Академический Документы
Профессиональный Документы
Культура Документы
implementations to support proposed protocols. In a long later from update. We used port mirror technique on switch
period, there solution will achieve a good consistency with which connects these servers. The Switch make mirror port
cache, however, deployment is very hard on the grounds that for each web server and nameserver port. Then trace PC was
replacing current running server software is not easy. connected to mirror port.[Fig. 4]
4. Evaluation
We implemented prototype that equipped with proposed
function so that evaluate effectiveness of this mechanism.
This prototype only has simple interface which could specify
record to change and time for modification. This method
aims to achieves cache consistency, but in the other hands, it
increases the number of queries because of less cache TTL.
In order to evaluate this trade-off, we focused on DNS
query packets which ask our web server’s address, and
correspondent HTTP access likewise. Then, we updated a
record which is the most asked record in the zone,
www.sfc.wide.ad.jp. Since its default cache TTL is 1
hour(3600sec), we tapped from one hours ago to two hours
Figure 5. Number of TCP SYN to web server, in fixed
68 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 1, January 2010
cache TTL
Figure 6. Number of TCP SYN to web server, in adaptive Figure 7. Number of DNS query to name server
cache TTL
4.2 Packet Trace on Name Server 6. Acknowledgement
Fig. 7 presents a number of DNS query packet to name We appreciate Jun Murai, Osamu Nakamura, Hiroyuki
server. Black bar shows number of query in case that used Kusumoto for great advises and suggestions. This work is
fixed cache TTL, and white is adaptive cache TTL. supported by grants from WIDE project and Keio University
An increase in query can be observed at 2000 – 3000 second Murai Lab.
after from update. It is roughly two times from fixed cache,
and increasing was disappeared after elapsed time of TTL. References
According to this result, it is entirely fair to say that there is
no critical traffic burst to DNS server. [1] Berkeley Internet Name Domain(BIND), Internet
Systems Consortium, http://www.isc.org
5. Conclusion [2] P. B. Danzig and K. Obraczka and A. Kumar, An
We proposed an adaptive cache TTL adjustment mechanism analysis of wide-area name server traffic, ACM Comp.
to provide consistency between cached record and original Commun. Review (SIGCOMM’92), Conference Proc.
record in authoritative server. To investigate effectiveness of [3] Jaeyeon Jung, Emil Sit, Hari Balakrishnan and Robert
this propose, we have demonstrated prototype and gathered Morris, DNS Performance and the Effectiveness of
related traffic:(1) queries to DNS server (2)HTTP traffic led Caching, Proceedings of the ACM SIGCOMM Internet
by changed record. And we explained observed effect for MeasurementWorkshop 2001
this mechanism, and proved effectiveness of this propose. [4] Various DNS service implementations generate
Adaptive cache TTL Adjustment achieves the superior DNS multiple simultaneous queries for the same resource
cache consistency without critical scalability crisis. record, US-CERT Vulnerability Note VU#457875,
Actually, clients don’t always obey TTL. Sometimes http://www.kb.cert.org/vuls/id/457875
operating system (and resolver library) keeps DNS records [5] Xin Chen, Haining Wang, Shansi Ren, DNScup:
even if their TTL expired. For example, old windows Strong Cache Consistency Protocol for DNS,
clients(windows98 and earlier) keep name cache for almost Distributed Computing Systems, 2006. ICDCS 2006.
30 minute regardless their TTL. Linux clients which uses 26th IEEE International Conference
Name Server Cache Daemon(nscd) keep it for 15 minute. In [6] Edith Cohen and Haim Kaplan, Proactive Caching of
addition to this, several applications also hold records. Old DNS Records: Addressing a Performance Bottleneck,
Internet explorer carries them for 30 minute. SAINT2001.
Since there are several name server implementations,
behavior of each cache servers is different. Nevertheless, we
don’t have anymethods to estimate implementation for each
queries.
There is room for further investigation to get detailed
behavior.
(IJCNS) International Journal of Computer and Network Security, 69
Vol. 2, No. 1, January 2010
Authors Profile