Mitigating server-side congestion in the Internet through pseudoserving
Server-side congestion arises when a large number of users wish to retrieve files from a server over a short period of time. Under such conditions, users are in a unique position to benefit enormously by sharing retrieved files. Pseudoserving, a new paradigm for Internet access, provides incentives...
Saved in:
Published in | IEEE/ACM transactions on networking Vol. 7; no. 4; pp. 530 - 544 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
IEEE
01.08.1999
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Server-side congestion arises when a large number of users wish to retrieve files from a server over a short period of time. Under such conditions, users are in a unique position to benefit enormously by sharing retrieved files. Pseudoserving, a new paradigm for Internet access, provides incentives for users to contribute to the speedy dissemination of server files through a contract set by a "superserver". Under this contract, the superserver grants a user a referral to where a copy of the requested file may be retrieved in exchange for the user's assurance to serve other users for a specified period of time. Simulations that consider only network congestion occurring near the server show that: (1) pseudoserving is effective because it self-scales to handle very high request rates; (2) pseudoserving is feasible because a user who participates as a pseudoserver benefits enormously in return for a relatively small contribution of the user's resources; (3) pseudoserving is robust under realistic user behavior because it can tolerate a large percentage of contract breaches; and (4) pseudoserving can exploit locality to reduce usage of network resources. Experiments performed on a local area network that account for the processing of additional layers of protocols and the finite processing and storage capacities of the server and the clients, corroborate the simulation results. They also demonstrate the benefits of exploiting network locality in reducing download times and network traffic while making referrals to a pseudoserver. Limitations of pseudoserving and potential solutions to them are also discussed. |
---|---|
AbstractList | Server-side congestion arises when a large number of users wish to retrieve files from a server over a short period of time. Under such conditions, users are in a unique position to benefit enormously by sharing retrieved files. Pseudoserving, a new paradigm for Internet access, provides incentives for users to contribute to the speedy dissemination of server files through a contract set by a "superserver". Under this contract, the superserver grants a user a referral to where a copy of the requested file may be retrieved in exchange for the user's assurance to serve other users for a specified period of time. Simulations that consider only network congestion occurring near the server show that: (1) pseudoserving is effective because it self-scales to handle very high request rates; (2) pseudoserving is feasible because a user who participates as a pseudoserver benefits enormously in return for a relatively small contribution of the user's resources; (3) pseudoserving is robust under realistic user behavior because it can tolerate a large percentage of contract breaches; and (4) pseudoserving can exploit locality to reduce usage of network resources. Experiments performed on a local area network that account for the processing of additional layers of protocols and the finite processing and storage capacities of the server and the clients, corroborate the simulation results. They also demonstrate the benefits of exploiting network locality in reducing download times and network traffic while making referrals to a pseudoserver. Limitations of pseudoserving and potential solutions to them are also discussed Server-side congestion arises when a large number of users wish to retrieve files from a server over a short period of time. Under such conditions, users are in a unique position to benefit enormously by sharing retrieved files. Pseudoserving, a new paradigm for Internet access, provides incentives for users to contribute to the speedy dissemination of server files through a contract set by a "superserver". Under this contract, the superserver grants a user a referral to where a copy of the requested file may be retrieved in exchange for the user's assurance to serve other users for a specified period of time. Simulations that consider only network congestion occurring near the server show that: (1) pseudoserving is effective because it self-scales to handle very high request rates; (2) pseudoserving is feasible because a user who participates as a pseudoserver benefits enormously in return for a relatively small contribution of the user's resources; (3) pseudoserving is robust under realistic user behavior because it can tolerate a large percentage of contract breaches; and (4) pseudoserving can exploit locality to reduce usage of network resources. Experiments performed on a local area network that account for the processing of additional layers of protocols and the finite processing and storage capacities of the server and the clients, corroborate the simulation results. They also demonstrate the benefits of exploiting network locality in reducing download times and network traffic while making referrals to a pseudoserver. Limitations of pseudoserving and potential solutions to them are also discussed. Server-side congestion arises when a large number of users wish to retrieve files from a server over a short period of time. Under such conditions, users are in a unique position to benefit enormously by sharing retrieved files. Pseudoserving, a new paradigm for Internet access, provides incentives for users to contribute to the speedy dissemination of server files through a contract set by a `superserver.' Under this contract, the superserver grants a user a referral to where a copy of the requested file may be retrieved in exchange for the user's assurance to serve other users for a specified period of time. Simulations that consider only network congestion occurring near the server show that: 1) pseudoserving is effective because it self-scales to handle very high request rates; 2) pseudoserving is feasible because a user who participates as a pseudoserver benefits enormously in return for a relatively small contribution of the user's resources; 3) pseudoserving is robust under realistic user behavior because it can tolerate a large percentage of contract breaches; and 4) pseudoserving can exploit locality to reduce usage of network resources. Experiments performed on a local area network that account for the processing of additional layers of protocols and the finite processing and storage capacities of the server and the clients, corroborate the simulation results. They also demonstrate the benefits of exploiting network locality in reducing download times and network traffic while making referrals to a pseudoserver. Limitations of pseudoserving and potential solutions to them are also discussed in this paper. |
Author | Kong, K. Ghosal, D. |
Author_xml | – sequence: 1 givenname: K. surname: Kong fullname: Kong, K. organization: Dept. of Electr. & Comput. Eng., California Univ., Davis, CA, USA – sequence: 2 givenname: D. surname: Ghosal fullname: Ghosal, D. |
BookMark | eNqNkTFPwzAQhT0UibYwsDJlAjGktWPjxCOqoFQqYoE5cpxLapTaxXaQ-Pc4CmJACHU6vbvvPZ3uZmhirAGELgheEILFUuBFLijOsgmaEsxpyrnITtHM-zeMSRzwKVo_6aBbGbRpEw_uA1zqdQ2JsqYFH7Q1iTZJ2EGyMQGcgRCFs327Sw4e-toOpmg-QyeN7Dycf9c5en24f1k9ptvn9WZ1t00VzUlIKeW5lLVgwMhtlSmQAkQdO0yppsk5LmrSsLzCTaEkYUQVrKJVFFA10PCMztH1mHtw9r2PG5Z77RV0nTRge18KIgSlmBWRvPqXzArBCkbIESAtsKBHJOY4Y5QP4M0IKme9d9CUB6f30n2WBJfDa0qBy_E1kV3-YpUOcjh8cFJ3fzouR4cGgJ_k7-EXKpKdlA |
CODEN | IEANEP |
CitedBy_id | crossref_primary_10_1587_transinf_2020MPP0003 crossref_primary_10_1109_JSAC_2003_818778 crossref_primary_10_1016_j_future_2004_04_013 crossref_primary_10_1145_512840_512845 crossref_primary_10_1007_s12083_010_0087_x |
Cites_doi | 10.1016/0169-7552(96)00073-6 10.1109/90.649565 10.1109/HOTOS.1995.513454 10.1016/0169-7552(96)00030-X 10.1145/3592626.3592635 10.1016/0169-7552(96)00029-3 10.1016/0308-5961(96)00002-X 10.7551/mitpress/3867.003.0004 10.1109/49.564131 10.3998/3336451.0001.132 10.1109/SDNE.1995.470449 10.1016/S0169-7552(97)00035-4 10.1016/0169-7552(96)00077-3 10.1109/49.564138 10.1145/3592626.3592634 |
ContentType | Journal Article |
DBID | RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D 7SP F28 FR3 |
DOI | 10.1109/90.793022 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Electronics & Communications Abstracts ANTE: Abstracts in New Technology & Engineering Engineering Research Database |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional Electronics & Communications Abstracts Engineering Research Database ANTE: Abstracts in New Technology & Engineering |
DatabaseTitleList | Computer and Information Systems Abstracts Computer and Information Systems Abstracts Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EndPage | 544 |
ExternalDocumentID | 10_1109_90_793022 793022 |
GroupedDBID | -DZ -~X .DC 0R~ 29I 4.4 5GY 5VS 6IK 85S 8US 97E 9M8 AAJGR AAKMM AALFJ AARMG AASAJ AAWTH AAWTV ABAZT ABPPZ ABQJQ ABVLG ACGFS ACGOD ACIWK ACM ADBCU ADL AEBYY AEFXT AEJOY AENSD AETEA AETIX AFWIH AFWXC AGQYO AGSQL AHBIQ AI. AIBXA AIKLT AKJIK AKQYR AKRVB ALLEH ALMA_UNASSIGNED_HOLDINGS ATWAV BDXCO BEFXN BFFAM BGNUA BKEBE BPEOZ CCLIF CS3 D0L EBS EJD FEDTE GUFHI HF~ HGAVV HZ~ H~9 I07 ICLAB IEDLZ IES IFIPE IFJZH IPLJI JAVBF LAI LHSKQ M43 MVM O9- OCL P1C P2P PQQKQ RIA RIE RNS ROL TN5 UPT UQL VH1 XOL YR2 ZCA AAYOK AAYXX CITATION RIG 7SC 8FD JQ2 L7M L~C L~D 7SP F28 FR3 |
ID | FETCH-LOGICAL-c371t-3367aad94e415b2cea9e9daad4ccff7608d1f47b0f8ca141c84b3bf8cebfef623 |
IEDL.DBID | RIE |
ISSN | 1063-6692 |
IngestDate | Sun Aug 24 04:13:36 EDT 2025 Fri Jul 11 02:08:23 EDT 2025 Mon Jul 21 09:29:58 EDT 2025 Fri Jul 11 07:07:16 EDT 2025 Tue Jul 01 01:49:08 EDT 2025 Thu Apr 24 23:00:56 EDT 2025 Tue Aug 26 21:00:26 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c371t-3367aad94e415b2cea9e9daad4ccff7608d1f47b0f8ca141c84b3bf8cebfef623 |
Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
PQID | 27024368 |
PQPubID | 23500 |
PageCount | 15 |
ParticipantIDs | proquest_miscellaneous_919933048 ieee_primary_793022 proquest_miscellaneous_27024368 crossref_primary_10_1109_90_793022 crossref_citationtrail_10_1109_90_793022 proquest_miscellaneous_28380938 proquest_miscellaneous_28948411 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 1900 |
PublicationDate | 1999-08-01 |
PublicationDateYYYYMMDD | 1999-08-01 |
PublicationDate_xml | – month: 08 year: 1999 text: 1999-08-01 day: 01 |
PublicationDecade | 1990 |
PublicationTitle | IEEE/ACM transactions on networking |
PublicationTitleAbbrev | TNET |
PublicationYear | 1999 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
References | murtagh (ref20) 1994 ref12 ref10 ref2 mackie-mason (ref16) 1997 ref19 garfinkel (ref8) 1996 mackie-mason (ref18) 1994 dahlin (ref7) 1994 stevens (ref26) 1994 laurie (ref28) 1997 ref24 burns (ref6) 1997 ref23 ref25 stevens (ref27) 1996 ref21 (ref13) 0 (ref11) 0 (ref15) 0 ref4 ref3 ref5 (ref9) 1998 abrams (ref1) 1995 parsa (ref22) 1997; 15 malpani (ref14) 1995 mcknight (ref17) 1997 |
References_xml | – year: 0 ident: ref11 publication-title: HTTP 1 1 Specification – year: 1994 ident: ref20 publication-title: Data on the number of access to the WWW Server in ESO (European Southern Observatory) – ident: ref5 doi: 10.1016/0169-7552(96)00073-6 – year: 1996 ident: ref27 publication-title: TCP/IP Illustrated Volume 3 TCP for Transactions HTTP NNTP and UNIX Domain Protocols – year: 1994 ident: ref26 publication-title: TCP/IP Illustrated Volume 1 Protocols – start-page: 889 year: 1997 ident: ref6 article-title: automatic detection and control of media stimulated focussed overloads publication-title: Proc Int Teletraffic Congress – ident: ref2 doi: 10.1109/90.649565 – year: 1998 ident: ref9 publication-title: GVU s 4th 5th 6th 7th and 9th WWW User Survey Oct 1995 Apr 1996 Oct 1996 Apr 1997 – year: 1994 ident: ref18 publication-title: Pricing congestible network resources – ident: ref10 doi: 10.1109/HOTOS.1995.513454 – ident: ref3 doi: 10.1016/0169-7552(96)00030-X – year: 1995 ident: ref1 article-title: caching proxies: limitations and potentials publication-title: Proc 4th Int World Wide Web Conf doi: 10.1145/3592626.3592635 – ident: ref25 doi: 10.1016/0169-7552(96)00029-3 – ident: ref24 doi: 10.1016/0308-5961(96)00002-X – start-page: 58 year: 1996 ident: ref8 article-title: the wizard of netscape publication-title: WebServer Mag – year: 1997 ident: ref17 article-title: an introduction to internet economics publication-title: Internet Economics doi: 10.7551/mitpress/3867.003.0004 – volume: 15 start-page: 316 year: 1997 ident: ref22 article-title: scalable internet multicast routing publication-title: IEEE Journal on Selected Areas in Communications doi: 10.1109/49.564131 – ident: ref19 doi: 10.3998/3336451.0001.132 – ident: ref4 doi: 10.1109/SDNE.1995.470449 – ident: ref12 doi: 10.1016/S0169-7552(97)00035-4 – ident: ref21 doi: 10.1016/0169-7552(96)00077-3 – year: 0 ident: ref15 publication-title: Mars Path Finder – year: 1997 ident: ref16 article-title: some faqs about usage-based pricing publication-title: Internet Economics – start-page: 267 year: 1994 ident: ref7 article-title: cooperative caching: using remote client memory to improve file system performance publication-title: Proc 1st Symp Operating System Desing and Implementation (OSDI) – ident: ref23 doi: 10.1109/49.564138 – year: 1995 ident: ref14 article-title: making world wide web caching servers cooperate publication-title: Proc 4th Int World Wide Web Conf doi: 10.1145/3592626.3592634 – year: 1997 ident: ref28 publication-title: Apache The Definitive Guide – year: 0 ident: ref13 publication-title: Low-bandwidth X |
SSID | ssj0013026 |
Score | 1.6521596 |
Snippet | Server-side congestion arises when a large number of users wish to retrieve files from a server over a short period of time. Under such conditions, users are... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 530 |
SubjectTerms | Congestion Contracts File servers Internet Local area networks Network servers Networks Protocols Reproduction Robustness Servers Servers (computers) Simulation Telecommunication traffic Traffic control Web server |
Title | Mitigating server-side congestion in the Internet through pseudoserving |
URI | https://ieeexplore.ieee.org/document/793022 https://www.proquest.com/docview/27024368 https://www.proquest.com/docview/28380938 https://www.proquest.com/docview/28948411 https://www.proquest.com/docview/919933048 |
Volume | 7 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwELYKJ3qAQqnYQsFCPXDxEsfGsY9VBayQtieQuEXxZFIhUHbFJhd-fcd2FlqgiFtijSVr_Jj3N4x9z62ByhgQyvpCaJC5cApAgNRgwEHtI-LN9JeZXOmL65PrAWc71sIgYkw-w3H4jLH8egZ9cJUd01kikbPCVshuS6VaTwGDLHZWIwNHCWNcPoAIycwdu2ycJv4jemIvlRcPcJQqZxupXHsRwQhDMsntuO_8GB6eQTW-c8Gf2PqgXfIf6Thssg_YbrGPf2EOfmbn05sEq9H-5sEji_cidOzkZBeHUBNtE79pOamFPDkLseNDLx8-X2Bfz8IkmrzNrs5OL39OxNBNQYAqZCeUMkVV1U4jyWyfA1YOXU0jGqBpCpPZWja68FljoZJagtVeefpB32BDWtIXttrOWtxhnJRIxJMGtQfU6GzAOs6daSxpYwU6M2JHS0aXMECNh44Xd2U0OTJXuqxMvBmxw0fSecLXeI1oK_D2kWA5erDcvJLuRAh0VC3O-kUZauwCsv4bFFbZzKk3KZy2WsoR4_-hcCH3UdEL-PXV5e2ytQTxEJIF99hqd9_jN1JgOr8fj-4fgL7xSg |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV1Lb9QwEB5V5QAceBQQy6sWAomLt0nsdewDBwSULe321Eq9hXgyqSpQtuomQvBX-Cv8OMZxdnmV3ipxi62x5HjGnhnP-BuAZ5k1WBqDUlmfS41pJp1ClJhqNOiw8j3izWzfTA_1-6PJ0Rp8W72FIaI--YzG4bOP5Vdz7MJV2RbLEqucIYNyl758Zv9s8XLnDTPzeZZtvz14PZVDCQGJKk9bqZTJy7JymlhR-QypdOQq7tGIdZ2bxFZprXOf1BbLVKdotVeeG-Rrqk1ANeDz_QqbGZMsPg77GaJI-lpu7FIpaYzLBtiiNHFbLhnHqf6m7PrqLX8d-b0e274J35crENNXPo671o_x6x_gkP_pEt2CG4P9LF5Fgb8Na9RswPVfUBXvwLvZSQQOaY5FuHOmMxlqkgr2_EMwjQVRnDSCDV8Rr0OpFUO1InG6oK6ah0E8-C4cXsqf3IP1Zt7QfRBsJhNNatIeSZOzAc05c6a2bG_m5MwIXiwZW-AAph5qenwqeqcqcYVLisiLETxdkZ5GBJHziDYCL1cEy97NpbAUvOtDKKdsaN4tivCKMNQOuIDCKps4dSGF01an6QjEPyhcyO5UfMY_OHd6m3B1ejDbK_Z29ncfwrUIaBFSIx_BenvW0WM211r_pN82Aj5cthD-ABtOU5E |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Mitigating+server-side+congestion+in+the+Internet+through+pseudoserving&rft.jtitle=IEEE%2FACM+transactions+on+networking&rft.au=Kong%2C+K&rft.au=Ghosal%2C+D&rft.date=1999-08-01&rft.issn=1063-6692&rft.volume=7&rft.issue=4&rft_id=info:doi/10.1109%2F90.793022&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1063-6692&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1063-6692&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1063-6692&client=summon |