Flow caching effectiveness in packet forwarding applications
نویسندگان
چکیده
منابع مشابه
Reliable Packet Forwarding with Reduced Delay Using DTN-Flow
Present day Internet conventions show wasteful execution in those systems .where the availability between end hubs has discontinuous property because of element topology or asset imperatives. System situations where the hubs are described by operation opportunistic availability are alluded to as Delay Tolerant Networks (DTNs). Exceedingly usable in various pragmatic applications, for example, l...
متن کاملPacket Forwarding Using Xen
Network virtualization allows the development of systems with several virtual routers (VR) over the same physical router. Each virtual router can execute, at the same time, different protocol stacks without disrupting the coexisting routers. The main purpose of this work is to analyze Xen capabilities and limitations and compare its efficiency with native solutions. Tests are performed in order...
متن کاملRethinking Packet Forwarding Hardware
For routers and switches to handle ever-increasing bandwidth requirements, the packet “fast-path” must be handled with specialized hardware. There have been two approaches to building such packet forwarding hardware. The first is to embed particular algorithms in hardware; this is what most commodity forwarding chips do (e.g., those from Broadcom, Marvell, and Fulcrum). These chips have led to ...
متن کاملLecture 11: Packet forwarding
This week we’ll talk about the data plane. Recall that the routing layer broadly consists of two parts: (1) the control plane that computes routes using distributed protocols such as the distance vector and link state protocols, and (2) the data plane that forwards packets based on routes computed by these protocols. The control plane kicks in every time the topology changes (e.g., a new router...
متن کاملPacket forwarding with source verification
Routers in the Internet do not perform any verification of the source IP address contained in the packets, leading to the possibility of IP spoofing. The lack of such verification opens the door for a variety of vulnerabilities, including denial-of-service (DoS) and man-in-the-middle attacks. Currently proposed spoofing prevention approaches either focus on protecting only the target of such at...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Science
سال: 2019
ISSN: 1508-2806
DOI: 10.7494/csci.2019.20.2.3185