PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
  • Sesja wygasła!
Tytuł artykułu

Flow caching effectiveness in packet forwarding applicati

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Routing algorithms are known to be potential bottlenecks for packet processing. Network ow caching can function as a general acceleration technique for packet processing workloads. The goal of this article is to evaluate the effectiveness of packet ow caching techniques in high-speed networks. The area of focus is the data distribution characteristics that lead to the effectiveness of caching network ows (connections). Based on a statistical analysis and simulations, the article sets the necessary conditions for the effective use of caches in packet forwarding applications. Public domain network traces were examined and measured for data locality. Software simulations show a strong correlation between the ow packet distance metrics and the cache hit rate.
Słowa kluczowe
Wydawca
Czasopismo
Rocznik
Strony
145--163
Opis fizyczny
Bibliogr. 39 poz., rys., tab.
Twórcy
  • AGH University of Science and Technology
autor
  • AGH University of Science and Technology, Faculty of Computer Science, Electronics and Telecommunications, al. Mickiewicza 30, 30-059 Kraków
Bibliografia
  • [1] Adamic L., Huberman B.: Zipf's law and the Internet, Glottometrics, vol. 3, pp. 143-150, 2002.
  • [2] Al-Zoubi H., Milenkovic A., Milenkovic M.: Performance Evaluation of Cache Replacement Policies for the SPEC CPU2000 Benchmark Suite. In: Proceedings of the 42nd annual Southeast regional conference, ACM, pp. 267-272, 2004.
  • [3] Asai H., Ohara Y.: Poptrie: A Compressed Trie with Population Count for Fast and Scalable Software IP Routing Table Lookup, 2015. http://dx.doi.org/1 0.1145/2785956.2787474.
  • [4] Beckmann N., Sanchez D.: Talus: A simple way to remove cliffs in cache performance. In: 2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA), pp. 64-75, 2015. http://dx.doi.org/10.1109 /HPCA.2015.7056022.
  • [5] Bhuvaneswaran V., Basil A., Tassinari M., Manral V., Banks S.: Benchmarking Methodology for Software-Defined Networking (SDN) Controller Performance. RFC 8456 (Informational), 2018. http://dx.doi.org/10.17487/RFC8456.
  • [6] Bhuvaneswaran V., Basil A., Tassinari M., Manral V., Banks S.: Terminology for Benchmarking Software-Defined Networking (SDN) Controller Performance. RFC 8455 (Informational), 2018. http://dx.doi.org/10.17487/RFC8455.
  • [7] Borgnat P., Dewaele G., Fukuda K., Abry P., Cho K.: Seven Years and One Day: Sketching the Evolution of Internet Traffic. In: IEEE INFOCOM 2009, pp. 711-719, 2009. https://doi.org/10.1109/INFCOM.2009.5061979.
  • [8] Cho K., Mitsuya K., Kato A.: Traffic Data Repository at the WIDE Project. In: Proceedings of USENIX 2000 Annual Technical Conference: FREENIX Track, pp. 263-270, 2000.
  • [9] Ciftlikli C., Gezer A., Tuncay Oz_sahin A.: Packet traffic features of IPv6 and IPv4 protocol traffic, Turkish Journal of Electrical Engineering and Computer Sciences, vol. 20, pp. 727-749, 2012. https://doi.org/10.3906/elk-1008-696.
  • [10] Claise B. (ed.): Cisco Systems NetFlow Services Export Version 9. RFC 3954 (Informational), 2004. https://doi.org/10.17487/RFC3954.
  • [11] Cleary J., Graham I., McGregor T., Pearson M., Ziedins L., Curtis J., Donnelly S., Martens J., Martin S.: High precision traffic measurement, IEEE Communications Magazine, vol. 40(3), pp. 167-173, 2002.
  • [12] Congdon P.T., Mohapatra P., Farrens M., Akella V.: Simultaneously Reducing Latency and Power Consumption in OpenFlow Switches, IEEE/ACM Transactions on Networking (TON), vol. 22(3), pp. 1007-1020, 2014.
  • [13] Dainotti A., Pescape A., Rossi P.S., Palmieri F., Ventre G.: Internet traffic modeling by means of Hidden Markov Models, Computer Networks, vol. 52(14), pp. 2645-2662, 2008.
  • [14] Dainotti A., Pescape A., Ventre G.: A cascade architecture for DoS attacks detection based on the wavelet transform, Journal of Computer Security, vol. 17(6), pp. 945-968, 2009.
  • [15] Feldmeier D.C.: Improving gateway performance with a routing-table cache. In: IEEE INFOCOM'88, Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution? New Orleans, LA, USA, pp. 298-307, 1988.
  • [16] Gupta P., McKeown N.: Algorithms for Packet Classification, IEEE Network, vol. 15(2), pp. 24-32, 2001. https://doi.org/10.1109/65.912717.
  • [17] git.kernel.org, ipv4: Delete routing cache. https://git.kernel.org/pub/scm/l inux/kernel/git/davem/net-next.git/commit/?id=89aef8921bfbac22f00e 04f8450f6e447db13e42.
  • [18] IEEE Standard for Information Technology - Telecommunications and Information Exchange Between Systems - Local and Metropolitan Area Networks - Specific Requirements Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications Amendment: Media Access Control (MAC) Parameters, Physical Layers, and Management Parameters for 10 Gb/S Operation. In: IEEE Std 802.3ae-2002 (Amendment to IEEE Std 802.3-2002), pp. 271-272, 2002. https://doi.org/10.1109/IEEEST D.2002.94131.
  • [19] Katta N., Alipourfard O., Rexford J., Walker D.: Rule-Caching Algorithms for Software-Defined Networks. In: Techical Report, Princeton University, 2014.
  • [20] Kim N., Jean S., Kim J., Yoon H.: Cache replacement schemes for datadriven label switching networks. In: 2001 IEEE Workshop on High Performance Switching and Routing (IEEE Cat. No.01TH8552), pp. 223-227, 2001. http://dx.doi.org/10.1109/HPSR.2001.923636.
  • [21] LBNL/ICSI Enterprise Tracing Project. http://www.icir.org/enterprise-tr acing/download.html.
  • [22] McKeown N., Anderson T., Balakrishnan H., Parulkar G., Peterson L., Rexford J., Shenker S., Turner J.: OpenFlow: Enabling Innovation in Campus Networks, SIGCOMM Computer Communication Review, vol. 38(2), pp. 69-74, 2008. https://doi.org/10.1145/1355734.1355746.
  • [23] Naples University traffic traces, Trace 1 14th June 2004 11:00-12:00. http://traffic.comics.unina.it/Traces/ttraces.php.
  • [24] Network Traffic Characteristics of Data Centers in the Wild. Association for Computing Machinery, Inc., 2010. https://www.microsoft.com/en-us/research /publication/network-traffic-characteristics-of-data-centers-in-th e-wild/.
  • [25] NumPy, scientific computing with Python. https://www.numpy.org/.
  • [26] Okuno M., Nishimura S., Ishida S.i., Nishi H.: Cache-Based Network Processor Architecture: Evaluation with Real Network Traffic, IEICE transactions on electronics, vol. 89(11), pp. 1620-1628, 2006.
  • [27] Pang R., Allman M., Paxson V., Lee J.: The devil and packet trace anonymization, ACM SIGCOMM Computer Communication Review, vol. 36(1), pp. 29-38, 2006.
  • [28] Park K., Kim G., Crovella M.: On the Effect of Traffic Self-similarity on Network Performance. In: Proceedings Volume 3231, Performance and Control of Network Systems, 1997.
  • [29] Paxson V.: Bro: A System for Detecting Network Intruders in Real-Time, Computer Networks, vol. 31(23-24), pp. 2435-2463, 1999. https://doi.org/10.101 6/S1389-1286(99)00112-7.
  • [30] PcapPlusPlus, a multiplatform C++ network sniffing and packet parsing and crafting framework. https://seladb.github.io/PcapPlusPlus-Doc/.
  • [31] Pfaff B., Pettit J., Koponen T., Jackson E., Zhou A., Rajahalme J., Gross J., Wang A., Stringer J., Shelar P., Amidon K., Casado M.: The Design and Implementation of Open vSwitch. In: 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15), pp. 117-130. USENIX Association, Oakland, CA, 2015. https://www.usenix.org/conference/nsdi15/technical-s essions/presentation/pfaff.
  • [32] Powell M.D., Agarwal A., Vijaykumar T., Falsafi B., Roy K.: Reducing Set--Associative Cache Energy via Way-Prediction and Selective Direct-Mapping. In: Proceedings of the 34th annual ACM/IEEE international symposium on Microarchitecture, pp. 54-65, IEEE Computer Society, 2001.
  • [33] Security Architecture for the Internet Protocol. https://tools.ietf.org/htm l/rfc430.
  • [34] Sikdar B., Vastola K.S.: The Effect of TCP on the Self-Similarity of Network Traffic. In: Proceedings of the 35th Conference on Information Sciences and Systems, pp. 21-23, 2001.
  • [35] Srisuresh P., Holdrege M.: IP Network Address Translator (NAT) Terminology and Considerations. RFC 2663 (Informational), 1999. http://dx.doi.org/10. 17487/RFC2663.
  • [36] Su C.L., Despain A.M.: Cache design trade-offs for power and performance optimization: a case study. In: Proceedings of the 1995 international symposium on Low power design, pp. 63-68. ACM, 1995.
  • [37] TheCAIDA UCSDAnonymized Internet Traces 2014-2018. http://www.caida. org/data/passive/passive 2014 dataset.xml.
  • [38] WIDE project. http://mawi.wide.ad.jp/mawi/.
  • [39] WITS: Waikato Internet Traffic Storage. https://wand.net.nz/wits/.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-df859b3b-89f0-410a-882c-c2e43a6a62b5
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.