Data Transfer Nodes for Cloud - Storage Providers

نویسندگان

  • Soham Sinha
  • Nooshin Eghbal
چکیده

We provide a case study of current inefficiencies in how traffic to well-known cloud-storage providers (e.g., Dropbox, Google Drive, Microsoft OneDrive) can vary significantly in throughput (e.g., a factor of 5 or more) depending on the location of the source and sink of the data. Our case study supplements previous work on resilient overlay networks (RON) and other related ideas. These inefficiencies exist in the presence of vendor-specific points-of-presence (POP), which try to provide better network performance to the clients. In fact, the existence of special-purpose networks (e.g., national research networks, PlanetLab) and complicated peering relationships between networks, means that performance problems might exist in many wide-area networks (WANs). Our main contribution is to continue the cataloging of network inefficiencies so that practitioners and experimenters are aware of them. But, we also show how simple routing detours, can improve throughput by factors of over 3x for client-to-cloud-storage. Routing detours are implemented by adding intermediate nodes in the routing path. These special-purpose intermediate nodes are called data transfer nodes (DTNs). We have also implemented an optimization in these DTNs in the form of cut-through routing. Although the specific inefficiencies in this paper might be transitory (and we agree with that characterization), WAN bottlenecks due to routing, suboptimal middlebox configuration, and congestion persist as real problems to be cataloged, discussed, and addressed through the use of detours, or data transfer nodes (DTNs), or RONs. Additionally, we provide a brief overview of the beneficial routing detours in 20 PlanetLab nodes in North America.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things

Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...

متن کامل

PerfectDedup: Secure Data Deduplication

With the continuous increase of cloud storage adopters, data deduplication has become a necessity for cloud providers. By storing a unique copy of duplicate data, cloud providers greatly reduce their storage and data transfer costs. Unfortunately, deduplication introduces a number of new security challenges. We propose PerfectDedup, a novel scheme for secure data deduplication, which takes into...

متن کامل

Introducing a Dynamic Federation Model for RESTful Cloud Storage

This paper presents a solution for RESTful cloud storage in a dynamic identity federation. With dynamic federations, Cloud Service Providers are able to find Identity Providers autonomously in the cloud in order to make services flexible, scalable and interoperable. By combining a Representational State Transfer architecture with SAML-based identity federation, a distributed and decentralized c...

متن کامل

Reducing Failure Probability of cloud storage services using Multi-Clouds

Certificate I hereby declare that the work, which is being presented in the Seminar, entitled " Reducing Technical University, Kota is a record of my own investigations carried under the guidance of Mr. I have not submitted the matter presented in this Dissertation Review any where for the award of any other Degree. Acknowledgment It is my great privilege to express sincere gratitude & thanks t...

متن کامل

Role-based Access Control Using Ontology in Cloud Storage

With the development of cloud computing, and as the basis of data services, security problems of cloud storage are growing more attention. Based on distributed storage, multidomain and multi-tenant characteristics, combined with access control technologies, this paper sets up the Role-based Access Control using Ontology and domians in Cloud Storage (DOnto_RBAC), which could provide a concise an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016