skip to main content
10.1145/1095890.1095893acmconferencesArticle/Chapter ViewAbstractPublication PagesancsConference Proceedingsconference-collections
Article

Architectural impact of stateful networking applications

Published: 26 October 2005 Publication History

Abstract

The explosive and robust growth of the Internet owes a lot to the "end-to-end principle", which pushes stateful operations to the end-points. The Internet grew both in traffic volume, and in the richness of the applications it supports. The growth also brought along new security issues and network monitoring applications. Edge devices, in particular, tend to perform upper layer packet processing. A whole new class of applications require stateful processing.In this paper we study the impact of stateful networking applications on architectural bottlenecks. The analysis covers applications with a variety of statefulness levels. The study emphasizes the data cache behavior. Nevertheless, we also discuss other issues, such as branch prediction and ILP. Additionally, we analyze the architectural impact through the TCP connection life. Our results show an important memory bottleneck due to maintaining the states. Moreover, depending on the target of the application, the memory bottleneck may be concentrated within a set of packets or distributed along the TCP connection lifetime.

References

[1]
J. Beale, J. C. Foster, J. Posluns, and B. Caswell. Snort 2.0 Intrusion Detection. Syngress Publishing Inc., 2003.
[2]
Snot V0.92 alpha. http://www.stolenshoes.net/sniph/snot-0.92a-README.txt. June, 2004.
[3]
G. Coretez Fun with Packets: Designing a Stick. Draft White Paper on Stick. http://www.eurocompton.net/stick/. June, 2004.
[4]
D. Newman, J. Snyder, and R. Thayer. Crying Wolf: False Alarms Hide Attacks. Network World. June, 2002.
[5]
M. Merideth, and P. Narasimhan. Elephant: Network Intrusion Detection Systems that Don't Forget. Hawaii International Conference on System Sciences (HICSS-38). Big Island, HI. January 2005.
[6]
J. Saltzer, D. Reed, and D. Clark. End-To-End Arguments in System Design. In ACM Transactions on Computer Systems, 2(4):277-288, 1984.
[7]
Cisco IOS NetFlow. http://www.cisco.com/warp/public/732/Tech/nmp/netflow/index.shtml.
[8]
Argus - Auditing Network Activity. http://www.qosient.com/argus.
[9]
Cooperative association for internet data analysis. www.caida.org.
[10]
The Computer Emergency Response Team. www.cert.org.
[11]
The System Administration, Networking and Security Organization. www.sans.org.
[12]
The DefCon Conference website. www.defcon.org.
[13]
P. Chandra, F. Hady, R. Yavatkar, T. Bock, M. Cabot, and P. Mathew. Benchmarking network processors. In Proc. NP1, Held in conjunction with HPCA-8, Cambridge, MA, USA, Feb. 2002.
[14]
P. Crowley, M. A. Franklin, H. Hadimioglu, and P. Z. Onufryk. Network Processor Design: Issues and Practices, vol. 1, chapter Network Processors: An Introduction to Design Issues. Morgan Kaufmann Publishers, USA, 2002.
[15]
P. Crowley, M. A. Franklin, H. Hadimioglu, and P. Z. Onufryk. Network Processor Design: Issues and Practices, vol. 2, chapter Network Processors: Themes and Challenges. Morgan Kaufmann Publishers, USA, 2003.
[16]
J. Won-Ki Hong. Invited talk: Internet traffic monitoring and analysis using ng-mon. In Proc. of IEEE ICACT-6, Republic of Korea, Feb. 2004.
[17]
E. Kohler, J. Li, V. Paxson, and S. Shenker. Observed structure of addresses in IP traffic. In Proc. of the 2nd ACM SIGCOMM Workshop on Internet measurment workshop, PA, USA, August 2002.
[18]
C. Kruegel, F. Valeur, G. Vigna, and R. Kemmerer. Stateful intrusion detection for high-speed networks. In Proc. IEEE Symposium Security and Privacy, IEEE Computer Society Press, CA, USA, 2002.
[19]
B. K. Lee and L. K. John. Npbench: A benchmark suite for control plane and data plane applications for network processors. In Proc. of ICCD, San Jose, CA, USA, Oct. 2003.
[20]
S. Melvin, M. Nemirovsky, E. Musoll, J. Huynh, R. Milito, H. Urdaneta, and K. Saraf. A massively multithreaded packet processor. In Proc. of NP2, Held in conjunction with HPCA-9, Anaheim, CA, USA, Feb. 2003.
[21]
G. Memik, W. H. Mangione-Smith, and W. Hu. Netbench: A benchmarking suite for network processors. In Proc. ICCAD, CA, USA, Nov. 2001.
[22]
A. Nemirovsky. Towards characterizing network processors: Needs and challenges. Nov. 2000. Xstream Logic Inc., white paper.
[23]
National lab of applied network research. http://pma.nlanr.net/Traces.
[24]
A. M. Odlyzko. Internet traffic growth: Sources and implications. In Optical Transmission Systems and Equipment for WDM Networking II, B. B. Dingel, W. Weiershausen, A. K. Dutta, and K.-I. Sato, eds., Proc. SPIE, vol. 5247, Sept. 2003.
[25]
R. Pang and V. Paxson. A high-level programming environment for packet trace anonymization and transformation. In Proceedings of the ACM SIGCOMM Conference, Germany, August 2003.
[26]
M. Roesch. Snort -- lightweight intrusion detection for networks. In Proceedings of the 13th Conference on Systems Administration (LISA-99), Seattle, WA, USA, Nov. 1999.
[27]
L. Schaelicke, T. Slabach, B. Moore, and C. Freeland. Characterizing the performance of network intrusion detection sensors. In Proc. of the 6th International Symposium on RAID, PA, USA, 2003.
[28]
A. Srivastava and A. Eustace. ATOM - A system for building customized program analysis tools. In Proc. ACM SIGPLAN Conf. on Programming Language Design and Implementation, June 1994.
[29]
Dean M. Tullsen. Simulation and modeling of a simultaneous multithreading processor. In 22nd Annual Computer Measurement Group Conference, pages 819--828, Dec. 1996.
[30]
J. Verdú, J. García, M. Nemirovsky, and M. Valero. Analysis of traffic traces for stateful applications. In Proc. of NP3, Held in conjunction with HPCA-10, Madrid, Spain, Feb. 2004.
[31]
J. Verdú, J. García, M. Nemirovsky, and M. Valero. The Impact of Traffic Aggregation on the Memory Performance of Networking Applications. In Proc. of MEDEA Workshop, Held in conjunction with PACT-2004, Juan-les-Pins, France, Sept. 2004.
[32]
T. Wolf and Mark A. Franklin. Commbench - a telecommunications benchmark for network processors. In Proc. of ISPASS, TX, USA, 2000.
[33]
D. Jimenez and C. Lin. Neural methods for dynamic branch prediction. ACM Transactions on Computer Systems 20(4):369--397, Nov. 2002.
[34]
L. Vintan and M. Iridon. Towards a high performance neural branch predictor. In Proc. of the International Joint Conference on Neural Networks, vol. 2, pag. 868--873, July 1999.
[35]
Scott McFarling. Combining Branch Predictors. Technical Report TN-36, Compaq Western Research Lab, June 1993.

Cited By

View all
  • (2009)A Novel Cache Architecture and Placement Framework for Packet Forwarding EnginesIEEE Transactions on Computers10.1109/TC.2009.1858:8(1009-1025)Online publication date: 1-Aug-2009
  • (2008)MultiLayer processing - an execution model for parallel stateful packet processingProceedings of the 4th ACM/IEEE Symposium on Architectures for Networking and Communications Systems10.1145/1477942.1477954(79-88)Online publication date: 6-Nov-2008
  • (2008)A Framework for Network State Management in the Next-Generation Internet ArchitectureIEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference10.1109/GLOCOM.2008.ECP.435(1-5)Online publication date: Nov-2008
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ANCS '05: Proceedings of the 2005 ACM symposium on Architecture for networking and communications systems
October 2005
230 pages
ISBN:1595930825
DOI:10.1145/1095890
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 October 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. flow
  2. flow-state
  3. inter-flow temporal distribution
  4. intra-flow temporal distribution
  5. stateful
  6. traffic aggregation

Qualifiers

  • Article

Conference

ANCS05

Acceptance Rates

Overall Acceptance Rate 88 of 314 submissions, 28%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2009)A Novel Cache Architecture and Placement Framework for Packet Forwarding EnginesIEEE Transactions on Computers10.1109/TC.2009.1858:8(1009-1025)Online publication date: 1-Aug-2009
  • (2008)MultiLayer processing - an execution model for parallel stateful packet processingProceedings of the 4th ACM/IEEE Symposium on Architectures for Networking and Communications Systems10.1145/1477942.1477954(79-88)Online publication date: 6-Nov-2008
  • (2008)A Framework for Network State Management in the Next-Generation Internet ArchitectureIEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference10.1109/GLOCOM.2008.ECP.435(1-5)Online publication date: Nov-2008
  • (2008)Scalable high-throughput SRAM-based architecture for IP-lookup using FPGA2008 International Conference on Field Programmable Logic and Applications10.1109/FPL.2008.4629921(137-142)Online publication date: Sep-2008
  • (2007)A next generation internet state management frameworkProceedings of the 2007 ACM CoNEXT conference10.1145/1364654.1364740(1-2)Online publication date: 10-Dec-2007
  • (2007)Frame shared memoryProceedings of the 3rd ACM/IEEE Symposium on Architecture for networking and communications systems10.1145/1323548.1323553(27-36)Online publication date: 3-Dec-2007

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media