Evaluation of Elephant-based Algorithms for Flow Table Reduction under Realistic Traffic Distributions

05/01/2020
by   Piotr Jurkiewicz, et al.
0

The majority of Internet traffic is caused by a relatively small number of flows (so-called elephant flows). This phenomenon can be exploited to facilitate traffic engineering: resource-costly individual flow forwarding entries can be created only for elephants, while serving mice over shortest paths. Although this idea already appeared as a part of proposed TE systems, it was not examined by itself. It remains unknown what extent of flow table occupancy and operations number reduction can be achieved, how to select thresholds or sampling rates to cover the desired fraction of traffic or how to detect elephants with low computational and memory overhead. In this paper, we use reproducible traffic models obtained from 30-day-long campus/residential trace covering 4 billion flows to answer these questions. The most important finding is that simple packet sampling performs surprisingly well on realistic traffic, reducing the number of flow entries by a factor up to 400 with the aim to cover 80 questions the need for more sophisticated algorithms. We also provide an open-source software package allowing the replication of our experiments or the performing of similar evaluations for other algorithms or flow distributions.

READ FULL TEXT
research
09/10/2018

Flow Length and Size Distributions in Campus Internet Traffic

Efficiency of numerous flow-oriented solutions proposed in the literatur...
research
08/06/2018

Outlier detection on network flow analysis

It is important to be able to detect and classify malicious network traf...
research
11/28/2017

Towards Provably Invisible Network Flow Fingerprints

Network traffic analysis reveals important information even when message...
research
06/24/2013

A State-Space Approach for Optimal Traffic Monitoring via Network Flow Sampling

The robustness and integrity of IP networks require efficient tools for ...
research
07/16/2018

CLEF: Limiting the Damage Caused by Large Flows in the Internet Core (Technical Report)

The detection of network flows that send excessive amounts of traffic is...
research
09/23/2018

Fundamental Limits of Invisible Flow Fingerprinting

Network flow fingerprinting can be used to de-anonymize communications o...
research
11/20/2018

Traffic-aware Threshold Adjustment for NFV Scaling using DDPG

Current solutions mostly focus on how to predict traffic, rather than ob...

Please sign up or login with your details

Forgot password? Click here to reset