期刊文献+

基于单向并行多链表的流管理 被引量:2

NetFlow Based on Parallel Single Multi-linked Lists
下载PDF
导出
摘要 高速条件下数据访存是流管理的瓶颈,传统表项操作"读-处理-写"模式效率仅为36%,读写转换和读写延时是制约效率的重要因素。针对这个问题,提出了连续读写法处理表项,通过合并读写时延和复用读写转换的方式使表项操作效率超过90%;并在此基础上提出了单向并行多链表法。通过多个链表的交替操作,使连续读写法应用于处理不活动超时流。理论分析和实验表明,单向并行多链表法能够适用于OC-768(40Gbps)链路下管理千万条表项明显优于辅助存储法和双向链表法的OC-192(10Gbps)下百万条表项的管理能力。 In the high speed network, the bottleneck of NetFlow is the memory access. The efficiency of traditional list item operation "read-process-write" mode is only 36%, and the important factors which restrict the efficiency are read and Write conversion as well as read and write delay. To solve this problem, continuous reading and writing method was proposed. It makes the efficiency of traditional list item operation increase to 90% or more by merging multi-delay and multiplexing read and write conversion. We proposed the parallel single multi-linked list method to handle with the inac- tive timeout flows. Continuous reading and writing method is applied to deal with the inactivity timeout flow through multiple list alternating operation. Theoretical analysis and experimental results show that the parallel single multi- linked list method can be applied in the link OC-768(40Gbps)to manage tens of millions of list items,which is signifi- cantly superior to the management ability of auxiliary storage method and doubly linked list method in the link OC-192 (10Gbps) to manage millions of list items.
出处 《计算机科学》 CSCD 北大核心 2013年第9期73-77,共5页 Computer Science
基金 国家高技术研究发展计划(863计划)(2011AA01A103)资助
关键词 流管理 单向并行多链表 不活动超时流 NetFlow, Parallel single multi-linked lists, Inactivity timeout flow
  • 相关文献

参考文献15

  • 1亓亚烜.多域网包分类算法研究[D].北京:清华大学,2011.
  • 2Nam G,Patankar P,Kesidis G,et al.Mass Purging of Stale TCP Flows in Per-flow Monitoring Systems[C]∥Computer Communications and Networks,ICCCN 2009,Proceedings of 18th Internatonal Conference on Date of Conference.2009:1-6.
  • 3Estan C,Keys K,Moore D,et al.Building a Better NetFlow[C]∥Proceedings of the 2004conference on Applications,technologies,architectures,and protocols for computer communications,SIGCOMM'04.2004:245-256.
  • 4Sadre R.The effects of DDoS attacks on flow monitoring applications[C]∥Network Operations and Management Symposium(NOMS).IEEE,2012:269-277.
  • 5Yoon S,Kim B,Oh J,et al.Session Management Architecturefor Implementing an FPGA-based Stateful Intrusion Detection System[C]∥Proceedings of the 8th WSEAS International Conference on Applied Computer Science(ACS'08).2008:31-36.
  • 6Kumar P R,Deepamala N.Design for implementing NetFlow u-sing existing session tables in devices like stateful inspection firewalls and Load balancers.2010:210-213.
  • 7Tsai W-Y,Huang Nen-fu,Hung H-W.A Lock-Controlled Session Table Partitioning Scheme with Dynamic Resource Balancing for Multi-Core Architecture[C]∥IEEE International Conference on Communications(ICC).2011:1-5.
  • 8Nam G,Patankar P,Lim S-H,et al.Clock-like Flow Replace-ment Schemes for Resilient Flow Monitoring[C]∥29th IEEE International Conference on Distributed Computing Systems,ICDCS'09.2009:129-136.
  • 9Koch R.Towards Next-Generation Intrusion Detection[C]∥3rd International Conference on Cyber Conflict(ICCC).2011:62-69.
  • 10Kanizo Y,Hay D,Keslassy I.Optimal Fast Hashing[C]∥Publication in the IEEE INFOCOM 2009proceedings.2009.

同被引文献8

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部