Several important network applications cannot easily scale to higher data rates without requiring focusing just on the large traffic flows. Recent works have discussed algorithmic solutions that trade-off accuracy to gain efficiency for filtering and tracking the so-called "heavy-hitters". However, a major limit is that flows must initially go through a filtering process, making it impossible to track state associated with the first few packets of the flow. In this paper, we propose a different paradigm in tracking the large flows which overcomes this limit. We view the problem as that of managing a small flow cache with a finely tuned replacement policy that strives to avoid evicting the heavy-hitters. Our scheme starts from recorded traff...
International audienceDue to the varying and dynamic characteristics of network traffic, the analysi...
Software distributed shared memory (DSM) platforms on networks of workstations tolerate large networ...
Abstract—Many network devices such as routers and firewalls employ caches to take advantage of tempo...
Abstract. Several important network applications cannot easily scale to higher data rates without re...
Abstract—A flow cache is a fundamental building block for flow-based traffic processing. Its efficie...
The thesis deals with optimization of network flow monitoring. Flow-based network traffic processing...
Digest caches have been proposed as an effective method tospeed up packet classification in network ...
The most common and generally best performing replacement algorithm in modern caches is LRU. Despite...
This paper presents an FPGA-friendly approach to tracking elephant flows in network traffic. Our app...
Meeting the service demands from QoS-based network applications is a very challenging task performed...
Routing algorithms are known to be a potential bottleneck for packet processing. Network flow cachin...
Concerns regarding the scalability of the interdomain routing have encouraged researchers to start e...
This paper proposes a novel methodology for cache replacement policy based on techniques of genetic ...
Although directory-based write-invalidate cache coherence protocols have a potential to improve the ...
Reliably tracking large network flows in order to determine so-called elephant flows, also known as ...
International audienceDue to the varying and dynamic characteristics of network traffic, the analysi...
Software distributed shared memory (DSM) platforms on networks of workstations tolerate large networ...
Abstract—Many network devices such as routers and firewalls employ caches to take advantage of tempo...
Abstract. Several important network applications cannot easily scale to higher data rates without re...
Abstract—A flow cache is a fundamental building block for flow-based traffic processing. Its efficie...
The thesis deals with optimization of network flow monitoring. Flow-based network traffic processing...
Digest caches have been proposed as an effective method tospeed up packet classification in network ...
The most common and generally best performing replacement algorithm in modern caches is LRU. Despite...
This paper presents an FPGA-friendly approach to tracking elephant flows in network traffic. Our app...
Meeting the service demands from QoS-based network applications is a very challenging task performed...
Routing algorithms are known to be a potential bottleneck for packet processing. Network flow cachin...
Concerns regarding the scalability of the interdomain routing have encouraged researchers to start e...
This paper proposes a novel methodology for cache replacement policy based on techniques of genetic ...
Although directory-based write-invalidate cache coherence protocols have a potential to improve the ...
Reliably tracking large network flows in order to determine so-called elephant flows, also known as ...
International audienceDue to the varying and dynamic characteristics of network traffic, the analysi...
Software distributed shared memory (DSM) platforms on networks of workstations tolerate large networ...
Abstract—Many network devices such as routers and firewalls employ caches to take advantage of tempo...