Proxy location problems and their generalizations

Sumi Choi, Y. Shavitt

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

In this paper we suggest a new angle to look on proxy location problems. We view the proxy as a service and generalize the problem of optimally placing proxies to optimally placing any service in the network. We differentiate between two cases: transparent services, such as transparent caches (TERCs), and non-transparent services where the end stations, such as hosts using a cache, need to be configured with respect to the service locations. This formulation enables us to study in a unified framework the location problems related to active networks, overlay peer-to-peer networks, as well as, CDNs and caching. For both cases we formalize the problem of optimally placing network servers and introduce approximation algorithms. We present simulation results of approximations and heuristics. We also present an optimal solution for the location problem for a special topology. We show, through a series of examples, that our approach can be applied to a variety of different services.

Original languageEnglish
Title of host publicationProceedings - 23rd International Conference on Distributed Computing Systems Workshops, ICDCSW 2003
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages898-904
Number of pages7
ISBN (Electronic)0769519210, 9780769519210
DOIs
StatePublished - 2003
Event23rd International Conference on Distributed Computing Systems Workshops, ICDCSW 2003 - Providence, United States
Duration: 19 May 200322 May 2003

Publication series

NameProceedings - 23rd International Conference on Distributed Computing Systems Workshops, ICDCSW 2003

Conference

Conference23rd International Conference on Distributed Computing Systems Workshops, ICDCSW 2003
Country/TerritoryUnited States
CityProvidence
Period19/05/0322/05/03

Keywords

  • Approximation algorithms
  • Authentication
  • Computer science
  • Costs
  • Network servers
  • Network topology
  • Peer to peer computing
  • Telecommunication traffic
  • Traffic control
  • Web server

Fingerprint

Dive into the research topics of 'Proxy location problems and their generalizations'. Together they form a unique fingerprint.

Cite this