The impact of traffic aggregation on the memory performance of networking applications

The trend of the networking processing is to increase the intelligence of the routers (i.e. security capacities). This means that there is an increment in the workload generated per packet and new types of applications are emerging, such as stateful programs. On the other hand, Internet traffic continues to grow vigorously. This fact involves an increment of the traffic aggregation levels and overloades the processing capacities of the routers.In this paper we show the importance of traffic aggregation level on networking application studies. We also classify the applications according to the data management of the packet processing. Hence, we present the different impacts on the data cache performance depending on the application category. Our results show that traffic aggregation level may affect the cache performance depending on the networking application category. Stateful applications show a significant sensitivity to this impact.

[1]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[2]  Vern Paxson,et al.  A high-level programming environment for packet trace anonymization and transformation , 2003, SIGCOMM '03.

[3]  Patrick Crowley,et al.  Network Processor Design: Issues and Practices , 2002 .

[4]  Andrew Odlyzko,et al.  Internet traffic growth: sources and implications , 2003, SPIE ITCom.

[5]  Patrick Crowley,et al.  Network Processors: An Introduction to Design Issues , 2003 .

[6]  Jerome H. Saltzer,et al.  End-to-end arguments in system design , 1984, TOCS.

[7]  Lizy Kurian John,et al.  NpBench: a benchmark suite for control plane and data plane applications for network processors , 2003, Proceedings 21st International Conference on Computer Design.

[8]  Tilman Wolf,et al.  CommBench-a telecommunications benchmark for network processors , 2000, 2000 IEEE International Symposium on Performance Analysis of Systems and Software. ISPASS (Cat. No.00EX422).

[9]  Dake Liu,et al.  Benchmarking network processors , 2004 .

[10]  Jeffrey Posluns,et al.  Snort 2.0 Intrusion Detection , 2003 .

[11]  Eddie Kohler,et al.  Observed Structure of Addresses in IP Traffic , 2002, IEEE/ACM Transactions on Networking.

[12]  Mateo Valero,et al.  Analysis of traffic traces for stateful applications , 2004 .

[13]  Wendong Hu,et al.  NetBench: a benchmarking suite for network processors , 2001, IEEE/ACM International Conference on Computer Aided Design. ICCAD 2001. IEEE/ACM Digest of Technical Papers (Cat. No.01CH37281).

[14]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[15]  Patrick Crowley,et al.  Network Processor Design: Issues and Practices, Volume 3 (The Morgan Kaufmann Series in Computer Architecture and Design Series) , 2005 .

[16]  Mario Nemirovsky,et al.  A Massively Multithreaded Packet Processor , 2004 .