(KB) Category JSPM's Wagholi Campus Classification Static Dynamic With CA Without CA 0 1000 2000 3000 4000 5000 6000 7000 8000 9000 ICOER BSIOTR CHARAK ENIAC KAUTILYA TOTAL Size(KB) Various Institutes Size Reductions in all Institutes of JSPM's Wagholi Before CA After CA
  • 6. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 198-204 © IAEME 203 The HTTP GET message is used to retrieve a web object given its URL. However GET alone does not guarantee that it will return a fresh object. HTTP headers that may effect caching can be classified into two categories. The first category includes headers appended to retrieve a web object for cache control. The second category includes headers appended when a web object is returned. IV. CONCLUSION In an Environment where saving bandwidth on the shared external network is of utmost importance, the proxy cache should use a replacement policy that achieves high byte hit rates. A proxy cache could also utilize multiple replacement policies. This work can be further optimize by the Daemon Process, which can be design and run periodically to check the consistency of the data cached and the data at the web server. This can be scheduled during the slack time with the less traffic which will not add any additional toll on the bandwidth. When caching is implemented, frequently accessed content is stored close to the users, eliminating this duplicated effort. A request from a user’s browser is first sent to the network’s caching server. If the requested contentfound in the web cache and the information is fresh, the content is sent directly back to the requester, skipping an upstream journey to the target website. Which we have shown here with our experimentations at JSPM’s Wagholi Campus with end result is marginable reduction in the size followed by bandwidth. REFERENCES [1] KartikBommepally, Glisa T. K., Jeena J. Prakash, SanasamRanbir Singh and Hema A Murthy “Internet Activity Analysis through Proxy Log” IEEE, 2010. [2] Jun Wu; Ravindran, K., "Optimization algorithms for proxy server placement in content distribution networks," Integrated Network Management-Workshops, 2009. [3] Ngamsuriyaroj, S. ; Rattidham, P. ; Rassameeroj, I. ; Wongbuchasin, P. ; Aramkul, N. ; Rungmano, S. “Performance Evaluation of Load Balanced Web Proxies” IEEE, 2011. [4] Chen, W.; Martin, P.; Hassanein, H.S., "Caching dynamic content on the Web," Canadian Conference on Electrical and Computer Engineering, 2003, vol.2, no., pp. 947- 950 vol.2, 4-7 May 2003. [5] Sadhna Ahuja, Tao Wu and Sudhir Dixit “On the Effects of Content Compression on Web Cache Performance,” Proceedings of the International Conference on Information Technology: Computers and Communications, 2003. [6] A. Mahanti, C. Williamson, and D. Eager, “Traffic Analysis of a Web Proxy Caching Hierarchy,” IEEE Network Magazine, May 2000. [7] N. Shivakumar and H. Garcia-Molina, “Finding near Replicas of Documents on the Web” Proc. Workshop on Web Databases, Mar. 1998. [8] Jeffrey C. mogul “A trace-based analysis of duplicate suppression in HTTP,” Compaq Computer Corporation Western Research Laboratory, Nov. 1999. [9] S B Patil, SachinChavan, PreetiPatil; “High Quality Design and Methodology Aspects to Enhance Large Scale Web Services”, International Journal of Advances in Engineering & Technology (IJAET-2012), ISSN: 2231-1963, March 2012, Volume3, Issue1, Pages175-185. (Journal Impact Factor: 1.96) [10] Prof. S B Patil, Sachin Chavan, Dr. Preeti Patil and Prof. Sunita R Patil, “High Quality Design to Enhance and Improve Performance of Large Scale Web Applications”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 1, 2012, pp. 198 - 205, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. (Journal Impact Factor: 1.0425)
  • 7. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 198-204 © IAEME 204 [11] S B Patil, D. B. Kulkarni; “Improving web performance through Hierarchical caching & content aliasing”, The 7th International Conference on “Information Integration and Web- based Applications & Services”, 19-21 September 2005, Kuala Lumpur, Malaysia. [12] Srikantha Rao, PreetiPatil, S B Patil, SunitaPatil“Customized Approach for Efficient Data Storing and Retrieving from University Database Using Repetitive Frequency Indexing”, IEEE INTERNATIONAL CONFERENCE PUBLICATIONS, RAIT 2012, ISM Dhanbad, Jahrkhand, March 15–17, 2012 (Aavailable on IEEE Xplore) Print ISBN: 978-1-4577-0694- 3, Digital Object Identifier: 10.1109/RAIT.2012.6194612 Page(s): 511 – 514 [13] Srikantha Rao, PreetiPatil, S B Patil;“Enhanced Software Development Strategy implying High Quality Design for Large Scale Database Projects”, International Conference and Workshop on Emerging Trends in Technology ICWET 2012, ISBN: 978-0-615-58717-2, TCET Mumbai, February 22–25, 2012, Pages: 508-513 [14] Srikantha Rao, PreetiPatil, S B Patil;“Object-Oriented Software Engineering Paradigm: A Seamless Interface in Software Development Life Cycle”, ACM_Asia_Pacific International Conference on Advances in Computing (ICAC-2008), Anuradha Engineering College, Chikhali, Feb 2008. [15] S.Saira Thabasum, “Need for Design Patterns and Frameworks for Quality Software Development”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 1, 2012, pp. 54 - 58, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [16] Dr.K.Prasadh and R.Senthilkumar, “Nonhomogeneous Network Traffic Control System Using Queueing Theory”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 3, 2012, pp. 394 - 405, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [17] Sachin Chavan and Nitin Chavan, “Improving Access Latency of Web Browser by using Content Aliasing in Proxy Cache Server”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 356 - 365, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.