A protocol-independent technique for eliminating redundant network traffic

Citation
Nt. Spring et D. Wetherall, A protocol-independent technique for eliminating redundant network traffic, COMP COM R, 30(4), 2000, pp. 87-95
Citations number
20
Categorie Soggetti
Information Tecnology & Communication Systems
Journal title
SIGCOMM computer communication review
ISSN journal
01464833 → ACNP
Volume
30
Issue
4
Year of publication
2000
Pages
87 - 95
Database
ISI
SICI code
0146-4833(200010)30:4<87:APTFER>2.0.ZU;2-S
Abstract
We present a technique for identifying repetitive information transfers and use it to analyze the redundancy of network traffic. Our insight is that d ynamic content, streaming media and other traffic that is not caught by tod ay's Web caches is nonetheless likely to derive from similar information. W e have therefore adapted similarity detection techniques to the problem of designing a system to eliminate redundant transfers. We identify repeated b yte ranges between packets to avoid retransmitting the redundant data. We find a high level of redundancy and are able to detect repetition that W eb proxy caches are not. In our traces, after Web proxy caching has been ap plied, an additional 39% of the original volume of Web traffic is found to be redundant Moreover, because our technique makes no assumptions about HTT P protocol syntax or caching semantics, it provides immediate benefits for other types of content, such as streaming media, FTP traffic, news and mail .