Abstract. Several important network applications cannot easily scale to higher data rates without requiring focusing just on the large traffic flows. Recent works have discussed algorithmic solutions that trade-off accuracy to gain efficiency for filtering and tracking the so-called “heavy-hitters”. However, a major limit is that flows must initially go through a filtering process, making it impossible to track state associated with the first few packets of the flow. In this paper, we propose a different paradigm in tracking the large flows which overcomes this limit. We view the problem as that of managing a small flow cache with a finely tuned replacement policy that strives to avoid evicting the heavy-hitters. Our scheme starts from reco...
In the context of a collaborating surveillance system for active TCP sessions handled by a networkin...
Abstract—Cache replacement policies are developed to help insure optimal use of limited resources. V...
Knowledge of the largest traffic flows in a network is im-portant for many network management applic...
Several important network applications cannot easily scale to higher data rates without requiring fo...
Abstract—A flow cache is a fundamental building block for flow-based traffic processing. Its efficie...
Flow-based network traffic processing, that is, processing packets based on some state information a...
The thesis deals with optimization of network flow monitoring. Flow-based network traffic processing...
Digest caches have been proposed as an effective method tospeed up packet classification in network ...
The most common and generally best performing replacement algorithm in modern caches is LRU. Despite...
This paper presents an FPGA-friendly approach to tracking elephant flows in network traffic. Our app...
Meeting the service demands from QoS-based network applications is a very challenging task performed...
Routing algorithms are known to be a potential bottleneck for packet processing. Network flow cachin...
Although directory-based write-invalidate cache coherence protocols have a potential to improve th...
This paper proposes a novel methodology for cache replacement policy based on techniques of genetic ...
Concerns regarding the scalability of the interdomain routing have encouraged researchers to start e...
In the context of a collaborating surveillance system for active TCP sessions handled by a networkin...
Abstract—Cache replacement policies are developed to help insure optimal use of limited resources. V...
Knowledge of the largest traffic flows in a network is im-portant for many network management applic...
Several important network applications cannot easily scale to higher data rates without requiring fo...
Abstract—A flow cache is a fundamental building block for flow-based traffic processing. Its efficie...
Flow-based network traffic processing, that is, processing packets based on some state information a...
The thesis deals with optimization of network flow monitoring. Flow-based network traffic processing...
Digest caches have been proposed as an effective method tospeed up packet classification in network ...
The most common and generally best performing replacement algorithm in modern caches is LRU. Despite...
This paper presents an FPGA-friendly approach to tracking elephant flows in network traffic. Our app...
Meeting the service demands from QoS-based network applications is a very challenging task performed...
Routing algorithms are known to be a potential bottleneck for packet processing. Network flow cachin...
Although directory-based write-invalidate cache coherence protocols have a potential to improve th...
This paper proposes a novel methodology for cache replacement policy based on techniques of genetic ...
Concerns regarding the scalability of the interdomain routing have encouraged researchers to start e...
In the context of a collaborating surveillance system for active TCP sessions handled by a networkin...
Abstract—Cache replacement policies are developed to help insure optimal use of limited resources. V...
Knowledge of the largest traffic flows in a network is im-portant for many network management applic...