Flow monitoring in high-speed networks with 2D hash tables

David Nguyen, Joseph Zambreno, Gokhan Memik

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

Flow monitoring is a required task for a variety of networking applications including fair scheduling and intrusion/anomaly detection. Existing flow monitoring techniques are implemented in software, which are insufficient for real-time monitoring in high-speed networks. In this paper, we present the design of a flow monitoring scheme based on two-dimensional hash tables. Taking advantage of FPGA technology, we exploit the use of parallelism in our implementation for both accuracy and performance. We present four techniques based on this two-dimensional hash table scheme. Using a simulation environment that processes packet traces, our implementation can find flow information within 8% of the actual value while achieving link speeds exceeding 60 Gbps for a workload with constant packet sizes of 40 bytes.

Original languageEnglish (US)
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
EditorsJurgen Becker, Marco Platzner, Serge Vernalde
PublisherSpringer Verlag
Pages1093-1097
Number of pages5
ISBN (Print)3540229892, 9783540229896
DOIs
StatePublished - 2004
Event14th International Conference on Field Programmable Logic and Applications, FPL 2004 - Antwerp, Belgium
Duration: Aug 30 2004Sep 1 2004

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3203
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other14th International Conference on Field Programmable Logic and Applications, FPL 2004
Country/TerritoryBelgium
CityAntwerp
Period8/30/049/1/04

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Flow monitoring in high-speed networks with 2D hash tables'. Together they form a unique fingerprint.

Cite this