期刊文献+

一种基于X86架构的多核绑定技术

A Method of Technology based on X86 Architecture with Multi-core Binding
下载PDF
导出
摘要 针对如何利用高性能多核化设备,提高网络安全产品的处理能力,设计和实现了一种基于x86架构的Llinux平台多核绑定技术。该技术首先建立DMA缓冲队列映射,减少网卡访问次数,采用SIMD多核思想设计和实现了虚拟数据桶,并对进入数据桶的数据实施负载均衡;将Netfilter主函数多线程化,并采用内核线程绑定技术将多线程绑定到指定核.实验结果表明,DMA缓冲队列映射可以提高网络设备的I/O吞吐量,虚拟数据桶减少了数据包二次拷贝的开销,节省内核态内存,多核绑定技术提高网络安全设备多核利用率和数据包处理能力。 Focusing on how to use high-performance multi-core technology equipment,a novel architecture based-on X86 binding technique is introduced to exploit the performance benefit of such multi-core device to improve the processing capacity of network security product.DMA caching array mapping is built to reduce the network card access.Virtual data bucket is designed and implemented involving SIMD design pattern,and load balancing is applied for optimization of data bucket.Netfilter is discussed in detail and multi-threading main function is introduced.Using kernel thread binding,threads can be specified to designated core in the device.Experiments have been done to illustrate an improved result.DMA caching array mapping increases the I/O throughout capacity;adopting of virtual data bucket reduces the cost of duplicated copy of data and then saves the kernel memory usage;multi-core binding technique can increase the operation rate of multi-cores of network security device hence improves the processing capacity of data packet.
出处 《计算机安全》 2012年第6期14-18,共5页 Network & Computer Security
基金 基金号(60873246)国家自然科学基金信息科学部
关键词 DMA array mapping SIMD I/O THROUGHOUT capacity MULTI-CORE BINDING DMA array mapping SIMD I/O throughout capacity multi--core binding
  • 相关文献

参考文献7

  • 1Tingwen Liu, Yong Sun, Zhibin Zha, ng, Li Guo, Load Balancing for Flow-based Parallel Processing Systems in CMP Architecture[C]// IEEE conference on Global telecommunications. Piscataway, NJ, USA: IEEE, 2009: 4694-4700.
  • 2Dan Using on from CPU Tang,Yungang Ba, o,Weiwu Hu,Mingyu Chen chip storage to &rchitecturally separate d&t& for improving I/O performance.2010 ntern&tional Symposium on Digital Object Identifier HPCA_2010.54i6638 Publication Year, 2010 DMA cache : 1/0 dat& IEEE 16th 10.1109/.
  • 3Peng Yu,Li Bo,Liu DMA Transaction Method and Diagnosis ,2009.1CTD International Conference on CAS-ICTD. 2009. 4960747 Datong,Peng Xiyuan. A High Speed for PCI Express Devices. Testing 2009.1EEE Circuits and Systems Digital Object Identifier:10.1109/ Publication Year: 2009, Page(s) : 1 -4.
  • 4H Sutter - Dr.The free lunch is over: A fundamental turn toward concurrency in software[J].Dr. Dobb's Journal, 30 (3), 2005.
  • 5杨明明,王铮.Netfilter性能动态改善方法的研究与实现[J].计算机技术与发展,2010,20(4):163-166. 被引量:3
  • 6黄晓辉,周定康,许冬海.Linux网络安全架构Netfilter的分析和探讨[J].计算机与现代化,2008(3):55-57. 被引量:2
  • 7蒋文保,郝双,戴一奇,刘庭华.高速网络入侵检测系统负载均衡策略与算法分析[J].清华大学学报(自然科学版),2006,46(1):106-110. 被引量:29

二级参考文献17

  • 1王丽辉,李涛,张晓平,杨频,杨杰,刘莎.一种联动防火墙的网络入侵检测系统[J].计算机应用研究,2006,23(3):95-97. 被引量:21
  • 2朱立才,杨寿保,宋舜宏.Netfilter/iptables防火墙性能优化方案与实现[J].计算机工程与应用,2006,42(15):117-120. 被引量:8
  • 3Baba T, Matsuda S. Tracing Network Attacks to Their Sources[J ]. IEEE Intemet Computing, 2002,62(2) : 107 - 109.
  • 4Bllovin S M. Secruity problems in the TCP IP protocol suite [J ]. Computer Communications Review, 1998,92 (2) : 81 - 83.
  • 5Steven M B,William R C. Network Firewalls[J ]. IEEE Communications, 1994,9(9) : 67 - 69.
  • 6Schaelicke L,Slabach T,Moore B,et al.Characterizing the performance of network intrusion detection sensors[A].Proceedings of the Sixth International Symposium on Recent Advances in Intrusion Detection (RAID 2003)[C].Lecture Notes in Computer Science,Springer-Verlag,2003.
  • 7Coit J,Staniford S,McAlerney J.Towards faster string matching for intrusion detection or exceeding the speed of snort[A].Proc DARPA Information Survivability Conference and Exposition (DISCEX Ⅱ '02)[C].Los Alamitos,Calif:IEEE CS Press,2001.367-373.
  • 8Edwards S.Vulnerabilities of Network Intrusion Detection Systems:Realizing and Overcoming the Risks[Z].Toplayer Networks,2002.
  • 9Kruegel C,Valeur F,Vigna G,et al.Stateful intrusion detection for high-speed networks[A].Proceedings of the IEEE Symposium on Security and Privacy[C].Berkeley,CA:IEEE,2002.285-294.
  • 10Asser N.Tantawi,Don Towsley.Optimal static load balancing in distributed computer systems[J].Journal of the ACM,1985,32(2):445-465.

共引文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部