Browse Definitions :
Definition

byte caching

Contributor(s): Matthew Haughn

Byte caching is a technique used to replace repeated sequences in raw application data with shorter tokens in order to conserve bandwidth. The method is also known as dictionary compression, network sequence caching and transparent data reduction.

Byte caching is also used to eliminate the need for duplicated data transmissions in situations where repetitious data is sent back and forth, as a means of streamlining network performance.

This boost in performance is achieved through the use of a WAN optimization storage device. The device breaks data down into chunks and labels these chunks with a hash that is a smaller amount of representational data. The hashes are then sent first for comparison to data existing on the other end of a WAN optimization tunnel. If the data represented by these hashes is already present on the WAN optimization storage device on the receiving end, the data is not sent. If the hash is not found to be present, the data is repackaged to be downloaded.

Byte caching is often used in enterprises where mass business communications and file transfers are common, as well as in data center disk synchronization.

Data transmission reductions can be as great as 30-50 per cent, depending on the data that is sent. It is important to note that byte caching is only effective in situations where there is repetitious data being transmitted.

This was last updated in April 2015

Continue Reading About byte caching

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

SearchSecurity

  • RSA algorithm (Rivest-Shamir-Adleman)

    The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security ...

  • remote access

    Remote access is the ability to access a computer or a network remotely through a network connection.

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close