Feeds

Google Apache mod speeds into outside world

Fastsoft on Gooroids

Intelligent flash storage arrays

Though Google is loath to open source the foundations of its massive online infrastructure, it does share code for tools at the edge of its network, tools designed to accelerate the actual delivery of web stuff. Mountain View doesn't want Facebook rebuilding the Googlenet. But it is intent on accelerating the web as a whole. Ultimately, this juices the Google bottom line.

In June 2009, Google unveiled SPDY, an application layer protocol designed to improve the speed of the existing HTTP protocol, and last fall, it open sourced something it rather inelegantly calls mod_pagespeed, an Apache web server module that accelerates page delivery by optimizing content as it is served. It's yet to been seen how widely either will be used, but both are making at least some headway outside the Googleplex.

SPDY has turned up inside multiple operations – including a website acceleration service known as Strangeloop and the Israel-based content delivery network Cotendo – and mod_pagespeed is finding its own way as well.

Fastsoft – a Pasadena, California company offering hardware appliances and software that speed the delivery of beefy internet content – is working to roll mod_pagespeed into its existing technologies. This outfit has built a prototype that pairs mod_pagespeed with its own software on the same server, and according to chief technology officer Cheng Jin, the aim is to "jointly optimize" the two tools and release them as a single product.

Based on work that originated with Jin and mentor Steven Low at the California Institute of Technology, Fastsoft's existing software seeks to optimize the operation of good old TCP solely from the server side. In essence, the technology takes algorithms that economists have traditionally used to better allocate physical resources among human beings and applies them to internet applications trying to share bandwidth among client machines.

"If you look at the network resource allocation and resource sharing problem, it's very similar to an existing problem in economics, where you have a fixed resource to be shared among multiple people," Jin tells The Register. "With TCP, you have all these application users sharing a limited resource: bandwidth."

With raw TCP, he explains, end user machines operate in their own self interest, without really considering the behavior of other machines. FastSoft seeks to accelerate the content delivery by encouraging users to pull in the same direction.

"You have all these parties, individual application users, trying to figure out how many resources they're going to take, and each one is optimizing based on his own objective or utility, rather than optimizing for some global objective," Jin says. "What we do is look for a reasonably fair allocation of bandwidth for all users."

Cheng Jin

Cheng Jin

The mod_pagespeed tool is a natural compliment to this effort. Google's open source Apache module optimizes page caching, minimizes client-server round trips, and reduces payload size for websites. It rejigs what objects go into a page and the content of each object. Once this is done, FastSoft can work to facilitate the actual transfer. "modpagespeed deals with how the content is put together," Jin says, "Then our job is to overcome issues such as packet loss, latency, and congestion."

When mod_pagespeed was first unveiled, Google said it was working with web hosting service GoDaddy to run the technology with customer websites, and Contendo, the Israeli CDN, has also embraced the module, alongside SPDY. Ultimately, FastSoft will take the technology to CDNs as well. The company recently inked a deal to supply appliances for the Los Angeles-based content delivery network NetDNA.

According to Jin, FastSoft's mod_pagespeed prototype was built independently of Google, though the two have since discussed the project. So, yes, there are at least some cases where Google is happy to open source its back-end work – and chat about it too. But the big secrets are still secrets. ®

Beginner's guide to SSL certificates

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.