Next: Problems
Up: Motivation
Previous: Motivation
As commercial interest in the Internet grows, more and more ISPs
offer Web hosting services.
They host and provide access to objects
belonging to third-party information providers.
Figure 1 shows a typical architecture
of such service. The backbone exchanges traffic with the outside
Internet only via backbone nodes that contain border routers, also
known as Internet Gateway Routers (IGRs).
For performance reasons, Web proxies are located at the nodes with
IGRs.
When clients
ask for the IP address of a web site hosted by the ISP, instead of
returning the IP address of the server, the ISP's DNS server
returns the IP address of a proxy. Thus, client requests are transparently
delivered to proxies, which return requested objects either from their
caches or after fetching the objects from the content server(s).
Since these proxies are conceptually close to and under the same
administrative control as the content servers, they are often called
reverse proxies.
For the compactness of presentation we will equate an IGR with its
co-located proxy in this paper, with the understanding that in
reality these are two separate devices on the same LAN.
Figure 1:
Reverse Proxy Caching
 |
Reverse proxies can be cooperative: when the proxy processing a
request does not not have the requested object
but other proxies have valid copies, the first proxy can get the object from
others, service the request, and cache the object. Similar to other
cooperative caching, there are a number of ways for reverse proxies to track
the location of cached objects:
- Probing: proxies can send Internet Cache Protocol (ICP) query messages to all fellow
proxies to learn if they have a particular document [4].
- Directory: there could be a centralized directory, which holds the
location information of all the proxies and all proxies may consult with it.
- Summary cache: each proxy maintains a compact summary of cache directory
of every other proxy, and summaries will get updated from time to time. A
query message will only be sent to those proxies whose summary suggests they
could have a copy [6].
Next: Problems
Up: Motivation
Previous: Motivation
Limin Wang
2/20/2000