摘要: 高速条件下数据访存是流管理的瓶颈,传统表项操作“读-处理-写”模式效率仅为36%,读写转换和读写延时是制约效率的重要因素。针对这个问题,提出了连续读写法处理表项,通过合并读写时延和复用读写转换的方式使表项操作效率超过90%;并在此基础上提出了单向并行多链表法。通过多个链表的交替操作,使连续读写法应用于处理不活动超时流。理论分析和实验表明,单向并行多链表法能够适用于OC-768(40Gbps)链路下管理千万条表项明显优于辅助存储法和双向链表法的OC-192(10Gbps)下百万条表项的管理能力。
[1] 亓亚烜.多域网包分类算法研究[D].北京:清华大学,2011 [2] Nam G,Patankar P,Kesidis G,et al.Mass Purging of Stale TCP Flows in Per-flow Monitoring Systems[C]∥Computer Communications and Networks,ICCCN 2009,Proceedings of 18th Internatonal Conference on Date of Conference.2009:1-6 [3] Estan C,Keys K,Moore D,et al.Building a Better NetFlow[C]∥Proceedings of the 2004conference on Applications,technologies,architectures,and protocols for computer communications,SIGCOMM’04.2004:245-256 [4] Sadre R.The effects of DDoS attacks on flow monitoring applications [C]∥Network Operations and Management Symposium(NOMS).IEEE,2012:269-277 [5] Yoon S,Kim B,Oh J,et al.Session Management Architecturefor Implementing an FPGA-based Stateful Intrusion Detection System[C]∥Proceedings of the 8th WSEAS International Conference on Applied Computer Science(ACS’08).2008:31-36 [6] Kumar P R,Deepamala N.Design for implementing NetFlow u-sing existing session tables in devices like stateful inspection firewalls and Load balancers.2010:210-213 [7] Tsai W-Y,Huang Nen-fu,Hung H-W.A Lock-Controlled Session Table Partitioning Scheme with Dynamic Resource Balancing for Multi-Core Architecture[C]∥IEEE International Conference on Communications(ICC).2011:1-5 [8] Nam G,Patankar P,Lim S-H,et al.Clock-like Flow Replace-ment Schemes for Resilient Flow Monitoring[C]∥29th IEEE International Conference on Distributed Computing Systems,ICDCS’09.2009:129-136 [9] Koch R.Towards Next-Generation Intrusion Detection [C]∥3rd International Conference on Cyber Conflict(ICCC).2011:62-69 [10] Kanizo Y,Hay D,Keslassy I.Optimal Fast Hashing[C]∥Publication in the IEEE INFOCOM 2009proceedings.2009 [11] 三星:DDR2SDRAM操作时序规范.www.SolidPDF.com.2012.5 [12] Yoon S,Kim B,Oh J.High-Performance Stateful Intrusion Detection System[C]∥International Conference on Computational Intelligence and Security.2006:574-579 [13] Sekar V,Reiter M K,Willinger W,et al.cSamp:A system for networkwide flow monitoring[C]∥Proc.5th USENIX NSDI.2008 [14] Duffield N,Lund C,Thorup M.Estimating flow distributionsfrom sampled flow statistics[C]∥Proc.ACM SIGCOMM.2003:325-336 [15] MAWI:WIDE traffic archive.http://tracer.csl.sony.co.jp/ |
No related articles found! |
|