HOME JOURNALS CONTACT

Information Technology Journal

Year: 2013 | Volume: 12 | Issue: 9 | Page No.: 1788-1795
DOI: 10.3923/itj.2013.1788.1795
A Dynamic Optimizing Adjustment Model for File Storage Distribution in Content Delivery Network
Huang Yongsheng, Tian Xiaoyu and Liu Yazhi

Abstract: In Content Delivery Network (CDN), optimized the file storage distribution in the servers is a proper approach to balance the storage capacity of the servers and the cost of the file location. However, the active users and the files they require are varying with the time going. In this study, a dynamic optimizing adjustment model is proposed to adjusting the file storage distribution corresponding to the variation of the active users of the CDN. In the proposed model, the ant colony optimization algorithm with the competitive neural network algorithm involved is used to adjust the file storage distribution efficiently and effectively. The simulative experimental results testifies that the proposed model can achieve not only steadily smaller time cost of optimization procedure in consideration of the variation of the user scale but also higher hit ratio of file request.

Fulltext PDF Fulltext HTML

How to cite this article
Huang Yongsheng, Tian Xiaoyu and Liu Yazhi, 2013. A Dynamic Optimizing Adjustment Model for File Storage Distribution in Content Delivery Network. Information Technology Journal, 12: 1788-1795.

Keywords: competitive neural network, Content delivery network, ant colony algorithm and file storage distribution

INTRODUCTION

With the information sharing being widely accepted, the file storage and location in content delivery network become hot spot research fields in the computer and network sciences (Javidi, 2008; Calafate et al., 2012). The strategy of the file storage distribution in the servers is determinative to the storage capacity utilization of the servers and the cost of the file location (Gao et al., 2010). The real-time and time cost of file achievement is influenced by file location algorithm (Di and Wang, 2013). In content delivery network, integrating the strategy of the file storage and the approach of the file location is usually adopted (Martins and Duarte, 2010; Halinger and Hartleb, 2011). A hierarchical model is put forward in (Wu et al., 2009), in which the servers are placed in two steps. It is decided which sub-cluster each server should belong to firstly by a tree-based heuristic algorithm, Load Balance Traversing (LBT). Secondly, the location of each server within a sub-cluster is determined by the Load Balance Matching (LBM) algorithm.

The files in the network are achieved by the users requiring them at lowest cost is the ultimate goal of enhancing the strategy of file storage distribution and the file location algorithm (Rossi et al., 2009; Thomos et al., 2011). By the requirement characteristics of the users, the CDN models with better efficiency are proposed (Peng, 2011). By predictions of individual end user behavior, a model optimally using the network bandwidth and the storage resources is presented by Verhoeyen et al. (2012) with the comparison of content popularity versus new recommender. The attributes of the files are relative to the users’ requirement to the files and it is an effective approach to take the attributes of the files into account in consideration of the file storage distribution and location in CDN (Costa et al., 2008). To reducing the response time, organizing the CDN according to the social attributes of the users with proper file caching in the server is another efficient method (Sahagun et al., 2012).

Consequently, it is a dilemma for better utilizing the storage capacity with less cost of file replicas location. Based on analysis to the characteristics of users or the requirement prediction, the past proposed solutions have decreased the cost of file location by designated file distribution strategies. However, the resource expenditure will become lager rapidly and the performances will get worse quickly with the scale of the CDN system increasing. In this study, a dynamic optimizing adjustment model is proposed to adjusting the file storage distribution corresponding to the variation of the active users of the CDN. In the proposed model, the ant colony optimization algorithm with the competitive neural network algorithm involved to enhance the performances of the CDN system with less resource expenditure especially when the scale of the CDN system becomes larger.

WORK FLOW OF THE CONTENT DELIVERY NETWORK

As shown in Fig. 1, there are a source service, an access server and a certain number of surrogate servers in the content delivery network. These servers are interconnected and construct and content service network which takes charge of the response of the file request and providing with files to the users. When a user requires a file, a connection between the user and the access server will be created and a file request will be sent from the user to the access server. The access server will then redirect the request to a surrogate server. If the request file is stored in the redirected surrogate server by cache in advance, the surrogate server can provide service directly. If the request file is not stored in the surrogate server, the surrogate server will achieve the file from the source server and then dispatch the file to the user.

ANALYSIS TO THE EFFICIENCY OF THE FILE DELIVERY IN CDN

As described earlier, a surrogate server will be selected and the service for the user will be redirected to the surrogate server when a user accesses the CDN system. Consequently, the dispatching speed from the selected surrogate server to the user and whether the selected surrogate server has store the request file in advance will influence the efficiency of the file delivery in CDN (Borst et al., 2009). The distance of the physical network connection between the selected surrogate server and the user is usually determinative to the dispatching speed from the selected surrogate server to the user with the designated access bandwidth of the user to the network. In the circumstance of congest to the selected server, the dispatching speed will decrease sharply (Adler et al., 2011). As to the circumstance whether the selected surrogate server has store the request file in advance, the request file should be pushed to the surrogate server firstly and then starting the dispatching is practicable if the selected surrogate server has not stored the request file in advance.

Based on the analysis above, the efficiency optimization to the file delivery in CDN is designing feasible model by which it is more possible that the selected surrogate server for every user has stored the user’s request file in advance and the distance between the selected surrogate server and the user is near as far as possible (Foo et al., 2011). As a result, the optimization is related to the information about the file stored in the surrogate servers and the connections between the users and the selected surrogates for the users with the network loading in consideration.

Both insufficient entire network bandwidth and improper management can result in the appearance of network congestion. When the network congestion can not be avoided by feasible equilibration strategy, the performance of the CDN should be enhanced by the adjustment of the network bandwidth. While the entire network bandwidth satisfies the requirement, appropriate optimization will improve the efficiency of the file delivery. As the problem of insufficient entire network bandwidth can not be thoroughly solved by the optimization, the proposed model in the study is not in consideration of the circumstance.

Combining the two relative factors above, in the optimization model, it is as far as possible that the selected surrogate server for every user has stored the request file in advance and has available network bandwidth to dispatch the file meanwhile.

Fig. 1: Construction of the content delivery network

In order to assure the request file having been stored in the selected surrogate server in advance, the file requirement of users should be achieved beforehand. In the following, the prediction approach to the location the user accessing the CDN and the files the use will require is addressed.

PREDICTION TO THE ACTIVITIES RELATED TO CDN OF THE USER

In reality, precise prediction to the activity about CDN is impossible. However, occurrence of the activity having been predicted occurs more probably, the prediction is more utilizable.

For the user of the CDN, the locations of the user accessing the CDN usually appear with regularity. For example, a user accesses the CDN with a fixed location or specially designated locations. In other words, the nearest surrogates being selected for a user will be also specially designated with regularity and therefore, the selected surrogate for a user is predictable.

The probability of a user’s requirement to every file is usually differentiated sharply. The file request of a user is often relative to social background. For example, the file request of a college student is apparently different to that of a researcher in the same college. In the common circumstances, the categories (categorized according to their attributes) of the requiring files of a user are relative to the categories of the social attributes of the user. A file has been required by a user means the category the file belongs to is relative to the user and then it is much probable that other files of the category will be required by the user. On the other hand, two user has required a file means they has identical attribute which is relative to the category the file belongs to and then it is much probable the files one user of them has required will be required by the other. The relationship can be used to the prediction to the file request of the user. In the prediction approach, the prediction to the file request of a user is based on the historical file request records by which the relations talked about above can be extracted.

To enhance the utilizable of the relationship, the quantitative prediction should be proposed. In order to describe the relationship, F = {f1, f2,……fn} is put forward to denote the set of files the CDN can provide and T = {t1, t2,……tk} is used to denote the set of categories the files can be divided into. As the set of users of CDN is expressed by U = {u1, u2,……,un}, then the relation between a user ui and a file category tj can be defined by the following formula:

(1)

In the formula above, rfu (ui, tj) denote the quantitative relation between ui and tj. nui expresses the number of files which has been required by ui before. Ntj represents the number of files which belong to tj and has been required by ui.

Accordingly, the relationship between the file categories ti and tj can be expressed by the formula as following:

(2)

If a user ui has required the file fi, it is certain that the user ui has requirement to the file fj. To describe the prediction uniformly, the requiring probability of the user ui to the file fj is designated to a fixed value 1. If a user has not required the file fj, the probability of a user ui requiring the file fj in the future can be predicted by the formula below:

(3)

The relation between the user and the file category is combined with the relation between categories in the prediction above. In the formula, λ1 and λ2 is the weight factors of the relations and is the set of categories which fj belongs to. is the set of categories which fj does not belong to.Consequently, the requiring prediction of a user ui to the file fj consists of the relation between ui and fj by the categories which fj belongs to and which fj does not belong to.

If the files a user will require are more probable to be stored in the surrogate selected to serve for the user, the user will achieve the files more quickly. In the following, the description to the file stored in the surrogate servers will be put forward.

DESCRIPTION TO THE FILE STORED IN THE SURROGATE SERVERS

In a designated period of time, the surrogate servers and the files stored in the surrogate servers are stable in the content distribution network. The set of the surrogate servers can be expressed by S = {s1, s2,…,sm} which contains m surrogate servers. Correspondingly, the set of the files stored in the surrogate can be denoted as F = {f1, f2,……,fn} which consists of n files. In the two sets, the subscript of every element is the order number of a file/surrogate server. The order number can also be taken as the ID of the file/surrogate server. The correlation between a file and a surrogate server can be represented by the following formula:

(4)

As a result, the correlation between all files and all surrogate servers forms a matrix Cnxm as follows:

In the CDN system, the storage capacity of a surrogate server is usually restricted. To comfort the requirement of expression, the storage capacity of a surrogate server is defined by the indication SC(si) which denotes the storage capacity of the surrogate server si. Consequently, the feasible scheme of stored files into surrogate servers should base on the following constraint:

(5)

In the formula above, SQ(fj) is the storage capacity requirement of fj. SC(si) is storage capacity of the surrogate server si.

FILE STORAGE DISTRIBUTION ADJUSTMENT MODEL

To optimize the file storage distribution, the ant colony optimization (ACO) (Yang and Zhuang, 2009) is cited to adjust the file distribution in the surrogate servers. In the adjustment model, the bidirectional routes between the elements in the matrix Cnxm are created. If the value of is 0, the bidirectional route are built between the elements cij and cxy. The value of is defined according to the rules in the following formula:

(6)

As described above, the value of is equal to that of which means there is a bidirectional route between cij and cxy. For sake of connecting the file distribution with the users which serve by selected surrogate servers, the heuristic function of ACO is defined as formula 7:

(7)

In the formula, U(si) is the set of users which the surrogate server si is designated to serve to.

In ACO, an ant staying at a node can walk to another node if there is route between the nodes and the movement is permitted. In the adjustment model, cij (1≤j≤m) is permitted to walk to only when the inequality in the formula 5 is tenable. For the description of the adjustment model in the following, the elements which an ant staying at cij is permitted to walk to are expressed by the set:

Allowedij = {cxy|cxy is permited to walk to from cij}

In the procedure of ACO, a group of ants are used to implement the optimization. The set A = {a1, a2,…,aq} is put forward to denote the ant group. Generally, an ant is not permitted to walk to an element which it has walked to in the past. Let the set C(ak) of elements which an ant ak has walk to and then the ant ak staying at cij is permitted to walk to the elements in the following set:

Allowed (ak) = allowedij-allowedij∩C(ak)

Let PT = [0, D] express the time period of an optimization procedure and the start time and the end time are denoted as 0 and D. When ants walk at the elements of the matrix Cnxm, the number of the pheromones phij is put forward to the number of ants which has walked to cij. The phij will be varied continuously from the start time to the end time and phij(pt) is the phij at the time pt(0≤pt≤D). The probability an ant staying at the element cxy will walk to cij can be expressed by the formula 8:

(8)

In the formula above, α is heuristic factor about pheromones. The value of α is bigger comparatively and the phij(pt) is more important and the elements which have achieved higher pheromones will be more probable to be selected to walk to. In other words, the value of α is bigger means the ants are better to collaborate with each other. β is the heuristic factor about the heuristic function and represents the comparative importance of heuristic information (Sadeghzadeh et al., 2011).

In the period of the optimization procedure, the fresh information about the pheromones is more important to optimize continuously. As a result, the outdated information about the pheromones should be weakened with time going. In the adjustment model, phij(pt) is adjusted according to the rule in the formula 9:

(9)

Δphij(Δpt) is the increase value of phij during the period from the time pt to the time pt+Δpt. Accompanying with the variation of the phij(pt), the value of the element cij should be adjusted to according to the updated information. The following is the rule for the element adjustment:

(10)

Corresponding to the description above, the number of the pheromones for every element of the matrix Cnxm will vary continuously with designated number of ants walking according to the rules designed above. With the variation of the number of the pheromones for every element, the value of the elements will be adjusted and the adjustment of the elements will reversely act on the walking of the ants.

DYNAMIC OPTIMIZATION ACCORDING TO THE VARIATION OF THE ACTIVE USERS

The CDN system is always running generally, but not all of the users are active from beginning to end. Consequently, the set of the active users in the running CDN is the subset of all users and the elements are varied continuously. The file storage distribution in surrogate server should conform to the dynamic variation of the active users. Combining with the ACO, the dynamic optimization in consideration with the variation of the active users is necessary in order to enhance the efficiency of the file delivery.

As the computation complexity of the ACO algorithm, it is inefficient that the ACO algorithm is executed directly with the variation of the active users. Using the historical optimization information in consideration of the continuous updating can enhance the efficiency of real-time optimization. In the running period of the CDN system, each optimized matrix Cnxm (which is the optimized file storage distribution in the surrogate servers) and the corresponding set of active users are recorded by a pair denoted as (US, OC). In the pair, oc is the optimized matrix Cnxm and correspondingly us is a vector used to represent the active users in the set consists of all users. The vector US is expressed as US = {us1, us2,……,ush} and the elements are corresponding to the users by order. The value of the usi is defined by the formula 11:

(11)

The similarity between every two vectors used to represent the active users can be calculated by the formula 12:

(12)

The more similar two vectors used to represent the active users is, the corresponding optimized matrix Cnxm will be approximate. Consequently, as US is taken as the information of the active users for achieving the optimized matrix Cnxm, the optimization procedure will be simplified by finding a pair (Usj, Ocj) in which USi is the most similar with Usi in the available pairs. In order to implement the pair selection, the competitive neural network algorithm is put forward. The pair selection procedure is expressed by Fig. 2 (Nie and Cao, 2009).

Initially, there is no available pair. According to the scale of the users, a positive integer S is selected for the competitive network and S pairs are initialized. In each pair, the initial value of the oc is set to Null.

Fig. 2: Pair selection by the competitive neural network algorithm

Fig. 3: Pseudo code for the dynamic optimization procedure

With respect to the values of the US in the pairs, S row vectors of the matrix IMhxh(shown as follows) are randomly selected in consideration of the diversification of the active users. Each of the selected row vector is taken as a US of one pair. The S row vectors and the corresponding pairs are given order numbers for 1 to S by order. The S row vectors are called as prototype vectors:

In the competitive neural network, W is a matrix which is constructed by the S row vectors selected from the matrix above initially (Meyer-Base and Thummler, 2008). A hxh vector US is taken as the input of the competitive network. By the computation of the competitive layer, A Sx1 vector is outputted and only one component of the vector is 1 with the values the other being 0. If the order number of the component with the value of 1 in the outputted vector is f, then the fth row vector of W is the most similar one in the row vectors of the matrix W. The dynamic optimization procedure can be addressed by the following Fig. 3 (Fang et al., 2010).

SIMULATIVE EXPERIMENTS AND EXPERIMENTAL ANALYSIS

According to the requirement of the proposed model, simulative software for efficiency and effectiveness of the proposed model is designed and implemented. Utilizing the software, designated, the activities of the surrogate servers, the users and the source servers along with the dynamic optimization algorithm are simulated.

In order to demonstrate the efficiency of the proposed model, a CDN system with 500 user and 5 surrogate servers are simulated by the simulative software. From the time the system initializing, an optimization procedure triggered by the variation of the active users is selected every a proper period of time. The time cost of the optimization procedures is shown by the Fig. 4 in order of time. The simulative experiments indicate that the time cost of per optimization procedure is larger and unstable at beginning. With the time going, the cost of per optimization procedure reduces and will be comparatively stable at a smaller time cost value.

Fig. 4: Time cost of per optimization procedure by order

Fig. 5: Contrast of the time cost among the systems with different scale of users

The simulative results mean the optimization efficiency is unstable when the competitive neural network has not achieved proper weight matrix. With more proper weight matrix of the competitive neural network being achieving, the optimization efficiency will be enhance and the stable better efficiency will be acquired when the competitive neural network enter in stable state.

The time cost of per optimization procedure is influenced by the scale of the users in the CDN system. The contrast of the time cost among the systems with 200, 500 and 1000 users is demonstrated by the simulative results shown in the Fig. 5.

The simulative experiments indicate that the more users the CDN system has the time cost of per optimization procedure will be larger and more unstable at the starting of the system. With the time going, the time cost of per optimization procedure will be smaller and stable unless the user scale of the system is small or large. Meanwhile, the increase of the time cost of per optimization procedure is comparatively small accompanying with the raise of the user scale when the CDN system becomes stable after running a period of time.

Fig. 6: Contrast of the hit ratio between the proposed model and the stochastic model

Table 1: Parameters in the simulative experiments for testifying the effectiveness

For sake of demonstrating the effectiveness of the proposed model, the simulative CDN systems with the parameters listed by Table 1 are utilized.

When a user sends a file request to the CDN, the file is found in the surrogate servers designated to serve to the user is called a hit and on the contrary, the file is not hit if it is not found in the surrogate servers designated to serve to the user. The hit ratio is the most important parameter to the effectiveness of the proposed model. In contrast to the simulative systems about the proposed model with the configurations listed in Table 1, the simulative systems without the proposed model involved (named as the stochastic model) and with the same considerations listed in Table 1 are implemented. The simulative results shown in Fig. 6 indicate the variation of the hit ratio according to the variation of the number of users and the surrogate servers accompanying with the contrast of the hit ratio between the proposed model and the stochastic model. The hit ratio of the system with the proposed model involved is apparently higher than that of the system with the stochastic model involved as the number of users and the surrogate servers is identical. The hit ratio of the system with the proposed model involved is almost not lessened with the increasing of the number of users and the surrogate servers and contrastively, the hit ratio of the system with the stochastic model involved is sharply lessened with the number of the surrogate servers increasing. Similarly, the proposed model achieves better effectiveness in the optimization and the effectiveness is more obvious when the number of the surrogate servers is bigger.

CONCLUSION

In order to optimize the file storage distribution in the surrogate servers, a dynamic optimizing adjustment model is proposed in which the ant colony optimization algorithm is selected to implement the file storage distribution with the competitive neural network algorithm involved for enhancing the efficiency of the optimization. The simulative experimental results testifies that the proposed model can achieve not only steadily smaller time cost of optimization procedure in consideration of the variation of the user scale but also higher hit ratio of file request.

ACKNOWLEDGMENT

This study was funded by the Science and Technology Department of Tangshan City (No.12140201A-7).

REFERENCES

  • Adler, M., R.K. Sitaraman and H. Venkataramani, 2011. Algorithms for optimizing the bandwidth cost of content delivery. Computer Networks, 55: 4007-4020.
    CrossRef    Direct Link    


  • Borst, S., V. Gupta and A. Walid, 2009. Self-organizing algorithms for cache cooperation in content distribution networks. Bell. Labs. Technical. J., 14: 113-125.
    CrossRef    Direct Link    


  • Calafate, C.T., G. Fortino, S. Fritsch, J. Monteiro and J.C. Cano et al., 2012. An efficient and robust content delivery solution for IEEE 802.11p vehicular environments. J. Network. Comput. Applic., 35: 753-762.
    CrossRef    Direct Link    


  • Costa, F., L. Silva, G. Fedak and I. Kelley, 2008. Optimizing data distribution in desktop grid platforms. Parall. Proces. Lett., 18: 391-410.
    CrossRef    Direct Link    


  • Di, S. and C.L. Wang, 2013. Dynamic optimization of multiattribute resource allocation in self-organizing clouds. Trans. Paral. Distrib. Syst., 24: 464-478.
    CrossRef    Direct Link    


  • Foo, B., D.S. Turaga, O. Verscheure, M. van der Schaar and L. Amini, 2011. Configuring trees of classifiers in distributed multimedia stream mining systems. IEEE Trans. Circuits Syst. Video Technol., 21: 245-258.
    CrossRef    


  • Gao, Q., L. Fei, J. Zhang and X. Peng, 2010. Performance optimisation of a medium access control protocol with multiple contention slots in multiple-input multiple-output ad hoc networks. IET. Communic., 4: 562-572.
    CrossRef    Direct Link    


  • Halinger, G. and F. Hartleb, 2011. Content delivery and caching from a network provider's perspective. Computer Networks, 55: 3991-4006.
    CrossRef    Direct Link    


  • Javidi, T., 2008. Cooperative and non-cooperative resource sharing in networks: A delay perspective. Trans. Automatic Contr., 53: 2134-2142.
    CrossRef    Direct Link    


  • Martins, J.L. and S. Duarte, 2010. Routing algorithms for content-based publish/subscribe systems. J. IEEE Communi. Surv. Tutorials, 12: 39-58.
    CrossRef    


  • Peng, Z., 2011. Implementation of optimal pacing scheme in xinjiang's oil and gas pipeline leak monitoring network. J. Networks, 6: 54-61.
    CrossRef    Direct Link    


  • Rossi, M., N. Bui and M. Zorzi, 2009. Cost-and collision-minimizing forwarding schemes for wireless sensor networks: Design, analysis and experimental validation. Trans. Mobile Comput., 8: 322-337.
    CrossRef    Direct Link    


  • Sahagun, R.L., S.Q. Ren, H.S. Beng and K.M.M. Aung, 2012. Development of intelligent network storage system with adaptive decision-making. Int. J. Adv. Comput. Technol., 4: 122-131.
    CrossRef    Direct Link    


  • Thomos, N., J. Chakareski and P. Frossard, 2011. Prioritized distributed video delivery with randomized network coding. Trans. Multimedia, 13: 776-787.
    CrossRef    Direct Link    


  • Verhoeyen, M., J.D. Vriendt and D.D. Vleeschauwer, 2012. Optimizing for video storage networking with recommender systems. Bell. Labs. Technic. J., 16: 97-113.
    CrossRef    Direct Link    


  • Wu, J.J., Y.F. Lin, D.W. Wang and C.M. Wang, 2009. Optimizing server placement for parallel I/O in switch-based clusters. J. Parall. Distribut. Comput., 69: 266-281.
    CrossRef    Direct Link    


  • Yang, J. and Y. Zhuang, 2010. An improved ant colony optimization algorithm for solving a complex combinatorial optimization problem. Applied Soft Comput. J., 10: 653-660.
    CrossRef    Direct Link    


  • Sadeghzadeh, M., M. Teshnehlab and K. Badie, 2011. Feature selection using combine of genetic algorithm and Ant Colony Optimization. Adv. Intellig. Soft Comput., 75: 127-135.
    CrossRef    Direct Link    


  • Nie, X. and J. Cao, 2009. Multistability of competitive neural networks with time-varying and distributed delays. Nonlinear Anal. Real World Applic., 10: 928-942.
    CrossRef    


  • Meyer-Base, A. and V. Thummler, 2008. Local and global stability analysis of an unsupervised competitive neural network. IEEE Trans. Neural Networks, 19: 346-351.
    CrossRef    Direct Link    


  • Fang, Y., M.A. Cohen and T.G. Kincaid, 2010. Dynamic analysis of a general class of winner-take-all competitive neural networks. Trans. Neural Networks, 21: 771-783.
    CrossRef    Direct Link    

  • © Science Alert. All Rights Reserved