Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
143 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Advancements in Traffic Processing Using Programmable Hardware Flow Offload (2407.16231v1)

Published 23 Jul 2024 in cs.NI

Abstract: The exponential growth of data traffic and the increasing complexity of networked applications demand effective solutions capable of passively inspecting and analysing the network traffic for monitoring and security purposes. Implementing network probes in software using general-purpose operating systems has been made possible by advances in packet-capture technologies, such as kernel-bypass frameworks, and by multi-queue adapters designed to distribute the network workload in multi-core processors. Modern SmartNICs, in addition, have introduced stateful mechanisms to associate actions to network flows such as forwarding packets or updating traffic statistics for an individual flow. In this paper, we describe our experience in exploiting those functionalities in a modern network probe and we perform a detailed study of the performance characteristics under different scenarios. Compared to pure CPU-based solutions, SmartNICs with flow-offload technologies provide substantial benefits when implementing forwarding applications. However, the main limitation of having to keep large flow tables in the host memory remains largely unsolved for realistic monitoring and security applications.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (15)
  1. Y. Feng, S. Panda, S.G. Kulkarni, K.K. Ramakrishnan, N. Duffield, “A smartnic-accelerated monitoring platform for in-band network telemetry”, 2020 IEEE International Symposium on Local and Metropolitan Area, 2020.
  2. B. Claise, “Cisco systems netflow services export version 9“, RFC 3954. 2004.
  3. B. Trammell, and E. Boschi, “An introduction to IP flow information export (IPFIX)“, IEEE Communications Magazine 49.4 (2011): 89-95.
  4. T. Bujlow, V. Carela-Español, and P. Barlet-Ros, “Independent comparison of popular DPI tools for traffic classification“, Computer Networks 76 (2015): 75-89.
  5. R. Chen, and G. Sun, “A survey of kernel-bypass techniques in network stack“‘, Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence. 2018.
  6. M. Majkowski, “Kernel bypass“, The Cloudflare Blog, https://blog.cloudflare.com/kernel-bypass, 2015.
  7. F. Fusco, and L. Deri, “High speed network traffic analysis with commodity multi-core systems“, Proceedings of the 10th ACM SIGCOMM conference on Internet measurement. 2010.
  8. M. Kuźniar, “Methodology, measurement and analysis of flow table update characteristics in hardware openflow switches“, Computer Networks 136 (2018): 22-36.
  9. A. Seibulescu, and M. Baldi. “Leveraging p4 flexibility to expose target-specific features“. Proceedings of the 3rd P4 Workshop in Europe. 2020.
  10. J. Liu, C. Maltzahn, C. Ulmer, M.L. Curry, “Performance characteristics of the Bluefield-2 Smartnic“, arXiv preprint arXiv:2105.06619, 2021.
  11. S. Karamati, J. Young, T. Conte, K.S. Hemmert, R. Grant, C. Hughes, R. Vudu, “Computational Offload with BlueField Smart NICs”, Sandia Report SAND2021-13031, 2021
  12. L. Deri, “Towards 100-Gbit Flow-Based Network Monitoring“, FloCon Conference. 2016.
  13. Napatech A/S, “Stateful Flow Management“, https://docs.napatech.com/r/Stateful-Flow-Management, 2024.
  14. R. Pagh, and F. Friche Rodler, “Cuckoo hashing“, Journal of Algorithms 51.2 (2004): 122-144.
  15. Suricata, “https://suricata.io“

Summary

We haven't generated a summary for this paper yet.