Flow Monitoring in High-Speed Networks with 2D Hash Tables
نویسندگان
چکیده
Flow monitoring is a required task for a variety of networking applications including fair scheduling and intrusion/anomaly detection. Existing flow monitoring techniques are implemented in software, which are insufficient for real-time monitoring in high-speed networks. In this paper, we present the design of a flow monitoring scheme based on two-dimensional hash tables. By virtue of a second dimension and taking advantages of FPGAs, we exploit the use of parallelism for both accuracy and performance. We present four techniques based on this two-dimensional hash table scheme. Using a simulation environment that processes packet traces, our implementation can find flow information within 8% of the actual value while achieving link speeds exceeding 60 Gbps for a workload with constant packet sizes of 40 bytes.
منابع مشابه
Flow Monitoring in High-Speed Networks using Two Dimensional Hash Tables
Flow monitoring is a required task for a variety of networking applications including fair scheduling and intrusion/anomaly detection. However, due to the complexities of implementing efficient flow monitoring hardware, most routers do not implement hardware-based flow monitoring. Existing flow monitoring techniques are implemented in software, which cannot be utilized for realtime monitoring i...
متن کاملA Survey of Hash Tables with Summaries for IP Lookup Applications
Efficient IPv6 packet forwarding is still a major bottleneck in todays networks. Especially in the internet core we are faced with very large routing tables and a high number of high-speed links. In addition economical restrains exist in terms of manufacturing and operation costs. So demand is high for efficient IPv6 packet forwarding mechanisms. In the last few years a lot of work has been don...
متن کاملExploiting Traffic Localities for Efficient Flow State Lookup
Flow state tables are an essential component for improving the performance of packet classification in network security and traffic management. Generally, a hash table is used to store the state of each flow due to its fast lookup speed. However, hash table collisions can severely reduce the effectiveness of packet classification using a flow state table. In this paper, we propose three schemes...
متن کاملLocation-aware In-Network Monitoring in Wireless Sensor Networks
This paper presents a data-centric and location-aware procedure to perform in-network evaluation of queries in sensor networks. The algorithm is a hybrid of geographic hash tables and in-network aggregation. It increases data availability and accounts for topology changes and generates mostly local network traffic.
متن کاملHigh-Speed Event Counting and Classification Using a Dictionary Hash Technique
This paper presents a \dictionary hash" technique that, when presented with a large group of labeled events, can stochastically determine the number of unique labels quickly and with a small amount of memory. This technique is applicable to areas such as signal processing, process monitoring and control, and computer communications network monitoring and control. As a speciic example, this pape...
متن کامل