Integrating Caching Techniques in CDNs using a Classification Approach

Integrating Caching Techniques in CDNs using a Classification Approach

George Pallis, Konstantinos Stamos, Athena Vakali, Charilaos Thomas, George Andreadis
Copyright: © 2008 |Volume: 4 |Issue: 4 |Pages: 12
ISSN: 1548-0631|EISSN: 1548-064X|ISSN: 1548-0631|EISBN13: 9781615201624|EISSN: 1548-064X|DOI: 10.4018/jbdcn.2008100101
Cite Article Cite Article

MLA

Pallis, George, et al. "Integrating Caching Techniques in CDNs using a Classification Approach." IJBDCN vol.4, no.4 2008: pp.1-12. http://doi.org/10.4018/jbdcn.2008100101

APA

Pallis, G., Stamos, K., Vakali, A., Thomas, C., & Andreadis, G. (2008). Integrating Caching Techniques in CDNs using a Classification Approach. International Journal of Business Data Communications and Networking (IJBDCN), 4(4), 1-12. http://doi.org/10.4018/jbdcn.2008100101

Chicago

Pallis, George, et al. "Integrating Caching Techniques in CDNs using a Classification Approach," International Journal of Business Data Communications and Networking (IJBDCN) 4, no.4: 1-12. http://doi.org/10.4018/jbdcn.2008100101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Content Delivery Networks (CDNs) provide an efficient support for serving “resource-hungry” applications while minimizing the network impact of content delivery as well as shifting the traffic away from overloaded origin servers. However, their performance gain is limited since the storage space in CDN’s servers is not used optimally. In order to manage their storage capacity in an efficient way, we integrate caching techniques in CDNs. The challenge is to decide which objects would be devoted to caching so as the CDN’s server may be used both as a replicator and as a proxy server. In this article, we propose a nonlinear, nonparametric model which classifies the CDN’s server cache into two parts. Through a detailed simulation environment, we show that the proposed technique can yield significant reduction in user-perceived latency as compared with other heuristic schemes.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.