Scalable TCP Session Monitoring with Symmetric Receive-side Scaling
|
|
|
- Willa Bradford
- 9 years ago
- Views:
Transcription
1 Scalable TCP Session Monitoring with Symmetric Receive-side Scaling Shinae Woo Department of Electrical Engineering KAIST KyoungSoo Park Department of Electrical Engineering KAIST Abstract Receive-side scaling (RSS) is a technique that stores the arriving IP packets in the same flow into the same hardware queue of a modern network interface card (NIC). It allows scalable processing of the received packets by allowing exclusive access to the NIC queues by each CPU core. This removes the lock contention when accessing the NIC queue, and it allows concurrent access to different queues by multiple CPU cores. One problem with the existing RSS mechanism, however, is that it maps the IP packets in the same TCP connection to different NIC queues depending on the direction of the packets. In this paper, we present symmetric RSS, which allows mapping the packets in the same TCP connection to the same NIC queue regardless of whether they are upstream or downstream. The basic idea is to manipulate the RSS seeds such that the RSS hashes of the IP packets in the reverse direction to take on the same values with those in the forward direction. Since RSS hash calculation is done in the NIC hardware, it does not consume extra CPU cycles and promises high performance. 1. INTRODUCTION Receive-side scaling (RSS) is one of the widely-used NIC features that utilizes multiple CPU cores concurrently for packet processing in high-speed networks. It stores the arriving IP packets in the same flow into the same hardware RX queue of a modern NIC, and provides exclusive access to the queue by each CPU core on a multicore system. This allows scalable processing of the received IP packets by eliminating the lock contention by preventing the access to the same RX queue from multiple CPU cores. RSS ensures storing of the packets in the same flow into the same reception (RX) queue by hashing the five tuples in the TCP/UDP packet header (source/destination IPs and port numbers, and the protocol). That is, the packets with the same RSS hash values will end up in the same RX queue. Typically, the CPU core responsible for the RX queue processes the packets in the received order, and one does not need to worry about out-of-order processing of the packets, which could reduce the throughput of a TCP connection unintentionally by the packet processing middleboxes or software routers in the middle of the network. One problem with RSS, however, is that it could map the packets in the same TCP connection to different NIC RX queues depending on the direction of the packets. This is because the RSS hash of the packets in the reverse direction could take on a different value from that of the forward direction. It is especially problematic for high-performance TCP-session processing systems such as stateful firewalls, intrusion detection systems [3, 6, 7], and transparent WAN accelerators [1, 2] that need to monitor and process the TCP packets in both directions. Having two CPU cores process the TCP packets in the same 1
2 connection requires sharing the data structures across different threads/processes, which often need to be protected by a lock, undermining the original benefit of RSS. In this paper, we present symmetric RSS, which allows mapping the packets in the same TCP connection to the same NIC queue regardless of whether they are upstream or downstream. The basic idea is to manipulate the RSS seeds such that the RSS hash of the IP packets in the reverse direction to take on the same value with that in the forward direction. Since our symmetric RSS scheme does not change the RSS algorithm itself, we can avoid re-hashing of the IP packets outside the NIC hardware. This allows high-performance TCP session processing in the same CPU core without extra CPU cycles. We also show that our symmetric RSS scheme does impair load balancing among the available CPU cores. We provide theoretical analysis as well as experiment results in this paper. We believe that our symmetric RSS scheme will be useful for any TCP packet processing systems that requires high scalability on a multicore system. 2. SYMMETRIC RECEIVE-SIDE SCALING We first describe the original RSS algorithm and propose an efficient way to map the TCP packets in both directions into the same RX queue. 2.1 Original Receive-side Scaling Algorithm Receive-side scaling (RSS) is a NIC feature that provides load balancing in processing received packets[5]. It first calculates the hash value based on the packet header using the Toeplitz hash function [4], and decides which RX queue to store the packet by a modular operation. RSS can be applied to any byte ranges in the IP/TCP/UDP header, but typically, it hashes the {source IP, destination IP, source port, destination port, protocol} tuple. While we focus on IPv4 packets in this paper, the idea can be easily applied to IPv6 packets. Algorithm 1 RSS Hash Computation Algorithm function ComputeRSSHash(Input[], RSK) ret = 0; for each bit b in Input[] do if b == 1 then ret ˆ= (left-most 32 bits of RSK); end if shift RSK left 1 bit position; end for end function Algorithm 1 shows the pseudocode of the RSS hash function. The INPUT is the 5-tuple of IPv4 UDP or TCP packets, which is 12 bytes in total. Random Secret Key (RSK), which is 40 bytes (320 bits), is used as seed values that get mixed with the input values. Since the RSS algorithm is implemented in recent NIC hardware for fast processing, modification of the RSS algorithm to support symmetric mapping is difficult. However, RSK is part of the device driver and set into the NIC when the driver is first loaded into memory. We focus on updating RSK to allow symmetric mapping. 2.2 Symmetric Receive-side Scaling Algorithm The symmetric flow mapping needs to produce the same RSS hash value even if the source and destination IPs and port numbers are reversed. 2
3 ComputeRSSHash(srcIP :: dstip :: srcp ort :: dstp ort, RSK) = ComputeRSSHash(dstIP :: srcip :: dstp ort :: srcp ort, RSK) (1) Equation (1) shows the basic condition of the symmetric RSS queue mapping. We need to find the condition of RSK that satisfies the equation. Rule 1. During calculation of n th bit of INPUT, only the n th to (n + 31) th bit range of RSK is used. We observe that not every bit of RSK is used to get the hash value. Given an input bit, only 32 bits of RSK are used for the XOR operation. That is, for n-bit INPUT, only (n 1) + 32 bits from RSK are used to produce the hash value. If INPUT is larger than or equal to 290 bits, RSK will wrap around to the first bit. For a specific bit of INPUT, a fixed bit range of RSK is used as explained in Rule 1. INPUT Length Input Bit Range RSK Bit Range Source IP 32 bit Destination IP 32 bit Source port 16 bit Destination port 16 bit Table 1: RSK bit ranges used in the calculation of IPv4/TCP packet fields Using Rule 1, we can derive the bit ranges of RSK used in the calculation of the hash value for an IPv4/TCP (or UDP) packet. For example, the first byte (first eight bits) of INPUT uses the first 39 bits in RSK. The second input byte (from 9th to 16th bit) needs a RSK bit range of 9th to 47th. In this way, we calculate the bit ranges of each element in INPUT in Table 1. Let RSK[A : B] be a bit range of RSK from A th bit to B th bit. i) RSK[1 : 63] = RSK[33 : 95] ii) RSK[65 : 111] = RSK[81 : 127] (2) Using Table 1, we can convert Equation (1) to Equation (2). This equation requires that the RSK bit ranges for source and destination IPs take on the same values, as well as for the source and destination ports. If RSK bit ranges satisfy this condition, the RSS hash values will be the same for TCP packets in both directions. i) RSK[1 : 15] = RSK[17 : 31] = RSK[33 : 47] = RSK[49 : 63] = RSK[65 : 79] = RSK[81 : 95] = RSK[97 : 111] = RSK[113 : 127] ii) RSK[16] = RSK[48] = RSK[80] = RSK[96] = RSK[112] iii) RSK[32] = RSK[64] (3) We note that Equation (2) has overlapping regions, so the condition breaks into three non-overlapping parts as shown in Equation (3). One example of RSK satisfying Equation (3) is in Figure 1. 0x6d5a shows a group of 16 bits (in 2 bytes). Every group except the second and fourth group has exactly same bit sequence. The second and fourth group have a different bit in 8th bits, and other bits are the same as the other groups. 3
4 0x6d5a 0x6d5b 0x6d5a 0x6d5b Figure 1: A sample RSK that satisfies Equation(3) Rule 2. During calculation of n th byte of INPUT, only the n th to (n + 5) th byte range of RSK is used. We can also re-phrase Equation (1) in the byte level by changing Rule 1 to Rule 2, which is simpler than the bit-level condition. Let RSK[[i]] be i th bytes, 1 i 80 i) RSK[[1]] = RSK[[3]] = RSK[[5]] = RSK[[7]] = RSK[[9]] = RSK[[11]] = RSK[[13]] = RSK[[15]] ii) RSK[[2]] = RSK[[4]] = RSK[[6]] = RSK[[8]] = RSK[[10]] = RSK[[12]] = RSK[[14]] = RSK[[16]] (4) We note that the set of RSK that satisfies Equation (4) is a subset of the set satisfying Equation (3). One example of RSK that satisfies Equation (4) is in Figure 2. Figure 2: A sample RSK that satisfies Equation(4) 2.3 Analysis We have identified two RSK independent conditions that satisfy the symmetric RSS algorithm. In this section, we analyze whether the new RSK affects the level of load balancing compared with the original RSS. Let K i (1 i 320) be the i th bit in the new RSK, P j (1 j 96) be the j th bit in input bit sequence, and R i,j (1 j 32) be the j th bit in the result of the RSS function after i iterations in the for loop in Algorithm 1. After the first iteration in Algorithm 1, each bit of the result value becomes as follows: After the second iteration, R 1,j = P 1 &K j, (1 j 32) So, after n iterations in the loop, R 2,j = R 1 P 2 &K (j+1), (1 j 32) 4
5 R n,j = R n 1,j P n &K (j+n 1) (1 j 32) n = ( P i K (i+j 1) ) mod 2 (5) Since our input is 96 bits and the new RSK repeats in a unit of 16 bits by condition 4, the final hash value (RET ) returned by the function is, RET j = R 96,j 96 = ( P i K (i+j 1) ) mod 2 6 = ( K (i+j 1) ( P i+16n )) mod 2 n=0 = ( K (i+j 1) Q i ) mod 2, where Q i = 6 P i+16n (6) From Equation 6, we find two corner cases for RSK that would produce undesirable results. Rule 3. If all bits in RSK are zero, the hash value is zero. Rule 4. If all bits in RSK are one, all bits in the hash value are either 0 or 1. It is easy to see that Rule 3 holds. If K i is one, every RET j (RET j = 96 P i) takes on either 0 or 1 regardless of j. These two corner cases of RSK limits the output value to a small space, which makes it unsuitable for load balancing among multiple queues. From (5), we also find that if RSK is an n-bit sequence, the result is also repeated as an n-bit sequence. As our result needs a 16-bit sequence, the returned hash value has a 16-bit pattern. n=0 RET = RET 1 RET 2 RET 3...RET 16 RET 1 RET 2 RET 3...RET 16 = 2 16 i RET i i RET i = ( ) (2 16 i RET i ) (7) Since 16 (216 i RET i ) takes on a random value in the 16-bit value space if RET i is random, we find that (RET mod (number of RX queues)) would take on a random value if the number of RX queues is smaller than 65, Experiments We conduct experiments that show even load balancing of our symmetric RSS. We create 100,000 TCP packets with random source and destination IPs and port numbers, and calculate the hash values for each packet using the RSS algorithm.. We test with various numbers of RX queues and use two RSK sets as shown in Figure 3. For comparison with the original RSK, we plot the coefficient of variance (CV) in Figure 4. If CV is close to zero, it implies that the variance between the queue size is small and load is balanced among the queues. As shown in the Figure, both symmetric RSS and original RSS have CV values smaller than 5
6 CV (Coefficient of Variation) <Symmetric RSS> 0x6d5a 0x56da 0x255b 0x0ec2 0x4167 0x253d 0x43a3 0x8fb0 0xd0ca 0x2bcb 0xae7b 0x30b4 0x77cb 0x2da3 0x8030 0xf20c 0x6a42 0xb73b 0xbeac 0x01fa <Original RSS> Figure 3: RSK sets used in the experiments SymmetricRSS OriginalRSS Number of RX queues in a NIC Figure 4: CV of the numbers of packets distributed to RX queues From this, we find that our symmetric RSS algorithm provides a similar level of load balacing with that of the original RSS algorithm. 3. CONCLUSION Load balancing of the received packets into multiple cores is the key to high performance TCP session processing. Receive-side scaling is a simple and efficient solution for load balancing of the packets into multiple RX queues; however, it cannot map the packets in the same TCP connection to the same RX queue, which creates an extra overhead in managing the packets in the same TCP connection. We find that preparing RSK to have a repeating 16-bit pattern makes the original RSS algorithm symmetric for the packets in the same TCP connection. While this new RSK set returns a 32-bit hash value with a 16-bit pattern, we show that the new seeds do not affect the level of load balancing compared with that of the original algorithm if we avoid a few corner cases. 4. REFERENCES [1] B. Agarwal, A. Akella, A. Anand, A. Balachandran, P. Chitnis, C. Muthukrishnan, R. Ramjee, and G. Varghese. Endre: An end-system redundancy elimination service for enterprises. In Proceeding of the USENIX Symposium on Networked Systems Design and Implementation, pages , [2] A. Anand, V. Sekar, and A. Akella. Smartre: an architecture for coordinated network-wide redundancy elimination. In Proceedings of the ACM SIGCOMM 2009 Conference On Data Communication, SIGCOMM 09, pages 87 98, New York, NY, USA, ACM. [3] M. Jamshed, J. Lee, S. Moon, I. Yun, D. Kim, S. Lee, Y. Yi, and K. Park. Kargus: a highly-scalable software-based intrusion detection system. In Proceedings of the ACM Conference on Computer and 6
7 Communications Security (CCS), [4] H. Krawczyk. Lfsr-based hashing and authentication. In Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO 94, pages , London, UK, UK, Springer-Verlag. [5] Microsoft. MSDN: Introduction to Receive-Side Scaling [Online; accessed 24-April-2012]. [6] M. Roesch. Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the 13th USENIX Conference on System Administration, pages , [7] G. Vasiliadis, M. Polychronakis, and S. Ioannidis. Midea: a multi-parallel intrusion detection architecture. In Y. Chen, G. Danezis, and V. Shmatikov, editors, ACM Conference on Computer and Communications Security, pages ACM,
MIDeA: A Multi-Parallel Intrusion Detection Architecture
MIDeA: A Multi-Parallel Intrusion Detection Architecture Giorgos Vasiliadis, FORTH-ICS, Greece Michalis Polychronakis, Columbia U., USA Sotiris Ioannidis, FORTH-ICS, Greece CCS 2011, 19 October 2011 Network
OpenFlow with Intel 82599. Voravit Tanyingyong, Markus Hidell, Peter Sjödin
OpenFlow with Intel 82599 Voravit Tanyingyong, Markus Hidell, Peter Sjödin Outline Background Goal Design Experiment and Evaluation Conclusion OpenFlow SW HW Open up commercial network hardware for experiment
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
COMPARISON OF HASH STRATEGIES FOR FLOW-BASED LOAD BALANCING
International Journal of Electronic Commerce Studies Vol.6, No.2, pp.259-268, 215 doi: 1.793/ijecs.1346 COMPARISON OF HASH STRATEGIES FOR FLOW-BASED LOAD BALANCING Surasak Sanguanpong Kasetsart University
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
Enhanced PACK Approach for Traffic Redundancy Elimination
Enhanced PACK Approach for Traffic Redundancy Elimination Eldho Skaria 1, George T Vadakkumcheril 2 1,2 Department of Computer Science and Engineering, KMP College of Engineering, Asamannoor P.O Poomala,
Flow Monitoring With Cisco Routers
CSAMP: A System for Network- Wide Flow Monitoring Vyas Sekar,Michael K. Reiter, Walter Willinger, Hui Zhang,Ramana Rao Kompella, David G. Andersen Presentation by Beletsioti Georgia Flow measurements today
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
Quality of Service (QoS): Managing Bandwidth More Effectively on the Series 2600/2600-PWR and Series 2800 Switches
6 Quality of Service (QoS): Managing Bandwidth More Effectively on the Series 2600/2600-PWR and Series 2800 Switches Contents Introduction................................................... 6-3 Terminology................................................
ECE 578 Term Paper Network Security through IP packet Filtering
ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,
PART III. OPS-based wide area networks
PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
The Load Balancing System Design of Service Based on IXP2400 Yi Shijun 1, a, Jing Xiaoping 1,b
Advanced Engineering Forum Vol. 1 (2011) pp 42-46 Online: 2011-09-09 (2011) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/aef.1.42 The Load Balancing System Design of Service Based
Technical Brief. DualNet with Teaming Advanced Networking. October 2006 TB-02499-001_v02
Technical Brief DualNet with Teaming Advanced Networking October 2006 TB-02499-001_v02 Table of Contents DualNet with Teaming...3 What Is DualNet?...3 Teaming...5 TCP/IP Acceleration...7 Home Gateway...9
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Network Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
Introduction to Security and PIX Firewall
Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network
Chapter 4 Rate Limiting
Chapter 4 Rate Limiting HP s rate limiting enables you to control the amount of bandwidth specific Ethernet traffic uses on specific interfaces, by limiting the amount of data the interface receives or
IP Subnetting and Addressing
Indian Institute of Technology Kharagpur IP Subnetting and Addressing Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 6: IP Subnetting and Addressing
Verifying Network Bandwidth
Verifying Network Bandwidth My current project is to install a new Gigabit link between the datacenter and Smith Hall on the far side of the campus, says Joe Homes, the network administrator for a Pacific
Wireshark in a Multi-Core Environment Using Hardware Acceleration Presenter: Pete Sanders, Napatech Inc. Sharkfest 2009 Stanford University
Wireshark in a Multi-Core Environment Using Hardware Acceleration Presenter: Pete Sanders, Napatech Inc. Sharkfest 2009 Stanford University Napatech - Sharkfest 2009 1 Presentation Overview About Napatech
10 Gbit Hardware Packet Filtering Using Commodity Network Adapters. Luca Deri <[email protected]> Joseph Gasparakis <joseph.gasparakis@intel.
10 Gbit Hardware Packet Filtering Using Commodity Network Adapters Luca Deri Joseph Gasparakis 10 Gbit Monitoring Challenges [1/2] High number of packets to
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
- Introduction to PIX/ASA Firewalls -
1 Cisco Security Appliances - Introduction to PIX/ASA Firewalls - Both Cisco routers and multilayer switches support the IOS firewall set, which provides security functionality. Additionally, Cisco offers
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
Firewall Verification and Redundancy Checking are Equivalent
Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin [email protected] M. G. Gouda National Science Foundation University of Texas at Austin [email protected]
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks
Accelerate In-Line Packet Processing Using Fast Queue
Accelerate In-Line Packet Processing Using Fast Queue Chun-Ying Huang 1, Chi-Ming Chen 1, Shu-Ping Yu 1, Sheng-Yao Hsu 1, and Chih-Hung Lin 1 Department of Computer Science and Engineering, National Taiwan
MoonGen. A Scriptable High-Speed Packet Generator Design and Implementation. Paul Emmerich. January 30th, 2016 FOSDEM 2016
MoonGen A Scriptable High-Speed Packet Generator Design and Implementation Paul Emmerich January 30th, 2016 FOSDEM 2016 Chair for Network Architectures and Services Department of Informatics Paul Emmerich
Packet Processing on the GPU
Packet ing on the Matthew Mukerjee Carnegie Mellon University [email protected] David Naylor Carnegie Mellon University [email protected] Bruno Vavala Carnegie Mellon University [email protected] ABSTRACT
SO_REUSEPORT Scaling Techniques for Servers with High Connection Rates. Ying Cai [email protected]
SO_REUSEPORT Scaling Techniques for Servers with High Connection Rates Ying Cai [email protected] Problems Servers with high connection/transaction rates TCP servers, e.g. web server UDP servers, e.g. DNS
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
Availability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013
the Availability Digest Redundant Load Balancing for High Availability July 2013 A large data center can comprise hundreds or thousands of servers. These servers must not only be interconnected, but they
OpenFlow based Load Balancing for Fat-Tree Networks with Multipath Support
OpenFlow based Load Balancing for Fat-Tree Networks with Multipath Support Yu Li and Deng Pan Florida International University Miami, FL Abstract Data center networks are designed for satisfying the data
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
Network Intrusion Detection Systems. Beyond packet filtering
Network Intrusion Detection Systems Beyond packet filtering Goal of NIDS Detect attacks as they happen: Real-time monitoring of networks Provide information about attacks that have succeeded: Forensic
HANIC 100G: Hardware accelerator for 100 Gbps network traffic monitoring
CESNET Technical Report 2/2014 HANIC 100G: Hardware accelerator for 100 Gbps network traffic monitoring VIKTOR PUš, LUKÁš KEKELY, MARTIN ŠPINLER, VÁCLAV HUMMEL, JAN PALIČKA Received 3. 10. 2014 Abstract
Content-Aware Load Balancing using Direct Routing for VOD Streaming Service
Content-Aware Load Balancing using Direct Routing for VOD Streaming Service Young-Hwan Woo, Jin-Wook Chung, Seok-soo Kim Dept. of Computer & Information System, Geo-chang Provincial College, Korea School
On Multi Gigabit Packet Capturing With Multi Core Commodity Hardware
On Multi Gigabit Packet Capturing With Multi Core Commodity Hardware Nicola Bonelli, Andrea Di Pietro, Stefano Giordano, and Gregorio Procissi CNIT and Università di Pisa, Pisa, Italy Abstract. Nowadays
Protocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
Lecture 23: Firewalls
Lecture 23: Firewalls Introduce several types of firewalls Discuss their advantages and disadvantages Compare their performances Demonstrate their applications C. Ding -- COMP581 -- L23 What is a Digital
Data Center Load Balancing. 11.11.2015 Kristian Hartikainen
Data Center Load Balancing 11.11.2015 Kristian Hartikainen Load Balancing in Computing Efficient distribution of the workload across the available computing resources Distributing computation over multiple
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
Protocol Security Where?
IPsec: AH and ESP 1 Protocol Security Where? Application layer: (+) easy access to user credentials, extend without waiting for OS vendor, understand data; (-) design again and again; e.g., PGP, ssh, Kerberos
Understanding OpenFlow
Understanding OpenFlow Technical Whitepaper June, 2014 Saurabh Kumar Agarwal Email: [email protected] Abstract Technical overview of OpenFlow Switch Specification, Version 1.0.0, published on December
HASH CODE BASED SECURITY IN CLOUD COMPUTING
ABSTRACT HASH CODE BASED SECURITY IN CLOUD COMPUTING Kaleem Ur Rehman M.Tech student (CSE), College of Engineering, TMU Moradabad (India) The Hash functions describe as a phenomenon of information security
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
Router Architectures
Router Architectures An overview of router architectures. Introduction What is a Packet Switch? Basic Architectural Components Some Example Packet Switches The Evolution of IP Routers 2 1 Router Components
OFFLOADING THE CLIENT-SERVER TRE EFFORT FOR MINIMIZING CLOUD BANDWITH AND COST
OFFLOADING THE CLIENT-SERVER TRE EFFORT FOR MINIMIZING CLOUD BANDWITH AND COST Akshata B Korwar #1,Ashwini B Korwar #2,Sharanabasappa D Hannure #3 #1 Karnataka Kalburgi, 9742090637, korwar9.aksha ta@ gmail.com.
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
CPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
Stateful Firewalls. Hank and Foo
Stateful Firewalls Hank and Foo 1 Types of firewalls Packet filter (stateless) Proxy firewalls Stateful inspection Deep packet inspection 2 Packet filter (Access Control Lists) Treats each packet in isolation
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 roadmap 1 What is network security? 2 Principles of cryptography 3 Message integrity, authentication
Evaluating the Suitability of Server Network Cards for Software Routers
Evaluating the Suitability of Server Network Cards for Software Routers Maziar Manesh Katerina Argyraki Mihai Dobrescu Norbert Egi Kevin Fall Gianluca Iannaccone Eddie Kohler Sylvia Ratnasamy EPFL, UCLA,
New Products and New Features May, 2015
NetAcquire Server 8 New Products and New Features May, 2015 1. Includes all NetAcquire 7.6 and earlier enhancements 2. Runs on a new real-time operating system: NetAcquire Deterministic Linux (NDL) a.
Efficiently Managing Firewall Conflicting Policies
Efficiently Managing Firewall Conflicting Policies 1 K.Raghavendra swamy, 2 B.Prashant 1 Final M Tech Student, 2 Associate professor, Dept of Computer Science and Engineering 12, Eluru College of Engineeering
Table of Contents. Cisco How Does Load Balancing Work?
Table of Contents How Does Load Balancing Work?...1 Document ID: 5212...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Load Balancing...1 Per Destination and
Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications
Single Pass Load Balancing with Session Persistence in IPv6 Network C. J. (Charlie) Liu Network Operations Charter Communications Load Balancer Today o Load balancing is still in use today. It is now considered
Haetae: Scaling the Performance of Network Intrusion Detection with Many-core Processors
Haetae: Scaling the Performance of Network Intrusion Detection with Many-core Processors Jaehyun Nam*, Muhammad Jamshed, Byungkwon Choi, Dongsu Han, and KyoungSoo Park School of Computing*, Department
We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
The Lagopus SDN Software Switch. 3.1 SDN and OpenFlow. 3. Cloud Computing Technology
3. The Lagopus SDN Software Switch Here we explain the capabilities of the new Lagopus software switch in detail, starting with the basics of SDN and OpenFlow. 3.1 SDN and OpenFlow Those engaged in network-related
18-731 Midterm. Name: Andrew user id:
18-731 Midterm 6 March 2008 Name: Andrew user id: Scores: Problem 0 (10 points): Problem 1 (10 points): Problem 2 (15 points): Problem 3 (10 points): Problem 4 (20 points): Problem 5 (10 points): Problem
IPsec Details 1 / 43. IPsec Details
Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
Network traffic monitoring and management. Sonia Panchen [email protected] 11 th November 2010
Network traffic monitoring and management Sonia Panchen [email protected] 11 th November 2010 Lecture outline What is network traffic management? Traffic management applications Traffic monitoring
IP Security. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49
IP Security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security
Understanding IP Faxing (Fax over IP)
Understanding IP Faxing (Fax over IP) A detailed technical overview of how VoIP technology and IP Faxing (Fax over IP) are changing the way organizations utilize existing network infrastructures for voice
Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 [email protected]. DDoS and IP Traceback. Overview
DDoS and IP Traceback Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 [email protected] Louisiana State University DDoS and IP Traceback - 1 Overview Distributed Denial of Service
Chapter 3. Internet Applications and Network Programming
Chapter 3 Internet Applications and Network Programming 1 Introduction The Internet offers users a rich diversity of services none of the services is part of the underlying communication infrastructure
Packet Sampling and Network Monitoring
Packet Sampling and Network Monitoring CERN openlab Monthly Technical Meeting 13 th November, 2007 Milosz Marian Hulboj [email protected] Ryszard Erazm Jurga [email protected] What is Network
AN RC4 BASED LIGHT WEIGHT SECURE PROTOCOL FOR SENSOR NETWORKS
AN RC4 BASED LIGHT WEIGHT SECURE PROTOCOL FOR SENSOR NETWORKS Chang N. Zhang and Qian Yu Department of Computer Science, University of Regina 3737 Wascana Parkway, Regina, SK S4S 0A2 Canada {zhang, yu209}@cs.uregina.ca
Configuring a Load-Balancing Scheme
This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco Express Forwarding traffic. Load-balancing allows you to optimize
50. DFN Betriebstagung
50. DFN Betriebstagung IPS Serial Clustering in 10GbE Environment Tuukka Helander, Stonesoft Germany GmbH Frank Brüggemann, RWTH Aachen Slide 1 Agenda Introduction Stonesoft clustering Firewall parallel
Performance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
NetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
TCP Offload Engines. As network interconnect speeds advance to Gigabit. Introduction to
Introduction to TCP Offload Engines By implementing a TCP Offload Engine (TOE) in high-speed computing environments, administrators can help relieve network bottlenecks and improve application performance.
Policy Distribution Methods for Function Parallel Firewalls
Policy Distribution Methods for Function Parallel Firewalls Michael R. Horvath GreatWall Systems Winston-Salem, NC 27101, USA Errin W. Fulp Department of Computer Science Wake Forest University Winston-Salem,
