2016
DOI: 10.1109/mic.2016.55
|View full text |Cite
|
Sign up to set email alerts
|

Cuckoo Cache: A Technique to Improve Flow Monitoring Throughput

Abstract: Flow identification is commonly used in traffic monitoring applications as it provides valuable insights into the nature of the traffic. However, implementing it for high speed links is challenging due to the large number of both packets and flows that need to be analyzed. Flow identification can be implemented with Content Addressable Memories (CAMs) or alternatively with hash based data structures. One of the most efficient hash based structures is Cuckoo hashing. This scheme is able to perform a query opera… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…Cuckoo hashing. In addition to probing and chaining, another form of hash table that has become widely used (see, e.g., [81,120,132]) is cuckoo hashing, which was introduced in 2004 by Pagh and Rodler [109,110]. Cuckoo hashing guarantees that every record u is in one of two positions h 1 (u) or h 2 (u) in the hash table.…”
Section: Related Workmentioning
confidence: 99%
“…Cuckoo hashing. In addition to probing and chaining, another form of hash table that has become widely used (see, e.g., [81,120,132]) is cuckoo hashing, which was introduced in 2004 by Pagh and Rodler [109,110]. Cuckoo hashing guarantees that every record u is in one of two positions h 1 (u) or h 2 (u) in the hash table.…”
Section: Related Workmentioning
confidence: 99%