COMPARISON OF HASH STRATEGIES FOR FLOW-BASED LOAD BALANCING
|
|
|
- Lilian Dalton
- 9 years ago
- Views:
Transcription
1 International Journal of Electronic Commerce Studies Vol.6, No.2, pp , 215 doi: 1.793/ijecs.1346 COMPARISON OF HASH STRATEGIES FOR FLOW-BASED LOAD BALANCING Surasak Sanguanpong Kasetsart University Faculty of Engineering, 5 Ngamwongwan Rd., Chatuchak, Bangkok 19, Thailand [email protected] Witsarut Pittayapitak Kasetsart University Faculty of Engineering, 5 Ngamwongwan Rd., Chatuchak, Bangkok 19, Thailand g @ku.ac.th Kasom Koht-Arsa Kasetsart University Faculty of Engineering, 5 Ngamwongwan Rd., Chatuchak, Bangkok 19, Thailand [email protected] ABSTRACT Hashing is powerful tool and widely used for flow-based load balancing schemes in parallel processing. In this paper, we analyze and compare computing overhead and load dispersion characteristics of hash strategies using XOR and CRC operations under four hashing key schemes (from to ). We conduct experiments with real-life 24-hour campus network traffic. The results show that XOR32 has the lowest computing overhead among all hash function groups. Moreover, XOR32 with and XOR32 with are the two outstanding strategies that provide very good uniform distribution of traffic across multiple links, thus achieving better load balancing for flow-based applications. Keywords: Hashing, Hash Functions, Flow-based, Load Balancing 1. INTRODUCTION In today s context, network speed has been continuously increasing to a high gigabit per second rate, while processor and memory speeds have not
2 26 International Journal of Electronic Commerce Studies advanced at the same pace. A single physical network node, such as Intrusion Detection System (IDS), firewall, etc., is inadequate for handling high-speed traffic in this circumstance. A widely used solution is to split traffic from a high-speed input link into multiple lower speed output links. Such traffic should be evenly distributed among the parallel output links to achieve load balancing. Otherwise, possible hot-link overload and inefficient link capacity may occur. Moreover, some applications, such as intrusion detection 1 and firewall 2, 3, 4 require that a TCP flow must be maintained on a same node from the beginning until the end of flow duration. Hashing is a simple but powerful tool for flow-based load balancing. Related packets belonging to a flow are grouped by applying a combination of header fields as a hashing key. A value computed from the hash function indicates a flow ID to direct traffic to a designated node. In this paper, we analyze characteristics of load distribution using a set of XOR and CRC functions with different keys. Three load distribution characteristics have been studied: (1) distributions by number of packets; (2) distributions by number of byte counts; and (3) distributions by number of flows. The rest of the paper is organized as follows: Section 2 presents related works, Section 3 describes hashing methodology, Section 4 presents performance measurements and comparative results, and, finally, Section 5 concludes the paper. 2. RELATED WORK Hashing offers a simple stateless solution for load balancing by maintaining a flow with correct packet ordering over a specific link 5. XOR and CRC are among well-known hash functions. Although neither of them are novel, they can provide high uniformity and low cost 6. However, balancing load in practical cases may not always be perfect due to rapidly varying and unpredictable traffic patterns 7. Cao et al. 8 simulated performance of several hash functions and showed that CRC16 provides the best performance tradeoff. However, the trace period was too short to adequately represent actual load characteristics under modern traffic. In contrast to Cao s works, Detal et al. 9 reported that CRC16 gave a rather poor packet distribution. Similarly, our experiments showed that CRC16 has worse performance compared to XOR16 and XOR32, however their distribution characteristics have no significant difference. Guang et al. 1 compared the uniformity of distribution and computation speed of the IP Shift-XOR (IPSX) hash algorithm, the Bob algorithm based on XOR, and the CRC32 algorithm. The IPSX offered fastest execution time with good uniformity. Jiang et al. 11 proposed Fowler-Noll-Vo (FNV)
3 Surasak Sanguanpong, Witsarut Pittayapitak, and Kasom Koht-Arsa 261 hash for balancing SIP server clusters. However, our evaluation indicated that FNV has poorer performance compared to XOR and CRC. In this paper, we complement prior works by analyzing six differences of the XOR and CRC hashing schemes (XOR8, XOR16, XOR32, CRC8, CRC16, and CRC32) when applied to flow based load balancing. Each hashing scheme is computed with four hashing keys from to based on a combination of packet header fields. 3. LOAD BALANCING WITH HASHING A model of a network load balancing system has a traffic splitter attached between an incoming link and multiple outgoing links as shown in Figure 1. The splitter receives packets from a higher-speed incoming link and dispatches packets to lower-speed outgoing links attached with the processing nodes. A hash function with keys for table lookup is used for mapping a hash value to a node ID. Let N be number of available links or nodes, a hash value h for a hash function H(X) that maps a given key X to an integer between [, N-1] is defined as follows: h = H(X) mod N A flow-based hash function requires at least source and destination addresses as a {SA, DA} of hash keys for producing a flow identifier (flow ID). The flow ID, combined with the modulo operation, gives the final hash value as the node ID to handle traffic flow. PE Incoming Traffic LOAD BALANCER PE1 PEN Hash Functions Figure 1. General model of load balancing Two hash functions are extensively used in load balancing: exclusive-or (XOR) and Cyclic Redundancy Check (CRC). XOR is a basic Boolean operator such that if one of two bits is true, then so is the result, but if both are true, or both are false, then the result is false. The XOR function
4 262 International Journal of Electronic Commerce Studies can generate a pseudorandom number, hence it has been widely used for hashing. If K is a key with hash table size n, and is the exclusive-or operator, then the XOR operation can be expressed as: A main usage of CRC is for computing of a reliable checksum 12, 13, but its random output can be suitably applied as a hash function. The CRC is based on polynomial arithmetic in GF(2) (Galois field with two elements). The GF(2) polynomial has a single variable x whose coefficients are or 1. We adopt 3 common CRC standards: CRC8, CRC16, and CRC32. These are shown as follows: 3.2 Hashing Keys Combinations of a packet s header fields produce different hashing key schemes with k-tuples. Typical header fields (i.e. source address (SA), destination address (DA), source port (SP), destination port (DP), and protocol type (PT)) are used as hash keys. Table 1 illustrates four examples of hashing keys with different key sizes. Note that the 1-tuple is omitted due to its intrinsically poor distribution characteristics. Table 1. Hashing keys schemes Tuple Keys IPv4 Keys Size IPv6 Keys Size (bytes:bits) (bytes:bits) {SA, DA} 8:64 32:256 {SA, DA, SP} 1:8 34/272 {SA, DA, SP, DP} 12:96 36/288 {SA, DA, SP, DP, PT} 13:14 37/ MEASUREMENT RESULTS A performance of hash functions is measured in two aspects: (1) Computing overhead time and (2) Load distribution using the Coefficient of Variation 14 (CV). The CV is a statistical value representing a ratio of the standard deviation to the mean. The lower the CV, the lesser the variance (better balancing) is. We run the tests using a snapshot of the Kasetsart
5 Time (ns) Time (ns) Surasak Sanguanpong, Witsarut Pittayapitak, and Kasom Koht-Arsa 263 University traffic repository, collected in June 213. The 24-hour period of traffic contains about 1.53x1 1 packets with total size of TB. The hashing is computed on a machine with a quad-core 2.8 GHz Xeon 556 processor, 28GB of memory, and running 64-bit CentOS Linux Computing Overhead Since IPv4 and IPv6 have different sizes, which directly affect hashing performance, we then measure the computational overhead of the hash function for both IPv4 and IPv6, respectively. Since the size of the IPv6 address is four times larger than the size of IPv4, the time consumed to calculate IPv6 hashing represents the worst-case overhead. Overhead measurements for IPv4 and IPv6 exhibit very common characteristics as shown in Figures 2(a) and 2(b), respectively. XOR32 has the lowest computing overhead for all tuple schemes, while CRC16 shows the worst overhead, followed by CRC8. For each class of hash functions, XOR32 and CRC32 are the best candidates in their class because they take the least amount of time to hash packets XOR8 XOR16 XOR32 CRC8 CRC16 CRC XOR8 XOR16 XOR32 CRC8 CRC16 CRC32 Size of hash key (byte) (a) IPv Size of hash key (byte) (b) IPv6 Figure 2. Computing overhead of hashing for (a) IPv4 and (b) IPv6
6 Coffiicient of Variation Coffiicient of Variation 264 International Journal of Electronic Commerce Studies 4.2 Distribution We select XOR32 and CRC32 as the representative hash functions due to their minimal computational overhead. We compare load dispersion of four hashing key schemes in three distribution scenarios using CV against a number of nodes, ranging from 2 to 256. The 256-buckets size is selected in order to exploit the fast memory access of the CPU s L1 cache. The following are observations from the experimental results: Packet Distribution: Figures 3(a) and 3(b) show that 3, 4, and s deliver very good packet distribution in the same class. The distinctly performs the worst (a) XOR32 #Node #Node (b) CRC32 Figure 3. Distribution by number of packets Size Distribution: XOR32 and CRC32 show similar results for the distributions by byte counts as illustrated in Figures 4(a) and 4(b). The hashing key schemes with 4 and s show smooth distribution in the
7 Cofficient of Variation Cofficient of Variation Surasak Sanguanpong, Witsarut Pittayapitak, and Kasom Koht-Arsa 265 same class, while the again shows poorer distribution for the large number of nodes. Flow Distribution: XOR32 and CRC32 show similar results for the flow distributions as illustrated in Figures 5(a) and 5(b). The hashing key schemes with 3, 4 and s have very identical distribution characteristics and show excellent flow distribution. The performs extremely poorly for almost every number of nodes, since load distribution is based only on the IP addresses. We conclude that good distribution can be achieved for k-tuple, when k > (a) XOR32 #Node (b) CRC32 #Node Figure 4. Distribution by total size in bytes count
8 Cofficient of Variation Cofficient of Variation 266 International Journal of Electronic Commerce Studies (a) XOR32 #Node (b) CRC32 #Node Figure 5. Figure 5. Distribution by number of flows 5. CONCLUSION We present experimental results of computational overhead for XOR/CRC hash functions and their load distribution characteristics under four hashing key schemes. Our experiments show that XOR32 has the lowest computational overhead, followed by XOR16. We found that for every hash function, the and the show the best load distribution, respectively. The combination of XOR32 with key is the best candidate strategy to provide excellent random hash indices with minimal computational overhead 6. REFERENCES [1] K. Nam-Uk, S. Jung, and T. Chung, An efficient hash-based load balancing scheme to support parallel NIDS. Lecture Notes in Computer Science, 6782, p , 211.
9 Surasak Sanguanpong, Witsarut Pittayapitak, and Kasom Koht-Arsa [2] K. Koht-arsa, and S. Sanguanpong, A centralized state repository approach to highly scalable and high-availability parallel firewall. Journal of Computers 8(7), p , [3] K. Koht-arsa, and S. Sanguanpong, High availability and scalable parallel stateful firewall design. Presented at the International Conference on Internet Studies, Bangkok, August 17-19, 212. [4] P. N. Ayuso, R. M. Gasca, and L. Lefevre, Demystifying cluster-based fault-tolerant firewalls. Internet Computing, 13(6), p31-38, [5] S. Prabhavat, H. Nishiyama, N. Ansari, and N. Kato, On load distribution over multipath networks. IEEE Communications Surveys and Tutorials, 14(3), p662-68, [6] B. Xiong, K. Yang, F. Li1, X. Chen, J. Zhang, Q. Tang, and Y. Luo, The impact of bitwise operators on hash uniformity in network packet processing. International Journal of Communication Systems, 27(11), p , [7] M. Molina, S. Niccolini, and N.G. Duffield, A comparative experimental study of hash functions applied to packet sampling. Presented at the 19 th International Teletraffic Congress, Beijing, August 29-September 2, 25. [8] Z. Cao, Z. Wang, and E. Zegura, Performance of hashing-based schemes for Internet load balancing. In F. Bauer (Ed.), Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (vol.1) (p ). Tel Aviv: IEEE Press, 2. [9] G. Detal, C. Paasch, S. Linden, P. Mal rindol, G. Avoine, and O. Bonaventure, Revisiting flow-based load balancing: Stateless path selection in data center networks. Computer Networks, 57(5), p , [1] C. Guang, Z. Wei, and G. Jian, XOR hashing algorithms to measured flows at the high-speed link. In B. Werne (Ed.), Proceedings of the International Conference on Future Generation Communication and Networking (vol. 1) (p ). Hainan Island: IEEE Press, [11] H. Jiang, H. Jiang, A. Iyengar, E. Nahum, W. Segmuller, A. Tantawi, and C. Wright, Design, implementation, and performance of a load balancer for SIP server clusters. IEEE Transactions on Networking, 2(4), p , [12] A. Doering, and M. Waldvogel, Fast and flexible CRC calculation.
10 268 International Journal of Electronic Commerce Studies Electronics Letters, 4(1), p1-11, [13] M.E. Kounavis, and F.L. Berry, A systematic approach to building high performance software-based CRC generators. In Danielle C. Martin (Ed.), Proceedings of the 1th IEEE Symposium on Computers and Communications (p ). Washington, DC, USA: IEEE Press, /ISCC [14] R. Feldman, and C. Valdez-Flores, Applied probability and stochastic processes. New York: Thomson Publishing, 21.
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,
An Adaptive Load Balancing to Provide Quality of Service
An Adaptive Load Balancing to Provide Quality of Service 1 Zahra Vali, 2 Massoud Reza Hashemi, 3 Neda Moghim *1, Isfahan University of Technology, Isfahan, Iran 2, Isfahan University of Technology, Isfahan,
Traffic Behavior Analysis with Poisson Sampling on High-speed Network 1
Traffic Behavior Analysis with Poisson Sampling on High-speed etwork Guang Cheng Jian Gong (Computer Department of Southeast University anjing 0096, P.R.China) Abstract: With the subsequent increasing
Content-Aware Load Balancing using Direct Routing for VOD Streaming Service
Content-Aware Load Balancing using Direct Routing for VOD Streaming Service Young-Hwan Woo, Jin-Wook Chung, Seok-soo Kim Dept. of Computer & Information System, Geo-chang Provincial College, Korea School
OpenFlow with Intel 82599. Voravit Tanyingyong, Markus Hidell, Peter Sjödin
OpenFlow with Intel 82599 Voravit Tanyingyong, Markus Hidell, Peter Sjödin Outline Background Goal Design Experiment and Evaluation Conclusion OpenFlow SW HW Open up commercial network hardware for experiment
Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching
2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction
A Small-time Scale Netflow-based Anomaly Traffic Detecting Method Using MapReduce
, pp.231-242 http://dx.doi.org/10.14257/ijsia.2014.8.2.24 A Small-time Scale Netflow-based Anomaly Traffic Detecting Method Using MapReduce Wang Jin-Song, Zhang Long, Shi Kai and Zhang Hong-hao School
Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 12 (2014), pp. 1167-1173 International Research Publications House http://www. irphouse.com Vulnerability
IPv6/IPv4 Automatic Dual Authentication Technique for Campus Network
IPv6/IPv4 Automatic Dual Authentication Technique for Campus Network S. CHITPINITYON, S. SANGUANPONG, K. KOHT-ARSA, W. PITTAYAPITAK, S. ERJONGMANEE AND P. WATANAPONGSE Agenda Introduction Design And Implementation
Load Balancing of Web Server System Using Service Queue Length
Load Balancing of Web Server System Using Service Queue Length Brajendra Kumar 1, Dr. Vineet Richhariya 2 1 M.tech Scholar (CSE) LNCT, Bhopal 2 HOD (CSE), LNCT, Bhopal Abstract- In this paper, we describe
SIDN Server Measurements
SIDN Server Measurements Yuri Schaeffer 1, NLnet Labs NLnet Labs document 2010-003 July 19, 2010 1 Introduction For future capacity planning SIDN would like to have an insight on the required resources
Virtualizing SQL Server 2008 Using EMC VNX Series and Microsoft Windows Server 2008 R2 Hyper-V. Reference Architecture
Virtualizing SQL Server 2008 Using EMC VNX Series and Microsoft Windows Server 2008 R2 Hyper-V Copyright 2011 EMC Corporation. All rights reserved. Published February, 2011 EMC believes the information
Optimization of Cluster Web Server Scheduling from Site Access Statistics
Optimization of Cluster Web Server Scheduling from Site Access Statistics Nartpong Ampornaramveth, Surasak Sanguanpong Faculty of Computer Engineering, Kasetsart University, Bangkhen Bangkok, Thailand
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
Hashing in Networked Systems
LB Server Cluster Switches Hashing in Networked Systems COS 461: Computer Networks Spring 2011 Mike Freedman h@p://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Hash funcion Hashing FuncIon that
A Survey of IP Traceback Mechanisms to overcome Denial-of-Service Attacks
A Survey of IP Traceback Mechanisms to overcome Denial-of-Service Attacks SHWETA VINCENT, J. IMMANUEL JOHN RAJA Department of Computer Science and Engineering, School of Computer Science and Technology
Figure 1. The cloud scales: Amazon EC2 growth [2].
- Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 [email protected], [email protected] Abstract One of the most important issues
Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor
-0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University
A Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
Flow-based detection of RDP brute-force attacks
Flow-based detection of RDP brute-force attacks Martin Vizváry [email protected] Institute of Computer Science Masaryk University Brno, Czech Republic Jan Vykopal [email protected] Institute of Computer
Performance Comparison of Server Load Distribution with FTP and HTTP
Performance Comparison of Server Load Distribution with FTP and HTTP Yogesh Chauhan Assistant Professor HCTM Technical Campus, Kaithal Shilpa Chauhan Research Scholar University Institute of Engg & Tech,
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES
CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES 1 MYOUNGJIN KIM, 2 CUI YUN, 3 SEUNGHO HAN, 4 HANKU LEE 1,2,3,4 Department of Internet & Multimedia Engineering,
Network congestion control using NetFlow
Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.
Router Architectures
Router Architectures An overview of router architectures. Introduction What is a Packet Switch? Basic Architectural Components Some Example Packet Switches The Evolution of IP Routers 2 1 Router Components
Avoiding Network Polarization and Increasing Visibility in Cloud Networks Using Broadcom Smart- Hash Technology
Avoiding Network Polarization and Increasing Visibility in Cloud Networks Using Broadcom Smart- Hash Technology Sujal Das Product Marketing Director Network Switching Karthik Mandakolathur Sr Product Line
A Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
An Optimization Model of Load Balancing in P2P SIP Architecture
An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, [email protected]
Scalable TCP Session Monitoring with Symmetric Receive-side Scaling
Scalable TCP Session Monitoring with Symmetric Receive-side Scaling Shinae Woo Department of Electrical Engineering KAIST [email protected] KyoungSoo Park Department of Electrical Engineering KAIST
COMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES
COMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES 1 SHILPA KALANTRI, 2 JYOTI JOGLEKAR 1,2 Computer Engineering Department, Shah and Anchor Kutchhi Engineering College, Mumbai, India E-mail:
Multicast-based Distributed LVS (MD-LVS) for improving. scalability and availability
Multicast-based Distributed LVS (MD-LVS) for improving scalability and availability Haesun Shin, Sook-Heon Lee, and Myong-Soon Park Internet Computing Lab. Department of Computer Science and Engineering,
Index Terms Domain name, Firewall, Packet, Phishing, URL.
BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet
A Complex Network Structure Design for Load Balancing and Redundant
A Complex Network Structure Design for Load Balancing and Redundant Fengming M. Chang Department of Industrial Engineering and Management Tungfang Institute of Technology, Kaohsiung, Taiwan [email protected]
SPANIDS: A Scalable Network Intrusion Detection Loadbalancer
SPANIDS: A Scalable Network Intrusion Detection Loadbalancer Lambert Schaelicke University of Notre Dame 384 Fitzpatrick Hall Notre Dame, IN 46556 [email protected] Kyle Wheeler University of Notre Dame
How To Encrypt Data With A Power Of N On A K Disk
Towards High Security and Fault Tolerant Dispersed Storage System with Optimized Information Dispersal Algorithm I Hrishikesh Lahkar, II Manjunath C R I,II Jain University, School of Engineering and Technology,
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Vasilios A. Siris and Ilias Stavrakis Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH)
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
A Frequency-Based Approach to Intrusion Detection
A Frequency-Based Approach to Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Electrical Engineering & Computer Science and National Center for Forensic Science, University of Central Florida,
High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
ACL Based Dynamic Network Reachability in Cross Domain
South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer
PEER TO PEER FILE SHARING USING NETWORK CODING
PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering
Policy Distribution Methods for Function Parallel Firewalls
Policy Distribution Methods for Function Parallel Firewalls Michael R. Horvath GreatWall Systems Winston-Salem, NC 27101, USA Errin W. Fulp Department of Computer Science Wake Forest University Winston-Salem,
A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique
A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique Jyoti Malhotra 1,Priya Ghyare 2 Associate Professor, Dept. of Information Technology, MIT College of
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia [email protected] Eugene Kalishenko Saint Petersburg
A Hybrid Load Balancing Policy underlying Cloud Computing Environment
A Hybrid Load Balancing Policy underlying Cloud Computing Environment S.C. WANG, S.C. TSENG, S.S. WANG*, K.Q. YAN* Chaoyang University of Technology 168, Jifeng E. Rd., Wufeng District, Taichung 41349
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment
R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI
A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster
, pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing
J-Flow on J Series Services Routers and Branch SRX Series Services Gateways
APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring
High Performance Cluster Support for NLB on Window
High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) [email protected] [2]Asst. Professor,
CRC32 Based Signature Generation Methods for URL Routing
CRC32 Based Signature Generation Methods for URL Routing Zornitza Genova Prodanoff and Ronnie King Department of Computer and Information Sciences University of North Florida 4567 Saint Johns Bluff Road
Load Balancing Algorithm Based on Services
Journal of Information & Computational Science 10:11 (2013) 3305 3312 July 20, 2013 Available at http://www.joics.com Load Balancing Algorithm Based on Services Yufang Zhang a, Qinlei Wei a,, Ying Zhao
Multi-level Metadata Management Scheme for Cloud Storage System
, pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1
18-731 Midterm. Name: Andrew user id:
18-731 Midterm 6 March 2008 Name: Andrew user id: Scores: Problem 0 (10 points): Problem 1 (10 points): Problem 2 (15 points): Problem 3 (10 points): Problem 4 (20 points): Problem 5 (10 points): Problem
Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing
www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
Method of Fault Detection in Cloud Computing Systems
, pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,
Scalable Prefix Matching for Internet Packet Forwarding
Scalable Prefix Matching for Internet Packet Forwarding Marcel Waldvogel Computer Engineering and Networks Laboratory Institut für Technische Informatik und Kommunikationsnetze Background Internet growth
Stable and Flexible Weight based Clustering Algorithm in Mobile Ad hoc Networks
R. Pandi Selvam et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (2),,82-828 Stable and Flexible Weight based Clustering Algorithm in Mobile Ad hoc Networks
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Dynamic resource management for energy saving in the cloud computing environment
Dynamic resource management for energy saving in the cloud computing environment Liang-Teh Lee, Kang-Yuan Liu, and Hui-Yang Huang Department of Computer Science and Engineering, Tatung University, Taiwan
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,
A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems*
A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems* Junho Jang, Saeyoung Han, Sungyong Park, and Jihoon Yang Department of Computer Science and Interdisciplinary Program
WHITE PAPER. Extending Network Monitoring Tool Performance
WHITE PAPER Extending Network Monitoring Tool Performance www.ixiacom.com 915-6915-01 Rev. A, July 2014 2 Table of Contents Benefits... 4 Abstract... 4 Introduction... 4 Understanding Monitoring Tools...
Stateful Firewalls. Hank and Foo
Stateful Firewalls Hank and Foo 1 Types of firewalls Packet filter (stateless) Proxy firewalls Stateful inspection Deep packet inspection 2 Packet filter (Access Control Lists) Treats each packet in isolation
Network Intrusion Simulation Using OPNET
Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,
2.2 SIP-based Load Balancing. 3 SIP Load Balancing. 3.1 Proposed Load Balancing Solution. 2 Background Research. 2.1 HTTP-based Load Balancing
SIP TRAFFIC LOAD BALANCING Ramy Farha School of Electrical and Computer Engineering University of Toronto Toronto, Ontario Email: [email protected] ABSTRACT This paper presents a novel solution to
LIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology. [email protected].
5 Performance Management for Web Services Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] April 2008 Overview Service Management Performance Mgt QoS Mgt
Effect of Packet-Size over Network Performance
International Journal of Electronics and Computer Science Engineering 762 Available Online at www.ijecse.org ISSN: 2277-1956 Effect of Packet-Size over Network Performance Abhi U. Shah 1, Daivik H. Bhatt
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS 1 M.LAKSHMI, 2 N.LAKSHMI 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai.
Limitations of Packet Measurement
Limitations of Packet Measurement Collect and process less information: Only collect packet headers, not payload Ignore single packets (aggregate) Ignore some packets (sampling) Make collection and processing
Configuring a Load-Balancing Scheme
This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco Express Forwarding traffic. Load-balancing allows you to optimize
Load Balance Strategies for DEVS Approximated Parallel and Distributed Discrete-Event Simulations
Load Balance Strategies for DEVS Approximated Parallel and Distributed Discrete-Event Simulations Alonso Inostrosa-Psijas, Roberto Solar, Verónica Gil-Costa and Mauricio Marín Universidad de Santiago,
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
Performance Modeling and Analysis of a Database Server with Write-Heavy Workload
Performance Modeling and Analysis of a Database Server with Write-Heavy Workload Manfred Dellkrantz, Maria Kihl 2, and Anders Robertsson Department of Automatic Control, Lund University 2 Department of
Influence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b
Proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14) Reallocation and Allocation of Virtual Machines in Cloud Computing Manan
Server Traffic Management. Jeff Chase Duke University, Department of Computer Science CPS 212: Distributed Information Systems
Server Traffic Management Jeff Chase Duke University, Department of Computer Science CPS 212: Distributed Information Systems The Server Selection Problem server array A server farm B Which server? Which
Detection of Distributed Denial of Service Attack with Hadoop on Live Network
Detection of Distributed Denial of Service Attack with Hadoop on Live Network Suchita Korad 1, Shubhada Kadam 2, Prajakta Deore 3, Madhuri Jadhav 4, Prof.Rahul Patil 5 Students, Dept. of Computer, PCCOE,
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
