Flow Monitoring in High-Speed Networks with 2D Hash Tables

نویسندگان

  • David Nguyen
  • Joseph Zambreno
  • Gokhan Memik
چکیده

Flow monitoring is a required task for a variety of networking applications including fair scheduling and intrusion/anomaly detection. Existing flow monitoring techniques are implemented in software, which are insufficient for real-time monitoring in high-speed networks. In this paper, we present the design of a flow monitoring scheme based on two-dimensional hash tables. By virtue of a second dimension and taking advantages of FPGAs, we exploit the use of parallelism for both accuracy and performance. We present four techniques based on this two-dimensional hash table scheme. Using a simulation environment that processes packet traces, our implementation can find flow information within 8% of the actual value while achieving link speeds exceeding 60 Gbps for a workload with constant packet sizes of 40 bytes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Flow Monitoring in High-Speed Networks using Two Dimensional Hash Tables

Flow monitoring is a required task for a variety of networking applications including fair scheduling and intrusion/anomaly detection. However, due to the complexities of implementing efficient flow monitoring hardware, most routers do not implement hardware-based flow monitoring. Existing flow monitoring techniques are implemented in software, which cannot be utilized for realtime monitoring i...

متن کامل

A Survey of Hash Tables with Summaries for IP Lookup Applications

Efficient IPv6 packet forwarding is still a major bottleneck in todays networks. Especially in the internet core we are faced with very large routing tables and a high number of high-speed links. In addition economical restrains exist in terms of manufacturing and operation costs. So demand is high for efficient IPv6 packet forwarding mechanisms. In the last few years a lot of work has been don...

متن کامل

Exploiting Traffic Localities for Efficient Flow State Lookup

Flow state tables are an essential component for improving the performance of packet classification in network security and traffic management. Generally, a hash table is used to store the state of each flow due to its fast lookup speed. However, hash table collisions can severely reduce the effectiveness of packet classification using a flow state table. In this paper, we propose three schemes...

متن کامل

Location-aware In-Network Monitoring in Wireless Sensor Networks

This paper presents a data-centric and location-aware procedure to perform in-network evaluation of queries in sensor networks. The algorithm is a hybrid of geographic hash tables and in-network aggregation. It increases data availability and accounts for topology changes and generates mostly local network traffic.

متن کامل

High-Speed Event Counting and Classification Using a Dictionary Hash Technique

This paper presents a \dictionary hash" technique that, when presented with a large group of labeled events, can stochastically determine the number of unique labels quickly and with a small amount of memory. This technique is applicable to areas such as signal processing, process monitoring and control, and computer communications network monitoring and control. As a speciic example, this pape...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004